IDC: APeJ blockchain spending to grow over 80%Blockchain spending is forecast to grow by 83.9% year over year in 2019, and 77.5% by 2022.
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
Why an IT resilient strategy needs to be in the modern CIO’s toolkit
"Having an IT resilience strategy in place allows an organisation to smoothly adjust to change."
Intel announces “most powerful mobile processors ever”
Improvements in performance, responsiveness and Wi-Fi connectivity will be rolling out for gamers and creators alike.
Software AG launches new cloud-based IT portfolio management tool
“Alfabet FastLane’s out-of-the-box approach absolutely addresses the needs of smaller IT teams."
Slack's 2019 feature roadmap unveiled
Including shared channels across organisations, workflow automation, greater email and calendar integration, and streamlined search.
Data#3 wins learning and development award two years running
Chief Learning Officer magazine’s LearningElite programme honours the best organisations for learning and development.
Hootsuite leads the social engagement charge - Forrester report
“Hootsuite leads the pack with its seller focus and scale,” writes Forrester principal analyst Mary Shea.
The fight for power in the Fourth Industrial Revolution
"Like the industrial revolutions before it, the Fourth Industrial Revolution highlights the role of new technologies in society."
Intel releases 8th gen vPro mobile processors
This generation promises longer battery life, better performance, and comes with a built-in hardware security solution, Intel Hardware Shield.
Unisys encourages financial institutions to adopt open banking
“It establishes the bank as an integral part of the customers’ life – a ‘one-stop-shop’ where they can get personalised products and services they want, when they want them.”
Developers use Intel AI to solve some of the world’s biggest challenges
Risab Biswas developed a computer vision application to help farmers more easily detect pathological disease in their plants.
Smarter cities through cross-border and G2G collaborations
"As countries race ahead in their bid to accelerate smart city development through industrialisation, the environment and ultimately humanity is paying the price for this phenomenon."
SingularityNET CEO discusses the future of AI
"In my view, AI will eliminate essentially all need for humans to do practical work."
Risky business: Avoid putting all your eggs in one basket
Many businesses that transition to the cloud blindly rely on a single cloud service provider for day-to-day security.
How the 5G Telco market is transforming
"Over the past six months, more people in the general populace have begun using the term 5G in their regular conversations."
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Whitepaper: Modern information management is a necessity, not a choice
Organisations are facing major challenges that makes information management more challenging than ever before.Download
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Datarobot celebrates one billion models built on its cloud platform
“Our customers build more than two and a half million models every day, and with each model, our solution gets smarter and more sophisticated."
Novum Networks & Tollring bring call analytics to APAC
Tollring’s iCall Suite cloud analytics is now part of Novum Networks’ product portfolio, which enables users to record, monitor, and analyse calls on any device.
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
What to expect from the Surface Hub 2S
Microsoft has released details about the next iteration of the Surface Hub featuring mobility, reduced weight and a 85in version in the works.
Fuji Xerox raises the bar with Iridesse production press
The Iridesse is capable of printing eye-catching images with the xerographic colour printing process by using up to, two special dry inks selected from gold, silver and clear.
How Kiwibank aims to enable greater digital inclusion
"Online tools can offer a more convenient and cheaper customer experience, but there can be barriers to usage."
Fuji Xerox NZ unveils two new feature-packed printer series
This month Fuji Xerox New Zealand announced two new series additions to its portfolio of monochrome printers ideal for the modern office.
HP back on board with Emirates Team NZ
HP 3D print technology will supposedly help the team innovate at speed.
Fuji Xerox leads the way for a more sustainable future
More than 99.5% of the products Fuji Xerox takes back are reused or recycled. Already, the company diverts 700 tonnes of used product from landfill per year.
