The PRWIRE Press Releases https:// 2020-02-21T10:56:52Z Find Trustworthy Android App Development Companies 2020-02-21T10:56:52Z find-trustworthy-android-app-development-companies Mobile application developers in Melbourne, Australia offer a wide range of mobile app development services. Most app developers aim to provide exceptional service and find innovative ways to keep the customers happy with their apps. Mobile applications are capable of bringing technology to everyday life, giving new ways to interact with people, services and businesses. People use these mobile applications daily for access to information, entertainment and other services. Companies, therefore, need Android app development companies to manage, develop and manage the app's content. Custom software is one way of helping a business to improve their productivity and effectiveness. Businesses can offer their existing clients with an additional advantage, or introduce new services that will benefit them. This approach allows for the creation of unique custom applications that address a specific need for customers. Custom applications allow businesses to communicate effectively with customers can take advantage of more innovative and dynamic ways of engaging with their businesses. There are several mobile application development companies available in Melbourne, Australia. Some of the best mobile app development companies in Melbourne are Storm and Vecteezy. The storm is a full-service company that provides a complete range of software development solutions including on-demand mobile applications development, mobile app design, iOS, Android and Web application development, desktop web development, and database software development. Vecteezy is also a mobile app development company that offers mobile applications development and maintenance. For any company looking for app development services Melbourne, Vecteezy is the first choice. They can be reached through email or phone to discuss your requirements. The storm is an established, full-service mobile application development company that offers a broad spectrum of software development solutions. Mobile application development services are developed by designers using advanced web technologies and client-specific tools for improved overall customer experience. By allowing customers to access their applications using any modern device, Storm can help provide valuable services and keep customers happy. With Storm, a company can develop full-screen apps that can be installed directly onto a smartphone, tablet or other devices to keep the customers updated with the latest content from their company's website. Storm provides clients with a customer support system, a team of mobile developers and user support and technical education. Any customer can call Storm to access technical support. Other mobile app development companies offering mobile app development services include Evolx and Mojozoo. They provide mobile application development, iOS, Android and Web application development, and desktop web development solutions. Evol works to create unique mobile apps that add value to existing products and services. They also provide scalable backend management and database back-up services to ensure a faster turnaround time for a client's project. Mojozoo offers mobile app development, app design, iOS, Android and Web application development, and mobile app design, maintenance and management. They work closely with their clients to determine the exact scope of the project and work closely with the client to determine the most effective and feasible solutions to ensure that a client's product is launched and deployed successfully. Many businesses need app development services in Melbourne, Australia. With many app development companies available in the city, they provide a host of mobile app development services to help any company with the creation of their new app. How to Make the Most of App Development Services in Melbourne 2020-02-21T10:21:54Z how-to-make-the-most-of-app-development-services-in-melbourne In the emerging field of digital marketing, Australia is a popular destination for business professionals who want to make the most of digital marketing. Melbourne has gained notoriety in this field due to its highly skilled talent pool. Some of the companies that have increased their headcount in Melbourne are Simtec, Deloitte, Waterstones, Red Leaf, and Indigo. These three big brands, together with several smaller companies, provide app development services. App development refers to any activity that involves the creation of a website, e-commerce website, application program, or anything else that requires the creation of a software system. A digital marketing strategy, however, is software development in an entirely different context. A business can utilize digital marketing strategies to reach more customers. App design entails the creative process of creating a product. The result may be a physical product or it may be software programs that can be downloaded. In other words, digital marketing includes creative service and application development. Digital marketing services consist of several strategies and techniques. Some of these are optimization, search engine optimization, online advertising, SEO, social media marketing, and so on. The clients and competitors are also involved in a strategy. App design and software development have two fundamental parts. One is the user interface or the interface. This is the visual appearance of the app and can be an on-screen interface or a graphical interface. The second part is the technical or the programming of the software program itself. Software development is an intricate and complex process that includes several stages of steps and processes. There are usually several components involved. It could also be a collaboration between programmers, artists, designers, and developers. In the first step, which is the design, the designer proposes a concept or a layout. The application, or the program, will then follow the design. Once this step is complete, the second step is used. This is the creation of the code of the application, which allows the software to run. One of the main benefits of software development is that the actual product is built without the need for any advanced technologies. Most software applications can be built directly using HTML and CSS. Besides, there are no extensive technical skills needed, although some components require special expertise. Some software development companies will produce the software by creating a series of prototypes. The final version is created using different software tools. The best way to know if the software is right for your project is to try it out. Also, there are additional services offered by software development services, such as: Feature engineering. This means providing quality customer support, answering questions about the software and making sure that features can work well with other features in the system. The process is a complex one and usually takes about six months. Deployment testing. This involves testing the software's functionality on real users. Some software is distributed in software packages. This software package can then be released in various test environments, such as virtual machines, a virtual test server, and so on. Remember that digital marketing provides many innovative ideas, so you will have plenty of ideas to improve your business. Design and develop your marketing strategy today! Epson launches new, ultra-efficient, heat-free A3 multi-function printers 2020-02-20T22:44:13Z epson-launches-new-ultra-efficient-heat-free-a3-multi-function-printers Epson has further reinforced its commitment to sustainable business solutions with the launch of seven new WorkForce devices, all powered by its innovative, ultra-efficient PrecisionCore heat-free print technology. The new