Tech news for NZ's largest enterprises
Vendor of the week:
GCSB's CORTEX project scoops iSANZ Award
“I believe this award is particularly significant as it is acknowledgement from our peers in the information security industry and from across the private sector."
Riverbed’s SD-WAN solution boasts enterprise-class routing enhancements
Riverbed’s solution enables businesses to experience fast, agile and secure access to all applications across the hybrid IT landscape.
NZ firms lack cybersecurity confidence, HP survey says
Out of 434 of New Zealand’s small and large businesses, only half (50%) feel confident that they would be able to cope if they experienced a significant cybersecurity breach.
Altaro introduces WAN-optimised replication for VMs
"WAN-optimised replication allows businesses to continue working in the case of damage to on-premise servers."
How Adobe aims to deliver marketing automation to Kiwi enterprises
“Qrious will enable enterprise customers to get the most out of Adobe Experience Cloud and provide valuable on-the-ground expertise."
14 milestones Workday has achieved in 2018
We look into the key achievements of business software vendor Workday this year
Workday customers start deployments to AWS infrastructure
Business software vendor Workday has turned it's previously announced AWS partnership into a reality.
SonicWall secures hybrid clouds by simplifying firewall deployment
Once new products are brought online in remote locations, administrators can manage local and distributed networks.
How to leverage cloud for data-driven business ops
The next gen of cloud-based data platform services are flexible and cost-effective so even small organisations can unlock data insights.
Cisco expands security capabilities of SD-WAN portfolio
Until now, SD-WAN solutions have forced IT to choose between application experience or security.
Gartner - Global RPA spending hitting its stride
The biggest adopters of RPA today include banks, insurance companies, utilities and telecommunications companies.
Why mobile web could be a secret weapon for strategy
On mobile, a poor user experience is exacerbated and design flaws are magnified.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
HPE launches new Datacenter Care capabilities
The company asserts the new capabilities will be delivered by HPE PointNext and will help businesses simplify complex IT environments.
Why the mobility industry is moving towards 5G
Reliable and timely radio performance is a crucial requirement for all those with a stake in transport safety.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Dell Boomi expands its enterprise iPaaS portfolio
"Dell Boomi's ability to connect data, processes and people has an extremely positive impact on the experience Sky provides."
Kiwis concerned about being scammed – survey
This unease is warranted given the growing sophistication of scammers and their activities, and numbers of attempted fraud.
Why Huawei's SD-WAN solution is causing a fuss
Huawei provides customers with a broad array of WAN edge functions.
Using analysis to save on IT maintenance costs
Ill-fitting maintenance plans, whether over- or under-prescribed does cost you money - but, with a little analysis you can save a lot.
Increase visibility and productivity with fleet tracking software
Know what’s going on in the field so you can dispatch more efficiently, improve customer service and reduce time spent calling drivers for updates.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
Whitepaper: Layering security protection for ransomware defense
As cybersecurity threats continue to evolve in complexity, so too does the pressure to have a thorough, well-thought-out, and automated system.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Cyber crisis continues unabated – is ATP the answer?
Statistics on cybercrime certainly makes for grim reading, and that is set to continue unless businesses take measures to stack the odds better in their favour.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
Samsung joins a global league of AI experts
“As a member of the PAI, Samsung will strive to facilitate the ongoing progress of artificial intelligence.”
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Informatica releases its next-generation iPaaS in APAC
Enterprises in APAC can now leverage Informatica’s iPaaS, which delivers a secure microservices-based solution.
Opinion: Strategies for avoiding digital transformation failures
Dell Boomi APJ's MD says digital transformation journeys are rife with potential disasters.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Workday – who are they and what do they do?
We quickly summarise everything you need to know about the up and coming business software leader.
Working with normalised SQL Tables – a guide
The goal of this workshop post is to explain a method for working with normalised SQL data in PowerApps.
Huge vulnerabilities in software supply chain being exploited
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Interview: Mobile Mentor CEO shares mobility strategies
“We recognise that mobile speed is ultrafast! We’re not really focused on the competition, but we look to do two things really well."
What does a risk-free cloud migration look like?
When it comes time to move your business into the cloud, you have be sure you are doing it right - but how will you know what that means?
Connected humans and the quest for health, wealth and happiness
"By 2020 it’s estimated there will be more than 20 billion connected devices in use."
Tatau scoops four international awards in a few short weeks
‘Tatau’ is the word on many international tech investors’ lips – and all because of a unique approach to blockchain and AI.
Whitepaper: Threat detection and risk measurement with machine learning
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
Change is coming for popular Windows products
Microsoft wants to ensure that your business is well-supported during the upgrades, which is why it is offering a range of options to help you transition.
Create custom, enterprise-grade mobile apps to accelerate workflows
Mobile Mentor assists organisations with the process from start to finish and keeps the backend up-to-date after the app is completed.
Five digital trends that will dominate the enterprise landscape in 2019
Evolving technology and data trends are paving the way to significant IT and network architecture changes in 2019.
Interview: Aruba’s NZ country manager talks channel strategy
“What we're taking to market is that message around simplification and having everything in one place.”
Why an ecosystem platform is critical to business growth
"The right ecosystem platform can help businesses become more agile."
