PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    RSA Archer Suite
    Creating a culture of risk management that focuses on integrated risk management can protect your organization and enhance its value. For many organizations, current risk management mechanisms are undeveloped, disconnected or ineffective. Without the ability to effectively and efficiently address increasing risk, organizations struggle to respond to business risks and miss opportunities to cahttps://www.scc.com/partner-newsfeed/vendor/rsa-archer-suite/pitalize for...

    RSA Archer Suite

    RSA FRI Suite
    The RSA Fraud & Risk Intelligence Suite is designed for organizations that want to align fraud prevention efforts with risk tolerance and strategic priorities so they can reduce fraud – not their customer base.   The Suite provides a comprehensive view across digital channels with a centralized fraud detection and mitigation strategy that uniquely blends...

    RSA FRI Suite

    RSA SecurID® Suite
    Identity has become one of the most consequential attack vectors to the modern enterprise. Last year, 81% of confirmed breaches to organizations’ infrastructure, sensitive data or applications started with an identity takeover.     RSA SecurID® Suite enables your organization to accelerate business while mitigating identity risk and ensuring compliance. To address today’s toughest security...

    RSA SecurID® Suite

    The Dark Side of Customer Data

    The Dark Side of Customer Data

    RSA Extends Evolved SIEM capabilities to reduce digital risk with expanded analytics and enables threat aware authentication

    RSA Extends Evolved SIEM capabilities to reduce digital risk with expanded analytics and enables threat aware authentication

    RSA Addresses Risks Associated with Digital Transformation

    RSA Addresses Risks Associated with Digital Transformation

    RSA Expands Its Technology Ecosystem to Transform Authentication
    RSA®, a global cybersecurity leader delivering Business-Driven Security™ solutions, is expanding its technology ecosystem to make strong authentication more continuous, proactive, and pervasive. Offering seamless interoperability with the CyberArk Privileged Account Security Solution, Microsoft Windows Hello, Palo Alto Networks Next-Generation Firewall, and VMware Workspace ONE, RSA enables organizations to quickly and easily leverage the broad...

    RSA Expands Its Technology Ecosystem to Transform Authentication

    Identity and Access in the Cloud: Keeping IT Simple
    There’s no question cloud applications can dramatically simplify and streamline how users get the resources they need to work effectively. But do you worry about how moving to the cloud could also complicate IT, with so many more apps and more users in more places outside your control? Smooth your journey to the cloud and...

    Identity and Access in the Cloud: Keeping IT Simple

    Top 5 Authentication Trends in 2017
    Who would have dreamed – even ten years ago – how many ways we’d have to authenticate users in 2017? While passwords and tokens were the foundation of identity and access management for many years, today there’s an array of options to choose from: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – just...

    Top 5 Authentication Trends in 2017

    Addressing Identity Risk Factors
    By Tim Norris Mobile and Cloud have raised the stakes for security in general and for identity-related security challenges in particular. But while identity-related risk has grown tremendously, in many ways, the risks themselves are ones we’ve long recognized – such as orphaned accounts, segregation of duties (SoD) violations and privileges following users to new...

    Addressing Identity Risk Factors

    3 Ways to Make Multi-factor Authentication Easier for Everyone
    The case for multi-factor authentication (MFA) is clear. The harder you make it for cyber attackers to get to your data, the lower your risk of a breach—and MFA definitely makes it harder, by requiring people who request access to authenticate their identity in more than one way. The downside is that if you don’t...

    3 Ways to Make Multi-factor Authentication Easier for Everyone

    What Your Business Can Learn from WannaCry
    The biggest cyber attack began in May, spreading to more than 150 countries and infecting 200,000 machines. The outbreak is a ransomware threat, WanaCrypt0r 2.0 also known as WannaCry, with worm-like capabilities leveraging an exploit against vulnerable Microsoft Windows® operating systems. Ransomware mimics the age-old crime of kidnapping: someone takes something you value, and in order to get...

    What Your Business Can Learn from WannaCry

    CONTACT US
    Scroll to Top