Assess your customers' disaster recovery risk
Yosemite Technologies Partner Program Checklist
IP traceback via logging
Approximate string matching
Searching for multiple strings in packet payloads
IP traceback via probabilistic marking
Data deduplication cheat sheet
Partner Program Directory: Authentication vendors
Network design documentation
Using virtualization to achieve green data centers
Websense Partner Program
Partner Program Directory: Bandwidth management vendors
PCI compliance services FAQ
Host server storage and network performance
Configuration of the guest operating system
Host server processor and memory performance
Configuration of the virtual machine
Configuration of the host server
Implementing robust network design projects
Best systems blog posts
Network design considerations checklist for providers
Virtual desktop infrastructure (VDI) FAQ
Identity management: Compliance and trends
Desktop virtualization cheat sheet
Network infrastructure FAQ
CommVault, Inc. Partner Program
Creating an email retention policy
Deploying an email archiving system
Tech Watch: Biometric devices
Partner Program Directory: Application performance management vendors
Tripwire, Inc. Partner Program
Pillar Data Systems Partner Program
Identity management best practices and precautions
Password-protecting a router
Configuring privilege levels
Virtualization technologies explained
Cisco Security Device Manager Overview
Storage virtualization solutions explained
Application virtualization solutions explained
Server virtualization explained
Channel Explained: Voice over Internet Protocol (VoIP)
How email archiving benefits your client
Introduction to identity management solutions
ProStor Systems Partner Program
Passlogix Technologies Partner Program
Nimsoft Partner Program
Imprivata Partner Program
Courion Partner Program
Quest Software Partner Program
GFI Software Partner Program Checklist
Vasco Data Security Partner Program
OPNET Technologies Partner Program
Imanami Partner Program
Aladdin Partner Program
Business impact analysis
Exinda Partner Program
PCI compliance checklist: Top five channel mistakes and how to avoid them
How can managed services increase solutions and services sales?
How can managed services be marketed?
What should be included in a managed services agreement?
What are the core deliverables of a basic managed services offering?
How easy is it to transition existing customers to managed services?
Why are solution providers shifting to managed services models?
Oracle OpenWorld 2008 coverage
Performing a DR backup on a VMware ESX server
ESX Version 2
Securing Windows Server 2008: Implementing Server Core
Securing Windows Server 2008: Server Core best practices
Disaster recovery software and compliance considerations
How to write an IT service-level agreement
Do you have storage performance issues or low utilization?
Are you using tape-based data protection?
What does the potential customer think about the green storage gap?
What is your perception of green data storage?
Do you have power and cooling, floor space or environmental issues?
Channel Explained: Email security
VMworld 2008 and Partner Day coverage
Procedures for cooling blade servers
Getting your WAN requirements right for network disaster recovery
What is the price point cut-off for the customer?
Will regulatory requirements affect the type of authentication used?
How many users utilize the network resources currently?
What current authentication methods are in use on the network?
What operating systems are used at the customer organization?
Do off-site workers require remote access?
Have you considered multiple levels of authentication?
Do any areas of the network not require authentication to access?
Does the customer need a multi-factor authentication solution?
How large is the customer's employee pool?
Storage array vendors' partner programs
8e6 Technologies Partner Program Checklist
Using blade servers for virtualization, clustering
Tackle WAN connectivity issues before planning network DR
Radware Partner Program Checklist
Channel Explained Library
Top 5 data migration tools