The PRWIRE Press Releases http:// 2017-04-26T23:51:04Z Brocade Global Study Reveals More Than Half of IT Teams Will Struggle Due to a Lack of the “Right” Skills That Business Demands in Next 12 Months 2017-04-26T23:51:04Z brocade-global-study-reveals-more-than-half-of-it-teams-will-struggle-due-to-a-lack-of-the-right-skills-that-business-demands-in-next-12-months-2 Sydney, Australia — 27 April 2017 — Brocade (NASDAQ: BRCD) today announced a new Global Digital Transformation Skills Study, which aims to uncover how prepared global IT leaders are to meet current and future business demands. Of the six markets surveyed, Germany was found to be the best prepared to meet its digital transformation goals, closely followed by the U.S.; while Australia and Singapore lagged well behind their counterparts.   The research, which surveyed 630 IT leaders in the U.S., UK, France, Germany, Australia and Singapore, indicates that many organisations are at a tipping point, as new technology demands are set to outstrip the skills supply. Organisations that address this now through additional skills training will be in the strongest position to ensure business growth and competitive advantage.   Overall, an encouraging 91 percent of global IT leaders acknowledge that IT departments are currently recognised as very important or critical to innovation and business growth. However, over half (54 percent) predict they will struggle with a lack of IT talent in 12 months. Contributing factors identified from the research include skills shortages, prevalence of outdated skills, lack of commitment to training at the corporate board level and the rapidly changing technology environment.   “Businesses are approaching the peak of IT strategic influence,” said Phillip Coates, systems engineering manager, Australia and New Zealand for Brocade. “Now is the moment that IT teams feel they have the strongest opportunity to influence the transformation of their organisations. However, with a rapidly changing technology landscape and potential impact on international labour markets, it’s critical that IT receives the right training to further develop their skills and business relevance.”   The research also found that skills planning had to be aligned with other areas of business planning to avoid the risk of a technology skills deficit, where IT teams are expected to deliver the benefits of technologies that they are ill-equipped to implement.  Staff shortages and outdated skills preventing IT decision makers from delivering on current business demands Organisations are attempting to move their IT departments away from their traditional roles, but lack of skills and time required to learn those skills have held them back. IT decision makers believe this could be a major contributor to their inability to meet business demands, putting organisations at risk of falling behind their competitors and losing customers. Approximately one in four respondents in Australia, France, Germany, Singapore and the U.S. claim that they cannot deliver on current business demand due to staff shortages. This number rises to 42 percent in the UK. Respondents claim that the lack of access to talent will prevent them from implementing new technologies efficiently, lead to a decrease in employee satisfaction and result in the loss of market share. IT skills gap is likely to get worse and organisations need to act now The political landscape is also a contributing factor in the widening skills gap. As market uncertainty intensifies in the next few years, it is more important than ever for IT departments to remain agile and take advantage of new technologies. Ninety-two percent of those questioned had some level of concern about future hiring of IT staff, while 54 percent were concerned about a lack of skilled talent to choose from. Forty-three percent of global respondents agreed or strongly agreed that the current political climate makes it difficult to hire employees with the right skills. In the U.S. and Australia, the numbers were 52 percent and 54 percent respectively. Training time and investment will prove to be business-critical Training continues to be an issue as day-to-day IT maintenance tasks take priority. For organisations to address the technical skills deficit, they first need to invest time and money — or face the consequences. There is consistent demand globally to spend more time on increasing skills — from 15 percent of time that is currently spent on this to 22 percent. Respondents reported that insufficient budget (45 percent) and training time (45 percent) are constraining IT departments’ attempts to develop skills more than any other factors. These factors rise to 60 percent and 50 percent respectively in Australia, but drop to 37 percent and 30 percent in Germany. Currently, only three hours are allocated per week for learning and skills development. Respondents in Singapore average four hours of skills development per week. Sixty-seven percent of respondents agree that the key to closing the skills gap would be to spend more money on training. IT professionals need to take control of their professional future The research also showed that IT professionals at all levels must take increased responsibility for their own professional destiny, embracing the opportunities delivered by new technologies such as artificial intelligence (AI) and all areas of IoT from device management to security. Thirty-five percent of global respondents agreed or strongly agreed that their organisation’s IT team does not have the right skills to protect their jobs in the future. When asked to identify the one skill that they see as critical to their future career progression, cybersecurity was the most frequently cited, by 22 percent of respondents globally. AI and IoT security tied for second as the most critical skill at 18 percent. While AI was the most critical skill in France and Australia, IoT security was the most valued skill in Germany. AI could be a friend or foe AI could revolutionise the IT skills that are required and the way that we work. AI is likely to replace a number of IT roles and tasks, but this doesn’t mean the end for the IT department. Employees need to have the right skills to be in a position to work alongside AI and embrace its future impact, so that organisations can unleash its full potential. When asked which current roles were already being replaced by AI, desktop support (23 percent), data analyst (20 percent), software testers (17 percent), system architects (14 percent) and network engineers (11 percent) topped the list. Within the next 10 years, these numbers are expected to increase: desktop support (37 percent), data analyst (34 percent), software testers (33 percent), system architects (31 percent) and network engineers (31 percent). AI will also impact the role of the CIO, with almost half of the global respondents claiming increased focus from the business. Fifty-six percent of respondents believe that developing AI-related skills is key to securing a role in the future. Vital role of the board in ensuring long-term IT skills development Organisations’ boards will often dictate whether employees have the time and empowerment to develop their skills, but this is common at organisations that do not have the right support. The boards also have to ensure that skills and training improvements are aligned with other areas of business planning. Forty-four percent of respondents think that new skills acquisition is not seen as being as valuable as it should be by the board. This rises to 59 percent in Australia and 50 percent in the UK. The U.S. (42 percent), Germany (41 percent), Singapore (40 percent) and France (34 percent) had slightly more positive results. Almost a fifth of global respondents think their boards view gaining knowledge and skills as a cost to the business, rather than an asset. This rises to 35 percent in Australia. However, the majority of respondents in France (63 percent) and Germany (62 percent) see knowledge and skills growth as an asset. Despite respondents claiming that they plan approximately two years in advance for most areas of the business, staffing and recruitment is still on average only planned for a maximum of a year. This is creating a disconnect where organisations are attempting to address key IT challenges with teams not as well equipped in terms of skills and experience as they could be. Additional Resources Data in the study also revealed four main personas of global IT leaders, all with different levels of effectiveness when it comes to pioneering digital transformation projects and managing the skills of their teams. Supplementary Paper: “From Laggard to Leader – The Changing Personas of IT Leaders’ (Laggards, Evaluators, Adopters and Leaders)” Global and regional analysis of each persona in each of the countries surveyed (country breakdowns) Executive summary The study was conducted by independent research house Vanson Bourne in March 2017. 630 IT decision-makers in organisations with more than 500 employees in the U.S., U.K., France, Germany, Singapore and Australia were surveyed.  About Brocade Brocade® (NASDAQ:BRCD) networking solutions help the world's leading organisations turn their networks into platforms for business innovation. With solutions spanning public and private data centres to the network edge, Brocade is leading the industry in its transition to the New IP network infrastructures required for today's era of digital business. (www.brocade.com) # # #  © 2017 Brocade Communications Systems, Inc. All Rights Reserved.  Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties.  