<img src="http://www.cloudtracer101.com/15158.png" style="display:none;">

Welcome to the Datrix Blog

Nexthink Announces Partnership with Datrix

Nexthink, the unique provider of End-user IT Analytics, today announced a partnership with Datrix, a specialist infrastructure integrator. The partnership integrates Nexthink’s end-user IT analytics with Datrix’s support and service offerings.

By adding Nexthink’s end-user analytics to its existing portfolio, Datrix will be unique in its ability to deliver infrastructure visibility from layers 0 to 7 of the OSI model. The partnership will give both organisations the industry’s most compelling IT offering to CxO level, and allow Nexthink and Datrix to offer collective customers significant improvements in efficiency and productivity throughout their organisations, driven by improved visibility and significant time savings in their IT departments.

Topics: Nexthink

Unify Raises Industry Benchmark for Communication & Collaboration

Datrix partner Unify announces general availability of latest version of OpenScape Enterprise, enhancing user experience, security and reliability

Unify, a leading communications software and services firm, today announced general availability of the latest version of the industry-leading OpenScape Enterprise, raising the industry benchmark for communication and collaboration technology. Key updates to OpenScape UC and OpenScape Voice include an intuitive user interface, with security and reliability improvements to ensure today’s “Anywhere Workers” can easily collaborate to solve problems and achieve results.

Topics: Unify

Extreme Networks Listed as a Champion in Info-Tech Research Group's Network Access Control Market Vendor Landscape

Datrix strategic partner Extreme Networks today announced that it has been listed as a Champion in Info-Tech Research Group's Network Access Control (NAC) Market Vendor Landscape

NAC technology is an essential part of the enterprise network architecture that helps protect corporate data by using management and security tools to proactively prevent unauthorised users, compromised endpoints, and other vulnerable systems from gaining network access. 

Topics: Extreme Networks