Year: 2014

  • Xangati Expands Its Channel Program

    Xangati Expands Its Channel Program
    Categories: , ,

    As fundamentally important as it is for a solution provider to make money by selling a particular product, there are a handful of IT management tools that, when properly employed, create opportunities that go well beyond the price of the software. Looking to capitalize on that simple fact, Xangati has extended its channel program to… Read more

  • New Security Intelligence Group Aims to Share Info

    New Security Intelligence Group Aims to Share Info
    Categories: ,

    In a move that bodes well for solution providers that provide IT security services, Fortinet and Palo Alto Networks have announced the formation of a consortium aimed at helping vendors, solution providers and end customers share security intelligence. CyberConsortium.Org aims to close a security intelligence gap that often winds up driving up the cost of… Read more

  • Tackling BYOD Security Can Be ‘Full-Time Task’ for Firms

    Tackling BYOD Security Can Be ‘Full-Time Task’ for Firms
    Categories:

    BYOD policy Security Issues Often Kept Secret Businesses are leaving themselves open to security breaches due to improper employee security training. A quarter of business users admitted to having had a security issue with their personal device in 2013, but just 27 percent of those respondents said they felt obligated to report this to their… Read more

  • Managing Storage in a Software-Defined World

    Managing Storage in a Software-Defined World
    Categories: , ,

    While just about everybody would tend to agree that storage needs to be simpler to manage, very few people seem to agree what’s the best way to go about making that happen. As a result, it seems like every vendor these days is bandying about the term software-defined storage (SDS), but what that means is… Read more

  • Providing IT Security Services Not for Faint of Heart

    Providing IT Security Services Not for Faint of Heart
    Categories:

    IT Security A Host of IT Security Challenges Every minute a host accesses a malicious Website, and every 24 hours a host is infected by a bot. What’s more, 33% of hosts are not running the latest software versions. Battling the Bots 73% of organizations are infected by at least one bot; 49% have seven… Read more

  • Signing On for the Electronic Document Opportunity

    Signing On for the Electronic Document Opportunity
    Categories:

    Electronic documents The Prevalence of Scanning A full 90% report they do some scanning of forms and documents. Text Recognition Is a Significant Opportunity Of the 73% of respondents who specifically scan forms, only half use text recognition to capture data. A quarter only scan to archive and the remaining quarter scan images, but also… Read more