Technology news for New Zealand's largest enterprises
NZ ISPs issue open letter to social media giants to discuss censorship
Content sharing platforms have a duty of care to proactively monitor for harmful content, act expeditiously to remove content which is flagged to them as illegal.
Clinicians network to address IT in healthcare
“There have been lots of failed IT projects in health and there’s enough evidence now to demonstrate that clinical leadership is absolutely fundamental to the success of these projects."
Partnership brings AI maths tutor to NZ schools
“AMY can understand why students make a mistake, and then teach them what they need straight away so they don't get stuck."
Polycom & Plantronics rebrand to Poly, a new UC powerhouse
The name change comes after last year’s Plantronics acquisition of Polycom, a deal that was worth US $2 billion.
NVIDIA announces enterprise servers optimised for data science
“The rapid adoption of T4 on the world’s most popular business servers signals the start of a new era in enterprise computing."
SUSE completes move to independence
“Current IT trends make it clear that open source has become more important in the enterprise than ever before."
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
VoiP new-comer upgraded and ready to take on NZ
UFONE is an Auckland-based VoIP provider that has just completed a massive upgrade of its back-end and is ready to take on the market.
Online attackers abusing Kiwis' generosity in wake of Chch tragedy
It doesn’t take some people long to abuse people’s kindness and generosity in a time of mourning.
SAS announces US$1 billion investment in AI
"At SAS, we remain dedicated to our customers and their success, and this investment is another example of that commitment."
IntegrationWorks continues expansion with new Brisbane office
The company’s new office space at the Riverside Centre overlooks the Brisbane River and Storey Bridge.
DXC subsidiary takes SAP energy industry partner award
Winners of the awards were selected from SAP’s A/NZpartner ecosystem and announced at the recent SAP A/NZ Partner Kick-Off Meeting held in Sydney.
NetApp and allegro.ai showcase an integrated solution for deep learning
Unlike traditional software, in deep learning, the data rather than the code is of the utmost importance.
Opinion: Moving applications between cloud and data centre
OpsRamp's Bhanu Singh discusses the process of moving legacy systems and applications to the cloud, as well as pitfalls to avoid.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
Who, what and where: Define the business context of access requests
Compiled by leading security firm RSA, this white paper will take you through those six key elements to a risk-based approach in an informative and easy-to-digest format.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Opinion: 5G’s imminent impact on data centre infrastructure
Digital Realty’s Joseph Badaoui shares his thoughts on how 5G will transform data centre infrastructure now and beyond.
Epson FF-680W: The world's fastest WiFi photo scanner
“There was clearly a need for an ultra-fast and easy scanning solution that enabled people to digitise hard copy photos often stored in albums or boxes.”
IT teams have a new job: Physical access control
Now IT departments are more involved in an organisation’s physical access control decisions and implementation.
Whitepaper: How to improve your cybersecurity sales pitch
Boards and executives who normally approve funding for IT security projects do not speak tech - they speak the language of ROI, NPV, etc.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
AI to double the rate of innovation in NZ by 2021
"Economies and businesses that have yet to embark on their AI journey run a real risk of missing out on the competitive benefits that are enjoyed by leaders.”
Dell EMC named number one… and loving it
A recent Dell EMC blog post celebrates IDC naming it number one in a myriad of storage and systems markets.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.
Don't waste office space - optimise location data
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.
Hyperconverged infrastructure: The unsung hero of cloud and data centre
Hyperconverged solutions can deliver new levels of agility, flexibility, scale and public cloud economics. What can they do for you?
Maximising blockchain’s potential with privilege controls - CyberArk
While blockchain itself is considered to be ‘safe’, vulnerabilities can be targeted on the endpoints.
Nintex named a leader in digital process automation for wide deployments
Forrester analysed the 10 most significant vendors in digital process automation for wide deployments, referring to the category as DPA wide.
Don’t fear the robot: How to overcome automation anxiety
"Automation anxiety stems from a deeper fear of not being able to fulfil your purpose."
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."
8x8 announces Google Cloud contact centre AI integration
“Contact centre AI empowers enterprises to use AI to augment and improve their contact centres."
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.
Updated: NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Interview: Cisco on digital transformation and data centres at the edge
"On-premise we speak English, Amazon speaks French, and Amazon and Microsoft speak something else. But someone has to translate all of that and Cisco is involved with normalising those rule sets.”
Why it’s time to move ID card issuance to the cloud
Many smartcards are still issued from standalone printers tied to a dedicated PC workstation, which creates challenges and unnecessarily bottlenecks the process.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Whitepaper: Microsoft’s tips for designing a socially responsible cloud
Microsoft has put together a resource for anyone wanting to build a trusted, inclusive, and responsible cloud.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.
Count the hours (or the weeks): DNS attacks are a severe downtime threat
Attackers can conduct DNS attacks, including Distributed Denial of Service (DDoS) attacks that can take servers offline for minutes, hours, days, or even weeks.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Exclusive: ASB and Hnry’s shared vision for the future of work
"As a fintech company, being able to work in partnership with an innovative bank like ASB is really helping our platform."