range starts with the compact WorkForce Pro WF-878R desktop printer, ideal as either the main print device for smaller businesses or as a workgroup device for larger business and culminates with the WorkForce EnterpriseWF-C21000, an ultra-fast 100 ppm device designed to easily handle large print volumes and tight deadlines. Epson Australia MD Craig Heckenberg said, “Business inkjet is expected to account for over 40% of developed business print solutions within the next five years[1]. As a result Epson has taken steps to now to help the market with its requirements in this area, placing particular emphasis on heat-free and energy efficient solutions. These new products perfectly position us and our channel partners for future growth as they provide a sustainable, economical print solutions for organisations that are becoming increasingly aware of their carbon footprint, while at the same time seeking ways to reduce operating expenses.” The WorkForce Pro WF-C878R, WF-C878RTC, WF-C879R and WF-C879RTC models deliver enviable price performance. Extraordinarily high ink yields delivering up to 86,000 pages in black and up to 50,000 pages in colour mean minimal staff disruptions to attend any of the devices and, combined with aggressive price points, present a very compelling lower cost of ownership proposition. Where time and deadlines are important or finishing options are required, the WorkForce Enterprise WF-C20600 (60 ppm), WF-C20750 (75 ppm) and WF-C21000 (100 ppm) models come into their own. Comprehensive finishing options that include offset finishing and stapling, booklet-making and automatic hole-punch complement a total print solution that supports any busy work environment. Where organisations are looking to reduce their carbon footprint, meet their corporate social responsibility objectives, or just play their part in reducing CO2 emissions, these new Epson devices are the ideal choice to help address all of these goals and more.  Epson PrecisionCore Heat-Free print technology uses no heat in the printing process and up to 87% less energy to print a page than a comparable laser-based device2. This energy saving translates into reduced CO2 emissions and directly reduces printer-related electricity costs. Availability and pricing The new range of Epson WorkForce Pro and Enterprise business print devices will be available to Australian customers from April 2020. Purchase prices start from $4,995 ex. GST. All models are available as part of managed print service plans and flexible finance arrangements through Epson Premium Partners nationally. For further information on Epson WorkForce Pro solutions go to: For further information on Epson WorkForce Enterprise solutions: Follow Epson on social media:Facebook: @EpsonAustraliaTwitter: @EpsonAustInstagram: @EpsonAust 80% of Australian organisations say security concerns restrict public cloud adoption 2020-02-20T21:00:00Z eighty-percent-of-australian-organisations-say-security-concerns-restrict-public-cloud-adoption-1 Sydney, 21 February 2020 – Organisations in Australia indicate that more than 76 percent of their IT infrastructure will be operating in the public cloud over the next five years, an increase from almost 45 percent today, according to a new study sponsored by Barracuda Networks, Inc., a trusted partner and leading provider of cloud-enabled security solutions. Security remains the biggest roadblock to adoption for 80 percent of respondents, higher than the global average of 70 percent. The global study of 750 global IT decision makers was conducted by Vanson Bourne in December 2019 to capture their experiences with moving infrastructure to the public cloud, concerns restricting adoption, as well as the security and networking solutions being implemented to overcome them. The study involved 50 respondents in Australia. “While adoption rates for public cloud continue to grow, security is still the leading roadblock for Australian organisations, which is understandable considering the volume and variety of threats they face today,” said Andrew Huntley, regional director of ANZ and Pacific Islands for Barracuda. According to the survey, the leading cloud security concerns for Australian organisations include the security of public cloud infrastructure (42 percent), the impact of cyberattacks (28 percent), shadow IT (28 percent) and the security of applications deployed in public cloud (24 percent). Australian respondents indicated that the greatest threats to their public cloud infrastructure include open vulnerabilities in cloud applications (44 percent); sophisticated hackers (38 percent); ransomware (38 percent) and corporate network exposure to intrusions/attacks (38 percent). Sixty-eight percent of Australian respondents have already been targeted by a cyberattack, which is lower than the global average of 75 percent. After security, integration/network concerns come in second for Australian organisations in terms of public cloud adoption. This includes integrating public cloud with legacy technologies, better integration with private cloud, and enhanced integration with on-premises infrastructure. The survey also revealed that secure software-defined wide area networks (SD-WAN) fully integrated into public cloud is the solution of choice. Twelve percent of Australian respondents have already deployed SD-WAN, with another 50 percent either in the process of deploying or expecting to deploy within the next 12 months. SD-WAN is being used by a quarter of those who have added security to their public cloud. “As more IT infrastructure moves to public cloud, providers will offer more native network capabilities and public cloud will expand to include more network functionality,” Huntley said. “The vast majority of Australian organisations need their security vendors to offer advanced security and cloud connectivity tightly integrated with the major cloud platforms.” Download the full report: Future shock: the cloud is the new network. Read the blog post: Report: The Cloud Is the New Network About Barracuda At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organisations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit  Barracuda Networks, Barracuda and the Barracuda Networks logo are registered trademarks or trademarks of Barracuda Networks, Inc. in the U.S. and other countries. DDLS opens its first training facility in the Philippines 2020-02-20T06:17:41Z ddls-opens-its-first-training-facility-in-the-philippines DDLS, Australia’s largest provider of corporate ICT and cybersecurity training today officially opened its first training campus in the Philippines to support the local workforce. The opening of the new campus in the Philippines marks DDLS’ expansion into Asia Pacific and provides professionals in the Philippines with an opportunity to take up a career in a booming industry. “With DDLS present in every major city in Australia, we wanted to replicate this model in Southeast Asia, and the Philippines showed the most potential. Having skilled workers in the ICT industry who can monitor, secure and mitigate against any risks is a requirement that the industry has identified, and DDLS is responding to these needs by training the next generation of professionals in a new state-of-the-art facility.” said Jon Lang, CEO of DDLS. Located in Bonifacio Global City in Taguig, the 500sqm training facility consists of seven state-of- the-art training rooms, equipped with the latest technology as well as telepresence technology to help students and IT professionals master skillsets necessary to immediately enter the workforce. “The Philippines campus was designed to be conducive for learning, to match the quality of instruction that our trainers are able to impart.”, commented Mike Calma DDLS Philippines Country GM. “The campus will prepare students to meet the demand for talent in cybersecurity, DevOps, cloud and others through skill development, with