logo
SAS Viya expands AI tools with new offerings & cloud services

SAS Viya expands AI tools with new offerings & cloud services

Techday NZ07-05-2025
SAS has unveiled several new offerings on its SAS Viya platform aimed at supporting greater speed, productivity, and trust in AI deployment and analytics.
The latest additions to SAS Viya include the forthcoming SAS Data Maker, a synthetic data generator intended to tackle data privacy and scarcity issues within organisations. According to SAS, this solution builds on technology acquired from Hazy's principal software assets and is expected to be generally available in the third quarter of 2025.
Currently available is SAS Viya Intelligent Decisioning, which allows users to construct and deploy intelligent AI agents designed to provide an appropriate balance between machine autonomy and human oversight, taking into account task complexity, risk profiles, and business objectives.
SAS has also launched SAS Managed Cloud Services: SAS Viya Essentials, a managed service package primarily aimed at small and mid-sized businesses. The company says that Viya Essentials delivers the SAS Viya experience in a compact, hosted and managed service arrangement to help reduce barriers to entry for organisations seeking to implement analytics capabilities.
SAS Viya Copilot, an AI-powered conversational assistant, is currently in private preview with general availability expected in the third quarter of 2025. According to SAS, the Copilot will provide assistance to developers, data scientists, and business users, enabling AI-powered model development and code support. It is built on Azure AI Services and is described as a significant outcome of the SAS and Microsoft partnership.
Another recent release is SAS Viya Workbench, which offers a cloud environment for coding aimed at enhancing the speed and efficiency of developers, data scientists, and modelers. Workbench facilitates data management, analysis, and model development using SAS or Python code and integrates with Visual Studio Code or Jupyter Notebook. For 2025, Workbench adds support for R coding, SAS Enterprise Guide as an IDE option, and is expanding its availability from AWS Marketplace to the Microsoft Azure Marketplace.
Kathy Lange, Research Director for AI Software at IDC, commented on the company's direction: "SAS is evolving its strategy and portfolio to embrace a broader ecosystem of user personas, preferences, and technologies within an enterprise's AI technology stack. SAS continues to develop offerings that streamline and automate the AI life cycle and enable organisations to make better business decisions faster."
SAS highlighted a recent AI productivity study conducted by the Futurum Group in 2024, which reported that SAS Viya users were able to accelerate their AI life cycle by collecting data, building models, and deploying decisions 4.6 times faster than selected competitors. The study also found increased innovation, faster decision making, and revenue growth for users.
Bryan Harris, Chief Technology Officer at SAS, addressed the pace of change in the AI sector by saying, "The current economic climate and rapid pace of AI innovation can feel intense and overwhelming. Our goal is to deliver cutting-edge AI capabilities that help organisations navigate the hype and disruption, make breakthroughs in problem solving, and gain a decision advantage."
SAS also pointed to the role its technology is playing beyond commercial applications. Fathom Science, a start-up focused on creating digital twins of the ocean, used SAS Viya to address marine conservation concerns. By employing SAS Data Maker, Fathom Science generated synthetic shipping lane data to aid in the validation of its whale location prediction model, which is designed to reduce the risk of vessels striking critically endangered North Atlantic right whales. The process involved expanding available data points and utilising SAS Viya Workbench to develop machine learning models for estimating whale proximity to shore, leading to statistical and machine learning validation of their approach.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Letters: You can't exempt GST from food; Ardern should stand at the podium of accountability
Letters: You can't exempt GST from food; Ardern should stand at the podium of accountability

NZ Herald

time3 hours ago

  • NZ Herald

Letters: You can't exempt GST from food; Ardern should stand at the podium of accountability