Whitepaper: Microsoft's tips for implementing a secure hardware solution
Making big IT decisions that affect your department and organisation as a whole brings up many concerns.
NATO picks BlackBerry's encrypted voice technology to secure calls
The NCI Agency acquires, deploys and defends communication systems for NATO's political decision-makers and command centres
How AI is changing the medical industry
With NVIDIA Clara, developers can speed up their medical imaging applications and implement AI.
Unisys named Leader for managed workplace services
The company was named a Leader in the Gartner 2019 Magic Quadrant for Managed Workplace Services, positioned highest on the ability to execute axis.
Introducing Spark & Ohmio's first 5G-connected driverless vehicle
Ohmio Automation and Spark are trialling the vehicle in Auckland’s Wynyard Quarter Innovation Precinct. The vehicle is connected to Spark’s pre-commercial 5G network.
Was Citrix unaware of its own data breach until the FBI got involved?
According to a blog post from Citrix’s CSIO Stan Black, the FBI contacted Citrix on March 6 and advised that international cybercriminals had allegedly gained access to Citrix’s internal network.
The questions A/NZ businesses need to ask before diving into SaaS
"Before A/NZ businesses dive deeper into SaaS in search of the great business outcomes it can provide, they would do well to ask certain questions."
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Healthcare breaches on the rise - here’s how Philips protects data
As healthcare becomes increasingly digitalised, medical institutions need to ensure the systems they are using are storing patient data in a reliable and secure way.
It's an ultimatum: Mobile security or securing mobility
Move your organisation towards the mobile-first world, securely.
Privacy Bill may limit breach fines to $10,000
The Privacy Commissioner was seeking maximum breach fines of up to $1 million against body corporates.
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
Why keeping systems online is about more than just dollars and cents
"The ability to recover IT systems quickly has become one of the most important concerns for businesses in New Zealand."
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.
Interview: Why log management is crucial to modern business
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
Mobile Mentor to offer Android, Google enterprise service
“We are very proud and excited about our ability to serve our customers who operate large Android fleets across the USA, Australia and New Zealand."
Why talent attracts talent in the IT industry
Only 22% of respondents believe their entire management team is qualified to set the right tech strategy and make the right technical hires.
Crime-busting software scoops PM's Science Prize
“DNA profile analysis is a really powerful tool for identifying individuals as possible suspects but it’s also important for being able to exclude or exonerate an individual as well.”
Tech firm launches data privacy toolkit to help navigate the minefield
Data privacy isn't just about keeping customer information safe, says Data Insights.
Spot the hazards with meta security strategies
Is your security really secure? Find out the biggest IT security threats, the five layers of meta security with this free resource.
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.
HP extends laptop & workstation recall due to battery fire hazard
HP has extended its worldwide recall of several notebooks and mobile workstations due to the high risk of fire and burn hazards.
Why 70% of organisations believe RPA is enabling more human interaction
Organisations are increasingly concerned with the employee experience as they grapple with the forces of automation and RPA.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
Report: Women being sexually harassed at tech conferences
A new survey has uncovered some startling findings, with not only misrepresentation of women but also sexual harassment.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.
Whitepaper: What will losing your data cost you?
Do you know how much your data is worth, more importantly, what it will cost if it is lost?
How to optimise the performance of SIEMs
Optimising your SIEM is most easily and effectively done by also optimising your log management.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
Workflows should benefit people, not devices
It is important that, in digital transformation journeys, managers remember technology should complement, rather than overtake, employee talent and skillsets.
Kathmandu breached, customer information accessed
Kathmandu is notifying potentially affected customers directly and has advised them to change their passwords for its online loyalty programme.
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.
How cybercriminals are targeting Kiwi businesses
Kiwis are fundamentally at risk with the top three biggest cyber threats being ID theft, credit card fraud and viruses/hacking.
Why data management challenges cost organisations US$2 million a year
Companies that fail to address their data management issues risk significant longer-term damage to their business.
Identity theft is more dangerous than natural disasters, Kiwis believe
“While New Zealanders experienced a relatively calm year in terms of politics and natural disasters, local and global data breaches dominated media headlines and impacted many of us personally."
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.
Nine reasons distributors need an analytics upgrade
“Traditional data management solutions are no longer sufficient for distributors in today’s fast-moving environment.”
The Data Literacy Project expands its library of free courses
Upskilling the workforce in data literacy is fundamental to unlocking business growth.
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.
How businesses can transform their customer experience in a realistic and timely way
“Businesses can’t simply decide to transform one day, then jump straight into making change for change’s sake."
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.
Cloud security: What you need to know before you make the move
Thinking about moving your business to the cloud? Often there’s a misconception that businesses can simply ‘set and forget’ when it comes to security, but that’s not always the case.
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.
Digital experience managers, get excited for Adobe Summit 2019
“Digital transformation may be a buzzword, but companies are trying to adapt and compete in this changing environment.”