Tech news for NZ's largest enterprises
Vendor of the week:
Kordia launches Women in Tech scholarship at the University of Waikato
The scholarship is established to acknowledge and support up-and-coming female talent and future technology leaders.
Samsung joins a global league of AI experts
“As a member of the PAI, Samsung will strive to facilitate the ongoing progress of artificial intelligence.”
VMware’s bid to accelerate enterprise adoption of Kubernetes
“Kubernetes is emerging as an open framework for multi-cloud infrastructure that enables business transformation."
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
How Azure can encourage digital innovation
Gap is working with Microsoft to migrate hundreds of applications to Azure, focusing on a seamless customer experience.
Kiwis concerned about being scammed – survey
This unease is warranted given the growing sophistication of scammers and their activities, and numbers of attempted fraud.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Why the mobility industry is moving towards 5G
Reliable and timely radio performance is a crucial requirement for all those with a stake in transport safety.
Cisco and AWS collaborate for hybrid cloud platform
News has emerged of more data centre giants forging public cloud partnerships.
Opinion: Strategies for avoiding digital transformation failures
Dell Boomi APJ's MD says digital transformation journeys are rife with potential disasters.
Intel drafts model legislation to spur data privacy discussion
In a white paper published last month, Intel’s Global Privacy team laid out six policy principles for safety and privacy in the age of AI.
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Why Huawei's SD-WAN solution is causing a fuss
Huawei provides customers with a broad array of WAN edge functions.
Interview: Aruba’s NZ country manager talks channel strategy
“What we're taking to market is that message around simplification and having everything in one place.”
Why building a resilient cyber security strategy for 2019 is vital
Cyber attacks are getting more sophisticated as hackers embrace their own methods of innovation, businesses need to evolve as well.
The five-step guide to securing data in the cloud - IDC
This is especially important with the implementation of privacy regulations such as GDPR.
Whitepaper: How to build cloud policies your organisation can stand by
Done right, digital transformation can transform the way governments engage with citizens, make businesses more productive and help non-profits be more effective.
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
Increase visibility and productivity with fleet tracking software
Know what’s going on in the field so you can dispatch more efficiently, improve customer service and reduce time spent calling drivers for updates.
Working with normalised SQL Tables – a guide
The goal of this workshop post is to explain a method for working with normalised SQL data in PowerApps.
Making PowerApps work for you, whatever your expertise level
If you are looking to learn some basic coding for applications there are a few things you might want to think about.
Is a low-code app building approach what your organisation needs?
Microsoft PowerApps is a service that lets you build business apps that run in a browser or on a phone or tablet, and no coding experience is required.
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
The importance of workflow automation in a modern business
"Intuitive, integrated, and collaborative processes are hugely important to the success of an organisation."
Why good headsets are vital in a fast-paced business
Sennheiser’s SDW 5000 headsets have been created to make sense of a complex, fast-moving world while providing future-proof flexibility.
AU startup hitches a ride to space with Rocket Lab
Rocket Lab and Australian IoT startup Fleet Space Technologies have signed a contract to launch two Proxima IoT satellites this month.
Will blockchain be the next big thing in the healthcare sector?
"Organisations within the healthcare sphere are likely to take an ‘adopt with caution’ approach to the use of blockchain."
NZ being targeted for cyber attacks – study
The survey polled more than 230 IT decision makers in businesses with 20 or more employees across New Zealand.
Infographic: Why an outdated unified comms solution hurts your business
Seventy-one percent of IT professionals say their organisations use multiple communication or collaboration solutions unnecessarily.
The Kiwi company driving commercial drone tech growth
“We have several high profile commercial projects underway and we’re confident we will have some exciting news to impart to the market next year.”
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
Tatau scoops four international awards in a few short weeks
‘Tatau’ is the word on many international tech investors’ lips – and all because of a unique approach to blockchain and AI.
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
You’re invited: Your communications system is determining your future
Your communications system makes or breaks customer engagement. Find out how to make an impact withT your customers.
The three-pronged security approach to multi-cloud environments
Popular methods don't necessarily catch all traffic - a particular concern for policy management.
Huge vulnerabilities in software supply chain being exploited
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Toshiba develops a high-speed algorithm for deep learning processors
Toshiba is continuously focusing on the research and development of AI technologies.
Dell Boomi expands its enterprise iPaaS portfolio
"Dell Boomi's ability to connect data, processes and people has an extremely positive impact on the experience Sky provides."
Case study: Startup revamps systems with HID mobile access
“We want our clients to have the best experience here. This is the reason why we chose to work with HID Global solutions."
GDPR compliance: A step-by-step guide
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
The security tool conundrum: Can you have too much of a good thing?
Organisations across Asia Pacific are using many different security tools to protect their businesses, but often they have no centralised platform to manage those tools.
The silent security risk of unstructured data
"IDC estimates that 90% of today’s enterprise data is unstructured."
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Change is coming for popular Windows products
Microsoft wants to ensure that your business is well-supported during the upgrades, which is why it is offering a range of options to help you transition.
Whitepaper: Threat detection and risk measurement with machine learning
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
Nutanix extends Beam to enterprise private cloud
"Hybrid cloud is no longer considered a brief stopping point in the journey to an all public cloud future."
Paessler protects world’s most precious computing artefacts
Without air conditioning, The National Museum of Computing must keep a close eye on environmental factors like temperature, humidity, and UV light levels.
