The PRWIRE Press Releases https:// 2020-02-24T14:39:56Z BeyondTrust Expands Cloud Leadership with Privilege Management Delivered As-A-Service 2020-02-24T14:39:56Z beyondtrust-expands-cloud-leadership-with-privilege-management-delivered-as-a-service Singapore – Feb 24, 2020 – BeyondTrust, the worldwide technology leader in Privileged Access Management (PAM), today announced the new Privilege Management SaaS, supporting Windows desktops/servers and MacOS. By delivering its leading Endpoint Privilege Management solution via a SaaS management platform, BeyondTrust is making it even easier for customers to eliminate unnecessary privileges and stop malicious attacks by enforcing least privilege on Windows and Mac systems. With full management capabilities in the cloud, BeyondTrust gives customers the best the cloud has to offer – high availability, security, access, and scalability, while removing the overhead of managing infrastructure. For organisations looking to reduce privileged access risks without adding administrative and financial burdens on their organisation, BeyondTrust’s SaaS solutions feature rapid deployment and make managing privileged access easier and more cost-effective. Additionally, the SaaS offering is available in a subscription model, allowing customers to pay only for what they need and expand with their business. “Security and IT teams are struggling to manage aging software and hardware, while pressured by the business to rollout new solutions and versions with little to no disruption,” said Daniel DeRosa, Senior Vice President and Chief Product Officer at BeyondTrust. “Our new Privilege Management SaaS offering ensures that no valuable time is lost, and employee productivity is maximised. With our PAM SaaS solutions, businesses get the best of both worlds, removing the burden of managing their infrastructure while enjoying the feature-richness of the cloud.” According to the 2019 BeyondTrust Microsoft Vulnerabilities Report, of the 189 Critical Microsoft vulnerabilities reported, 81% could be mitigated by removing local admin rights from users. Privilege Management SaaS enables organisations to eliminate admin rights quickly and efficiently, without disrupting user productivity, unlike traditional privilege management products that can take months to properly configure. Key features of Privilege Management SaaS:  •         QuickStart: Achieve least privilege overnight without the productivity impact on employees by simply assigning users to high, medium or low flexibility roles based on users’ requirements. •         Smart Reports: Access granular event and process data to inform targeted policy changes or monitor trends to track rollout success over time. •         Easy Deployment: With our Software-as-a-Service model, organisations can be pushing policy and achieving least privilege across the business within hours. •         Trusted App Protection: Protect the most targeted applications by blocking common attack vectors which can succeed even with least privilege access. •         Policy Edit: Use the insights gained from reporting to quickly and easily create policy revisions which can be tested and rolled out to endpoints as required. •         Policy Groups: Make the estate even easier to manage by grouping endpoints by policy need and targeting policy changes and updates at group level instead of across the entire organisation. Privilege Management is a key part of the BeyondTrust Privileged Access Management portfolio—an integrated solution that provides visibility and control over all privileged accounts and users. By uniting the broadest set of privileged security capabilities, BeyondTrust’s Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Privilege Management SaaS will be available in mid-Q2 2020. About BeyondTrust BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organisations to secure and manage their entire universe of privileges.  Our integrated products and platform offer the industry's most advanced PAM solution, enabling organisations to quickly shrink their attack surface across traditional, cloud and hybrid environments.  The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organisations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance.  We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network. Learn more at Follow BeyondTrust: Twitter: Blog: LinkedIn: Facebook: ### For BeyondTrust in Australia, Singapore and other APJ countries: Liz Drysdale Director of Marketing – APJ BeyondTrust P: (65) 8112 5289 E: 2Base Technologies Celebrates 10 Years Of Success 2020-02-24T11:55:06Z 2base-technologies-celebrates-10-years-of-success 2Base Technologies celebrated their 10 years of success on 7th of February at Indriya Sands, Kuzhippilly, Kochi, India. The anniversary event was celebrated with grandeur. After brief talks by the management, there was a cultural display and other fun activities laid forward by the employees, accompanied by an array of delicacies. From a small team in Palakkad, 2Base Technologies has expanded its services to various locations around the globe, including the UK, South Africa, Australia, the Middle East and the USA. "We plan to expand our markets to various locations in Africa, Europe and North America in the next 3 years", says Rahul Raj, the Head - Global Sales & Marketing of 2Base Technologies. "Our employees are our strength. We want to invest more in their growth, both personally and professionally.", says Midhun G Menon, CEO of 2Base Technologies. Employees who completed 3 years of service, the outstanding performer of the year and other employees who showed commitment and love towards the company were awarded and felicitated at the celebration. "Working at 2Base Technologies is an awesome experience. I always feel I am a part of a big family, managing both my duties and my personal growth", says Sejin Roy. The employees are a part of the 2Base family and stick together for both, work and fun. Anoop, Head - Projects & Delivery says,  "We have streamlined our business and working process to intensify our project quality, punctuality of delivery and efficiency". With a new and improved streamlined process, 2Base Technologies expects to augment the efficiency of the projects, strengthen the employee communication and ease of handling the tasks. 2Base Technologies has 2 successful products in the market. TaxiOnTheGo, a white-label taxi solution ideal to automate and expand taxi businesses, and ShareOnTheGo, a white-label carpooling solution to the commuting worries. "In the coming years, we are focusing to build products that would help to better the living standards of the people and take the products to the global market, says Nidhin Baby, Founder & Managing Director of 2Base Technologies. Everyone enjoyed the anniversary celebration with fun and rewards while embracing the culture and values of the company. 2Base Technologies looks forward to its total growth in the years to come. To learn more about 2Base Technologies, please visit Procurement and supply chain teams urged to learn from Australia’s recent underpayment scandals 2020-02-24T03:30:11Z procurement-and-supply-chain-teams-urged-to-learn-from-australia-s-recent-underpayment-scandals Top retail executives have blamed offshore software not configured for “Australia's relatively complex labour environment as a key factor in staff being underpaid.”   