technology that is at the forefront of this digital future.” DDLS, a wholly owned subsidiary of EdventureCo, joined forces with Aboitiz Impact Ventures, Inc. in March 2019 to bring quality IT Training to the Philippines. In less than a year of operations, DDLS Philippines has trained more than 300 students in Microsoft courses. It has since rolled out new training courses in IT service management, data science and cybersecurity. The new campus also hosts a dedicated Pearson VUE authorized room for taking online tests and certifications. As DDLS gains traction, it does not lose sight of its long-term goals. “Our vision for DDLS is to offer agile and accessible high-quality IT training. These skills have never been more relevant education needs to adapt. We need a modern way of training the modern workforce. We at Aboitiz have always believed in the value of education and the role it plays in advancing business and communities,” says Jokin Aboitiz, President, Aboitiz Impact Ventures. For more information on DDLS Philippines, visit or connect with us on Facebook and LinkedIn. About DDLS Philippines DDLS Philippines (DDLS Aboitiz Inc.) is a joint venture between EdventureCo, a leading vocational and professional education and training (VPET) group in Asia Pacific, and Aboitiz Impact Ventures (AIV), a wholly owned unit of Aboitiz Equity Ventures, Inc. (PSE: AEV). EdventureCo is a wholly owned subsidiary of Arowana International Limited (ASX: AWN). DDLS is Australia’s largest provider of corporate IT and process training and Australia’s number one cybersecurity training provider. We provide extensive training options tailored to organisations’ needs – from vendor-certified courses to customised training, including bespoke in-house developed courses. In cybersecurity we offer the broadest range of authorised training from leading global organisations including the EC-Council, (ISC)2, ISACA, RESILA (Axelos), and CompTIA. In all specialisations DDLS promotes a balanced approach to training with a focus on the key areas of technology, process and people. Phishing attacks and government surveillance concerns top new Ponemon Institute cyber report by Yubico 2020-02-19T23:34:08Z phishing-attacks-and-government-surveillance-concerns-top-new-cyber-report-by-yubico Yubico, the leading provider of hardware authentication security keys, today announced results of the company’s second annual State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute. Ponemon Institute surveyed 2,507 IT and IT security practitioners in Australia, France, Germany, Sweden, United Kingdom, and United States, as well as 563 individual users.  One of the key findings from Australia is that organisations are most concerned about the privacy and security of personal data.  The Report found that IT security practitioners and individuals are both engaging in risky password and authentication practices, yet expectation and reality are often misaligned when it comes to the implementation of usable and desirable security solutions. The tools and processes that organizations put in place are not widely adopted by employees or customers, making it abundantly clear that new technologies are needed for enterprises and individuals to reach a safer future together. “IT professional or not, people do not want to be burdened with security — it has to be usable, simple, and work instantly,” said Stina Ehrensvard, CEO and Co-Founder, Yubico. “For years, achieving a balance between high security and ease of use was near impossible, but new authentication technologies are finally bridging the gap. With the availability of passwordless login and security keys, it’s time for businesses to step up their security options. Organizations can do far better than passwords; in fact, users are demanding it.” Key Australian findings from this research include: ·       All individuals surveyed (globally) are especially concerned when it comes to government surveillance (65%) and protecting details of their health status (53%).  ·        Almost half of Australian organisations surveyed have experienced a phishing attack (47%) or ransomware attack (13%), with 52% saying their organisation changed their password practices following an attack.  ·       64% of Australian organisations have a password policy for their employees however only 36% said this policy was strictly enforced.  Global findings included: ·       Individuals report better security practices in some instances compared to IT professionals. Out of the 35% of individuals who report that they have been victim of an account takeover, 76% changed how they managed their passwords or protected their accounts. Of the 20% of IT security respondents who have been a victim of an account takeover, 65% changed how they managed their passwords or protected their accounts. Both individuals and IT security respondents have reused passwords on an average of 10 of their personal accounts, but individual users (39%) are less likely to reuse passwords across workplace accounts than IT professionals (50%). ·       Fifty-one percent of IT security respondents say their organisations have experienced a phishing attack, with another 12% of respondents stating that their organisations experienced credential theft, and 8% say it was a man-in-the-middle attack. Yet, only 53% of IT security respondents say their organisations have changed how passwords or protected corporate accounts were managed. Interestingly enough, individuals reuse passwords across an average of 16 workplace accounts and IT security respondents say they reuse passwords across an average of 12 workplace accounts. ·       Additionally, mobile use is on the rise. Fifty-five percent of IT security respondents report that the use of personal mobile devices is permitted at work and an average of 45% of employees in the organisations represented are using their mobile device for work. Alarmingly, 62% of IT security respondents say their organisations don’t take necessary steps to protect information on mobile phones. Fifty-one percent of individuals use their personal mobile device to access work related items, and of these, 56% don’t use 2FA. ·       Given the complexities of securing a modern, mobile workforce, organisations struggle to find simple, yet effective ways of protecting employee access to corporate accounts. Roughly half of all respondents (49% of IT security and 51% of Individuals) share passwords with colleagues to access business accounts. Fifty-nine percent of IT security respondents report that their organisation relies on human memory to manage passwords, while 42% say sticky notes are used. Only 31% of IT security respondents say that their organisation uses a password manager, which are effective tools to securely create, manage, and store passwords. ·       IT security respondents say they are most concerned about protecting customer information and personally identifiable information (PII). However, 59% of IT security respondents say customer accounts have been subject to an account takeover. Despite this, 25% of IT security respondents say their organisations have no plans to adopt 2FA for customers. Of these 25% of IT security respondents, 60% say their organisations believe usernames and passwords provide sufficient security and 47% say their organisations are not going to provide 2FA because it will affect convenience by adding an extra step during login. When businesses are choosing to protect customer accounts and data, the 2FA options that are used most often do not offer adequate protection for users. ·       IT security respondents report that SMS codes (41%), backup codes (40%), or mobile authentication apps (37%) are the three main 2FA methods that they support or plan to support for customers. SMS codes and mobile authenticator apps are typically tied to only one device. Additionally, only 23 percent of Individuals find 2FA methods like SMS and mobile