SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Stories by Staff - Page 15

Story image
Technology has arrived to transform your workplace into a collaboration hub
Wed, 9th Dec 2015
#
uc
#
wfh
#
collaboration
The first smart hub for group collaboration that transforms Polycom's iconic three-point conference phone into a powerful system is now available.
Story image
CityLink turns 20 years old
Wed, 9th Dec 2015
#
satellite
#
fibre
#
citylink
It might have recently turned 20 years old, but if you mention the name CityLink in Auckland, people immediately think ‘bus company’.
Story image
How businesses are taking advantage of the cloud
Tue, 8th Dec 2015
#
cloud services
#
smb
#
iconz
Cloud computing in New Zealand has been widely available for several years, and its adoption has been rapid amongst large corporates.
Story image
How to manage workplace generation gaps
Thu, 3rd Dec 2015
#
messageops
#
intersec
#
ndi
What about Generation X? While the divide between Boomers and Millennials tends to be starker, Generation X is caught in the middle.
Story image
Scanners: The unexpected financial management saviour
Wed, 2nd Dec 2015
#
printing
#
document management
#
ecm
The Fuji Xerox DocuMate 3220 is an all encompassing scanning solution that makes organising your financial paperwork easier than ever before.
Story image
UFONE's new PBX platform empowers channel partners
Wed, 2nd Dec 2015
#
cloud services
#
partner programmes
#
ufone
UFone has rolled out a new Cloud Hosted PBX service, designed specifically for channel partners with business end users and powered by the 3XC system.
Story image
What is the secret to saving money on IT expenses?
Mon, 30th Nov 2015
#
compass communications
#
it managers
#
ndi
Information Technology: all businesses need it, but if you’re a small to medium sized business can you manage this cost effectively in-house?.
Story image
Hands-on review: A quick glance at the Apple Watch
Fri, 27th Nov 2015
#
apple
#
gaming
#
reviews
Apple has packed a lot of features into this small device, though most of them require connecting to the iPhone to deliver their functionality.
Story image
Avoiding the four million dollar pitfall of unplanned downtime
Wed, 25th Nov 2015
#
cloud services
#
virtualisation
#
dr
Veeam’s Raymond Goh offers up four tips for how IT can support the infrastructure required of an always-on business, while driving sustainable growth.
Story image
Fortinet and IDC: The five stages of IT security
Wed, 25th Nov 2015
#
firewall
#
network management
#
network security
From ad hoc to optimised: The IDC-Fortinet report unveils the universal journey of IT security, pressing firms to ascend five essential stages.
Story image
Security policy: The first line of defence for your school’s network
Wed, 25th Nov 2015
#
firewall
#
edutech
#
network management
Network security starts with people. Your people. Staff, teachers, administrators, visitors and anyone else who might have access to your network.
Story image
Secure Wi-Fi: The Fortinet way
Wed, 25th Nov 2015
#
firewall
#
cloud services
#
network management
Fortinet's FortiAP-S series of secure access points and 'Secure Access Architecture' make Wi-Fi the strongest link in your network.
Story image
Fortinet: Protection from the core to the edge
Wed, 25th Nov 2015
#
firewall
#
cloud services
#
network management
If you want to increase your revenues, regardless of the businesses you provide solutions for, Fortinet has the answer.
Story image
People-centred Agile adoption key to better delivery
Mon, 23rd Nov 2015
#
project management
#
assurity
#
ndi
Agile is about people, rather than processes, says Dan Teo, Principal Consultant at Assurity Consulting. He explains why.
Story image
Online flashcards - the benefits
Fri, 20th Nov 2015
#
e-learning
#
lms
#
retailers
Embracing the digital classroom, students find quick, effective learning in online flashcards, now boosting memory with on-the-go access.
Story image
Students work to make business life easier for SMEs
Thu, 19th Nov 2015
#
edutech
#
accounting systems
#
digital banking
Uni of Auckland students innovate to streamline SME operations, creating shift-swap apps and more in a MYOB-led challenge.
Story image
Film review: Snoopy and Charlie Brown, the Peanuts Movie
Wed, 18th Nov 2015
#
gaming
#
reviews
#
technology gifts
Charlie Brown's eternal quest for love charms in the nostalgic 'Peanuts Movie', as both kids and adults root for the underdog.
Story image
Four proven ways to speed up your broadband
Mon, 16th Nov 2015
#
broadband
#
chorus
Suffering slow internet? Four expert tips could turbocharge your broadband, ensuring a faster, more reliable connection.
Story image
Social customer care: Are you doing it right?
Mon, 16th Nov 2015
#
crm
#
martech
#
social media
Aspect Software’s Kristen Pimpini offers up some tip on harnessing social media for your business' customer care.
Story image
Automate your accounts payable with a realistic start
Mon, 16th Nov 2015
#
testing
#
workflow automation
#
accounts payable
End-to-end invoice automation offers a number of benefits. Hyland Software’s Katie Alberti outlines them and how to implement a solution.
Story image
How ANZ retail VARs can win at omnichannel
Thu, 12th Nov 2015
#
open source
#
retail spending
#
retailers
VARs who design solutions with today’s shopper expectations in mind will be best positioned to win at omnichannel says CitiXsys ANZ's Paula Da Silva.
Story image
Build versus buy: Why the best software choice could be both
Thu, 12th Nov 2015
#
custom software
#
digital disruption
#
ndi
When it comes to software, it’s no longer a case of choosing build or buy, with more companies opting for a hybrid approach says ComOps.
Story image
Security, privileges and the cloud
Tue, 10th Nov 2015
#
cybersecurity
#
cyberark
#
cios
Privileged accounts represent one of the largest security vulnerabilities an organisation faces today says CyberArk’s Sam Ghebranious.
Story image
Using ADCs to uncover hidden threats in encrypted traffic
Mon, 9th Nov 2015
#
dlp
#
a10 networks
#
cios
A10’s Greg Barnes offers up some tips on uncovering hidden threats in encrypted traffic, with application delivery controllers.