Tech news for NZ's largest enterprises
Vendor of the week:
Workday customers start deployments to AWS infrastructure
Business software vendor Workday has turned it's previously announced AWS partnership into a reality.
How to leverage cloud for data-driven business ops
The next gen of cloud-based data platform services are flexible and cost-effective so even small organisations can unlock data insights.
Cisco expands security capabilities of SD-WAN portfolio
Until now, SD-WAN solutions have forced IT to choose between application experience or security.
Gartner - Global RPA spending hitting its stride
The biggest adopters of RPA today include banks, insurance companies, utilities and telecommunications companies.
Why mobile web could be a secret weapon for strategy
On mobile, a poor user experience is exacerbated and design flaws are magnified.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Zebra finds 10x increase in intelligent APAC enterprises
Second annual survey reveals increased IoT investment, real-time data sharing and front-line empowerment.
Workday – who are they and what do they do?
We quickly summarise everything you need to know about the up and coming business software leader.
HPE launches new Datacenter Care capabilities
The company asserts the new capabilities will be delivered by HPE PointNext and will help businesses simplify complex IT environments.
Digital transformation an almost $2 trillion industry by 2022
"The unprecedented speed at which technologies are coming to market supporting DX strategies can only be described as frantic."
Forrester’s 14 quick tech predictions for 2019
Forrester weighs in on 2019 predictions, looking at how organisations will shift into a more precise application of transformative technologies.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Gartner’s top 10 IoT tech trends
“CIOs who master innovative IoT trends have the opportunity to lead digital innovation in their business.”
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
The silent security risk of unstructured data
"IDC estimates that 90% of today’s enterprise data is unstructured."
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
$10m in the pot: What's next for PredictHQ?
In just four short years, PredictHQ has gone global and raised $10 million in a Series A funding round.
Working with normalised SQL Tables – a guide
The goal of this workshop post is to explain a method for working with normalised SQL data in PowerApps.
Whitepaper: The evolution of physical access control
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
Using SOLIDWORKS CAD to take an idea from prototype to product
Sound pioneer Nura had an ambitious concept to deliver when it raised almost two million dollars via crowdsourcing and then over five million dollars through a seed round.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Whitepaper: The best way to get insights relevant to your business
A Design Sprint offers a framework for making progress and decisions when you have a new customer proposition.
Why an ecosystem platform is critical to business growth
"The right ecosystem platform can help businesses become more agile."
Paessler protects world’s most precious computing artefacts
Without air conditioning, The National Museum of Computing must keep a close eye on environmental factors like temperature, humidity, and UV light levels.
Interview: Building secure apps from the ground up
Security should be a key consideration from the initial design phase before any build even begins.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Huge vulnerabilities in software supply chain being exploited
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
Intel who? AWS opts with AMD chips for cost-savings
AMD shares surged about four percent after the announcement that Amazon Web Services (AWS) would be employing its services.
Hands-on review: TablePlus database management app for Mac
TablePlus is a new desktop application developed with the goal to make database management easier, faster, and more efficient.
Using analysis to save on IT maintenance costs
Ill-fitting maintenance plans, whether over- or under-prescribed does cost you money - but, with a little analysis you can save a lot.
How Kiwi businesses can embrace a mobile workforce
As an early adopter of Amazon Web Services, Suncorp uses the public cloud to manage many applications and services central to its business.
Whitepaper: Layering security protection for ransomware defense
As cybersecurity threats continue to evolve in complexity, so too does the pressure to have a thorough, well-thought-out, and automated system.
VMware’s bid to accelerate enterprise adoption of Kubernetes
“Kubernetes is emerging as an open framework for multi-cloud infrastructure that enables business transformation."
Create custom, enterprise-grade mobile apps to accelerate workflows
Mobile Mentor assists organisations with the process from start to finish and keeps the backend up-to-date after the app is completed.
Whitepaper: How to build cloud policies your organisation can stand by
Done right, digital transformation can transform the way governments engage with citizens, make businesses more productive and help non-profits be more effective.
Kiwis concerned about being scammed – survey
This unease is warranted given the growing sophistication of scammers and their activities, and numbers of attempted fraud.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Making PowerApps work for you, whatever your expertise level
If you are looking to learn some basic coding for applications there are a few things you might want to think about.
Nutanix extends Beam to enterprise private cloud
"Hybrid cloud is no longer considered a brief stopping point in the journey to an all public cloud future."
NZ being targeted for cyber attacks – study
The survey polled more than 230 IT decision makers in businesses with 20 or more employees across New Zealand.
Case study: Startup revamps systems with HID mobile access
“We want our clients to have the best experience here. This is the reason why we chose to work with HID Global solutions."
Whitepaper: How much is your company’s data really worth?
The most valuable companies in the world are so valued because of the data those companies control.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
Opinion: Strategies for avoiding digital transformation failures
Dell Boomi APJ's MD says digital transformation journeys are rife with potential disasters.
Interview: Mobile Mentor’s long term future with Microsoft
Mobile Mentor is Co-Sell Ready: We quizzed founder Denis O’Shea on what the news means for Mobile Mentor, its partnership with Microsoft, and the company’s growth plans for the future.
How Azure can encourage digital innovation
Gap is working with Microsoft to migrate hundreds of applications to Azure, focusing on a seamless customer experience.
Tatau scoops four international awards in a few short weeks
‘Tatau’ is the word on many international tech investors’ lips – and all because of a unique approach to blockchain and AI.
Increase visibility and productivity with fleet tracking software
Know what’s going on in the field so you can dispatch more efficiently, improve customer service and reduce time spent calling drivers for updates.
Why Huawei's SD-WAN solution is causing a fuss
Huawei provides customers with a broad array of WAN edge functions.
Impact of legacy technologies on threat alert response and cloud adoption among Aus enterprises
Most Australian enterprises today are hamstrung by the same technologies that once helped advance the nation’s IT economy.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Change is coming for popular Windows products
Microsoft wants to ensure that your business is well-supported during the upgrades, which is why it is offering a range of options to help you transition.
How CTOs can get the most out of their performance metrics
"Industry research suggests that deploying and managing networking infrastructure consumes a whopping 36% of IT budgets."
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
When good tech goes bad - the challenge of complexity
Beautiful system tapestries have created confusing labyrinths that people have to navigate just to get their job done, wasting time and energy.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Gartner names Silver Peak Leader in WAN Edge infrastructure
Gartner’s WAN Edge Infrastructure Magic Quadrant names Silver Peak among the leaders in a growing market.
Samsung joins a global league of AI experts
“As a member of the PAI, Samsung will strive to facilitate the ongoing progress of artificial intelligence.”
The importance of workflow automation in a modern business
"Intuitive, integrated, and collaborative processes are hugely important to the success of an organisation."
Connected humans and the quest for health, wealth and happiness
"By 2020 it’s estimated there will be more than 20 billion connected devices in use."
Informatica releases its next-generation iPaaS in APAC
Enterprises in APAC can now leverage Informatica’s iPaaS, which delivers a secure microservices-based solution.
Intel drafts model legislation to spur data privacy discussion
In a white paper published last month, Intel’s Global Privacy team laid out six policy principles for safety and privacy in the age of AI.
Top 10 challenges facing MSPs – and how to overcome them
In a perfect world all businesses would happily invest enough to protect their data, but it’s not, which is why Probax released a guide.
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
Interview: Aruba’s NZ country manager talks channel strategy
“What we're taking to market is that message around simplification and having everything in one place.”
The six success factors for successful smart card migration
Smart cards are easy to carry around, can be programmed and reprogrammed remotely, and offer a secure way for students and teachers alike to access campus facilities.
Five digital trends that will dominate the enterprise landscape in 2019
Evolving technology and data trends are paving the way to significant IT and network architecture changes in 2019.
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
Start your company’s mobile innovation journey here
Mobile Mentor is transforming the way people work by putting app building at their fingertips
Why the mobility industry is moving towards 5G
Reliable and timely radio performance is a crucial requirement for all those with a stake in transport safety.
What does a risk-free cloud migration look like?
When it comes time to move your business into the cloud, you have be sure you are doing it right - but how will you know what that means?
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
How to effectively implement a software-defined secure network
The unified SDSN platform combines policy, detection, and enforcement with a comprehensive product portfolio.
The security tool conundrum: Can you have too much of a good thing?
Organisations across Asia Pacific are using many different security tools to protect their businesses, but often they have no centralised platform to manage those tools.
Interview: Mobile Mentor CEO shares mobility strategies
“We recognise that mobile speed is ultrafast! We’re not really focused on the competition, but we look to do two things really well."
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Dell Boomi expands its enterprise iPaaS portfolio
"Dell Boomi's ability to connect data, processes and people has an extremely positive impact on the experience Sky provides."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Is a low-code app building approach what your organisation needs?
Microsoft PowerApps is a service that lets you build business apps that run in a browser or on a phone or tablet, and no coding experience is required.
The three-pronged security approach to multi-cloud environments
Popular methods don't necessarily catch all traffic - a particular concern for policy management.
GDPR compliance: A step-by-step guide
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
5G expected to hit A/NZ by 2020, according to MIT
According to a report by MIT Technology Review Insights, APAC is well on the way to being a digital landscape with 5G just around the corner.
Cisco and AWS collaborate for hybrid cloud platform
News has emerged of more data centre giants forging public cloud partnerships.
Infographic: Why an outdated unified comms solution hurts your business
Seventy-one percent of IT professionals say their organisations use multiple communication or collaboration solutions unnecessarily.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Whitepaper: Threat detection and risk measurement with machine learning
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Kordia launches Women in Tech scholarship at the University of Waikato
The scholarship is established to acknowledge and support up-and-coming female talent and future technology leaders.