authentication apps to be very inconvenient. A majority of Individuals rate security (56 percent), and affordability (57 percent), and ease of use (35 percent) as very important. ·       It is clear that new technologies are needed for enterprises and individuals to reach a safer future together. Across the board, passwords are cumbersome, mobile use introduces a new set of security challenges, and the security tools that organisations have put in place are not being widely adopted by employees or customers. In fact, 49% of individuals say that they would like to improve the security of their accounts and have already added extra layers of protection beyond a username and password. However, 56% of individuals will only adopt new technologies that are easy to use and significantly improve account security. Here’s what is preferred: biometrics, security keys, and password-free login. ·       A majority of IT security respondents and individuals (55%) would prefer a method of protecting accounts that doesn’t involve passwords. Both IT security (65%) and individual users (53%) believe the use of biometrics would increase the security of their organisation or accounts. And lastly, 56% of individuals and 52% of IT security professionals believe a hardware token would offer better security. Data for this survey was collected by Ponemon Institute on behalf of Yubico. Ponemon Institute was responsible for data collected, data analysis and reporting. Ponemon Institute and Yubico collaborated on the survey questionnaire. All survey responses were captured October 24 to November 15, 2019. To download the complete report and associated infographic, visit Claroty Receives 2019 Global Company of the Year Award for IT/OT Security 2020-02-19T23:04:25Z claroty-receives-2019-global-company-of-the-year-award-for-it-ot-security Claroty, the global leader in industrial cybersecurity, today announced that it has been named the 2019 Global Company of the Year by Frost & Sullivan. According to the firm, Claroty’s superior suite of products provides end-to-end visibility into industrial networks. Specifically, the company offers customers across a multitude of verticals unparalleled cyberthreat protection, detection and response for both IT and OT networks and devices. To receive this recognition, an organisation must strive to be best-in-class in three key areas: understanding demand, nurturing the brand and differentiating from the competition. “The open architectures of OT systems, using standardised interfaces and connecting to both the Internet and internal corporate networks, results in exposure to third-party intrusions—a common attack vector—and massive disruption possibilities,” said Swetha Ramachandran Krishnamoorthi, industry analyst at Frost & Sullivan. Frost & Sullivan recognises how Claroty’s platform nicely fills these critical gaps by offering a fully integrated product suite enriched with advanced features to provide unparalleled depth, coverage and scalability across a variety of domains.” Claroty has the only OT cybersecurity solution that encompasses the entire spectrum of cybersecurity functions, namely identification, detection, protection and response to threats. Its platform provides industrial control networks with complete visibility into assets, high-level threat detection and risk assessment, and its secure remote access—a centralised management interface—expedites data integration with existing security systems to facilitate simple service deployments. “We are honored to receive this distinction from Frost & Sullivan, as it validates all of the hard work that the team has done to demonstrate excellence in growth, innovation and leadership,” said Thorsten Freitag, Chief Executive Officer of Claroty. “This will be a breakaway year for OT cybersecurity as it becomes a required business mandate and Chief Information Security Officers much more aggressively seek strong partners in addressing their industrial cybersecurity challenges. We appreciate Frost & Sullivan’s affirmation and look forward to continuing to drive demand, strengthen our brand and deliver unique value to customers.” Moving forward, Claroty expects to continue the incredible momentum it experienced in 2019, which included: Extending its Continuous Threat Detection (CTD) product to enable enterprises to discover and monitor their IoT devices Introducing the integration of CTD with FireEye Helix to help industrial enterprises improve the efficiency and speed of security operations Being the first OT security provider to receive the U.S. Department of Homeland Security’s SAFETY Act approval for its best-in-class OT network monitoring solution Making CRN’s “Emerging Security Vendors to Know” and CyberCrime Magazine’s “The Hot 150 Cybersecurity Companies to Watch” lists Adding U.S. Navy Admiral (Ret.) Michael S. Rogers as Chairman of Claroty’s Board of Advisors. Appointing Thorsten Freitag as Chief Executive Officer and Jennifer Leggio as Chief Marketing Officer Download the report for more information on Claroty, its platform, and IT/OT security best practices. About Claroty Claroty bridges the industrial cybersecurity gap between information technology (IT) and operational technology (OT) environments. Organisations with highly automated production sites and factories that face significant security and financial risk especially need to bridge this gap. Armed with Claroty’s converged IT/OT solutions, these enterprises and critical infrastructure operators can leverage their existing IT security processes and technologies to improve the availability, safety, and reliability of their OT assets and networks seamlessly and without requiring downtime or dedicated teams. The result is more uptime and greater efficiency across business and production operations. Backed and adopted by leading industrial automation vendors, Claroty is deployed on all seven continents globally. The company is headquartered in New York City and has received $100 million in funding since being launched by the famed Team8 foundry in 2015. For more information, visit New ISACA Resource Guides Organisations in Overcoming Challenges to Build Effective Data Governance Program 2020-02-19T22:27:37Z new-isaca-resource-guides-organisations-in-overcoming-challenges-to-build-effective-data-governance-program Sydney, Australia (20 February 2020) – Effectively harnessing data can bring new value to businesses through better strategic planning and decision-making. Starting a data governance program or improving an existing program, however, comes with challenges. Enterprises can find best practices for overcoming these barriers and creating effective programs in a new paper from ISACA, “Rethinking Data Governance and Management: A Practical Approach for Data-Driven Enterprises.” Some of the key challenges in data governance that enterprises need to address include: Enterprises often cannot easily perceive the value of data governance because the benefits are difficult to quantify, resulting in a lack of management commitment. Data ownership is often not clearly defined due to the misconception that data management is technical work, and therefore, the IT department’s responsibility. Siloed department and organisational structures result in disaggregated datasets and data analytics challenges. As a solution to these challenges, organisations can employ a phased, five-stage approach to data management. The paper details the process, which starts with establishing a data governance foundation and concludes with a focus on data analytics. “Having an effective data governance program in place is valuable for gaining meaningful insights from data,” says Mais Barouqa, CISA, CGEIT, CRISC, IT Risk & Assurance Manager, Deloitte & Touche, and an expert reviewer for the white paper. “The five-stage approach will provide enterprises with a clear and structured path for building a program that will ultimately