Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected

Topic: Security - Page 383

CanIt Anti-Spam Solutions Made to Integrate with Autotask

May 17, 2010 |

Developer Roaring Penguin says integrating its line with popular remote monitoring and management tools is a key company focus.

Symantec Offers Hosted Endpoint Security for SMBs

May 12, 2010 |

The cloud-based Hosted Endpoint Protection product delivers antivirus, antispyware, firewall, and host intrusion prevention for desktops and laptops as well as antivirus and antispyware for file servers.

Netgear’s ProSafe Quad WAN Gigabit SSL VPN Firewall Makes Its Debut

April 28, 2010 |

For less than $500, the virtual private network offers high-performance, multidimensional security with 1Gbps firewall throughput.

Winchester System’s Surveillance Solutions to Employ Dot Hill R/Evolution Architecture

April 22, 2010 |

The vertical drive placement of Dot Hill’s 2722 and 2522 is cited by Winchester as being “highly conducive to better storage densities and improved vibration and shock characteristics.”

New Total Control Encryption from Reflexion Networks

April 21, 2010 |

The hosted service enables the company to offer a “hosted email compliance trifecta” of security, archiving, and encryption.

Panda Security Rolls Out PCIP

April 18, 2010 |

Panda Cloud Internet Protection is a new cloud-based security service for SMBs. The product is introduced the same week Panda Cloud Antivirus and Panda Cloud Protection emerge from beta testing.

McAfee Restructures SecurityAlliance Program

March 25, 2010 |

Features of the program include sales incentives, a more in-depth sales and technical accreditation program, and integrated solutions.

Network Box Unveils S-Series Family of UTM Devices

March 22, 2010 |

New unified threat management line features Gigabit Ethernet ports and Intel processors, and is targeted to small, branch, and home offices.

Commtouch Intros Outbound Spam Protection Solution

March 21, 2010 |

Outbound spam engine leverages the company’s Recurrent Pattern Detection technology and “further augments” its email and Web security package for ISPs, Web hosting companies, and Software-as-a-Service (SaaS) providers.

Credant Technologies to Supply Encryption and Data Protection for Dell Products

March 15, 2010 |

Dell selects the endpoint data protection provider for its commercial client systems.

Company Spotlights

N-Able

N-able protects businesses from evolving cyberthreats. Our AI-powered cybersecurity platform delivers business resilience to more than 500,000 organizations worldwide, leveraging advanced end-to-end capabilities, simplified workflows, market-leading integrations, and flexible deployment options to improve efficiency and drive critical security outcomes. Our partner-first approach pairs our technology with experts, training, and peer-led events that empower customers to be secure, resilient, and successful.
www.n-able.com

N-Able
N-able protects businesses from evolving cyberthreats. Our AI-powered cybersecurity platform delivers business resilience to more than 500,000 organizations worldwide, leveraging advanced end-to-end capabilities, simplified workflows, market-leading integrations, and flexible deployment options to improve efficiency and drive critical security outcomes. Our partner-first approach pairs our technology with experts, training, and peer-led events that empower customers to be secure, resilient, and successful. www.n-able.com    

Free MSP Resources

Explore ChannelPro

Events

Reach Our Audience