We don't have to borrow more money. The rich have plenty of opportunity to avoid GST and need to pay their fair share of income tax. There is no 'trickle down' of wealth. There is only a 'trickle up'. The problem when the wealth doesn't get shared around is the economy stagnates, which is what we are seeing now. Only a change in mindset can fix this – kind of like climate change. Bill Gates made billions from Microsoft, then created a foundation to find ways to give it all away. I wonder what the world would look like today if he and others like him had charged a little less for their product and paid the people who worked for them a little more. Paul Cheshire, Maraetai. Don't forget October 7 In view of all the fiery rhetoric surrounding this conflict we seem to have lost sight of some facts. Let us remember that it was Hamas who sent armed men to kill and kidnap participants in a family day out music festival. It is Hamas who is still holding 50 hostages in underground tunnels and subjecting them to mental and physical deprivation. It is Hamas who announced that they do not care how many of their people die so long as Israel is made to look guilty of genocide. It is Hamas who has continually refused to come to any agreement with Israel. I am neither Jewish nor Islamic but I do read the Herald and watch the news. Jill Kouremetis, Waitākere. Covid-19 inquiry Thomas Coughlan does us a favour in astutely weighing the pros and cons of requiring Ardern and members of her cabinet to attend an open session of the second stage of the Covid-19 inquiry. But he ends his piece on a pessimistic note – namely, that both parties are guilty of setting up inquiries to find fault with their political opponents' time in office. If this is so, then this practice can only undermine the integrity and trust for one of the few ways we have of looking seriously at issues of governance and how to improve performance in public policy. The UK's Institute of Government issued a report on public inquiries and found that the most respected are headed by a non-partisan chair and often have terms of reference set by a select committee. In recent times, a supposedly 'independent' inquiry was quickly conducted on the performance of Kainga Ora (state housing) and, predictably, found fault, with the disbandment of much of the public housing programme, and quite possibly consequences for our current levels of homelessness. There were undoubtedly issues of performance, but it would have been publicly more palatable and informative for such findings to be more nuanced and established by a truly independent source. If we fail to retain the integrity and public trust for public inquiries, then we will have lost one of the best options we have for ensuring good government. Emeritus Professor Peter Davis, Auckland. Politicising Royal Commissions A timely warning by Herald political editor Thomas Coughlan about the dangers of politicising Royal Commissions. The terms of reference of the current Covid-19 inquiry, keeping the timeline from February 2021 to October 2022 to spare Winston Peters being called, is a case in point. So is all the controversy over Jacinda Ardern and her fellow ex-ministers for not appearing in person and answering questions privately instead. If one government can use such an inquiry as a way of effectively putting former government ministers on public trial, then so can another. Labour administrations have not been shy about this either in the past. With each new government becoming more strident in blaming their predecessors for the country's woes, Royal Commissions are in danger of being weaponised. As Coughlan ponders, perhaps we should leave the judgement of a government's performance to voters and the ballot box. Jeff Hayward, Central Auckland. Road user charges 'Fairness' talk justifying RUCs is utter crap and farmers make and talk a lot of it. The new so-called independent science adviser emits so much methane vapour on his breath you can smell him before he even talks. Users are asked to pay forward for road maintenance with RUCs but 'agricultural' carbon emitters are excused their costs. The shift to RUCs disincentivises buying a light fuel-efficient hybrid vehicle and incentivises