“This isn’t Dell dipping its toe in the water so to speak."
Resellers to get access to the same tools as used by banks, financial institutions and government agencies.
“My role is to help Fortinet New Zealand maintain the rapid growth that Jon and his team have generated over the last two years."
“The success of our business relies on automation, standardisation, and centralisation of core processes."
“Dicker Data completes Aerohive’s partner channel in New Zealand."
“Our partnership allows New Zealand customers for the first time to have access to Cradlepoint’s routers and other networking products."
For the past 30 years, most B2B channel professionals have thought of their channel as a sales channel.
“Chelmer and Azul are both recognized as pioneers in providing leading-edge technologies to the financial community."
“We’re seeing Dell really embrace the New Zealand market in terms of its channel strategy which has created a great opportunity for us."
“The ongoing digital transformation requires a closer look at the underlying IT architecture."
New Zealand businesses are moving managed security to the cloud even if there will be no immediate savings.
For security service providers, the Internet of Things a terrifying yet exhilarating prospect.
If there's one topic that is likely to make any CIO's or IT Manager's wallet hurt, it's information security.
“Managed services compliment the work of the IT team, giving them back time to focus on strategic objectives."
"Many organisations don’t fully understand what it really means, let alone how to achieve digital transformation."
“Customers are demanding more from their WiFi as the technology becomes more widely accepted and deployed."
"Achieving certification at our Auckland site is a cause for great celebration within our team."
"Holding out on the migration from Windows Server 2003 may cost much more in the long run.”
With the move to cloud-based services continuing to gather pace across all businesses, how can the channel adapt and specialise in this new era of IT consumption?
What challenges does the usage of traditional, on-premise security tools create in the cloud?