The PRWIRE Press Releases http:// 2017-06-22T08:42:13Z CA Technologies named a leader in Gartner Magic Quadrant for Project Portfolio Management, Worldwide 2017-06-22T08:42:13Z ca-technologies-named-a-leader-in-gartner-magic-quadrant-for-project-portfolio-management-worldwide Sydney – 22 June, 2017 -- CA Technologies (NASDAQ:CA) today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the "Magic Quadrant for Project Portfolio Management, Worldwide."* The report evaluated CA Project & Portfolio Management (CA PPM), and positioned CA Technologies highest in the Leaders quadrant for Ability to Execute. According to the report, "Leaders can provide comprehensive, resilient and high-performance PPM functionality to the project-execution-level customer as well as to the portfolio-level customer. Additionally, leaders recognise the market need for different types of PPM products matching well with the proliferation of different project and work environments of their prospective customers. As such, leaders are acquiring and building out a thoughtful inventory of different PPM products supporting the varied types of customers looking for software in the PPM space.” “In order to lead, companies must anticipate their customer’s needs and deliver on those needs faster than the competition,” said Angela Tucci, general manager, Agile Management, CA Technologies. “CA Project & Portfolio Management provides our customers the ability to quickly correlate financial and business investments with value delivery, giving them the ability to anticipate, react and invest faster than their competition to meet market needs.” With CA PPM, companies can track and prioritise market and customer needs and make better decisions on how to invest limited resources to better optimise enterprise, IT, service and product portfolios. Available via the cloud, on-premises, and hosted delivery models, CA PPM improves business leaders' ability to prioritise strategic initiatives and resources. CA Technologies was one of three vendors placed in the Leaders quadrant. A recognised leader in PPM, in November 2016 CA Technologies was named as a Leader in Gartner's "Magic Quadrant for Integrated IT Portfolio Analysis Applications."** CA’s Agile Management solutions are being demonstrated at the Gartner PPM & IT Governance Summit 2017, June 5-7 in Orlando, Florida and June 12-13 in London, England. For more information on CA Project and Portfolio solutions, visit: www.ca.com/us/products/ca-project-portfolio-management.html or visit CA at Booth #30 in Orlando, and Booth #P2 in London. To receive a complimentary copy of the report, visit Magic Quadrant for Project Portfolio Management, Worldwide. *Gartner, Inc., “Magic Quadrant for Project Portfolio Management, Worldwide,” Daniel B. Stang, Matt Light, Teresa Jones, May 25, 2017. **Gartner, Inc., "Magic Quadrant for Integrated IT Portfolio Analysis Applications," Daniel B. Stang, Stefan Van Der Zijden, November 22, 2016. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Dell Boomi’s Latest Release Builds on Cloud Integration Platform to Drive Digitally Connected Experiences with Customers, Partners and Suppliers 2017-06-21T04:31:56Z dell-boomi-s-latest-release-builds-on-cloud-integration-platform-to-drive-digitally-connected-experiences-with-customers-partners-and-suppliers ROUND ROCK, Texas, June 20, 2017 – Dell Boomi™ (Boomi) announced the availability of the Spring 2017 release of the industry’s most robust and comprehensive cloud-native, enterprise integration platform to move, manage, govern and orchestrate data across hybrid IT architectures. The latest release enables Boomi customers to more efficiently connect everything and enable everywhere, with new, no code application integration accelerators, new features to fortify DevOps at enterprise scale, and improve data governance and security. “Today’s enterprise organization needs to create digitally connected experiences with customers, partners, and suppliers in order to stay ahead of the competition and remain relevant,” said Chris McNabb, CEO of Boomi. “Integration teams are under ever increasing pressure to make this happen at an accelerated pace. With this release, our platform provides organizations with the industry’s most comprehensive and robust integration foundation for rapidly building a digital business that’s smarter, better and faster.” Boomi’s Spring 2017 release includes more than 150 features that have been added to the market-leading Boomi integration platform as a service (iPaaS) over several months and are now generally available. Highlights include the following. Low and No Code Integration Accelerators Boomi accelerates implementations by providing a drag-and-drop data integration and application development environment, pre-built tools and reusable components, including: Workflow Automation - In March 2017, Boomi acquired ManyWho, a low-code development platform for building and deploying workflow applications, making Boomi the most comprehensive cloud-native integration and application development platform to accelerate digital transformation. The latest release allows an application developer to easily invoke a Boomi integration process within a workflow. No Code, Pre-built Integration Templates - Boomi offers citizen integrator support with 12 additional processes for the Boomi Process Library. The Boomi Process Library provides proven examples created by Boomi experts that any Boomi user can choose as a starting point to build their integration. Support for PaaS Integration - Boomi easily integrates with leading PaaS vendors and provides comprehensive support for PaaS solution integration. This release offers new connectors for Azure, AWS and Google. B2B Trading Partner Common Components - Three new types of EDI components provide increased reusability of common data among Trading Partners. Re-using common components increases flexibility, reduces duplication and simplifies updates. This saves time and development effort, especially for organizations with varied businesses, organizations growing through acquisition, as well as conglomerates and organizations with semi-autonomous business units. Fortified DevOps Features DevOps teams are looking for the ability to simplify and automate the delivery and deployment of applications and integrations, allowing organizations to focus more of their resources on innovation. Boomi’s fortified DevOps features provide new, robust enterprise capabilities, while reducing the complexity associated with IT operations, including: Docker Container Deployment - Easily create pre-configured containers. Docker containers simplify and provide flexibility to spin up and down instances of Boomi with pre-defined configurations to increase developer productivity and speed up application integration. Programmatic Onboarding for Trading Partners - Simplifies and speeds up onboarding, dramatically reducing the time required from weeks and days to hours and making the setup error-free. Data Stewardship Independence - Four new platform Quarantine API endpoints enable resolution actions outside of Boomi Master Data Management (MDM). This means data stewards can work in other applications, including cloud applications like Slack, to streamline governance tasks and approvals. Dynamic Integration Processes - With Boomi’s Process Route Shape feature, users can break down multi-step processes into smaller, independent functional groups and dynamically execute sub-processes. This independence between the main process, sub-process, and routing rules enables reusability of repeated logic and actions, and facilitates seamlessly updating and testing integrations. Data Governance and Security Organizations need technologies that provide ease of use to accelerate digital initiatives, while offering appropriate controls for the business units they support. Customers need to enforce the right data governance and security models that ensure compliance with business policies, contracts and regulations. Boomi’s latest release includes: Automated Data Governance - Data source rankings ensure that each Boomi MDM golden record is from the most trusted source system and propagated across all systems. Data stewards can easily enforce governance policies with automatic updates to all golden records when the data model and associated business rules are changed. Identity Management - With Boomi API Management developers can now leverage third party Authentication Sources to support OAuth 2.0 and SAML authentication use cases. API Policy Management - With an unlimited number of API calls, an organization can be vulnerable to Denial of Service (DoS) attacks and potentially overwhelm or tax the infrastructure. Boomi API Management allows for the configuration of policies to define a Contract. These Contracts can be coupled with entitlement tiers (i.e. Gold, Silver, or Bronze) as a mechanism for API providers to define expected service levels across their customer base. Additionally, with Quota, Rate Limit and Throttling functionality, the API Provider can limit the number of API calls for a specific time period. To learn more about the Boomi Spring release or see a demonstration, please visit: https://boomi.com/blog/boomi-advances-speed-efficiency-application-integration About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,800 organizations of all sizes use the Boomi platform to run smarter, faster, and better. Boomi also helps customers drastically reduce implementation times over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © 2017 Boomi Inc. Dell, Dell Boomi, ManyWho, and Boomi iPaaS are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others. # # # NETGEAR NIGHTHAWK X10 VOTED BEST WIFI ROUTER IN EUROPE 2017-06-21T04:27:22Z netgear-nighthawk-x10-voted-best-wifi-router-in-europe-1 SYDNEY, Australia — June 21, 2017 — For the second consecutive year, NETGEAR®, Inc. (NASDAQ: NTGR), the leading provider of networking devices that power today’s smart home, has secured the top spot for routers in the 2017 European Hardware Awards. The Nighthawk X10 AD7200 Smart WiFi Router (R9000) was named Best Router in this annual competition to honour exceptional hardware sold in the European Union. Nighthawk X10 debuted on the market last spring as the industry’s first —and fastest— router for media streaming and instant backup. The European Hardware Awards is created by the European Hardware Association (EHA). Votes were tallied from more than 100 experienced editors from EHA member publications representing the largest technology news and reviews sites in Europe: Hardware.Info (Benelux region), CowCotLand (France), Hardwareluxx (Germany), Hardware Upgrade (Italy), PurePC (Poland), Lab 501 (Romania), Geeknetic (Spain), SweClockers (Nordic countries) and KitGuru (United Kingdom). Today’s