heavy gas guzzlers. Is this an Act voting base – 'big bold beautiful gas guzzler libertarians'? Simon Watts removing farmers from the ETS isn't fair and Chris Bishop's RUCs aren't that fair on low-damage-causing low-emitting vehicles. It's a flat tax, virtually indiscriminate by weight, an obvious example of ignoring the axle-weight damage evidence, let alone exonerating big carbon emitters. A Blue-Green party is not viable at present. Blue-Green voters have little viable alternative in this climate-change denial dominant coalition. Green policies: wealth taxes, a cleaner a more equitable society put them off. Why? Wealthy people need to exercise their spinal tendons. We only need one in 10 to stiffen their resolve. A sustainable future is actually worth paying forward. I'm thinking this will be given the 'gumboot kick' as provocative and offensive but at least could make a few think. Steve Russell, Hillcrest. Wildfires The NZ Herald does a great job placing photos of blazing countries on fire for all the world to see. It's within the World section noting many of those countries, America, Spain, Portugal, France, Greece, Italy and now Canada as they try to dampen down extraordinary fires raging uncontrolled from temperatures way above normal. Other countries suffer from the loss of fertile land, too dry for anything to grow, causing starvation. A few of these articles mention climate change and some even stress our need to stop burning fossil fuels. In winter, the news covers storms, floods and sea rises threatening life as we know it. The biggest threat of all to our world are the oil-producing companies. They are in control, refusing to face up to this horrendous disaster they are subjecting our planet to. Along with plastic, made also from oil, they dig on down, heads in the sand, ignoring statistics, ignoring the disasters, so their flow of money into already overloaded bank accounts can continue. But what do they gain on a planet that is dying? Emma Mackintosh, Birkenhead. A quick word The same degree of compulsion that locked down the team of five million from the 'podium of truth' should be applied to the squad of four – Ardern, Robertson, Hipkins and Verrall – to front up at the podium of accountability in person. Mike Wagg, Freemans Bay. Talk about third world, how absurd to read that a prison is to be air conditioned while a hospital nearby is not. Surely one would think that the likes of schools and hospitals would be at the top of the list for that? Prisons are getting better by the day it seems and soon won't be too far below a hotel standard if that continues. Paul Beck, West Harbour. All those that have not responded to an invitation to submit to Royal Commission on Covid. Why have a commission? You and I survived and we can thank the government for our closure. It is always good to look back in hindsight but at the time we were in the dark as was the rest of the world. How many invitations have you responded, 'sorry but no'? Dennis Manson, Unsworth Heights. Given the reputation many police forces across the globe for violence and corruption, I was rather hoping that, following the tragic death of an alleged offender in Christchurch, Mark Mitchell would rate our own as being somewhat above 'world class'. The phrase 'world class' itself in today's ever-changing world doesn't really fill one with a great deal of confidence. Our country should strive to be better than 'world class', because we can be when we want to be. Jeremy Coleman, Hillpark. This week there was another media report of angry adults making their way onto the grounds of a high school, causing a lockdown. Such incursions seem to be increasing, often sparked by feuding comments on social media. These actions are frightening for students and staff who are the focus of these people, and those who witness them. Schools are supposed to be safe places for children, and classrooms are the domain of teachers. Trespass notices can be meaningless if the person does not normally have any association with the school issuing it. As a deterrent, surely it is time such unlawful entry to a school is categorised as a crime with more serious consequences for the perpetrators. Matt Elliott, Birkdale.