BROCADE MEDIA CONTACT Brocade APAC Corp Communications Wendy Lang Tel: +65 6317 2464wlang@brocade.comPR AGENCY CONTACT Einsteinz Communications Carlotta Vittori or Emma Keen Tel: +61 2 8905 0995brocade@einsteinz.com.au   ISACA Launches Real-time, Real-world Cyber Security Training Platform and Assessment Tool 2017-04-19T11:22:17Z isaca-launches-real-time-real-world-cyber-security-training-platform-and-assessment-tool Sydney, Australia (19 April 2017) – ISACA is changing how cyber security training is delivered with the latest additions to its Cybersecurity Nexus (CSX) portfolio of resources—the CSX Training Platform and Assessment Tool. The CSX Training Platform offers learners an easily accessible, constantly updated education environment that gives administrators clear insights into employee performance so organisations can ensure that they hire and retain the best talent on the front lines of cyber security defenses. The on-demand, performance-based training and assessment tool, conducted in live environments using real-world threat scenarios, is the first of its kind. Historically, organisations have had to rely on training mechanisms that are costly, inaccessible and quickly out-of-date due to the ever-changing threat environment. According to a recent ISACA survey, 52 per cent of respondents said they believe traditional cyber security training options leave staff only moderately to not-at-all prepared. With the growing skills gap, cyber security team leaders are looking to formally diagnose specific areas where they need to bolster skills, according to 62% of respondents. Real-time Skills Assessment The CSX Training Platform addresses those pain points with the first-of-its kind cloud-hosted assessment feature, which lets HR professionals evaluate the hands-on skills of cyber security job candidates and enables cyber security team leaders to assess the skills of their current staff. The CSX Assessment Tool gives hiring managers a critical resource when it comes to evaluating candidates and ultimately filling positions. Human resource departments and supervisors can use the tool to determine if applicants, or current employees, have the necessary hands-on skills for positions or promotions. Candidates respond to real-world threats in a live lab environment, and HR professionals will receive an immediate assessment of their skills, giving them a clear picture of what the candidate can and can’t do. “With its hands-on approach to cyber defense, the CSX Training Platform is an important learning solution for enterprises that want their front-line IT teams to be cyber-hardened, cyber-prepared and cyber-tested,” said Christos Dimitriadis, ISACA board chair and group director of information security at INTRALOT, “The ability to test and build skills will help enterprises address the significant skills gap problem they’re facing.” Performance-Based Training in a Live Network Environment The CSX Training Platform currently includes up to 100 hours of performance-based learning, divided among beginner, intermediate and advanced levels. It also features virtual versions of ISACA’s three CSX Practitioner courses, the CSX Practitioner Bootcamp, and the Cybersecurity Fundamentals course. The CSX Labs and courses will be updated continuously, and new ones will be added in response to evolving needs of cyber security teams and the threat landscape. “We consistently hear from CISOs around the world that cost and accessibility are significant barriers to getting their employees the hands-on training they need to be effective and advance their capabilities,” said Matt Loeb, ISACA CEO. “As part of our mission to narrow the skills gap and help enterprises develop their cyber workforce, ISACA developed the CSX Training Platform as an affordable solution that gives cyber security professionals complex scenarios to handle and live incidents to detect and mitigate.” The CSX Training Platform isn’t built as a one-size-fits-all for learners. With modules for all levels of practitioners, learners can be sure they are receiving flexible training that is appropriate for their skill level and helps them advance their capabilities in the areas that are most relevant to their work. Enterprises of all sizes can choose to have full access or modify the options to fit their needs. Additionally, with its cloud-based model, training can be accessed by employees on demand and without the expense of travel. Organisations are no longer forced to pull their IT staff away from their job to participate in off-site training. “Each organisation faces a unique set of threats, and the CSX Training Platform is designed to address those threats and test related skills. Our experts will constantly add to the platform, so we are able to build a training curriculum that supports the immediate and future needs of cyber security teams,” said Frank Schettini, Chief Innovation Officer for ISACA. “A cybercriminal builds an attack based on his or her domain of expertise. So why wouldn’t organisations enable security professionals to build defenses the same way?” Why Today? Though cyber security threats are growing in number and complexity, the professionals on the front lines of defense are not keeping pace, according to ISACA’s State of Cyber Security 2017 report. Hiring managers are having a hard time finding the right talent, citing issues such as: Nearly 1 in 3 organisations say it takes six months or more to fill open cyber security positions 37% of organisations say fewer than 1 in 4 candidates are qualified 1 in 5 organisations gets fewer than five applicants for open cyber security positions Additionally, cyber security leaders have a critical need to build the skills of their existing staff. The same survey found that fewer than half are confident in their team’s skills to detect and respond to complex cyber incidents. The CSX Training Platform is currently available for enterprise use. An individual version will be available later in 2017. For more information, visit www.isaca.org/CSXCyberTrainingPlatform. About ISACA ISACA® (isaca.org) helps professionals around the globe realise the positive potential of technology in an evolving digital world. By offering industry-leading knowledge, standards, credentialing and education, ISACA enables professionals to apply technology in ways that instill confidence, address threats, drive innovation and create positive momentum for their organisations. Established in 1969, ISACA is a global association serving more than 500,000 engaged professionals in 188 countries. ISACA is the creator of the COBIT® framework, which helps organisations effectively govern and manage their information and technology. Through its Cybersecurity Nexus™ (CSX), ISACA helps organisations develop skilled cyber workforces and enables individuals to grow and advance their cyber careers. Twitter: https://twitter.com/ISACANews LinkedIn: https://www.linkedin.com/company/isaca Facebook: www.facebook.com/ISACAHQ Instagram: https://www.instagram.com/isacanews/ Contacts: Julie Fenwick, 0468 901 655, jfenwick@iconinternational.com.au Dell Boomi Partners with CRM Online to Automate Data Integration for Field Services Firms 2017-04-18T00:37:33Z dell-boomi-partners-with-crm-online-to-automate-data-integration-for-field-services-firms Sydney, Australia – Apr. 18, 2017 – Leading cloud-based integration platform provider, Dell Boomi, has partnered with Australian field service software provider, CRM Online, to provide local enterprises and mid-market organisations with a simple integration solution for critical business systems and applications. As part of the agreement, CRM Online will combine Boomi’s integration platform-as-a-service (iPaaS) with its Fieldmagic field service solution. This will provide to joint customers a simple means of integrating field services data – such as customer information, invoicing, purchase orders and payment data – with their on-premises and cloud enterprise resource planning (ERP) systems. “A major challenge with implementing field services software is integration into accounting or ERP platforms – particularly for larger on-premises deployments,” said Glenn Richmond, Founder and CEO, CRM Online. “Without a dedicated integration solution, field services organisations rely on manual processes which give way to human error, duplication, and risk to data integrity. Boomi enhances our Fieldmagic solution by providing a drag-and-drop, cloud-based mechanism that enables automated enterprise integration with a wide range of best-of-breed systems.” Unlike competing platforms that often require complex on-premises software installations even prior to designing integrations, Boomi’s architecture provides out-of-the-box connectors for major ERP solutions, and allows organisations to scale based on their unique business requirements. Dell Boomi significantly accelerates delivery, increases the robustness and lowers cost of implementation of any ERP integration with Fieldmagic. “The combination of CRM Online’s Fieldmagic and our iPaaS solution provides joint customers with a ‘quick and easy’ yet comprehensive way to centralise critical systems and applications,” said Michael Evans, Managing Director Asia-Pacific and Japan, Dell Boomi. “This means organisations can use the best-of-breed technologies they want while also ensuring the wider business is properly aligned. This is particularly important for large and diverse organisations which don’t want to be held hostage by inflexible and rigid environments.” About Fieldmagic Fieldmagic is a leading field services platform that combines the flexibility of CRM with quoting, job management, scheduling, maintenance and asset management to provide