Sungard AS named DRaaS leader by ForresterIt was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
IDC: APeJ blockchain spending to grow over 80%
Blockchain spending is forecast to grow by 83.9% year over year in 2019, and 77.5% by 2022.
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
Why an IT resilient strategy needs to be in the modern CIO’s toolkit
"Having an IT resilience strategy in place allows an organisation to smoothly adjust to change."
Tollring partners with Novum Networks for call analytics
Novum Networks has added the full complement of Tollring’siCall Suite cloud analytics to its product portfolio.
Intel announces “most powerful mobile processors ever”
Improvements in performance, responsiveness and Wi-Fi connectivity will be rolling out for gamers and creators alike.
Software AG launches new cloud-based IT portfolio management tool
“Alfabet FastLane’s out-of-the-box approach absolutely addresses the needs of smaller IT teams."
Slack's 2019 feature roadmap unveiled
Including shared channels across organisations, workflow automation, greater email and calendar integration, and streamlined search.
Data#3 wins learning and development award two years running
Chief Learning Officer magazine’s LearningElite programme honours the best organisations for learning and development.
Avaya partners with Standard Chartered to deliver CX transformation
"Avaya is proud to be supporting this venerable financial institution as it continues to evolve and transform to meet the needs of its clients.”
Hootsuite leads the social engagement charge - Forrester report
“Hootsuite leads the pack with its seller focus and scale,” writes Forrester principal analyst Mary Shea.
The fight for power in the Fourth Industrial Revolution
"Like the industrial revolutions before it, the Fourth Industrial Revolution highlights the role of new technologies in society."
CrowdStrike: Improving network security with cloud computing solutions
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner
Intel releases 8th gen vPro mobile processors
This generation promises longer battery life, better performance, and comes with a built-in hardware security solution, Intel Hardware Shield.
SingularityNET CEO discusses the future of AI
"In my view, AI will eliminate essentially all need for humans to do practical work."
How IoT can be a game changer for the hospitality sector
IoT and home automation are driving up consumer expectation, and catering to this will be the key to success for the hospitality sector.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why HR departments need enterprise content management
"Using tools ranging from automated document capture to web-based digital forms, a comprehensive ECM solution modernises HR."
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Wisenet releases education campus management solution
Wisenet ITS Application Suite can be customised and configured to meet modern public education provider demands.
Novum Networks & Tollring bring call analytics to APAC
Tollring’s iCall Suite cloud analytics is now part of Novum Networks’ product portfolio, which enables users to record, monitor, and analyse calls on any device.
Your company is collecting more data – but how do you make it work for you?
Terabytes are old news – data is growing at the rate of petabytes, zettabytes, and beyond.Click Here
AI's lack of intuition is where humans excel best
Could you trust machines to make business decisions with the right amount of judgement and contextual understand that humans can? Not yet.
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?Download
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Information is power: The basics of security awareness training
Where do you even start with security awareness training? What should you teach, and to whom?Download
ExaGrid and Zerto announce an integrated solution for backup and recovery
“In an age of continuous digital transformation, businesses require new levels of resilience from their DR and backup solutions."
Whitepaper: Modern information management is a necessity, not a choice
Organisations are facing major challenges that makes information management more challenging than ever before.Download
Lenovo & VMware know the secret of hyperconvergence - do you?
In this whitepaper, IDC analyses the benefits of hyperconverged solutions, and how they align with solutions from firms such as Lenovo and VMware.Download
You're invited: Adobe Symposium 2019, Sydney
The event will bring together 4000 business leaders, marketers, IT and digital experts, as well as creative professionals to Sydney’s International Convention Centre in the heart of the city.
SingleRAN Pro: Combining simplicity and openness for a 5G future
Huawei's SingleRAN Pro solution supposedly offers an open, simplified networking concept to help operators roll out commercial 5G networks.
How Huawei aims to enhance IP networks
'We believe that the intelligent IP networks built with the four-engine series products can continuously empower users with business intelligence."
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
What to expect from the Surface Hub 2S
Microsoft has released details about the next iteration of the Surface Hub featuring mobility, reduced weight and a 85in version in the works.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Informatica launches new AI-driven innovations
Informatica announced new features and AI-driven innovations across five key segments.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Why businesses that prioritise CX generate 11% higher shareholder returns
“Locally, consumers are becoming more open to engaging in services and offerings that are hyper-personalised."
IFS named a Major Player for ERP in IDC MarketScape
The enterprise applications company was given the title for its flexible product, cloud first approach and customer intimacy.
Employees behaving badly? It’s your choice
What your employees do and how they behave when you’re not looking over their collective shoulder is entirely up to you.Download
Unisys encourages financial institutions to adopt open banking
“It establishes the bank as an integral part of the customers’ life – a ‘one-stop-shop’ where they can get personalised products and services they want, when they want them.”
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
How integrating AI into network monitoring drives efficiencies
IT teams all around the world are spending a disproportionate amount diagnosing what are, realistically, straightforward problems.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Innodisk launces AIoT solution for the medical field
One of the challenges of AIoT is keeping tabs on the many devices involved in the system.
