PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    Prioritising Storage Management in the Public Sector – iGov Survey Report 2016
    How is the public sector prioritising data and storage management in 2016? In light of recent high-profile data breaches, both data protection and storage management have an integral part to play within public sector IT strategies.   The requirement to be more transparent, alongside the growth in use of new technologies, presents a significant challenge...

    Prioritising Storage Management in the Public Sector – iGov Survey Report 2016

    Looking Ahead: Predictions for 2016 and Beyond
    Join RES Software and other industry guests as we discuss the trends and obstacles that IT organizations should be prepared to face in the coming year. Get insight into what you can do today to prepared for future changes within your organization.

    Looking Ahead: Predictions for 2016 and Beyond

    Conquer the Barriers to Self-service Adoption
    Join RES Software and guest analysts from the 451 Group, William Fellows and Agatha Poon, as we uncover the power of automation in delivering apps and services to the enterprise through a more scalable and effective approach.  

    Conquer the Barriers to Self-service Adoption

    Flexible and Secure Workspaces for the Modern Enterprise
    Join webinar guest ESG analyst and industry expert Mark Bowker as he talks through top challenges faced by IT in enabling today’s workforce and the steps that your organization can take to begin delivering more secure and flexible workspaces to workers.

    Flexible and Secure Workspaces for the Modern Enterprise

    Top 5 Security Threats – What do they have in common? How can you avoid them?
    Cybervillains have figured out how to monetize their malicious actions and they’re going after the opportunity with ferocity, targeting individuals and corporations alike. The future of ransomware alone is terrifying. Take a look at what Intel’s McAfee Labs predicts over the next five years. They number the at-risk users, connections and devices – including wearable...

    Top 5 Security Threats – What do they have in common? How can you avoid them?

    Free Your Workers, Secure Your Enterprise.
    Open the doors for Mac, but seal them tight from vulnerabilities It feels like you’re stuck between a rock and a hard place. You want to empower your workers to choose the device and applications that allow them to be most productive, and yet you also need to keep them (and the greater organization) secure....

    Free Your Workers, Secure Your Enterprise.

    RES Focus Europe 2016
    Join us for this must-attend one-day industry event to learn more about the latest developments in securing, automating and transforming the digital workspaces that assure your organization’s peak productivity.

    RES Focus Europe 2016

    Meet Polycom® RealPresence Debut™
    Polycom RealPresence Debut™ is an enterprise grade video conferencing solution made simple, elegant, and affordable for huddle rooms and smaller spaces. It also delivers cost-effective collaboration for smaller organizations that are ready to move up from consumer-grade alternatives, which are great for chatting with friends but don’t get the job done at work. Spaces and...

    Meet Polycom® RealPresence Debut™

    Citrix Speeds Mobile Application Delivery with NetApp All Flash FAS
    Faster, more reliable development test results accelerate time to market for new software versions and features. “Introducing NetApp all-flash arrays into our software development process has reduced storage latency up to tenfold, enabling us to significantly increase the number of tests we can run and the accuracy of our results,” said Satish Sambandham, Senior Manager,...

    Citrix Speeds Mobile Application Delivery with NetApp All Flash FAS

    Hewlett Packard Enterprise Expands Server Portfolio with New Innovations in Compute
    New HPE ProLiant Gen9 portfolio extends leadership with industry-first support for persistent memory PALO ALTO, CA – March 31, 2016 – Today, Hewlett Packard Enterprise (HPE) debuted new compute platforms with built-in support for Persistent Memory, a technology that combines the performance of high-speed memory and the persistence of storage to deliver new levels of...

    Hewlett Packard Enterprise Expands Server Portfolio with New Innovations in Compute

    Check Point Software Technologies Ltd.
    Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security...

    Check Point Software Technologies Ltd.

    The Cyber Threat Assessment Program
    Discover what’s really going on within your network, with this free, seven day Cyber Threat Assessment, delivered in conjunction with Fortinet. In only three steps, we’ll show you the strength of your security and threat protection in a detailed report, based entirely on your monitored network activity. As well as discovering how comprehensive your security...

    The Cyber Threat Assessment Program

    CONTACT US
    Scroll to Top