THEAMPLIFYVENDORFLIPBOOKA quick-reference guide to new vendorsand technology that can have a bigimpact on your businessStart flipping


FORCEPOINTReinventing cybersecurity by protecting informationwhere it’s most valuable and most vulnerable.ABOUT USReinventing cybersecurity by creating uncompromising systems thatunderstand people’s behaviors and motivations as they interact with dataand IP everywhere.FEATURED CONTENTSecurity Considerations forYour Global Office 365 RolloutSecuring the Wherever, Whenever WorkforceProtecting Data Whereit’s Most VulnerableForcepoint - The HumanPoint SystemCONTENTHow You Can Make Every Day Data Privacy (and Protection) DayForcepoint Channel Momentum Builds on Human-Centric SecurityForcepoint Research Dispels the Myths of Workplace MonitoringDefend Your Government Agency with CDMLet’s Make Firewalls More Human-Centric2018 Security Predictions3www.forcepoint.comBack to Table of Contents

RSARSA enables organizations to thrive in an uncertain, high-risk world.ABOUT USRSA offers business-driven security solutions that uniquely link business context withsecurity incidents to help organizations manage risk and protect what matters most. RSAsolutions are designed to effectively detect and respond to advanced attacks, manage useridentities and access, and reduce business risk, fraud, and cybercrime. RSA protects millionsof users around the world and helps more than 90% of the Fortune 500 companies thrive inan uncertain, high risk world.FEATURED CONTENTWho Are You Letting ThroughYour Digital Doors?4 Tips for Strengthening theSecurity of Your VPN AccessDelivering Convenient &Secure AccessRSA SecurID - Keep Ahead ofGrowing ThreatsCONTENTWhen Identity Governance Gets ToughOh, Hello, Access Certification ReviewsWhere Will Fraudsters Go Next?Bridging the Gap of Brief with Business-Driven Security3 Ways Proximity Authentication Is Revolutionizing AccessReducing Identity Risk for VPN Access4www.rsa.comBack to Table of Contents

FIREEYEFireEye is the Intelligence-led security company.ABOUT USFireEye understands cyber attacks and the threat actors responsible forthem better than anyone else.FEATURED CONTENTTomorrow’s EndpointProtection PlatformsComprehensive EndpointSecurity LandscapeEndpoint SecurityBuyer’s GuideCONTENTWhat You Should Expect from an Effective MDR ProviderImprove Your Incident ResponseFireEye Endpoint Security DatasheetReelPhish: A Real-Time Two-Factor Phishing ToolPreparing for an Incident ResponseFireEye Helix Mission Control5www.fireeye.comBack to Table of Contents

QUESTSpend less time on IT administration andmore time on IT innovationABOUT USAt Quest, our purpose is to solve complex problems with simple solutions. Weaccomplish this with a philosophy focused on great products, great serviceand an overall goal of being simple to do business with. Our vision is todeliver technology that eliminates the need to choose between efficiency andeffectiveness, which means you and your organization can spend less time onIT administration and more time on business innovation.FEATURED CONTENTMicrosoft PlatformManagement DatasheetDurham Region PoliceCase StudyShareplex WhitepaperCONTENTGDPR Compliance Implications for US Companies9 Steps to Building a Disaster Recovery PlanSystem Admin Cheat Sheet: Let KACE Do the Heavy LiftingToad for Oracle’s “Copy User Settings” Feature3 Surprising Steps to a Successful Cloud MigrationEndpoint System Management to Table of Contents

BARRACUDABarracuda Networks offers cloud-enabled solutionsthat empower customers to protect their email,networks, applications, and data—regardless ofwhere they reside.ABOUT USBarracuda is committed to providing partners with complete, holisticsecurity solutions that enable their customers to protect their networks andbusiness critical data—no matter where their data resides.FEATURED CONTENTUnlocking the Public CloudAutomating Security onMicrosoft AzureBarracuda Sentinel Evolution of Spear PhishingCONTENTWhat Is a Cloud Generation Firewall?Barracuda Difference: Single Source SolutionCriminals Impersonating Google Docs, Outlook, DocuSignDoes the Channel Have a Blind Spot?Automation of Barracuda Web App Firewall in AWSBackup and Archiving for Office 3657www.barracuda.comBack to Table of Contents