How organisations should prepare for cloud migration
How ready are Australian organisations for cloud migration?Download
The ever-shifting role of physical access control
Physical security teams can retain control over their budgets and investment decisions, as well as the ability to prioritize the safety and security of the organisation.Download
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
Talend integrates Pipeline Designer with IPaaS offering
Talend has added a web-based graphical designer to its integration platform-as-a-service, Talend Cloud.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
Whitepaper: Filling your cloud technical skills gap
The study surveys more than 950 IT decision makers and 950 IT pros from across the globe to better understand the barriers to increasing cloud usage.Download
Why HR departments need enterprise content management
"Using tools ranging from automated document capture to web-based digital forms, a comprehensive ECM solution modernises HR."
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Whitepaper: What will losing your data cost you?
Do you know how much your data is worth, more importantly, what it will cost if it is lost?Download
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.Download
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Wisenet releases education campus management solution
Wisenet ITS Application Suite can be customised and configured to meet modern public education provider demands.
How IoT can be a game changer for the hospitality sector
IoT and home automation are driving up consumer expectation, and catering to this will be the key to success for the hospitality sector.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
Efficiency is the name of the game - how to profit from workspace digitisation
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.Download
ExaGrid and Zerto announce an integrated solution for backup and recovery
“In an age of continuous digital transformation, businesses require new levels of resilience from their DR and backup solutions."
Huawei announces the launch of Atlas AI
The Huawei Atlas AI computing platform is powered by Huawei's Ascend series AI processors.
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.Download
Migrating to SAP HANA? Take the easy leap with SUSE
By 2025, SAP will discontinue support for Business Suite. Now is the time to move to SAP HANA with ease.Learn More
Breakthrough research to revolutionise internet communication
Every email, cell phone call and website visit is encoded into data and sent around the world by laser light.
Wi-Fi signal strength vs Wi-Fi speed: How to get the most out of your network
At Ruckus, they believe in the importance of stable client connections in an unstable RF environment.
Preventing business email compromise starts on the inside
90% of global organisations have seen phishing attack volumes increase and 40% have seen the volume of impersonation attacks increase.Download
Why businesses are failing at cybersecurity
Email is the number-one vector used to initiate attacks like malware delivery, impersonations and phishing attacks.Download
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Security ‘not their problem’? Set them straight on cyber resilience for email
“It’s not my problem” – how often have you heard that excuse from teams outside IT security? Ideally it’s becoming less common, but there’s still an ostrich mentality within organisations.Download
Employees behaving badly? It’s your choice
What your employees do and how they behave when you’re not looking over their collective shoulder is entirely up to you.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
How printing solutions can help save the planet
Y Soft has identified five key ways organisations can become more economical and reduce their environmental impact.
Why businesses that prioritise CX generate 11% higher shareholder returns
“Locally, consumers are becoming more open to engaging in services and offerings that are hyper-personalised."
AI voice assistants: The unsung helpers of network performance
While it’s currently a far cry to expect IT managers to suddenly transform all of their browser-based management with voice commands, it can be a useful aid for a number of different tasks.
You're invited: Adobe Symposium 2019, Sydney
The event will bring together 4000 business leaders, marketers, IT and digital experts, as well as creative professionals to Sydney’s International Convention Centre in the heart of the city.
What you need to know about Fuji Xerox 9th Gen multifunction printers
The entire user experience has been redefined, from its clever interactive touch screen and intelligent automated processes, to its seamless integration with cloud services.FIND OUT MORE
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Whitepaper: Gartner’s top picks for enterprise archiving services
The Magic Quadrant on Enterprise Information Archiving evaluates vendors on compliance, preservation, and discovery use cases.Download
Hands-on review: The ruggedly tough CAT S61 smartphone
The driveway beckoned me, so I dropped the phone several times. Back in the study, close examination has failed to reveal a single scratch.
How Huawei aims to enhance IP networks
'We believe that the intelligent IP networks built with the four-engine series products can continuously empower users with business intelligence."
Informatica launches new AI-driven innovations
Informatica announced new features and AI-driven innovations across five key segments.
Lenovo & VMware know the secret of hyperconvergence - do you?
In this whitepaper, IDC analyses the benefits of hyperconverged solutions, and how they align with solutions from firms such as Lenovo and VMware.Download
Innodisk launces AIoT solution for the medical field
One of the challenges of AIoT is keeping tabs on the many devices involved in the system.
