Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
CISSP Study Guide: Training to pass the CISSP exam
CISSP certification can give channel partners an edge over their competition by giving their employees credibility with certified expertise. Our CISSP Study Guide can help you prepare for and pass the exam with help from security expert and author ... Continue Reading
What operating systems are being used?
Learn why you need to ask which operating systems are in play with blade server virtualization projects. Continue Reading
What upstream/downstream services are in use?
Learn why you should ask your customers about their upstream and downstream services for blade server virtualization projects. Continue Reading
-
How do you connect storage to a virtual blade server?
Learn how to connect storage to a client's virtual blade servers. Continue Reading
What are your system availability goals?
Learn why you should ask your clients about their system availability goals before launching blade server virtualization projects. This is especially important when considering disaster recovery and fault tolerance issues. Continue Reading
-
Definitions to Get Started
- service-level agreement (SLA)
- RMM software (remote monitoring and management software)
- cloud provisioning
- request for proposal (RFP)
- TIN (Taxpayer Identification Number)
- Defense Contract Management Agency (DCMA)
- go-to-market strategy (GTM strategy)
- hardware-as-a-service (in managed services)
Encryption software vendors
Use our Partner Program Directory to choose an encryption software vendor partner. Whether you are looking for a new partner program or want to see what your competition's partner programs are like, our easy-to-read checklists will help you weigh ...Continue Reading
McAfee Partner Program Checklist
McAfee makes intrusion prevention and security risk management software to help secure systems and networks. Learn the benefits of becoming a McAfee reseller partner with our Partner Program Checklist.Continue Reading
Symantec Partner Program Checklist
Service providers looking for a security vendor partner can get a quick look at Symantec's reseller partner program. Symantec sells antivirus, antispyware, endpoint security, backup, storage and compliance products to SMBs and enterprises through ...Continue Reading
How should snapshot overhead be determined?
When calculating overhead, you should keep storage snapshots in mind. Learn how to account for snapshots.Continue Reading
NetApp Partner Program Checklist
Value-added resellers learn the benefits of partnering with storage vendor NetApp with this standardized checklist of reseller partner program features.Continue Reading
-
What role do vendors play in your lead generation strategies?
Learn what role hardware and software vendors can play in a channel reseller's lead generation strategies. Partnering with the right vendors can make all the difference in getting more clients for your services.Continue Reading
Storage backup vendors
Use our Partner Program Directory to choose a storage backup vendor partner. Whether you are looking for a new partner program or want to see what your competition's partner programs are like, our easy-to-read checklists will help you weigh the ...Continue Reading
What is the difference between Snort and Bro?
While Bro and Snort and both open source intrusion detection systems, they use different methods to detect intrusions and can complement one another on the network.Continue Reading
How can the operator test Snort?
There are various ways to test Snort's intrusion detection capabilities, including setting rules and running tools such as IDSWakeup.Continue Reading
How does Snort's flavor of intrusion detection work?
Snort is a powerful intrusion detection tool. Learn how it leverages traffic patterns to detect security risks.Continue Reading
IBM Partner Program Checklist
Value-added resellers (VARs) and service providers looking for a storage vendor partner can get a quick look at IBM's reseller partner program, IBM PartnerWorld.Continue Reading
Aruba Networks Partner Program Checklist
Value-added resellers and service providers interested in reselling Aruba networking hardware and software can learn the benefits of becoming an Aruba Networks partner with this standardized checklist. Compare Aruba's reseller partner program with ...Continue Reading
How many different types or levels of vendor certification are there?
Learn about the different types and levels of vendor certification.Continue Reading
How long does vendor certification take? What's involved?
Learn how to balance the need for employee IT certification with one's business requirements.Continue Reading
Hardware as a Service (HaaS)
Hardware as a Service (HaaS) is a service provision model for hardware that is defined differently in managed services and grid computing contexts... (Continued)Continue Reading
Hardware as a Service (in grid computing)
Hardware as a Service (Haas), in a grid computing context, is a pay-as-you-go model for accessing a provider's infrastructure and CPU power... (Continued)Continue Reading
Cisco Systems Partner Program Checklist
Value-added resellers and service providers interested in reselling Cisco networking hardware and software can learn the benefits of becoming a Cisco Systems partner with this standardized checklist. Compare Cisco's reseller partner program with ...Continue Reading
special purpose acquisition company (SPAC)
A special purpose acquisition company (SPAC) is a corporation formed by private individuals to facilitate investment through an initial public offering (IPO)... (Continued)Continue Reading
HP Partner Program Checklist
Value-added resellers (VARs) and service providers interested in becoming an HP partner can learn about the features of HP PartnerONE, the company's reseller partner program, with this standardized checklist.Continue Reading
What kind of incentives and partner programs does VMware offer to its resellers?
Learn about VMware's three reseller partner levels: Professional, Enterprise and Premier. These levels increase in both the commitment expected from the reseller and benefits offered by VMware.Continue Reading
Should I use a large central network firewall at the core or smaller distributed firewalls?
Learn when to recommend a large distributed network to a client as opposed to smaller distributed firewalls.Continue Reading
When should orgnizations use ASIC-based network firewalls?