a leading end to end solution for field service organisations. Visit http://www.fieldmagic.co for more information. About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,300 organizations of all sizes use the Boomi platform to run smarter, faster, and better. Boomi also helps customers drastically reduce implementation times and offers substantial cost savings over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © 2017 Boomi Inc. Dell and Dell Boomi are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others. Teachers Mutual Bank Integrates Major Digital Transformation Strategy with Dell Boomi 2017-04-11T01:00:00Z teachers-mutual-bank-integrates-major-digital-transformation-strategy-with-dell-boomi Sydney, Australia – Apr 11, 2017 – Dell Boomi™ (Boomi), the number one integration cloud provider, announced that Teachers Mutual Bank (TMB) is using the Boomi integration platform as part of its multi-year, multi-million-dollar digital transformation strategy. With Boomi’s integration platform-as-a-service (iPaaS), TMB has created a flexible, enterprise-wide data environment that links its core customer management system and extensible services layer with its internal processes. This has boosted TMB’s competitiveness against Tier 1 banks by connecting multiple capabilities, and enabled it to quickly and easily capitalise on new technologies, including innovations in fintech. Boomi has also provided TMB the critical capability to connect to the latest third party fintech developments. The Bank has already engaged with Spriggy (a prepaid Visa card for children controlled through a mobile app) and is considering personal financial management applications that will deliver additional secure, customer service capabilities to its members. These powerful automation capabilities within the Boomi platform have resulted in reduced operating costs for the Bank, and cost savings are expected to increase significantly as Boomi is integrates further to the core banking systems and processes, including planned integration of Business Process Management toolsets to streamline all banking operations. The Boomi project is the final piece of TMB’s wider digital strategy through which it overhauled its customer service capabilities. Recognising the need to provide an omni-channel, mobile-first experience, the Bank developed a digital roadmap in 2013; since commencement, the initiative has encompassed multiple deployments supported by significant investment budgets. This included connectivity to manage third party management campaigns, EDW inbound data feeds from cloud based data sources and SMS integration with webforms for new brand opportunities, among other initiatives. As well as allowing TMB to maximise value from existing investment, the Boomi platform supports merger activity and expansion objectives by providing a means to quickly plug new businesses into existing operations. “When we kicked off our long-term digital project, it was clear that mobile platforms were going to be the prominent platform-of-choice for our members’ interactions with the Bank,” said David Chapman, Chief Information Officer at TMB. “In particular, we correctly anticipated that integration best-of-breed apps from third party developers would provide the best platform to deliver omni-channel experiences on customers’ terms.” “Once we modernised our environment through the introduction of these best-of-breed apps, we needed the critical component to tie all that data together on an ongoing basis. We selected Boomi for its powerful cloud-based and user-friendly integration software so that we can ensure that all data is accurate and up-to-date no matter where it is accessed.” “The financial services sector is hotly contested, with banks under pressure to meet increasingly-demanding customer expectations,” said Michael Evans, Managing Director Asia-Pacific and Japan at Dell Boomi. “By leveraging the cloud to connect its customer services platform with leading apps which customers rely on a day-to-day basis, Teachers Mutual Bank can continue to create uniquely tailored and flexible customer experiences.” About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,300 organizations of all sizes use the Boomi platform to run smarter, faster, better. Boomi also helps customers drastically reduce implementation times and offers substantial cost savings over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © Dell and Dell Boomi are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others. LogMeIn integrates join.me and OpenVoice 2017-04-06T00:29:15Z logmein-integrates-join-me-and-openvoice SYDNEY, AUSTRALIA – 6 April, 2017 – LogMeIn, Inc. (NASDAQ:LOGM) today announced that two of its Communications and Collaboration portfolio products,  join.me and OpenVoice, have integrated to offer join.me users a toll-free dial-in option. This integration is the first example of LogMeIn bringing together the functionally of two products since the close of the merger between LogMeIn and the GoTo family of products on 1 February,2017. With this integration, join.me is now included alongside GoToMeeting, GoToWebinar and GoToTraining as LogMeIn products that leverage the OpenVoice technology integrated directly into the meeting experience. As a result, LogMeIn can now offer the ability to seamlessly incorporate a toll-free option into meetings across entire collaboration portfolio, eliminating the cost of the call for the meeting attendees.   The merger between LogMeIn and the GoTo family of products brought industry leading communications and collaboration products GoToMeeting, GoToWebinar, GoToTraining, join.me and OpenVoice under one roof to create simpler, more intelligent ways for people to meet, market and train. LogMeIn’s combined communication and collaboration products support 20 million users, over 900 million conferencing minutes a month contributing to over 7 million meetings per month, and 12 billion voice minutes per year.   “We’ve long seen the benefits of offering OpenVoice Integrated to our GoToMeeting, GoToWebinar, and GoToTraining customers, and we immediately saw the potential of adding the same functionality to join.me, giving those customers, for the first time, a toll-free calling solution once our companies merged,” said, Chris Battles, Chief Product Officer, LogMeIn. “In just two months as one company we’ve been able to add value for join.me users by adding an option that reduces the barrier for meeting hosts to reach their clients, customers, or prospects making sure that attendees never have to pay the cost of the phone call.”   With OpenVoice Integrated, join.me Pro and Business users now have the option to add a toll-free dial-in option to their meetings. Attendees will be able to choose the dial-in option that is most convenient for them -- VoIP, local phone numbers, or toll-free. The integration also expands join.me’s audio coverage to additional international countries, bringing the total number of countries supported with local or toll-free numbers to nearly 70. The complementary tools allow users to leverage LogMeIn products to absorb the cost of calling in order to reach more customers, potential customers or clients and create a better experience for the attendees.   For more information please visit: https://join.me/toll-free    About LogMeIn, Inc. LogMeIn, Inc. (NASDAQ:LOGM) simplifies how people connect with each other and the world around them to drive meaningful interactions, deepen relationships, and create better outcomes for individuals and businesses. One of the world’s top 10 public SaaS companies, and a market leader in communication & conferencing, identity & access, and customer engagement & support solutions, LogMeIn has millions of customers spanning virtually every country across the globe. LogMeIn is headquartered in Boston with additional locations in North America, Europe, Asia and Australia.    Media contact: Gloria Lee Espresso Communications on behalf of LogMeIn +61 2 8016 2200logmein@espressocomms.com.au   ### Geoscape Offers World-First Decision Making Capabilities to Australian Organisations 2017-04-04T22:57:33Z geoscape-offers-world-first-decision-making-capabilities-to-australian-organisations Locate17 – Sydney, Australia – 5th April, 2017: PSMA Australia, a provider of the nation’s location datasets, today officially launched its award-winning innovation in location intelligence, Geoscape. In a world-first, Geoscape enables Australian organisations to make better decisions using location-based insights that were previously too costly or time consuming for most businesses to access. This is the first time location information and data analytics have been combined and made available in this way, on a national level. PSMA also confirmed the much-anticipated Sydney dataset will be released on 5th April, 2017, with the national rollout due for completion by early 2018. To download a sample of Geoscape, visit: www.geoscape.com.au/get-geoscape/ “Geoscape is a breakthrough in location-based intelligence that provides essential infrastructure for Australia’s digital economy, and puts Australia on the world map as a leader in this technology,” said Dan Paull, PSMA’s Chief Executive Officer. “As a business intelligence tool, Geoscape gives organisations the opportunity to improve services and increase revenue through evidence-based decision making. It will be used by governments to improve Australia’s future planning, development and management, including everything from building smarter cities to keeping people safe during fires, floods and other natural disasters. There’s also a vast range of applications in the private sector, with particular