Technology news for New Zealand's largest enterprises
How AT&T aims to help businesses recover faster from a disaster
"Companies need to be able to recover and continue operations ASAP, without pulling resources from other places to get back up and running."
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
InternetNZ welcomes Govt's 99.8% broadband coverage plan
The additional coverage will roll out over the next four years as part of the Rural Broadband Initiative phase two/Mobile Black Spots Fund (RBI2/MBSF) programme expansion.
How your enterprise backup solution could fail
Even the best-trained employees are prone to error, and unfortunately, sometimes those errors affect enterprise backups.
How businesses will pivot AI strategies to align with human-centric goals
AI will not only allow businesses to reduce costs but will also provide ROI to the staff working with the technology.
HubSpot announces fund for 'customer first' startups
HubSpot is pouring US$30 million (NZ$40 million) into a new fund to support startups that demonstrate ‘customer first’ approach of not only growing bigger, but growing better.
Commerce Commission report shows fibre is hot on the heels of copper
The report shows that as of 30 September 2018 there were 668,850 households and businesses connected to fibre, an increase of 45% from 2017.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Using blockchain to drive transparency across the supply chain
"With blockchain, it’s likely we’ll see an increase in trust between organisations that work together through the supply chain."
Why businesses are struggling to reach digital maturity
Approximately 65% of respondents identified that they have yet to reach 'expert' status in their digital transformation maturity.
Bin 'em: Those bomb threat emails are complete hoaxes
A worldwide spate of spam emails claiming there is a bomb in the recipient’s building is almost certainly a hoax.
The tech that helped the first woman to sail around Australia
Lisa Blair used devices from supplied by Pivotel to aid her in becoming the first woman to circumnavigate Australia non-stop.
The challenges of large-scale AI training
To improve the accuracy of AI models, the average size of training datasets has increased by more than 300 times.
Marriott sets up call centres to answer questions on data breach
Marriott has released an update on the breach of the Starwood guest reservation data breach which affected 500 million guests.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
The key to financial institutions’ path to digital dominance
By 2020, about 1.7 megabytes a second of new information will be created for every human being on the planet.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Insights: How 'digital trust' can create competitive advantages
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
IoT and real-time visibility: The future of intelligent enterprise
"Given the enormous potential of IoT, any companies that don’t act will risk falling behind."
Healthcare without barriers: The leading edge of technology
Healthcare. It’s often on the leading-edge of science & technology – or at least when financing and regulation work in its favour.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Human value must be put back in marketing - report
“Digital is now so widely adopted that its novelty has worn off. In their attempt to declutter, people are being more selective about which products and services they incorporate into their daily lives."
Whitepaper: How physical access control got where it is today
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.
Spark creates enhanced Teams solution for business
Spark has combined the Microsoft Teams product suite with a number of other unique benefits to create Spark Enhanced Teams (SET).
Using layered security to stay safe over the holidays
SonicWall’s Capture Labs threat researchers recorded 28 times more ransomware attacks on Black Friday compared to last year.
Apax Partners wins bidding war for Trade Me buyout
“We’re confident Trade Me would have a successful standalone future," says Trade Me chairman David Kirk
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
How blockchain will impact NZ’s economy
Distributed ledgers and blockchain are anticipated to provide a positive uplift to New Zealand’s economy.
Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
Whitepaper: Using your data and AI to tighten cybersecurity
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
HTC signs with 5G partners across the globe
Sprint and Telstra will both carry a 5G mobile smart hub built by HTC.
O-RAN Alliance and Linux to create an open source software community
“Our joint efforts will help accelerate the creation, integration, and deployment of open source in RAN.”
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
How Adobe aims to drive digital transformation for financial services
Digital transformation is a requirement for ongoing competitiveness that clearly helps businesses run more efficiently.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill.
PAM solutions critical to stopping criminals' appetite for credentials
Threat actors will also use different methods of attack and toolkits to look for vulnerabilities in any internet infrastructure. They are looking to steal any credentials that could allow for privilege escalation.
Hands-on review: Epson FastFoto FF-680W
Simple in layout and function, it packs the punch of a professional scanner and will prove an invaluable tool for anyone needing to archive large quantities of photographs.
Hands-on review: Quick and easy authentication with YubiKeys
The #1 security key, featuring multi-protocol security.
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
Whitepaper: Three changes that will make security teams more effective
Organisations are spending more and more money on cybersecurity preventive measures, yet the breaches seem to keep increasing.