video files are getting larger with 4K and VR video. Offloading from capture devices and moving these large files within a network often becomes a time-consuming and challenging task. The NETGEAR Nighthawk X10 Smart WiFi Router is powerful enough to move these files at unprecedented speed and provides easy access once the file is stored on the network. It offers ultra-smooth 4K streaming, even to remote devices, and is the industry’s first router to run Plex Media Server without the need for a computer. Nighthawk X10 combines a powerful 1.7GHz Quad Core processor — the fastest processor in a home router — and Quad-Stream Wave 2 WiFi architecture plus next-generation high speed 802.11ad WiFi, so you can enjoy blazing-fast combined wireless speeds up to a furious 7.2Gbps*. The latest MU-MIMO technology supports simultaneous streaming, while 160MHz doubles WiFi speeds to mobile devices. Nighthawk X10 is also the industry’s first router designed for the home market that includes a 10Gigabit port for supporting a fiber connection. “We are honoured to have a Nighthawk router selected as the Best Router in the European market two years in a row! Last year it was Nighthawk X6 and now Nighthawk X10,” said David Henry, senior vice president of Connected Home for NETGEAR. “We design all NETGEAR products not only to meet but to surpass the highest performance standards, and we strive to deliver the newest technology innovations. We know Nighthawk X10 to be the industry’s best, so it’s extremely rewarding to have it confirmed by technology experts in continent-wide voting.” Key Features of the Award-Winning Nighthawk X10: AD7200 Quad Stream Wave2 WiFi supports wireless speeds up to 4600+1733+800Mbps* Fastest 60GHz 802.11ad WiFi technology for instant downloads, backup and minimal latency during online game play Plex Media Server for all your media – anytime, anywhere Powerful 1.7GHz Quad Core Processor boosts performance for 4K streaming or VR gaming 4 high-performance Active Antennas for better WiFi coverage and faster speeds 6 Gigabit Ethernet LAN ports with dual ports that can be operated in link aggregation mode for faster file transfers (up to 2Gbps wired speeds) 2 SuperSpeed USB 3.0 ports for faster streaming, backup and easy access to stored media Automatic backup to the cloud with Amazon Drive NETGEAR® ReadyCLOUD® provides easy, private and secure remote access to USB connected storage 10Gigabit fiber port for lightning-fast backup and media streaming to/from a NETGEAR ReadyNAS® storage device or other NAS MU-MIMO capable for simultaneous streaming of data to multiple devices Dynamic QoS prioritises network traffic for uninterrupted video streaming for applications like YouTube®, Netflix® & others’ NETGEAR® Up app has your router up, running and configured from the convenience of any Android or iOS mobile device NETGEAR genie® app for a personal dashboard to monitor, control and repair your home network, even when you’re away from home Watch this video to learn more about how the revolutionary Nighthawk X10 will support your most intense gaming needs and offer you the best possible WiFi for your other activities. Pricing and Availability Nighthawk X10 AD7200 Smart WiFi Router (R9000) is available from major retailers in stores and online at an RRP of $799 (AUD). About NETGEAR, Inc. NETGEAR (NASDAQ: NTGR) is a global networking company that delivers innovative products to consumers, businesses and service providers. The Company's products are built on a variety of proven technologies such as wireless (WiFi and LTE), Ethernet and powerline, with a focus on reliability and ease-of-use. The product line consists of wired and wireless devices that enable networking, broadband access and network connectivity. These products are available in multiple configurations to address the needs of the end-users in each geographic region in which the Company's products are sold. NETGEAR products are sold in approximately 31,000 retail locations around the globe, and through approximately 28,000 value-added resellers, as well as multiple major cable, mobile and wireline service providers around the world. The company's headquarters are in San Jose, Calif., with additional offices in approximately 25 countries. More information is available from the NETGEAR investor page or by calling (408) 907-8000. Connect with NETGEAR on Twitter, Facebook and our blog. ©2017 NETGEAR, Inc. NETGEAR, the NETGEAR logo, NETGEAR genie, Nighthawk, ReadyCLOUD, ReadyNAS and ReadySHARE are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its affiliates in the United States and/or other countries. Other brand and product names are for identification purposes only and may be trademarks or registered trademarks of their respective holder(s). The information contained herein is subject to change without notice. NETGEAR shall not be liable for technical or editorial errors or omissions contained herein. All rights reserved. *Maximum wireless signal rate derived from IEEE standard 802.11 specifications. AC7200 equals 800Mbps at 2.4GHz 802.11ac with 256 QAM support + 1733Mbps at 5GHz 802.11ac + 4600Mbps at 60GHz 802.11ad. Actual data throughput and wireless coverage will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate and wireless coverage. NETGEAR makes no express or implied representations or warranties about this product’s compatibility with any future standards. Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.: This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, reliability, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease-of-use of NETGEAR's products may not meet the price, performance and ease-of-use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events. Source: NETGEAR-G Media Contact Emma, Elizabeth, Jennifer or Ashleigh at DEC PR (02) 8014 5033 / netgear@decpr.com.au NETGEAR NIGHTHAWK X10 VOTED BEST WIFI ROUTER IN EUROPE 2017-06-21T04:26:02Z netgear-nighthawk-x10-voted-best-wifi-router-in-europe SYDNEY, Australia — June 21, 2017 — For the second consecutive year, NETGEAR®, Inc. (NASDAQ: NTGR), the leading provider of networking devices that power today’s smart home, has secured the top spot for routers in the 2017 European Hardware Awards. The Nighthawk X10 AD7200 Smart WiFi Router (R9000) was named Best Router in this annual competition to honour exceptional hardware sold in the European Union. Nighthawk X10 debuted on the market last spring as the industry’s first —and fastest— router for media streaming and instant backup. The European Hardware Awards is created by the European Hardware Association (EHA). Votes were tallied from more than 100 experienced editors from EHA member publications representing the largest technology news and reviews sites in Europe: Hardware.Info (Benelux region), CowCotLand (France), Hardwareluxx (Germany), Hardware Upgrade (Italy), PurePC (Poland), Lab 501 (Romania), Geeknetic (Spain), SweClockers (Nordic countries) and KitGuru (United Kingdom). Today’s video files are getting larger with 4K and VR video. Offloading from capture devices and moving these large files within a network often becomes a time-consuming and challenging task. The NETGEAR Nighthawk X10 Smart WiFi Router is powerful enough to move these files at unprecedented speed and provides easy access once the file is stored on the network. It offers ultra-smooth 4K streaming, even to remote devices, and is the industry’s first router to run Plex Media Server without the need for a computer. Nighthawk X10 combines a powerful 1.7GHz Quad Core processor — the fastest processor in a home router — and Quad-Stream Wave 2 WiFi architecture plus next-generation high speed 802.11ad WiFi, so you can enjoy blazing-fast combined wireless speeds up to a furious 7.2Gbps*. The latest MU-MIMO technology supports simultaneous streaming, while 160MHz doubles WiFi speeds to mobile devices. Nighthawk X10 is also the industry’s first router designed for the home market that includes a 10Gigabit port for supporting a fiber connection. “We are honoured to have a Nighthawk router selected as the Best Router in the European market two years in a row! Last year it was Nighthawk X6 and now Nighthawk X10,” said David Henry, senior vice president of Connected Home for NETGEAR. “We design all NETGEAR products not only to meet but to surpass the highest performance standards, and we strive to deliver the newest technology innovations. We know Nighthawk X10 to be the industry’s best, so it’s extremely rewarding to have it confirmed by technology experts in continent-wide voting.” Key Features of the Award-Winning Nighthawk X10: AD7200 Quad Stream Wave2 WiFi supports wireless speeds up to 4600+1733+800Mbps* Fastest 60GHz 802.11ad WiFi technology for instant downloads, backup and minimal latency during online game play Plex Media Server for all your media – anytime, anywhere Powerful 1.7GHz Quad Core Processor boosts performance for 4K streaming or VR gaming 4 high-performance Active Antennas for better WiFi coverage and faster speeds 6 Gigabit Ethernet LAN ports with dual ports that can be operated in link aggregation mode for faster file transfers (up to 2Gbps wired speeds) 2 SuperSpeed USB 3.0 ports for faster streaming, backup and easy access to stored media Automatic backup to the cloud with Amazon Drive NETGEAR® ReadyCLOUD® provides easy, private and secure remote access to USB connected storage 10Gigabit fiber port for lightning-fast backup and media streaming to/from a NETGEAR ReadyNAS® storage device or other NAS MU-MIMO capable for simultaneous streaming of data to multiple devices Dynamic QoS prioritises network traffic for uninterrupted video streaming for applications like YouTube®, Netflix® & others’ NETGEAR® Up app has your router up, running and configured from the convenience of any Android or iOS mobile device NETGEAR genie® app for a personal dashboard to monitor, control and repair your home network, even when you’re away from home Watch this video to learn more about how the revolutionary Nighthawk X10 will support your most intense gaming needs and offer you the best possible WiFi for your other activities. Pricing and Availability Nighthawk X10 AD7200 Smart WiFi Router (R9000) is available from major retailers in stores and online at an RRP of $849 (NZD). About NETGEAR, Inc. NETGEAR (NASDAQ: NTGR) is a global networking company that delivers innovative products to consumers, businesses and service providers. The Company's products are built on a variety of proven technologies such as wireless (WiFi and LTE), Ethernet and powerline, with a focus on reliability and ease-of-use. The product line consists of wired and wireless devices that enable networking, broadband access and network connectivity. These products are available in multiple configurations to address the needs of the end-users in each geographic region in which the Company's products are sold. NETGEAR products are sold in approximately 31,000 retail locations around the globe, and through approximately 28,000 value-added resellers, as well as multiple major cable, mobile and wireline service providers around the world. The company's headquarters are in San Jose, Calif., with additional offices in approximately 25 countries. More information is available from the NETGEAR investor page or by calling (408) 907-8000. Connect with NETGEAR on Twitter, Facebook and our blog. ©2017 NETGEAR, Inc. NETGEAR, the NETGEAR logo, NETGEAR genie, Nighthawk, ReadyCLOUD, ReadyNAS and ReadySHARE are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its affiliates in the United States and/or other countries. Other brand and product names are for identification purposes only and may be trademarks or registered trademarks of their respective holder(s). The information contained herein is subject to change without notice. NETGEAR shall not be liable for technical or editorial errors or omissions contained herein. All rights reserved. *Maximum wireless signal rate derived from IEEE standard 802.11 specifications. AC7200 equals 800Mbps at 2.4GHz 802.11ac with 256 QAM support + 1733Mbps at 5GHz 802.11ac + 4600Mbps at 60GHz 802.11ad. Actual data throughput and wireless coverage will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate and wireless coverage. NETGEAR makes no express or implied representations or warranties about this product’s compatibility with any future standards. Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.: This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, reliability, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease-of-use of NETGEAR's products may not meet the price, performance and ease-of-use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events. Source: NETGEAR-G Media Contact Emma, Elizabeth, Jennifer or Ashleigh at DEC PR (02) 8014 5033 / netgear@decpr.com.au CA Technologies helps create agile businesses with faster time-to-market by connecting strategy, execution and delivery 2017-06-20T03:39:38Z ca-technologies-helps-create-agile-businesses-with-faster-time-to-market-by-connecting-strategy-execution-and-delivery SYDNEY, 20 June, 2017 – CA Technologies (NASDAQ:CA) today announced new capabilities across its Agile Management portfolio for a clear and connected view of work in progress and available resources to align and execute on strategy. The solutions help fuel business agility with: The latest release of CA’s market-leading Project & Portfolio solution (CA PPM) gives greater insights into current and future resource planning as well as increased functionality for team collaboration. New features for teams in CA Agile Central that ensure team work is clearly aligned to company objectives to allow employees to see how they contribute to top line growth. And additional integrations across CA’s vast product portfolio that allow organizations to leverage the funding, investment and planning capabilities of CA PPM with visibility into what is being delivered via CA Agile Central, so that companies can make better, fact-based decisions. CA PPM offers ability to anticipate and plan team resources with industry-first telescoping A recognised PPM solutions provider, CA was named a leader in the 2017 Magic Quadrant for Project Portfolio Management, Worldwide.* The latest CA PPM solution offers the industry’s first telescoping capability to more easily manage time scales within a single view. Resource managers can better anticipate and plan for future demand of resources while project coordinators have more visibility to better manage and staff current projects. Additionally, new functionality includes built-in conversations to encourage collaboration, while pinning and filtering capabilities make it easy for users to isolate specific resource allocation problems and staffing conflicts. CA Agile Central Team Board gives autonomy to teams, and visibility to the business CA Agile Central’s unique capability, Team Board, bridges the gap between team-level autonomy and company strategy with an unprecedented level of process flexibility, supporting Scrum and Kanban at the team level, while ensuring visibility and alignment to business strategy. “Success in today’s fast-paced and quickly changing market requires empowered teams that can easily align their work with overall business strategy. For success at scale, the solutions and tools teams use need to be intuitive, flexible and powerful – and need to support modern ways of working, not slow them down,” said Ken Martin, vice president, Agile Management, CA Technologies, Asia Pacific & Japan. “To help companies adapt and win, CA’s Agile Management solutions give business stakeholders clear visibility into the execution and delivery of business plans and financial investments, while also supporting the practices used by today’s teams.” Identify, define and prioritise the most important work with agile + PPM Driving increased visibility into strategic business decisions and work in process, CA PPM has expanded integrations with CA Agile Central to offer customers a 360 degree view of all work being delivered from agile and traditional teams across the enterprise. These new integrations enable: Unified portfolio funding approval: Integrate all work into a unified funding portfolio. Gain visibility into spend on all activities across traditional and agile teams. Flexible backlog management: Maintain feature backlog in Agile for internal teams or in PPM for customer scope controlled contracts. Unified people planning: Add new team members from CA Agile Central to the project staffing to provide enterprise visibility into all work. Simplified cost management: Single time management solution for Agile Central and CA PPM. Combined with a unique time template for finance to classify work without burdening teams with complex rules or audit requirements. CA continues to help companies build applications faster by providing integrated solutions across its Agile Management and Continuous Delivery portfolios. The PPM and CA Agile Central enhancements released today, when combined with the existing CA Agile Central and Continuous Delivery integrated solutions, ensure that customers are able to plan, manage, build and deliver the right products at the right time, tying strategy to delivery, accelerating time to market and allowing rapid response to market changes. Additional links: BLOG: The new CA PPM: convenient, collaborative and powerful DATA SHEET: Integrated solution overview: CA PPM and CA Agile Central PRODUCT TOUR: CA Agile Central product tour *Gartner, Inc., “Magic Quadrant for Project Portfolio Management, Worldwide,” Daniel B. Stang, Matt Light, Teresa Jones, May 25, 2017. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Australian organisations not setup to predict the risk of security breaches before they occur 2017-06-19T06:01:41Z australian-organisations-not-setup-to-predict-the-risk-of-security-breaches-before-they-occur SYDNEY, 19 June, 2017 – Australian organisations are lagging behind their regional counterparts when it comes to having security controls that are adaptive based on risk, with few able to anticipate the risk of a breach before it occurs. This highlights a significant disconnect with the fact that more than half of Australian organisations believe that the number of security breaches has increased in the last 12 months. In a global study by CA Technologies; The Security Imperative: Driving Business Growth in the App Economy, a low 37 per cent of Australian organisations reported employing proactive or predictive processes to detect data breaches; a stark comparison to our regional counterparts in Singapore, (75 per cent) and Korea (60 per cent). Further, 21 per cent of Australian organisations say that their approach to detecting data breaches only includes an ‘occasional review of activity reporting’. “There’s no doubt that good identity-centric security strategy helps a business to accelerate its digital transformation journey. With data breaches becoming more frequent and more mature, identity-centric security needs to be incorporated right from day one, as a core technology enabler rather than bolted on as an IT afterthought,” said Teng Sherng Lim, vice president, Security, CA Technologies, Asia Pacific and Japan. When it comes to identity and access management (IAM), none of the Australian organisations surveyed said their controls are adaptive based on risk, with the majority of controls being centralised or automated (67 per cent) and the remaining 33 per cent employing manual controls. A correlation can be drawn between these figures and the impact of IT security efforts on business KPIs with Australia’s results again, by-and-large below the regional average. In particular, the areas of employee productivity (37 per cent), customer satisfaction (40 per cent), operational efficiency (35 per cent) and importantly business growth (41 per cent) paint a picture of little improvements. “Disruptions – and in this case security breaches – are coming to every industry. For Australian organisations to succeed and in fact last, they need to be built it to change. This means not only keeping up, but constantly innovating and continuously improving. Employing advanced identity-centric security isn’t optional, it’s imperative,” said Lim. The number of compliance audit failures was also reported to have improved by only 35 per cent based on IT security efforts, which compares starkly to Thailand at 57 per cent. On a regional level, those with advanced identity-centric security reported a 35 per cent decrease in breaches, compared to only 12 per cent of basic users. Additionally, advanced users of identity-centric security that have seen a decline in breaches have been much more proactive in preventing breaches through increased investment and focusing on mobile devices and apps. The study polled 1,770 senior business and IT executives worldwide, of which more than 100 are chief security officers and chief information security officers. 799 of the respondents were from countries in the APJ region. -ENDS- Resources The Security Imperative: Driving Business Growth in the App Economy The Security Imperative Infographic About the Research/Coleman Parkes Conducted by Coleman Parkes, the study included 1,770 senior business and IT executives, including more than 100 CSOs and CISOs, from large enterprises across 21 countries and 10 industry sectors. The study and data analysis was done from May – September 2016. Coleman Parkes Research Ltd, formed in 2000, provides action-focused marketing research on a global scale. The company offers a full research and consultancy service across all markets, while specialising in business-to-business research with a focus on IT, technology and communications research. For more information, please visit www.coleman-parkes.co.uk. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. LogMeIn makes digital customer service smarter; takes aim at CRM market with introduction of Bold360 2017-06-09T00:00:00Z logmein-makes-digital-customer-service-smarter-takes-aim-at-crm-market-with-introduction-of-bold360 SYDNEY, AUSTRALIA – 9 June 2017 – LogMeIn, Inc. (NASDAQ:LOGM) today introduced Bold360, an intelligent customer engagement platform that provides a modern, flexible way for companies to interact with customers and get a real-time 360-degree view of all touchpoints and contextual data in a single solution.  Through a powerful combination of popular digital engagement channels, support tools, and a unified interface, Bold360 is taking on the traditional customer service market by bridging the gap between the customer and vital business information; helping companies deliver the immediate and personalised experience today’s consumers expect.   “The rise of digital, artificial intelligence and mobile-first lifestyles has changed how customers want to interact with their favourite brands,” said Mary Wardley, Program Vice President, Loyalty and Customer Care, IDC.  “As a result, companies need to rethink how they approach customer service to stay competitive.  Offering a variety of engagement channels is just the beginning.  The experience – whether automated or agent-assisted – needs to be seamless and the information contextual, to deliver the type of experience that will create long-term brand loyalty.”   According to a recent report from Gartner entitled The Eight Building Blocks of CRM: Data and Information (July 2016), there are a handful of key challenges when it comes to an organisation’s CRM strategy.  Specifically, they cite that “creating, maintaining and leveraging a single view of the customer is hard to achieve internally and the required capabilities are not provided by many CRM vendors. Many solutions fail to consider the myriad of channels used by customers to interact with organisations”.   Legacy customer service and CRM systems house only a small portion of customer data across various disparate systems, making it hard for companies to ever get a full picture of their customers.  Bold360 is addressing this challenge by combining the rich customer profiles and actionable data agents need with the fast, frictionless service customers have come to expect.  Intelligent automation also empowers customers with self-service tools, thereby eliminating routine tasks from the agent workflow to improve contact centre efficiencies and deliver the type of customer experiences that build loyalty.   “The future of customer service lies in being able to create a truly exceptional and meaningful experience for customers”, said Michael Blaine, Senior Director, Customer Service at VF Corporation.  “Utilising technology to understand your customers while providing easily accessible and real-time information to your agents can help deliver a truly unique and personalised experience.  Bold360 is an exciting first step toward this vision and we are excited to see where LogMeIn takes it in the future.”   With today’s release Bold360 includes: An intuitive interface - Empowers agents with the information needed to resolve issues quickly by consolidating data from different systems and presenting a unified view of all customer interactions. Agents can work across different channels while seeing a complete history of all interactions for the customer they are assisting.   No code integrations – Easily integrate popular business systems including Salesforce and Zendesk, to provide that information directly into the Bold360 agent interface, without needing to toggle between applications. World-class omni-channel engagement – Seamlessly engage with customers across a variety of channels including live chat, Facebook Messenger, email and more.  Bold360 offers the right engagement for the level of support needed without clunky handoffs and preserves the context of conversations across channels to help agents address issues quickly.  Intelligent automation -- Helps agents respond to commonly asked questions with the ability to create, curate and manage answers.  The system gets smarter over time and can be applied to self-service interactions or to inform agents in an assisted interaction.  Remote support – With features including remote control, file transfer and co-browsing, agents can seamlessly escalate visitors to remote support all in one interface to drive efficiency and quickly resolve customer issues.  “There is a significant white space when it comes to engagement capabilities of traditional CRM tools,” said Paddy Srinivasan, General Manager, Customer Engagement and Support Solutions.  “As customer expectations change, the old way of managing customer interactions will no longer suffice.  Bold360 not only helps businesses interact with their customers, but also builds intelligent & actionable profiles that help brands offer the right recommendation at the right time based on all the information about that customer – not just a small subset based on past interactions.  As Bold360 continues to evolve and capabilities expand, those customer profiles will continue to get richer and will serve as an essential tool for customer service organisations everywhere.”  Pricing and availability Bold360 is available today.  Pricing depends on deployment size and use case.  Additional resources: Website Blog: Introducing Bold360: Making Digital Customer Service Smarter Demo Video ###  LogMeIn’s customer engagement & support portfolio LogMeIn delivers industry leading solutions designed to empower knowledge workers to deliver more human, personalised and intelligent customer engagement and support across all digital channels and devices that drives increased satisfaction, engagement and productivity.  More than 50,000 companies rely on LogMeIn’s customer engagement portfolio to support 200 million customer interactions every year.  About LogMeIn, Inc. LogMeIn, Inc. (NASDAQ:LOGM) simplifies how people connect with each other and the world around them to drive meaningful interactions, deepen relationships, and create better outcomes for individuals and businesses. One of the world’s top 10 public SaaS companies, and a market leader in communication & conferencing, identity & access, and customer engagement & support solutions, LogMeIn has millions of customers spanning virtually every country across the globe. LogMeIn is headquartered in Boston with additional locations in North America, Europe, Asia and Australia.  Media contacts Amanda Conroy / India Bednall Espresso Communications on behalf of LogMeIn P: +61 28016 2200 E: logmein@espressocomms.com.au Gold Coast Website Designer Continues to Work for Cooler Torch Website to Improve Its Mobile Search Appearance 2017-06-02T11:58:44Z gold-coast-website-designer-continues-to-work-for-cooler-torch-website-to-improve-its-mobile-search-appearance Gold Coast, May 24, 2017: The website of Cooler Torch now has a responsive menu as well as design that make it easier for users to surf all the pages and categories of the site. The principal features of the website include a new file library creation and implementation of a web-based content management system. The upgrade brings all the documents into a system so it becomes convenient for customers to navigate on mobile devices and find the archived information. It also comes with a responsive home page banner with the images of the products. The responsive version incorporates a product carousel with ‘Buy Now’ buttons that redirect customers to the checkout page. The YouTube channel embedded on the site gives a better visual description of the products through videos. “We are pleased with the design of the mobile version. Gold Coast Website Designer has fulfilled all our requirements and I’m sure the new site will definitely help in attracting more customers”, said Cooler Torch Director. To have a look at the mobile version of Cooler Torch click here: http://www.coolertorch.com. About Gold Coast Website Designer What differentiates Gold Coast Website Designer from other local agencies is their quality to create designs keeping SEO considerations in mind. The websites designed by the company come with fast load speeds in spite of having high-quality images and banners. The professionals of the agency are also adept at creating responsive designs with smart interfaces.  Contact: Gold Coast Website Designer Address: 50 Codrington Circuit, Pacific Pines QLD 4211 Website: www.goldcoastwebsitedesigner.com.au Phone Number: + 61 488 914 289  ISACA Provides Guidance for Successfully Outsourcing IT Services 2017-06-02T04:42:15Z isaca-provides-guidance-for-successfully-outsourcing-it-services-1 Sydney, Australia (2 June 2017) — Organisations are increasingly seeking to outsource IT services as they pursue cost efficiencies and the ability to tap into specialised resources, but determining how to devise an outsourcing strategy can be complicated. A new audit program from global business technology association ISACA provides decision-makers with clear direction on how to optimise their outsourcing relationships, including vendor selection, onboarding and ensuring that appropriate controls are in place. ISACA’s Outsourced IT Audit Program includes: Governance and risk assessment processes, plus cost benefit analysis, prior to initiating an outsourcing IT model Internal controls and requirements for the selection process of an outsourced IT vendor Appropriate steps to manage the transition from in-house to outsourced providers of IT services Key monitoring and quantitative controls of the service delivery from the outsourced IT provider “The volume of technology-driven challenges and responsibilities can be overwhelming for many organisations in this era of digital disruption,” said Christos Dimitriadis, Ph.D. CISA, CISM, CRISC, chair of ISACA’s Board of Directors and group director of Information Security for INTRALOT. “The guidance provided in this audit program will help enterprises make strategic decisions about outsourcing IT services that will position them for success and allow them to place greater focus on their core capabilities.” Guidance put forth as part of the vendor selection process includes detailing steps needed to make sure the vendor complies with clients’ regulatory requirements, the vendor is an industry leader in the IT outsourcing space, the vendor has established a business continuity plan, the codes of conduct between the client and the vendor are aligned, and contract terms are appropriate. ISACA audit programs have been developed and reviewed by leading audit and assurance professionals worldwide. They can be downloaded to allow customisation that fits varying work environments. The Outsourced IT Audit Program is available for purchase at a reduced rate for ISACA members. -ENDS- About ISACA Nearing its 50th year, ISACA® (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organisations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI® Institute, to help advance innovation through technology. ISACA has a presence in more than 188 countries, including more than 215 chapters and offices in both the United States and China. Twitter: https://twitter.com/ISACANews LinkedIn: https://www.linkedin.com/company/isaca Facebook: www.facebook.com/ISACAHQ Instagram: https://www.instagram.com/isacanews/ Acronis Backup 12.5 Advances Data Protection and Renders Traditional Solutions Obsolete 2017-06-01T23:46:24Z acronis-backup-12-5-advances-data-protection-and-renders-traditional-solutions-obsolete Sydney, Australia; June 2, 2017: Acronis, a global leader in hybrid data protection and storage, today changed the future of data backup protection with the latest release of Acronis Backup 12.5, the world’s most innovative backup solution offering unprecedented levels of protection for all sizes of infrastructure. The new Acronis Backup 12.5 comes in two editions: Standard and Advanced, with an easy in-place upgrade.   