interest coming from the telecommunications, insurance and utilities sectors.” DigitalGlobe, Inc. (NYSE: DGI), the global leader in Earth imagery and information about our changing planet, uses a range of geospatial technologies to deliver core components of the Geoscape dataset. By connecting the world's highest quality commercial satellite imagery and an ecosystem of analytics partners on the Geospatial Big Data platform (GBDX), DigitalGlobe is able to automatically and accurately extract many types of features about the built environment at continental scale. "The convergence of high-resolution satellite imagery, cloud computing, and machine learning technologies has created some incredibly exciting opportunities for organisations to analyse man-made and natural environments at country and continent scales more quickly and efficiently than ever before,” said Dr. Walter Scott, DigitalGlobe Founder, CTO, and EVP. “We are proud to partner with PSMA Australia to harness these innovations and create a digital index of Australia’s built environment that will benefit a wide range of industries, including business intelligence, insurance, and telecommunications.” How Geoscape works PSMA has collaborated with DigitalGlobe to create the Geoscape dataset, which uses a combination of satellite imagery, crowdsourcing and machine learning to capture attributes of the built environment and link each building to a geocoded address. Organisations can see and analyse this data to gain new insights and improve the way they plan and operate. The data includes building footprints and heights, roof construction, land cover, tree heights, the presence of solar panel installations and swimming pools, and more. The data can be visualised using mapping platforms and 3D modelling tools. New opportunities for enhanced service delivery As Internet of Things (IoT) ecosystems evolve and smart cities become a reality, Geoscape can underpin them by linking a wide range of information generated about the lifecycle of the built environment. Data from a rich mesh of sensors can be tied to a location, an address, a legal land parcel and an area, ranging from a single building, to a few streets, to a planning zone or a region. Geoscape creates a wide range of opportunities for improved service delivery including in: Risk management (flood modelling, fire risk modelling, wind impact assessment) Geoscape provides information about the size and roof construction of buildings, their proximity to vegetation and other buildings and a model of terrain to support the assessment of risk. Market assessment For businesses providing property related services Geoscape provides information about buildings, solar panel installations, swimming pools, roofing material, surfaces and vegetation. Telecommunications Geoscape supports the rollout of wi-fi and 5G networks by providing a model of the terrain and information on the shape and heights of buildings and tree cover to support blackspot analysis. Natural disaster impact assessment Preliminary post-event assessment of the likely impact of natural disasters on building infrastructure and vegetation. Valuations Provides building sizes, number, roofing information, vegetation location, heights and basic land use for the valuation process. How Pitney Bowes uses Geoscape Pitney Bowes has been a partner of PSMA Australia for over 15 years. Geoscape is the main dataset used by Pitney Bowes to create its GeoVision product. The data captured in Geoscape is taken and combined with Pitney Bowes location intelligence platforms to create unique and leading edge solutions, which are capturing world-wide recognition. For more information, please see a case study www.geoscape.com.au/showcase/. Australia's ground-breaking Geoscape is rolling out, region by region, across Australia. For progress on the national rollout of Geoscape, view the release schedule at www.geoscape.com.au/rollout/. Download your free trial To download a sample of Geoscape to see how it could be used in your organisation, visit www.geoscape.com.au/get-geoscape/ Want to know more? If you’re interested in speaking with PSMA to learn more about Geoscape, you may visit them at Booth 110 and 112 at Locate17 or contact marketing@psma.com.au. For more information: www.geoscape.com.au/ About PSMA Australia PSMA Australia’s goal is to facilitate broad and sustainable access to high-quality location data by offering foundational national spatial information derived from the authoritative data sources of Australia’s federal, state and territory governments and private sector partners. PSMA was formed by the governments of Australia in 1993 to collate, transform and deliver their location data as national datasets. An unlisted company limited by shares, PSMA is owned by all the governments of Australia. As an independent and self-funded business, PSMA is able to collaborate beyond government to drive innovation and provide fundamental infrastructure for a digital world. For more information visit: www.psma.com.au/ About DigitalGlobe DigitalGlobe is a leading provider of commercial high-resolution earth observation and advanced geospatial solutions that help decision makers better understand our changing planet to save lives, resources and time. Sourced from the world's leading constellation, DigitalGlobe’s imagery solutions deliver unmatched coverage and capacity to meet its customers' most demanding mission requirements. Each day customers in defence and intelligence, public safety, civil agencies, map making and analysis, environmental monitoring, oil and gas exploration, infrastructure management and navigation technology, and providers of location-based services depend on DigitalGlobe data, information, technology and expertise to gain actionable insight. For more information visit: www.digitalglobe.com/ Media Contact: Kate Donnelly Spectrum Group psma@spectrumgroup.is +61 2 9469 5700 Carbon Black named best endpoint detection and response solution by security professionals in SANS Institute Awards 2017-04-03T23:51:33Z carbon-black-named-best-endpoint-detection-and-response-solution-by-security-professionals-in-sans-institute-awards SYDNEY—April 4, 2017—Carbon Black, the leader in next-generation endpoint security, today announced it has been named Best Endpoint Detection and Response Solution by security professionals in the SANS Institute’s Best of 2016 Awards.   The SANS Best of Awards are not driven by vendors, but by the people actually using the products. The awards are an extension of the SANS ‘WhatWorks’ Program, which creates awareness of security programs and solutions that are actually being used to stop bad guys and improve security.   Carbon Black won the 2014 SANS Best of Award for Endpoint Protection and was named honorable mention in the same category in 2015.   "The SANS Best of Awards were created to showcase solutions from around the world that are making a difference by reducing the business impact of cyberattacks in real world applications. By increasing awareness of these solutions, we believe we can help security professionals reduce the number of successful intrusions, as well as greatly reduce the business impact of those that do get through," said John Pescatore, director of emerging security trends, SANS.   Carbon Black helps organisations of all sizes to replace ineffective antivirus, lock down endpoints and critical systems, and arm incident response teams with the most advanced tools to hunt down threats. More than 3,000 worldwide customers, including 30 of the Fortune 100, trust Carbon Black to protect their endpoints from the most advanced cyberattacks, including non-malware attacks.   Using a combination of endpoint and cloud-based technologies, Carbon Black delivers a breakthrough security model known as ‘streaming prevention’ to block malware as well as increasingly common attacks that exploit memory and scripting languages, such as PowerShell.    Streaming prevention continuously updates a risk profile based on a steady stream of computer activity. When multiple potentially malicious events occur in succession, streaming prevention blocks the attack. This breakthrough in prevention leapfrogs machine-learning AV, which focuses exclusively on files and does nothing to target an attacker’s behaviours.   “We are honoured to receive this award from the SANS Institute,” said Patrick Morley, Carbon Black’s president and chief executive officer. “The SANS community is among the most talented and well respected in the cybersecurity industry. Being selected as the best endpoint security solution by the best and brightest in the industry reflects the hard work we are doing at Carbon Black to protect worldwide organisations from advanced attacks.”  About Carbon Black Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, streaming prevention, to instantly see and stop cyberattacks. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 3,000 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.Contact: Marie Evans, Carbon Black.marie.evans@carbonblack.com 61 (0) 412 044 072       Carbon Black espionage expert offers five viewpoints on state-sponsored hacking 2017-04-03T23:48:08Z carbon-black-espionage-expert-offers-five-viewpoints-on-state-sponsored-hacking-1 Former CIA operative Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. As Carbon Black’s national security strategist and a practising attorney, he specialises in cybersecurity vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting. O’Neill served as an operative for the FBI, where he conducted national security field operations against terrorists and foreign intelligence agents. His role in the investigation and capture of the most notorious spy in U.S. history, Robert Philip Hanssen, became the subject of Universal Studio’s movie Breach, released to critical acclaim in 2007. Carbon Black’s editorial team asked O’Neill five questions on state-sponsored hacking:How serious a problem are state-sponsored hacking attacks for public and private sector organisations? Public and private sector organisations should have made cybersecurity a priority in 2014 when North Korea attacked Sony’s studios in Culver City, California. The Sony breach sent a warning flag that societies’ quest for rapid and efficient information sharing and ease of access to information had critically increased our vulnerability to cyberattacks. Unfortunately, we didn’t listen. Over the past three years, catastrophic security breaches have stolen information, probed the critical infrastructure of major western countries, provided economic advantages to China, political advantages to Russia, fuelled the North Korean and Iranian need for revenge, and have fed the espionage machine of all nations that spy. Even ISIS and other terrorist organisations are getting into the game as they amass the capability to launch digital attacks. Cyber espionage and cyber terrorism are the most critical threats facing the public and private sector in the United States and the United Kingdom, and there is no reason to suppose that Australia/New Zealand might not be future targets. Such cyber attacks are a greater threat than even kinetic terrorism. They are cheaper to launch, easier to design and benefit from an inherent difficulty to track back cyber attacks to their source.What are the motivations behind state-sponsored hacking attacks? Cyber espionage and cyber terrorism share the same motivations that traditional espionage and kinetic terrorism pursue. Indeed, cyber espionage has supplanted traditional spy craft as the primary intelligence gathering method for state-sponsored spies. The traditional spy playbook provides a clear understanding of the motivations behind cyber espionage. Russia’s attack against the American DNC and Hillary Clinton’s presidential campaign, for example, sought to mine critical policy information for a potential incoming president and sabotaged the presidential campaign through the targeted release of information. Gathering intelligence and disruption are hallmark purposes of espionage. Iran and Russia have probed certain power companies in the United States through malware attacks. These probe attacks typically suggest that an infrastructure attack may be forthcoming. China has preyed upon both the United States government and private business – particularly in the technology and healthcare sectors. China’s attack on the Office of Personnel Management stole critical personal information about US government employees that can be used to recruit sources – through blackmail, greed or ideology. China’s attack on Anthem through a clever spear phishing attack using social media collected further information about numerous government employees insured by Anthem as well as private citizens. Policy decisions of great nations are driven by intelligence gathered by spies. As we have placed our information in databases accessible to outside Internet breaches, we have made spycraft easier. We are in the decade of the cyberspy.Do you see the volume/severity of state-sponsored attacks increasing or decreasing in the future? State-sponsored attacks have grown since 2010 and will continue to grow at a sharp incline. Kinetic warfare is expensive and inconsequential in a world where cyber terrorism and warfare can cause significantly more damage. A nation can also carefully launch cyber attacks behind a veil of anonymity and deniability. This has been the modus operandi of China and Russia for years. Cyberattacks allow a nation to strike tactically to pursue an often-unknown agenda without the repercussions and proportional responses a kinetic attack demands.Should nation states/governments engage in cyber arms control treaties that limit the type of cyber weapons they use against each other, or the circumstances in which they use them? I am concerned that we will see a catastrophic cyberattack on the United States critical infrastructure in the near future. The United States has not prepared adequately to prevent such an attack. Our outdated and decentralised systems are poorly patched and are vulnerable, and the government does not have a sufficient response plan. These are the sorts of attacks that would benefit from an arms-control treaty. However, because cyberattacks are nefarious in their ability to strike anonymously, treaties and negotiations are the smallest part of a defensive strategy. Cybersecurity requires both the private and public sectors to combine their efforts in stopping attacks. Prevention and defence requires hardening our cyber infrastructure, protecting our information systems, training personnel in analytics – the ability to understand an attack and hunt threats – and providing the tools and practices that give threat hunters visibility into the threats.Have you see any initiatives of this type being discussed/implemented? Are they feasible/practicable? At Carbon Black we have advocated an understanding that cybersecurity is national security. If we seek a world safe from cyberattacks, the world needs to catch up to the attackers. Too often, security and governments play defence against attacks after the enemy has launched them. Effective cybersecurity requires active threat hunting to discover attacks before they land and prevent damage. Cybersecurity and counterintelligence must align to stop the threats. In other words, just as the spies have become hackers, our cybersecurity professionals must become spy hunters.                                                                                                       Carbon Black espionage expert offers five viewpoints on state-sponsored hacking 2017-03-31T00:36:32Z carbon-black-espionage-expert-offers-five-viewpoints-on-state-sponsored-hacking Former CIA operative Eric O’Neill is a thought leader on a wide range of issues, including counter terrorism and national security matters. As Carbon Black’s national security strategist and a practising attorney, he specialises in cybersecurity vulnerability assessments, counterintelligence and counter terrorism operations, investigations into economic espionage, internal investigations and security risk assessment consulting. O’Neill served as an operative for the FBI, where he conducted national security field operations against terrorists and foreign intelligence agents. His role in the investigation and capture of the most notorious spy in U.S. history, Robert Philip Hanssen, became the subject of Universal Studio’s movie Breach, released to critical acclaim in 2007. Carbon Black’s editorial team asked O’Neill five questions on state-sponsored hacking:How serious a problem are state-sponsored hacking attacks for public and private sector organisations? Public and private sector organisations should have made cybersecurity a priority in 2014 when North Korea attacked Sony’s studios in Culver City, California. The Sony breach sent a warning flag that societies’ quest for rapid and efficient information sharing and ease of access to information had critically increased our vulnerability to cyberattacks. Unfortunately, we didn’t listen. Over the past three years, catastrophic security breaches have stolen information, probed the critical infrastructure of major western countries, provided economic advantages to China, political advantages to Russia, fuelled the North Korean and Iranian need for revenge, and have fed the espionage machine of all nations that spy. Even ISIS and other terrorist organisations are getting into the game as they amass the capability to launch digital attacks. Cyber espionage and cyber terrorism are the most critical threats facing the public and private sector in the United States and the United Kingdom, and there is no reason to suppose that Australia/New Zealand might not be future targets. Such cyber attacks are a greater threat than even kinetic terrorism. They are cheaper to launch, easier to design and benefit from an inherent difficulty to track back cyber attacks to their source.What are the motivations behind state-sponsored hacking attacks? Cyber espionage and cyber terrorism share the same motivations that traditional espionage and kinetic terrorism pursue. Indeed, cyber espionage has supplanted traditional spy craft as the primary intelligence gathering method for state-sponsored spies. The traditional spy playbook provides a clear understanding of the motivations behind cyber espionage. Russia’s attack against the American DNC and Hillary Clinton’s presidential campaign, for example, sought to mine critical policy information for a potential incoming president and sabotaged the presidential campaign through the targeted release of information. Gathering intelligence and disruption are hallmark purposes of espionage. Iran and Russia have probed certain power companies in the United States through malware attacks. These probe attacks typically suggest that an infrastructure attack may be forthcoming. China has preyed upon both the United States government and private business – particularly in the technology and healthcare sectors. China’s attack on the Office of Personnel Management stole critical personal information about US government employees that can be used to recruit sources – through blackmail, greed or ideology. China’s attack on Anthem through a clever spear phishing attack using social media collected further