Technology news for Australia's largest enterprises
Oracle Cloud whips up a breeze for Sydney yacht races
If data can help a boat go faster, racing teams and fans alike at this year’s SailGP in Sydney will get a front-row seat.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
Gartner debunks common AI misconceptions
“With AI technology making its way into the organisation, it is crucial that business and IT leaders fully understand how AI can create value for their business and where its limitations lie."
How Red Hat aims to accelerate business value with container technologies
Red Hat announced that leading global companies are creating, extending and deploying integration services across hybrid and multicloud environments using agile integration architectures based on Red Hat technologies.
IT employers having to up salaries and bonuses to attract talent
As the modern economy relies increasingly on data, it’s certainly a good time to be working in IT.
Red Hat expands integration product capabilities
Adds end-to-end API lifecycle support and new capabilities for agile integration across hybrid architectures.
Electric car infrastructure needs to be a high priority
“Australians should be able to drive all over this massive nation with complete confidence in a zero-emission vehicle.”
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
BMC adds IBM Cloud, Watson to Helix solution
BMC Helix with IBM Watson delivers cognitive insights across structured and unstructured federated knowledgebases.
Hyundai works with IBM to create a new blockchain-based platform
The network for commercial financing will supposedly provide participants with a single view of all the transactions happening in the network.
Why businesses should invest in energy automation
In industrial applications digital transformation allows businesses to do more with less.
Gartner: Smartphone biometrics coming to the workplace
Gartner predicts increased adoption of mobile-centric biometric authentication and SaaS-delivered IAM.
IDC: A/NZ second highest APAC IoT spenders per capita
New IDC forecast expects the Internet of Things spending in Asia/Pacific excluding Japan to reach US$381.8 Billion by 2022.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.
How to make sure your disaster recovery assessment is effective
"Business continuity is one of the most important aspects of modern business, and it will become more so as digital infrastructures become increasingly complex."
Exclusive: The impact of digitalisation and automation on the retail industry
"Digitalisation has certainly made shopping much more efficient and enjoyable for consumers, but the flipside of this is that there’s an increasing demand for businesses to differentiate themselves."
Why visibility is a top concern in digital transformation initiatives
"Digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes."
IXUP adds ‘fuzzy matching’ capability to platform
Its secure data analytics platform adds this plus other new capabilities for greater business insights and data visualisation.
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?
Citrix: How adoption of cloud apps is changing IT landscapes
The pursuit of agility, productivity and workforce mobility has added more systems, applications and services to the IT network of companies.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
How innovation links to talent attraction and staff retention
Half of A/NZ’s bosses have their heads in the sand when it comes to understanding the business and innovation benefits of diversity and inclusion.
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.
Keep employees smiling with a more flexible working environment
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Juniper Networks expedites 5G transformation for service providers
“Service providers seek agility, cost savings and new services from 5G networks, but capitalising on these benefits requires a complete transformation of infrastructures, operations and services."
Reckon Group announces a steady profit in 2018
Reckon continued its investment in growth throughout the year with a development spend of $14.3 million.
SpectroTech brings Aruba training to local IT professionals
Aruba and SpectroTech have partnered to bring education and training modules to Australian and New Zealand partners and customers.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.
Threat prioritisation feature announced for Tenable platforms
Predictive Prioritisation enables organisations to focus on the three percent of vulnerabilities that have been or will likely be exploited in the next 28 days.
How organisations can navigate the IoT era
“It’s clear that a successful IoT strategy requires new technology along with new business processes and collaboration.”
Verizon adds Alibaba Cloud to its Secure Cloud Interconnect ecosystem
Verizon has expanded Secure Cloud Interconnect to allow its customers to privately connect to Alibaba Cloud.
Australia’s first data centre with carbon neutral corporate operations
Data centre providers are well positioned to leverage renewable energy technology, which allows the industry to meet and exceed Australia’s greenhouse gas emission reduction target.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
OneSpan uses AI to tackle financial account fraud
Its new solution uses machine learning to protect online and mobile channels, as well as meet compliance requirements for transactional risk analysis
How Tableau aims to make data analytics more accessible
Tableau Software announced the general availability of Ask Data, which leverages the power of natural language processing.
Frost & Sullivan: Big data is key to preventing cyber breaches
“This technology can proactively predict breaches before they happen, as well as uncover patterns from past incidents to support policy decisions."
Whitepaper: Microsoft’s framework for inclusive and responsible cloud policies
Microsoft wants to empower organisations to use technology within a clear ethical and responsible framework.
