PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    Data Harvesting Opens the Door to More Ransomware Attacks
    We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact, it wasn’t a good year for anyone with a vested interested in keeping their social security number, address, email or first pet’s name out of the clutches of...

    Data Harvesting Opens the Door to More Ransomware Attacks

    RUAG completes acquisition of cyber security company Clearswift
    Bern (CH), Theale (UK); 23.01.2017. RUAG Defence has successfully completed the acquisition of the British Cyber Security specialist Clearswift. Clearswift announced in December 2016. This acquisition enables RUAG to enhance key aspects of its current product and service portfolio in the area of cyber security. “The acquisition of Clearswift increases the number of employees at RUAG’s...

    RUAG completes acquisition of cyber security company Clearswift

    RUAG is aquiring Cyber Security specialist Clearswift
    Bern (CH), Theale (UK); 20.12.2016. The RUAG Defence division is acquiring the British Cyber Security specialist Clearswift. With this acquisition, RUAG is making a significant investment in the expansion and long-term development of its cyber security business. Clearswift’s leading products will be a significant addition to the RUAG Defence Cyber Security business unit. As previously announced,...

    RUAG is aquiring Cyber Security specialist Clearswift

    GDPR: How to Prepare for a Borderless World of Data Privacy
    One of the most influential business books of the early 21st century is Thomas Friedman’s The World is Flat: A Brief History of the Twenty-First Century. He argued that the world is a level playing field where all competitors have equal opportunity. Historical and geographical divisions that gave certain advantages to countries, companies, and individuals are...

    GDPR: How to Prepare for a Borderless World of Data Privacy

    End of Ransomware Attacks
    Ransomware and morphed forms of embedded malware are creating havoc for IT security organizations. Weaponized invoices, resumes and other malicious documents are distributed through compelling social engineering campaigns to evade existing email security gateways and sandbox analysis. Organizations are scrambling to find an immediate solution and have turned to Clearswift (see article Clearswift sees 70% growth...

    End of Ransomware Attacks

    Document Sanitisation and Redaction Safety Net for the Forgetful User
    Policies written. Tools provided. Training conducted.  As IT leaders, you have sufficiently enabled your users to properly sanitise and redact their documents before sharing outside the organisation, but what happens when they forget? Worse, what happens if they intentionally ignore the policy and process altogether? No longer can the sanitisation and redaction of documents for...

    Document Sanitisation and Redaction Safety Net for the Forgetful User

    The compliance clock is ticking. Start preparing for the EU GDPR now.
    The European Union General Data Protection Regulation (EU GDPR) raises the bar on privacy of personal data. It requires organizations, big and small, who trade with the EU to really understand all the personal data they deal with in order to properly secure it. This includes its purpose and its location — no matter where...

    The compliance clock is ticking. Start preparing for the EU GDPR now.

    10 shocking malware and ransomware statistics…
    “Malware Mania” is back with a vengeance creating havoc for organizations of all sizes and in all industries. Cyber criminals have morphed their attack methods with the resurgence of macro malware and encrypting ransomware to evade traditional antivirus and sandbox defenses. As a result, cybersecurity teams are scrambling for a more effective way to deal...

    10 shocking malware and ransomware statistics…

    Malware in attachments – stop them striking your organization
    There has been a concerning increase in the number of sophisticated malware attacks which are striking organizations. These are not simple attacks, but involve compromising reputable web servers in order to deliver malware infected content. The good news is that there is a solution to this – but why are traditional methods simply not working? What about...

    Malware in attachments – stop them striking your organization

    Unparalleled performance and security for Government web applications
    Clearswift and F5 have partnered up to offer the latest in critical information protection and threat mitigation for Government web applications, now available and deliverable through SCC. The Critical Information Protection and Multi-layered security solutions relies on the unique integration of the F5 BIG-IP and the Clearswift SECURE ICAP Gateway Adaptive Redaction technology, which brings...

    Unparalleled performance and security for Government web applications

    Protecting Government’s critical information from today’s advanced security threats
    As government continues its transformation to a digital landscape, the growing list of web applications and services implemented to reduce costs, improve communication and streamline operations, also increase the risks to the security and protection of sensitive data. There is, however, an exciting new technology partnership that brings the security and protection of sensitive data...

    Protecting Government’s critical information from today’s advanced security threats

    Is security an afterthought of network design?
    Security is often an afterthought of network design, and yesterday’s hierarchical networks are ineffective against today’s advanced cyber threats. Clearswift and F5 Networks have joined forces to deliver a highly scalable web application delivery platform integrated with powerful security technology. The unique solution can increase network performance, automatically detect and mitigate information loss risks, and...

    Is security an afterthought of network design?

    CONTACT US
    Scroll to Top