Technology news for Australia's largest enterprises
Scale Computing expands edge solution to Australia
“Building our presence in Australia is a true testament to the global need for intelligent edge computing."
A10’s app delivery solution now on Azure Marketplace
With the Harmony Controller, organisations can automate deployment and operations of application services.
The pillars of ethical automation
"As the builders and users of autonomous systems, it’s important that we consider what ethical automation should look like."
Virtustream launches cloud automation and security capabilities
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud.
TCS collaborates with Red Hat to build digital transformation solutions
“By leveraging TCS' technology skills to build more secure, intelligent and responsive solutions, we aim to deliver superior end-user experiences."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.
HPE promotes 'circular economy' for end-of-use tech
HPE is planning to show businesses worldwide that throwing old tech and assets into landfill is not the best option when it comes to end-of-use disposal.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
CSPs ‘not capable enough’ to meet 5G demands of end-users
A new study from Gartner produced some startling findings, including the lack of readiness of communications service providers (CSPs).
Oracle announces a new set of cloud-native managed services
"Developers should have the flexibility to build and deploy their applications anywhere they choose without the threat of cloud vendor lock-in.”
How AT&T aims to help businesses recover faster from a disaster
"Companies need to be able to recover and continue operations ASAP, without pulling resources from other places to get back up and running."
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
How your enterprise backup solution could fail
Even the best-trained employees are prone to error, and unfortunately, sometimes those errors affect enterprise backups.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
O-RAN Alliance and Linux to create an open source software community
“Our joint efforts will help accelerate the creation, integration, and deployment of open source in RAN.”
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
Three imperatives for the modern workplace in 2019
Global IT services company Avanade has released what it sees as the three most important technology focus areas for workplaces in the coming year.
HubSpot announces fund for 'customer first' startups
HubSpot is pouring US$30 million (NZ$40 million) into a new fund to support startups that demonstrate ‘customer first’ approach of not only growing bigger, but growing better.
NVIDIA sets records with their enterprise AI
The new MLPerf benchmark suite measures a wide range of deep learning workloads, aiming to serve as the industry’s first objective AI benchmark suite.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
PAM solutions critical to stopping criminals' appetite for credentials
Threat actors will also use different methods of attack and toolkits to look for vulnerabilities in any internet infrastructure. They are looking to steal any credentials that could allow for privilege escalation.
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
A director's guide to disaster recovery
So you want to make a disaster recovery plan and minimise the risk to your business when the lights go out.
Soul Machines' virtual humans go mainstream
An Auckland AI firm renowned for its work creating ‘digital humans’ is now unleashing its creativity to the wider market.
A guide to compliance in this new world of legislation
Every day another country joins the fight agains breaches with legislation. Get compliant and stay compliant with this detailed whitepaper.
Using blockchain to drive transparency across the supply chain
"With blockchain, it’s likely we’ll see an increase in trust between organisations that work together through the supply chain."
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
Infographic: Top security concerns driving Australians
The Unisys Security Index study polled over 1,000 adults between August 19 to September 3, 2018.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Using layered security to stay safe over the holidays
SonicWall’s Capture Labs threat researchers recorded 28 times more ransomware attacks on Black Friday compared to last year.
Xinja can now officially call itself a bank
The ‘neo’bank that is focused on being a digital disruptor to traditional financial institutions has received a restricted banking license from APRA.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Whitepaper: Three changes that will make security teams more effective
Organisations are spending more and more money on cybersecurity preventive measures, yet the breaches seem to keep increasing.
Don’t wait till disaster strikes – best practices when implementing DR
As more companies migrate their data to the cloud, disaster recovery becomes critical to ensure their operations are not disrupted by unforeseen events.
Whitepaper: How to protect your business from insider threats
Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world.
Avnet to boost AI/IoT solutions with acquisition
The acquisition of Softweb Solutions adds software and artificial intelligence to Avnet’s ecosystem and bolsters its IoT capabilities.
Marriott sets up call centres to answer questions on data breach
Marriott has released an update on the breach of the Starwood guest reservation data breach which affected 500 million guests.
How businesses will pivot AI strategies to align with human-centric goals
AI will not only allow businesses to reduce costs but will also provide ROI to the staff working with the technology.
Why businesses are struggling to reach digital maturity
Approximately 65% of respondents identified that they have yet to reach 'expert' status in their digital transformation maturity.
Hands-on review: Quick and easy authentication with YubiKeys
The #1 security key, featuring multi-protocol security.
Whitepaper: How physical access control got where it is today
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
The disaster recovery-as-a-service market is on the rise
As time progresses and advanced technologies are implemented, the demand for disaster recovery-as-a-service is also expected to increase.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
New product from HID Global sets new speed records
HID Global has unveiled a new ID card retransfer printer that truly sets the bar for speed by halving the current industry standard.
Insights: How 'digital trust' can create competitive advantages
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
IoT and real-time visibility: The future of intelligent enterprise
"Given the enormous potential of IoT, any companies that don’t act will risk falling behind."
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
Take productivity to the next level with Surface
Microsoft’s latest-generation Surface devices unlock more power, performance and value for business customers.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
The tech that helped the first woman to sail around Australia
Lisa Blair used devices from supplied by Pivotel to aid her in becoming the first woman to circumnavigate Australia non-stop.
Hands-on review: The Logitech R500 laser presentation remote
With a clever ergonomic design, you’ll never have to glance at the device, unless you deliberately look to use the built-in laser pointer to emphasise your presentation.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
The Implications of a data disaster and why effective DR is critical
93 percent of companies without disaster recovery who suffer a major data disaster are out of business within one year.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
The key to financial institutions’ path to digital dominance
By 2020, about 1.7 megabytes a second of new information will be created for every human being on the planet.
Healthcare without barriers: The leading edge of technology
Healthcare. It’s often on the leading-edge of science & technology – or at least when financing and regulation work in its favour.
Whitepaper: The 2018 Unisys security index
Globally security concerns among individuals continue to hold at the highest level ever recorded.
Whitepaper: How close is your organisation to GDPR compliance?
One of the most significant changes in global privacy law in the last 20 years is the introduction of the EU’s General Data Protection Regulation (GDPR).
HTC signs with 5G partners across the globe
Sprint and Telstra will both carry a 5G mobile smart hub built by HTC.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
MulteFire announces industrial IoT network specification
The specification aims to deliver robust wireless network capabilities for Industrial IoT and enterprises.
Mercury Energy sells smart meter business for $270m
“Metrix’s large installed meter base, deep customer relationships and innovation platform, make this a natural acquisition."
CASE STUDY: Prototyping the most ambitious innovation in audio design yet
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Cohesity signs new reseller and cloud service provider in Australia
NEXION Networks has been appointed as an authorised reseller of Cohesity’s range of solutions for secondary data.
Bin 'em: Those bomb threat emails are complete hoaxes
A worldwide spate of spam emails claiming there is a bomb in the recipient’s building is almost certainly a hoax.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
The challenges of large-scale AI training
To improve the accuracy of AI models, the average size of training datasets has increased by more than 300 times.
Whitepaper: Microsoft’s framework for inclusive and responsible cloud policies
Microsoft wants to empower organisations to use technology within a clear ethical and responsible framework.
Why there will be a battle for the cloud in 2019
Cloud providers such as AWS, Azure, and Google will likely find themselves in a mad scramble to gain additional enterprise customers.
Whitepaper: Using your data and AI to tighten cybersecurity
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."