ESETEnjoy Safer TechnologyABOUT USFor 30 years, ESET has been committed to helping people protect theirdigital worlds. From a small dynamic company, ESET has grown into a globalbrand with over 110 million users in 202 countries. With ESET’s multi-layeredtechnology, it allows for the highest detection rates and reacts to threatsfaster, helping all our customers benefit from stronger and more effectiveprotection. As an industry leader in cybersecurity and malware research,ESET’s core aspirations, philosophy and values remain committed to helpingbuild a more secure digital world where everyone can truly Enjoy SaferTechnology.FEATURED CONTENTHow Technology Can Help YouESET: Proven / TrustedBlockchain Hardened Devices: Can TheyRestore Privacy with Security by Design?CONTENTData Privacy vs. Data Protection: Reflecting on Privacy Day and GDPRAndroid Ransomware in 2017: Innovative Infiltration and Rougher ExtortionAll HTTP Websites to Soon Be Marked as “Not Secure” by Google ChromeThink You Have a Tracker on your Phone?How Safe Is Your Business from a Cyberattack?The State of SMB Cybersecurity in Canada 20178www.eset.comBack to Table of Contents

SENTINELONEAutonomous Endpoint Protection That Saves You TimeABOUT USSentinelOne is the convergence of EPP and EDR in a single, autonomousagent. We leverage static AI and behavioral AI in tandem with EDRcapabilities such as remediation, mitigation, and rollback to protectthousands of customer environments across the globe - all while makingthem safer and saving them time.FEATURED CONTENT8 Visionary Predictions for InfoSec in 2018S.M. Wilson & Co Case StudySentinelOne EndpointProtection: Deep VisibilityCONTENTSentinelOne Releases Free Linux Tool to DetectMeltdown Vulnerability ExploitationsSentinelOne - The Best AV for MacOSAlexa, Send Me the Daily SentinelOne ReportMicrosoft Selects SentinelOne to Power Mac & Linux CoverageSolving the AV ProblemAutomate Endpoint Protection Management With Voice Recognition9www.sentinelone.comBack to Table of Contents

COFENSEThe Power of the CollectiveABOUT USCofense’s award winning solutions reduce the risk and impact of breaches by enablingorganization-wide detection and response to active phishing threats. Cofense mobilizesevery employee to identify threats so security teams can quickly mitigate attacks inprogress. Cofense protects your people, data, and brand against advanced email threats.Designed to anticipate and disrupt the attack kill chain at delivery, Cofense solutions deliverthe fastest enterprise-wide detection and security automation and orchestration in responseto cyberattacks.With thousands of customers world-wide including more than half the Fortune 1000,Cofense is raising the aptitude of phishing threat detection and mitigation for globalorganizations of all sizes.FEATURED CONTENT2018 Cofense Phishing PredictionsPhishing Response Trends 2017Cofense: the Power of the CollectiveCONTENTHow to Avoid Drowning in Spam and Phishing EmailsTheir email filters missed these threats. Good thing the users didn’t.Examples of Silver-Bullet Technology FailsCommunication Is Essential to your Anti-Phishing ProgramPhishing Attack Shut Down in 19 Minutes with Cofense TriageHealthcareCompany Builds A Complete Phishing Defense10www.cofense.comBack to Table of Contents

CYLANCECylance is revolutionizing cybersecurity with products andservices that proactively prevent execution of advanced persistentthreats and malware at the most vulnerable point: the endpoint.ABOUT USCylance’s unique approach, leveraging artificial intelligence and machinelearning combined with a lightweight endpoint agent, allows SoftChoice togenerate high value and margin strategic services. The end result is thatendpoints are protected BEFORE malware executes, and partners can showtheir customer ROI as soon as they install the product, from DAY ONE.FEATURED CONTENTEmail Phishing Has Never Been EasierMalicious Actors: Three Steps to SuccessAI Based Prevention and DetectionCONTENTAchieving Better Security With Fewer ResourcesThe Artificial Intelligence Revolution in CybersecurityFighting Today’s Extortive Ransomware ThreatsArtificial Intelligence in the EnterpriseEconomics of InsecurityCylance Security Value Map11www.cylance.comBack to Table of Contents