Creating an attractive digital workplace for young talent
As the next-generation of workers come through, how can organisations ensure their IT environment is set to attract high performing employees?
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Pegasystems' acquisition boosts analytics capabilities
The acquisition of Infruid Labs brings analytics and data visualisation with a simple user interface to Pega’s solutions.
Gartner: Technology, culture change must go hand in hand
Gartner predicts that by 2021, CIOs will be as responsible for culture change as chief HR officers.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Six barriers to efficient print and scan environments
Despite the promises of ‘paper-free’, printing remains an important aspect of many organisations, and one of the likeliest areas to lose control.
What industry 4.0 means for manufacturing businesses
The industrial control and factory automation market is expected to grow from US$160 billion in 2018 to US$269 billion by 2024.
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.
Global security concerns have major impact on Australian firms
Consumers in Australia, Malaysia, New Zealand and the Philippines are not comfortable using digital identities to interact with commercial or financial service providers.
The ultimate playbook for DNS infrastructure
Advanced DNS solutions can bring legacy systems into the modern age and protect against these potentially crippling DNS attacks.
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
IBM opens up Watson to run on anything, anywhere
Big Blue has made Watson portable across any cloud with the goal to empower businesses to prevent vendor lock-in and start deploying AI wherever their data resides.
Dell EMC’s new and improved data management capabilities
The company has made updates to its All-Flash storage system and released the ClarityNow software for data management.
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.
Mobile security: A case of risk versus reward?
Neither restricting productivity nor accepting tremendous mobile security risk is a viable option.
IDC: Growth in ICT spend driven by cloud infrastructure
Service providers account for a growing share of ICT spending, led by a surge of cloud infrastructure spending, according to IDC.
Fleet Space announces three million sensors on its satellite IoT network
Fleet Space Technologies is preparing to launch an additional ten satellites to meet customer demand.
Infographic: Top security concerns driving Australian businesses
The Unisys Security Index study polled over 1,000 adults between August 19 to September 3, 2018.
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.
Brisbane’s DC market continues to expand
“Continued growth and expansion was necessary to meet the growing demand for data centre services."
Avoid a game of guess who - get authentication right first time
Analyse the who, what, and where of any person, data, and environment?
Lenovo launches new IT infrastructure-as-a-service offering
Customers can now use and pay for data centre hardware and services - on-premise or at a customer-preferred location - without having to purchase the equipment.
Gartner’s four musts for digital customer service
Digital technologies and growing customer expectations mean service leaders must get the digital experience right, according to Gartner.
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.
How IT & physical security teams work in tandem to lock down your business
By focusing on the collaboration between IT and physical security departments, physical security teams can retain control over their budgets and investment decisions,
The future is bright for hyperconvergence and data centres
In 2018 alone, companies that leveraged hyperconverged infrastructure in their data centres expected to increase their number of workloads and VMs by more than 100%.
Australia needs to embrace legislation that encourages an on-demand economy
“Just as the Fair Work Act has been so important in providing a foundation of standards for the traditional workplace, an equivalent is now needed to build on this for modern ways of working."
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
How the energy industry can benefit from advanced analytics
TIBCO Software announced it has entered into an agreement with IHS Markit to deliver advanced analytics for the energy industry.
New digital world causing concern for IT auditor recruitment
Nearly 2/3s of organisations say the tech skills gap is already impacting IT audits. A new study identifies the top five skills auditors seek.
Channel your inner Sherlock Holmes when choosing business continuity providers
How many specialist engineers will be available to help you during the short window you require to get your systems up and running again?
How Australia's energy market can be a case study for data rights
"There is clearly a need to rethink how electricity consumption information is exchanged."
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
ABBYY brings AI to Quanton’s RPA solutions
Quanton partners with ABBYY to provide Kiwi organisations content intelligence in process automation.
Four ways the technology landscape will change in 2019
Until now, organisations have only spoken about innovative technologies somewhat theoretically. This has left people without a solid understanding of how they will ultimately manifest in our work and personal lives.
Why Australian organisations must adapt to survive in the digital age
"Australian organisations need to ensure that their key IT architectures are adaptable."
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Whitepaper: Remote working is great – but is it a security time-bomb?
Simply extending current PC security controls to a mobile fleet is ineffective.
Get meta on your security strategy
There are five separate layers of meta security, such as general functionality, how you control your security tools and fallbacks if conventional tools fail.