Acronis Backup 12.5 is the world’s fastest, most reliable, complete, and cost-effective backup offering available on the market today. It allows businesses to start small with Acronis Backup 12.5 Standard edition and scale to Acronis Backup 12.5 Advanced as required by their growing infrastructure, simply by changing license keys. This gives partners the flexibility to meet the needs of small and large businesses with the same product.   Acronis Backup 12.5 delivers the best value for businesses, bringing the cost down by as much as 30 percent compared to its competitors. The reliability of this technology has been validated by more than 50,000 users who adopted Acronis Backup 12 Standard released in July 2016.   New Features in Acronis Backup 12.5 Advanced edition Building upon the existing ease of use, reliability, and new hybrid cloud architecture of Acronis Backup 12, the new advanced functionality creates a powerful, feature-rich solution that supports more than 20 platforms. These include Windows, Office 365, Azure, Linux, Mac OS X, Oracle, VMWare, Hyper-V, Red Hat Virtualization, Linux KVM, Citrix XenServer, iOS and Android:   ·   Unified web interface for the entire infrastructure ·   Admin roles and delegations for distributed infrastructures ·   Support for six hypervisors to provide migration platform options ·   Bare-metal recovery automation and remote boot media control to reduce RTO of remote site recovery ·   SAN storage snapshots to reduce hypervisor resource utilization ·   Oracle backup and granular recovery ·   Advanced tape support for increased granularity and simplified management ·   Advanced reporting for detailed insights and corporate compliance ·   Disaster recovery capability for emergency data recovery locally and in the cloud ·   Backup validation process ensures recoverability ·   Acronis Notary™ to ensure the authenticity of data   “The new release is transformative for IT,” said Jason Buffington, senior analyst at Enterprise Strategy Group, an IT research service. “Acronis Backup 12.5 Advanced is the world’s first enterprise-grade data protection solution with a consumer-grade user interface. It makes the complex job of data protection easy for any IT administrator or business owner. One computer or a thousand, physical or virtual, on-premises or cloud — this robust solution is the newest achievement of Acronis’ proven engineering excellence and it works equally well with organizations of all sizes.”   New in both Standard and Advanced editions Businesses of all sizes will benefit from more than 170 advancements common to both editions, addressing today’s hybrid cloud environment and setting Acronis apart from the competition.  Highlights include:   ·         Customizable dashboards for quick insights into the backup infrastructure ·         Acronis Active Protection™ to stop ransomware attacks ·         Acronis Instant Restore™ for 15-second RTOs ·         Acronis vmFlashback™ for quick incremental recovery of virtual machines   “The Acronis Backup 12.5 interface is useful to newcomers — very user friendly — while offering a good range of configuration options. The web-based feature would be a great way to keep multiple managers in the loop as they can make their own reports. This looks like a great implementation for small businesses that have been burned by ransomware in the past, and don't want to be hassled with keeping track of workstation backups — just set it and forget it,” said Patrick Savary, system engineer of Abacus Computers, Inc.   Innovating for a New Generation of Data Protection More than 500 Acronis engineers globally are engaged in the innovation and development of Acronis Backup 12.5 Standard and Advanced editions. As a result, Acronis added private and public cloud support for backing up and migrating workloads as well as reliable cloud storage. The release delivers the industry’s first and only data protection against ransomware with automated restoration of damaged data. Acronis Backup 12.5 also introduces new technology that enables users to verify the backup integrity before its restoration, improving regulatory compliance and data integrity with blockchain. ·      Backup of Amazon EC2 instances, Microsoft Azure VMs and Office 365 mailboxes ·      Acronis Active Protection to intelligently detect and block ransomware attacks, such as WannaCry, with instant restoration of any compromised data ·      Acronis Notary to prove a file is authentic and unchanged since it was backed up   Partner benefits Acronis Backup 12.5 is the most reliable and complete solution offering for anyone who supports small, medium, and large business’ data protection needs. It allows partners to improve customer service and increase customer retention rate by allowing customers to easily upgrade to the advanced backup functionality without needing to reinstall the system.   There is high demand for the innovative functionality in Acronis Backup 12.5 Standard and Advanced editions, as evidenced by the most popular beta program in Acronis history — three times bigger than the last major launch. Innovative technology, simplified licensing, easy-to-use interface, simple upgrade path from the previous version, and unbeatable pricing make Acronis Backup 12.5 the best backup solution on the market today.   “Acronis Backup 12.5 has been well received by our customers in Australia”, said Michael Tea, GM, Ecommerce & Cloud Services. “The two new editions, Standard and Advanced, offer complete protection and unmatched flexibility protecting their growing hybrid cloud environments.”   Commenting on the new release, Serguei Beloussov, co-founder and CEO of Acronis, said: “Today’s reality is more end-point devices, hybrid infrastructure, and an ever-growing cornucopia of threats. Businesses and enterprises globally are adapting to the cloud and trying to make sense of this ever-changing digital landscape. Acronis brings peace of mind by providing innovative data protection technology that is reliable, safe, fast, easy, and complete. Acronis Backup 12.5 is the only answer to all modern-day data protection needs.”   To learn more about Acronis Backup, please visit: ·         Acronis Backup product page http://www.acronis.com/en-us/business/backup/ ·         Release notes https://go.acronis.com/Acronis-Backup-release-notes ·         Licensing information http://www.acronis.com/en-us/business/backup/purchasing/ Maveriq Technology Leverages Dell Boomi to Simplify Data Integration 2017-05-30T22:50:34Z maveriq-technology-leverages-dell-boomi-to-simplify-data-integration Sydney, Australia – May 30, 2017 – Cloud integration specialist, Maveriq Technology, and leading cloud-based integration platform provider, Dell Boomi® (Boomi), today announced a partnership to simplify integration for enterprises amid the increase in hybrid landscape roll-outs. The agreement sees Maveriq integrate the Boomi™ AtomSphere™ integration platform-as-a-service (iPaaS) into its data integration, migration, workflow automation, MDM, EDI, and API management services portfolio. This provides organisations with a powerful integration strategy without the complex software agreements and convoluted implementation methodologies associated with legacy on-premises deployments. “Globally many organisations face a major integration gap that legacy on-premises solutions could not serve well. With the increased adoption of Hybrid IT – especially in the enterprise space – we saw a significant opportunity to partner with Boomi to provide iPaaS that can effectively consolidate data from best-of-breed applications in a true cloud environment,” said Vipin Verma, President at Maveriq. Maveriq is already engaged in more than 12 Boomi-based integration projects – both directly and through systems integrator partners – in various verticals including financial services, manufacturing, healthcare and public services. “The combination of Maveriq’s expertise in data integration, migration and quality with our iPaaS solution will give our joint customers a comprehensive means of centralising critical systems and apps in a package that feels “quick and easy,” said Michael Evans, Managing Director Asia-Pacific and Japan, Dell Boomi. “This means that companies and individual departments can use the best-of-breed technologies that cater for their unique needs while also ensuring the wider business is properly aligned. This is particularly important for large and diverse organisations which don’t want to be held hostage by inflexible and rigid environments.” About Maveriq Established in 2012, Maveriq LLC has grown from a single office site in Illinois, USA to a multinational company with several locations in North America, Latin America, and multiple Center of Excellence’s (COE’s) in the APJ region. As a Dell Boomi, SAP, SuccessFactors strategic partner, Maveriq is regarded as a thought leader, true systems integrator of hybrid landscapes, and enabler of the new digital economy. Maveriq supports global businesses with cloud services, products, and Rapid Deployment Solutions (RDS), enabling those organizations to gain greater visibility into global business processes. Visit http://www.maveriqtech.com for more information. About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,400 organizations of all sizes use the Boomi platform to run smarter, faster, and better. Boomi also helps customers drastically reduce implementation times over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © 2017. Dell, Dell Boomi are trademarks of Dell Inc. Boomi and AtomSphere are trademarks fo Boomi, Inc. Other marks may be the trademarks of their respective owners. Australia’s digital future – are we doing we enough? 