Startup Journeys

Finding the Steve Jobs of Social: Birth of Australian Social Commerce Startup Konvo

Imagine a platform that can help declutter and unlock the business value of social conversations. That is exactly what Brisbane-based startup Konvo™ is about. Konvo synergises a range of IBM technologies to deliver an innovative Social Commerce (SoCom) Platform that transforms social networking. IBM solutions including cloud hosting, application development and testing, Cognitive API, and […]

Agile Digital Transformation

Top 4 Reasons to Do a Network Assessment

What does a Network Assessment provide? Network assessments, notably IBM Intelligent Networking Support, brings Cisco-based state-of-the-art collector technology into your network environment to comprehensively catalogue and analyse the hardware, firmware, software and other elements that can affect network availability and performance. What you get in a detailed visual report and dashboard in which IBM provides […]

Cyber Security

How Much Will a Data Breach Really Cost Your Organisation?

Did you know? The average cost per lost or stolen data record is $142. What would be the true cost to your organisation in the event of a data breach? Hailed as the industry’s gold-standard benchmark research, Ponemon Institute’s latest independent study details both the costs and impact of data breaches for organisations in ANZ.

Cyber Security as Strategic Advantage and Growth Enabler

Cyber Security is no longer just about risk management and resilience. Cyber Security is now instrumental to an organisation’s growth and a key enabler for digital innovation. Let’s take a closer look at five ways Cyber Security can create strategic advantage and differentiation for your organisation.

Finding the Steve Jobs of Social: Birth of Australian Social Commerce Startup Konvo

Imagine a platform that can help declutter and unlock the business value of social conversations. That is exactly what Brisbane-based startup Konvo™ is about. Konvo synergises a range of IBM technologies to deliver an innovative Social Commerce (SoCom) Platform that transforms social networking. IBM solutions including cloud hosting, application development and testing, Cognitive API, and […]

How Much Will a Data Breach Really Cost Your Organisation?

Did you know? The average cost per lost or stolen data record is $142. What would be the true cost to your organisation in the event of a data breach? Hailed as the industry’s gold-standard benchmark research, Ponemon Institute’s latest independent study details both the costs and impact of data breaches for organisations in ANZ.

Webinar: Manage Mobile Threats with Security Intelligence and Event Management 18 Aug

Recent research shows that mobile has become the hackers’ new playground. In this session learn how to identify mobile threats and protect against malicious activity with a comprehensive approach that combines enterprise mobility management (EMM) and SIEM.

Fast Track Cyber Security: Network and Endpoint Protection

You can now fast track cyber security with an IBM Security solution package designed for mid-size, growing organisations needing a cost-effective yet robust approach. The QRadar security intelligence platform and MaaS360 unified mobility management provide multi-layered protection for your network, mobile and endpoints.

St Virgil’s College Tasmania Nurtures Students with a Rich, Secure Online Experience

With an increased focus on ‘bring your own device’ programs, schools are now looking for better ways to protect students against security threats, including cyberbullying and inappropriate content. St Virgil’s College has set up a secure education experience that prepares students to work, interact and live in the digital age.

Video: SIHO Insurance Services Protects Sensitive Data

SIHO Insurance Services provides businesses of all sizes with health benefit solutions, including third-party administration, fully insured plans and wellness programs. With approximately 200 employees and over 80,000 members, the company was concerned about the security of medical information traveling between corporate servers and employees’ unregulated personal devices.