Startup Journeys

Finding the Steve Jobs of Social: Birth of Australian Social Commerce Startup Konvo

Imagine a platform that can help declutter and unlock the business value of social conversations. That is exactly what Brisbane-based startup Konvo™ is about. Konvo synergises a range of IBM technologies to deliver an innovative Social Commerce (SoCom) Platform that transforms social networking. IBM solutions including cloud hosting, application development and testing, Cognitive API, and […]

Agile Digital Transformation

Top 4 Reasons to Do a Network Assessment

What does a Network Assessment provide? Network assessments, notably IBM Intelligent Networking Support, brings Cisco-based state-of-the-art collector technology into your network environment to comprehensively catalogue and analyse the hardware, firmware, software and other elements that can affect network availability and performance. What you get in a detailed visual report and dashboard in which IBM provides […]

Cyber Security as Strategic Advantage and Growth Enabler

Cyber Security is no longer just about risk management and resilience. Cyber Security is now instrumental to an organisation’s growth and a key enabler for digital innovation. Let’s take a closer look at five ways Cyber Security can create strategic advantage and differentiation for your organisation.

Continue reading

Exploring IBM Cloud Object Storage and CTERA Solutions

Join Nick Milsom, IBM Cloud Object Storage Leader A/NZ, to hear how IBM Cloud Object Storage and CTERA Solutions are delivering an enterprise-ready platform for secure and accelerated enterprise file services in public, private and hybrid cloud environments. Using real IBM use-cases, Nick will demonstrate how IBM is helping clients: Bridge the gap between traditional storage […]

Continue reading

Unified Mobility in the Industrial Sector

This infographic highlights the top 3 issues affecting the industrial sector, current trends and how unified mobility management solutions can lead to a wide range of benefits. It also includes a summary of the impact of UMM on one of New Zealand’s leading construction companies with many hundreds of employees operating across Australia, New Zealand […]

Continue reading

Unified Mobility in Healthcare

The advantages of UMM are significant for businesses of all sizes across industries. This infographic highlights the top 3 issues affecting the healthcare industry, current trends and how unified mobility management solutions can lead to a wide range of benefits. It also includes a summary of the business value realised by a US-based non-profit healthcare […]

Continue reading

‘Tis the Season to be Jolly: Get Free Cisco Live 2017 Pass!

Here’s an exciting holiday season offer you won’t want to miss! IBM is now offering you a FREE Cisco Live 2017 full conference pass worth $2,000 for every $100,000USD of eligible Cisco product families you purchase*. In other words, the more you buy, the more free tickets you receive. Wait, it gets better! We are […]

Continue reading

Could Pokémon Go Turn into Your Mobile Security Nightmare?

Augmented reality game app Pokémon Go has taken Australia and New Zealand by storm. With player numbers skyrocketing, cyber criminals were quick to act. Its servers were reportedly taken down by a denial of service (DDoS) hacker attack on July 16. Exploiting the phenomenal hype, fake apps have mushroomed to trick hungry users.

Continue reading

How Much Will a Data Breach Really Cost Your Organisation?

Did you know? The average cost per lost or stolen data record is $142. What would be the true cost to your organisation in the event of a data breach? Hailed as the industry’s gold-standard benchmark research, Ponemon Institute’s latest independent study details both the costs and impact of data breaches for organisations in ANZ.

Continue reading

3 Major Trends to Watch in Threat Intelligence

By cross-referencing key findings from the global 2016 IBM® X-Force® Cyber Security Intelligence Index with results from the Australia Cyber Security Centre (ACSC) survey of major Australian businesses, we have identified three major trends to watch in the cyber crime and threat landscape.

Continue reading

Webinar: Manage Mobile Threats with Security Intelligence and Event Management 18 Aug

Recent research shows that mobile has become the hackers’ new playground. In this session learn how to identify mobile threats and protect against malicious activity with a comprehensive approach that combines enterprise mobility management (EMM) and SIEM.

Continue reading