SONICWALLInnovate More. FEAR LESS.ABOUT USSonicWall has been fighting the cyber-criminal industry for over 25 years, defending small,medium size businesses and enterprises worldwide. Backed by research from the SonicWallCapture Labs, our award winning real-time breach detection and prevention solutions,coupled with the formidable resources of over 10,000 loyal channel partners around theglobe, are the backbone securing more than a million business and mobile networks andtheir emails, applications and data. This combination of products and partners has enableda real-time cyber defence solution tuned to the specific needs of the more than 500,000global businesses in over 150 countries. The SonicWall real-time breach prevention platformallows businesses to operate with less fear from cyber criminals, so you can do morebusiness with less fear.FEATURED CONTENTWhat’s the Difference Between Traditionaland Next-Generation Anti-Virus?2018 SonicWall Cyber Threat ReportBoston Pizza Case StudyCONTENTNew Threat Intelligence Shows Growing Malware VolumeGDPR: Background, Context & FAQsIs Your Firewall Ready for the IoT Era?What is MU-MIMO wireless technology?Understanding Encrypted ThreatsDetect More with Next Generation Antivirus12www.sonicwall.comBack to Table of Contents

MIMECASTCyber Resilience for Email.ABOUT USEmail is at the intersection of a massive amount of risk. As the number onebusiness application that organizations depend on for communication, it’s alsothe number one attack vector for cyber criminals. Your organization needs to havea cyber resilience for email strategy that is easy to manage, lowers costs and ishighly effective in preventing attacks before, minimizing disruptions during, andquickly recovering email and data after. Through a single, cloud-based service, theMimecast cyber resilience for email solution delivers threat protection, adaptability,durability, and recoverability.FEATURED CONTENTWhat’s the Difference Between CyberSecurity and Cyber Resilience?Cyber Resilience Planning for EmailGDPR - A Day of Reckoning or Transformation?CONTENTMaking a Commitment to GDPR Compliance So Your Organization Can TooMimecast & Vanson Bourne Survey IT Leaders and ExecutivesAvoid Costly Email Migration Pitfalls with Archiving SolutionsThere’s More Than Just Security When It Comes to Office 365Email Archiving - Time for an UpdateThe Mimecast Email Security Assessment13www.mimecast.comBack to Table of Contents

JABRABe More. Hear More. Do More.ABOUT USJabra makes life sound better by developing intelligent audio solutions thattransform lives through the power of sound—enabling you to hear more, domore and be more than you ever thought possible. We develop an awardwinning range of wireless headsets for mobile users, and both wireless andcorded headsets for contact centers and office-based users. With almost150 years of experience, we are specialists in sound and communicationstechnology and have unrivalled understanding of high quality sound in all itsforms—from conversation to music. Jabra is a pioneering innovator of newsound experiences from wired to wireless.FEATURED CONTENTUnlocking the Powerof ConversationGet S#!t DoneWhy We Can’t Escape Noise and Why That’s A Good ThingCONTENTJabra Cisco Portfolio GuideJabra Microsoft Portfolio GuideForget Looking . Listen to What’s in Your Blind SpotNew Technologies Find a Voice And it’s OursJabra Evolve 75 Unboxing VideoJabra XPress For Windows14www.jabra.caBack to Table of Contents

3MThe experts in screen privacyABOUT US3M is a leader in visual privacy protection. Our advanced microlouvertechnology “blacks out” side views with world class effective privacy. Seeyour screen with crisp image clarity, while prying eyes beside you see onlya black or gold screen. That is why people worldwide trust 3M PrivacyProducts to help keep their private information private.FEATURED CONTENTFive Expert Tips for Improved Data Protection and PrivacyDo Privacy Filters Compromise Screen Display Quality?Visual Privacy - Top 5 ReasonsCONTENTThink Beyond Cyber SecurityGlobal Beverage Company Case Study3M Visual Privacy - InfographicVisual Hacking Exposed3M Science Keeps Visual Hackers in the DarkMarkets Needing Privacy15www.3mcanada.caBack to Table of Contents

