PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    Metrics (Not Just Fun Facts!) Are Key to driving a Business-Driven Security Strategy
    It’s mid-2017 and we have already witnessed the conundrum across organisations as the pressure of building a more efficient business creates loopholes for cyber criminals to gain an advantage. Below outline example of three types of standard metrics that should inform such security monitoring and evaluation: management, operational and technical security metrics. [Image source: Aleem,...

    Metrics (Not Just Fun Facts!) Are Key to driving a Business-Driven Security Strategy

    The Elephant in the Room for Endpoint Security
    Stop me if you’ve heard this story before… Three blind men are traveling down the road to visit a friend.  On the way, they encounter an elephant.  Not being able to see it, they each stopped and felt the elephant to figure out what sort of creature it was.  The first one grabbed the trunk...

    The Elephant in the Room for Endpoint Security

    Defending a Decade of Phishing and Cybercrime
    Author: Heidi Bleau  With holiday shopping season in full swing, many of us are feeling just like the guy in the song, “The 12 Pains of Christmas.”  I have my own two personal pains with the holidays, and I am still deciding which one is more annoying: Elf on the Shelf, or, the mountain of phishing emails...

    Defending a Decade of Phishing and Cybercrime

    The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?
    Advanced ransomware (malicious software designed to take control of a computer system and hold it hostage until the victims pay for its release) is one of the fastest-growing areas of cybercrime. Another closely related threat is cyberextortion, where attackers threaten to cause harm to a company by releasing sensitive information to the public or sustaining...

    The Criminal Appeal of Advanced Ransomware: How Can Companies Protect Their Files?

    Top 5 Ways Organizations Are Using RSA SecurID Access (besides VPNs)
    [et_pb_section transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” make_equal=”off” use_custom_gutter=”off” custom_css_main_element=” background-image: url(%22https://www.scc.com/wp-content/uploads/2016/10/bg-rsa.jpg%22);|| background-repeat: repeat-y;|| background-size: 100% auto;” custom_padding=”0|0″][et_pb_row make_fullwidth=”off” use_custom_width=”off” width_unit=”on” use_custom_gutter=”off” custom_padding=”0|0″ padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off”][et_pb_column type=”1_2″][et_pb_image admin_label=”Image” src=”https://www.scc.com/wp-content/uploads/2016/10/header.png” show_in_lightbox=”off” url_new_window=”off” animation=”off” sticky=”off” align=”right” force_fullwidth=”off” always_center_on_mobile=”on” use_border_color=”off” border_color=”#ffffff” border_style=”solid” custom_css_main_element=”width: 60%;” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid” text_text_color=”#020202″...

    Top 5 Ways Organizations Are Using RSA SecurID Access (besides VPNs)

    RSA Conference 2015: How to avoid the ‘Year of the Epic Breach’
    Fresh from the RSA Conference 2015, the international event ‘where the world talks security’, Clearswift are focussing in on how to avoid 2015 becoming the “Year of the Epic Breach.” During his RSA Conference keynote speech, RSA President Amit Yoran likened protecting networks today to stumbling around in the dark. Discussing the changing security space,...

    RSA Conference 2015: How to avoid the ‘Year of the Epic Breach’

    CONTACT US
    Scroll to Top