Technology news for Australia's largest enterprises
These search results are from across the Techday Network of sites
Fujitsu Labs takes network control approach IoT security
Fujitsu Technologies has developed a new kind of network control technology that is able to secure IoT devices installed in the field.
Paessler’s new partnership programme for innovation through collaboration
Paessler says they are trying to foster collaboration with technology partners to provide integrated and combined solutions.
Comprehensive Infrastructure monitoring long overdue in healthcare digitalisation
To ensure the availability of these systems, comprehensive monitoring of both IT and medical devices is required.
What are the pros and cons of on-prem data centres vs cloud?
There is a lot of murkiness around cloud solutions and data centres because the distinctions aren’t always made clear - here it is in black & white.
Paessler to demonstrate network monitoring-as-a-service at upcoming AWS Summits
Paessler will be showcasing PRTG in the cloud at the upcoming AWS Summits in Sydney, Australia, from April 10 to April 12 and Seoul South Korea.
Power and cooling are critical to edge computing - here's why
Regardless of what industry you're in, if your business is storing data, it's very likely you've heard of edge computing.
Connectivity and the city: Monitoring on the world stage
For just this reason, all eyes (and CCTV cameras) are about to be on the city of the Gold Coast in Queensland for the Commonwealth Games.
Why IT teams need to take control of healthcare's physical security tech
An ill patient collapses in a hallway but there’s nobody there to help. Could CCTV have alerted somebody to what happened?
What if IT downtime could impact lives?
Ensuring that each and every one of these devices is running 24/7 is crucial to preventing delays in patient treatment.
Open for opportunity: What's driving security pros to consider another job
Only 15% of employees say they have no plans to switch jobs this year; 14% plan to look for a new role and 70% are open to new opportunities.
A look inside network monitoring for the connected age
Proper preparation prevents poor performance. The five Ps - we’ve all heard them and no doubt committed them to memory, but how many of us use them?
HPE and Paessler announce new partnership to benefit joint customers
"Designing the PRTG Network Monitor with HPE solutions showcases the innovation and collaborative approach HPE provides with channel partners."
Digital transformation has far-reaching implications for CIOs
Is it time to invest in a tool that is not bound to a specific technology vendor?
Cyber criminals too smart for firewalls & virus scanners - here's what you need
Two thirds of internet users have been victims of cybercrime, with more that 1.5 million new victims every day.
The surprising secrets of firewalls - can yours do these tricks?
If your CEO complains that the business news videos are choppy, it could be that you have a bandwidth-management policy for all streaming video.
Digging a little deeper - the role of network monitoring in mining
Recently mining has been going through a technological shake up.
Threat intelligence gateways minimise work of preventing attacks
“Pre-filtering known bad IP addresses and traffic from untrusted sources is a powerful tool in the war against malware."
Seven ways you can achieve complete network transparency
Business leaders want to be able to detect an attack in progress, but correlating datasets is the real challenge.
How to find out the true value of network risk reduction
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?
The nightmare of network downtime: How to find the best monitoring solution for you
Why is it so important for businesses to monitor their systems? It’s simple – if the systems don’t work, bad things happen to the business.
Gartner asks: Do you have a ticking time-bomb in your network?
A growing number of network and security vendors have said that some product lines have an increasing likelihood of total system failure.
Hands on Review: PRTG Network Monitor
PRTG Network Monitor monitors your network in a way that is infinitely customisable and allows you to obtain data on a wide range of issues.
Fight malware by spotting the top eight indicators of threat traffic in your network
There are eight main indicators that can help detect compromised networks. Here's how you can catch threat traffic before it cripples your systems.
LogRhythm’s Network Monitor Freemium an impressive winner when put to the test
Not all security tools have to come with a price tag. The SANS Institute takes at a look at LogRhythm's NetMon Freemium Version 3.2.3.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?