create value for their stakeholders while minimising risk.” “Rethinking Data Governance and Management” also offers guidance on building a foundation for data governance, as well as insights into data architecture, data quality and cleansing, data democratisation and data analytics. Professionals can gain practical insight in assessing their own data governance approaches by following a detailed hypothetical case study about a consumer product company looking to make better use of its data. To access the complimentary white paper, visit Gain access to additional educational resources from ISACA at About ISACA For more than 50 years, ISACA® ( has advanced the best talent, expertise and learning in technology. ISACA equips individuals with knowledge, credentials, education and community to progress their careers and transform their organisations, and enables enterprises to train and build quality teams. ISACA is a global professional association and learning organisation that leverages the expertise of its 145,000 members who work in information security, governance, assurance, risk and privacy to drive innovation through technology. It has a presence in 188 countries, including more than 220 chapters worldwide. Twitter: LinkedIn: Facebook: Instagram: Contact: Julie Fenwick, +61 468 901 655 Lauren Graham, +61 432 614 401 New Usage-based Pricing for Genesys Cloud Gives Organisations Ultimate Flexibility 2020-02-19T22:20:43Z new-usage-based-pricing-for-genesys-cloud-gives-organisations-ultimate-flexibility Genesys®, the global leader in cloud customer experience and contact centre solutions, has rolled out new hourly pricing for Genesys Cloud. Now, organisations can pay only for time spent using the company’s all-in-one solution, which is also the world’s leading public cloud contact center platform. Customers can choose from Genesys Cloud’s multiple pricing options — the flexible usage-based pricing that starts at just $0.68 USD per user hour or the existing named and concurrent models. While competitors with similar pricing structures charge additional fees for use of IVRs, data storage and API requests, Genesys Cloud includes this functionality in its flat rate. This makes it one of the most inclusive hourly pricing offers in the industry. “The new Genesys Cloud usage-based pricing is simple, transparent and enables organisations to pay only for what they use,” said Olivier Jouve, executive vice president and general manager of Genesys Cloud. “With this additional pricing option, we’re giving organisations the ultimate flexibility to choose how they’ll consume Genesys Cloud. We’re making Experience as a ServiceSM attainable for any organisation so they can lead with empathy in every customer interaction, resulting in more personalised connections.” Visibility and control down to the millisecond While many organisations are well-served by monthly user pricing, others benefit from the cost savings of time-based subscriptions, such as those with numerous part-time employees or seasonal spikes. Genesys hourly billing also lets customers achieve volume-based discounts through up-front commitments. In addition, customers now have by-the-millisecond visibility into consumption by user and by day, so they know the costs they have incurred. Depending upon the organisation’s needs, customers can choose from three convenient usage-based Genesys Cloud packages: $0.68/hour or $75/month – Genesys Cloud 1 includes the traditional features such as inbound and outbound voice $0.99/hour or $110/month – Genesys Cloud 2 builds upon Genesys Cloud 1 to include additional channels, such as email and chat, and AI-powered customer engagement $1.26/hour or $140/month – Genesys Cloud 3 adds to Genesys 2 with support for SMS, messaging apps and Workforce Engagement Management “The usage-based pricing from Genesys gives organisations a new opportunity to reconcile the tension between managing costs and delivering remarkable customer experiences,” said Mary Wardley, program vice president, Customer Care and CRM of IDC. “This important addition to Genesys Cloud pricing is yet another way the company is being responsive to the needs of customers and providing new operating models that are enabled by the cloud.” Learn why analysts and users agree Genesys Cloud is a leading contact centre platform. About Genesys Every year, Genesys® delivers more than 70 billion remarkable customer experiences for organisations in over 100 countries. Through the power of the cloud and AI, our technology connects every customer moment across marketing, sales and service on any channel, while also improving employee experiences. Genesys pioneered Experience as a ServiceSM so organisations of any size can provide true personalisation at scale, interact with empathy, and foster customer trust and loyalty. This is enabled by Genesys CloudTM, an all-in-one solution and the world’s leading public cloud contact centre platform, designed for rapid innovation, scalability and flexibility. Visit ©2020 Genesys Telecommunications Laboratories, Inc. All rights reserved. Genesys, the Genesys logo, Genesys Cloud and Experience as a Service are trademarks, servicemarks and/or registered trademarks of Genesys. All other company names and logos may be registered trademarks or trademarks of their respective companies. Contacts: Yvette Schlegelmilch Account Manager ZADRO +61 0 9212 7867 Elizabeth Williams Group Account Director ZADRO +61 411 201 354 Uniden releases new high-end series of ultra-compact, smart dash cams 2020-02-19T21:48:50Z uniden-releases-new-high-end-series-of-ultra-compact-smart-dash-cams Uniden is releasing two new high-end series of ultra-compact smart dash cams built for bright and low-light conditions with the DV30 featuring a 2.5k Video Resolution Front Camera and Full HD 30fps rear camera on the DV30R, with both providing a 140-degree wide angle lens. The media release and high-res images are available to download here. Please let me know if you'd like further details or product for review. Kind Regards, John Wanna, Consultant, Write Away Communication Sydney | Brisbane | Alstonville Ph: +61 2 9978 1400    Genetec Introduces Security Center for Airports to Unify Airport Security and Operations 2020-02-19T21:00:00Z genetec-introduces-security-center-for-airports-to-unify-airport-security-and-operations SYDNEY/MONTRÉAL, February 20, 2020—Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence today announced Security Center for Airports, a new solution designed to help airports of all sizes manage and optimise their security and airport terminal operations. Available immediately, Security Center for Airports enables security managers, control room operators, terminal and ground handling staff as well as passenger experience managers to work together using a single unified product tailored to their unique needs. Security Center for Airports empowers customers to create a safer environment, improve airport operations, enhance passenger experience, while reducing the overall costs of operations and increasing non-aviation revenues. “Traditionally, airports would have to work with a multitude of single-purpose products that don’t interconnect to build their global security operations centers (GSOCs),” explained David Lenot, Airport Practice Leader at Genetec. “This would often create a very complex operating environment leading to slow security response time. But with the growing volume of passengers, airports need help to guarantee safe travel, and many airport security teams are rethinking their security technology strategy. With Security Center for Airports, control room operators, terminal operations, and ground handling can all work in sync to ensure their airport runs like clockwork.” “From parking, shopping and dining to check-in and take off, our airport, like any other, must provide a safe and efficient experience for travelers,” said Daniel St-Pierre, Deputy