THE AMPLIFY VENDOR FLIPBOOK A quick-reference guide to new vendors and technology that can have a big impact on your business

Start flipping TABLE OF CONTENTS

SECURITY SOFTWARE Forcepoint 3 Nuance 26 RSA 4 Solarwinds 27 FireEye 5 MobileIron 28 Quest 6 Tenable 29 Barracuda 7 Rapid7 30 Eset 8 TechSmith 31 SentinelOne 9 Nitro 32 Cofense 10 LogMeIn 33 Cylance 11 Carbonite 34 SonicWALL 12 Ivanti 35 Mimecast 13 Okta 36 Symantec 14 DATA CENTER HARDWARE APC 37 Jabra 15 Sungard 38 3M 16 C2G 17 Polycom 18 Plantronics 19 Epson 20 Logitech 21 Zebra 22 ViewSonic 23 Axiom 24 Samsung 25

2 FORCEPOINT

Reinventing cybersecurity by protecting information where it’s most valuable and most vulnerable.

ABOUT US Reinventing cybersecurity by creating uncompromising systems that understand people’s behaviors and motivations as they interact with data and IP everywhere.

FEATURED CONTENT

Best Practices for Building an Insider Threat Program

Rethinking Data Security with a Risk-Adaptive Approach

What They Won’t Tell You About Securing Cloud Apps

CONTENT Forcepoint’s SD-Wan Security and Connectivity Verified by NSS Labs Vulnerability, Breach, and Patch: Break the Vicious Cycle Dynamic Data Protection: a Customer’s Perspecitve Let’s Make Firewalls More Human-Centric Defend Your Government Agency with CDM Forcepoint Research Dispels the Myths of Workplace Monitoring Forcepoint Channel Momentum Builds on Human-Centric Security How You Can Make Every Day Data Privacy and Protection Day Forcepoint 2018 Security Predictions Securing the Whenever, Wherever Workforce Security Consideration for Office365 Rollout The Human Point Protecting Data Where It’s Most Vulnerable

3 www.forcepoint.com

Back to Table of Contents RSA

RSA enables organizations to thrive in an uncertain, high-risk world.

ABOUT US RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks, manage user identities and access, and reduce business risk, fraud, and cybercrime. RSA protects millions of users around the world and helps more than 90% of the Fortune 500 companies thrive in an uncertain, high risk world.

FEATURED CONTENT

Understanding RSA Business-Driven Security

RSA SecurID: Keep Ahead of Growing Threats

RSA in Action Infographic

CONTENT GDPR: Rethinking How You Think About Personal Data Five Ways to Transform Access How to Build a Better Integrated Identity Strategy 3 Keys for Multi-Factor Authentication for your VPN Foundations of the Intelligent SOC Evolving the Way Businesses Work in a Post-GDPR World Staying Secure Means Staying Relevant 3 Ways Proximity Authentication Is Revolutionizig Access Bridging the Gap of Grief with Business-Driven Security Where Will Fraudsters Go Next? Oh Hello, Access Certification Reviews When Identity Governance Gets Tough Delivering Secure Access to the Modern Workforce 4 Tips for Strengthening the Security of your VPN Access Who Are You Letting Through Your Digital Doors? Reducing the Identity Risk for VPN Access

4 www.rsa.com

Back to Table of Contents FIREEYE

FireEye is the Intelligence-led security company.

ABOUT US FireEye understands cyber attacks and the threat actors responsible for them better than anyone else.

FEATURED CONTENT

Changes in Email Attack Tactics

Email Security: a Buyer’s Guide

No Signs of Over- Yet

CONTENT Network Security: a Buyer’s Guide Mandiant Incident Response Services Four Keys to Leveraging Cyber Threat Intelligence Tackling the Cybersecurity Need for Speed with Network Forensics An Anatomy of a Public Cloud Compromise FireEye Email Security Shines at SC Awards Preparing for an Incident Response ReelPhish: a Real-Time Two-Factor Phishing Tool Improve Your Incident Response What You Should Expect from an Effective MDR Provider FireEye Endpoint Security Datasheet Endpoint Security: a Buyer’s Guide Endpoint Security: from Prevention to Remediation Elevate Your Security Operations with FireEye Helix Tomorrow’s Endpoint Protection Platforms

5 www.fireeye.com

Back to Table of Contents QUEST

Spend less time on IT administration and more time on IT innovation

ABOUT US At Quest, our purpose is to solve complex problems with simple solutions. We accomplish this with a philosophy focused on great products, great service and an overall goal of being simple to do business with. Our vision is to deliver technology that eliminates the need to choose between efficiency and effectiveness, which means you and your organization can spend less time on IT administration and more time on business innovation.

