ExaGrid and Zerto announce an integrated solution for backup and recovery“In an age of continuous digital transformation, businesses require new levels of resilience from their DR and backup solutions."
Huawei announces the launch of Atlas AI
The Huawei Atlas AI computing platform is powered by Huawei's Ascend series AI processors.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
What to expect from the Surface Hub 2S
Microsoft has released details about the next iteration of the Surface Hub featuring mobility, reduced weight and a 85in version in the works.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Informatica launches new AI-driven innovations
Informatica announced new features and AI-driven innovations across five key segments.
Hands-on review: The ruggedly tough CAT S61 smartphone
The driveway beckoned me, so I dropped the phone several times. Back in the study, close examination has failed to reveal a single scratch.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Nutanix introduces new cloud-native solutions for enterprises
Nutanix announced the general availability of its certified Kubernetes solution.
HP back on board with Emirates Team NZ
HP 3D print technology will supposedly help the team innovate at speed.
Talend integrates Pipeline Designer with IPaaS offering
Talend has added a web-based graphical designer to its integration platform-as-a-service, Talend Cloud.
Teradata leads data management, according to Gartner report
As part of the report, Gartner evaluated 19 vendors against data warehouse use cases, including traditional use cases, real-time, logical, and context-independent.
How printing solutions can help save the planet
Y Soft has identified five key ways organisations can become more economical and reduce their environmental impact.
IDC: 2019 security spending to grow 20% in APeJ
“The Asia/Pacific region recognises that its no longer “under-the-radar” as far as breaches, hacks, and legislation is concerned.”
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
Bartercard helping Kiwi startups and small businesses thrive
Here's a breakdown of what Bartercard actually is and how it provides invaluable opportunities for businesses privy of its network.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Why big data should be built into every stage of the IT journey
The risks of avoiding big data in enterprise organisations could end up costing more, or it could result in a failed project.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."Download
What happens when AI falls into the wrong hands
"In order to have the best defence, you need to know how attackers operate."
Amazon tools empower SMBs for sales success
Amazon invests billions of dollars each year on infrastructure, tools and services designed for the SMB market, helping them to reach new customers and sell new products online.
Whitepaper: How to improve your cybersecurity sales pitch
Boards and executives who normally approve funding for IT security projects do not speak tech - they speak the language of ROI, NPV, etc.Download
Know thy customer - what security concerns Kiwis are most worried about
Regardless of what sector your business operates in, customers need to be able to trust the organisations they deal with.Download
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.
Avaya extends AI integration with Google Cloud
Avaya is one of the Google Cloud partners participating in an early access program aimed at augmenting next-generation contact centres.
IFS named a Major Player for ERP in IDC MarketScape
The enterprise applications company was given the title for its flexible product, cloud first approach and customer intimacy.
The ethics of AI: From driverless cars to robo-baristas
"All over the globe technology developers, futurists, experts and creatives are working on new ways AI technologies can change the way we live and work."
AI & ML are here to empower human decision-making, not to take away jobs
Those new jobs will be led by creativity and strategic thinking, both of which are human traits that machines can’t easily handle.
How to embed flexibility and agility in big data architecture
Big data analytics strategies need flexibility and agility to meet changing business demands.Read More
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Fuji Xerox NZ unveils two new feature-packed printer series
This month Fuji Xerox New Zealand announced two new series additions to its portfolio of monochrome printers ideal for the modern office.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Epson FF-680W: The world's fastest WiFi photo scanner
“There was clearly a need for an ultra-fast and easy scanning solution that enabled people to digitise hard copy photos often stored in albums or boxes.”Download
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Migrating to SAP HANA? Take the easy leap with SUSE
By 2025, SAP will discontinue support for Business Suite. Now is the time to move to SAP HANA with ease.Learn More
Citrix takes network solutions into Google Cloud
Citrix is taking its SD-WAN solution and Citrix ADC onto Google Cloud Platform to get applications onto the cloud.
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Taulia and Google Cloud to simplify invoicing with AI
“Using AI we have finally cracked the intractable invoice processing issues that many businesses face."
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Network security in A/NZ - OVH
Ensuring operations can be performed at a continuous fast pace will be vital for businesses in 2019.
AI & ML to power the future of enterprise networks
Aerohive's Alan Amrod shares the challenges of modern enterprise networks - as well the range of benefits that AI and ML are bringing.
Cyber threats: Catch 'em all with unified monitoring
Viruses, Trojans, malfunctions, backdoors, physical hazards… Not so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.Download
The ever-shifting role of physical access control
Physical security teams can retain control over their budgets and investment decisions, as well as the ability to prioritize the safety and security of the organisation.Download
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.Download
Your company is collecting more data – but how do you make it work for you?
Terabytes are old news – data is growing at the rate of petabytes, zettabytes, and beyond.Click Here
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
FaceMe designs 'digital human' for Southern Cross Health Society
Southern Cross Health Society is the latest New Zealand organisation to adopt FaceMe’s lifelike digital humans, but that human is yet to have a name or an identity.
Is NZ’s tech industry starting to mature?
Technology is New Zealand’s fastest growing and third biggest industry.
Data science firm Alteryx ramps up APAC expansion
Alteryx says it is committed to helping companies across the globe increase data literacy and fuel a culture of analytics by providing a platform that simultaneously addresses the needs of the data analyst, data scientist and citizen data scientist.