Director, Operations & IT Security at Aéroports de Montréal. “The Genetec unified platform helps us make the passenger journey seamless while also improving operations, and making the airport a safer environment for everyone that passes through our doors.” In addition to video management (Security Center OmnicastTM ), access control (Security Center SynergisTM) and Automatic License Plate recognition capabilities (Security Center AutoVuTM), Security Center for Airports features a number of airport-specific capabilities including: Security Center Flight Business Logic: Correlates flight information with other operational resources to provide a clear picture of your environment. Automates surveillance and operation management based on flight and gate information so security teams are always in sync. Security Center Boarding Route Management: Uses Security Center SynergisTM to define specific routes and streamline boarding and deplaning operations. Enables airports to leverage shared or common use of their infrastructure while enforcing stronger border control for gates servicing domestic and international passengers (ex. differentiates passenger flow based on varying clearance levels). Security Center Restricted Area Surveillance: Relies on multiple intrusion detection technologies (radar, LiDar, fence intrusion detection, video analytics, drone detection, etc.) to detect potential threats across wide areas to strengthen tarmac, aircraft, traveler, and staff security. Automatically tracked on geographical maps, moving targets are intuitively displayed and validated against ADS-B (automatic dependent surveillance—broadcast) position of aircraft so that airport security personnel assess and respond to threats in less time. Security Center Passenger Analytics: Security Center Passenger Analytics is an advanced analytics solution that extracts valuable insights from sensors like security cameras. Available in Security Center dashboards and a dedicated web client, Security Center Passenger Analytics helps measure and visualise passenger counting, queues, and occupancy to predict the passenger flow and send notifications to mitigate bottlenecks. Genetec Airport Portfolio In addition to the new Security Center for Airports, Genetec offers a broad portfolio of solutions for airports including: Genetec Mission ControlTM: A collaborative decision management system, Mission Control empowers airports to move beyond simple alarm management by collecting and qualifying data from thousands of sensors and spotting the most complex incidents, and guiding security teams in their response following airport-specific processes and compliance requirements. Genetec ClearanceTM: A collaborative investigation management system, Genetec ClearanceTM helps speed up investigations by allowing users to securely collect, manage, and share evidence from different sources with stakeholders within and outside an airport. For more information about Security Center for Airports and the Genetec Airports portfolio, please visit: --ends-- Suggested Tweets: #SecurityCenterforAirports enables airports to optimise terminal operations & build a smoother passenger experience. Learn more: #SecurityCenterforAirports enables security operators & ground personnel to work in unison to #secureairports, optimise terminal operations & build a smoother passenger experience. Learn more: About Genetec Genetec Inc. is an innovative technology company with a broad solutions portfolio that encompasses security, intelligence, and operations. The company’s flagship product, Security Center, is an open-architecture platform that unifies IP-based video surveillance, access control, automatic license plate recognition (ANPR), communications, and analytics. Genetec also develops cloud-based solutions and services designed to improve security, and contribute new levels of operational intelligence for governments, enterprises, transport, and the communities in which we live. Founded in 1997, and headquartered in Montreal, Canada, Genetec serves its global customers via an extensive network of resellers, integrators, certified channel partners, and consultants in over 80 countries. For more information about Genetec, visit: © Genetec Inc., 2020. Genetec, Genetec Clearance, and the Genetec logo are trademarks of Genetec Inc. and may be registered or pending registration in several jurisdictions. Other trademarks used in this document may be trademarks of the manufacturers or vendors of the respective product. Press Contacts: Sue Ralston Einsteinz Communications Ph: +61 02 8905 0995 A new caravan management system has hit the market, and it’s like nothing you’ve ever seen before. 2020-02-19T11:04:18Z a-new-caravan-management-system-has-hit-the-market-and-it-s-like-nothing-you-ve-ever-seen-before FEBRUARY 18, 2020 THE MOST ADVANCED CARAVAN MANAGEMENT SYSTEM AVAILABLE The Sabre Living system is an advanced monitor, control and automation system for caravans and motorhomes. It turns things on and off from a tablet or phone, but that’s where the similarities to other devices end. Like most caravan management systems, the Sabre system monitors your batteries and power usage, your water tanks, the temperature and air quality, your geographical location, van movement as well as its own built-in security camera. It also controls your lights, fans, slide-outs, heaters, water heaters and water pumps - just like most other systems. It is also run by Android or Apple devices, just like many systems. However it’s the other features that make Sabre different. Daniel Bissett, the engineer behind the technology says “Sabre is the result of looking at what should be in a caravan and starting from scratch. Most other systems are a slow evolution of existing systems”. Sabre takes the technology like IOT (Internet-Of-Things), CI-BUS and Satellite communications to offer a device that has the brains to do it all, and to keep growing with the benefit of over-the-air software updates. “Sabre is built to grow“ Mr Bissett said. “It has IR control for TVs, air conditioners and sound systems that aren’t connected, two-way satellite for safety and messaging when out of phone range and physical switch connection which tell the system which position the switch is in.” continues Mr Bissett. The system also has a large safety and anti-theft component. A built-in security camera, air quality sensors, connection to smoke and gas alarms, internal movement sensors, GPS tracking and jolt detection all work together to create an anti-theft system. Mr Bissett says “if your van is stolen, Sabre will track its location in real-time, and turn on strobes, sirens and cameras - which can be tracked via a phone or through a website if the app isn’t installed.” he continues “If gas or smoke is detected, Sabre will not only notify you within the van, but can also send messages via the internet or satellite if the van is unattended”. Sabre can also automate some convenience processes such as turn on lights when it gets dark, or turning on the heater or air conditioner when the temperature changes. It can also turn on some soothing music and dim the lights when it's time for bed. Mr Bissett says “Sabre is not just a control and monitoring system, it’s a system that the van owner can configure to suit and serve them.” he continued “It can also let you know what kind of day is forecast for your next day of travelling, and show you what’s in the area”. A 20-page booklet is available by visiting The Sabre system has been installed in a number of production vans in one of Australia’s largest manufacturers. It is available to both manufacturers as well as for retro-fitting. The company behind Sabre has been creating internet-based systems since 2002 for aviation, health-care and mining industries. Sabre Living Pty Ltd is an Australian company (ACN 621 440 426) and is based on Devonport, Tasmania with stock warehousing and distribution in