FEATURED CONTENT

3 Surprising Steps to a Successful Cloud Migration

Durham Region Police Case Study

Quest Microsoft Platform Management Solution

CONTENT Toad for Oracle’s Copy User Settings Feature System Admin Cheat Sheet: Let KACE do the Heavy Lifting 9 Steps to Building a Disaster Recovery Plan GDPR Compliance Implications for US Companies Endpoint Systems Management Datasheet SharePlex Whitepaper

6 www.quest.com

Back to Table of Contents BARRACUDA

Barracuda Networks offers cloud-enabled solutions that empower customers to protect their email, networks, applications, and data—regardless of where they reside.

ABOUT US Barracuda is committed to providing partners with complete, holistic security solutions that enable their customers to protect their networks and business critical data—no matter where their data resides.

FEATURED CONTENT

Barracuda’s CloudGen Firewall for Your Public Cloud Deployment

Technical Moment | Email Threat Scanner for Office 365

Evolution of Spear Phishing

CONTENT Cybersecurity AI to Grow to 18B Market Share Within Five Years Cybersecurity Report Commissioned by Trump Finds Much to Be Fixed Getting Started with Email Threat Scan for Office 365 Escalation of Application Integration Creates DevSecOps Challenges Is User Training the Weakest Link in Your Email Security Strategy? Automation of Barracuda Web App Firewall in AWS Does the Channel Have a Blind Spot? Criminals Impersonating Google Docs, Outlook, DocuSign Barracuda Difference: Single Source Solution What Is a Cloud Generation Firewall? Unlocking the Public Cloud Automating Application Security on Microsoft Azure Backup and Archiving for Office 365

7 www.barracuda.com

Back to Table of Contents ESET

Enjoy Safer Technology

ABOUT US For 30 years, ESET has been committed to helping people protect their digital worlds. From a small dynamic company, ESET has grown into a global brand with over 110 million users in 202 countries. With ESET’s multi-layered technology, it allows for the highest detection rates and reacts to threats faster, helping all our customers benefit from stronger and more effective protection. As an industry leader in cybersecurity and research, ESET’s core aspirations, philosophy and values remain committed to helping build a more secure digital world where everyone can truly Enjoy Safer Technology.

FEATURED CONTENT

IoT and Privacy by Design in the Smart Home

Cybersecurity Trends 2018

EternalBlue Exploit Still Popular

CONTENT Protecting Enterprise Cybersecurity Experts on Your Side Trends 2018: Doing Time for Cybercrime Inside Fake Interac Transfer and Tax Refund SMS Phishing Cryptocurrency Scams on Android Can You Create a Safe Smart Home? Think You Have a Tracker on Your Phone? All HTTP Websites to Soon Be Marked as Not Secure by Google CHhrome Android in 2017: Innovative Infiltration and Rougher Extortion Blockchain-Hardened Devices: Can They Restore Privacy With Security by Design? Data Privacy vs. Data Protection The State of SMB Cybersecurity in Canada 2017 How Safe Is Your Business From a Cyberattack? ESET Security: Proven and Trusted How Technology Can Help You Have a Better Start in Business How Technology Can Help You Build a Stable Foundation How Technology Can Help You Stay Energized How Technology Can Help You Go Global

8 www.eset.com

Back to Table of Contents SENTINELONE

Autonomous Endpoint Protection That Saves You Time

ABOUT US SentinelOne is the convergence of EPP and EDR in a single, autonomous agent. We leverage static AI and behavioral AI in tandem with EDR capabilities such as remediation, mitigation, and rollback to protect thousands of customer environments across the globe - all while making them safer and saving them time.

FEATURED CONTENT

Microsoft Selects SentinelOne to Power Mac and Linux Coverage

S.M. Wison & Co. Case Study

Automated Endpoint Protection Management

CONTENT Alexa Send Me the Daily SentinelOne Report SentinelOne: the Best AV for MacOS SentinelOne Releases Free Linux Tool 8 Visionary Predictions for Infosec in 2018 SentinelOne Security Endpoint Protection: Deep Visibility Solving the AV Problem

9 www.sentinelone.com

Back to Table of Contents COFENSE

The Power of the Collective

ABOUT US Cofense’s award winning solutions reduce the risk and impact of breaches by enabling organization-wide detection and response to active phishing threats. Cofense mobilizes every employee to identify threats so security teams can quickly mitigate attacks in progress. Cofense protects your people, data, and brand against advanced email threats. Designed to anticipate and disrupt the attack kill chain at delivery, Cofense solutions deliver the fastest enterprise-wide detection and security automation and orchestration in response to cyberattacks.

With thousands of customers world-wide including more than half the Fortune 1000, Cofense is raising the aptitude of phishing threat detection and mitigation for global organizations of all sizes.