C2GAs a brand of Legrand, C2G now has a broaderdepth of product offerings and solutions for everycustomer.ABOUT USC2G brings a complete portfolio of products and solutions includingAudio/Video & PC, Data Connectivity, Physical Infrastructure, and PowerManagement—all designed for installation in data centers, networks, andwork spaces.FEATURED CONTENTCabling Disasters andWhat Causes ThemAvoiding Cabling DisastersNew Infrastructure Hardware MustSupport the ‘Age of Digital Buildings’CONTENTTake Back Your Desktop with a Slim Desktop Power CenterCustom Power Cords: Quoted, Developed, DeliveredData Center Network Infrastructure CatalogRacks & Cabinets PortfolioMobility & Connectivity PortfolioWho Is Legrand North America?16www.C2G.comBack to Table of Contents

POLYCOMUnleash the Power of Human CollaborationABOUT USEverything we do at Polycom is to help you unleash the power of humancollaboration. That’s our sole focus. Our promise is to create experiencesthat push the greatness of human collaboration forward and make you andyour teams more successful.FEATURED CONTENT10 Reasons to Upgrade YourConference PhoneAudio Innovations in PolycomRealPresence Group Video SolutionsVideo Innovations in RealPresenceGroup Video SolutionsCONTENTPolycom RealPresence Group Series OverviewSkype for Business with RealPresence Group SeriesContent Innovations in RealPresence Group Series Video SolutionsPolycom Pano DatasheetTrio 8500 DatasheetPolycom Voxbox Datasheet17www.polycom.caBack to Table of Contents

PLANTRONICSEmpower professionals with wearable solutionsABOUT USPlantronics’ Brand is built on 50 years of headset innovation, consistentlyadding value for our customer and our sales partners alikeFEATURED CONTENTThe New Contact CenterWhy PlantronicsDeveloping a Humanized CustomerExperience Around the WorldCONTENTCharge on the GoIT Challenged to Support Growing Number of Small Business RemoteWorkers Behind the Scenes: Voyager 8200 UC DesignBehind the Scenes: Voyager 3200 Series DesignUnited Communications PortfolioUnified Communications Case Study18www.plantronics.comBack to Table of Contents

9EPSONExceed Your VisionABOUT USEpson is a leading manufacturer in the printer, professional imaging,projector, scanner, system devices, and factory automation categories.FEATURED CONTENTWarner Music GroupCase StudyHow Does Display SizeImpact Productivity?How Universities Are UsingWearable Technology TodayCONTENTWhat Are The Differences In Product Label Types For Packaged Goods?Essential Guide to EdTech Trade ShowsHow to Excel with Unified PresentationsHow Does Display Size Impact Productivity?Cirra Systems Case StudyClimb Real Estate Case to Table of Contents

LOGITECHVIDEO CONFERENCING FOR EVERY SPACEABOUT USLogitech is transforming video conferencing by offering an easy andaffordable way to collaborate, with crystal-clear audio and razor-sharpvideo. Logitech products deliver unparalleled value, enhancing andimproving productivity at a fraction of the price of competitors.FEATURED CONTENTCreating an Optimal Room EnvironmentToday’s Huddle Room ExperienceLogitech / Dealogic Case StudyCONTENTLogitech MX Sound Transforms the Audio Experience at Your DeskIntroducing Our New Flagship KeyboardWhat’s New in the New Landscape of WorkA Camera That’s Actually Designed for Huddle RoomsEvaluation of Logitech MeetupBaby Boomers – Please Don’t Retire!20www.logitech.comBack to Table of Contents

ZEBRAZebra makes businesses as smart andconnected as the world we live inABOUT USZebra builds tracking technology and solutions that generate actionable informationand insight, giving companies unprecedented visibility into their businesses.Zebra’s extensive portfolio of solutions give real-time visibility into everything fromproducts and physical assets to people, providing very precise operational data notonly about where things are, but what condition they are in. This allows businessleaders to use data to make better, more informed decisions, respond in real-time, andultimately help businesses understand how they work, and how they could work better.FEATURED CONTENTZebra Odyssey Case StudyEnabling the Smart WarehouseWhere Will the WorkforceMobility Revolution Take You?CONTENTMobile Technology in the Retail Industry: Top AppsRaising the Bar on Warehouse ProductivityA Rugged, Mobile Field OfficeWhy Using Consumer Devices in Delivery Operations Can Cost You MoreAre Your Industrial Printers up to the Job?Zebra Hospitality Study Webinar21www.zebra.comBack to Table of Contents

