PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    Veritas Elevates Software-Defined Storage to Make Storage “Smart”
    New software-defined storage innovations enable and optimize machine learning intelligence to help customers extract more value from their data by making it proactive, predictive and actionable Veritas Vision – LAS VEGAS, September 20, 2017 – Veritas Technologies, a leader in multi-cloud data management, today announced Veritas Cloud Storage, a new software-defined storage solution designed for massive amounts of...

    Veritas Elevates Software-Defined Storage to Make Storage “Smart”

    Data Harvesting Opens the Door to More Ransomware Attacks
    We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact, it wasn’t a good year for anyone with a vested interested in keeping their social security number, address, email or first pet’s name out of the clutches of...

    Data Harvesting Opens the Door to More Ransomware Attacks

    HPE’s Top 5 Moments from the Third Quarter
    From launching a supercomputer into space with our friends at NASA and SpaceX, to building the world’s most secure server, here are some of HPE’s best recent accomplishments 1. We launched a supercomputer into space We recently launched a supercomputer into space as part of a year-long experiment in partnership with NASA. The goal is for the...

    HPE’s Top 5 Moments from the Third Quarter

    Top 5 Authentication Trends in 2017
    Who would have dreamed – even ten years ago – how many ways we’d have to authenticate users in 2017? While passwords and tokens were the foundation of identity and access management for many years, today there’s an array of options to choose from: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – just...

    Top 5 Authentication Trends in 2017

    SCC and M2 Named “HP Partner of the Year” at HP Reinvent
    SCC and its specialist managed print services business M2 have won the prestigious HP Inc award ‘UK&I HP Growth Partner of the Year’ at HP’s largest global partner forum, HP Reinvent. The annual forum, hosted this year in Chicago, brought together more than 1,400 leading HP Partners from across the globe along with HP’s CEO...

    SCC and M2 Named “HP Partner of the Year” at HP Reinvent

    Veritas Study: Organisations Worldwide Mistakenly Believe They Are GDPR Compliant
    Only two percent of “GDPR-ready” organisations are compliant Mountain View, CA, July 25, 2017 – A study from Veritas Technologies, a leader in multi-cloud data management, has found that organisations across the globe mistakenly believe they are in compliance with the upcoming General Data Protection Regulation (GDPR). According to findings from The Veritas 2017 GDPR Report, almost one-third (31 percent) of...

    Veritas Study: Organisations Worldwide Mistakenly Believe They Are GDPR Compliant

    HPE to Deliver the Industry’s First Composable Infrastructure for VMware Private Clouds
    IN THIS ARTICLE HPE Synergy with VMware Cloud Foundation will enable IT to deploy IaaS in minutes and lower VM costs compared to public clouds HPE Synergy is the only platform available today that provides a single infrastructure for IT to dynamically compose their right mix of virtual, traditional and VMware Cloud Foundation Using HPE...

    HPE to Deliver the Industry’s First Composable Infrastructure for VMware Private Clouds

    Addressing Identity Risk Factors
    By Tim Norris Mobile and Cloud have raised the stakes for security in general and for identity-related security challenges in particular. But while identity-related risk has grown tremendously, in many ways, the risks themselves are ones we’ve long recognized – such as orphaned accounts, segregation of duties (SoD) violations and privileges following users to new...

    Addressing Identity Risk Factors

    Cisco Announces Intent to Acquire Springpath
    Acquisition supports Cisco’s transition toward software-centric solutions AUGUST 21, 2017 SAN JOSE, Calif. – August 21, 2017 – Cisco (NASDAQ:CSCO) announced today its intent to acquire Springpath, Inc., a Sunnyvale-based leader in hyperconvergence software. Springpath has developed a distributed file system purpose-built for hyperconvergence that enables server-based storage systems. The acquisition will allow Cisco to...

    Cisco Announces Intent to Acquire Springpath

    Ivanti Improves its Position in the Magic Quadrant
    Ivanti Improves its Position in the Magic Quadrant for IT Service Management (ITSM) Tools Position Based on Completeness of Vision and Ability to Execute SALT LAKE CITY — 15 August 2017 —Ivanti today announced it was positioned by Gartner, Inc. in the Challengers quadrant, in the August 2017 “Magic Quadrant for IT Service Management (ITSM) Tools.”...

    Ivanti Improves its Position in the Magic Quadrant

    ‘Get rich or die trying’ – Check Point Researchers Uncover International Cyber Attack Campaign
    A Nigerian national based near the country’s capital masterminded a wave of attacks on over 4,000 companies in oil & gas, mining, construction and transportation sectors. San Carlos, CA  —  Tue, 15 Aug 2017 Check Point® Software Technologies Ltd. (NASDAQ: CHKP) has today revealed the identity of the criminal behind a series of what appeared...

    ‘Get rich or die trying’ – Check Point Researchers Uncover International Cyber Attack Campaign

    Passing the buck – who pays for IT?
    The word ‘investment’ is often put next to IT spending and budgets in order to make the costs sound palatable. Organisations want a ‘return on investment’, many try to measure it and some even succeed. But not many. Perhaps IT could be thought of as something to consume, not own? The problem is that like...

    Passing the buck – who pays for IT?

    CONTACT US
    Scroll to Top