2017-05-24T02:50:19Z australia-s-digital-future-are-we-doing-we-enough MEDIA STATEMENT Australia’s digital future – are we doing we enough? The ACS has launched its 2017 Digital Pulse report. Key findings include: ICT is a key driver of Australia’s economic future. Currently a digital boom is occurring with 40,000 ICT jobs created in just the last two years, and ICT services exports up 12% to $2.8b. New economic modelling shows that adoption of digital technologies has lifted Australia’s GDP by 6.6% over the previous decade – with each Australian being $4,663 a year better off (in 2016 dollars). However, 81,000 new ICT professionals are needed by 2022 to fuel future technology-led growth. Without skilled ICT labour our nation will stagnate. Diversity is still an issue – women represent only 28% of the ICT workforce (compared to 44% across all professional industries) and older workers (55+) only represent 12% of Australia’s ICT workforce. LinkedIn data reveals technical skills are in high demand – how will Australia meet this need to reap the advantages of a digital future? Sydney, 24 May 2017: The ACS, the professional association for Australia’s ICT sector, today launched its 2017 “Australia’s Digital Pulse” Report – revealing that a ‘digital boom’ is underway with 40,000 technology jobs created over just the last two years (2015-16). Prepared by Deloitte Access Economics, the report shows this strong growth in the ICT workforce is expected to continue, with an additional 81,000 jobs needed by 2022 to fuel future technology-led growth. Meeting this need will be a critical priority for Australia. ACS President, Anthony Wong, said: “Technology skills are fast becoming the engine room of the Australian economy. To fast-track our nation’s digital transformation, and ensure the ICT skills base is there to meet demand, we need a clear strategy and dedicated investment focus in this area.” LinkedIn Director of Public Policy for Asia Pacific, Nick O’Donnell, said Australia’s skills shift is accelerating and expanding across every industry. “We are seeing significant hiring of tech talent by non-tech companies. Half of the top 20 industries hiring ICT workers in 2016 were non-tech, the most active industries being financial services, which jumped from twelfth position in 2015 to up to fourth in 2016. “LinkedIn’s data also shows that the top skills demanded by employers hiring new ICT workers includes a balance of technical skills and broader business skills. Business skills such as Relationship Management, Business Strategy and Strategic Planning in combination with technical skills are highly sought after to drive digitisation of business processes,” Mr O’Donnell said. Addressing Australia’s skilled ICT shortfall, ACS President Anthony Wong, said: “The ACS is actively championing the uptake of coding in schools, better support for teachers in the delivery of emerging technology areas, the establishment of multidisciplinary degrees, and relevant training programs to help to build a pipeline of workers with valuable ICT skills. In a skills shortage environment, skilled migration is an important lever for developing competitive advantage for the nation. However it needs to be targeted, and needs to address the genuine skills gaps in the domestic market, while ensuring migrant workers are not exploited.” Deloitte Access Economics partner, John O’Mahony, said: “Australian employers are placing a high value on ICT skills against the backdrop of digital technologies being increasingly fundamental to a thriving economy. As business disruption becomes more widespread, businesses need a strong ICT core to manage change – making ICT workers and ICT skills the bread and butter behind that change.” The report further highlights a ‘to-do’ list for government that includes multiplying digital precincts, prioritising cyber, transitioning education and getting more people to study ICT, supporting Aussie start-ups, the next steps for the NBN and wireless technology, and focusing on efforts towards open data, digitising government, and copyright reform. Australia’s Digital Pulse is a unique and comprehensive analysis of the ICT sector and the digital economy for Australia. The full report can be downloaded by clicking (here). Australia’s Digital Pulse 2017 will be launched during CeBIT, on Wednesday 24 May at 5:00-7:00pm. Speakers will include the Hon Angus Taylor MP Assistant Minister for Cities and Digital Transformation (by video), John O’Mahony Partner Deloitte Access Economics, Nick O’Donnell Director of Public Policy and Government Affairs, LinkedIn Australia, New Zealand and Southeast Asia, Anthony Wong ACS President, and Michelle Price Chief Operations Officer Australian Cyber Security Growth Network. -ENDS- Media Contact Louise Proctor, Launch Group, 0452 574 244, louise@launchgroup.com.au Christine Kardashian, Launch Group, 0416 005 705, Christine@launchgroup.com.au About the ACS The ACS is the professional association for Australia's Information and Communication Technology (ICT) sector. Over 20,000 ACS members work in business, education, government and the community. The ACS exists to create the environment and provide the opportunities for members and partners to succeed. The ACS strives for ICT professionals to be recognised as drivers of innovation in our society, relevant across all sectors, and to promote the formulation of effective policies on ICT and related matters. Visit www.acs.org.au for more information. FAST FACTS The following statistics are presented according to subject matter areas. The Digital Economy The economic contribution to Australia of the digitally-enabled economy is on track to meet the forecast $139b growth target 2020. New economic modelling shows that adoption of digital technologies has lifted Australia’s GDP by 6.6% over the previous decade – each Australian being $4,663 a year better off (in 2016 dollars). The economic contribution of the digital-enabled economy in Australia is forecast to increase to $139 billion by 2020, representing 7.3% of Australia’s GDP (DAE 2016a). Nearly 90% of this contribution is expected to come from the use of internet and digital technologies outside of the Information, Media and Telecommunications industry. Trade in ICT continues to grow, with Australia’s ICT services exports increasing by 12% to $2.8 billion in 2015-16. The ICT input share of Australia’s goods exports increased from 4% in 2013 to 7% in 2016 – reflecting the greater uptake of new technologies across key industries of economic importance in Australia, such as agriculture and manufacturing. The average cost of a cyber crime attack to an Australian business is around $419,000. Economic modelling suggests that greater investment in cyber security by Australian businesses could result in an uplift of 5.5% in business investment, an increase in wages by 2%, and an additional 60,000 people employed by 2030. Australia’s ICT Workforce Forecast ICT employment 81,000 new ICT jobs needed by 2022 to fuel future technology-led growth. ICT workers to increase from around 640,800 in 2016 to around 721,900 in 2022, at an average annual growth rate of 2.0% This represents a higher growth rate than that expected for the overall Australian workforce over the same period, forecast to be 1.4% per annum National ICT workforce of 640,846 in 2016 1.9% increase on the 628,810 ICT workers in 2015 40,000 ICT jobs created in Australia in just the last two years ICT proportion of total workforce is 5.4% 52% of the current ICT workforce is employed outside ICT-related industries such as in professional services, public administration and financial services ICT workers by selected industries 309,313 – ICT related 75,806 – Professional, Scientific & Technical Services 46,262 – Public Administration & Safety 44,425 – Financial & Insurance Services 25,145 – Retail Trade 24,807 – Education & Training Labour Market for Global ICT Talent Linkedin data on Top 10 skills possessed by ICT workers moving to Australia Project Management; SQL; Business Analysis; Requirements Analysis; Customer Service; Java; Team Leadership; Software Development Life Cycle (SDLC); Agile Methodologies; JavaScript Linkedin data on Top 10 skills possessed by ICT workers leaving Australia Project Management; Customer Service; Business Analysis; Marketing; Strategy; Social Media; Business Development; Change Management; Business Strategy; Business Process Improvement. Australia’s Intensive Users of ICT Workforce The broader ICT workforce is forecast to grow from around 2,548,900 workers in 2016 to 2,785,600 in 2022 (average annual growth rate of 1.5% and equivalent to a projected gain of 236,700 jobs over this period) Diversity in ICT Women continue to represent only 28% of the ICT workforce (compared to 44% across all professional industries). Older workers (55+) only represent 12% of Australia’s ICT workforce (compared to 16% of workers across all professional industries) ICT Skills In Demand ICT employment growth forecast strongest in the largest two ICT occupation groupings (2016-2022) ICT Management and Operations (2.4% average annual growth between 2016-22). ICT Technical and Professional (1.9% average annual growth between 2016-22). Top 10 in-demand ICT job occupations 2016 LinkedIn data shows the top 3 (out of 10) ‘in-demand’ ICT occupations with the most job advertisements were roles that connect technical ICT functions to broader business requirements. These include: project Manager; Business Analyst; and Business Development Manager. ICT workers with specific technical skills are still in high demand – NET developer, Software Engineer, Solution Architect, Java Developer, Front End Developer. LinkedIn data on the top 20 skills required by ICT workers in 2016 are technical and non-technical 6 out of top 10, and 9 out of top 20 are non-technical The top 9 being: Project & Process Management (number 1 skill) Management Consulting & Business Strategy (number 2) Business Development & Relationship Management (number 3) Customer Service (number 4) Strategic Planning (number 5) Sales (number 6) Purchasing and Contract Negotiation (number 7) Social Media Marketing (number 8) Employee Training & Development (number 9). ICT Education ICT student trends Domestic undergraduate enrolments have risen from around 19,000 at the start of this decade to 25,700 in 2015. Domestic undergraduate completions of ICT degrees increasing from around 3,000 to almost 4,000 over the same period. Postgraduate enrolments and completions by domestic students have also increased marginally, but these also continue to remain below the peaks seen in the early 2000s. Total qualifications held by ICT workers in 2016 Forecast to increase from 1,000,200 in 2016 to 1,148,100 in 2022, representing an average annual growth rate of 2.3% Fields of study for ICT workers in 2016 The qualifications demanded of ICT workers are becoming increasingly broadened, beyond ICT-specific fields of study. 