Featured Articles

  1. Access Control And Video Surveillance News From July 2014
    8/13/2014

    Each month, Business Solutions reports news on business in the channel. This month in Access Control And Video Surveillance news, WavestoreUSA releases a new version of video management software (VMS); Genetec expands a partnership enabling the company to resell BCDVideo servers and storage equipment; and OnSSI introduces a new licensing structure that requires only one license for each encoder IP address, regardless of the number of analog cameras. Also, D-Link expands its IP camera line and offers a new access point, and Pivot3 upgrades its virtual SAN software.

  2. New Client Resource: CMS ICD-10 Testing Plan
    8/12/2014

    If you ask your clients if they know they should be prepared for ICD-10, they’ll undoubtedly say “yes.” But chances are that if you ask them what they’re doing to get ready, you won’t hear much in terms of an actionable plan.

  3. Will The Meaningful Use Program Be Extended To Behavioral Health?
    8/12/2014

    A new world of Meaningful Use is set to open up for VARs, and it comes from the behavioral health arena.

  4. Government IT News For VARs — August 12, 2014
    8/12/2014

    In news this week, USIS was the victim of a major cyber-attack, and news that Russian hackers have stockpiled 1.2 usernames and passwords has government agencies concerned about cyber safety as well. The FCC has also opened the net neutrality comments to the public, while the FTC is fighting mobile cramming. And, the U.S. Army is migrating its educational content to the cloud.

  5. Restaurant And Hospitality IT News For VARs — August 12, 2014
    8/12/2014

    In news this week, wearable technology has great potential for the restaurant industry.  In hotel news, the focus is on content management, dynamic rate marketing, and migrating hotel systems to the cloud. 

  6. Backoff Malware Targets POS Systems
    8/12/2014

    A U.S. Department of Homeland Security (DHS) report details the introduction of a new malware campaign designed to steal consumers’ information through point of sale (POS) terminals nationwide. Initial cyberattacks occurred in the months leading up to the much-publicized data breach at Target stores nationwide during the 2013 holiday season. According to reports, at least 600 retailers nationwide have suffered the effects of Backoff.

  7. Avoid Managed Services Shortcuts, Maximize Efficiency & Profits
    8/12/2014

    I’ve written in the past about the need to be running efficiently to be most effective with the as-a-Service model. During a recent conversation at CompTia ChannelCon, I was reminded how important it is to not just use the right software in your managed services practice, but to have it properly configured.

  8. Common Mistakes Made In The Retail Vertical
    8/12/2014

    When providing IT solutions in the retail field, VARs can sometimes focus on technology and not people. Along with the views they shared for our Partner Program Insider, the following industry leaders gave their opinions on the common mistakes solutions providers make when selling to customers in the retail vertical.

  9. Manufacturing And Warehousing IT News For VARs — August 11, 2014
    8/11/2014

    In the news, wireless control technology enables scientific devices to transmit data, much like smartphones or tablets. Also, a white paper tells how the Internet of Things (IoT) can contribute to universally accessible data — key for Big Data programs.

  10. eBook Addresses Securing Servers With Third-Party Access
    8/11/2014

    An organization’s servers hold vital and sensitive information, yet they are continually exposed to internal privileged users and external third-party contractors who require access to provide crucial business functions. The role these third-party contractors and their employees play is essential, especially in modern corporate life, but they do expose organizations to security threats — once these users have gained access to the servers, most IT security managers have no idea what they are up to. In fact, according to reports from Verizon and Trustwave, nearly 90 percent of data breaches are accomplished via remote access to a company’s systems, but only 1 percent of data breaches are discovered by the victimized organization’s log analysis and/or review process.

Newsletter Signup
Get the latest channel trends, news, and insights