Technology news for New Zealand's largest enterprises
Australian uptake of enterprise IoT is on the rise
IDC has released its 2018-2019 Global IoT Decision-Maker Survey, which reports that 46.5% of Australian enterprises have deployed at least one IoT solution.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
Lime scooters: When disruptive businesses fuel controversy
Lime’s ‘act first, ask for forgiveness later’ rollout across cities around the world, Iswar says it has largely minimised regulatory delays and won Lime a staggering amount of publicity.
Fujitsu takes conservation prize for immersion cooling system
The prize was awarded for the Fujitsu Server PRIMERGY Immersion Cooling System that can reduce power consumption by up to 40%.
Why it’s critical to deploy emerging technologies in ways that will benefit society
“Technologies like 5G, quantum computing, artificial intelligence and biometrics are individually disruptive, but collectively they will completely rewrite global trust models."
Why 37% of enterprises believe in artificial intelligence
The number of enterprises implementing artificial intelligence grew 270% in the past four years and tripled in the past year, according to Gartner.
NetFoundry signs new partner to implement cloud solutions
NetFoundry AppWANs can supposedly facilitate enterprise application deployment and operations, such as SAP on Azure.
Common missteps on the path to enterprise mobility
Many organisations don’t think broadly enough when it comes to mobilising staff and workflows, focusing instead on only the most obvious users and needs.
Expert comment: Google fined US$57mil for GDPR breaches
The committee examining the breaches found two types of breaches of the GDPR.
McAfee customer choice for Cloud Access Security
“This is the second time that McAfee has been named... and we believe this demonstrates our ability to stay ahead of the pack.”
What it takes to be a successful leader during the ‘fourth industrial revolution’
"Leaders are more realistic about what it will take to succeed, and they appear particularly focused on societal impact and workforce development as two critical components of their future success."
Twitter says sorry about Android bug that lasted four years
Users of Twitter's Android platform may want to review their privacy settings.
Cost keeping Kiwi companies from making the most of IoT
"To move past the barriers inhibiting production scale IoT, organisations have to solve the broader security and upgrade issues."
Cybercrime could cost companies US$5.2tril over next five years – survey
New research from Accenture found that only 30% of organisations are very confident in internet security.
Human assets the key to a successful digital transformation
Y Soft's Martin de Martini says it's vital that organisations continue to train and motivate their employees.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
Slashing commute time could save NZ from 900,000 tonnes of C02
In New Zealand, workers could save between 7.7 and 8.8 million hours of commuting time every year.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Three ways 5G will impact power management in 2019
Power failures or any network interruptions are not an option. Rolling out 5G is complex and presents a unique challenge for telco providers.
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat
Whitepaper: The risks of mobility and how security teams can counter them
Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
Vodafone and PNSol champion new ‘invisble network’ broadband project
"As an industry, we've increased the speed of broadband to one gigabit and beyond, which is a remarkable achievement, but we now have to look beyond speed."
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."
Nasuni receives AWS competency status for primary storage
The recognition certifies that Nasuni Cloud File Services meet AWS's strict technical proficiency requirements for primary storage.
IDC: Hyperconverged solutions a winning formula for cloud data centres
Hyperconverged solutions can deliver new levels of agility, flexibility, scale and public cloud economics.
Infographic: How cybercriminals are targeting Kiwis
The New Zealand 2018 Unisys Security Index stands at 138, down 16 points from 154 in 2017.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
What AI should look like in the consumer-directed economy
Avaya's Peter Chidiac says among all the opinions on what constitutes customer experience, it's clear that they will not wait for businesses any more.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
Whitepaper: Taking an integrated approach to combatting ransomware
Rather than having multiple different solutions, businesses need to ensure their endpoint management, malware and backup solutions are providing full coverage.
Whitepaper: How Microsoft aims to redefine mobility
Mobility gives hackers additional opportunities to gain access to your company’s sensitive data, thus your highly confidential information is at risk.
APAC FinTech network launches to encourage cross-border innovation
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
How to deploy machine learning to support digital transformation
TeamAmp supposedly provides predictive measures of success which can be reviewed at any moment in time, thereby avoiding potential budget pitfalls.
IDC: NZ IT services market will near $4B in 2023
As cloud adoption grows with every company seeking the competitive advantage it can provide, the opportunities in IT services are expanding in kind.
How mass data fragmentation impacts business growth and compliance readiness
"About 44% of Australian businesses use six or more solutions to try to manage fragmented data sources and repositories."
Office workers frustrated by poor information management systems
82% of workers believe poor information management is damaging their productivity in the workplace.
How to successfully phase out legacy physical security systems
Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them.
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
Experts comment on record 772mil-user data breach
Dubbed “Collection #1”, the data set contains emails and passwords with over a billion unique combinations of email addresses and passwords.
LogicMonitor launches container monitoring solutions
Kubernetes monitoring and LM Service Insight provide performance analytics and data retention for microservices and containerised applications.
Lenovo offering the best of both worlds for modern data centres
Lenovo's HCI solution provides the benefits of traditional converged systems with the addition of a software-defined scale-out architecture.
Whitepaper: Microsoft’s framework for inclusive and responsible cloud policies
Microsoft wants to empower organisations to use technology within a clear ethical and responsible framework.
Stay online: Protect yourself against DNS attacks
DNS attacks are some of the fastest-growing attack vectors – but what are those attackers after and what damage can they inflict?
Mission-critical migration just like an 'Extreme Makeover'
Virtustream's Anthony Wales discusses how cloud migration can be compared to home renovation 'reality' TV shows.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
Digital trust: The bedrock of all business transformations
Every time an organisation interacts with a partner, customer, or supplier, it is building (and hopefully not breaking) digital trust.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
Huawei continues 5G trials despite ongoing concern
Huawei completed the 5G NR test at 2.6GHz spectrum in the 5G trial organised by the IMT-2020 (5G) Promotion Group.
Whitepaper: Using your data and AI to tighten cybersecurity
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
Insight Venture Partners invests $500 million in Veeam
Veeam will supposedly leverage Insight Venture Partners’ internal business strategy arm, Insight Onsite, and capital to accelerate its expansion through both organic growth and M&A activities.
Avaya expands AI offerings with new partnerships
The additions to the ecosystem will enable Avaya to add prioritisation and natural language processing to its UC solutions.
Optimise your data centre with Lenovo’s all-flash storage solutions
The ThinkSystem DM and DE solutions deliver adaptable and dynamic data storage technologies that drive down the cost and complexity of IT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Why flexible working could make good business sense
“You can always give it a go on a trial basis. If it’s not working, be honest."
The CISO view on DevOps: How to protect privileged access in the cloud
While security strategies should address privileged access and the risk of unsecured secrets and credentials, they should also closely align with DevOps culture and methods.
Whitepaper: Microsoft's tips for implementing a secure hardware solution
Making big IT decisions that affect your department and organisation as a whole brings up many concerns.
Why APIs hold the key to a killer customer experience
"APIs can make it possible for companies to build rich and accurate profiles of their customers by aggregating data about them from multiple computer systems."
Preserve priceless memories with the world’s fastest photo scanner
We all have boxes of photos and documents crying out for a new lease on life. See how you can digitise, correct and preserve them at blazingly fast speeds with the Epson FastFoto Wireless Photo Scanner.
IT security: How to make your case for security spending
Business will always hesitate to spend money on what will be perceived as non-revenue generating activities
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
Kiwis make waves in IoT World Cup
A New Zealand company, KotahiNet, has been named as a finalist in the IoT World Cup for its River Pollution Monitoring solution.
CASE STUDY: Prototyping the most ambitious innovation in audio design yet
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone.
How DEX aims to guide process-enabled automation strategies
"Although automation is gaining a lot of momentum, there are many instances where early adopters have failed to achieve their business transformation and ROI goals."
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
High performance meets flexibility with Lenovo’s newest flash storage offerings
All-flash storage is helping businesses improve the speed and responsiveness of key business operations by accelerating critical workloads.
InfluxData aims to accelerate growth with new sales executives
As time-based data is generated at exponential rates from increased use of DevOps and IoT sensors, companies are requiring more advanced performance tools to analyze their complex environments.
Chorus fibre roll out picks up pace
Chorus has announced that 50% of fibre installations are now being completed within a day.
Understanding consumers' security concerns critical to gaining trust
Data security issues such as identity theft, bank fraud, viruses and hacking are more of a concern than natural disasters or terrorism.
HP invests in services with new A/NZ execs
With IT services spend growing in Australia and New Zealand, HPE is appointing execs for software and technology services in the South Pacific.
Admins waste 60% of their time on IT maintenance
Most administrators spend more than 60% of their time maintaining IT rather than looking towards new possibilities.
Whitepaper: How much is your company’s data really worth?
The most valuable companies in the world are so valued because of the data those companies control.
Epson FF-680W: The world's fastest WiFi photo scanner
“There was clearly a need for an ultra-fast and easy scanning solution that enabled people to digitise hard copy photos often stored in albums or boxes.”
Nearly half of APAC enterprises are employing hybrid cloud without a formal strategy
"Alarmingly a significant portion of large enterprises lack a formal hybrid-cloud strategy."
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
SUSE partners with Intel and SAP to accelerate IT transformation
SUSE announced support for Intel Optane DC persistent memory with SAP HANA.
Commvault fully integrates backup with Cisco Hyperflex
Its IntelliSnap technology has been validated to work with Cisco HyperFlex hyper-converged systems without the need for third-party tools.
Whitepaper: How physical access control got where it is today
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
NZ’s $3.45bil IT services market fueled by competitive advantage
"With regards to cloud adoption, organisations are prioritising innovation and security over cost and scalability.”
How HCI helps enterprises stay on top of data regulations
Increasing data protection requirements will supposedly drive the demand for Hyper-Converged Infrastructure solutions across the globe.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Top risk facing organisations? Why, it’s an IT talent famine
For some time there has been talk about how the IT industry is crying out for new talent and skills, which a lot of people have glossed over. But now Gartner says it is a harsh reality.
McAfee Gartner Customers’ Choice for Secure Web Gateway
“We take great pride in being recognised by our customers on Gartner Peer Insights, and their willingness to recommend McAfee Web Gateway technology”
The secret to scaling DevOps in the digital era
"Organisations around the world have learnt at a cost that while agile DevOps methodologies can result in improved outcomes within teams and projects, they have a propensity to fail miserably."
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Enterprise mobile security: How to get the balance right
Today, neither restricting productivity nor accepting tremendous mobile security risk is a viable option. Mobile threats are prevalent and dangerous.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.