PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    ‘Get rich or die trying’ – Check Point Researchers Uncover International Cyber Attack Campaign
    A Nigerian national based near the country’s capital masterminded a wave of attacks on over 4,000 companies in oil & gas, mining, construction and transportation sectors. San Carlos, CA  —  Tue, 15 Aug 2017 Check Point® Software Technologies Ltd. (NASDAQ: CHKP) has today revealed the identity of the criminal behind a series of what appeared...

    ‘Get rich or die trying’ – Check Point Researchers Uncover International Cyber Attack Campaign

    Passing the buck – who pays for IT?
    The word ‘investment’ is often put next to IT spending and budgets in order to make the costs sound palatable. Organisations want a ‘return on investment’, many try to measure it and some even succeed. But not many. Perhaps IT could be thought of as something to consume, not own? The problem is that like...

    Passing the buck – who pays for IT?

    Microsoft Reveals New Windows 10 update – 2 Updates Per Year, 18 months Version Support Only
    Are you agile for Change? Microsoft revealed a while ago that Windows 10 would be their final client operating system release.  This doesn’t preclude the additional versions of Windows 10 being continued. Typically the client operating systems in the past have had long support periods for versions, the most notable one was Windows XP which...

    Microsoft Reveals New Windows 10 update – 2 Updates Per Year, 18 months Version Support Only

    June’s Most Wanted Malware: RoughTed Malvertising Campaign Impacts 28% of Organisations
    Check Point’s latest Global Threat Impact Index revealed that 28% of organisations globally were affected by the Roughted malvertising campaign during June. A large-scale malvertising campaign, RoughTed is used to deliver links to malicious websites and payloads such as scams, adware, exploit kits and ransomware. It began to spike in late May before continuing to...

    June’s Most Wanted Malware: RoughTed Malvertising Campaign Impacts 28% of Organisations

    3 Ways to Make Multi-factor Authentication Easier for Everyone
    The case for multi-factor authentication (MFA) is clear. The harder you make it for cyber attackers to get to your data, the lower your risk of a breach—and MFA definitely makes it harder, by requiring people who request access to authenticate their identity in more than one way. The downside is that if you don’t...

    3 Ways to Make Multi-factor Authentication Easier for Everyone

    Microsoft Launches Microsoft 365 at Their Inspire Event + More
    Microsoft have been heavily investing in their cloud services capabilities as well as the breadth of products primarily through their Azure platform which was led initially with Office 365. Because of this popularity and the market moving from a device base to a more flexible, mobile user centric we have seen Microsoft expand the Office...

    Microsoft Launches Microsoft 365 at Their Inspire Event + More

    Using SIEM Solutions to Connect the Security Dots and Detect Ransomware
    Many companies, organisations, groups and individuals who are vigilant in the face of new cyberthreats create highly advanced detection and prevention systems to help potential victims identify and remediate security events as quickly as possible. While these controlling, monitoring and alerting mechanisms can be used in isolation, their true value lies in the correlation of...

    Using SIEM Solutions to Connect the Security Dots and Detect Ransomware

    Software Asset Management (SAM) Is Not A Compliance Report
    Since the inception of SAM, its initial purpose from ITIL v3 was always around the process and governance of the management of software.  Furthermore, within the ITIL documentation this is the management and control of SAM throughout the software lifecycle – from requirement to retirement. What transpired over the past decade has certainly been the...

    Software Asset Management (SAM) Is Not A Compliance Report

    Next Gen SAM in the Cloud/IOT – Putting Context on the ‘Myths’
    The key is context around software as its development and functionality is designed and licensed by vendors for usage in any organisation throughout the globe.  Naturally every vertical, country and business is going to be different and utilising and optimising this is critical. We often hear the following phrases from customers or within discussions in...

    Next Gen SAM in the Cloud/IOT – Putting Context on the ‘Myths’

    Portability of a tablet, usability of a PC – Galaxy Book
    The sleek and sturdy Samsung Galaxy Book brings exceptional functionality, versatility and portability to your business. Its powerful Intel Core i5 processor, Windows 10 operating system and longer-lasting battery take your computing capabilities further whether you’re in the office or on the move. An enhanced sAMOLED screen, backlit detachable keyboard, and advanced S Pen stylus...

    Portability of a tablet, usability of a PC – Galaxy Book

    Phishing, Whaling, Zero Days – What does it mean?
    As new security issues are revealed they have new names and sometimes keeping up and understanding this is a challenge! Here is SCC’s high level Jargon Buster to help you navigate the waters (plenty more fish references below).  If you need specific help, contact [email protected]. Jargon Buster Cybercrime: Definition: “criminal activities carried out by means...

    Phishing, Whaling, Zero Days – What does it mean?

    Citrix XenApp and XenDesktop V6.5 Ends Security Patching at the End of 2017
    XenApp and XenDesktop v6.5 was released in 2012 and since then, significant improvements on initially the products as well as the wider bundled functionality in later suites and versions. Later functionality now includes better enhancements that span the wider product sets that include XenMobile, SD-WAN (software defined WAN enhancing connectivity and network bandwidth optimisation) as...

    Citrix XenApp and XenDesktop V6.5 Ends Security Patching at the End of 2017

    CONTACT US
    Scroll to Top