2016 LinkedIn data shows that whilst Computing Science and Information Science and Technology are the most common study areas, 5 of the top 10 study areas for ICT workers are non-ICT, suggesting business related degrees can be pathways into the ICT workforce Accounting; Business; Business Management & Admin; Marketing; Project Management CA Technologies launches new global marketing campaign: “The Modern Software Factory” 2017-05-23T06:19:12Z ca-technologies-launches-new-global-marketing-campaign-the-modern-software-factory SYDNEY, 23 May 2017 – CA Technologies (NASDAQ: CA) has launched a new global marketing campaign, “The Modern Software Factory,” to showcase the full spectrum of capability CA brings to customers navigating the challenges of digital transformation. Businesses today face near constant digital disruption, affecting business decision makers at all levels from the C-Suite to those deploying software across their organisations. The Modern Software Factory campaign reflects their insights on the challenges to ‘build better apps, faster and securely’ and ‘gain insight from data,’ which have become foundational to competing in today’s application economy. The premise of the campaign is simple: as businesses across all industries recognise that software is core to creating competitive advantage, CA shows how they can start with a single CA Solution, or a combination of solutions across the areas of Agile, DevOps and Security. In the book “Digitally Remastered: Building Software into Your Business DNA” launched last fall, author Otto Berkes, CTO of CA Technologies, outlines key insights that inform the tools and techniques that companies are using on their digital transformation journeys. The Modern Software Factory, a concept portrayed through a virtual environment, brings these insights to life. “The competitive value of digital transformation has become very real, and customers are looking for partners who can help them navigate the journey successfully,” said Lauren Flaherty, chief marketing officer, CA Technologies. “The Modern Software Factory is the creative expression of CA’s business strategy. We’re laying out a blueprint that’s designed to help guide customers as they leverage software to win in the market.” The new campaign, running immediately across broadcast and digital channels to reach executives as well as those who deploy software, brings The Modern Software Factory to life as it follows a group of executives looking to transform their business. They are guided through a dynamic, visionary space and shown how CA’s capabilities across Agility, Insights, Automation and Security come together to help them compete. The Tour: The guide introduces The Modern Software Factory to a group of executives. They see the wonders of the factory—a world where Agile, Automation, Insights and Security come together to help businesses compete. The Answer: The executives realise the power of the software factory and yet have a hard time understanding its technical aspects. The guide makes it simple: if you’re going to compete in the app economy, the answer is CA Technologies. The new broadcast spots and digital content, created and produced by John McNeil Studio, demonstrate how CA’s portfolio comes together to create advantage for customers, solve their most pressing needs, and become strategic partners in their digital transformation journeys. The campaign will span the US, UK, DE, AU & Pan Regional (ES) markets, and content will be amplified across CA social channels and CA.com. - ENDS- About CA Technologies CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. IBM and Nutanix Launch Hyperconverged Initiative to bring Enterprises into the Cognitive Era 2017-05-16T23:38:39Z ibm-and-nutanix-launch-hyperconverged-initiative-to-bring-enterprises-into-the-cognitive-era ARMONK, NY / SAN JOSE, California – May 16, 2017 – IBM (NYSE: IBM) and Nutanix (Nasdaq: NTNX) today announced a multi-year initiative to bring new workloads to hyperconverged deployments. The integrated offering aims to combine Nutanix’s Enterprise Cloud Platform software with IBM Power Systems, to deliver a turnkey hyperconverged solution targeting critical workloads in large enterprises. The partnership plans to deliver a full-stack combination with built-in AHV virtualization for a simple experience within the datacenter. In today’s technology landscape, processing real-time information is necessary but not sufficient. Being able to react in real-time used to give enterprises a competitive advantage, but this approach no longer guarantees happy customers. The value has now migrated to the ability to rapidly gather large amounts of data, quickly crunch and predict what’s likely to happen next - using a combination of analytics, cognitive skills, machine learning and more. This is the start of the insight economy. Handling these kinds of workloads present unique challenges - needing a combination of reliable storage, fast networks, scalability and extremely powerful computing. It seems like private datacenters that were designed just a few years ago are due for a refresh - not only in the technology, but also in the architectural design philosophy. This is where the combination of IBM Power Systems and Nutanix comes in. This joint initiative intends to bring new workloads to hyperconverged deployments by delivering the first simple-to-deploy, web-scale architecture supporting POWER based scale-out computing for a continuum of enterprise workloads, including: ● Next generation cognitive workloads, including big data, machine learning and AI ● Mission-critical workloads, such as databases, large scale data warehouses, web infrastructure, and mainstream enterprise apps ● Cloud Native Workloads, including full stack open source middleware and enterprise databases and Containers With a shared philosophy based on open standards, a combination of Nutanix and IBM will be designed to bring out the true power of software-defined infrastructure - choice - for global 2000 enterprises, with plans for: ● A simplified private enterprise cloud that delivers POWER architecture in a seamless and compatible way to the datacenter ● Exclusive virtualization management with AHV, advanced planning and remediation with Machine Learning, App Mobility, Microsegmentation and more, with one-click automation ● A fully integrated one-click management stack with Prism, to eliminate silos and reduce the need for specialized IT skills to build and operate cloud-driven infrastructure ● Deploying stateful cloud native services using Acropolis Container Services with automated deployment and enterprise-class persistent storage “Hyperconverged systems continue on a rapid growth trajectory, with a market size forecast of nearly $6 billion by 2020[1]. IT teams now recognize the need, and the undeniable benefits, of embracing the next generation of datacenter infrastructure technology,” said Stefanie Chiras, VP Power Systems at IBM. “Our partnership with Nutanix will be designed to give our joint enterprise customers a scalable, resilient, high-performance hyperconverged infrastructure solution, benefiting from the data and compute capabilities of the POWER architecture and the one-click simplicity of the Nutanix Enterprise Cloud Platform.” “With this partnership, IBM customers of Power-based systems will be able to realize a public cloud-like experience with their on premise infrastructure,” said Dheeraj Pandey, CEO at Nutanix. “With the planned design, Enterprise customers will be able to run any mission critical workload, at any scale, with world-class virtualization and automation capabilities built into a scale out fabric leveraging IBM’s server technology.” Pricing and Availability The IBM and Nutanix initiative will bring options for clients and a seamless experience for these clients, and will be sold exclusively through IBM sales force and channel partners. Specific timelines, models and supported server configurations will be announced at the time of availability. About IBM IBM Power Systems are servers designed for mission-critical applications and emerging Cognitive Era workloads including artificial intelligence, machine learning, deep learning, advanced analytics and high performance computing, data lakes and operational datastores. Designed to deliver efficiency whether deployed in a private, public and hybrid cloud, Power Systems benefit from a wide range of open technologies, many stemming from collaboration with fellow OpenPOWER Foundation members. Customers today can enjoy benchmark setting performance for a wide variety of data-intensive workloads – for example, IBM guarantees that Power Systems servers can deliver twice the performance per dollar as x86 systems for customer workloads based on MongoDB. About Nutanix Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform leverages web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence. The result is predictable performance, cloud-like infrastructure consumption, robust security, and seamless application mobility for a broad range of enterprise applications. Learn more at www.nutanix.com or follow us on Twitter @nutanix. © 2017 Nutanix, Inc. All rights reserved. Nutanix, the Enterprise Cloud Platform, and the Nutanix logo are trademarks of Nutanix, Inc., registered or pending registration in the United States and other countries. [1] Source: http://www.marketwatch.com/story/is-hyperconvergence-the-next-big-thing-in-tech-2017-04-03 Resources ● Joint Announcement Video, Blog ● Images: IBM Power, Nutanix ● For more about IBM Systems, visit here. Nutanix, visit here. ● Infographic Forward-Looking Statements This press release includes forward-looking statements concerning Nutanix’s and IBM’s plans and expectations relating to a multi-year hyperconverged initiative and the deployment of Nutanix software on, and the interoperability of Nutanix software with, IBM Power Systems. These forward-looking statements are not historical facts, and instead are based on the parties’ current expectations, estimates, opinions and beliefs. The accuracy of such forward-looking statements depends upon future events, and involves risks, uncertainties and other factors beyond the parties’ control that may cause these statements to be inaccurate and cause actual results, performance or achievements to differ materially and adversely from those anticipated or implied by such statements, including, among others: the failure to develop, or unexpected difficulties or delays in developing, the integrated offering on a timely or cost-effective basis; the introduction, or acceleration of adoption of, competing solutions, including public cloud infrastructure; a shift in industry or competitive dynamics or customer demand; and other risks detailed in Nutanix’s quarterly report on Form 10-Q for its fiscal quarter ended January 31, 2017, and IBM’s annual report on Form 10-K for its fiscal year ended December 31, 2016, each as filed with the Securities and Exchange Commission. These forward-looking statements speak only as of the date of this press release and, except as required by law, neither Nutanix nor IBM assumes any obligation to update forward-looking statements to reflect actual results or subsequent events or circumstances. How to protect your organisation from WannaCry ransomware 2017-05-14T02:49:35Z how-to-protect-your-organisation-from-wannacry-ransomware While organisations have been under threat from ransomware for years, the attack landscape has been very narrowly focused. Victims tended to have to manually enabled the attack through some method, such as opening email attachments or downloading unverified software. Much of that has changed with the current global-scale WannaCry ransomware campaign.  