News
The new offerings are comprised of three pillars, and include Cybersecurity Advisory Retainer, Ris and Compliance Assessments and Expert-Led Strategic Guidance.
In this edition of the podcast, ESET’s Michal Jankech discusses the opportunity for MSPs around MDR, sales models for the technology, and what makes for a good MDR partner.
Zoho’s recent update discussed recent and current CRM announcements, detailing their strategy, how it differs from other players in the CRM and AI space, and the advantages that Zoho sees it ...
Tumblr is a place to express yourself, discover yourself, and bond over the stuff you love. It's where your interests connect you with your people.
Hybrid is definitely one of the major buzzwords of the IT industry, and Avaya is no exception, with the company taking on a mantra of “innovation without disruption” to explain what this means for its ...
Leostream has been in business over 20 years but sold mainly direct, with a minor partner presence, so the company has now established a channel program and transferred their Business Development team ...
Managed Detection and Response provider Netsurion has launched their first distribution partnership with Radius Channels, a distributor with a unique Go-to-Market strategy. That strategy was adapted ...
Epson’s Kaila Murphy explains the decision to reduce the number of printers in its WorkForce lineup and what it means for partners in this edition of the podcast.
The security threatscape is an always-shifting environment, and 2024 and 2025 have certainly been no exceptions to those rules. To take a look back at some of the biggest security trends that shaped ...
Cisco’s Alex Pujols joins us on the podcast to discuss the Partner Innovation Challenge, how he sees partners adding value, and how Cisco is supporting those efforts.
The new program is the first IGEL has offered specifically for MSPs, and has features like partners having complete control of SLAs in any form that they want.
The only thing that stays the same in the security world is that it’s constantly changing, and attack vectors are always evolving. Whether it’s the number of email phishing attacks skyrocketing or the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results