SharePoint flaw sparks urgent patch call amid new RCE threat
SharePoint flaw sparks urgent patch call amid new RCE threat

Techday NZ

timea day ago

  • Techday NZ

SharePoint flaw sparks urgent patch call amid new RCE threat

Cybersecurity experts are urging organisations to take immediate action following the disclosure of a critical vulnerability in Microsoft SharePoint, as highlighted in the latest Patch Tuesday security update. This newly identified issue, designated CVE-2025-49712, is raising alarms given its potential to facilitate remote code execution (RCE) when combined with other known flaws. Saeed Abbasi, Senior Manager of Security Research at Qualys Threat Research Unit, described the vulnerability as a significant threat, especially coming on the heels of last month's "ToolShell" zero-day attacks. Abbasi commented, "This RCE demands authentication but pairs dangerously with known authentication bypasses. Attackers chaining this with prior flaws could achieve full server compromise, and data exfiltration." He added that while there have been no reports of exploitation in the wild so far, experience suggests such gaps can be closed rapidly as threat actors adapt their techniques. Abbasi urged organisations to "prioritise and patch all SharePoint updates, rotate keys, and eliminate internet exposure," stressing that delaying mitigation efforts could trigger both regulatory scrutiny and significant data breaches. "SharePoint's exploit streak isn't over," Abbasi warned, underscoring the need for proactive management of the platform's security posture. The August Patch Tuesday update from Microsoft addressed a total of 107 Common Vulnerabilities and Exposures (CVEs). Of these, 13 were rated critical and 91 as important. Elevation of privilege (EoP) vulnerabilities accounted for 39.3% of the fixes, while remote code execution issues made up 32.7% - a pattern consistent with trends observed in previous months. Satnam Narang, Senior Staff Research Engineer at Tenable, noted that "this month's release highlights an upward trend in post-compromise vulnerabilities over code execution bugs. For the second consecutive month, elevation of privilege vulnerabilities represented the bulk of CVEs patched this month." Narang referred to the patch for CVE-2025-53779, a privilege escalation flaw known as BadSuccessor, describing its immediate impact as limited due to the specific prerequisites needed for exploitation. "An attacker must have at least one domain controller in a domain running Windows Server 2025 in order to achieve domain compromise," he explained, making it a targeted rather than broad-based risk. SharePoint vulnerabilities continued to receive particular attention, with Narang observing, "It might seem like déjà vu because Microsoft patched two more SharePoint vulnerabilities this month: a remote code execution flaw (CVE-2025-49712) and an elevation of privilege bug (CVE-2025-53760). After the chaos that ensued with the exploitation of the ToolShell vulnerabilities, any new SharePoint vulnerabilities understandably raise concerns." Since 2022, Microsoft has patched an average of 21.7 SharePoint vulnerabilities annually, with 2023 seeing a high of 25. With 20 already addressed in the current year, the record may soon be exceeded, according to Narang. Despite this volume of patches, he noted, "only three were exploited in the wild (CVE-2023-29357, CVE-2023-24955, CVE-2024-38094) in addition to the three ToolShell vulnerabilities (CVE-2025-49706, CVE-2025-49704, CVE-2025-53770)," though another, CVE-2025-53771, may also have been exploited based on emerging reports. Security practitioners highlight the recurring threat presented by SharePoint vulnerabilities, which can serve as gateways for lateral movement and deeper network compromise if not promptly addressed. With a rising tally of disclosed flaws and only a handful exploited so far, experts are calling for continued vigilance, patching discipline, and the hardening of exposed enterprise collaboration systems.

August Patch Tuesday: Microsoft addressing 111 vulnerabilities
August Patch Tuesday: Microsoft addressing 111 vulnerabilities

