Technology news for Australia's largest enterprises
Tech savvy and business smart: The rising demand for soft skills in IT
"There is a growing desire among employers for a different type of data scientist, one that can talk both technology and business."
Bridge partners with HR3 to drive employee development
Bridge helps organisations better develop employees by providing them with the tools they need to grow in their jobs, master critical skills and learn from managers and mentors.
UNSW partners with Adobe to transform its digital ecosystem
UNSW aims to boost its existing set of marketing, web, and media analytics tools.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
NBN Co rolls out 'optimised' wholesale business bundles for ISPs
“We recognise some businesses are on nbn powered plans that have not been optimised for their needs," says Paul Tyler.
How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform.
Preparing for the future of work – growing big ideas from small spaces
We’ve all seen it: our offices are changing from the traditional four walls - to no walls. A need to reduce real estate costs is a key driver, as is enabling a more diverse and agile workforce.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t.
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
How AI can fundamentally change the business landscape
“This is an extremely interesting if not pivotal time to discuss how AI is being deployed and leveraged, both in business and at home.”
SAP provides partners with free access to their cloud platform
“Now that over 3,700 SAP partners have joined our cloud strategy, the free resources will help them accelerate application development."
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Spending on robotic systems and drones will be on the rise in 2019
Robotic systems will be the larger of the two categories throughout the five-year forecast period with worldwide robotics spending forecast to be $103.4 billion in 2019.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
GDPR compliance: A step-by-step guide
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
APAC CEOs emphasise the need for workers to be agile
CEOs are aware of how AI and automation are affecting workspaces and employees’ growing demand for flexible environments that reflect these changes.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
HPE and Jungla partner to bring AI medical care to patients
HPE is collaborating with researchers in life sciences and clinical medicine to explore AI technology’s potential to transform multiple areas of the industry.
Phishing: It's all too easy on mobile devices
A single errant tap moves an attacker closer to your data.
Is the on-premises data centre really going to ‘die’?
Gartner certainly thinks so, as it expects the sheer majority of enterprises to have binned their on-premises facility by 2025.
Whitepaper: How to build cloud policies your organisation can stand by
Done right, digital transformation can transform the way governments engage with citizens, make businesses more productive and help non-profits be more effective.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Whitepaper: Threat detection and risk measurement with machine learning
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
How businesses can benefit from hybrid cloud
In this short video, Equinix details how businesses can interconnect private and public clouds to create a hybrid infrastructure and get the best of both worlds.
Find out more
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
CASE STUDY: Prototyping the most ambitious innovation in audio design yet
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone.
HPE to supply tech to Formula E racing team
“At HPE, we believe the future belongs to the fast, and we’re focused on accelerating what’s next for enterprises, including in the world of auto racing."
Modernising ERP systems can help organisations comply with GDPR
“Organisations need to look for modern ERP systems that are specifically designed with GDPR in mind."
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Capitalising on exponential IT
"Exponential IT must be a way of life, not just an endpoint."
Singtel integrates cybersecurity capabilities under Trustwave banner
The integration enables Trustwave to harness the synergies of Singtel’s global cybersecurity business, revenue, capabilities across the Americas, Europe and Asia Pacific.
Whitepaper: Mobility you can trust
Mobility gives hackers additional opportunities to gain access to your company’s sensitive data, thus your highly confidential information is at risk.
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
Where to start on security management in the enterprise
Juniper Networks has compiled a series of useful podcasts, videos, and articles on the crucial topic.
Why the future of IT infrastructure is always on and always available
As more organisations embrace digital business, infrastructure and operations leaders will need to evolve their strategies and skills to keep up.
Keeping up with rapid change: Developing PoC initiatives to drive continuous improvement and efficiency
"While Intelligent Automation is merely a tool, it offers much more than a simple transfer of tasks from man to machine."
Data Exchange Networks achieves world-first
After receiving a new Uptime Institute award, DXN is now the first modular data centre developer in the world equipped to blend different standards.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Impact of legacy technologies on threat alert response and cloud adoption among Aus enterprises
Most Australian enterprises today are hamstrung by the same technologies that once helped advance the nation’s IT economy.
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
ForgeRock updates multicloud identity management solution
Organisations today need to maintain an identity platform that enables both friction-free and highly-secure authentication.
