PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    The Hidden ROI: Cloud Friendly Security
    [pdf-embedder url=”https://www.scc.com/wp-content/uploads/2019/11/The-Hidden-ROI-Cloud-Friendly-Security.pdf” title=”The Hidden ROI- Cloud Friendly Security”]

    The Hidden ROI: Cloud Friendly Security

    Defend Against Encrypted Threats
    [pdf-embedder url=”https://www.scc.com/wp-content/uploads/2019/11/F5_SSLO_ARTICLE_Defend-against-encrypted-threats-FNL.pdf”]

    Defend Against Encrypted Threats

    The challenges and benefits of SSL/TLS Orchestration
    Security and privacy concerns globally have driven rapid growth in the use of encryption for data in transit across the internet. F5 Labs sampled more than 20 million web pages in 2017 and found that more than 80 percent of page loads are encrypted with SSL/TLS. Unfortunately, malware developers have found that hiding their viruses,...

    The challenges and benefits of SSL/TLS Orchestration

    5 Rules to Lifting and Shifting Applications to the Cloud
    Join us for this live webinar Tuesday, November 22, 2016 | 12:00pm – 1:00pm GMT / UK Time For many organisations, moving enterprise applications to the public cloud can be a very attractive proposition. It enables them to dispose of the fixed costs and assets involved in running a large-scale IT infrastructure. But when moving...

    5 Rules to Lifting and Shifting Applications to the Cloud

    Research Report: State of Application Security
    F5 has shared their first annual State of Application Security report. Conducted in partnership with the Ponemon Institute, Application Security in the Changing Risk Landscape surveyed over 600 IT and IT security professionals about protecting applications critical to running their business. One of the key takeaways is that lack of visibility into the application layer is the...

    Research Report: State of Application Security

    The New AAA: APIs, Authentication, and Availability
    Blog by Lori MacVittie, Principal Technical Evangelist at F5 You might have figured out that yes, I’m one of those people playing Pokémon Go. Or, as is often the case of late, not playing Pokémon Go. That’s bad, because it also means our youngest is not playing, because as it turns out we’re both using...

    The New AAA: APIs, Authentication, and Availability

    Pokémon Go Launch Reminder Why ‘Build to Scale’ Important as ‘Build to Fail’
    One of the catch phrases of DevOps and cloud for the past, oh, many years has been “build to fail.” The premise being that too many businesses experience costly downtime and loss of revenue (and productivity) due to capacity-related performance problems so you should build your app and infrastructure ‘to fail’ to ensure such ghastly...

    Pokémon Go Launch Reminder Why ‘Build to Scale’ Important as ‘Build to Fail’

    New F5 Software Advances Application Security, Management, and Orchestration
    In May, F5 announced software-based solutions that enable customers to seamlessly integrate availability and security services, simplify device management, and better orchestrate IT infrastructure. F5 is introducing BIG-IP v12.1 software, delivering leading application services with enhanced public cloud integration and more sophisticated security policies, BIG-IQ Centralized Management v5.0, providing expanded management for F5’s BIG-IP solution...

    New F5 Software Advances Application Security, Management, and Orchestration

    Turning up the OpenStack Heat with F5
    OpenStack is making its way into production. In OpenStack’s sixth user survey, it found that 60% of deployments were there, in production. That’s compared to only 32% a mere two years earlier.  That’s in part thanks to the steady growth of private cloud in the enterprise and agility in service provider environments. As with nearly...

    Turning up the OpenStack Heat with F5

    Unparalleled performance and security for Government web applications
    Clearswift and F5 have partnered up to offer the latest in critical information protection and threat mitigation for Government web applications, now available and deliverable through SCC. The Critical Information Protection and Multi-layered security solutions relies on the unique integration of the F5 BIG-IP and the Clearswift SECURE ICAP Gateway Adaptive Redaction technology, which brings...

    Unparalleled performance and security for Government web applications

    The State of Application Delivery in 2016
    Cloud technology environments are still high on the agenda in 2016, with 4 in 5 organisations planning on operating in a hybrid cloud environment, according to F5’s 2016 State of Application Delivery report. Over 3000 survey respondents provided insight into their environments, tools and applications, detailing what technologies they believe will have a strategic impact,...

    The State of Application Delivery in 2016

    Protecting Government’s critical information from today’s advanced security threats
    As government continues its transformation to a digital landscape, the growing list of web applications and services implemented to reduce costs, improve communication and streamline operations, also increase the risks to the security and protection of sensitive data. There is, however, an exciting new technology partnership that brings the security and protection of sensitive data...

    Protecting Government’s critical information from today’s advanced security threats

    CONTACT US
    Scroll to Top