VIEWSONICSee the DifferenceABOUT USViewSonic has a 30-year history of delivering superior support for the channel, winningchannel awards year after year and a world leader in display technology. We’re committed torelationships that drive growth, innovation, and customer satisfaction without compromise.From our worldwide network of distributors and resellers, to customers that include some ofthe world’s most well-known brands, we’ve worked hard to earn the loyalty and respect of ourbusiness partners. We pride ourselves on our unparalleled commitment to our partners. Timeand time again, we have been recognized as one of the best and easiest vendor partners towork with!FEATURED CONTENTCurved Monitor Benefits forUnique ApplicationsEfficient Dual-System Switchesfor Pro-Monitor UsersSimple, Enterprise-Grade CollaborationCONTENTViewSonic Boosts its SC-T25 Based Raspberry Pi Thin ClientThe ViewSonic SC-T25 Immune to Meltdown and Spectre ThreatsViewSonic Introduces New Professional and Enterprise MonitorsViewSonic Delivers Eye-Catching Signage for Public SpacesViewSonic Launches its Chromebox that Delivers an All-in-One SolutionThe Benefits of Color Calibration for Pro-Monitor Users22www.viewsonic.comBack to Table of Contents

AXIOMThe OEM Alternative.ABOUT USNot only do we manufacture tier 1 quality products, but we have the bestcustomer service in the industry.FEATURED CONTENTAxiom Transceivers The OEM AlternativeAxiom BendnFlex Fiberand Copper Cables23www.axiomupgrades.comBack to Table of Contents

SAMSUNGPowerful products that work for your business.ABOUT USSamsung Electronics Canada inspires Canadians to reach their full potentialthrough a transformative ecosystem of products and services that deliverinnovation and distinct design to every aspect of their connected lives. Thecompany is redefining the worlds of TVs, smartphones, digital signage, virtualreality, wearable devices, and tablet. In 2017, Samsung was ranked No. 6in Interbrand’s “Best Global Brands” list and named one of the top 10 MostInfluential Brands in Canada, based on a study by Ipsos Canada.FEATURED CONTENT5 Tricks for Working Smarter With Your PhoneWhy Educators Will Flip Over a NewKind of Smart BoardModernizing MeetingsCONTENTDriving Collaboration in the Digital OfficeIs Samsung Knox the Most Secure Phone?How a Digital Flipchart Takes the Pain Out of Office to Table of Contents

NUANCEWork Better, Faster & SmarterABOUT USRecently named “Best PDF Editor” by PC Advisor, Nuance Power PDF is theultimate PDF converter. Perfect for the individual or the enterprise, PowerPDF lets you create, edit, annotate and share PDF documents. Power PDF isexceptionally easy to use and comes at a fraction of the price you’d expect.There’s a reason why two-thirds of the Fortune 100 trust Nuance solutions.FEATURED CONTENTDragon Law Enforcement BriefPower PDFAdvancead DatasheetThe Positive Outcomes ofDocumentation ProductivityCONTENTCreate Better Customer Experiences Using the Power of PDFTransforming Documentation by VoiceThe Impact of Improved Documentation ProductivityAssistants Here, Assistants There, Assistants EverywhereNuance Dragon Professional IndividualMigrating Business Users to a More Robust Desktop PDF Solution25www.nuance.comBack to Table of Contents

SOLARWINDSWe’re Geekbuilt ABOUT USDeveloped by network and systems engineers who know what it takes tomanage today’s dynamic IT environments, SolarWinds has a deep connectionto the IT community.The result? IT management products that are effective, accessible, and easyto use.FEATURED CONTENTWhy Is Database PerformanceAnalyzer a Smart Investment?Thou Shall Not Pass. I Think?!Disaster Recovery - Time toCreate our Plan!CONTENTPerfstack - Real-Time Polling - Because Time Is the Only ConstantMonitoring Microsoft Office 365 with SAMGet Your Cisco ASA Firewall ACLS Under Control with These Five Easy StepsOut of Office: Planning the Migration to Office 365Orion Platform InfographicFor Every IT Pro, There’s a Success Story Waiting to Be Told26www.solarwinds.comBack to Table of Contents