Techday NZ

time3 days ago

  • Techday NZ

August Patch Tuesday: Microsoft addressing 111 vulnerabilities

Microsoft is addressing 111 vulnerabilities this August 2025 Patch Tuesday, a volume which is around the recent average. In a neat parallel with last month, Microsoft is aware of public disclosure for a single one of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Once again, the lone Patch Tuesday zero-day vulnerability is assessed as only moderate severity at time of publication, which brings Microsoft's lucky streak up to 11 months. Today's release includes the publication of nine critical remote code execution (RCE) vulnerabilities, although Microsoft has only marked one of these as more likely to see exploitation. Eight browser vulnerabilities have already been published separately this month, and are not included in the total. What do attackers want in a Windows context? Domain admin! When do they want it? Now! Today's lone zero-day vulnerability might be just what they need to break through the final layers of protection and swipe the crown jewels. CVE-2025-53779 is an elevation of privilege (EoP) vulnerability in the Windows implementation of Kerberos, which is enabled via abuse of dMSA configuration. The advisory FAQ provides more clues as to the nature of the attack than many comparable Microsoft advisories, but misses a golden opportunity for clarity, since it never sets out what it means by dMSA, leaving us scouring for contextual clues. Ultimately, we can determine from context that today's hot topic is the Delegated Managed Service Account, rather than the Defender Microservices Architecture or some other piece of Microsoft paraphernalia with matching initials. Microsoft's motivation is unimpeachable: the dMSA supports automated rotation of credentials for service accounts, and is specifically designed to prevent credential harvesting using Kerberoasting. Indeed, CISA has described Kerberoasting as one of the most time-efficient ways to elevate privileges and move laterally throughout an organisation's network. The good news here is that successful exploitation of CVE-2025-53779 requires an attacker to have pre-existing control of two attributes of the hopefully well protected dMSA: msds-groupMSAMembership, which determines which users may use credentials for the managed service account, and msds-ManagedAccountPrecededByLink, which contains a list of users on whose behalf the dMSA can act. However, abuse of CVE-2025-53779 is certainly plausible as the final link of a multi-exploit chain which stretches from no access to total pwnage. Finally, it's important to note that Microsoft is only publishing patches for Windows Server 2025, and that's because msds-ManagedAccountPrecededByLink was first implemented in Server 2025. Migrating to newer operating systems sooner rather than later remains good advice, but so is remediation of zero-day vulnerabilities which could give an attacker total control of your estate. The publication of any pre-authentication RCE in Windows will naturally spark discussion. Of course, not all pre-auth RCEs are created equal, and while CVE-2025-50165 has a hefty CVSSv3 base score of 9.8, and is certainly a cause for concern, it is not the worst of the worst, since it presumably isn't wormable. Despite that, a degree of alarm is amply justified, since the advisory FAQ mentions - twice! - that user interaction isn't required. Exploitation is via a malicious JPEG file, which could be delivered within an Office document or other means; perhaps even visiting a website would be sufficient, or receiving an email within Outlook, although the advisory doesn't explicitly confirm or deny these other possible attack routes. The malformed JPEG tricks the Windows Graphics Component into code execution via an untrusted pointer dereference. The context of execution isn't specified, so in the standard spirit of caution, we'll assume SYSTEM. This is hardly a new class of problem: we can cast our minds back a dozen years, for instance, and consider the broadly similar MS13-096. However, the specific flaw underlying CVE-2025-50165 is presumably a recent introduction, since only Windows 11 24H2 and Server 2025 receive patches. Patch this one sooner rather than later, since it could provide a skilled attacker with a valuable foothold from which to launch further attacks, including perhaps even today's CVE-2025-53779. The Windows GDI+ (Graphics Device Interface Plus) is at the centre of how almost all two-dimensional graphics are rendered on Windows assets. CVE-2025-53766 is a critical RCE in how GDI+ interprets metafiles, which are often used to store vector graphics. An attacker can achieve code execution via buffer overflow without privileges or user interaction. As with today's CVE-2025-50165, it's unlikely that this vulnerability could be wormable, but the most alarming path to exploitation involved simply uploading a malicious metafile to a Windows machine running unspecified web services. There is no mention of SharePoint, Exchange, Office, or other non-Windows products in the Security Updates section of the advisory, but that still leaves an essentially limitless potential attack surface; for example, anyone running a custom application offering file uploads could find themselves vulnerable to an attacker wielding a dodgy WMF file. On the bright side, the Preview Pane is not a vector in this case. A patch is available for Server 2008, but not Server 2012, a curious and possibly concerning pattern that we see from time to time with RCEs which affect the full historic range of Windows products. Today is certainly a good day for fans of critical RCE vulnerabilities which target weaknesses in how Windows interprets graphics. Exploitation of CVE-2025-50176, a flaw in the DirectX graphics kernel, could lead to execution in a kernel context. Microsoft considers exploitation more likely, which may be why the advisory doesn't provide a great deal of information about the means of exploitation, beyond a terse statement that type confusion is involved. Type confusion is where the kernel receives a pointer which it expects to be for one type of object, but is in fact for another, which is a bit like asking someone to read out loud from a restaurant menu, but then handing them their secret diary and hoping they won't notice the difference. Most people will not be fooled, but under the right circumstances, anything is possible. There are no significant changes to Microsoft product lifecycles this month. However, October will bring a flurry of changes, including the categorical end of support for non-LTSC versions of Windows 10.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store