information about numerous government employees insured by Anthem as well as private citizens. Policy decisions of great nations are driven by intelligence gathered by spies. As we have placed our information in databases accessible to outside Internet breaches, we have made spycraft easier. We are in the decade of the cyberspy.Do you see the volume/severity of state-sponsored attacks increasing or decreasing in the future? State-sponsored attacks have grown since 2010 and will continue to grow at a sharp incline. Kinetic warfare is expensive and inconsequential in a world where cyber terrorism and warfare can cause significantly more damage. A nation can also carefully launch cyber attacks behind a veil of anonymity and deniability. This has been the modus operandi of China and Russia for years. Cyberattacks allow a nation to strike tactically to pursue an often-unknown agenda without the repercussions and proportional responses a kinetic attack demands.Should nation states/governments engage in cyber arms control treaties that limit the type of cyber weapons they use against each other, or the circumstances in which they use them? I am concerned that we will see a catastrophic cyberattack on the United States critical infrastructure in the near future. The United States has not prepared adequately to prevent such an attack. Our outdated and decentralised systems are poorly patched and are vulnerable, and the government does not have a sufficient response plan. These are the sorts of attacks that would benefit from an arms-control treaty. However, because cyberattacks are nefarious in their ability to strike anonymously, treaties and negotiations are the smallest part of a defensive strategy. Cybersecurity requires both the private and public sectors to combine their efforts in stopping attacks. Prevention and defence requires hardening our cyber infrastructure, protecting our information systems, training personnel in analytics – the ability to understand an attack and hunt threats – and providing the tools and practices that give threat hunters visibility into the threats.Have you see any initiatives of this type being discussed/implemented? Are they feasible/practicable? At Carbon Black we have advocated an understanding that cybersecurity is national security. If we seek a world safe from cyberattacks, the world needs to catch up to the attackers. Too often, security and governments play defence against attacks after the enemy has launched them. Effective cybersecurity requires active threat hunting to discover attacks before they land and prevent damage. Cybersecurity and counterintelligence must align to stop the threats. In other words, just as the spies have become hackers, our cybersecurity professionals must become spy hunters.                                                                                               Hello Social founder launches new social media tool Rivuu 2017-03-24T00:29:48Z hello-social-founder-launches-new-social-media-tool-rivuu A new social media content approval and scheduling software, Rivuu, is helping marketers reduce the time spent working on social media by streamlining the workflow for faster turnaround times and some of Australia’s largest agencies and brands are already using it. Rivuu enables marketers to reduce the time spent using social media without compromising results. It has already seen over 1000 users sign up since its launch and boasts a client list that includes the likes of Mazda, Ogilvy, Carlsberg, World Vision, Brut, Leo Burnett and jewellery brand Pandora. Launched in January this year, Rivuu was founded by Max Doyle, who is also managing director of Sydney based social media agency, Hello Social,. The technology was launched after Max and his team of 16 were experiencing the bottleneck that many companies struggle with when it comes to getting social media content approved and scheduled. “We realised at Hello Social there were just too many people and tools involved in the content creation, approval and scheduling process. We thought if we could have the whole process in one tool it would significantly improve productivity. So, we created a platform that brings copywriters, graphic designers, community managers and clients/managers all together, making it possible to approve and schedule content with one click,” says Max. Once content is created and approved, Rivuu ensures users schedule it on Facebook, Twitter and even Instagram at the optimum time for maximum reach and engagement. Rivuu analyses the best time of day and the day of the week to find the optimal time to schedule each post. “We wanted to make the functionality of the user experience as intuitive as possible. All content can be viewed on one calendar and sorted by platform, category and schedule stats. The customisable workflow means users can also adjust their content approval process to fit any team structure, adding as many approval rounds as they need.” Social media is becoming an increasingly important tool for marketers to grow their businesses. A significant 63% of marketers use social media for 6 hours or more a week and 39% for 11 or more weekly, according to Social Media Examiner[1]. “We’ve had overwhelmingly positive feedback from our clients who all say they’ve noticed a considerable reduction in the time it takes get content approved and scheduled.” Rivuu is now looking to expand with Max heading to the US this month to meet with investors. “We’ve been in talks with several VCs who’ve expressed interest and have already received a series A funding offer,” says Max. https://rivuu.com/ [1] https://www.socialmediaexaminer.com/wp-content/uploads/2016/05/SocialMediaMarketingIndustryReport2016.pdf Avaya Australia and New Zealand Bolsters Team with Senior Sales, Channel Appointments 2017-03-21T01:35:36Z avaya-australia-and-new-zealand-bolsters-team-with-senior-sales-channel-appointments Sydney, Australia – March 21, 2017 – Avaya Australia and New Zealand has expanded its team with the appointment of Mitch Walkaden and Steve Williams to lead its local sales and channel operations, respectively. The company has also announced new hires and promotions to build on its continued business transformation. Walkaden has been appointed Director of Midmarket Sales and Distribution in A/NZ, with responsibility for working with customers and distributors to develop and support digital transformation strategies. His assignment follows two years with the company, having previously held the role of Distribution Account Manager. Williams has been elevated to Regional Channel Leader A/NZ, tasked with working with Avaya’s partners to deliver customisable and flexible solutions to joint clients. Williams joined Avaya in mid-2014, bringing to the company more than 10 years’ experience in IT channel management. Avaya A/NZ has also bolstered its ranks with new hires in Gary Walters and Brett Stevenson, who will fill the roles of Territory Account Manager NSW/Queensland and Sales Engineer, respectively. Both join Avaya with strong communications and telecommunications backgrounds, having held positions at companies including Truphone, M2 Group, Telstra and Optus. Additionally, as part of its investment in the wider IT industry, Avaya A/NZ has named two successful graduates of its local Graduate Program, with Shehara Hapugalle and Lloyd Nucup securing promotions to Channel Account Manager and Sales Engineer, respectively. Quotes: “Avaya A/NZ has undergone a significant transition over the last 18 to 24 months to ensure we’re more closely aligned with the needs of customers in today’s digital context. We’ve made key changes to how we operate and deliver outcomes to our customers that address challenges around Internet of Things, mobility, artificial intelligence, and more. These set of appointments marks the next phase of that continued transformation, allowing us to continue to building on the standard of solutions and services we deliver to customers and partners.” Peter Chidiac, Managing Director Australia and New Zealand, Avaya About Avaya Avaya enables the mission critical, real-time communication applications of the world’s most important operations. As the global leader in delivering superior communications experiences, Avaya provides the most complete portfolio of software and services for contact center and unified communications with integrated, secure networking— offered on premises, in the cloud, or a hybrid. Today’s digital world requires some form of communications enablement, and no other company is better positioned to do this than Avaya. For more information, please visit www.avaya.com. Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements. All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners ### BroadSource Launches EMU SaaS in Europe 2017-03-18T04:01:17Z broadsource-launches-emu-saas-in-europe London, England, 18 March 2017. BroadSource Europe Ltd, a specialist global software development and telecommunications engineering company, today announced the launch of EMU SaaS (Software as a Service) platform for its existing and prospective European customers. EMU, developed by BroadSource, allows global Service Providers, who utilise the BroadWorks™ UC platform, to better manage the day-to-day complexity of subscriber configuration information. EMU is already available in Asia as a SaaS and is now also available for European Service Providers via the EMU SaaS delivery model. Fifteen years of telco engineering experience, coupled with today’s Cloud delivery technologies means that EMU can now solve Service Provider problems as a Cloud Service across Europe. Haydn Faltyn, BroadSource co-founder and CEO noted, “We are so pleased to be launching EMU SaaS to our European customers. This technology is unique to the Cloud UC ecosystem. Our customers have been benefitting from EMU operating within their own environment or our Asian point of presence for a number of years now. This next milestone means that our European Service Providers customers can now also benefit from a subscription to EMU SaaS. The power of EMU is solving really practical, everyday problems for our customers and their Cloud UC environments based on BroadWorks™ technology. We are delighted with the feedback so far and excited to have EMU available in Europe About EMUEMU is an Extraction, Manipulation and Update (EMU) platform for Cloud UC developed by BroadSource and specialising in the BroadWorks™ platform. With just one click, Service Providers can: EXTRACT every piece of information from their BroadWorks™ environment to audit, analyse or backup customer group configurations MANIPULATE thousands of configuration attributes in seconds, preparing for migrations UPDATE, en masse, configuration settings, saving hundreds of ‘clicks’ and many hours Our European CustomersUsing their own secure BroadWorks™ credentials, Service Providers and their partners can perform one or all of the services hosted within the BroadSource multi-tenanted, fully redundant EMU SaaS instance. EMU now performs many subscriber manipulation tasks that where once thought of as impossible. As Cloud UC subscriptions take over premise PBX numbers, EMU is perfectly positioned to allow the Service Provider to rapidly scale, contain operational costs and simplify the management of large volumes of subscriber configuration data. Service Providers in Europe now have an array of ‘every day use cases’ to better manage their BroadWorks ™ powered Cloud UC platform. Typical examples include: Customer migrations to Cloud UC Consolidation of voice platforms through mass subscriber migration Configuration auditing of thousands of users, each with thousands of settings in real ime, on a single page Real time customer configuration comparisons in a help desk to reduce time to restore customer issues Updates to configurations en masse Bulk provisioning Group backup and restore and; License and Service Pack reporting, managing compliance and leakage Subscription to EMU SaaS is based on one or all of the following functions: EMU Audit EMU Update EMU Provision EMU Migrate EMU Backup EMU Restore EMU Compare EMU Reporting BroadSource MarketingPlease direct enquires to: marketing@broadsource.com.au NSFOCUS launches in Australia, ideally placed to halt cyber attack tsunami from China 2017-03-17T23:18:14Z nsfocus-launches-in-australia-ideally-placed-to-halt-cyber-attack-tsunami-from-china SYDNEY, March 17, 2017 – NSFOCUS, a global provider of intelligent hybrid DDoS defences, today announced its launch into Australia. The company believes it is uniquely placed to defend against cyber-attacks from China.   Recent reports have indicated that up to 40 percent of global cyber-attacks are associated with China and the exploits discovered in this region can take days, weeks, or even months before they are replicated elsewhere.   “NSFOCUS Global Threat Intelligence is ideally placed to help Australian organisations improve their awareness and enterprise security posture – delivering both strategic and tactical intelligence, and providing organisations with a complete view of the global threat landscape, including China,” said Attley Ng, Senior Vice President Asia Pacific, NSFOCUS.   NSFOCUS is the only company that can provide insight from inside China as well elsewhere around the world, making it uniquely qualified to help mitigate these risks before they escalate. With more than 4,000 active customers, 12,000 network sensors, extensive honeypot networks, over 700G of data collected daily, and visibility into 400 million endpoints, NSFOCUS’ suite of Threat Intelligence solutions help organisations to get ahead of future attacks by implementing countermeasures quickly to protect critical assets.   “The launch of NSFOCUS into Australia is a natural extension of our progress across Asia Pacific,” said Mr. Ng. “Australia has a mature information technology market, with a rich depth of IT expertise that includes cyber security professionals, yet corporates and governments are still falling prey to cyber-attacks.”   He added: “In the aftermath of the massive cyber-attacks the world witnessed last year, organisations in Australia and worldwide can no longer rely solely on threat intelligence feeds to alert them to risks.   “Despite rapid innovation to combat growing threats, security professionals with limited intelligence resources still struggle to keep up with the overwhelming amount of data points these systems aggregate. Implementing a holistic, intelligence-driven solution with true global insight can help security teams to understand strategic and tactical intelligence – not just feed data - to take immediate action on the threats to their business. Our worldwide team of researchers and engineers work around the clock to help customers gain visibility and threat context to effectively respond to threats, both known and unknown.”   The NSFOCUS Threat Intel feed integrates seamlessly with the company’s Cloud and On-Premises DDoS defences, giving organisations such as government, big enterprises and service providers in Australia an additional layer of secured protections.   NSFOCUS has appointed Aquion as its Authorised Value Distributor, to provide localised support to the Australian market and help in recruitment and enabling security channel partners. Already NSFOCUS has committed to sponsoring two major security events this year: the AISA security conference and AusCert 2017.   Stephen Balicki, Managing Director, Aquion said: “Our partnership with NSFOCUS presents us with exceptional opportunities, as their comprehensive solutions deliver a real edge in the data security arena. These will appeal to channel partners and reinforce our AqSEC business unit which helps customers to monitor, manage and secure all elements of enterprise infrastructure using the best technologies.”   “As an endorsement of our capabilities, NSFOCUS is the leading choice when it comes to data security options,” said James Braunegg, Managing Director of Melbourne-based Micron21. “Our Tier IV data centre is the first in Australia to achieve Uptime Institute Tier IV Fault Tolerant Design Certification. This establishes Micron 21 as the most secure, reliable and high calibre commercial information technology facility in Australia.   “In addition to our Tier IV compliance, Micron 21 is ISO 27001 certified. To achieve these stellar standards, we researched the best data security options, and selected NSFOCUS. Now we are confident that reliability, security and premium technology set the standard for our services.”   The NSFOCUS suite of Threat Intelligence solutions includes:   NSFOCUS Threat Intelligence (NTI) Portal: Allows users to gain additional insight into various threats and threat actors via research, data collection, and analysis of crowdsourced information. NSFOCUS customers can drill deeper into detail on threats, upload malware samples for analysis, and monitor/track IP addresses with automatic notifications – providing a tailored experience for the most relevant threats. Threat Analysis Alerts and Reports: NSFOCUS provides timely analysis on threat trends, campaigns and actors, in addition to critical vulnerabilities identified. Via weekly blogs, emergency alerts and regularly released reports, customers are updated on the latest threat information available. Actionable Data Feeds: Delivered by strategically located NSFOCUS Cloud Centers, these feeds provide information across four crucial risk areas: IP Reputation: A list of IP addresses that have earned a negative reputation through involvement in suspicious activity, including phishing, botnets, APTs, DDoS attacks and more. Malicious Web/URL: A domain reputation list that includes malicious websites that are the source of exploit kits, malware and phishing attacks. Command & Control:  A set of IP addresses that are known to control botnet armies used to take services offline. This feed is used to prevent organizations’ own resources from unknowingly participating in cyber-attacks, mitigate ransomware, as well as conserving network resources. Malware Hashes: A set of MD5 file hashes that can be used to identify malware in email or file transfers, as well as stored data – protecting against malware, ransomware, Trojans, scanning, probing, and data leakage. NSFOCUS can easily augment existing threat intelligence through integration with other threat intelligence offerings or SIEM deployments, and across NSFOCUS’ network and application security products.   To learn more about NSFOCUS’ approach to threat intelligence, visit http://nsfocusglobal.com/threat-intelligence/  Contact Christine Tee Sr. Director, Channels and Marketing, NSFOCUS (65) 9679 1481 ctee@nsfocusglobal.com  About NSFOCUS IB   NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an award-winning enterprise application and network security provider, with operations in the Americas, Europe, the Middle East and Asia Pacific. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company's Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, dynamic protection from advanced cyber threats.   NSFOCUS has fifteen years of success and experience working with Fortune 500 companies, including four of the world’s five largest financial institutions, as well as organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS IB has technology and channel partners in more than 60 countries, and is a winner of the Microsoft Bug Bounty Program for 4 consecutive years, a member of the Microsoft Active Protections Program (MAPP), StopBadware.org, and the Cloud Security Alliance (CSA).   