This comes after the recent wave of backlash against high-profile retail and hospitality businesses for underpayment revelations.   Industries with complex supply chain and labour environment such as construction, mining, resources, and utilities are urged to look at the story and assess their own risk.   “There are now legislative requirements in each state and territory, which stipulates that construction companies must pay their subbies within a certain period. Often, the issue with that is their cumbersome system will make it difficult to do so,” says Dan Wilson – General Manager of Felix.   New and amended legislations that affect procurement and supply chain come every year. For instance, there are recent compliance requirements for the Modern Slavery Act, the Black Economy procurement connected policy, and Indigenous/Social Procurement policies.   Meanwhile, localisation of offshore software can be hard and expensive. To keep up with changing legislations, awards, and enterprise agreements, it requires configuration and regular updating. This process is either done by external consultants or the organisations themselves.   Global names such as SAP, Kronos and Infor off-the-shelf software packages are “not set up to interpret Australian awards.” Yet they are common choices for major companies in Australia, according to the Sydney Morning Herald.   Moreover, the recent software debacle is still fresh in the minds of government buyers. Queensland Health’s $135 million SAP ERP purchase could face an audit just half a year after its rollout.   A preliminary inquiry is already looking at the “implementation issues; late payments to vendors; and the continuing additional cost to manage the system”.  Josh Guthrey, Enterprise Sales Executive at Felix, says many businesses still think putting in a piece of software will solve all their woes.  “Often, they don't realise that it comes with ensuring processes and policies are in place so that the implemented system accurately accounts for complexities in the business, especially in sectors where complex contractual chains are prevalent,” says Mr Guthrey.   Companies have been warned to take it seriously or “get their house in order.” Where there are reputational and financial consequences on the line, penalties from current or proposed legislations might just spur organisations into action.   “Take the most recent and first prosecution under Queensland’s new industrial manslaughter laws, where the company’s directors can face up to 20 years in prison. It’d be no surprise if wage theft would end up resulting in criminal charges,” Mr Guthrey says.   In the construction industry, any company subject to the Building Code is required to monitor compliance by their contractors, in relation to workplace health and safety as well as security of payments laws.   While technology helps with digitising processes and allowing for audit trails, a lag between a regulatory change and its corresponding reflection in processes and systems can leave organisations exposed to risks. This lag can be longer for large, offshore software packages.   However, the actual end users of enterprise software packages often have little say in what vendor to choose. The decision made at the top and imposed on everyone can result in low engagement, frustration, inefficiency or workarounds by the end users.   “The mentality of “Nobody ever got fired for buying IBM” or insert any large multinational vendor’s name here, is quite risky in today’s business environment. The nimbleness of a software solution should always be considered, along with articulate user requirements from both functional and experiential perspectives,” says Mr Wilson.       --------  About Felix  Felix is an enterprise procurement platform built to significantly improve productivity, reduce costs and mitigate risk for organisations of all sizes. Felix eliminates dependency on manual processes by streamlining vendor pre-qualification, vendor relationship management, sourcing, and contract management - in one integrated platform. With tools to make every part of your process more human and an Australian based team excited to help you, getting started with digitising procurement has never been easier.   Rapid7 Named a Leader in Gartner Magic Quadrant for Security Information and Event Management (SIEM) 2020-02-23T23:47:46Z rapid7-named-a-leader-in-gartner-magic-quadrant-for-security-information-and-event-management-siem MELBOURNE, Australia, February 24, 2020 ​– Rapid7, Inc. (NASDAQ: RPD), a leading provider of security analytics and automation, today announced that it has been named a Leader in Gartner’s 2020 Magic Quadrant for Security Information and Event Management (SIEM). For security operations, detecting and responding to potential attacks has become increasingly complex as organisations shift to the cloud, attack surfaces expand, yet resources and talent remain scarce. Traditional SIEMs have not evolved to reduce this rising complexity or increase the effectiveness of security teams. “InsightIDR and Rapid7’s corresponding managed detection and response offering are built to reduce complexity and accelerate detection and response in modern environments, helping teams achieve the efficiency and effectiveness required to manage security risk,” said Richard Perkett, senior vice president, detection and response practice at Rapid7. “We believe our position as a Leader in this year’s Gartner Magic Quadrant is a testament to the value and return on investment our customers immediately realise.” InsightIDR offers a lightweight cloud deployment that gets teams up and running in days, not months or years. We believe its further benefits include: ● Ease of deployment ​– ​According to Gartner Peer Insights, “88% of InsightIDR customers indicated ease of deployment.” ● Fast time to value ​– InsightIDR supports hundreds of data sources and out-of-the-box detections, giving users reliable alerts from day one. ● Cloud-native ​– InsightIDR has been hosted in the cloud since day one, making it easier to manage, scale, and update than traditional on-premises offerings. ● Feature-rich functionality ​– Rapid7 goes beyond log collection to offer User and Entity Behaviour Analytics (UEBA), Attacker Behaviour Analytics (ABA) curated by its SOC team, visual investigation timelines, file integrity monitoring, endpoint monitoring, deception technology, and more ​– all in one, easy-to-use solution. ● Accelerate response ​– InsightIDR provides high context investigations and automation to eliminate threats quickly and minimise attacker impact. ● Platform and service offerings ​– ​Engage Rapid7’s expert services team or integrate with other Rapid7 Insight solutions, including best-of-breed vulnerability management, orchestration and automation, and application security. To view a complimentary copy of the full report, visit: To learn more about Rapid7’s SIEM solution, visit our blog or view a demo of InsightIDR. Gartner, Magic Quadrant for Security Information and Event Management, Kelly Kavanagh | Toby Bussa | Gorka Sadowski, 18 February 2020. Gartner Disclaimer Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About Rapid7  Rapid7 (Nasdaq: RPD) is advancing security with visibility, analytics, and automation delivered through our Insight cloud. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behaviour, investigate and shut down attacks, and automate routine tasks. Over 8,500 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organisations.  For more information, visit our website, check out our blog, or follow us on Twitter. Find Trustworthy Android App Development Companies 2020-02-21T10:56:52Z find-trustworthy-android-app-development-companies Mobile application developers in Melbourne, Australia offer a wide range of mobile app development services. Most app developers aim to provide exceptional service and find innovative ways to keep the customers happy with their apps. Mobile applications are capable of bringing technology to everyday life, giving new ways to interact with people, services and businesses. People use these mobile applications daily for access to information, entertainment and other services. Companies, therefore, need Android app development companies to manage, develop and manage the app's content. Custom software is one way of helping a business to improve their productivity and effectiveness. Businesses can offer their existing clients with an additional advantage, or introduce new services that will benefit them. This approach allows for the creation of unique custom applications that address a specific need for customers. Custom applications allow businesses to communicate effectively with customers can take advantage of more innovative and dynamic ways of engaging with their businesses. There are several mobile application development companies available in Melbourne, Australia. Some of the best mobile app development companies in Melbourne are Storm and Vecteezy. The storm is a full-service company that provides a complete range of software development solutions including on-demand mobile applications development, mobile app design, iOS, Android and Web application development, desktop web development, and database software development. Vecteezy is also a mobile app development company that offers mobile applications development and maintenance. For any company looking for app development services Melbourne, Vecteezy is the first choice. They can be reached through email or phone to discuss your requirements. The storm is an established, full-service mobile application development company that offers a broad spectrum of software development solutions. Mobile application development services are developed by designers using advanced web technologies and client-specific tools for improved overall customer experience. By allowing customers to access their applications using any modern device, Storm can help provide valuable services and keep customers happy. With Storm, a company can develop full-screen apps that can be installed directly onto a smartphone, tablet or other devices to keep the customers updated with the latest content from their company's website. Storm provides clients with a customer support system, a team of mobile developers and user support and technical education. Any customer can call Storm to access technical support. Other mobile app development companies offering mobile app development services include Evolx and Mojozoo. They provide mobile application development, iOS, Android and Web application development, and desktop web development solutions. Evol works to create unique mobile apps that add value to existing products and services. They also provide scalable backend management and database back-up services to ensure a faster turnaround time for a client's project. Mojozoo offers mobile app development, app design, iOS, Android and Web application development, and mobile app design, maintenance and management. They work closely with their clients to determine the exact scope of the project and work closely with the client to determine the most effective and feasible solutions to ensure that a client's product is launched and deployed successfully. Many businesses need app development services in Melbourne, Australia. With many app development companies available in the city, they provide a host of mobile app development services to help any company with the creation of their new app. How to Make the Most of App Development Services in Melbourne 2020-02-21T10:21:54Z how-to-make-the-most-of-app-development-services-in-melbourne In the emerging field of digital marketing, Australia is a popular destination for business professionals who want to make the most of digital marketing. Melbourne has gained notoriety in this field due to its highly skilled talent pool. Some of the companies that have increased their headcount in Melbourne are Simtec, Deloitte, Waterstones, Red Leaf, and Indigo. These three big brands, together with several smaller companies, provide app development services. App development refers to any activity that involves the creation of a website, e-commerce website, application program, or anything else that requires the creation of a software system. A digital marketing strategy, however, is software development in an entirely different context. A business can utilize digital marketing strategies to reach more customers. App design entails the creative process of creating a product. The result may be a physical product or it may be software programs that can be downloaded. In other words, digital marketing includes creative service and application development. Digital marketing services consist of several strategies and techniques. Some of these are optimization, search engine optimization, online advertising, SEO, social media marketing, and so on. The clients and competitors are also involved in a strategy. App design and software development have two fundamental parts. One is the user interface or the interface. This is the visual appearance of the app and can be an on-screen interface or a graphical interface. The second part is the technical or the programming of the software program itself. Software development is an intricate and complex process that includes several stages of steps and processes. There are usually several components involved. It could also be a collaboration between programmers, artists, designers, and developers. In the first step, which is the design, the designer proposes a concept or a layout. The application, or the program, will then follow the design. Once this step is complete, the second step is used. This is the creation of the code of the application, which allows the software to run. One of the main benefits of software development is that the actual product is built without the need for any advanced technologies. Most software applications can be built directly using HTML and CSS. Besides, there are no extensive technical skills needed, although some components require special expertise. Some software development companies will produce the software by creating a series of prototypes. The final version is created using different software tools. The best way to know if the software is right for your project is to try it out. Also, there are additional services offered by software development services, such as: Feature engineering. This means providing quality customer support, answering questions about the software and making sure that features can work well with other features in the system. The process is a complex one and usually takes about six months. Deployment testing. This involves testing the software's functionality on real users. Some software is distributed in software packages. This software