Channel Explained: 802.11n for resellers
K-PAR Partner Program Checklist
AXS-One Partner Program Checklist
How to overcome managed security service provider challenges
What are vertical markets and why are they important to the channel?
How does virtualization affect disaster recovery?
How do I match business disaster recovery needs and technologies?
Which disaster recovery solution should I deploy?
What disaster recovery services can I offer?
Is online backup good for SMBs/SMEs?
What is disaster recovery?
How do business continuity and disaster recovery differ?
Chicago Storage Channel Seminar
Disaster recovery services FAQ podcast
What about disaster recovery plans beyond the data center?
Are there drawbacks to online backup?
What's the role of tape backup in disaster recovery?
Technology requirements for managed security service providers
Windows Server 2008 implementation tutorial
Thin provisioning explained and defined
Must-have network administration tools
Best practices for storage capacity planning
Understanding managed security services: An intro for VARs
Predicting data storage growth
How will the new email server fit into your network infrastructure?
How will you support security in relation to your email server?
What operating systems can you best afford or support?
What security settings best apply to the client?
What platform will best fulfill the client's needs?
Should we offer periodic security audits of the email server?
What are your regulatory compliance requirements for email security?
What information will you send and receive across the email server?
Can we offer managed security services to the client for this server?
Ten steps to wireless LAN security
Secondary-market resellers thrive in the tech industry
TCP/IP offload engine (TOE) cards
The benefits of storage capacity planning
Systems products to pay attention to
Top data storage products chosen by the experts
The best networking products as chosen by customers
The benefits of application virtualization
How to become a managed service provider
How to build a managed service provider business
Tufin Technologies Partner Program
Customers' favorite security hardware and software
The benefits of desktop virtualization
Ten steps for network documentation: Channel checklist
NETGEAR Partner Program
Juniper Networks Partner Program Checklist
Are there costs associated with joining a vendor partner program?
How do vendor partner programs create value for the channel?
What do channel partners overlook when evaluating vendor partner programs?
What are the questions a reseller should ask in evaluating vendor partner programs?
How will a new vendor partner program impact a partner's sales organization?
How should a vendor partner program complement the channel partner's core business?
Ideally, what would a channel partner hope to find in a channel program?
What are the standard margins and volume requirements in vendor partner programs?
What should channel partners look for in a vendor partner program?
What activities will ensure a successful vendor partner program launch?
Check up on systems services for your clients
Check up on storage services for your clients
Check up on networking services for your clients
Managed services contracts
How will you assume data storage security duties?
Has a data inventory been conducted?
How do compliance, management directives, best practices relate to IT?
What got you interested in data storage security?
How long do you expect the data storage security solution to last?
Can we offer a security evaluation to gauge current risk?
How will you handle ongoing data storage security?
Do you have a policy for decommissioning end-of-life storage hardware?
Do you have a budget for the data storage security project?
What type of compliance reporting do you need?
What stage of the data storage security project are you in?
Remote office/branch office (ROBO) storage services
ADTRAN Partner Program Checklist
Check up on IT security services for your clients
Networking hardware vendors
Data security: Alternatives to data leak prevention
Testing for injection attacks
XXE, LDAP and buffer overflow injection attacks
XPath, command and directory traversal injection attacks
How will the network monitoring be conducted?
What is the client's network topology?
How will you protect your client's network?
Is the network design approved by the vendor?
What are the physical network considerations?
What routing protocols will you use in a network design project?
Pair data leak prevention product sales with consulting services
How to keep your revenue from dropping in a recession
How to survive a recession in the IT industry
Partner Program Directories
How to set up a network to optimize performance and reliability
Data leak prevention: Finding data before it's lost
Intasoft Partner Program Checklist
What is the purpose of the network being designed?
What networking skills does your client's in-house IT staff have?
What is the client's IT budget for the network design project?
What service-level agreement does your networking client expect?