Tens of thousands of systems have been compromised, and the attack is ongoing. Along with peers in the industry, Carbon Black’s Threat Research Team has been actively analysing the malware and its threats. We found that the ransomware does not have any truly novel tricks up its sleeve. It is standard ransomware that, upon execution, creates dozens of files in its current location and starts infecting the system. It targets a specific set of file extensions, more than 150 of them, beginning with known MS Office documents, which is also in line with many other known ransomware families. What is truly unique about it is its method of delivery, which is believed to be through the now-known ETERNALBLUE exploit. While the number of incidents are extremely high, many are believed to be a result of poor security posture. Protection against the ETERNALBLUE exploit is fairly basic. The exploit targets servers with SMB network sharing exposed to the Internet, a feature that should be immediately considered for deactivation. Servers are targeted over the standard network ports for the SMB service, all of which can be actively disabled in an organisation’s firewalls. More importantly, these exploits have been actively resolved by current, and ongoing, patches released by Microsoft. Patches should be considered for immediate testing and release within an environment. These suggestions follow the established SMB Security Best Practices. Ransomware is on track to be an $US1 billion crime in 2017, according to FBI data. That’s a substantial increase from 2015, when ransomware was a ‘mere’ $24 million crime. Additionally, ransomware emerged as the fastest-growing malware across all industries in 2016. It appears that healthcare is now in the cross hairs. An organization can take immediate steps to protect against WannaCry and other ransomware variants.1. Back up data regularly. Verify the integrity of those backups and test the restoration process to ensure it’s working.2. Secure offline backups. Backups are essential: if you’re infected, a backup may be the only way to recover your data. Ensure backups are not connected permanently to the computers and networks they are backing up.3. Configure firewalls to block access to known malicious IP addresses.4. Logically separate networks. This will help prevent the spread of malware. If every user and server is on the same network newer variants can spread.5. Patch operating systems, software, and firmware on devices. Consider using a centralized patch-management system.6. Implement an awareness and training program. End users are targets, so everyone in your organization needs to be aware of the threat of ransomware and how it’s delivered.7. Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.8. Enable strong spam filters to prevent phishing emails from reaching end users and authenticate inbound email using technologies such as Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent spoofing.9. Block ads. Ransomware is often distributed through malicious ads served when visiting certain sites. Blocking ads or preventing users from accessing certain sites can reduce that risk.10. Use the principle of ‘least privilege’ to manage accounts: No users should be assigned administrative access unless absolutely needed. If a user only needs to read specific files, the user should not have write access to them.11. Leverage next-generation antivirus (NGAV) technology to inspect files and identify malicious behaviour to block malware and non-malware attacks that exploit memory and scripting languages like PowerShell.12. Use application whitelisting, which only allows systems to execute programs known and permitted by security policy.13. Categorise data based on organizational value and implement physical and logical separation of networks and data for different organisational units.14. Conduct an annual penetration test and vulnerability assessment. Stopping ransomware requires a defence-in-depth approach; there is no silver bullet to security. Software alone is not the answer. IT and SecOps teams must build a strategy that combines user training, next-generation endpoint security, and backup operations. Every strategy should start with the simplest, most immediate risk-mitigation techniques available in order to limit the attack surface. Concurrently, user training and backup infrastructures should be evaluated, implemented, and practiced. And please, patch, patch, patch!For more information Kane Lightowler Managing Director – Asia Pacific & Japan Carbon Black +65 9667 7228                                                                 While organisations have been under threat from ransomware for years, the attack landscape has been very narrowly focused. Victims tended to have to manually enabled the attack through some method, such as opening email attachments or downloading unverified software. Much of that has changed with the current global-scale WannaCry ransomware campaign.  Tens of thousands of systems have been compromised, and the attack is ongoing. Along with peers in the industry, Carbon Black’s Threat Research Team has been actively analysing the malware and its threats. We found that the ransomware does not have any truly novel tricks up its sleeve. It is standard ransomware that, upon execution, creates dozens of files in its current location and starts infecting the system. It targets a specific set of file extensions, more than 150 of them, beginning with known MS Office documents, which is also in line with many other known ransomware families. What is truly unique about it is its method of delivery, which is believed to be through the now-known ETERNALBLUE exploit. While the number of incidents are extremely high, many are believed to be a result of poor security posture. Protection against the ETERNALBLUE exploit is fairly basic. The exploit targets servers with SMB network sharing exposed to the Internet, a feature that should be immediately considered for deactivation. Servers are targeted over the standard network ports for the SMB service, all of which can be actively disabled in an organisation’s firewalls. More importantly, these exploits have been actively resolved by current, and ongoing, patches released by Microsoft. Patches should be considered for immediate testing and release within an environment. These suggestions follow the established SMB Security Best Practices. Ransomware is on track to be an $US1 billion crime in 2017, according to FBI data. That’s a substantial increase from 2015, when ransomware was a ‘mere’ $24 million crime. Additionally, ransomware emerged as the fastest-growing malware across all industries in 2016. It appears that healthcare is now in the cross hairs. An organization can take immediate steps to protect against WannaCry and other ransomware variants.1. Back up data regularly. Verify the integrity of those backups and test the restoration process to ensure it’s working.2. Secure offline backups. Backups are essential: if you’re infected, a backup may be the only way to recover your data. Ensure backups are not connected permanently to the computers and networks they are backing up.3. Configure firewalls to block access to known malicious IP addresses.4. Logically separate networks. This will help prevent the spread of malware. If every user and server is on the same network newer variants can spread.5. Patch operating systems, software, and firmware on devices. Consider using a centralized patch-management system.6. Implement an awareness and training program. End users are targets, so everyone in your organization needs to be aware of the threat of ransomware and how it’s delivered.7. Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.8. Enable strong spam filters to prevent phishing emails from reaching end users and authenticate inbound email using technologies such as Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent spoofing.9. Block ads. Ransomware is often distributed through malicious ads served when visiting certain sites. Blocking ads or preventing users from accessing certain sites can reduce that risk.10. Use the principle of ‘least privilege’ to manage accounts: No users should be assigned administrative access unless absolutely needed. If a user only needs to read specific files, the user should not have write access to them.11. Leverage next-generation antivirus (NGAV) technology to inspect files and identify malicious behaviour to block malware and non-malware attacks that exploit memory and scripting languages like PowerShell.12. Use application whitelisting, which only allows systems to execute programs known and permitted by security policy.13. Categorise data based on organizational value and implement physical and logical separation of networks and data for different organisational units.14. Conduct an annual penetration test and vulnerability assessment. Stopping ransomware requires a defence-in-depth approach; there is no silver bullet to security. Software alone is not the answer. IT and SecOps teams must build a strategy that combines user training, next-generation endpoint security, and backup operations. Every strategy should start with the simplest, most immediate risk-mitigation techniques available in order to limit the attack surface. Concurrently, user training and backup infrastructures should be evaluated, implemented, and practiced. And please, patch, patch, patch!For more information Kane Lightowler Managing Director – Asia Pacific & Japan Carbon Black +65 9667 7228