Meeting the cloud security challenge with vendors and solutions available through Ingram Micro
Small to medium businesses are facing increasingly complex and ubiquitous cyber-security threats – but do not have the resources and expertise to deal with them. Cyber-criminals recognise this – which is why most cyberattacks today target businesses in this category.
Unfortunately, managing growing cybersecurity risks is becoming even more complex as small to medium businesses embrace trends such as mobility, digital transformation and the cloud.
However, these trends open up opportunities for channel partners to help businesses deploy a resilient, layered security architecture that can adapt to a dynamic threat landscape.
At Ingram Micro, we are well positioned to help the channel deliver value to small to medium business customers. We have 55,000 reseller partners in 45 countries, about 45 local marketplaces with more than 200 vetted cloud services managing about 25 million seats. We have 1,500 cloud specialists and 400 dedicated cloud associates.
In 2018, we introduced the ‘Cloud Awesomeness Roadmap’ to give our partners a framework and a centre of best practice to accelerate their cloud businesses. The roadmap helps partners assess where they are in their cloud journey and to plan for the future.
The evolving security landscape
Many of the security vendors that provide solutions through the Ingram Micro Cloud Marketplace [http://au.cloud.im] view security as a human problem. They also emphasise security is more about risk minimisation than prevention.
One of our vendors recently pointed out that businesses typically do not face one-off attacks – instead, malicious individuals and groups rely on a number of technologies and techniques to target businesses. Another vendor emphasised that IT security was a $93 billion industry reacting to a cybercrime ‘industry’ worth $4 trillion.
The scale of this ‘industry’ is due largely to its lucrative nature – analysts calculate the average return on investment of malware at 1,125%. Malicious actors are looking to achieve even greater returns by focusing on what one security specialist describes as ‘expensive fish’ – well-off businesses and individuals. These actors are also increasingly using malware that targets Apple’s operating systems, and many are moving from overt campaigns to more subtle approaches such as placing crypto-miners on computers to mine cryptocurrency without a user knowing.
One vendor recently noted out 61% of attacks targeted small to medium businesses – largely because the sector typically did not have IT or security departments to address the challenge. In addition, 64% of businesses were concerned about securing personal devices for company use. Some of the world’s largest and most dynamic security vendors recently detailed their companies’ credentials, technologies and programs to help partners address customers’ security challenges.
Independent consultant specialising in Microsoft
An independent consultant specialising in Microsoft recently pointed out that the vendor has a vast array of security technologies available to partners and customers from their cloud offerings, such as Azure Information Protection that embeds permissions inside documents.
The opportunity for a reseller is the fact this technology is not “magically” turned on for customers. Knowledgeable people need to go in and configure a policy or an option to monitor or report on it – so resellers can build services and specialisations around that capability.
Symantec – the largest pure-play security vendor, owner of 2,100 patents and the leader in five Gartner security magic quadrants – covers 175 million endpoints worldwide, from the consumer to the enterprise level. The business has 350,000 customers worldwide and focuses heavily on research and development. Over the last two years, Symantec has returned to a channel-first strategy, including moving direct customers back to the channel.
Symantec’s product portfolio covers a wide range of areas partners need to work across to help customers manage their security posture in a cloud environment, including endpoint protection and security, encryption and token management, data sovereignty compliance, and real-time and bi-directional data loss protection, as well as appropriate reporting and auditing tools.
Other areas include analytics and intelligence, access and authorisation, visibility and discovery across the network and endpoints through to the cloud and applications.
Endpoint security pioneer ESET – born in 1987 when two computer enthusiasts wrote a program to detect and eliminate a virus causing problems at a nuclear power plant – also described its plans to build on a 30-year legacy of elite cyber-protection. The business – which protects up to 650 million users worldwide – is ramping up construction in Slovakia of a development that will house its headquarters and in-house security team.
In 2017, the business became an official protector of Google Chrome and since 2018, has been a ‘challenger’ in the Gartner magic quadrant for endpoint protection platforms. The business’s technology principles include product reliability; a high detection rate, low performance impact and ease of use.
ESET provides value to the channel by delivering a portfolio of quality products; fast and easy deployment; low maintenance; a high retention rate and renewal protection; and effective partner enablement.
Its solutions for medium businesses include cross-platform, bundled security solutions with complete server email protection and two-factor authentication and endpoint encryption for protection of data and intellectual property. For smaller businesses, ESET provides bundled security solutions with cloud-based management and two factor authentication and endpoint encryption.
Cisco – one of the world’s largest security vendors, with 4% of the $93 billion industry – offers a wide range of security products, including Umbrella, which the vendor describes as the industry’s first Secure Internet Gateway in the Cloud.
The product uses Domain Name System to stop threats before they reach endpoints or the network; routes requests to risky domains for deeper URL and file inspection; and prevents connections to attacker’s servers if an infection does occur.
Even channel businesses that are not Cisco partners can deploy Umbrella with any other vendor – all they or their customers need is a connection to the internet.
All these vendors’ solutions are available via the Ingram Micro Cloud Marketplace. For more information, contact us at firstname.lastname@example.org