Eastern Melbourne. For further media information contact: Jon Hatto Sabre Business Development Manager Email: Phone: 03 6423 2051 or 0418 137 680 D-Link A/NZ launches AI-based Smart Security Bundle 2020-02-19T03:17:44Z d-link-a-nz-launches-ai-based-smart-security-bundle D-Link has launched one of its smartest and most exciting products to date, the AI-based DCS-8331KT Smart DIY Security Bundle. A total home monitoring solution, giving you the ability to automate and control devices throughout your home, from anywhere you are, the Smart DIY Security Bundle includes a Smart Full HD Wi-Fi Camera with built-in Smart Home Hub, a Smart Door and Window Sensor, as well as a Smart Motion Sensor. With the ability to provide continuous local recording to your NAS or event recording to the cloud, this Smart Kit can smarten up your entire home.D-Link A/NZ MD Graeme Reardon said, “The mydlink Smart DIY Security Bundle takes your Smart Home experience to the next level with devices using AI-based Intelligent Video Analytics and Zigbee™ connection technology. This Smart DIY Security Bundle features a Smart Full HD Wi-Fi Camera with Built-in Smart Home Hub that can trigger amazing automations around your home combined with the Smart Motion Sensor as well as the Smart Door and Window Sensor. It also works seamlessly with the mydlink app, Google Assistant and Amazon Alexa.” The Smart Full HD Wi-Fi Camera blends Artificial Intelligence (AI) and Intelligent Video Analytics (IVA) detection with 151° views of your room in true 1080p Full HD at 30 fps. The built-in AI-based IVA features put the Smart Full HD Wi-Fi Camera in a class of its own as, unlike other cameras that bog you down with a never-ending stream of irrelevant motion-detection alerts, this camera is smart enough to send you an alert only when it really matters. It also enables you to set and customise individual person detection, multi-zone detection, boundary-crossing detection and priority zones which means you only see exactly what you want to see.  A built-in Smart Home Hub turns the camera into the brain of your mydlink DIY Smart Home, that takes intelligent Home Security to a whole new level of smart. Main features of the DCS-8330LH Smart Full HD Wi-Fi Camera with built-in Smart Home Hub include:• AI-based IVA Motion Detection: Intelligent Video Analytics (IVA) for smarter motion detection• Built-in Smart Home Hub: Connects to mydlink Smart DIY devices• Smart Home Compatible: Works with mydlink Smart Home devices, Amazon Alexa, and the Google Assistant3• 151° Viewing Angle: See more of your room at any time• Premium Full HD Clarity: True Full HD 1080p resolution @ 30 fps with night vision• Free mydlink app: Manage your camera and interactions with other mydlink devicesMultiple Recording Options -• ONVIF Profile S: Continuously record video locally to your NAS or NVR to capture every moment• Cloud Recording: Event recording to the Cloud and view your videos from anywhere• microSD Card Slot: Record videos to a microSD card up to a capacity of 256GB The DCH-B112 Smart Door and Window Sensor integrates seamlessly with the DCS-8330LH Smart Home or Amazon Echo Plus1. This clever sensor detects the opening and closing of your doors and windows and includes a whole host of other features such as: • Sensor Bypass Button allows you to open doors and windows without triggering an alert• Tamper detection for greater peace of mind• Up to 3-year battery life2 -  Battery-powered for unrestricted placement.  • Triggers automations with other mydlink cameras and smart plugs• Compatible with the Google Assistant and Amazon Alexa3• Connects using Zigbee™ technology1 The final piece of the solution included in the Smart DIY Security Bundle is the DCH-B122 Smart Motion Sensor which again works with the mydlink Smart Home Hub or Amazon Echo Plus1. This clever sensor allows you to get motion detection alerts on your phone, has up to two years battery life2 and provides tamper detection for greater peace of mind.  As with its other stablemates, it’s also battery-powered for unrestricted placement and triggers automations with other mydlink cameras and smart plugs. Easy to mount on any wall with an adhesive strip, again it’s compatible with Amazon Alexa3, connects with Zigbee™ technology1 via an intuitive setup using the free mydlink app. The DCS-8331KT Smart DIY Security Bundle is available now in Australia at with an RRP of AUD$299.95, in New Zealand at for an RRP of $349.99 and from all authorised D-Link resellers, retailers and partners across Australia and New Zealand. ExtraHop Breaks Down IoT Security Barriers with Device Behaviour Profiling and Advanced Threat Detection 2020-02-19T02:35:35Z extrahop-breaks-down-iot-security-barriers-with-device-behaviour-profiling-and-advanced-threat-detection SEATTLE — FEBRUARY 18, 2020 — ExtraHop, the leader in cloud-native network detection and response, today announced a suite of new features designed to streamline the secure adoption and implementation of IoT in the enterprise. ExtraHop® Reveal(x)™ now provides advanced discovery, classification, and behaviour profiling for enterprise IoT devices, providing visibility from the device to the service layer. These latest enhancements extend Reveal(x) capabilities to the enterprise IoT device edge, providing complete visibility, detection, and response across the attack surface without the need to implement narrow point solutions. IoT reduces operational friction, making businesses more efficient and employees more productive. But this comes at a cost. IoT moves computing power to the edge, vastly expanding the enterprise attack surface, and without visibility into what devices are connecting to the network and what resources they are accessing, it leaves organisations vulnerable to threats. “Our research points to consistent growth in enterprise IoT usage which, along with other enterprise initiatives, has led to a growing attack surface,” said Fernando Montenegro, Principal Analyst, Information Security, 451 Research. “This leads to increased demands from enterprise security teams for visibility into network traffic, analysis for detection of threats, followed by remediation as needed.” With the latest release, ExtraHop Reveal(x) now provides the visibility, detection, and investigation capabilities security and IT organisations need to continuously secure and manage expanding IoT deployments. - Continuous Device Discovery and Classification discovers, identifies, and profiles all IoT devices and services to deliver complete visibility without friction to IT and Security Operations teams. - Device Behaviour Profiling extracts rich L2-L7 data from network and cloud traffic, enabling deeper analysis across devices at the service level. When paired with cloud-scale machine learning from ExtraHop, this data is correlated with other network events to rapidly and accurately detect threat patterns for immediate response. This provides organisations with continuous behavioural monitoring and detection for IoT devices such as VoIP phones, printers, IP cameras, wearables, and smartboards. - Guided Investigation automatically gathers contextual information, related detections, and packet level details into a single workflow to streamline and accelerate response actions, enabling security analysts and threat hunters to quickly determine the impact and scope of an IoT event and easily drill into forensic level details. - IoT Security Hygiene helps security and IT operations teams address issues such as IoT devices and services using unencrypted communications, and when discovered, can automate response actions with other systems like creating a ticket or isolating devices on the network. “We believe that enterprise IoT is a strong fit for ExtraHop's network detection and response solution. Not only do we discover the presence of IoT devices, identifying make and model, but we also automatically segment into peer