FEATURED CONTENT

Malware Review: a Look Back and a Look Forward

Communication Is Essential to Your Anti-Phishing Program

The Power of the Collective

CONTENT CSO Names Cofense Triage to Best Security Software List The FBI’s Global Business Email Compromise Phishing Defense: Let’s Get Personal Phishing Attack Shut Down in 19 Minutes With Cofense Triage Examples of Silver Bullet Technology Fails Their Email Filters Missed These Threats. Good Thing the Users Didn’t. How to Avoid Drowning in Spam and Phishing Emails Case Study: Healthcare Data and Technology Company Builds A Complete Phishing Defense. Phishing Response Trends 2017 2018 Phishing Predictions

10 www.cofense.com

Back to Table of Contents CYLANCE

Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware at the most vulnerable point: the endpoint.

ABOUT US Cylance’s unique approach, leveraging artificial intelligence and machine learning combined with a lightweight endpoint agent, allows SoftChoice to generate high value and margin strategic services. The end result is that endpoints are protected BEFORE malware executes, and partners can show their customer ROI as soon as they install the product, from DAY ONE.

FEATURED CONTENT

Malcolm Harkins: “Impossible Is not a Declaration. It’s a Dare.”

Ten Signs It’s Time to Review Your Endpoint Protection

Cylance Security Value Map

CONTENT Does My Board of Directors Need a Cybersecurity Board Member? How to Hire a Cybersecurity Professional Security: Getting Off the Patch Malicious Actors: Three Steps to Success Email Phishing Has Never Been Easier Fighting Today’s Extortive Ransomware Threats The Artificial Intelligence Revolution in Cybersecurity Achieving Better Security With Fewer Resources The Economics of Insecurity Artificial Intelligence in the Enterprise AI-Based Prevention and Detection

11 www.cylance.com

Back to Table of Contents SONICWALL

Innovate More. FEAR LESS.

ABOUT US SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium size businesses and enterprises worldwide. Backed by research from the SonicWall Capture Labs, our award winning real-time breach detection and prevention solutions, coupled with the formidable resources of over 10,000 loyal channel partners around the globe, are the backbone securing more than a million business and mobile networks and their emails, applications and data. This combination of products and partners has enabled a real-time cyber defence solution tuned to the specific needs of the more than 500,000 global businesses in over 150 countries. The SonicWall real-time breach prevention platform allows businesses to operate with less fear from cyber criminals, so you can do more business with less fear.

FEATURED CONTENT

SonicWall Capture Security Center Video Data Sheet

2018 SonicWall Cyber Threat Report

Knowledge, Visibility, & Control of Your Security Ecosystem

CONTENT SonicWall Capture Client Video Data Sheet Setup SSL VPN on a SonicWall Firewall Manage Shadow IT, Ensure Safe Adoption of SaaS Capture Client Endpoint Protection: What’s New 12 New Products Usher in SonicWall’s Expansion Next-Generation Firewalls Designed for Mid-Tier Enterprises Understanding Encrypted Threats What is MU-MIMO Wireless Technology? What’s the Difference Between Traditional and Next-Gen Antivirus? Is Your Firewall Ready for the IoT Era? GDPR: Background, Context and FAQs New Threat Intelligence Shows Growing Malware Volume Boston Pizza Case Study

12 www.sonicwall.com

Back to Table of Contents MIMECAST

Cyber Resilience for Email.

ABOUT US Email is at the intersection of a massive amount of risk. As the number one business application that organizations depend on for communication, it’s also the number one attack vector for cyber criminals. Your organization needs to have a cyber resilience for email strategy that is easy to manage, lowers costs and is highly effective in preventing attacks before, minimizing disruptions during, and quickly recovering email and data after. Through a single, cloud-based service, the Mimecast cyber resilience for email solution delivers threat protection, adaptability, durability, and recoverability.

FEATURED CONTENT

The Mimecast Email Security Risk Assessment

GDPR: a Day of Reckoning, or Transformation?

Strengthen Your Defenses Against Cybercrime

CONTENT Email Archiving: It’s Time for an Update

13 www.mimecast.com

Back to Table of Contents SYMANTEC

Symantec is the largest cyber security company on the planet. In the cloud generation, we see attacks are coming through four primary vectors: through the user and their devices, the data in all of its locations, over web dial tone, and over email, Symantec is the only company that protects organizations across all 4 vectors.

ABOUT US Symantec protects the Cloud Generation through our Integrated Cyber Defense Platform, the industry’s most complete portfolio for securing cloud and on-premises environments. We support 15,000 enterprises in taking full advantage of cloud computing without compromising the security of the people, data, applications, and infrastructure that drive their business. Our advanced technology portfolio is powered by the world’s largest civilian threat intelligence network, enabling us to see and protect against the most advanced threats.

* 15 Years Running, a Leader in Gartner Magic Quadrant for Endpoint Security1 • 13 Years Running, a Leader in Gartner Magic Quadrant for Managed Security Services2 • Symantec Endpoint Protection 14 wins AV-TEST Award for Best Protection 20163 • Symantec DLP: Leader in 2016 Forrester Wave Data Loss Prevention Suites4

FEATURED CONTENT

Hey! You! Get Off My Cloud

The Dark(er) Side of the Cloud

Wannacry: Lessons Learned 1 Year Later

CONTENT Mo’ Ransom Money The Dark Side of the Cloud Why Phishing Continues to Spear Victims Expect a New Battle in Cyber Security: AI vs. AI

14 www.symantec.com

Back to Table of Contents JABRA

Be More. Hear More. Do More.