Interview: Mobile Mentor’s long term future with Microsoft
Mobile Mentor is Co-Sell Ready: We quizzed founder Denis O’Shea on what the news means for Mobile Mentor, its partnership with Microsoft, and the company’s growth plans for the future.
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Using SOLIDWORKS CAD to take an idea from prototype to product
Sound pioneer Nura had an ambitious concept to deliver when it raised almost two million dollars via crowdsourcing and then over five million dollars through a seed round.
IBM targets hybrid cloud with VMware partnership
BM and VMware have announced a new partnership intended to accelerate enterprise hybrid cloud adoption.
Create custom, enterprise-grade mobile apps to accelerate workflows
Mobile Mentor assists organisations with the process from start to finish and keeps the backend up-to-date after the app is completed.
VMware unveils new innovations for the multi-cloud era
VMware unveiled significant cloud product and service updates for enterprises and service providers.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
The perfect place to attend a coding bootcamp
A good coding bootcamp focuses on the process of problem solving and logic building.
Dell Index reveals we are not the leaders we think we are
Dell’s Digital transformation index shows that while 45% of A/NZ business heads believe they’ll disrupt rather than be disrupted, only 7% are Leaders.
The key to a successful digital transformation journey
"According to a Deloitte study, 90% of organisations believe their core business is threatened by new digital competitors."
ABB drives the standard for automation and IIoT architectures
Adoption of the OPC UA over TSN standard will allow companies to leverage the benefits of multi-vendor, peer-to-peer communications.
How Kiwi businesses can embrace a mobile workforce
As an early adopter of Amazon Web Services, Suncorp uses the public cloud to manage many applications and services central to its business.
Why open source is at the core of app development
The NativeScript framework was created to ease the app development process by leveraging a user’s existing web development skills.
What does a risk-free cloud migration look like?
When it comes time to move your business into the cloud, you have be sure you are doing it right - but how will you know what that means?
Whitepaper: How much is your company’s data really worth?
The most valuable companies in the world are so valued because of the data those companies control.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Gartner’s top 10 IoT tech trends
“CIOs who master innovative IoT trends have the opportunity to lead digital innovation in their business.”
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
The six success factors for successful smart card migration
Smart cards are easy to carry around, can be programmed and reprogrammed remotely, and offer a secure way for students and teachers alike to access campus facilities.
SUSE awards Zag Accredited Partner status
“Zag’s technical specialists have a deep understanding of the value SUSE adds to the SAP landscape."
$10m in the pot: What's next for PredictHQ?
In just four short years, PredictHQ has gone global and raised $10 million in a Series A funding round.
Impact of legacy technologies on threat alert response and cloud adoption among Aus enterprises
Most Australian enterprises today are hamstrung by the same technologies that once helped advance the nation’s IT economy.
Top 10 challenges facing MSPs – and how to overcome them
In a perfect world all businesses would happily invest enough to protect their data, but it’s not, which is why Probax released a guide.
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
Start your company’s mobile innovation journey here
Mobile Mentor is transforming the way people work by putting app building at their fingertips
Dell EMC advances hybrid cloud for VMware environments
Through collaboration and joint engineering, Dell EMC and VMware are enabling organisations to derive more value from IT investments.
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
When good tech goes bad - the challenge of complexity
Beautiful system tapestries have created confusing labyrinths that people have to navigate just to get their job done, wasting time and energy.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Informatica releases its next-generation iPaaS in APAC
Enterprises in APAC can now leverage Informatica’s iPaaS, which delivers a secure microservices-based solution.
How to effectively implement a software-defined secure network
The unified SDSN platform combines policy, detection, and enforcement with a comprehensive product portfolio.
So you want to keep tech talent in your business
So you want to keep your tech talent, but you’re not sure what they need to stay put – is salary the biggest factor?
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Could IoT performance problems derail operations and damage revenue?
"Enterprises are already struggling to master cloud complexity and IoT substantially magnifies this challenge.”
How processes can be the key to RoI in digital transformation
Process management and automation is vital to any digital transformation, but it is about more than just taking some forms online.
Using analysis to save on IT maintenance costs
Ill-fitting maintenance plans, whether over- or under-prescribed does cost you money - but, with a little analysis you can save a lot.
Whitepaper: The best way to get insights relevant to your business
A Design Sprint offers a framework for making progress and decisions when you have a new customer proposition.
Why Cognizant is at the forefront of cloud migration
“Cognizant leveraged its deep cloud technology to architect, design and build SAP systems on HANA."
How to manage and secure your digital workplace
“A recent study found that 30% of IT fixed assets are missing or can’t be found."
IDC predicts 55% of APAC organisations will be digitally determined by 2020
By 2020, at least 55% of organisations will be digitally determined, transforming markets and reimagining the future.
Whitepaper: The evolution of physical access control
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
How AI can improve employee productivity
AI could provide a boost to workforce productivity, but organisations need to build their employees’ trust in these technologies.
Why an ecosystem platform is critical to business growth
"The right ecosystem platform can help businesses become more agile."
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Intel who? AWS opts with AMD chips for cost-savings
AMD shares surged about four percent after the announcement that Amazon Web Services (AWS) would be employing its services.
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Opinion: Top 5 myths about cloud adoption in Asia
Dell Boomi's Asia MD says there are a number of myths holding back cloud adoption, despite it being the obvious future.
Hands-on review: TablePlus database management app for Mac
TablePlus is a new desktop application developed with the goal to make database management easier, faster, and more efficient.
Nitro partners with Dropbox for greater integration
Nitro integration with Dropbox Extensions will expand PDF productivity capabilities for users directly within Dropbox.