AI voice assistants: The unsung helpers of network performance
While it’s currently a far cry to expect IT managers to suddenly transform all of their browser-based management with voice commands, it can be a useful aid for a number of different tasks.
Efficiency is the name of the game - how to profit from workspace digitisation
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.Download
How Chorus aims to create a fair supply chain
“Chorus, Visionstream and UCG needed to step up what we are doing in order to identify and mitigate the risk of breaches in employment law."
Managing content with artificial intelligence
“The importance of managing content more responsibly is growing for organisations."
How Kiwibank aims to enable greater digital inclusion
"Online tools can offer a more convenient and cheaper customer experience, but there can be barriers to usage."
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
Fuji Xerox leads the way for a more sustainable future
More than 99.5% of the products Fuji Xerox takes back are reused or recycled. Already, the company diverts 700 tonnes of used product from landfill per year.
Wisenet releases education campus management solution
Wisenet ITS Application Suite can be customised and configured to meet modern public education provider demands.
Forrester names Mimecast a Leader in information archiving
The company has also been named a Top Player in the Radicati Information Archiving - Market Quadrant, 2019.
10 best practices for building effective dashboards
When you've created an effective dashboard, you will wonder how you ever lived without it. Here are 10 ways to build the perfect dashboard.Read More
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.Download
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
How IoT can be a game changer for the hospitality sector
IoT and home automation are driving up consumer expectation, and catering to this will be the key to success for the hospitality sector.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Air New Zealand and Microsoft announce ground-breaking digital collaboration
“Being able to 3D print certain components on the go would be transformative and drive significant efficiencies and sustainability benefits."
Google Cloud releases range of retail solutions
The solutions aim to capture the growing trend of cloud in retail, offering solutions for eCommerce, inventory management, and more.
Fortinet's bid to close the cyber skills gap
A comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Whitepaper: Is your cloud configured for your company’s growth?
There is still one key ingredient needed to truly leverage the benefits of cloud technology – human expertise.Download
Adobe: CX a priority for business but tech adoption lags
Nearly half of global companies categorise their CX maturity as “not very advanced” (46%), with just 9% of APAC companies being “very advanced.”
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Want to keep at least $500 in the bank? Shop and save with Fuji Xerox
Save $500 for every Fuji Xerox 9th Generation Multifunction Printer you purchase or lease.FIND OUT MORE
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
The definitive guide to MSSPs and what they add to security
A wise man once said, “An attacker may defeat someone who is alone, but two can resist him, and a three-stranded cord is not easily broken.”Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Whitepaper: What will losing your data cost you?
Do you know how much your data is worth, more importantly, what it will cost if it is lost?Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
HP takes top spot from Lenovo in PC market
In the worldwide PC market, global shipments were above expectations, reaching 58.5 million during the last quarter.
Four key steps for creating a data-driven culture
Where there is resistance to using data to make decisions, there will be barriers to new technologies that aid analysis.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
NZ managers prefer intuition to big data, Massey study finds
Many senior managers in New Zealand businesses have an inherent distrust of big data, opting instead to rely on their own intuition.
9 Spokes and Microsoft NZ announce co-sell partnership
The agreement will see 9 Spokes listed on the Microsoft AppSource Marketplace, providing a channel to grow its platform base of small business users.
How integrating AI into network monitoring drives efficiencies
IT teams all around the world are spending a disproportionate amount diagnosing what are, realistically, straightforward problems.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.Download
Wi-Fi signal strength vs Wi-Fi speed: How to get the most out of your network
At Ruckus, they believe in the importance of stable client connections in an unstable RF environment.
The team dedicated to global data literacy
The Data Literacy Project has appointed eight data experts who aim to help organisations and individuals improve data literacy across the globe.
How cybercriminals are targeting Kiwi businesses
Kiwis are fundamentally at risk with the top three biggest cyber threats being ID theft, credit card fraud and viruses/hacking.Download
Lenovo & VMware know the secret of hyperconvergence - do you?
In this whitepaper, IDC analyses the benefits of hyperconverged solutions, and how they align with solutions from firms such as Lenovo and VMware.Download
Inland Revenue to shut down services later this week
“There’s never an ideal time to shut down the tax system but we’re confident the changes will make any inconvenience worthwhile.”
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Teradata expands as-a-service offerings for Advantage platform
Data intelligence company Teradata has announced three new cloud and on-premise solutions that are now integrated into its Teradata Vantage platform.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
What you need to know about Fuji Xerox 9th Gen multifunction printers
The entire user experience has been redefined, from its clever interactive touch screen and intelligent automated processes, to its seamless integration with cloud services.FIND OUT MORE
Innovation or security? The contradictions and how to solve them
There’s tension in the workplace – do companies innovate, or do they keep everything under wraps to minimise risks?Download
Why HR departments need enterprise content management
"Using tools ranging from automated document capture to web-based digital forms, a comprehensive ECM solution modernises HR."
Yes, data is the new oil - but only analytics can refine the insights
Data has frequently been referred to as the ‘oil’ of the 21st century - much like oil, it’s a raw material that can be transformed into insights and value. Following that analogy, the oil refineries of data today are business intelligence and analytics platforms.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
New Zealand Super Fund invests $115m into North America data centres
The New Zealand Super Fund is set to invest up to US$115 million in North American data centres, as it seeks to capitalise on demand for digital infrastructure and data.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.Download