Channel News Briefs: Week of June 22

By Gina Roos  |  Posted 2014-06-25 Email Print this article Print
 
 
 
 
 
 
 
channel news briefs

This week's briefs cover Trend Micro's new global partner program, AppNeta's Application Performance Management partner program for MSPs and more news.

Carbonite Offers Hybrid Backup Appliance for SMBs

Carbonite rolled out its Carbonite Appliance HT10, a hybrid backup offering designed for small businesses. Sold exclusively through the channel, the Carbonite Appliance is designed to deliver a cost-effective and easy-to-deploy solution that allows channel partners to provide centrally managed local and cloud data backup to their small-business clients, said the company.

This includes bare metal recovery so small businesses can get back up and running quickly by restoring the full system. Data is transferred using Secure Sockets Layer encryption and stored with AES-256 encryption server-side. The set-up is done in just three steps, and there are no hardware fees, up-front costs or per-server license fees.

Ingram Micro Expands K-12 Educational Tech Offerings

Ingram Micro has expanded its K-12 educational offering to include Pearson's digital learning solutions. The new alliance will enable Ingram Micro's channel partners to create customized offerings to meet the personalized learning needs of schools and districts, helping them transition to digital content and student-centered learning solutions.

Pearson offers learning solutions that enable educators to improve teaching and learning by aligning the way they teach with how students communicate, work, socialize and live. Ingram Micro and its Public Sector Elite partner community work with hundreds of specialized channel partners that provide products and services to the K-12 market.

360 Advanced Suggests New Paradigm in Service Provider Data Security

360 Advanced believes there is a major paradigm shift in data security in the service provider industry, which means "castle walls" are no longer the best defense against data breaches as some of the biggest threats on any network are the users and devices that are authorized to be on and in the network.

The new paradigm is based on a zero-trust model (in which trust is not granted because a device/user/process/file exists on the inside of a network boundary) and least privilege (in which no user/device/application, etc., has more access than absolutely needed to complete its job function, said the company.

The company's action list includes scanning the network for open shares and restricting access to authenticated users, structuring file shares and data by role, encrypting all possible internal traffic, and scanning the network for devices with administrative Web, telnet and SSH (Secure Shell) interfaces and ensuring that the default password is not in use on any of these devices.

 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date