package can then be released in various test environments, such as virtual machines, a virtual test server, and so on. Remember that digital marketing provides many innovative ideas, so you will have plenty of ideas to improve your business. Design and develop your marketing strategy today! Epson launches new, ultra-efficient, heat-free A3 multi-function printers 2020-02-20T22:44:13Z epson-launches-new-ultra-efficient-heat-free-a3-multi-function-printers Epson has further reinforced its commitment to sustainable business solutions with the launch of seven new WorkForce devices, all powered by its innovative, ultra-efficient PrecisionCore heat-free print technology. The new range starts with the compact WorkForce Pro WF-878R desktop printer, ideal as either the main print device for smaller businesses or as a workgroup device for larger business and culminates with the WorkForce EnterpriseWF-C21000, an ultra-fast 100 ppm device designed to easily handle large print volumes and tight deadlines. Epson Australia MD Craig Heckenberg said, “Business inkjet is expected to account for over 40% of developed business print solutions within the next five years[1]. As a result Epson has taken steps to now to help the market with its requirements in this area, placing particular emphasis on heat-free and energy efficient solutions. These new products perfectly position us and our channel partners for future growth as they provide a sustainable, economical print solutions for organisations that are becoming increasingly aware of their carbon footprint, while at the same time seeking ways to reduce operating expenses.” The WorkForce Pro WF-C878R, WF-C878RTC, WF-C879R and WF-C879RTC models deliver enviable price performance. Extraordinarily high ink yields delivering up to 86,000 pages in black and up to 50,000 pages in colour mean minimal staff disruptions to attend any of the devices and, combined with aggressive price points, present a very compelling lower cost of ownership proposition. Where time and deadlines are important or finishing options are required, the WorkForce Enterprise WF-C20600 (60 ppm), WF-C20750 (75 ppm) and WF-C21000 (100 ppm) models come into their own. Comprehensive finishing options that include offset finishing and stapling, booklet-making and automatic hole-punch complement a total print solution that supports any busy work environment. Where organisations are looking to reduce their carbon footprint, meet their corporate social responsibility objectives, or just play their part in reducing CO2 emissions, these new Epson devices are the ideal choice to help address all of these goals and more.  Epson PrecisionCore Heat-Free print technology uses no heat in the printing process and up to 87% less energy to print a page than a comparable laser-based device2. This energy saving translates into reduced CO2 emissions and directly reduces printer-related electricity costs. Availability and pricing The new range of Epson WorkForce Pro and Enterprise business print devices will be available to Australian customers from April 2020. Purchase prices start from $4,995 ex. GST. All models are available as part of managed print service plans and flexible finance arrangements through Epson Premium Partners nationally. For further information on Epson WorkForce Pro solutions go to: For further information on Epson WorkForce Enterprise solutions: Follow Epson on social media:Facebook: @EpsonAustraliaTwitter: @EpsonAustInstagram: @EpsonAust 80% of Australian organisations say security concerns restrict public cloud adoption 2020-02-20T21:00:00Z eighty-percent-of-australian-organisations-say-security-concerns-restrict-public-cloud-adoption-1 Sydney, 21 February 2020 – Organisations in Australia indicate that more than 76 percent of their IT infrastructure will be operating in the public cloud over the next five years, an increase from almost 45 percent today, according to a new study sponsored by Barracuda Networks, Inc., a trusted partner and leading provider of cloud-enabled security solutions. Security remains the biggest roadblock to adoption for 80 percent of respondents, higher than the global average of 70 percent. The global study of 750 global IT decision makers was conducted by Vanson Bourne in December 2019 to capture their experiences with moving infrastructure to the public cloud, concerns restricting adoption, as well as the security and networking solutions being implemented to overcome them. The study involved 50 respondents in Australia. “While adoption rates for public cloud continue to grow, security is still the leading roadblock for Australian organisations, which is understandable considering the volume and variety of threats they face today,” said Andrew Huntley, regional director of ANZ and Pacific Islands for Barracuda. According to the survey, the leading cloud security concerns for Australian organisations include the security of public cloud infrastructure (42 percent), the impact of cyberattacks (28 percent), shadow IT (28 percent) and the security of applications deployed in public cloud (24 percent). Australian respondents indicated that the greatest threats to their public cloud infrastructure include open vulnerabilities in cloud applications (44 percent); sophisticated hackers (38 percent); ransomware (38 percent) and corporate network exposure to intrusions/attacks (38 percent). Sixty-eight percent of Australian respondents have already been targeted by a cyberattack, which is lower than the global average of 75 percent. After security, integration/network concerns come in second for Australian organisations in terms of public cloud adoption. This includes integrating public cloud with legacy technologies, better integration with private cloud, and enhanced integration with on-premises infrastructure. The survey also revealed that secure software-defined wide area networks (SD-WAN) fully integrated into public cloud is the solution of choice. Twelve percent of Australian respondents have already deployed SD-WAN, with another 50 percent either in the process of deploying or expecting to deploy within the next 12 months. SD-WAN is being used by a quarter of those who have added security to their public cloud. “As more IT infrastructure moves to public cloud, providers will offer more native network capabilities and public cloud will expand to include more network functionality,” Huntley said. “The vast majority of Australian organisations need their security vendors to offer advanced security and cloud connectivity tightly integrated with the major cloud platforms.” Download the full report: Future shock: the cloud is the new network. Read the blog post: Report: The Cloud Is the New Network About Barracuda At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organisations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit  Barracuda Networks, Barracuda and the Barracuda Networks logo are registered trademarks or trademarks of Barracuda Networks, Inc. in the U.S. and other countries. DDLS opens its first training facility in the Philippines 2020-02-20T06:17:41Z ddls-opens-its-first-training-facility-in-the-philippines DDLS, Australia’s largest provider of corporate ICT and cybersecurity training today officially opened its first training campus in the Philippines to support the local workforce. The opening of the new campus in the Philippines marks DDLS’ expansion into Asia Pacific and provides professionals in the Philippines with an opportunity to take up a career in a booming industry. “With DDLS present in every major city in Australia, we wanted to replicate this model in Southeast Asia, and the Philippines showed the most potential. Having skilled workers in the ICT industry who can monitor, secure and mitigate against any risks is a requirement that the industry has identified, and DDLS is responding to these needs by training the next generation of professionals in a new state-of-the-art facility.” said Jon Lang, CEO of DDLS. Located in Bonifacio Global City in Taguig, the 500sqm training facility consists of seven state-of- the-art training rooms, equipped with the latest technology as well as telepresence technology to help students and IT professionals master skillsets necessary to immediately enter the workforce. “The Philippines campus was designed to be conducive for learning, to match the quality of instruction that our trainers are able to impart.”, commented Mike Calma DDLS Philippines Country GM. “The campus will prepare students to meet the demand for talent in cybersecurity, DevOps, cloud and others through skill development, with technology that is at the forefront of this digital future.” DDLS, a wholly owned subsidiary of EdventureCo, joined forces with Aboitiz Impact Ventures, Inc. in March 2019 to bring quality IT Training to the Philippines. In less than a year of operations, DDLS Philippines has trained more than 300 students in Microsoft courses. It has since rolled out new training courses in IT service management, data science and cybersecurity. The new campus also hosts a dedicated Pearson VUE authorized room for taking online tests and certifications. As DDLS gains traction, it does not lose sight of its long-term goals. “Our vision for DDLS is to offer agile and accessible high-quality IT training. These skills have never been more relevant education needs to adapt. We need a modern way of training the modern workforce. We at Aboitiz have always believed in the value of education and the role it plays in advancing business and communities,” says Jokin Aboitiz, President, Aboitiz Impact Ventures. For more information on DDLS Philippines, visit or connect with us on Facebook and LinkedIn. About DDLS Philippines DDLS Philippines (DDLS Aboitiz Inc.) is a joint venture between EdventureCo, a leading vocational and professional education and training (VPET) group in Asia Pacific, and Aboitiz Impact Ventures (AIV), a wholly owned unit of Aboitiz Equity Ventures, Inc. (PSE: AEV). EdventureCo is a wholly owned subsidiary of Arowana International Limited (ASX: AWN). DDLS is Australia’s largest provider of corporate IT and process training and Australia’s number one cybersecurity training provider. We provide extensive training options tailored to organisations’ needs – from vendor-certified courses to customised training, including bespoke in-house developed courses. In cybersecurity we offer the broadest range of authorised training from leading global organisations including the EC-Council, (ISC)2, ISACA, RESILA (Axelos), and CompTIA. In all specialisations DDLS promotes a balanced approach to training with a focus on the key areas of technology, process and people. Phishing attacks and government surveillance concerns top new Ponemon Institute cyber report by Yubico 2020-02-19T23:34:08Z phishing-attacks-and-government-surveillance-concerns-top-new-cyber-report-by-yubico Yubico, the leading provider of hardware authentication security keys, today announced results of the company’s second annual State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute. Ponemon Institute surveyed 2,507 IT and IT security practitioners in Australia, France, Germany, Sweden, United Kingdom, and United States, as well as 563 individual users.  One of the key findings from Australia is that organisations are most concerned about the privacy and security of personal data.  The Report found that IT security practitioners and individuals are both engaging in risky password and authentication practices, yet expectation and reality are often misaligned when it comes to the implementation of usable and desirable security solutions. The tools and processes that organizations put in place are not widely adopted by employees or customers, making it abundantly clear that new technologies are needed for enterprises and individuals to reach a safer future together. “IT professional or not, people do not want to be burdened with security — it has to be usable, simple, and work instantly,” said Stina Ehrensvard, CEO and Co-Founder, Yubico. “For years, achieving a balance between high security and ease of use was near impossible, but new authentication technologies are finally bridging the gap. With the availability of passwordless login and security keys, it’s time for businesses to step up their security options. Organizations can do far better than passwords; in fact, users are demanding it.” Key Australian findings from this research include: ·       All individuals surveyed (globally) are especially concerned when it comes to government surveillance (65%) and protecting details of their health status (53%).  ·        Almost half of Australian organisations surveyed have experienced a phishing attack (47%) or ransomware attack (13%), with 52% saying their organisation changed their password practices following an attack.  ·       64% of Australian organisations have a password policy for their employees however only 36% said this policy was strictly enforced.  Global findings included: ·       Individuals report better security practices in some instances compared to IT professionals. Out of the 35% of individuals who report that they have been victim of an account takeover, 76% changed how they managed their passwords or protected their accounts. Of the 20% of IT security respondents who have been a victim of an account takeover, 65% changed how they managed their passwords or protected their accounts. Both individuals and IT security respondents have reused passwords on an average of 10 of their personal accounts, but individual users (39%) are less likely to reuse passwords across workplace accounts than IT professionals (50%). ·       Fifty-one percent of IT security respondents say their organisations have experienced a phishing attack, with another 12% of respondents stating that their organisations experienced credential theft, and 8% say it was a man-in-the-middle attack. Yet, only 53% of IT security respondents say their organisations have changed how passwords or protected corporate accounts were managed. Interestingly enough, individuals reuse passwords across an average of 16 workplace accounts and IT security respondents say they reuse passwords across an average of 12 workplace accounts. ·       Additionally, mobile use is on the rise. Fifty-five percent of IT security respondents report that the use of personal mobile devices is permitted at work and an average of 45% of employees in the organisations represented are using their mobile device for work. Alarmingly, 62% of IT security respondents say their organisations don’t take necessary steps to protect information on mobile phones. Fifty-one percent of individuals use their personal mobile device to access work related items, and of these, 56% don’t use 2FA. ·       Given the