ABOUT US Jabra makes life sound better by developing intelligent audio solutions that transform lives through the power of sound—enabling you to hear more, do more and be more than you ever thought possible. We develop an award winning range of wireless headsets for mobile users, and both wireless and corded headsets for contact centers and office-based users. With almost 150 years of experience, we are specialists in sound and communications technology and have unrivalled understanding of high quality sound in all its forms—from conversation to music. Jabra is a pioneering innovator of new sound experiences from wired to wireless.

FEATURED CONTENT

When Life Gives You a Wake-Up Call

Digitally Enhance Customer Service. Don’t Fully Automate It.

Intelligent Audio Solutions that Fit Your Busy Life

CONTENT Taking Sound to a Whole New Dimension Nudging Your Way to Less Office Noise and Increased Productivity With Latest Upgrade, Joining the Team Makes More Sense than Ever New Technologies Find a Voice: and It’s Ours Forget Looking, Listen to What’s in Your Blind Spot Why We Can’t Escape Noise, and Why That’s a Good Thing Get S#!T Done: How to Hack Productivity Unlocking the Power of Conversation Jabra Xpress for Windows The Power of Conversation Jabra Engage Product Video Jabra Engaged Series: Evolved to Be the World’s Most Powerful Headsets

15 www.jabra.ca

Back to Table of Contents 3M

The experts in screen privacy

ABOUT US 3M is a leader in visual privacy protection. Our advanced microlouver technology “blacks out” side views with world class effective privacy. See your screen with crisp image clarity, while prying eyes beside you see only a black or gold screen. That is why people worldwide trust 3M Privacy Products to help keep their private information …private.

FEATURED CONTENT

Five Expert Tips for Improved Data Protection and Privacy

Top 5 Reasons Visual Privacy Matters

Protecting Your Data: 3 Reasons to Think Beyond Cybersecurity

CONTENT Do Privacy Filters Compromise Screen Display Quality? Case Study: Global Beverage Company Take the Risk out of Your Key Risk Areas Markets Needing Privacy 3M Brand Science Helps Keep Visual in the Dark Visual Hacking Exposed

16 www.3mcanada.ca

Back to Table of Contents C2G

As a brand of Legrand, C2G now has a broader depth of product offerings and solutions for every customer.

ABOUT US C2G brings a complete portfolio of products and solutions including Audio/Video & PC, Data Connectivity, Physical Infrastructure, and Power Management—all designed for installation in data centers, networks, and work spaces.

FEATURED CONTENT

5 Facts About the Cleanliness of Your Fiber Cables

What is the Difference Between Continuous and Discontinuous Shielding?

4K and 8K: What’s the Difference?

CONTENT Thunderbolt 3 Basics Vertical Wall-Mount Cabinets Legrand: Simple is Better C2G Global Footprint C2G Simplified Product Reference Guide Cabling Disasters and What Causes Them Custom Power Cords: Quoted, Developed, Delivered Avoiding Cabling Disasters Take Back Your Desktop With a Slim Desktop Power Center New Infrastructure Hardware Must Suport the Age of Digital Buildings Data Center and Network Infrastructure Catalog Racks and Cabinets Portfolio Mobility and Connectivity Portfolio Who Is Legrand North America

17 www.C2G.com

Back to Table of Contents POLYCOM

Unleash the Power of Human Collaboration

ABOUT US Everything we do at Polycom is to help you unleash the power of human collaboration. That’s our sole focus. Our promise is to create experiences that push the greatness of human collaboration forward and make you and your teams more successful.

FEATURED CONTENT

Audio Innovations in Polycom RealPresence Group Video Solutions

Polycom RealPresence Group Series Overview

Skype for Business with RealPresence Group Series

CONTENT Video Innovations in Polycom RealPresence Group Video Solutions Content Innovations in RealPresence Group Video Solutions Polycom Trade-in Program for Microsoft LPE Phones Guide to Polycom Pano Polycom Trio 8800 Datasheet Polycom Video Trade-in Promotion for Polycom Channel Partners Top 10 Reasons to Upgrade Your Conference Phone Polycom Pano Datasheet Polycom Trio 8500 Datasheet

18 www.polycom.ca

Back to Table of Contents PLANTRONICS

Empower professionals with wearable solutions

ABOUT US Plantronics’ Brand is built on 50+ years of headset innovation, consistently adding value for our customer and our sales partners alike

FEATURED CONTENT

Plantronics Hardware: Managing Noise

Actionable Insights

Empowering the Mobile Worker

CONTENT Actionable Insights: Use Cases Behind the Scenes: Voyager 3200 Series Design Behind the Scenes: Voyager 8200 UC Design IT Challenged to Support Growing Number of Remote Workers Charge on the Go Developing a Humanized Customer Experience Around the World The New Contact Center Why Plantronics Will Exceed Your Expectations Plantronics Unified Communications Portfolio Plantronics Unified Communications Case Study

19 www.plantronics.com

Back to Table of Contents 9 EPSON

Exceed Your Vision

ABOUT US Epson is a leading manufacturer in the printer, professional imaging, projector, scanner, system devices, and factory automation categories.

