CRN Security News


  • Newest Mobile Devices Are Latest Threat To Network Security
    Today&s next-generation mobile devices enhance mobile workers& productivity, but they&re also placing unprecedented demands on enterprise security infrastructure. And until stronger security practices become more widespread, enterprise mobile devices will continue to represent a threat to sensitive corporate data.
  • ShadowRAM: October 17, 2005
    Marten Mickos, CEO of MySQL, a provider of both an open-source and commercial database, has run afoul of the all-powerful open-source community he had courted. The reason? A pact between MySQL and SCO, aka public enemy No. 1 for most open-source types due to its litigation streak.
  • Solution providers and vendors alike are saying 'Optimize This' as a performance-boosting WAN technology proves it can really deliver


    Peak Performance
    The WAN optimization technology market is growing by leaps and bounds, and solution providers like Atrion&s Tim Hebert (left) are seizing the opportunity. Promising to provide LAN-like performance over the WAN, the technology has snared the attention of vendors as well, as evidenced by the recent flurry of acquisitions and product launches.
  • CMP Channel Group picks chip maker's channel chief for award


    Honoring Intel's Dallman
    Seneca Data tripled its whitebook business this year, but not without a little help from Steve Dallman, senior director of channels at Intel.
  • Microsoft Updates Worm Detection Tool
    Microsoft updated its Windows Malicious Software Tool, a free utility that detects and deletes a select number of worms, viruses, Trojans and rootkits.
  • VARs prefer broad, integrated product lines


    Solving the Security Puzzle
    In 2003, Cisco Systems didn't have enough of a presence in the security space to even be included in the VARBusinessAnnual Report Card (ARC) Security Management Software category. Now, the company has won this category two years running, sharing the top spot in 2004 with Computer Associates and in 2005 with Trend Micro.
  • VARs heed call for multifunctional security appliances


    Threats Buoy Security Hardware
    Despite adding four vendors to the 2005 VARBusiness Annual Report Card (ARC) Security Appliances category, solution providers' assessments of the biggest players in that industry remain unchanged.
  • New protection features aid data-networking advances


    Building Security Into the Pipes
    The demand for highly functional and secure gear has propelled Hewlett-Packard's ProCurve and other vendors to the top of the 2005 VARBusiness Annual Report Card (ARC) Networking Infrastructure/Data Networking category.
  • Citrix Expands Security For SMBs
    Citrix will continue its march into the security space—and SMB market—by launching a standard version of its NetScaler Application Switch and enhanced SSL VPN gateway at iForum this week.
  • Security vendors will use expo to tout new products, partnerships


    Mobile Means Business
    Mobile Business Expo 2005 opens this week in Chicago, and a number of security vendors are using the event to unveil partnerships and mobile security offerings.
  • Partners will be able to resell managed services as their own


    Ingram Teams Up With Alvaka For MSP Offering
    Ingram Micro will announce a pact this week with MSP Alvaka Networks that will make it possible for Ingram partners to resell Alvaka&s managed services as their own.
  • Development Of 802.11n Standard Hits A Snag
    Depending on whom you listen to, the battle over the development of a standard around next-generation 802.11n technology is either close to being resolved or destined to drag on until at least mid-2007.
  • Briefs: October 10, 2005
    Tech Data is making a multimillion dollar investment in a new program aimed at helping VARs win more deals in the small business market. This week, the distributor is set to announce SMBAccess, which includes a dedicated sales team for VARs selling into small businesses.
  • Federal agencies need help improving identification management for network security


    Preventing System Intrusion Before it Happens
    Too often, government takes an after-the-fact approach to network security--confronting issues after a breach takes place. But by offering effective identification management solutions, VARs can help agencies to detect malicious intruders before they ever get inside.
  • LOOK WHO&S ON THE FAST TRACK TO MANAGED SERVICES: IT&S VARs THAT ARE AHEAD OF THE CURVE, NOT THEIR VENDOR PARTNERS


    Out In Front
    Solution providers making the transition to managed services say they often are leaving their vendor partners in the dust.

Pages