MOBILEIRONMobileIron is the secure foundation for modern work.ABOUT USMobileIron is the secure foundation for modern work. Modern work enablesemployees to make better, faster decisions by using cloud services andmobile experiences. Only MobileIron provides cloud and endpoint security tosecure your data on the devices, clouds, and networks you own—and on theones you don’t.FEATURED CONTENTPerkins-Coie Case StudyData Protection andAgile ManagementQueensland Police Services: iPads andMobileIron, A Modern Work Success StoryCONTENTGot a New Mobile Device? Here are Five Ways to Protect It.Android - Ready for the EnterpriseThe New Normal: IT Says “Yes” to iOSPracticing Safe Security with iOS 11 and Office 365MobileIron Access DatasheetMobileIron Customer Solution Overview27www.mobileiron.comBack to Table of Contents

TENABLEEmpower all organizations to understand and reduce their Cybersecurity RiskABOUT USCybersecurity is one of the existential threats of our time. New types of connected devices andcompute platforms, from Cloud to IoT, have exploded the cyber attack surface. And more toolscollecting more data doesn’t equate to actionable insight for the CISO, C-suite and Board ofDirectors. The old way of simply scanning on-premises IT devices for vulnerabilities is no longerenough. It’s time for a new approach.Today, 24,000 organizations around the world rely on us to help them understand and reducecybersecurity risk. Our goal is to arm every organization, no matter how large or small, with thevisibility and insight to answer three critical questions at all times: Where are we exposed? Towhat extent are we exposed? Where should we focus to reduce our exposure?FEATURED CONTENTCyber Exposure: The Next Frontier for SecurityWhat is Driving the Need to Manage& Understand Cyber Risk?10 Steps for Achieving EffectiveVulnerability ManagementCONTENTMaintain Your &% #* Systems! A Mantra for IT Professionalsin the Wake of EquifaxThree Reasons Why DevOps Is a Game-Changer for SecurityCyber Exposure: The Next Frontier for SecurityFind Plugins Faster: Introducing a More Powerful Plugins SearchLeveraging the Cloud to Achieve Visibility, Tracking, and SecurityTenable Vulnerability Management28www.tenable.comBack to Table of Contents

RAPID7Rapid7 transforms data into action, empowering ITand security professionals to progress and protecttheir organizations.ABOUT USThe Rapid7 Insight platform is the first to unify solutions for vulnerabilitymanagement, user behavior analytics (UBA), SIEM, IT log analytics, andapplication security.FEATURED CONTENTGetting Started in Ethical HackingHow to Phish Your Business(And Get Management’s Buy-In)7 Best Practices for CybersecurityCONTENTVulnerability Management Market DisruptorsWhy Managed Detection Zeroes In On the Endpoint3 Questions When Prioritizing Web App VulnerabilitiesGeorgia Should Not Authorize “Hack Back”Transforming Data Into AnswersLive Vulnerability Management & Endpoint Analytics29www.rapid7.comBack to Table of Contents

TECHSMITHTechSmith makes it simple for everyone to createhigh-quality screenshots, screencasts, and videos.ABOUT USTechSmith is the #1 Company for Visual Communication Software. Joinover 30 million professionals around the globe that use TechSmith softwareto show off a product, teach a course, train others, and communicate in afaster, more engaging way.FEATURED CONTENT6 Ways to work smarter and fasterwith Visual CommunicationBoost Clarity ofCommunication with SnagitThink the Snipping Tool Is Good Enough?CONTENT3 Reasons to Start Using Video in your BusinessHow Digital Learning Can Help Solve These Training ChallengesDeliver Outstanding Customer Service with Screen RecordingVideo Marketing in the Problem Aware Stage30www.techsmith.comBack to Table of Contents