groups to detect suspicious behaviours and potential threats.” said Jesse Rothstein, CTO and co-founder at ExtraHop. “Reveal(x) enables organisations to truly understand the level of risk a device poses and provides situational awareness of the environment.” Enterprise IoT Security features ( are now globally available with ExtraHop Reveal(x) platform. To learn more about the company's industry-leading cyber analytics platform, visit: and explore the Reveal(x) live interactive online demo: About ExtraHop ExtraHop delivers cloud-native network detection and response to secure the hybrid enterprise. Our breakthrough approach applies advanced machine learning to cloud and network traffic to provide complete visibility, real-time threat detection, and intelligent response. With this approach, we give the world’s leading enterprises including The Home Depot, Credit Suisse, Liberty Global, and Caesars Entertainment the perspective they need to rise above the noise to detect threats, ensure the availability of critical applications, and secure their investment in cloud. To experience the power of ExtraHop, explore our interactive online demo: or connect with us on Linkedin: and Twitter: © 2020 ExtraHop Networks, Inc., Reveal(x), Reveal(x) Cloud, and ExtraHop are registered trademarks or marks of ExtraHop Networks, Inc. World-First Smart ‘ChillOUT Hubs’ Designed and Built in Australia 2020-02-19T02:00:01Z world-first-smart-chillout-hubs-designed-and-built-in-australia New experimental open-air smart hubs, created by Australian manufacturer Street Furniture Australia at the company’s studio and factory in Western Sydney, will be officially launched by The Hon. David Coleman, MP on Thursday February 20, 2020. Street Furniture Australia Head of Innovation June Lee Boxsell said the “ChillOUT Hubs aim to offer some relief in our densifying cities by providing opportunities to meet, work or rest, and spend more time outdoors.” “Each hub packs a punch - integrating shade, seats and tables, charging stations, solar power, sensors, lighting, public WiFi, greenery, smart fountains and smart bins - a big feat combining tech, industrial design and placemaking,” she said. Three hubs are already installed in the Georges River Council region in south Sydney as part of a pilot study for the Australian Government’s Smart Cities and Suburbs Program. They were the result of collaboration between the Council, the Smart Social Spaces research team from UNSW and the University of Sydney, and Street Furniture Australia. Street Furniture Australia designed the hubs with input from its partners. Council undertook the overall project management, including installation. The Smart Social Spaces team is developing a digital asset management dashboard, and will evaluate the impact of the hubs with a formal study. University of Sydney Associate Professor Nancy Marshall said her Smart Social Spaces research team was particularly interested in “how smart street furniture alters human behaviour in public open space, and how it might contribute to the community’s health and social well-being. We were also curious whether a dashboard could enable councils to more effectively manage their infrastructure,” she said. “Person-on-the-street surveys are being conducted to give us a complete picture of why the hubs and their technologies are, or are not, being used. We are also analysing how the hubs impact the urban heat microclimate,” Marshall said. Georges River Council Mayor Kevin Greene said that “as technology becomes more integrated into our lives, it’s important for councils to harness new technologies to better serve the needs of communities and improve services.” “These new public spaces are an exciting achievement as we move towards our goal of creating a connected city,” he said. Design Story Before sketching the hubs, Street Furniture Australia undertook a discovery process to understand the user needs and aspirations of each site. “We wanted to tailor each ChillOUT Hub to serve its community rather than creating a one-size-fits-all solution. The three sites are very different; spending time in each brought us many insights that are built into each design,” Boxsell said. “For example, we have an urban streetscape in Kogarah between the train station, hospital and library, surrounded by offices. There are people constantly passing through. The Kogarah ChillOUT Hub allows you to stop and eat your lunch outside, work using the charging stations, or wait in comfort for a ride. “We created user personas for all three sites, and designed the hubs around their needs. The ChillOUT Hubs became a ‘system’ or a kit of parts for site-specific solutions.” Technology Concept In the back end, the ChillOUT Hubs are connected to the IoT network to deliver data to councils to assist with decision-making, safety and maintenance management. Sensors are embedded in the hubs to measure three areas: users, microclimate and utilities. Data sets include visitation and median dwell time; local UV, humidity and temperature levels; power and water use, and bin fill levels. A digital dashboard, called SAMS (Smart Asset Management System), will display the information in one interface, and provide alerts for fire and power outage. A Smart Future The increase of high density living in cities brings greater pressure on public space to provide opportunities to rest, connect with community and immerse in nature. ChillOUT aims to test a model of how this could be achieved with smart furniture. “In the context of smart cities, partnerships are vital in delivering successful outcomes. As long as there is a shared goal, a culture of trust and win-win outcomes, we believe collaborations are the way of the future for private industries,” Boxsell said. “For Georges River Council, the Smart Social Spaces team and Street Furniture Australia, the community was at the heart of this project, so now it’s about listening to them to see how we can bring further amenity and enjoyment to their parks and public spaces. We are here to learn.”  Results will be shared in a White Paper and short film in mid-2020. [END] -- Contact Available for interview: June Lee Boxsell Head of Innovation, Street Furniture Australia 0432 398 937 Kevin Greene Mayor, Georges River Council Contact Emily Kaelin: 0438 912 557 Dr Nancy Marshall Associate Professor, University of Sydney  0434 140 092 Official ChillOUT Launch Event Date: Thursday 20 February 2020 Time: 2:00pm – 3:00pm Location: Kogarah ChillOUT Hub, Kogarah Town Square, Belgrave Street KOGARAH RSVP: To  About Street Furniture Australia Street Furniture Australia is a leading innovator in furnishing the public realm in Australia. The company uniquely operates both a factory and an active research and development program under one roof in Western Sydney. The design team launched Australia's first smart bench in 2017, and won numerous awards including the Good Design Award. It is also the only manufacturer to win a coveted Australian Smart City Award by the Smart Cities Council Australia and New Zealand. Street Furniture Australia is committed to creating smiles in public spaces, which is a philosophy well-aligned with Georges River Council and the Smart Social Spaces team from UNSW and University of Sydney.  Describing itself as a '34-year old start up,' Street Furniture Australia has furnished more than 30,000 projects in Australia and around the world. Images Industry site tour of the ChillOUT Hub in Kogarah. Kogarah ChillOUT Hub. Mortdale ChillOUT Hub. Timothy Reserve, Hurstville, ChillOUT Hub. Kogarah ChillOUT Hub. Installing the solar panels onsite. Installing solar panels at the Mortdale hub. Cranes were used to install prototype smart trees. ChillOUT Aria Table casting sample. ChillOUT Smart Tree node: comparing sample to 3D-printed prototype. Testing ChillOUT Smart Tree electricals. ChillOUT Hub system. + High res versions and more in the Google Drive Folder.