Topic: Security - Page 360
The Hype Around Big Data: What’s There for IT Security Professionals
There’s a lot of hype surrounding Big Data and its potential for information analysis. What’s the buzz all about, and what does it mean for IT security pros? By Conrad Constantine
Intel Announces 3rd Generation Intel Core vPro Platforms
The platform improvements include embedded security and remote management features, making them suitable for forthcoming Ultrabook devices.
eIQNetworks Updates Its SecureVue Platform
The latest version of SecureVue gives security managers the ability to perform complex correlation and forensic searches over long time periods.
Palisade Systems Integrates with Mobile Active Defense
The MECS Server extends security policies across mobile platforms and now offers full-featured data loss prevention from Palisade Systems.
LabTech Integrates Mobile Device Management
LabTech Mobile Device Manager (MDM) enables MSPs to remotely manage and secure mobile devices within an end-to-end service lifecycle.
Roaring Penguin Updates Email Filtering Software
CanIt 8.1 converts all messages to UTF-8 and can filter spam in non-Western European character sets.
New ZyXEL Web Portal Eases SLA and Licensing Management
The new web portal tracks and distributes discounts and commissions to authorized ZyXEL channel partners.
ZyXEL Offers Trade-In Promotion for SonicWALL Resellers
Participating partners will be inducted into ZyXEL’s partner program at the top Diamond level for maximum partner benefits, including access to the beta test program, qualified sales leads, incremental product discounts, and premier placement on the partner locator.
Intel Small Business Advantage Enables SMB Productivity
Intel SBA is designed to help address small-business security and productivity concerns.
How to Mobilize SMBs: MDM as a Service, Mobile Security, and Hosted Voice
Learn about the mobility market from three different directions, as channel pros demonstrate the options available for mobilizing your customers, including mobile device management and mobile security. By Ellen Muraskin