Security

Blog Entry
April 8th, 2014 | Susan Bradley
KB2919355 issues being investigated/tracked: http://social.technet.microsoft.com/Forums/en-US/c203334f-7ae5-4716-aeb5-0fa3d60da216/kb2919355-issues-being-investigatedtracked?forum=winserver8gen - read more
 
Article
April 4th, 2014 | Megan Santosus
With the end of support for the OS released nearly 13 years ago, it’s time to consider what that really means for you and your clients. - read more
 
News
March 17th, 2014 | Cecilia Galvin
The New Sophos distribution-only model brings aggressive pricing, training, and resources for D&H VARs. - read more
 
Article
March 14th, 2014 | Steve Durbin
Find out how you can help your SMB clients secure their sensitive information and protect their reputations in today’s diverse supply chain environment. - read more
 
News
March 7th, 2014 | ChannelPro
One Time Passcode as a Service secures remote logins through a two-factor authentication based on the tokenless method by SecurEnvoy. - read more
 
Article
March 7th, 2014 | Colleen Frye
The unified identity services provider has launched the Centrify Channel Partner Network, with new tiers and incentives for partners to scale their commitment and profits. - read more
 
Blog Entry
March 3rd, 2014 | Susan Bradley
0xdabbad00 - EMET 5.0 Review: http://0xdabbad00.com/2014/02/27/emet-5.0-review/ I agree, I've seen it crash IE way too much. I was trying to watch the Happy video (http://www.youtube.com/watch?v=y6Sxv-sUYtM on Youtube and it wasn't making me too happy by crashing it. - read more
 
Article
February 28th, 2014 | Cecilia Galvin
You would think that SaaS applications users would get that security is a huge thing. But you would be wrong. - read more
 
News
February 27th, 2014 | ChannelPro
The network security company announces 2014 release of CounterACT RemoteControl, a mobile-minded extension for its network access control solution. - read more
 
News
February 21st, 2014 | ChannelPro
The cybersecurity solutions developer announces real-time detection and automated remediation of "threats that evade traditional signature-based defense." - read more
 

Pages

Subscribe to Security