Even though ASIC-based network firewalls are often much faster than their software-only counterparts, learn why deploying them within some network environments is a bad idea.Continue Reading
Comparing network firewall inspection technologies
Network firewalls have evolved from packet filters to proxy servers and finally to stateful inspection, which delivers the benefits of both packets filters and proxy servers.Continue Reading
Is it possible to measure network firewall throughput?
Learn why rating firewalls by network throughput is a challenge and can lead to a large disparity between the vendor rating and the firewall's actual performance. The problem is compounded because few organizations know how many packets per second ...Continue Reading
What are the benefits of seperating network firewall and VPN services?
Learn the two cases where separating a client's network firewall and VPN functions can be a significant benefit to an organization.Continue Reading
What are some of the risks associated with iSCSI?
There are two risks VARs need to make customers aware about when using iSCSI. Since the technology is so easy to deploy, it is also easy to loose track of all the details. Customers also need to be aware that iSCSI can hog bandwidth on a network.Continue Reading
What are the disadvantages of iSCSI?
Deploying iSCSI in mission-critical situations isn't a risk-free proposition. Customers may have to cope with higher latency and performance issues in mixed networks after an iSCSI implementation.Continue Reading
What are some of the advantages of iSCSI over traditional Fibre Channel SANs?
iSCSI SANs allow for much cheaper connectivity than a Fibre Channel SAN. The initial sticker shock Fibre Channel gives customers may turn them away, while iSCSI allows customers to build on their networking experience, negate the problem of distance...Continue Reading
turnkey solution provider
A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration... (Continued)Continue Reading
partner
A partner is a member in a partnership, an entity in which both the profits or losses of a business or other venture are shared between all members. Corporations favor partnerships because of a taxation structure that eliminates dividend taxes upon ...Continue Reading
iSCSI storage vs. Fibre Channel storage: A SAN tutorial
iSCSI storage systems and Fibre Channel storage arrays are both used in storage area networks (SANs). Get help deciding which may be better for your customers in this tutorial.Continue Reading
direct market reseller (DMR)
A direct market reseller (DMR), also known as an e-tailer, is a company that sells directly to consumers online without operating storefront operations of any kind... (Continued)Continue Reading
Business lingo: Make it snappy! (Quiz)
We all know time is money. Spend a penny by stopping to take this quiz!Continue Reading
CCENT/CCNA Certification Study Guide: Networking fundamentals
Cisco's CCENT/CCNA certification qualifies VARs and SIs for extensive networking projects, creating more business opportunities for the company. Test your knowledge of networking fundamentals in part one of this quiz series designed to help you pass...Continue Reading
Small Disadvantaged Business (SDB)
A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged... (Continued)Continue Reading
Choosing a processor: Multi-core and 64-bit considerations
Multi-core, 64-bit or 32-bit processor -- what's best for your client's shop? This guide gives channel professionals the information they need to help clients choose a processor.Continue Reading
tier 2 vendor
A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well... (Continued)Continue Reading
tier 1 vendor
A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance...(Continued)Continue Reading
role sharing
Role sharing occurs when an individual within a VAR or other solution provider's organization assumes multiple roles such as "sales engineer", "field engineer", "account manager" or other roles... (Continued)Continue Reading
proprietary solution
A proprietary solution is a hardware or software product or combination of products and services that is tied to a specific vendor, to the exclusion of all other vendors... (Continued)Continue Reading
lead generator
A lead generator is any marketing-related activity intended to publicize the availability of a vendor's product or service...(Continued)Continue Reading
Penetration testing tutorial for service providers
Penetration testing provides a complete picture of your client's security posture. In this series of tips by SearchSecurityChannel expert Russell Dean Vines, ethical hackers learn how to sell their services, protect themselves from risk and conduct ...Continue Reading
IP network design: A learning guide
The heterogeneous nature of modern applications has made the design of IP networks more challenging than ever before. This Learning Guide delves into the various aspects of network design to help value-added resellers (VARs) and systems integrators ...Continue Reading
Windows Server 2008 Tutorial
Windows Server 2008 is scheduled to be released in February, 2008 and so far many industry experts have given it the thumbs-up. Start preparing to help your customers upgrade now with the tips, tricks and information included in this tutorial. ...Continue Reading
Snort hardware and network requirements for Red Hat Enterprise Linux 5
Learn the basic hardware and network requirements for running Snort on Red Hat Enterprise Linux 5, including where to set up a Snort sensor and how to secure it.Continue Reading
Editing the snort.conf file for Red Hat Enterprise Linux 5
The final step in setting up Snort for Red Hat Enterprise Linux 5 is editing its snort.conf configuration file. Learn how to teach Snort about your home network, external networks, the path to the Snort rules and to tell Snort to output to the MySQL...Continue Reading
subcontract
A subcontract is a contract between a prime contractor and a subcontractor to furnish supplies or services for the performance of a prime contract or subcontract.Continue Reading
Standard Industrial Classification Code
The Standard Industrial Classification Code is a category within the Standard Industrial Classification (SIC) system, which was established to classify all industries in the US economy. The SIC code is displayed as a two-digit code that designates ...Continue Reading
