NEXTDC appointed data centre provider for Queensland Government“NEXTDC’s appointment to the supplier panel for data centre services is an important step forward for the Queensland Government."
Ruckus releases new switch for 100GbE edge-to-core networks
Enables multi-gigabit networks with pay-as-you-grow model suitable for education, government and enterprise environments.
How AI could help cardiologists detect heart defects
Deep learning supposedly has the potential to help doctors cut down on diagnostic errors.
The silver lining in Australia’s Government cloud strategy
Cloud has been a huge part of the ‘digital transformation’ conversation within Australian government during recent years.
‘Buy-now-pay-later’ taking consumer markets by storm
A new survey shows that young people are embracing this new method of purchasing, with over 1.5 million users in the last year in Australia alone.
Versent acquires AI specialist Contexti
Versent announced its acquisition of Sydney-based, actionable insights business, Contexti.
8x8 launches X series contact centre cloud solution in A/NZ
“With X Series, organisations throughout Australia and New Zealand can now integrate all of their employee communications and contact centre solutions on one cloud platform.”
How Australia can access the connected supply chain
"Australia’s logistics industry now needs to set its eyes on how it can go about digitalising all the areas of the traditional supply chain."
Aerohive achieves ISO/IEC 27001 cloud platform certification
Aerohive is the first cloud-managed networking vendor recognized by a global standard for commitment to information security management systems.
Better data management: Whose job is it?
An Experian executive’s practical advice on how to structure data-management roles within a modern business environment.
Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Sonatype and HackerOne partner on open source vulnerability reporting
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
Platform9 and Intersect partner to bring unified cloud to A/NZ
“For Intersect, Platform9 represents the single most strategic solution to a set of challenges we see expanding across the board."
Gartner: AI to reduce project management workload
80% of the work performed project management teams will be taken over by AI by 2030, starting this year.
Dynatrace takes pole position in APM Magic Quadrant
It placed highest on Ability to Execute and furthest on Completeness of Vision in the 2019 Quadrant for Application Performance Monitoring (APM).
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
WiFi to provide infinite opportunities as the lifeblood of modern cities
It's become virtually impossible to imagine our personal working lives without WiFI, but Ruckus says there's still so much more it can do.
How the right ECM system empowers key business areas
"The right enterprise content management system supports collaboration and co-authoring aspects of content management, including visibility for all parties associated with key assets.”
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.Download
Infographic: The security concerns keeping business leaders up at night
Almost half of Australians are concerned about war or terrorism, the Unisys Security Index has foundDownload
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Dropbox invests in hosting data inside Australia
Global collaboration platform Dropbox has announced it will now host Australian customer files onshore to support its growing base in the country.
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Disaster alert - will your business survive?
No matter the size or industry that your business operates in, business continuity planning is critical to support resilience and uptime in the event of a disaster.Download
Nozomi and RIoT to deliver advanced ICS security solutions to Australia
''As a specialised integrator of robust and resilient ICT and IoT solutions within Australia, we are delighted to be partnering with Nozomi Networks."
Avaya expands integration with Google Cloud AI
This includes embedding Google’s machine learning within conversation services for the contact centre, enabling integration of AI capabilities.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?Download
Poly appoints new A/NZ managing director, Andy Hurt
“We’re excited to be bringing together two established pioneers in audio and video technology to be moving forward and one business – Poly."
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
Microsoft Teams’ eight new and upcoming features
After taking Best in Show at Enterprise Connect, Microsoft Teams will be seeing eight new capabilities over 2019.
Veritas signs up Pure Storage vet as new CMO
Veritas Technologies has announced the appointment of Todd Forsythe as its new chief marketing officer.
Efficiency is the name of the game - how to profit from workspace digitisation
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.Download
Opinion: Balancing DX with diversity and inclusion
As the business landscape continues to quickly evolve, two concepts are becoming increasingly apparent and starting to intertwine.
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Queensland Govt backs safety-tech firm to tune of $1m
“The safety software market is booming, thanks to our customers realising its value in the precarious world we live in,'' says Karen Cantwell.
Healthcare breaches on the rise - here’s how Philips protects data
As healthcare becomes increasingly digitalised, medical institutions need to ensure the systems they are using are storing patient data in a reliable and secure way.Download
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
HCL and Xerox expand strategic partnership
Under the terms of the agreement, HCL will manage portions of Xerox’s shared services, including global administrative and support functions.
Aussie company set to democratise direct-to-orbit IoT access
Adelaide-based Myriota has released a developer toolkit that has been trialled and tested by a smart waste management platform.