Enterprise- and carrier-grade products undergo rigorous evaluation and testing to Veracode VL4 and ISO 27001 certification, delivering powerful and effective threat management combined with advanced data analytics and intrusion prevention and detection capabilities.   A research arm, the NSFOCUS Security Labs, is a renowned technical research center that tracks and analyzes global intelligence while identifying new network vulnerabilities and security trends.   Visit NSFOCUS: www.nsfocusglobal.com Read the blog: http://nsfocusglobal.com/category/blog/ Follow on Twitter: https://twitter.com/NSFOCUS_Intl Follow on LinkedIn: https://www.linkedin.com/company/nsfocus Follow on Facebook: https://www.facebook.com/nsfocus/   NSFOCUS; NSFOCUS, INC. and NSFOCUS Anti-DDoS System (ADS) are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.         Dell Boomi Acquires ManyWho 2017-03-17T01:29:32Z dell-boomi-acquires-manywho ROUND ROCK, Texas, Mar. 16, 2017 – Dell Boomi™ (Boomi) announced it has completed a transaction to acquire ManyWho™, a unified cloud and low-code development platform. ManyWho simplifies workflow automation and allows businesses and developers to turn business processes into rich software applications to connect employees, customers and core systems. Workflow automation is a critical need for modern businesses and organizations pursuing digital transformation and IT modernization. Adding the ManyWho low-code capabilities to Boomi’s market-leading integration platform accelerates the company’s ability to deliver workflow automation to customers on a unified platform, something no other company can match. The acquisition unlocks the ability for businesses to maximize best-of-breed cloud applications, driving efficiency, increasing time to value and building a competitive advantage. With the addition of ManyWho, the Boomi platform provides customers with the enabling technology to address the challenges of Hybrid IT. Now, the platform allows businesses to connect, manage data changes, ensure data quality and re-establish efficient business processes across your IT landscape. Boomi is the world’s leading cloud integration platform. ManyWho is rethinking the way businesses manage workflow automation. Together, the Boomi platform offers the only solution where customers can move, manage, govern and automate data and processes in a unified way. “Both Boomi and ManyWho were born in the cloud and are cloud native. Without an on-premises legacy to manage, Boomi provides instant access to services with no installation, effortless and automatic software upgrades and crowd-sourced ease-of-use to achieve short time-to-value,” said Chris McNabb, CEO of Boomi. “Boomi plus ManyWho brings world class integration together with leading cloud workflow automation. This combination provides our customers with a connected workflow which is key to an efficient and differentiated business.” “Boomi is a perfect fit for ManyWho. Both companies are committed to delivering innovative ways to help companies move fast, be nimble and collaborate at scale,” said Steve Wood, co-founder of ManyWho. “Joining Boomi allows ManyWho to scale quickly, offering businesses the end-to-end integration solution they need to drive Digital Transformation.’’ ManyWho was founded in 2013 and is headquartered in San Francisco, California. Boomi plans to keep ManyWho’s employees and existing operations, and will continue to invest in additional engineering, channel, marketing, professional services, support and sales capability to grow this business. To learn more about how these new Boomi workflow features can help your business or see a demonstration, please visit: www.boomi.com/workflow. About ManyWho ManyWho is an agile, enterprise-level, cloud-based, application development platform. Agility doesn’t have to mean compromise however – ManyWho builds social, mobile (including offline) and real-time applications that can run on any desktop or mobile device, operating system or platform. Headquartered in San Francisco and with a presence in Exeter, UK, ManyWho is revolutionizing the world of business process effectiveness by helping corporations get the best out of their existing applications and investments. About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,300 organizations of all sizes use the Boomi platform to run smarter, faster, better. Boomi also helps customers drastically reduce implementation times and offers substantial cost savings over traditional integration, MDM and API management solutions. Visit http://www.boomi.com for more information. © Dell and Dell Boomi are trademarks of Dell Inc. ManyWho is a trademark of Boomi Inc., a Dell subsidiary. Dell disclaims any proprietary interest in the marks and names of others. # # # Moving on from MobileIron, St Ives Home Care Steps up to SOTI 2017-03-14T00:13:46Z moving-on-from-mobileiron-st-ives-home-care-steps-up-to-soti Sydney, Australia – 14 March, 2017 —As part of aged and disability care sector reform, analysts anticipate the Australian Government will dramatically increase availability of home care packages (the main way government subsidised aged care services are delivered in the home) from 66,000 to around 100,000 by 2017, with more than 40,000 additional packages to be available by 2022 [1]. To meet the growing need for in-home care services, St Ives Home Care built on its 20+ years of experience and undertook a strategic mobility management program to run its more than 400-strong, national team of mobile support workers more efficiently, improving response time for urgent care requests.   “We run a mobile organisation with a national footprint, delivering personalised services to ageing Australians in their homes,” said Erle Metcalf, Infrastructure Coordinator ICT,  St Ives Home Care. “We found the SOTI system a huge benefit for our business, and our staff have really benefited from the geolocation associated with the new technology,” said Metcalf. “We are now able to assist our support workers wherever they are, as the SOTI system helps us to determine their location in real time if they need us. The technology also results in efficiencies for us with scheduling and matching support workers for client bookings/needs at short notice.” “SOTI MobiControl has helped us to better connect the dots,” said Metcalf. St Ives Home Care was using MobileIron, through a managed service provider (MSP), for basic device and application management and had a paperwork heavy process. With a desire for a more info-centric program with an on-premise mobility management solution that delivered geolocation services, St Ives Home Care selected SOTI MobiControl. With SOTI’s enhanced remote support features, rapid deployment, easy and seamless application updates plus automated scripting, all from one easy-to-use interface, the decision – according to Metcalf – was easy. SOTI Delivered Operational Benefits in Just Three Months “With SOTI, we didn’t need to re-engineer software into an application since everything we were looking for was available from the management platform, and that accelerated our ability to deliver on decision-making and realise return on our investment,” Metcalf continued.  SOTI’s rapid deployment features and ease of use mean that new Samsung devices can be shipped directly to St Ives Home Care support workers in the field for provisioning and enrollment, bypassing the previously time consuming process of provisioning at its head office then distributing the devices. This change frees up IT staff for more strategic tasks, and SOTI remote support has proven to be so easy and powerful that St Ives Home Care has designated super-users to use SOTI remote support features to fix problems directly in the field. These changes have reduced device downtime and allowed St Ives Home Care to keep devices in the hands of its mobile users, which is vital to running a primarily mobile operation. The company now has a more streamlined approach to its administration and coordination of services and scheduling as a result of the SOTI technology. Updates are now quick and easy via the on premises SOTI MobiControl solution. St Ives Home Care has seen significant improvements and efficiencies in device rollout and management, operational planning, reporting and expense management. Real-time geolocation data has provided St Ives Home Care’s scheduling staff with the information they need to meet urgent care requests. Accurate, real-time asset and usage tracking has enabled St Ives Home Care to do predictive billing, not only removing its monthly bill shock but also providing the data with which to identify issues or opportunities for device usage improvements and cost savings. “Any organisation with its workforce on the road every day, in both urban and remote locations, using mobile devices and applications across a huge geographic area requires a mobility management solution and a strategic mobility program,” said Adele Beachley, Managing Director – Asia Pacific, SOTI. “It is gratifying to know that, through real-time geolocation data, powerful remote support and all the other features of SOTI MobiControl like security, asset management, application and content management and more, SOTI is helping St Ives Home Care to deliver much needed services to support, comfort and care for ageing Australians in their homes,” said Beachley. [1] Deloitte, How consumer driven care is reshaping the community care sector