The three-pronged security approach to multi-cloud environments
Popular methods don't necessarily catch all traffic - a particular concern for policy management.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
You’re invited: Your communications system is determining your future
Your communications system makes or breaks customer engagement. Find out how to make an impact withT your customers.
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
When good tech goes bad - the challenge of complexity
Beautiful system tapestries have created confusing labyrinths that people have to navigate just to get their job done, wasting time and energy.
Zebra finds 10x increase in intelligent APAC enterprises
Second annual survey reveals increased IoT investment, real-time data sharing and front-line empowerment.
Top 10 challenges facing MSPs – and how to overcome them
In a perfect world all businesses would happily invest enough to protect their data, but it’s not, which is why Probax released a guide.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
Case study: Startup revamps systems with HID mobile access
“We want our clients to have the best experience here. This is the reason why we chose to work with HID Global solutions."
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
VMware’s bid to accelerate enterprise adoption of Kubernetes
“Kubernetes is emerging as an open framework for multi-cloud infrastructure that enables business transformation."
Whitepaper: How much is your company’s data really worth?
The most valuable companies in the world are so valued because of the data those companies control.
Interview: Building secure apps from the ground up
Security should be a key consideration from the initial design phase before any build even begins.
Digital transformation an almost $2 trillion industry by 2022
"The unprecedented speed at which technologies are coming to market supporting DX strategies can only be described as frantic."
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
Infographic: Why an outdated unified comms solution hurts your business
Seventy-one percent of IT professionals say their organisations use multiple communication or collaboration solutions unnecessarily.
The six success factors for successful smart card migration
Smart cards are easy to carry around, can be programmed and reprogrammed remotely, and offer a secure way for students and teachers alike to access campus facilities.
Using SOLIDWORKS CAD to take an idea from prototype to product
Sound pioneer Nura had an ambitious concept to deliver when it raised almost two million dollars via crowdsourcing and then over five million dollars through a seed round.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Intel drafts model legislation to spur data privacy discussion
In a white paper published last month, Intel’s Global Privacy team laid out six policy principles for safety and privacy in the age of AI.
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
Whitepaper: The evolution of physical access control
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
The security tool conundrum: Can you have too much of a good thing?
Organisations across Asia Pacific are using many different security tools to protect their businesses, but often they have no centralised platform to manage those tools.
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Is a low-code app building approach what your organisation needs?
Microsoft PowerApps is a service that lets you build business apps that run in a browser or on a phone or tablet, and no coding experience is required.
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.
How Azure can encourage digital innovation
Gap is working with Microsoft to migrate hundreds of applications to Azure, focusing on a seamless customer experience.
NZ being targeted for cyber attacks – study
The survey polled more than 230 IT decision makers in businesses with 20 or more employees across New Zealand.
Whitepaper: The best way to get insights relevant to your business
A Design Sprint offers a framework for making progress and decisions when you have a new customer proposition.
Gartner names Silver Peak Leader in WAN Edge infrastructure
Gartner’s WAN Edge Infrastructure Magic Quadrant names Silver Peak among the leaders in a growing market.
Interview: Mobile Mentor’s long term future with Microsoft
Mobile Mentor is Co-Sell Ready: We quizzed founder Denis O’Shea on what the news means for Mobile Mentor, its partnership with Microsoft, and the company’s growth plans for the future.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Whitepaper: How to build cloud policies your organisation can stand by
Done right, digital transformation can transform the way governments engage with citizens, make businesses more productive and help non-profits be more effective.
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
How CTOs can get the most out of their performance metrics
"Industry research suggests that deploying and managing networking infrastructure consumes a whopping 36% of IT budgets."
Cisco and AWS collaborate for hybrid cloud platform
News has emerged of more data centre giants forging public cloud partnerships.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Five major risks of letting shadow IT go unchecked
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?
GDPR compliance: A step-by-step guide
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Kordia launches Women in Tech scholarship at the University of Waikato
The scholarship is established to acknowledge and support up-and-coming female talent and future technology leaders.
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Making PowerApps work for you, whatever your expertise level
If you are looking to learn some basic coding for applications there are a few things you might want to think about.
Hands-on review: TablePlus database management app for Mac
TablePlus is a new desktop application developed with the goal to make database management easier, faster, and more efficient.
5G expected to hit A/NZ by 2020, according to MIT
According to a report by MIT Technology Review Insights, APAC is well on the way to being a digital landscape with 5G just around the corner.
Paessler protects world’s most precious computing artefacts
Without air conditioning, The National Museum of Computing must keep a close eye on environmental factors like temperature, humidity, and UV light levels.
The importance of workflow automation in a modern business
"Intuitive, integrated, and collaborative processes are hugely important to the success of an organisation."
Impact of legacy technologies on threat alert response and cloud adoption among Aus enterprises
Most Australian enterprises today are hamstrung by the same technologies that once helped advance the nation’s IT economy.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Forrester’s 14 quick tech predictions for 2019
Forrester weighs in on 2019 predictions, looking at how organisations will shift into a more precise application of transformative technologies.
Start your company’s mobile innovation journey here
Mobile Mentor is transforming the way people work by putting app building at their fingertips
How to effectively implement a software-defined secure network
The unified SDSN platform combines policy, detection, and enforcement with a comprehensive product portfolio.
Gartner’s top 10 IoT tech trends
“CIOs who master innovative IoT trends have the opportunity to lead digital innovation in their business.”