complexities of securing a modern, mobile workforce, organisations struggle to find simple, yet effective ways of protecting employee access to corporate accounts. Roughly half of all respondents (49% of IT security and 51% of Individuals) share passwords with colleagues to access business accounts. Fifty-nine percent of IT security respondents report that their organisation relies on human memory to manage passwords, while 42% say sticky notes are used. Only 31% of IT security respondents say that their organisation uses a password manager, which are effective tools to securely create, manage, and store passwords. ·       IT security respondents say they are most concerned about protecting customer information and personally identifiable information (PII). However, 59% of IT security respondents say customer accounts have been subject to an account takeover. Despite this, 25% of IT security respondents say their organisations have no plans to adopt 2FA for customers. Of these 25% of IT security respondents, 60% say their organisations believe usernames and passwords provide sufficient security and 47% say their organisations are not going to provide 2FA because it will affect convenience by adding an extra step during login. When businesses are choosing to protect customer accounts and data, the 2FA options that are used most often do not offer adequate protection for users. ·       IT security respondents report that SMS codes (41%), backup codes (40%), or mobile authentication apps (37%) are the three main 2FA methods that they support or plan to support for customers. SMS codes and mobile authenticator apps are typically tied to only one device. Additionally, only 23 percent of Individuals find 2FA methods like SMS and mobile authentication apps to be very inconvenient. A majority of Individuals rate security (56 percent), and affordability (57 percent), and ease of use (35 percent) as very important. ·       It is clear that new technologies are needed for enterprises and individuals to reach a safer future together. Across the board, passwords are cumbersome, mobile use introduces a new set of security challenges, and the security tools that organisations have put in place are not being widely adopted by employees or customers. In fact, 49% of individuals say that they would like to improve the security of their accounts and have already added extra layers of protection beyond a username and password. However, 56% of individuals will only adopt new technologies that are easy to use and significantly improve account security. Here’s what is preferred: biometrics, security keys, and password-free login. ·       A majority of IT security respondents and individuals (55%) would prefer a method of protecting accounts that doesn’t involve passwords. Both IT security (65%) and individual users (53%) believe the use of biometrics would increase the security of their organisation or accounts. And lastly, 56% of individuals and 52% of IT security professionals believe a hardware token would offer better security. Data for this survey was collected by Ponemon Institute on behalf of Yubico. Ponemon Institute was responsible for data collected, data analysis and reporting. Ponemon Institute and Yubico collaborated on the survey questionnaire. All survey responses were captured October 24 to November 15, 2019. To download the complete report and associated infographic, visit Claroty Receives 2019 Global Company of the Year Award for IT/OT Security 2020-02-19T23:04:25Z claroty-receives-2019-global-company-of-the-year-award-for-it-ot-security Claroty, the global leader in industrial cybersecurity, today announced that it has been named the 2019 Global Company of the Year by Frost & Sullivan. According to the firm, Claroty’s superior suite of products provides end-to-end visibility into industrial networks. Specifically, the company offers customers across a multitude of verticals unparalleled cyberthreat protection, detection and response for both IT and OT networks and devices. To receive this recognition, an organisation must strive to be best-in-class in three key areas: understanding demand, nurturing the brand and differentiating from the competition. “The open architectures of OT systems, using standardised interfaces and connecting to both the Internet and internal corporate networks, results in exposure to third-party intrusions—a common attack vector—and massive disruption possibilities,” said Swetha Ramachandran Krishnamoorthi, industry analyst at Frost & Sullivan. Frost & Sullivan recognises how Claroty’s platform nicely fills these critical gaps by offering a fully integrated product suite enriched with advanced features to provide unparalleled depth, coverage and scalability across a variety of domains.” Claroty has the only OT cybersecurity solution that encompasses the entire spectrum of cybersecurity functions, namely identification, detection, protection and response to threats. Its platform provides industrial control networks with complete visibility into assets, high-level threat detection and risk assessment, and its secure remote access—a centralised management interface—expedites data integration with existing security systems to facilitate simple service deployments. “We are honored to receive this distinction from Frost & Sullivan, as it validates all of the hard work that the team has done to demonstrate excellence in growth, innovation and leadership,” said Thorsten Freitag, Chief Executive Officer of Claroty. “This will be a breakaway year for OT cybersecurity as it becomes a required business mandate and Chief Information Security Officers much more aggressively seek strong partners in addressing their industrial cybersecurity challenges. We appreciate Frost & Sullivan’s affirmation and look forward to continuing to drive demand, strengthen our brand and deliver unique value to customers.” Moving forward, Claroty expects to continue the incredible momentum it experienced in 2019, which included: Extending its Continuous Threat Detection (CTD) product to enable enterprises to discover and monitor their IoT devices Introducing the integration of CTD with FireEye Helix to help industrial enterprises improve the efficiency and speed of security operations Being the first OT security provider to receive the U.S. Department of Homeland Security’s SAFETY Act approval for its best-in-class OT network monitoring solution Making CRN’s “Emerging Security Vendors to Know” and CyberCrime Magazine’s “The Hot 150 Cybersecurity Companies to Watch” lists Adding U.S. Navy Admiral (Ret.) Michael S. Rogers as Chairman of Claroty’s Board of Advisors. Appointing Thorsten Freitag as Chief Executive Officer and Jennifer Leggio as Chief Marketing Officer Download the report for more information on Claroty, its platform, and IT/OT security best practices. About Claroty Claroty bridges the industrial cybersecurity gap between information technology (IT) and operational technology (OT) environments. Organisations with highly automated production sites and factories that face significant security and financial risk especially need to bridge this gap. Armed with Claroty’s converged IT/OT solutions, these enterprises and critical infrastructure operators can leverage their existing IT security processes and technologies to improve the availability, safety, and reliability of their OT assets and networks