FEATURED CONTENT

Epson Document Scanners | Take the Tour

Epson WorkForce Printers | Take the Tour

Case Study: University of Nevada, Las Vegas

CONTENT Case Study: JBM Tax & Bookkeeping Services Captivating Crowds: Considerations for Projection Mapping Using Projection to Create Unforgettable Brand Experiences Manage the Business, Not the Printer Make Secure Printing a Standard in Your Business An Inside Look: What You Need to Know About Lamps vs. Laser Projection How Universities Are Using Wearable Technology Today How Color Can Help You Communicate How to Excel with Unified Presentations Essential Guide to EdTech Trade Shows What Are the Differences in Product Label Types for Packaged Goods? Case Study: Warner Music Group How Does Display Size Impact Productivity? Case Study: Cirra Systems Case Study: Climb Real Estate

20 www.epson.ca

Back to Table of Contents LOGITECH

VIDEO CONFERENCING FOR EVERY SPACE

ABOUT US Logitech is transforming video conferencing by offering an easy and affordable way to collaborate, with crystal-clear audio and razor-sharp video. Logitech products deliver unparalleled value, enhancing and improving productivity at a fraction of the price of competitors.

FEATURED CONTENT

Four Reasons Your Business Needs Videoconferencing

Step into the Future of Meetings

Logitech Takes Video Conferencing to the Next Level

CONTENT Logitech Crayon and Logitech Rugged Combo 2 for iPad SmartDock Is Now Better than Ever Logitech Meeting Is Now Certified for Google Hangouts McLaren Searches for the Best Racing Talent in eSports A Camera That’s Actually Designed for Huddle Rooms What’s New in the New Landscape of Work Baby Boomers: Please Don’t Retire! Introducing Our New Flagship Keyboad Logitech MX Sound Transforms the Audio Experience at Your Desk Creating the Optimal Environment for Simple and Effective Meetings Today’s Huddle Room Experience Case Study: Dealogic Evaluation of Logitech Meetup Video Conferencing for Any Meeting Room

21 www.logitech.com

Back to Table of Contents ZEBRA

Zebra makes businesses as smart and connected as the world we live in

ABOUT US Zebra builds tracking technology and solutions that generate actionable information and insight, giving companies unprecedented visibility into their businesses.

Zebra’s extensive portfolio of solutions give real-time visibility into everything from products and physical assets to people, providing very precise operational data not only about where things are, but what condition they are in. This allows business leaders to use data to make better, more informed decisions, respond in real-time, and ultimately help businesses understand how they work, and how they could work better.

FEATURED CONTENT

Zebra Technologies Hospitality Study Webinar

Modernize Your Warehouse and Supply Chain Communication

Bringing Retail Technology to the Wholesale Sector

CONTENT You Can Empower Your Mobile Staff with Zebra Technologies How MHE Equipment Has Transformed the Modern Forklift On Top of its Game with Zebra Technologies Are Your Industrial Printers up to the Job? Mobile Technology in the Retail Industry: Top Apps Zebra Hardware: Odyssey Case Study Enabling the Smart Warehouse Where Will the Workforce Mobility Revolution Take You?

22 www.zebra.com

Back to Table of Contents VIEWSONIC

See the Difference

ABOUT US ViewSonic has a 30-year history of delivering superior support for the channel, winning channel awards year after year and a world leader in display technology. We’re committed to relationships that drive growth, innovation, and customer satisfaction without compromise. From our worldwide network of distributors and resellers, to customers that include some of the world’s most well-known brands, we’ve worked hard to earn the loyalty and respect of our business partners. We pride ourselves on our unparalleled commitment to our partners. Time and time again, we have been recognized as one of the best and easiest vendor partners to work with!

FEATURED CONTENT

Using Technology to Deliver Engaging Feedback

Finding the Ideal Front-of-Classroom Interactive Display

Curved Monitor Benefits for Unique Applications

CONTENT Evaluating Color Performance in a Professional Monitor Classroom Safety with ViewBoard IFPs ViewSonic Launches Its Chromebox ViewSonic Delivers Eye-Catching Signange for Public Spaces ViewSonic Introduces New Professional and Enterprise Monitors ViewSonic SCt25 Immune to Meltdown and Spectre Threats ViewSonic Boosts its SCt25-Based Raspberry Pi Thin Client Efficient Dual-System Switches for Pro Monitor Users The Benefits of Color Calibration for Pro Monitor Users Simple, Enterprise-Grade Collaboration

23 www.viewsonic.com

Back to Table of Contents AXIOM

The OEM Alternative.