Want to keep at least $500 in the bank? Shop and save with Fuji Xerox
Save $500 for every Fuji Xerox 9th Generation Multifunction Printer you purchase or lease.FIND OUT MORE
Cyber threats: Catch 'em all with unified monitoring
Viruses, Trojans, malfunctions, backdoors, physical hazards… Not so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.Download
Singapore preps financial sector for analytics & automation
Singapore’s financial sector will be on the front line of change as data analytics and automation are likely to impact at least 121 job roles over the next three to five years.
Forrester names Mimecast a Leader in information archiving
The company has also been named a Top Player in the Radicati Information Archiving - Market Quadrant, 2019.
Integrating data into decision-making from the ground up
In order to implement a change that can be sustained, organisations need to find a way to embed it into their culture.
Your company is collecting more data – but how do you make it work for you?
Terabytes are old news – data is growing at the rate of petabytes, zettabytes, and beyond.Click Here
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Earth Day 2019: How tech firms can support our planet's wellbeing
Six industry experts explain how they - and other tech organisations - can positively contribute to the wellbeing of our earth.
Yes, data is the new oil - but only analytics can refine the insights
Data has frequently been referred to as the ‘oil’ of the 21st century - much like oil, it’s a raw material that can be transformed into insights and value. Following that analogy, the oil refineries of data today are business intelligence and analytics platforms.
How to embed flexibility and agility in big data architecture
Big data analytics strategies need flexibility and agility to meet changing business demands.Read More
Awareness but no action – AU firms exposed to security, compliance threats
Security managers know the many ins-and-outs of security best practices and employees’ everyday behaviour, but few are doing anything to fix security issues.Download
Teradata leads data management, according to Gartner report
As part of the report, Gartner evaluated 19 vendors against data warehouse use cases, including traditional use cases, real-time, logical, and context-independent.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
Why third-party solutions are key to realising the benefits of Office 365
Research shows ongoing security concerns about email security in Office 365.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
Nutanix introduces new cloud-native solutions for enterprises
Nutanix announced the general availability of its certified Kubernetes solution.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
10 best practices for building effective dashboards
When you've created an effective dashboard, you will wonder how you ever lived without it. Here are 10 ways to build the perfect dashboard.Read More
SingleRAN Pro: Combining simplicity and openness for a 5G future
Huawei's SingleRAN Pro solution supposedly offers an open, simplified networking concept to help operators roll out commercial 5G networks.
AI & ML to power the future of enterprise networks
Aerohive's Alan Amrod shares the challenges of modern enterprise networks - as well the range of benefits that AI and ML are bringing.
IFS named a Major Player for ERP in IDC MarketScape
The enterprise applications company was given the title for its flexible product, cloud first approach and customer intimacy.
MSSPs for dummies - all you need to know about multicloud security
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world. A lot is at stake and yes, you should be cautious.Download
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Toshiba launches fast rotary cutter for B-EX6T1 printer
Intended primarily for industrial applications, these popular printers combine state-of-the-art technology with usability, reliability and low TCO.
How integrating AI into network monitoring drives efficiencies
IT teams all around the world are spending a disproportionate amount diagnosing what are, realistically, straightforward problems.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Whitepaper: Neutralise your biggest security risk - your employees
Internal threats caused by careless employees increased by 37% last year, a study has found.Download
AI's lack of intuition is where humans excel best
Could you trust machines to make business decisions with the right amount of judgement and contextual understand that humans can? Not yet.
Is NZ’s tech industry starting to mature?
Technology is New Zealand’s fastest growing and third biggest industry.
Epson FF-680W: The world's fastest WiFi photo scanner
“There was clearly a need for an ultra-fast and easy scanning solution that enabled people to digitise hard copy photos often stored in albums or boxes.”Download
Why accelerating the uptake of tech in the NZ economy is crucial
“Historically, New Zealand has been more of a tech taker than a tech leader."