Recent Articles
-
Arrow to Aim for Multivendor Deal Registration Portal
Distributor Arrow Enterprise Computing Solutions business unit is looking to create the holy grail of deal registration—a multivendor deal registration portal that allows reseller channel partners to register deals in just one place, yet reap the points from multiple vendors. For IT vendors the portal could potentially increase the number of deals that actually get…
-
FireID Launches Mobile Security Solution Channel Program
South African security vendor FireID has announced it will expand into the North American channel, shifting most client relations to new U.S. channel partners, and has secured a new Silicon Valley headquarters, a new channel program and a U.S. product debut. FireID CEO Jenny Dugmore sat down with Channel Insider to discuss the solution, the…
-
Under Sieges Where Security Help Is Needed Most
Under Sieges Where Security Help Is Needed Most According to a new study by CompTIA, a nonprofit industry association and training organization, the volume and severity of security incidents impacting businesses continues to increase. No surprise there, but the CompTIA study found that many of the security events result from human error and lack of…
-
Microsoft Morro: A Potential Catalyst for Higher Level Security
The prospects of free, basic antivirus protection from Microsoft would have been enough to send shivers down security pros and PC users’ spines just a couple of years ago. Today, however, Microsoft’s plans for free, cloud-based virus scanning seem more a sign of the changing security times and the need to think about higher level…
-
Sophos Incorporates Encryption into Solution Set
Security vendor Sophos touts the recent release of its Sophos Security and Data Protection solution not only as breaking new ground for the vendor, but as the start of a series of robust security solutions that are at the same time actually simple enough for a broad channel made up of more than just focused…
-
Securing the Hyper-Extended Network
Is there anything left of the traditional network perimeter? Should security pros still walk the battlements of their network perimeters? If you listen to the security prognosticators, the perimeter is gone and everything—every piece of gear, application and line connecting them—must be hardened. In the olden days of infosecurity (about five years ago), the standard…