Whitepaper: How to protect your business from insider threats
Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
How Philips IT solutions are reinventing healthcare
Philips has a dream of completely interconnected healthcare system that offers the right information at the right time, as health knows no bounds so why should healthcare?
Paessler protects world’s most precious computing artefacts
Without air conditioning, The National Museum of Computing must keep a close eye on environmental factors like temperature, humidity, and UV light levels.
Mitel partners with Aussie distributor to bring UCaaS to A/NZ
“Having Mitel’s solutions in our portfolio will reinforce our position as a market leader."
Why encryption causes DDoS defence headaches
Some forms of encryption technology can make identifying and blocking some threats more difficult.
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
HPE announces financial results for the fourth quarter of 2018
“As we close my first fiscal year as CEO, I am incredibly proud of where we stand in the marketplace."
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
CASE STUDY: From document manager to SaaS provider in a cloud era
Find out how Ricoh implemented a hybrid, multi-cloud deployment to secure its new SaaS applications.
HID Global’s new ID card printer breaks speed records
HID Global has unveiled a new ID card retransfer printer that truly sets the bar for speed by halving the current industry standard.
Entrepreneur reactivates business engagement in AU Super funds
10 million workers leave it up to employers to choose their Super fund for them – and the majority of employers are just as passive and unengaged at putting that fund to work.
Increase visibility and productivity with fleet tracking software
Know what’s going on in the field so you can dispatch more efficiently, improve customer service and reduce time spent calling drivers for updates.
The security tool conundrum: Can you have too much of a good thing?
Organisations across Asia Pacific are using many different security tools to protect their businesses, but often they have no centralised platform to manage those tools.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Samsung, Qualcomm and Verizon demonstrate 5G NR data connection
The test used Samsung’s commercial 5G NR and 4G LTE equipment to deliver the 5G NR data transmission using Verizon’s 28 GHz spectrum.
Whitepaper: The evolution of physical access control
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
Making the most out of IPv6 deployment
IPv6 is the latest version of the Internet Protocol, which identifies devices across the internet so they can be located.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
TIBCO launches machine learning solutions on AWS
"TIBCO Data Science makes it easy for citizen data scientists to develop code-free workflows to support data preparation and machine learning."
Healthcare without barriers: The leading edge of technology
Healthcare. It’s often on the leading-edge of science & technology – or at least when financing and regulation work in its favour.
Deloitte forms alliance with AI analytics company
The strategic partnership aims to combine the companies capabilities to deliver real-time analytics to businesses across Australia.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
OPPO completes 'world first' 5G multiparty video call
“This is just the beginning. Through 5G, we are creating truly immersive and revolutionary smartphones that will unlock a whole new user experience."
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
CASE STUDY: How Ricoh avoided disruption by meeting changing business needs
Ricoh Hong Kong is a document management solutions and IT services provider that needed to evolve its product portfolio to be more dynamic and agile.
Vertiv’s 5 most noteworthy data centre trends for 2019
Vertiv has placed particular emphasis on edge computing being the ‘epicentre’ of innovation in the data centre space.
How Cloudera aims to accelerate the industrialisation of AI
“Making teams more productive is essential to scaling machine learning capabilities in the enterprise."
How enterprise tech will evolve in 2019
"2019 will see many mainstream businesses leapfrogging the initial disruptors."
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Gartner’s ten 2019 trends for infrastructure and operations
As IT infrastructure and operations take an continually growing role in the IT ecosystem, Gartner highlights what to prepare for in the year ahead.
Quora's been breached: Users, change your passwords
Quora’s 100 million users are the latest targets in a major data breach, but at least the company has moved quickly to contain it.
Mega-merger aligns physical & digital security across A/NZ
Optic Security Group is the name of one of A/NZ’s latest mega-mergers in the physical and digital security space, bringing combined revenues in excess of A$100 million to the table.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Is your SD-WAN solution leaving you vulnerable?
Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.
Xero celebrates 1m subscriber milestone
“Our growth is an indication of the strength of the small business economy across Australia and New Zealand,” says Xero’s managing director of Australia and Asia, Trent Innes.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Why data-driven planning is essential
"Research suggests that a significant proportion of Australian executives still rely on old-fashioned gut feeling rather than data."
QNAP introduces new 10GbE and Thunderbolt 3 NAS series
The new series is supposedly an all-in-one NAS solution for file storage, backup, sharing, synchronisation and centralised management.