Discover our partner news
Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.
Filter:
- Adobe
- AMD
- Apple
- AppSense
- Aruba
- ASUS
- Belkin
- Brother
- Bullitt
- CAT Phones
- Checkpoint
- Cisco
- Cisco (Featured)
- Cisco Energy Management
- Cisco Energy Management (Featured)
- Cisco>Cisco
- Citrix
- Clearswift
- Clearswift (Featured)
- Cloud
- Commvault
- COVID-19
- Cyber
- Dell
- Digital Workplace
- EMC
- EMC (Featured)
- EPOS
- Epson
- F5
- F5 (Featured)
- Featured-1
- Fortinet
- Hitachi (Featured)
- Hitachi Data Systems
- HP
- HP (featured)
- HP>HP Converged Systems (Featured)
- HP>HP PC
- HP>HP PC (Featured)
- HP>HP Print
- HP>HP Print (Featured)
- HPE
- HPE>HP 3Par Storage
- HPE>HP 3Par Storage (Featured)
- HPE>HP Converged Systems
- Hybrid Infrastructure
- Hypertec
- IBM
- IBM (Featured)
- IBM>IBM Business Analytics
- IBM>IBM Business Analytics (Featured)
- IBM>IBM Emergency Response Services
- IBM>IBM Emergency Response Services (Featured)
- IBM>IBM Mobile Device Management
- IBM>IBM Mobile Device Management (Featured)
- IBM>IBM Power 8 Systems
- IBM>IBM Power 8 Systems (Featured)
- IBM>IBM Smarter Storage
- IBM>IBM Smarter Storage (Featured)
- iiyama
- Industry
- Infrastructure
- Intel
- Ivanti
- Lenovo
- Lenovo>Lenovo Data Centre Group (DCG)
- Lenovo>PC
- LG
- Logitech
- Microsoft
- Microsoft (Featured)
- Mimecast
- Mimecast (Featured)
- MobileIron
- MobileIron (Featured)
- NEC
- NEC (Featured)
- NetApp
- NetApp (Featured)
- Nutaix
- Nutanix
- Nuvias & Riverbed
- Oracle
- Oracle (Featured)
- Oracle>Oracle Converged Infrastructure
- Oracle>Oracle Converged Infrastructure (Featured)
- Oracle>Oracle Systems Consolidation
- Oracle>Oracle Systems Consolidation (Featured)
- Palo Alto
- Philips
- Philips (Featured)
- Plantronics
- Polycom
- Product
- Product (Featured)
- Qlik
- Quest
- Recent-Home
- Red Hat
- Remote working
- RES
- RSA
- Samsung
- SanDisk
- SCC News
- Security
- Software
- Symantec
- Symantec (Featured)
- Toshiba
- Uncategorised
- Uncategorized
- VCE
- VCE (Featured)
- Veeam
- Veritas
- VMware
- VMWare (Featured)
- ZAGG
- Zebra
Join our webinar and find out why containerisation is the future of your IT infrastructure Title: Containerisation – The Future of IT Infrastructure Date: Tuesday, 24 March 2020 Time: 11:00AM GMT Duration: 30 minutes As your customers business’ operations start to grow, so do their IT systems. This in itself can present challenges and put immense pressure on their...
IBM Containerisation – The Future of IT Infrastructure Webinar – 24/03 @ 11:00
Never overbuy with IBM’s Storage Utility A family of offerings providing a procurement choice with usage-based billing, so your storage consumption better aligns to your business need. To learn more and read the report, click HERE IBM introduces new storage options so that you never overbuy again. IBM Storage Software Utility Offering — pay as...
IBM Storage Utility Offering
Cyber-attacks on organisations are now inevitable. Security is no longer about preventing attacks, it is about preparing your organisation for them. This means finding them and dealing with them in real time – the longer a cyber attack goes undetected, the more damage it does to your business and the more money it will cost...
Defending your Business from Cyber Threats
At a Glance IBM® Power® Enterprise Pools 2.0 is a new IBM Power E980 offering designed to deliver enhanced multisystem resource sharing and by-the-minute consumption of on-premises Power E980 compute resources to clients deploying and managing a private cloud infrastructure. All installed processors and memory on servers in a Power Enterprise Pool (2.0) are activated...
IBM Power Enterprise Pools 2.0 delivers enhanced Utility Capacity for processors and memory across a collection of IBM Power E980 servers
It is very tempting when creating a cyber security strategy to fall down a rabbit hole of stolen customer data, fears of reputational damage and planning your PR response should things all go horribly wrong. In doing so, our efforts become focused on pulling up the drawbridge to protect our network from the risk of...
Cyber Security – Why It’s Time to Stop Navel Gazing
Who’d be a CISO nowadays? Expected to set and oversee information security strategy, and potentially take the fall should a breach occur. You need eyes in the back of your network, trust in your team and the ability to influence the board with sound business arguments, not horror stories. The world’s first CISO is widely...
Cyber Security – Power to the People
Come and Meet the SCC Team at IBM Think Summit 2019!
Come and join SCC at IBM Think London Conference!
It’s 4:30pm and you’re in the middle of a meeting when you’re interrupted by one of your technical architects. They want to let you know that they think there’s been a security breach so could you come down and help them check it out please? Before you can make your excuses however, they’re back in...
Cyber Security – The Golden Hour
SCC and IBM Security Solutions
Agreement Expands 15-Year R&D Partnership to Define Leadership Roadmap for Semiconductor Industry IBM announced an agreement with Samsung to manufacture 7-nanometer (nm) microprocessors for IBM Power Systems™, IBM Z™ and LinuxONE™, high-performance computing (HPC) systems, and cloud offerings. The agreement combines Samsung’s industry-leading semiconductor manufacturing with IBM’s high-performance CPU designs. This combination is being...
IBM Expands Strategic Partnership with Samsung to Include 7nm Chip Manufacturing
IBM and Red Hat , the world’s leading provider of open source cloud software, announced today that the companies have reached a definitive agreement under which IBM will acquire all of the issued and outstanding common shares of Red Hat for $190.00 per share in cash, representing a total enterprise value of approximately $34 billion....