NITROProductivity Unleashed ABOUT USThe Nitro Productivity Suite delivers end-to-end workflow efficiency and acceleratesdocument workflows by combining powerful PDF productivity tools with lightweighteSignature capabilities, rich data insights, and simple user management. Available at afraction of the cost and complexity of other solutions, the Nitro Productivity Suite cutscosts while enabling businesses to equip more—or, in many cases, all—of its knowledgeworkers with the necessary PDF and eSignature tools to reduce printing and advance digitaltransformation.FEATURED CONTENT4 Productivity Tips to Transform Your Workday7 Reasons Why the Fortune 500 Choose NitroFulfilling the Promise of the Digital WorkplaceCONTENTPrinting to PDF Using Windows 10? Use Nitro InsteadThe 4 Document Collaboration Tools You Should Be UsingAre You on the Road to Better PDF? The Answer Might Surprise You 6 Reasons Standardizing Your Software Is EssentialDeciphering Digital TransformationModern Change Management31www.gonitro.comBack to Table of Contents

LOGMEINWe unlock the potential of the modern workplace.ABOUT USSimplifying how people interact with each other and the world around themto drive meaningful insight, deeper relationships and better outcomes forall has helped LogMeIn grow to become one of the world’s top 10 SaaScompanies with a leadership position in every one of our markets.FEATURED CONTENT6 Ways to Come Up with a Winning Webinar TopicWhat Matters Most in a Remote Support SolutionThe Psychology of PasswordsCONTENTCan Chatbots Really Be an Agent’s New BFF?Going Global: How to Conquer Support Across ContinentsDebunking Internet Safety MythsHere’s How to Know When You’ve Struck Meeting Gold.The Easy Way to Create a Personal Meeting RoomLogMeIn Channel Products Overview32www.logmein.comBack to Table of Contents

CARBONITE Data protection solutions for Physical, Virtual orCloud environments.ABOUT USCarbonite provides data protection solutions for businesses and the ITprofessionals who serve them. Our product suite offers a full complement ofbackup, disaster recovery, data migration and high availability solutions for anysize business in any location. More than 1.5 million customers around the worlddepend on us and our partners to protect their data from hardware failure, naturaldisasters and cyberthreats like ransomware and malicious hackers. We’re currentlyprotecting more than 160 petabytes of digital information for our customers, andit’s all supported by a global infrastructure.FEATURED CONTENTIT Skills Shortage: How Bad Is It?Carbonite Cloud MigrationHow to Disaster-Proof Critical DataCONTENTComputrade Malaysia Moves 2 TBs Between Clouds with Carbonite MigrateWhat’s New in Carbonite Availability?New Podcast Investigates History’s Most Notorious Data BreachesCybersecurity Fears Drive Increase in 2018 IT BudgetsCarbonite Availability OnboardingDRaaS Levels the Playing Field33www.carbonite.comBack to Table of Contents

APCCertainty in a Connected World.ABOUT USCompanies around the world and within every industry rely on products from APC tokeep their data centers up and running. Our uninterruptible power supply solutions,data security, and surge protector options work hard for you when maximumavailability and guaranteed uptime is non-negotiable. Choose the battery backupand data protection built to ensure business critical equipment and applications arenever at risk. To find the products you need, start with our power supply calculatorfor business solutions.FEATURED CONTENTIoT to Drive Unprecedented Banking InnovationRethinking Data Center ResiliencyDeploying Micro Data Centers at the EdgeCONTENTHow to Pick Out the Right UPS for Your Home or BusinessEdge Resilience Is Resilience for the Whole IT EnvironmentHow an APC Battery Can Significantly Cut Your TCOLithium-ion UPS Batteries Must Meet Stringent Safety StandardsConnected Smart-UPS with APC SmartConnect34www.apc.comBack to Table of Contents

Mimecast 13 HARDWARE Jabra 14 3M15 C2G 16 Polycom 17 Plantronics18 Epson 19 Logitech20 Zebra 21 ViewSonic 22 Axiom 23 Samsung 24 SOFTWARE Nuance 25 Solarwinds 26 . Microsoft Selects SentinelOne to Power Mac & Linux Coverage Solving the AV Problem Automate Endpoint Protection Management With Voice Recognition. COFENSE The Power of the .