PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    Sophos to Acquire US Malware Protection Firm Invincea
    Sophos announced it will pay US$100m to acquire US malware protection firm Invincea.  Invincea makes a line of signature-less endpoint procession technologies that rely on machine learning and behavioural monitoring to block malware. Sophos chief executive Kris Hagerman said Invincea’s machine learning-based threat detection technology would be rapidly integrated into its product line, representing a...

    Sophos to Acquire US Malware Protection Firm Invincea

    Symantec Introduces Risk Insight to Automate Risk Assessments
    How secure is your business?  It seems like a simple question, but it can be challenging to answer. The good news is today Symantec has introduced Risk Insight – a new service that makes answering that question much easier.  We understand that there are a variety of factors that make it daunting to determine the...

    Symantec Introduces Risk Insight to Automate Risk Assessments

    Not Concerned About Web Application Attacks in Financial Services? Well, You Should Be
    IT teams in the financial services industry have historically invested in, and deployed, web application firewalls (WAFs) to comply with Payment Card Industry Data Security Standards (PCI DSS). However, many of today’s data security professionals recognise that unprotected web applications have become attractive targets for cybercriminals looking for easy entry points into their networks. In...

    Not Concerned About Web Application Attacks in Financial Services? Well, You Should Be

    The Elephant in the Room for Endpoint Security
    Stop me if you’ve heard this story before… Three blind men are traveling down the road to visit a friend.  On the way, they encounter an elephant.  Not being able to see it, they each stopped and felt the elephant to figure out what sort of creature it was.  The first one grabbed the trunk...

    The Elephant in the Room for Endpoint Security

    RUAG completes acquisition of cyber security company Clearswift
    Bern (CH), Theale (UK); 23.01.2017. RUAG Defence has successfully completed the acquisition of the British Cyber Security specialist Clearswift. Clearswift announced in December 2016. This acquisition enables RUAG to enhance key aspects of its current product and service portfolio in the area of cyber security. “The acquisition of Clearswift increases the number of employees at RUAG’s...

    RUAG completes acquisition of cyber security company Clearswift

    A Guide to Security for Today’s Cloud Environment
    Enterprises have rapidly incorporated cloud computing over the last decade, and that trend only seems to be accelerating. Private cloud infrastructure, including virtualisation and software-defined networking (SDN), is in the process of transforming on-premise data centres, which host the majority of enterprise server workloads around the world. Enterprises are also embracing public clouds at an...

    A Guide to Security for Today’s Cloud Environment

    Defending a Decade of Phishing and Cybercrime
    Author: Heidi Bleau  With holiday shopping season in full swing, many of us are feeling just like the guy in the song, “The 12 Pains of Christmas.”  I have my own two personal pains with the holidays, and I am still deciding which one is more annoying: Elf on the Shelf, or, the mountain of phishing emails...

    Defending a Decade of Phishing and Cybercrime

    RSA Conference 2015: How to avoid the ‘Year of the Epic Breach’
    Fresh from the RSA Conference 2015, the international event ‘where the world talks security’, Clearswift are focussing in on how to avoid 2015 becoming the “Year of the Epic Breach.” During his RSA Conference keynote speech, RSA President Amit Yoran likened protecting networks today to stumbling around in the dark. Discussing the changing security space,...

    RSA Conference 2015: How to avoid the ‘Year of the Epic Breach’

    Download The Latest Symantec Internet Security Threat Report
    Download the latest Symantec Internet Security Threat Report

    Download The Latest Symantec Internet Security Threat Report

    CONTACT US
    Scroll to Top