ABOUT US Not only do we manufacture tier 1 quality products, but we have the best customer service in the industry.

FEATURED CONTENT

Axiom Transceivers: the OEM Alternative

BendnFlex Fiber and Copper Cables

24 www.axiomupgrades.com

Back to Table of Contents SAMSUNG

Powerful products that work for your business.

ABOUT US Samsung Electronics Canada inspires Canadians to reach their full potential through a transformative ecosystem of products and services that deliver innovation and distinct design to every aspect of their connected lives. The company is redefining the worlds of TVs, , digital signage, virtual reality, wearable devices, and tablet. In 2017, Samsung was ranked No. 6 in Interbrand’s “Best Global Brands” list and named one of the top 10 Most Influential Brands in Canada, based on a study by Ipsos Canada.

FEATURED CONTENT

Samsung at InfoComm 2018: Highlights

The Game-Changing Samsung Flip Smart Display

Why Educators Will Flip over a New Kind of Smart Board

CONTENT Modernizing Meetings: Conference Room Technology Digital Flipcharts Take the Pain out of Office Collaboration 5 Tricks for Working Smarter with Your Phone Driving Collaboration in the Digital Office Is Samsung Knox the Most Secure Phone? What You Need to Know About Visual Communications Technology How to Choose the Right Digital Signage Mounts for Your Project Retail Digital Signage: Enhance Storefronts and Attract Customers

25 www.samsung.com

Back to Table of Contents NUANCE

Work Better, Faster & Smarter

ABOUT US Recently named “Best PDF Editor” by PC Advisor, Nuance® Power PDF is the ultimate PDF converter. Perfect for the individual or the enterprise, Power PDF lets you create, edit, annotate and share PDF documents. Power PDF is exceptionally easy to use and comes at a fraction of the price you’d expect. There’s a reason why two-thirds of the Fortune 100 trust Nuance solutions.

FEATURED CONTENT

Power PDF Advanced

Create Better Customer Experiences Using the Power of PDF

PDF Gone Wrong and How to Make It Right

CONTENT Power PDF Advanced Messaging Guide Comparatif de Solutions PDF PDF Solution Comparison Mobility Trends: Real-Time Dictation Improves in Field Reporting Making CAD/RMS Systems More Intelligent Achieve Even More with the Right PDF Solution Assistants Here, Assistants There, Assistants Everywhere The Impact of Improved Documentation Productivity The Positive Outcomes of Documentation Productivity Transforming Documentation by Voice Nuance Dragon Law Enforcement Brief Nuance Software: Migrating Business Users Dragon Professional Individual

26 www.nuance.com

Back to Table of Contents SOLARWINDS

We’re Geekbuilt™

ABOUT US Developed by network and systems engineers who know what it takes to manage today’s dynamic IT environments, SolarWinds has a deep connection to the IT community.

The result? IT management products that are effective, accessible, and easy to use.

FEATURED CONTENT

SolarWinds NPM: Your Complete Network Monitoring Solution

For Every IT Pro, There’s a Success Story Waiting to Be Told

Applications Aren’t Islands

CONTENT Disaster Recovery - the Postmortem Managing the Invisible IoT Network A Three-Step Approach to Enhanced Security Compliance Hybrid IT and Cloud Adoption: with Great Risk Comes Great Reward Disaster Recovery: Time to Create Our Plan Out of Office: Planning the Migration to Office 365 Get Your Cisco ASA Firewall Under Control Monitoring Microsoft Office 365 with SAM PerfStack Real-Time Polling: Because Time Is the Only Constant SolarWinds Orion Platform Portfolio Thou Shall Not Pass… I Think? Why Is a Database Performance Analyzer a Smart Investment

27 www.solarwinds.com

Back to Table of Contents MOBILEIRON

MobileIron is the secure foundation for modern work.

ABOUT US MobileIron is the secure foundation for modern work. Modern work enables employees to make better, faster decisions by using cloud services and mobile experiences. Only MobileIron provides cloud and endpoint security to secure your data on the devices, clouds, and networks you own—and on the ones you don’t.

FEATURED CONTENT

Five Steps to Executing Mobile Threat Defense Strategy

Securing MacOS in the Modern Work Era

Cloud Best Practices: Audit Checklist for Endpoint Security

CONTENT Going Beyond Passwords with MobileIron Authenticator Part 1: MobileIron and Microsoft InTune Case Study: Perkins Coie Data Protection and Agile Management for Windows 10 and macOS Desktops Protect Your Company Data from Mobile Threats Secure Cloud Services on Mobile MobileIron Access Solving Office 365’s Multi-Identity Crisis on iOS One Android Device, Two Modes: Managed Device With Work Profile The Biggest Mobile Security Risk? Users not Installing the App Practicing Safe Security with iOS 11 and Office 365 The New Normal: IT Says “Yes” to iOS Android – Ready for the Enterprise Got a New Mobile Device? Here are Five Ways to Protect It. Queensland Police Services: iPads and MobileIron, A Modern Work Success Story

28 www.mobileiron.com

Back to Table of Contents TENABLE

Empower all organizations to understand and reduce their Cybersecurity Risk

ABOUT US Cybersecurity is one of the existential threats of our time. New types of connected devices and compute platforms, from Cloud to IoT, have exploded the cyber attack surface. And more tools collecting more data doesn’t equate to actionable insight for the CISO, C-suite and Board of Directors. The old way of simply scanning on-premises IT devices for vulnerabilities is no longer enough. It’s time for a new approach.