Brennan IT namedrops new clients for its MSP services
CEO Stephen Sims says enterprises have been underserviced by Tier-1 service providers for too long.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Cyber threats: Catch 'em all with unified monitoring
Viruses, Trojans, malfunctions, backdoors, physical hazards… Not so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.Download
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
How Cognata and NVIDIA enable autonomous vehicle simulation
“Cognata and NVIDIA are creating a robust solution that will efficiently and safely accelerate autonomous vehicles’ market entry."
Silver Peak solution thwarts VoIP call dropouts
UC solutions must be able to overcome packet loss, latency and jitter that degrade voice and video quality.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Kinetica launches a new active analytics platform
"With the platform now powered by NVIDIA DGX-2, customers can build smart analytical applications that combine historical data analytics and ML-powered analytics."
SkyKick launches Office 365 QuantumSync cloud migration technology
The upgrade supposedly brings increased security, improved performance and a better end-customer experience to the migration platform.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
NVIDIA’s virtual proving ground for validating autonomous vehicles
The cloud-based platform enables millions of miles to be driven in virtual worlds across a broad range of scenarios.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.Download
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Global security concerns have major impact on Australian firms
Consumers in Australia, Malaysia, New Zealand and the Philippines are not comfortable using digital identities to interact with commercial or financial service providers.Download
Whitepaper: How to improve your cybersecurity sales pitch
Boards and executives who normally approve funding for IT security projects do not speak tech - they speak the language of ROI, NPV, etc.Download
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Zoom’s new Rooms and Meetings features
Zoom has released information about the upcoming releases for its Rooms and Meeting offerings for 2019.
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.Download
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.Download
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Lenovo & VMware know the secret of hyperconvergence - do you?
In this whitepaper, IDC analyses the benefits of hyperconverged solutions, and how they align with solutions from firms such as Lenovo and VMware.Download
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
How IoT can be a game changer for the hospitality sector
IoT and home automation are driving up consumer expectation, and catering to this will be the key to success for the hospitality sector.
TYAN unveils new inference-optimised GPU platforms with NVIDIA T4 accelerators
“TYAN servers with NVIDIA T4 GPUs are designed to excel at all accelerated workloads, including machine learning, deep learning, and virtual desktops.”
The ever-shifting role of physical access control
Physical security teams can retain control over their budgets and investment decisions, as well as the ability to prioritize the safety and security of the organisation.Download
Why businesses must embrace automation to ensure success
“For many younger workers, the traditional view of a steady job at one company, perhaps for life, simply doesn’t reflect reality."
Why 'right to repair' legislation could be a new lease on life for broken devices
“These companies are profiting at the expense of our environment and our pocketbooks as we become a throw-away society that discards over 6 million tonnes of electronics every year.”
OutSystems and Boncode team up for better code analysis
The Boncode and OutSystems alliance aims to help organisations to build fast and feel comfortable that the work they're delivering is at peak quality levels.
SIS announces a partnership with Platform 4
“We are looking forward to a strong future in the New Zealand security industry with this global giant as our strategic partner."
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."Download
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Inspur announces AI edge computing server with NVIDIA GPUs
“The dynamic nature and rapid expansion of AI workloads require an adaptive and optimised set of hardware, software and services for developers to utilise as they build their own solutions."
How Virtustream enabled FMC to modernise its global IT operations
As a result of transforming its IT operations, migrating mission-critical applications to the cloud and implementing a new SAP S/4HANA environment, FMC expects to realise significant cost and time savings.
VMware announces new features in VMware Cloud, Dell EMC integrations
VMware announced VMware Cloud Foundation 3.7 is expected to be available on Dell EMC VxRail in VMware’s Q1FY20.
Alibaba Cloud opening up data centres & services for AU businesses
At its dedicated China Gateway Summit held in Sydney, Alibaba Cloud announced its new programme for Australian business partners and clients.
Digital spending to hit US$1.2 trillion by 2022
A recent study by Zinnov shows that IoT spend reached US$201 billion in 2018 while outsourcing service providers generated $40 billion in revenue.
Google certifies Panasonic rugged devices for enterprise
The Toughbook T1 and N1 handhelds meet all requirements for Google’s rugged Android certification.
Dropbox brings in-country document hosting to A/NZ & Japan
Dropbox Business users in New Zealand, Australia, and Japan will be able to store their Dropbox files in-country, beginning in the second half of 2019.
SAS partners with NVIDIA on deep learning and computer vision
“By partnering with NVIDIA, we combine our strengths to augment human intelligence and realise the true potential of AI.”