PARTNER NEWSFEED
Discover our partner news
Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:
- Adobe
- AMD
- Apple
- AppSense
- Aruba
- ASUS
- Belkin
- Brother
- Bullitt
- CAT Phones
- Checkpoint
- Cisco
- Cisco (Featured)
- Cisco Energy Management
- Cisco Energy Management (Featured)
- Cisco>Cisco
- Citrix
- Clearswift
- Clearswift (Featured)
- Cloud
- Commvault
- COVID-19
- Cyber
- Dell
- Digital Workplace
- EMC
- EMC (Featured)
- EPOS
- Epson
- F5
- F5 (Featured)
- Featured-1
- Fortinet
- Hitachi (Featured)
- Hitachi Data Systems
- HP
- HP (featured)
- HP>HP Converged Systems (Featured)
- HP>HP PC
- HP>HP PC (Featured)
- HP>HP Print
- HP>HP Print (Featured)
- HPE
- HPE>HP 3Par Storage
- HPE>HP 3Par Storage (Featured)
- HPE>HP Converged Systems
- Hybrid Infrastructure
- Hypertec
- IBM
- IBM (Featured)
- IBM>IBM Business Analytics
- IBM>IBM Business Analytics (Featured)
- IBM>IBM Emergency Response Services
- IBM>IBM Emergency Response Services (Featured)
- IBM>IBM Mobile Device Management
- IBM>IBM Mobile Device Management (Featured)
- IBM>IBM Power 8 Systems
- IBM>IBM Power 8 Systems (Featured)
- IBM>IBM Smarter Storage
- IBM>IBM Smarter Storage (Featured)
- iiyama
- Industry
- Infrastructure
- Intel
- Ivanti
- Lenovo
- Lenovo>Lenovo Data Centre Group (DCG)
- Lenovo>PC
- LG
- Logitech
- Microsoft
- Microsoft (Featured)
- Mimecast
- Mimecast (Featured)
- MobileIron
- MobileIron (Featured)
- NEC
- NEC (Featured)
- NetApp
- NetApp (Featured)
- Nutaix
- Nutanix
- Nuvias & Riverbed
- Oracle
- Oracle (Featured)
- Oracle>Oracle Converged Infrastructure
- Oracle>Oracle Converged Infrastructure (Featured)
- Oracle>Oracle Systems Consolidation
- Oracle>Oracle Systems Consolidation (Featured)
- Palo Alto
- Philips
- Philips (Featured)
- Plantronics
- Polycom
- Product
- Product (Featured)
- Qlik
- Quest
- Recent-Home
- Red Hat
- Remote working
- RES
- RSA
- Samsung
- SanDisk
- SCC News
- Security
- Software
- Symantec
- Symantec (Featured)
- Toshiba
- Uncategorised
- Uncategorized
- VCE
- VCE (Featured)
- Veeam
- Veritas
- VMware
- VMWare (Featured)
- ZAGG
- Zebra
Open the doors for Mac, but seal them tight from vulnerabilities It feels like you’re stuck between a rock and a hard place. You want to empower your workers to choose the device and applications that allow them to be most productive, and yet you also need to keep them (and the greater organization) secure....
Free Your Workers, Secure Your Enterprise.
A pernicious bit of denial is eroding the ability of many companies to compete in the Age of the Customer. That denial manifests in the mistaken belief that it’s technology—not people or culture—that is most critical to business success. That’s false. In fact, in the Age of the Customer, your people and your culture are...
Companies Without People: How Digital Denial Undermines Business Success
It seems like every day brings another news story about a new security threat or data breach, so it isn’t surprising that we are seeing new and stricter regulations around data protection. Last week, the EU approved General Data Protection Regulation (GDPR) to establish formal regulations and a more modern framework that is required to...
Doing business in the EU? Get ready for GDPR compliance with RES
Join us for this must-attend one-day industry event to learn more about the latest developments in securing, automating and transforming the digital workspaces that assure your organization’s peak productivity.
RES Focus Europe 2016
Polycom RealPresence Debut™ is an enterprise grade video conferencing solution made simple, elegant, and affordable for huddle rooms and smaller spaces. It also delivers cost-effective collaboration for smaller organizations that are ready to move up from consumer-grade alternatives, which are great for chatting with friends but don’t get the job done at work. Spaces and...
Meet Polycom® RealPresence Debut™
Faster, more reliable development test results accelerate time to market for new software versions and features. “Introducing NetApp all-flash arrays into our software development process has reduced storage latency up to tenfold, enabling us to significantly increase the number of tests we can run and the accuracy of our results,” said Satish Sambandham, Senior Manager,...
Citrix Speeds Mobile Application Delivery with NetApp All Flash FAS
Workload optimized compute and storage platforms deliver new levels of performance and real-time insights for deep learning and financial services applications Palo Alto, CA – April 4, 2016 – Hewlett Packard Enterprise (HPE) today announced new workload-optimized compute platforms and solutions to help customers accelerate innovation and time-to-value with deep learning systems, high-performance computing (HPC)...
Hewlett Packard Enterprise Expands High-Performance Computing Server Portfolio
New HPE ProLiant Gen9 portfolio extends leadership with industry-first support for persistent memory PALO ALTO, CA – March 31, 2016 – Today, Hewlett Packard Enterprise (HPE) debuted new compute platforms with built-in support for Persistent Memory, a technology that combines the performance of high-speed memory and the persistence of storage to deliver new levels of...
Hewlett Packard Enterprise Expands Server Portfolio with New Innovations in Compute
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security...
Check Point Software Technologies Ltd.
Discover what’s really going on within your network, with this free, seven day Cyber Threat Assessment, delivered in conjunction with Fortinet. In only three steps, we’ll show you the strength of your security and threat protection in a detailed report, based entirely on your monitored network activity. As well as discovering how comprehensive your security...
The Cyber Threat Assessment Program
If you’ve been listening to the news at all the past couple of weeks, you have undoubtedly heard of a number of companies being affected by ransomware. The recent surge in this form of cyber attack has many organizations and users understandably concerned. And you should be. Ransomware is nasty stuff. But with some careful...
10 Steps for Protecting Yourself From Ransomware
There has been a concerning increase in the number of sophisticated malware attacks which are striking organizations. These are not simple attacks, but involve compromising reputable web servers in order to deliver malware infected content. The good news is that there is a solution to this – but why are traditional methods simply not working? What about...