PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    Web-based cryptominers are malware – Cryptominers running in a browser without an organization’s consent are parasitic and should be considered malware.
    Legitimate cryptomining programs ask users for permission to run. Malicious versions don’t, opting instead to quietly leach a computer’s resources. SophosLabs is seeing more of the latter variety, with a new twist: Instead of showing up as executable files, they take the form of scripts hidden on websites, mining for cryptocurrency in the browser. Visitors to these sites see...

    Web-based cryptominers are malware – Cryptominers running in a browser without an organization’s consent are parasitic and should be considered malware.

    “Technology can remove barriers for disabled people” – Microsoft welcomes Government plans to help more people with disabilities into work.
    Prime Minister, Theresa May, announced an expansion of the “fit note” scheme and training for work coaches to help disabled people and those with physical and mental health conditions find employment and progress in those roles. The strategy, called Improving Lives: the Future of Work, Health and Disability, builds on last year’s Work, Health and...

    “Technology can remove barriers for disabled people” – Microsoft welcomes Government plans to help more people with disabilities into work.

    Veritas Brings Data Classification to eDiscovery Platform to Help Organisations Improve Regulatory Compliance
    Veritas Technologies, a leader in multi-cloud data management, have unveiled advances to the company’s eDiscovery Platform with new data classification features designed to help compliance and investigation teams ensure regulatory compliance, avoid massive fines and mitigate reputational damage. The new technology also helps organisations manage personal identifiable information (PII) and Subject Access Requests (SARs). Within...

    Veritas Brings Data Classification to eDiscovery Platform to Help Organisations Improve Regulatory Compliance

    How Do Organisations Plan to Ensure Application Delivery in a Multi-Cloud World?
    Organisations are actively pursuing solutions that address application delivery in a multi-cloud world. A solution that ensures applications, regardless of where they reside, are simply and reliably delivered to users – when, where, and how they need them. Citrix and IDC partnered to understand current challenges and needs with respect to application delivery in hybrid/multi-cloud...

    How Do Organisations Plan to Ensure Application Delivery in a Multi-Cloud World?

    Learn to protect yourself where the cloud doesn’t
    According to the new 2017 Truth in Cloud Report nearly 70% of organizations export full responsibility for data protection, privacy, and compliance to cloud providers. But, did you know that these responsibilities are actually still YOURS to address in the cloud? Learn more about common cloud misconceptions and how to get cloud data management right...

    Learn to protect yourself where the cloud doesn’t

    New Dell EMC Solutions Bring Machine and Deep Learning to Mainstream Enterprises
    Dell EMC and technology partners offer new products, solutions and services designed for easier adoption, faster benefits from machine and deep learning. Dell EMC announces new machine learning and deep learning solutions, continuing the company’s work to bring high performance computing (HPC) and data analytics capabilities to mainstream enterprises worldwide. This enables organizations to take...

    New Dell EMC Solutions Bring Machine and Deep Learning to Mainstream Enterprises

    How to stay protected against ransomware.
    Large and small businesses are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organisation’s productivity. But what does a typical attack look like? And what security solutions should be in place to give the best possible...

    How to stay protected against ransomware.

    IBM Offers Free Cybersecurity Training to Military Veterans
    IBM (NYSE: IBM) has launched its latest cybersecurity training course for military veterans in the UK, in partnership with the Corsham Institute (Ci) and SaluteMyJob. This free certification in IBM security and analytics solutions teaches cybersecurity software skills to former and transitioning military personnel, and 100 veterans will complete the course by 8th September. Designed to facilitate employment into cybersecurity roles, this IBM Corporate Citizenship initiative is part of a...

    IBM Offers Free Cybersecurity Training to Military Veterans

    Cybersecurity Awareness Begins – and Ends – with Employees
    This month advocates worldwide continue to shine the light on cybersecurity. In the U.S. this week’s National Cyber Security Awareness Month theme is “From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace.” We at Cisco firmly believe that people are a core component of an organization’s protection efforts, and...

    Cybersecurity Awareness Begins – and Ends – with Employees

    Identity and Access in the Cloud: Keeping IT Simple
    There’s no question cloud applications can dramatically simplify and streamline how users get the resources they need to work effectively. But do you worry about how moving to the cloud could also complicate IT, with so many more apps and more users in more places outside your control? Smooth your journey to the cloud and...

    Identity and Access in the Cloud: Keeping IT Simple

    KRACK Attack: How Secure is Your Wi-fi Connection?
    A cyber security researcher of KU Leuven in Belgium, Mathy Vanhoef, has revealed a flaw in Wi-Fi’s WPA2’s cryptographic protocols. The discovery is alarming as the WPA2 protocol, the most common and secure Wi-Fi access protocol since 2004, is trusted by all for keeping Wi-Fi connections safe. The attack, known as a ‘KRACK Attack’ (Key...

    KRACK Attack: How Secure is Your Wi-fi Connection?

    The Cognitive Security Glide Path
    Author: Bob Stasio, Global Offering Manager, IBM Over the past year, our industry has seen an explosion in artificial intelligence and cognitive solutions to assist with some of the most challenging cybersecurity problems. In some cases, cognitive solutions can increase analytical capability by 50 percent. With cognitive technology providing such high efficiencies for security teams, people often...

    The Cognitive Security Glide Path

    CONTACT US
    Scroll to Top