Today, 24,000 organizations around the world rely on us to help them understand and reduce cybersecurity risk. Our goal is to arm every organization, no matter how large or small, with the visibility and insight to answer three critical questions at all times: Where are we exposed? To what extent are we exposed? Where should we focus to reduce our exposure?

FEATURED CONTENT

The Need to Understand & Manage Cyber Risk

Leveraging the Cloud to Achieve Visibility, Tracking, and Security

10 Steps for Effective Vulnerability Management

CONTENT Introducing a More Powerful Plugins Search Many Consumers Lack Understanding of Basic Cyber Hygiene Cyber Exposure: the Next Frontier for Security Three Reasons Why Dev-Ops Is a Game-Changer for Security Maintain Your F!#K Systems! A Mantra for IT Professionals Tenable Vulnerability Management

29 www.tenable.com

Back to Table of Contents RAPID7

Rapid7 transforms data into action, empowering IT and security professionals to progress and protect their organizations.

ABOUT US The Rapid7 Insight platform is the first to unify solutions for vulnerability management, user behavior analytics (UBA), SIEM, IT log analytics, and application security.

FEATURED CONTENT

The Four Pillars of Modern Vulnerability Management

Rapid7 Insight Platform Security

Vulnerability Management Buyer’s Guide

CONTENT How to Streamline Endpoint Detection and Response How Security Automation Helps You Work Smarter Mastering Application Security Basics Matters Here’s a Better Anti-Phishing Strategy Why EverCore Invests in InsightVM Vulnerability Management Market Disruptors Live Vulnerability Management & Endpoint Analytics Transforming Data into Answers 7 Best Practices for Cybersecurity How to Phish Your Business 2018 National Exposure Index

30 www.rapid7.com

Back to Table of Contents TECHSMITH

TechSmith makes it simple for everyone to create high-quality screenshots, screencasts, and videos.

ABOUT US TechSmith is the #1 Company for Visual Communication Software. Join over 30 million professionals around the globe that use TechSmith software to show off a product, teach a course, train others, and communicate in a faster, more engaging way.

FEATURED CONTENT

Camtasia 2018 Upgrade

Skip the Boring Email, Show Your Results with a Screencast!

YouTube vs. Vimeo: What’s the Difference?

CONTENT TechSmith Will Be at Content Marketing World 2017! Get Your Point Across Quickly with Visual Content Intelligent Content Practices in Video and Image Creation How to Create a Product Demo Video Strategy that Drives Results What Online Video Platform Is Best for Screenshots Video Marketing in the Problem-Aware Stage Deliver Outstanding Customer Service with Screen Recording How Digital Learning Can Help Solve These Training Challenges 6 Ways to Work Smarter and Faster with Visual Communication 3 Reasons to Start Using Video in Your Business Think the Snipping Tool Is Good Enough? Boost Clarity of Communication with Snagit Upgrade for the Latest in Camtasia How Can Your Organization Use Camtasia

31 www.techsmith.com

Back to Table of Contents

NITRO

Productivity Unleashed™

ABOUT US The Nitro Productivity Suite delivers end-to-end workflow efficiency and accelerates document workflows by combining powerful PDF productivity tools with lightweight eSignature capabilities, rich data insights, and simple user management. Available at a fraction of the cost and complexity of other solutions, the Nitro Productivity Suite cuts costs while enabling businesses to equip more—or, in many cases, all—of its knowledge workers with the necessary PDF and eSignature tools to reduce printing and advance digital transformation.

FEATURED CONTENT

How to Win at Change Management

Evaluating Document Productivity Software

Delivering on Digital Demands

CONTENT The Nitro Productivity Suite: FAQs What’s New and Blog-Worthy in Digital Transformation Crucial Skills, Key Leadership Traits and Empowered Businesses 6 Reasons Standardizing Your Software Is Essential Are You on the Road to Better PDF? The 4 Document Collaboration Tools You Should Be Using 4 Productivity Tips to Transform Your Workday Printing to PDF with Windows 10? Use Nitro Instead Nitro Modern Change Management Fulfilling the Promise of the Digital Workplace Sign of the Times Deciphering Digital Transformation 7 Reasons Why the Fortune 500 Choose Nitro

32 www.gonitro.com

Back to Table of Contents LOGMEIN

We unlock the potential of the modern workplace.