Small Business Innovative Research contract (SBIR contract)
A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees. The SBIR contract program provides for a three-phased approach to research and development projects: technological feasibility and ...Continue Reading
prime contract
A prime contract is any contract or contractual action that is awarded directly to a contractor by the U.S. Federal Government for the purpose of obtaining equipment, supplies, materials, or services of any kind.Continue Reading
MSP platform (managed service provider platform)
A managed service provider (MSP) platform is a computing framework used to deliver network-based services, applications, and equipment to enterprises, residences, or other service providers. A MSP platform allows an organization, IT consultant or ...Continue Reading
line card
A line card is: 1) A printed brochure that lists the names, descriptions and the manufacturers of products sold by a third party, like a distributor, sales representative or value-added reseller (VAR). 2) An electronic circuit on a circuit board ...Continue Reading
fair and reasonable price
A fair and reasonable price is the price point for a good or service that is fair to both parties involved in the transaction.Continue Reading
deal forwarding
Deal forwarding is a process or technology that facilitates the exchange of information about bargains for merchandise... (Continued)Continue Reading
corporate account manager (CAM)
In the channel, a corporate account manager (CAM) is responsible for maintaining the relationship between the clients of a value-added reseller (VAR) and the VAR. In this role, a CAM may be responsible for an entire portfolio of client relationships...Continue Reading
CONUS (continental United States)
Refers to the continental United States. To state that delivery is CONUS is to say that delivery could be anywhere in the continental U.S.Continue Reading
contract delivery date (CDD)
A contract delivery date (CDD) is the date of delivery required by a contract. CDD is specified on a line item basis.Continue Reading
broad agency announcement (BAA)
A broad agency announcement (BAA) is a notice from the government that requests scientific or research proposals from private firms concerning certain areas of interest to the government.Continue Reading
best and final offer
For negotiated procurements, a contractor's final offer following the conclusion of discussions.Continue Reading
backside bus
In a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).Continue Reading
Linux systems integrators guide
Linux systems integrators have to know how to migrate to Linux from another platform, install SUSE and Red Hat and manage the system so that customers can still get their work done. This guide will give you the Linux tools you need to support the ...Continue Reading
Software licensing how-tos for virtual server environments
Software licensing agreements pose new challenges in virtual server environments where virtual machine cloning and insufficient licensing is common. Let this guide help you understand how to license virtual products for your clients.Continue Reading
Server room cooling basics
Server room cooling may not depend on the newest technologies. This collection of server room cooling basics suggests it may be enough to know your server room equipment.Continue Reading
Server room design and data storage facility planning guide
Server room and data storage facility planning is a daunting task for any professional. As a value-added reseller, you can help design and maintain the brains of an enterprise -- the data center. Using the expert advice and strategies discussed in ...Continue Reading
Disable IP source routing
Maintain physical security of the router
Establish Ingress and Egress address filtering policies
Disable IP directed broadcasts
Set up effective storage strategies
Prepare customers to properly handle ongoing storage capacity issues by setting them up with solid, well-tested storage strategies. This guide will help you address potential business concerns, identify storage needs and develop strategies.Continue Reading
How to set up a Windows VPN: Hardware requirements
A Windows-based virtual private network requires specific hardware and software. This tip describes those requirements in detail for value-added resellers (VARs) and systems integrators who build VPNs for their customers.Continue Reading
ion pump
An ion pump is a device that can cool, clean and filter air without the use of conventional fans or other moving parts... (Continued)Continue Reading
Five steps to capacity planning, step 1
Information Security Certification Guide
This guide provides a comprehensive listing of available vendor-neutral information security certifications.Continue Reading
Vendor Information Security Certification Guide
This guide provides an overview of the many vendor-specific security certifications available to value-added resellers, systems integrators and consultants.Continue Reading
CISSP Study Guide
Resources, tips and strategies for preparing for -- and passing -- the CISSP exam.Continue Reading
CCNA Study Guide
This guide lists free resources to help you prepare for Cisco's CCNA.Continue Reading
Adding a new user for SUSE Linux 10
This SUSE Linux 10 guide offers users an easy to follow walk through for user creation.Continue Reading
Configuring a SUSE Linux 10 default gateway
The SUSE Linux 10 router and gateway can be configured easily following these Linux setup steps.Continue Reading
SUSE Linux 10 network configuration tips
To configure SUSE Linux 10, the second step is to set up the network interface card (NIC).Continue Reading
Setting up a SUSE Linux 10 host name and DNS addresses
A SUSE Linux 10 machine's host name and DNS address can be easily configured following these Linux setup steps.Continue Reading
Primary and extended partitions for SUSE Linux 10
In this section, learn how to create the partitions needed to install SUSE Linux 10.Continue Reading
SUSE 10 Linux root partition
After the swap space has been created, you need to configure the root (/) partition for SUSE 10 -- the most important data partition on any Linux or Unix systemContinue Reading
Changing the default SUSE Linux 10 runlevel
SUSE Linux 10 allows you to customize the runlevel so that the services that load while the system is booting are only the ones which are useful to a customer.Continue Reading