Security

Recent Articles

  • Bell Micro Ramps Up Security Division

    Bell Micro is ramping up its Security Division, formed in November 2008, with new vendors and a focus on helping solution providers maintain high margins and deliver holistic security solutions and services. Duncan Hume, who headed up Bell Micro’s United Kingdom security division and who serves as director for the North American security division, says…

  • Breach Security Tightens Up Web Security

    WebDefend 3.5 is the latest in Breach Security’s line up of security appliances and brings new capabilities to the security market that should have solution providers nicknaming the company “No-Breach” security. WebDefend 3.5 is a very good product that combines several elements that make it very channel friendly and an appropriate device for companies looking…

  • SonicWall Adds Distribution Partner to Target SMBs

    Two weeks ago, network security vendor SonicWall renewed its commitment to its solution provider partners by revamping its channel program and dubbing it Channel 2.0. Now looking to reach deeper into the SMB (small and midsize business) market, SonicWall’s new relationship with D&H Distribution is piggybacking on that commitment. SonicWall is now offering all of…

  • How To Sell Technology That Hasn’t Hit Customer Radar

    A year into its new channel and sales strategy initiative, Palisade Systems has hit upon a winning technique that is helping resellers gain traction at end customers’ sites for a technology that is still not on the radar of many companies – a data loss prevention device. The sales technique has taken the company’s channel…

  • SonicWALL Brings High-Performance UTM to the SMB Market

    Pity the typical small business, an entity that must face enterprise-level security threats with an almost nonexistent budget. Most businesses have turned to the brute force method of deep packet inspection and unified threat management (UTM) services to combat those ever evolving threats. But, there is a big problem with that approach; brute force requires…

  • 6 Tips to Keep Data Secure

     

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.