ABOUT US Simplifying how people interact with each other and the world around them to drive meaningful insight, deeper relationships and better outcomes for all has helped LogMeIn grow to become one of the world’s top 10 SaaS companies with a leadership position in every one of our markets.

FEATURED CONTENT

The Psychology of Passwords

Here’s How to Know When You’ve Struck Meeting Gold

The Easy Way to Create a Personal Meeting Room

CONTENT Six Ways to Come Up with a Winning Webinar Topic Debunking Internet Safety Myths Going Global: How to Conquer Support Across Continents Can Chatbots Really Be an Agent’s New BFF? What Matters Most in a Remote Support Solution

33 www.logmein.com

Back to Table of Contents CARBONITE ™

Data protection solutions for Physical, Virtual or Cloud environments.

ABOUT US Carbonite provides data protection solutions for businesses and the IT professionals who serve them. Our product suite offers a full complement of backup, disaster recovery, data migration and high availability solutions for any size business in any location. More than 1.5 million customers around the world depend on us and our partners to protect their data from hardware failure, natural disasters and cyberthreats like ransomware and malicious hackers. We’re currently protecting more than 160 petabytes of digital information for our customers, and it’s all supported by a global infrastructure.

FEATURED CONTENT

IT Skills Shortage: How Bad Is It?

How to Disaster-Proof Critical Data

Cloud Migration Technical Guide

CONTENT Computrade Malaysia Moves 2 TBS Between Clouds With Carbonite Migrate Cybersecurity Fears Drive Increase in 2018 IT Budgets New Podcast Investigates History’s Most Notorious Data Breaches What’s New in Carbonite Availability? DRaaS Levels the Playing Field Availability Onboarding Review

34 www.carbonite.com

Back to Table of Contents IVANTI

UNIFIED IT MANAGEMENT SOFTWARE SOLUTIONS – The Power of Unified IT

ABOUT US Ivanti is changing the IT landscape -- breaking down IT silos with increased visibility, shared data, and automated processes. We’re helping customers respond to user demands and market changes, comply with regulations, and secure the entire organization -- all while reducing costs.

We call it the Power of Unified IT.

FEATURED CONTENT

Five Ways to Modernize IT Service Management

Selling Ivanti for Healthcare

8 Scariest Stats About Ransomware

CONTENT Frequently Asked Questions About the Unification of IT Ivanti Product Newsletter Blog for June 2018 New IT Security Webinar: Learning from Atlanta Forrester Study Uncovers the Value in Ivanti Endpoint Security Solutions Want to Make IT Great? It’s All About Culture

35 www.ivanti.com

Back to Table of Contents OKTA

Start with Okta. Go anywhere.

ABOUT US Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the world’s largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, Flex, News Corp, Dish Networks and Adobe trust Okta to work faster, boost revenue and stay secure. Okta helps customers fulfill their missions faster by making it safe and easy to use the technologies they need to do their most significant work.

FEATURED CONTENT

Challenges of Identity and Mobility for Office 365

Let’s Finally Say Goodbye to Passwords

Making the Multi-Factor Authentication Transition

CONTENT Cover your pASSword: Add PassProtect to your Web Browser

36 www.okta.com

Back to Table of Contents APC

Certainty in a Connected World.

ABOUT US Companies around the world and within every industry rely on products from APC to keep their data centers up and running. Our uninterruptible power supply solutions, data security, and surge protector options work hard for you when maximum availability and guaranteed uptime is non-negotiable. Choose the battery backup and data protection built to ensure business critical equipment and applications are never at risk. To find the products you need, start with our power supply calculator for business solutions.

FEATURED CONTENT

Deploying Micro Data Centers at the Edge

Rethinking Data Center Resiliency at the Edge of Your Network

Connected Smart-UPS with APC Smart Connect

CONTENT Lithium-Ion UPS Batteriest Must Meet Stringent Safety Standards How an APC Battery Can Significantly Cut Your TCO Edge Resilience Is Resilience For the Whole IT Environment How to Pick Out the Right UPS for Your Home or Business IoT to Drive Unprecedented Banking Innovation

37 www.apc.com

Back to Table of Contents SUNGARD

Transforming IT for Resilient Business

ABOUT US Uniquely providing integrated production and recovery IT to reduce risk, minimize complexity and help businesses reap the value of digital innovation as they take on changes every day.

FEATURED CONTENT

How Businesses Are Improving DR Plans After 2017

Hosted Private Cloud with Dell EMC and Vmware

4 Ways Resilient Businesses Handle Hacks

CONTENT Sungard AS Cloud-Based Recovery for AWS Who Needs Hosted Private Cloud? Gartner Magic Quadrant Managed AWS Cloud Recovery Solution: a Better Mousetrap? Find the Perfect Infrastructure Solution for Each Application

38 www.sungardas.com

Back to Table of Contents