CASE STUDY: Prototyping the most ambitious innovation in audio design yet
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
GCSB welcomes Inspector-General's report on intelligence warrants
Intelligence warrants can include surveillance, private communications interception, searches of physical places and things, and the seizure of communications, information and things.
A director's guide to disaster recovery
So you want to make a disaster recovery plan and minimise the risk to your business when the lights go out.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
Understanding consumers' security concerns critical to gaining trust
Data security issues such as identity theft, bank fraud, viruses and hacking are more of a concern than natural disasters or terrorism.
Mercury Energy sells smart meter business for $270m
“Metrix’s large installed meter base, deep customer relationships and innovation platform, make this a natural acquisition."
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
A guide to compliance in this new world of legislation
Every day another country joins the fight agains breaches with legislation. Get compliant and stay compliant with this detailed whitepaper.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Google says ‘circular economy’ needed for data centres
Google's Sustainability Officer believes major changes are critical in data centres to emulate the cyclical life of nature.
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Whitepaper: Taking an integrated approach to combatting ransomware
Rather than having multiple different solutions, businesses need to ensure their endpoint management, malware and backup solutions are providing full coverage.
Take productivity to the next level with Surface
Microsoft’s latest-generation Surface devices unlock more power, performance and value for business customers.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
NVIDIA sets records with their enterprise AI
The new MLPerf benchmark suite measures a wide range of deep learning workloads, aiming to serve as the industry’s first objective AI benchmark suite.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
Whitepaper: How to protect your business from insider threats
Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world.
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
Don’t wait till disaster strikes – best practices when implementing DR
As more companies migrate their data to the cloud, disaster recovery becomes critical to ensure their operations are not disrupted by unforeseen events.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
The disaster recovery-as-a-service market is on the rise
As time progresses and advanced technologies are implemented, the demand for disaster recovery-as-a-service is also expected to increase.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
Whitepaper: How Microsoft aims to redefine mobility
Mobility gives hackers additional opportunities to gain access to your company’s sensitive data, thus your highly confidential information is at risk.
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
Whitepaper: How much is your company’s data really worth?
The most valuable companies in the world are so valued because of the data those companies control.
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
MulteFire announces industrial IoT network specification
The specification aims to deliver robust wireless network capabilities for Industrial IoT and enterprises.
New product from HID Global sets new speed records
HID Global has unveiled a new ID card retransfer printer that truly sets the bar for speed by halving the current industry standard.
Whitepaper: How close is your organisation to GDPR compliance?
One of the most significant changes in global privacy law in the last 20 years is the introduction of the EU’s General Data Protection Regulation (GDPR).
Is your business growing the way you want it to?
Small business owners often have to be a jack-of-all-trades to keep their business running - but it doesn't have to be that way.
Infographic: How cybercriminals are targeting Kiwis
The New Zealand 2018 Unisys Security Index stands at 138, down 16 points from 154 in 2017.
What to think about when planning IT infrastructure in schools
An expert with a history of builiding successful IT infrastructure for the unique education sector shares their advice for getting it right.
The Implications of a data disaster and why effective DR is critical
93 percent of companies without disaster recovery who suffer a major data disaster are out of business within one year.
Microsoft NZ bids Goldie a “fond farewell”
Microsoft New Zealand director of commercial and partner business takes new role across the Tasman. The search for his replacement has begun.
Hands-on review: The Logitech R500 laser presentation remote
With a clever ergonomic design, you’ll never have to glance at the device, unless you deliberately look to use the built-in laser pointer to emphasise your presentation.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
Soul Machines' virtual humans go mainstream
An Auckland AI firm renowned for its work creating ‘digital humans’ is now unleashing its creativity to the wider market.
Whitepaper: Microsoft's tips for implementing a secure hardware solution
Making big IT decisions that affect your department and organisation as a whole brings up many concerns.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Whitepaper: Microsoft’s framework for inclusive and responsible cloud policies
Microsoft wants to empower organisations to use technology within a clear ethical and responsible framework.
Why there will be a battle for the cloud in 2019
Cloud providers such as AWS, Azure, and Google will likely find themselves in a mad scramble to gain additional enterprise customers.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Avnet to boost AI/IoT solutions with acquisition
The acquisition of Softweb Solutions adds software and artificial intelligence to Avnet’s ecosystem and bolsters its IoT capabilities.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."