Insights for IT leaders you can actually use.

Short, practical briefings on security, networks, cloud and AI, plus what it takes to run IT in Australia. Written by Comans engineers and project leads.

Practical AI for Australian SMEs: 5 quick wins you can roll out in 90 days

A practical guide to low-risk, high-impact AI projects for SMEs, like automated quoting and content templates, scheduling, summarisation and customer chat assistants, with clear steps and tools to get it done.

Read article
AI & SECURITY

Generative AI & security: governance, prompts & detection

Security controls to put in place before rolling out GenAI internally, including prompt governance, data leakage detection and SIEM integration.

Read article →
STARTUPS

How to set up practical IT for your Australian startup

A founder’s checklist: identity, email, accounting integrations, cloud or on-prem, and how to budget for IT.

Read article →
OPS & SECURITY

Running IT for Australian SMEs: 10 common mistakes

Common traps (no identity policy, unmanaged backups, no asset register) and practical step-by-step fixes.

Read article →
PROCUREMENT

How to procure IT in Australia

How to negotiate hardware, licences and warranties. Understand volume discounts and get clear pricing, plus sensible disposal when gear reaches end of life.

Read article →
MANUFACTURING

The OT/IT convergence: what to do in 2025 to 2027

The role of edge compute, good segmentation, and Starlink/LTE options to keep sites running in manufacturing.

Read article →
SOC & AI

The rise of AIOps: can AI fix alert fatigue?

What AIOps can realistically do today for alerts and monitoring, and how it fits with Sentinel/Defender, plus where to start.

Read article →
SUSTAINABILITY

Green IT: cutting carbon in IT operations

Practical ways to cut emissions: extend device life, right-size cloud usage, sensible data retention policies and smarter procurement.

Read article →
WORKPLACE

The future of work tech in Australia

How identity, device security and collaboration tools will shape hybrid work, plus steps to tighten up your identity setup.

Read article →
MIGRATIONS

How we validate migrations: a playbook

A technical checklist for validation-led migration projects: decision gates, test cases and rollback plans plus runbooks.

Read article →
GOVERNANCE

Quarterly security review: what to track

A template for quarterly security reviews: metrics to track (MTTR, repeat issue rate), and how to present risk and the roadmap.

Read article →

Resource Hub

Procurement Guide

How to buy hardware and licences in 2025, without surprises.
Download PDF ↓

Engagement Model

How we run projects and support tiers.
Download PDF ↓

Hardware Catalogue

Standard devices we recommend for Australian teams.
Download PDF ↓

Our Contributors

Principal Architect

Design & Strategy

Head of Security

Cyber & Risk

Service Lead

Operations

Belinda Comeau

Procurement & Assets

Stay up to date

Get practical insights in your inbox. No fluff, just what works for Australian IT teams.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Prefer a chat? Book a consult or email support.