Events »
-
06 Sep 12
McAfee Security Connected 2012 Series Adelaide
-
07 Sep 12
McAfee Security Connected 2012 Series Perth
-
10 Sep 12
Oceania CACS2012
-
11 Sep 12
OBS Best Place to Work Seminar Series
-
11 Sep 12
LIVE Broadcast - Utilising New Technology to Revolutionise your IT Environment
-
13 Sep 12
McAfee Security Connected 2012 Series Auckland
-
17 Sep 12
Australian Banking & Financial Technology Innovation Summit
-
17 Sep 12
McAfee Security Connected 2012 Series Canberra
-
08 Oct 12
2012 Young IT Professionals Conference Sydney
-
16 Oct 12
Future of Payments Conference 2012
-
17 Oct 12
ITIL® Foundation (incl. Exam)
-
23 Oct 12
CIO Summit 2012 - Melbourne
-
23 Oct 12
Gov 2.0 Conference 2012
-
25 Oct 12
11th Safeguarding Australia 2012: “National Security in the Age of Austerity” - Canberra
-
29 Oct 12
Big Data Summit 2012
-
31 Oct 12
Big Data Conference 2012
-
31 Oct 12
Social Media Risk & Privacy 2012 Conference
-
05 Nov 12
iqnite 2012 Australia - The conference for Software Quality and Testing
-
12 Nov 12
Gartner Symposium/ITxpo 2012
-
20 Nov 12
spatial@gov® Conference and Exhibition 2012
Why Encrypt? - Securing email without compromising communications
There’s an old saying that a ship is safe in the harbour, but that’s not what ships are for. The same can be said of enterprise data. If a company’s success is increasingly determined by its ability to act on information, a fundamental requirement of that success is the enablement of unfettered communications between co-workers, partners and clients. Read more.
Lavasoft Ad-Aware Free
Ad-Aware Free has long been one of the most popular spyware killers on the planet, and with good reason. It's simple to use, does an ...
Case Study: Gadens Law Firm Reclaims 22 Hours of Lost Productivity Each Month
For the past eight years, Gadens Brisbane has used a “big three” security vendor to protect its network against malware and other threats. Despite deploying a complete antivirus package, the firm still experienced up to three infections across the network every week. This gap in security meant the firm’s IT team was spending up to six hours a week on security management, resulting in lawyers being unable to work on their computers for hours a time – an inconvenience for the individual, and costly for a business reliant on hourly charging. Read how Gadens Law Firm have reduced their security management time from about 6 hours a week to 30 minutes a week.
- FTProduct Manager Strategist - Enterprise ApplicationsNSW
- CCSAP Security Project ManagerNSW
- FTProduct Manager Strategist - Enterprise ApplicationsNSW
- FTBusiness Intelligence AnalystSA
- CCSAP Functional Payroll ConsultantNSW
- FTICT Service Delivery Specialists Level 3ACT
- CCSAP Cutover ManagerNSW
- FTICT Service Delivery Specialists Level 4/5ACT
- CCLead Abinitio ArchitectNSW
- FTSAP Project ManagerNSW
- FTSAP Basis Principle ConsultantNSW
- FTApplication Support - C#NSW
- FTSharePoint Consultants - Architects and developers Needed - Perth basedNSW
- CCSAS / Teradata Technical Lead - Sydney - SAS guru / SAS SpecialistNSW