seamlessly and without requiring downtime or dedicated teams. The result is more uptime and greater efficiency across business and production operations. Backed and adopted by leading industrial automation vendors, Claroty is deployed on all seven continents globally. The company is headquartered in New York City and has received $100 million in funding since being launched by the famed Team8 foundry in 2015. For more information, visit New ISACA Resource Guides Organisations in Overcoming Challenges to Build Effective Data Governance Program 2020-02-19T22:27:37Z new-isaca-resource-guides-organisations-in-overcoming-challenges-to-build-effective-data-governance-program Sydney, Australia (20 February 2020) – Effectively harnessing data can bring new value to businesses through better strategic planning and decision-making. Starting a data governance program or improving an existing program, however, comes with challenges. Enterprises can find best practices for overcoming these barriers and creating effective programs in a new paper from ISACA, “Rethinking Data Governance and Management: A Practical Approach for Data-Driven Enterprises.” Some of the key challenges in data governance that enterprises need to address include: Enterprises often cannot easily perceive the value of data governance because the benefits are difficult to quantify, resulting in a lack of management commitment. Data ownership is often not clearly defined due to the misconception that data management is technical work, and therefore, the IT department’s responsibility. Siloed department and organisational structures result in disaggregated datasets and data analytics challenges. As a solution to these challenges, organisations can employ a phased, five-stage approach to data management. The paper details the process, which starts with establishing a data governance foundation and concludes with a focus on data analytics. “Having an effective data governance program in place is valuable for gaining meaningful insights from data,” says Mais Barouqa, CISA, CGEIT, CRISC, IT Risk & Assurance Manager, Deloitte & Touche, and an expert reviewer for the white paper. “The five-stage approach will provide enterprises with a clear and structured path for building a program that will ultimately create value for their stakeholders while minimising risk.” “Rethinking Data Governance and Management” also offers guidance on building a foundation for data governance, as well as insights into data architecture, data quality and cleansing, data democratisation and data analytics. Professionals can gain practical insight in assessing their own data governance approaches by following a detailed hypothetical case study about a consumer product company looking to make better use of its data. To access the complimentary white paper, visit Gain access to additional educational resources from ISACA at About ISACA For more than 50 years, ISACA® ( has advanced the best talent, expertise and learning in technology. ISACA equips individuals with knowledge, credentials, education and community to progress their careers and transform their organisations, and enables enterprises to train and build quality teams. ISACA is a global professional association and learning organisation that leverages the expertise of its 145,000 members who work in information security, governance, assurance, risk and privacy to drive innovation through technology. It has a presence in 188 countries, including more than 220 chapters worldwide. Twitter: LinkedIn: Facebook: Instagram: Contact: Julie Fenwick, +61 468 901 655 Lauren Graham, +61 432 614 401 New Usage-based Pricing for Genesys Cloud Gives Organisations Ultimate Flexibility 2020-02-19T22:20:43Z new-usage-based-pricing-for-genesys-cloud-gives-organisations-ultimate-flexibility Genesys®, the global leader in cloud customer experience and contact centre solutions, has rolled out new hourly pricing for Genesys Cloud. Now, organisations can pay only for time spent using the company’s all-in-one solution, which is also the world’s leading public cloud contact center platform. Customers can choose from Genesys Cloud’s multiple pricing options — the flexible usage-based pricing that starts at just $0.68 USD per user hour or the existing named and concurrent models. While competitors with similar pricing structures charge additional fees for use of IVRs, data storage and API requests, Genesys Cloud includes this functionality in its flat rate. This makes it one of the most inclusive hourly pricing offers in the industry. “The new Genesys Cloud usage-based pricing is simple, transparent and enables organisations to pay only for what they use,” said Olivier Jouve, executive vice president and general manager of Genesys Cloud. “With this additional pricing option, we’re giving organisations the ultimate flexibility to choose how they’ll consume Genesys Cloud. We’re making Experience as a ServiceSM attainable for any organisation so they can lead with empathy in every customer interaction, resulting in more personalised connections.” Visibility and control down to the millisecond While many organisations are well-served by monthly user pricing, others benefit from the cost savings of time-based subscriptions, such as those with numerous part-time employees or seasonal spikes. Genesys hourly billing also lets customers achieve volume-based discounts through up-front commitments. In addition, customers now have by-the-millisecond visibility into consumption by user and by day, so they know the costs they have incurred. Depending upon the organisation’s needs, customers can choose from three convenient usage-based Genesys Cloud packages: $0.68/hour or $75/month – Genesys Cloud 1 includes the traditional features such as inbound and outbound voice $0.99/hour or $110/month – Genesys Cloud 2 builds upon Genesys Cloud 1 to include additional channels, such as email and chat, and AI-powered customer engagement $1.26/hour or $140/month – Genesys Cloud 3 adds to Genesys 2 with support for SMS, messaging apps and Workforce Engagement Management “The usage-based pricing from Genesys gives organisations a new opportunity to reconcile the tension between managing costs and delivering remarkable customer experiences,” said Mary Wardley, program vice president, Customer Care and CRM of IDC. “This important addition to Genesys Cloud pricing is yet another way the company is being responsive to the needs of customers and providing new operating models that are enabled by the cloud.” Learn why analysts and users agree Genesys Cloud is a leading contact centre platform. About Genesys Every year, Genesys® delivers more than 70 billion remarkable customer experiences for organisations in over 100 countries. Through the power of the cloud and AI, our technology connects every customer moment across marketing, sales and service on any channel, while also improving employee experiences. Genesys pioneered Experience as a ServiceSM so organisations of any size can provide true personalisation at scale, interact with empathy, and foster customer trust and loyalty. This is enabled by Genesys CloudTM, an all-in-one solution and the world’s leading public cloud contact centre platform, designed for rapid innovation, scalability and flexibility. Visit ©2020 Genesys Telecommunications Laboratories, Inc. All rights reserved. Genesys, the Genesys logo, Genesys