Sydney, Australia – September 26, 2018 – Dell Boomi™ (Boomi) has announced that Charles Sturt University (CSU) is using the Boomi integration platform to enhance student and staff experience, and underpin a refresh of its core applications as part of a five-year IT transformation.
CSU is a regional university with more than 40,000 students enrolled across 10 campuses and online. In 2017, it initiated an IT modernisation project with the aim of improving its business agility so it can develop and roll out student and staff services efficiently.
“We developed our enterprise systems renewal program in order to speed up the delivery of new resources for our stakeholders,” said Tim Mannes, Executive Director, Division of Information Technology, CSU. “To successfully execute on our objectives, however, we seriously needed a reliable, seamless and highly-integrated flow of information across our new enterprise environment. That’s the strategic background to our implementation of the Boomi platform.”
The cloud native Boomi integration platform-as-a-service (iPaaS) serves as the linking mechanism between all of CSU’s renewed operational systems. This includes customer relationship management (CRM), human resources (HR), finance, research, student management system (SMS), data warehouse and identity management platforms, as well any bespoke applications that are incorporated in the future.
By underpinning those applications, Boomi facilitates a central data repository that makes it possible for CSU to capture consistent and reliable information that can be analysed for better business insights. These insights will help the University make strategic decisions to overcome prominent industry challenges. In particular, the data consolidated through Boomi will aid CSU to combat attrition by proactively identifying priority students – those who may be struggling in their courses – in order to engage them early and guide them to improved outcomes during their learning journey.
Boomi also strips away complexity from CSU’s IT environment as it is built on a ‘low-code’ design. This should make it quick and easy to create and manage integrations controlling the need for dedicated specialised coding experts. It also reduces the need for the heavy maintenance that is inherent in legacy, on-premises integration technologies.
“The move to Boomi’s iPaaS has given us a high-reliability environment for business continuity. While we have been using integration for a decade, our old integration platform made upgrades difficult, and required a lot of resources to maintain – combined, it demanded a serious amount of effort that impeded our focus on what’s most important: the experiences of students and staff,” said Shane Jeffries, Manager Integration, Division of Information Technology, CSU.
CSU’s decision to deploy the Boomi integration platform-as-a-service (iPaaS) over other providers followed a market evaluation and discussions with fellow Australian universities, including Deakin University and Flinders University.
“The higher education space is hotly-contested in Australia, with universities under constant pressure to differentiate themselves to existing and prospective students by demonstrating innovative services,” said Michael Evans, Managing Director Asia-Pacific and Japan, Boomi. “By connecting systems and operations with Boomi’s platform, CSU is in a better position to understand its students than ever before. As a connected university with digital services, processes and insights, the organisation can optimise its investments in the resources that students need most, ultimately providing students a better learning experience that will enhance their suitability in the workforce of tomorrow.”
About Dell Boomi
Dell Boomi (Boomi), an independent business unit of Dell, is the leading provider of a unified platform to build The Connected Business, from cloud integration to workflow automation. Boomi helps organisations accelerate business agility by connecting data, applications and people to run faster and smarter. Visit http://www.boomi.com for more information. © 2018 Boomi Inc. Dell, Boomi, and Dell Boomi are trademarks of Dell Inc. or its subsidiaries. Other names or marks may be the trademarks of their respective owners.
Statements in this material that relate to future results, future hiring, and future events or investment are forward-looking statements and are based on Boomi’s current expectations. In some cases, you can identify these statements by such forward-looking words as “anticipate,” “believe,” “could,” “estimate,” “expect,” “intend,” “confidence,” “may,” “plan,” “potential,” “should,” “will” and “would,” or similar expressions. Actual results, hiring, customer trends, and events in future periods may differ materially from those expressed or implied by these forward-looking statements because of a number of risks, uncertainties and other factors, including the challenge of finding and onboarding new personnel, marketplace trends, ongoing management attention to the market, the uncertainties associated with technology changes and the development and release of new technology. Boomi and Dell Technologies assume no obligation to update any such forward-looking statements.
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities