Latest News
Concerns over Westpac Unite as tech chiefs depart
Wesfarmers to deploy agentic AI groupwide
Sydney Metro quietly abandoned M1 5G network hopes
Pentagon pushing AI companies to expand on classified networks
Fibre now the "dominant" tech in NBN Co's network mix
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: HTC's HD7 with Windows Phone 7
Software sets the HD7 apart from the year-old HD2.
Staff Writers
Jan 24 2011 3:11PM
Hardware
Review: Google Nexus S
Read the verdict on the Google Nexus S - the first Android 2.3 smartphone.
Jonathan Bray
Dec 31 2010 8:17AM
Hardware
Why you should automate your next IT security audit
By implementing a solution that automates the auditing process, IT security professionals can be freed up to perform more valuable tasks says NetIQ's Patrick Eijkenboom.
Staff Writers
Dec 15 2010 11:09AM
Security
Time for SMBs to look at SANs
SMBs need to avoid getting lost in complex solutions and look at storage area networks for their security, according to Huawei Symantec's Scott Tam.
Scott Tam
Oct 26 2010 9:43AM
Security
Protecting data against modern threats
Comprehensive data security is multi-faceted, addresses the entire flow of data, and must consider various factors requiring simple and unified management, according to Websense's Adam Bradley.
Sep 24 2010 5:07PM
Security
Review: RIM BlackBerry Pearl 3G 9105, super-slim smartphone
Aimed successfully at a younger audience, but also with strong enterprise credentials.
Paul Ockenden
Sep 22 2010 7:24AM
Hardware
Close encounters with ancient history
West Coast Labs' Lysa Myers says that you can't create a filter to screen out human gullibility.
Lysa Myers
Sep 16 2010 10:11AM
Security
How to avoid flaws in identity management
IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.
David Bell
Sep 13 2010 4:57PM
Security
Review: iPhone 4
A new design and super-sharp display, but is Apple's new smartphone good enough to pick up where the 3GS left off?
Jonathan Bray
Sep 9 2010 8:17AM
Hardware
Coping with insider fraud
Attachmate's Colin Barnetson looks at the growing risk of insider fraud, and outlines the steps businesses can take to prevent it occurring in their operations.
Staff Writers
Sep 1 2010 5:08PM
Security
Interview: Peter Altabef, president of Dell Services
Peter Altabef assumed the role after the acquisition of his former employer Perot Systems.
Paul Fisher
Jul 12 2010 4:51PM
Security
Why user provisioning matters
All it takes is a single employee to bring an organisation's network to its knees.
Martin Hack, executive vice president, NCP Engineering
Jul 6 2010 3:33PM
Security
Review: Trend Micro Enterprise Security for Endpoints v10
Customers can enable modules depending on the level of protection required.
Nathan Ouellette
Jul 6 2010 3:24PM
Security
Review: Venafi Encryption Director v5
We find this product to be a good value for the money.
Peter Stephenson
Jul 1 2010 11:58PM
Security
Review: Tripwire Enterprise v7.7
Tripwire Enterprise uses both agent-based and agent-less approaches.
Peter Stephenson
Jun 29 2010 2:29PM
Security
How can you be confident when the endgame stakes are increasing?
IT personnel need to take more of an integrated approach.
Devin Anderson, product line manager for Security Suite,
Jun 28 2010 11:21AM
Security
Review: New Net Technologies Change Tracker
Provides full-scale reporting and management of systems.
Peter Stephenson
Jun 23 2010 10:45AM
Security
Review: Skybox Security Skybox 4000 v1.0
A risk management platform that collects data from various network assessment tools.
Michael Lipinski
Jun 17 2010 10:37AM
Security
Branch office security: What are the real problems?
Organisations need not overlook security at their satellite office locations.
Gert Hansen, vice president of product management, Ast
Jun 15 2010 10:36AM
Security
Review: McAfee Total Protection for Compliance v6.8
A GRC solution that can help users understand risk.
Michael Lipinski
Jun 11 2010 10:49AM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
Service NSW launches Digital ID pilot
AMP deploys over 400 AI agents across organisation
ABC drops Salesforce for Braze
ANZ deploys Agentforce to supercharge new CRM system
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?