Eraring Energy renews outsourcing contract with Logica
- 29 September, 2010 12:42
Energy generation company, Eraring Energy, has renewed the contract to outsource its IT services for an additional three years with Logica.
The agreement will see the continued end-to-end support for Eraring Energy’s whole IT environment, including service desk, infrastructure, network, application, enterprise resource planning, and database services, services which has been outsourced to Logica since 2002.
Eraring Energy manager information technology and telecommunications, Mark Edwards, said Logica had been reliable during a period of change in the NSW energy sector, helping to improve business and reduce operational costs.
Logica assisted with the virtualisation of Eraring Energy’s IT infrastructure, and is in the process of implementing an enterprise backup solution to reduce operational costs and retrieval time by switching from a disk to tape solution to a disk to disk solution.
According to Logica’s chief executive of Asia Pacific, Colin Holgate, the energy sector in Australia is undergoing a period of change as it attempts to capitalise on new technologies to improve energy production and distribution to lower the environmental impacts.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Devising a Server Protection Strategy with Trend Micro
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.