Cloud and Experience as a Service are trademarks, servicemarks and/or registered trademarks of Genesys. All other company names and logos may be registered trademarks or trademarks of their respective companies. Contacts: Yvette Schlegelmilch Account Manager ZADRO +61 0 9212 7867 Elizabeth Williams Group Account Director ZADRO +61 411 201 354 Uniden releases new high-end series of ultra-compact, smart dash cams 2020-02-19T21:48:50Z uniden-releases-new-high-end-series-of-ultra-compact-smart-dash-cams Uniden is releasing two new high-end series of ultra-compact smart dash cams built for bright and low-light conditions with the DV30 featuring a 2.5k Video Resolution Front Camera and Full HD 30fps rear camera on the DV30R, with both providing a 140-degree wide angle lens. The media release and high-res images are available to download here. Please let me know if you'd like further details or product for review. Kind Regards, John Wanna, Consultant, Write Away Communication Sydney | Brisbane | Alstonville Ph: +61 2 9978 1400    Genetec Introduces Security Center for Airports to Unify Airport Security and Operations 2020-02-19T21:00:00Z genetec-introduces-security-center-for-airports-to-unify-airport-security-and-operations SYDNEY/MONTRÉAL, February 20, 2020—Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence today announced Security Center for Airports, a new solution designed to help airports of all sizes manage and optimise their security and airport terminal operations. Available immediately, Security Center for Airports enables security managers, control room operators, terminal and ground handling staff as well as passenger experience managers to work together using a single unified product tailored to their unique needs. Security Center for Airports empowers customers to create a safer environment, improve airport operations, enhance passenger experience, while reducing the overall costs of operations and increasing non-aviation revenues. “Traditionally, airports would have to work with a multitude of single-purpose products that don’t interconnect to build their global security operations centers (GSOCs),” explained David Lenot, Airport Practice Leader at Genetec. “This would often create a very complex operating environment leading to slow security response time. But with the growing volume of passengers, airports need help to guarantee safe travel, and many airport security teams are rethinking their security technology strategy. With Security Center for Airports, control room operators, terminal operations, and ground handling can all work in sync to ensure their airport runs like clockwork.” “From parking, shopping and dining to check-in and take off, our airport, like any other, must provide a safe and efficient experience for travelers,” said Daniel St-Pierre, Deputy Director, Operations & IT Security at Aéroports de Montréal. “The Genetec unified platform helps us make the passenger journey seamless while also improving operations, and making the airport a safer environment for everyone that passes through our doors.” In addition to video management (Security Center OmnicastTM ), access control (Security Center SynergisTM) and Automatic License Plate recognition capabilities (Security Center AutoVuTM), Security Center for Airports features a number of airport-specific capabilities including: Security Center Flight Business Logic: Correlates flight information with other operational resources to provide a clear picture of your environment. Automates surveillance and operation management based on flight and gate information so security teams are always in sync. Security Center Boarding Route Management: Uses Security Center SynergisTM to define specific routes and streamline boarding and deplaning operations. Enables airports to leverage shared or common use of their infrastructure while enforcing stronger border control for gates servicing domestic and international passengers (ex. differentiates passenger flow based on varying clearance levels). Security Center Restricted Area Surveillance: Relies on multiple intrusion detection technologies (radar, LiDar, fence intrusion detection, video analytics, drone detection, etc.) to detect potential threats across wide areas to strengthen tarmac, aircraft, traveler, and staff security. Automatically tracked on geographical maps, moving targets are intuitively displayed and validated against ADS-B (automatic dependent surveillance—broadcast) position of aircraft so that airport security personnel assess and respond to threats in less time. Security Center Passenger Analytics: Security Center Passenger Analytics is an advanced analytics solution that extracts valuable insights from sensors like security cameras. Available in Security Center dashboards and a dedicated web client, Security Center Passenger Analytics helps measure and visualise passenger counting, queues, and occupancy to predict the passenger flow and send notifications to mitigate bottlenecks. Genetec Airport Portfolio In addition to the new Security Center for Airports, Genetec offers a broad portfolio of solutions for airports including: Genetec Mission ControlTM: A collaborative decision management system, Mission Control empowers airports to move beyond simple alarm management by collecting and qualifying data from thousands of sensors and spotting the most complex incidents, and guiding security teams in their response following airport-specific processes and compliance requirements. Genetec ClearanceTM: A collaborative investigation management system, Genetec ClearanceTM helps speed up investigations by allowing users to securely collect, manage, and share evidence from different sources with stakeholders within and outside an airport. For more information about Security Center for Airports and the Genetec Airports portfolio, please visit: --ends-- Suggested Tweets: #SecurityCenterforAirports enables airports to optimise terminal operations & build a smoother passenger experience. Learn more: #SecurityCenterforAirports enables security operators & ground personnel to work in unison to #secureairports, optimise terminal operations & build a smoother passenger experience. Learn more: About Genetec Genetec Inc. is an innovative technology company with a broad solutions portfolio that encompasses security, intelligence, and operations. The company’s flagship product, Security Center, is an open-architecture platform that unifies IP-based video surveillance, access control, automatic license plate recognition (ANPR), communications, and analytics. Genetec also develops cloud-based solutions and services designed to improve security, and contribute new levels of operational intelligence for governments, enterprises, transport, and the communities in which we live. Founded in 1997, and headquartered in Montreal, Canada, Genetec serves its global customers via an extensive network of resellers, integrators, certified channel partners, and consultants in over 80 countries. For more information about Genetec, visit: © Genetec Inc., 2020. Genetec, Genetec Clearance, and the Genetec logo are trademarks of Genetec Inc. and may be registered or pending registration in several jurisdictions. Other trademarks used in this document may be trademarks of the manufacturers or vendors of the respective product. Press Contacts: Sue Ralston Einsteinz Communications Ph: +61 02 8905 0995