- Check Point recommended for Security Effectiveness and Value in NSS Breach Detection Systems Test
?NSS Labs, Inc. has completed independent testing of sandbox solutions and has just published the NSS Labs 2015 Breach Detection Systems (BDS) Test Report. The results are in, and Check Point Threat Emulation has received a "Recommended" rating.
- F5 drives enhanced cloud and security services with BIG-IP V12.0
This week, F5 announced BIG-IP version 12.0, a major software release that expands F5’s hybrid platform of services and greatly improves the agility, security, and performance of cloud application deployments.
- F5 wins two security awards at Uk event
In July, F5 won two categories at the prestigious Computing Vendor Excellence Awards , Application Security Award for BIG-IP Application Security Manager and Network Security Award for Silverline DDoS Protection Service.
- F5 wins best BEST LTE CORE NETWORK PRODUCT AWARD
At the recent LTE World Summit in Amsterdam, F5 submitted the BIG-IP platform for consideration and came home with the win for Best LTE Core Network Product .
- New f5 security accreditation
F5 is pleased to announce the release of the new Security Accreditation Program.
- F5 Partner Value Discount
As announced earlier this year, we are now ready to deploy the changes to Partner Value Discount (PVD) in the Unity Partner Program , effective August 3 rd .
- Arrow Partner Connect - October 22nd
Arrow ECS Belgium
Arrow is proud to invite all its partners to Arrow Partner Connect 2015. This is an afternoon and evening with business, fun and networking.
- Help Customers Speed Up Application Deployments with SmartStackTM: Best-of-Breed Integrated Infrastructure
Help Customers Speed Up Application Deployments with SmartStackTM: Best-of-Breed Integrated Infrastructure With flash disrupting enterprise storage, best-of-breed infrastructure today requires the underlying storage platform to leverage flash to adapt to varying workloads. However, while flash can help address performance challenges, it cannot address capacity challenges.
- Partner Best Practice: 3 Easy Ways to Drive Demand Gen With Nimble Storage
Partner Best Practice: 3 Easy Ways to Drive Demand Gen With Nimble Storage Establish a regular cadence with prospects using pre-approved Nimble email marketing
- Partner Registration Open
Partner Registration Open Are you planning on attending RSA TechFest this year in Orlando, FL? The event will take place at the Gaylord Palms Resort & Convention Center on October 4th-7th. Registration is now open for partners! Visit www.RSATechFest.com to register now.
- Recent Product Launches
Recent Product Launches Security Analytics 10.5 Security Analytics v.10.5, which introduces great new features including support of Amazon Web Services and a new, throughput-based pricing and packaging model, was made generally available to resell on June 16.
- End of Sale for RSA Security Analytics All-in-One Appliance
End of Sale for RSA Security Analytics All-in-One Appliance RSA is announcing the End of Sale of the RSA Security Analytics All-in-One (AIO) Appliance, to take effect September 15, 2015. We will no longer be offering the SA AIO to new customers
- Worry-Free Rewards Q2 is live
Worry-Free Rewards is an exclusive incen tive for our low-end resellers.
- Research Paper: Piercing the HawkEye
We just published our latest TrendLabs research paper, entitled Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide .
- Windows Server 2003 End of Support: Sales Opportunity
Windows Server 2003 End of Support: Sales Opportunity If your customers use Windows Server 2003 and have not fully migrated to a new platform, Microsoft’s end of support (July 14, 2015) will create serious security issues for them.
- Securing the Software Defined Data Center: New webinar and Solution Brief
Securing the Software Defined Data Center: New webinar and Solution Brief Hear first-hand from VMware and Trend Micro how a SDDC architecture helps enterprises achieve distinct IT outcomes for greater security, availability and faster service delivery.
- Patch those Vulnerabilities: Avoid exploitation
Patch those Vulnerabilities: Avoid exploitation Another security incident on the same scale as Shellshock is a real possibility in the near future.
- Perimeter-focused defense is not enough: Stay informed
Perimeter-focused defense is not enough: Stay informed This new whitepaper details how Deep Discovery Inspector uniquely provides comprehensive network monitoring that scans all traffic.
- Size Doesn't Matter In Cybersecurity
Size Doesn't Matter In Cybersecurity Do you know what type of issues face SMB's today?
- Gartner Market Guide For Network Sandboxing
Gartner Market Guide For Network Sandboxing Learn how Check Point Threat Emulation meets Gartner's criteria in the Market Guide for Network Sandboxing.
- CPU-Level Sandboxing Ready Threat Emulation Appliance Now Available
PRODUCT NEWS CPU-Level Sandboxing Ready Threat Emulation Appliance Now Available In June, we introduced new CPU-level sandboxing ready Threat Emulation Appliances, TE250X and TE1000X.
- Sometimes your network is full of SURPRISES...
Expose Your Weaknesses Before Hackers Do In 2014, 83 percent of organizations had existing bot infections. Worse: Almost half of those were active for more than four weeks. With the evolving threat landscape, it’s important to make sure your security infrastructure is current.
- Trend Micro Trainings
Arrow now offers Trend Micro Certified Trainings.This Certified Professional training is a 3 day course that requires the passing of an exam at the end. During this training we will discuss Architecture, deployment scenarios, deployment, configuration and troubleshooting. These trainings can be followed for Officescan and Deep Security. Deep Discovery will follow later this year.
- Check Point vSEC integrates with VMware NSX to offer dynamic orchestration of advanced threat prevention for all data center traffic.
Check Point vSEC for VMware NSX delivers multi-layered defenses to protect east-west traffic within the VMware-deployed data center.
- Mobile Security
Today every business is a mobile business, with requirements to safeguard business data, provide secure mobile access to business documents and keep mobile devices safe from threats. Check Point Mobile Security solutions provide the widest range of products to help you secure your mobile world.
- NetApp FAS2500 Hybrid Storage Array
NetApp FAS2500 hybrid storage arrays deliver superior ROI, reduce your operational cost, and minimize risks for growth. Whatever the size of your enterprise, you need powerful, flexible storage that manages growth while maximizing the long-term value of your IT investment. The NetApp® FAS2500 series running clustered Data ONTAP simplifies storage operations and connection to the cloud. Its unified architecture supports a broader set of SAN and NAS workloads—with faster setup than any other entry-class hybrid array.
- NetApp E2700 Storage System
Realize affordable, block-optimized storage performance and 99.999% uptime with NetApp E2700 storage systems. The affordable NetApp® E2700 storage system provides general-purpose, mixed-workload SAN storage for small and midsize organizations and remote or branch offices. Choose from three systems—4U/60, 2U/24, and 2U/12—and three forms of connectivity: FC, iSCSI, or SAS. The E2700 integrates with VMware®, Exchange, SQL, and Oracle® systems to minimize ongoing management and maintenance.
- Flash Storage Overview
Accelerate applications and reduce storage costs with a NetApp flash storage solution tailored to your business needs.NetApp gives you the flexibility to deploy flash how, when, and where you need it to achieve optimum performance while reducing IT costs.
- Data Fabric Technology Vision
Liberate your data with the Data Fabric. Create the IT environment that’s best for your business—anywhere, anytime. Business conditions change fast. Create an IT environment that lets you innovate without constraints across your choice of hybrid cloud resources.
- Veeam Backup + NetApp AltaVault = Alliance partner solution
Offsite disaster recovery can involve a complex architecture and exorbitant costs. It’s an intimidating task to ensure that your business has a disaster recovery plan, so many businesses put it on the back burner because they foolishly believe disasters are something that happen to someone else.
- View archived news