Cyber threats: Catch 'em all with unified monitoring
Viruses, Trojans, malfunctions, backdoors, physical hazards… Not so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.Download
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Datarobot celebrates one billion models built on its cloud platform
“Our customers build more than two and a half million models every day, and with each model, our solution gets smarter and more sophisticated."
Fuji Xerox raises the bar with Iridesse production press
The Iridesse is capable of printing eye-catching images with the xerographic colour printing process by using up to, two special dry inks selected from gold, silver and clear.
Developers use Intel AI to solve some of the world’s biggest challenges
Risab Biswas developed a computer vision application to help farmers more easily detect pathological disease in their plants.
Awareness but no action – AU firms exposed to security, compliance threats
Security managers know the many ins-and-outs of security best practices and employees’ everyday behaviour, but few are doing anything to fix security issues.Download
Disaster alert - will your business survive?
No matter the size or industry that your business operates in, business continuity planning is critical to support resilience and uptime in the event of a disaster.Download
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
Yes, data is the new oil - but only analytics can refine the insights
Data has frequently been referred to as the ‘oil’ of the 21st century - much like oil, it’s a raw material that can be transformed into insights and value. Following that analogy, the oil refineries of data today are business intelligence and analytics platforms.
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.Download
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
Hands-on review: The ruggedly tough CAT S61 smartphone
The driveway beckoned me, so I dropped the phone several times. Back in the study, close examination has failed to reveal a single scratch.
AI voice assistants: The unsung helpers of network performance
While it’s currently a far cry to expect IT managers to suddenly transform all of their browser-based management with voice commands, it can be a useful aid for a number of different tasks.
Security ‘not their problem’? Set them straight on cyber resilience for email
“It’s not my problem” – how often have you heard that excuse from teams outside IT security? Ideally it’s becoming less common, but there’s still an ostrich mentality within organisations.Download
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
Earth Day 2019: How tech firms can support our planet's wellbeing
Six industry experts explain how they - and other tech organisations - can positively contribute to the wellbeing of our earth.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
The ever-shifting role of physical access control
Physical security teams can retain control over their budgets and investment decisions, as well as the ability to prioritize the safety and security of the organisation.Download
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.Download
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Nutanix introduces new cloud-native solutions for enterprises
Nutanix announced the general availability of its certified Kubernetes solution.
How printing solutions can help save the planet
Y Soft has identified five key ways organisations can become more economical and reduce their environmental impact.
Talend integrates Pipeline Designer with IPaaS offering
Talend has added a web-based graphical designer to its integration platform-as-a-service, Talend Cloud.
Teradata leads data management, according to Gartner report
As part of the report, Gartner evaluated 19 vendors against data warehouse use cases, including traditional use cases, real-time, logical, and context-independent.
Going from great to greater – from big data to big impact
Australian businesses appear to be lagging the rest of the world in data analytics – the primary way of making sense of the 2.5 quintillion bytes of data we create globally, every day.
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Efficiency is the name of the game - how to profit from workspace digitisation
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.Download
Four ways to help improve the supply chain with IoT
IoT allows supply chain managers to connect their vehicles, equipment and devices to gain near real-time status updates on jobs.
Risky business: Avoid putting all your eggs in one basket
Many businesses that transition to the cloud blindly rely on a single cloud service provider for day-to-day security.
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
10 best practices for building effective dashboards
When you've created an effective dashboard, you will wonder how you ever lived without it. Here are 10 ways to build the perfect dashboard.Read More
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
It's neck-and-neck: The race between security and innovation
Rackspace will help you uncover more about the contradiction within Australian businesses and most importantly, how to solve it.Download
Smarter cities through cross-border and G2G collaborations
"As countries race ahead in their bid to accelerate smart city development through industrialisation, the environment and ultimately humanity is paying the price for this phenomenon."
Huawei announces the launch of Atlas AI
The Huawei Atlas AI computing platform is powered by Huawei's Ascend series AI processors.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
How to embed flexibility and agility in big data architecture
Big data analytics strategies need flexibility and agility to meet changing business demands.Read More
AI & ML to power the future of enterprise networks
Aerohive's Alan Amrod shares the challenges of modern enterprise networks - as well the range of benefits that AI and ML are bringing.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
NetStrategy achieves Extreme Networks Black Diamond status
They are the first partner in APAC to reach this level giving them access to greater support from Extreme.
Whitepaper: Grow and innovate without compromising security
If businesses allow employees and third parties to access data off-site, they’ve opened themselves up to one of the biggest security threats there are.Click Here
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Forrester names Mimecast a Leader in information archiving
The company has also been named a Top Player in the Radicati Information Archiving - Market Quadrant, 2019.
How the 5G Telco market is transforming
"Over the past six months, more people in the general populace have begun using the term 5G in their regular conversations."
Integrating data into decision-making from the ground up
In order to implement a change that can be sustained, organisations need to find a way to embed it into their culture.
Singapore preps financial sector for analytics & automation
Singapore’s financial sector will be on the front line of change as data analytics and automation are likely to impact at least 121 job roles over the next three to five years.