Category Archives for "Managed Services News"

Aug 17

A Big Miss: Just 21% of Organizations Use Cloud Access Security Brokers

By | Managed Services News

A new Cloud Security Alliance report gives MSSPs a road map for helping customers better protect their cloud resources.

Eighty-three percent of organizations say they need to improve their cloud security. At the same time, half of respondents don’t have the staff or expertise to do the job. And, to top it off, few of these organizations use cloud access security brokers, or use them to their fullest potential for overall cloud security.

That combination sets the stage for managed security service providers to step in, especially during COVID-19. Many employees continue to work from home, accessing cloud resources from consumer-grade devices and connectivity. This further pressures any cloud security measures organizations have in place. And even though IT teams know about those pitfalls, few have implemented cloud access security brokers.

Those findings come from the Cloud Security Alliance in a new report commissioned by CASB vendor Proofpoint.

Cloud access security brokers ensure policy enforcement. They sit between the cloud user and the cloud provider to monitor and enforce security as people access resources in the cloud. A CASB can reside on premises or in the cloud.

CASB Disparity

Yet, despite the benefits, only 21% of organizations use cloud access security brokers, according to “Survey Report: Evolution of the CASB.” Fifteen percent continue to evaluate vendors. Thirteen percent remain in the implementation stage and another 13% are giving at least one CASB a pilot test. The majority of organizations the CSA polled, though, still are conducting initial research on CASBs (27%).

That’s the case even though CASBs help combat problems, including shadow IT. These under-the-radar, employee-driven technology deployments threaten cloud security because they rarely adhere to policy. That opens the door for data leaks and bad actors. In fact, last year, Skyhigh Networks found that of the 1,935 different cloud services in use within the average enterprise, the IT department did not know about most of them. CASBs offer important protections, perhaps especially with MSSPs steering process.

Proofpoint's Itir Clarke

Proofpoint’s Itir Clarke

“Organizations worldwide are looking to MSSPs to help them evaluate CASB vendors and solutions, and integrate CASB into their daily security operations — especially now that more and more organizations are remote,” Itir Clarke, senior product marketing manager at Proofpoint, told Channel Futures. “MSSPs are vital partners as organizations work to understand cloud security risks, define their CASB use cases and create a cloud security road map.”

That road map, Clarke added, ensures that organizations prioritize the cloud apps and data repositories to secure first. It also helps determine which cloud users are at risk and how to protect them.

CASBs prove vital to the road map. The thing is, CASBs have gone underused, said Hillary Baron, lead author and research analysts at the Cloud Security Alliance. Three areas where this stands out the most?: compliance, data security and threat protection.

Cloud Security Alliance's Hillary Baron

Cloud Security Alliance’s Hillary Baron

“It’s clear that training and knowledge of how to use the products need to be made a priority if CASBs are to become effective as a service or solution,” Baron said.

Why a CASB?

Of the organizations that do use CASBs, the top five reasons they do so are to:

  • Monitor use behavior (55%)
  • Detect unauthorized access (53%)
  • Classify data (48%)
  • Spot compliance gaps (42%)
  • Pinpoint data location (41%)

Even so, IT teams are missing chances to use CASB functionality for complete cloud security, the Cloud Security Alliance notes. Namely, security professionals are not taking advantage of CASBs’ “device categorization” capabilities, the report said.

“This could be due in part to a great focus on the user behavior,” the authors wrote. Still, “with the growth of user devices and the IoT, device categorization could see more use in the future.”

It seems fair to predict that MSSPs will be instrumental to that effort.

There’s another big possibility MSSPs should consider: Too many IT teams struggle to use CASBs for multicloud visibility across IaaS and PaaS consumption. One reason could go back to inadequate staffing or expertise. Another, the Cloud Security Alliance said, could tie to excess focus on SaaS resources.

“Organizations may be seeking to identify sprawling data in various unsanctioned SaaS services,” the authors wrote.

The ultimate takeaway, of course, is that organizations need MSSP guidance and skill.

The Cloud Security Alliance surveyed 216 IT and security professionals across the Americas, APAC and EMEA over two months to evaluate the use of CASBs for cloud security.

Aug 17

Best Practices for Protecting the Network Edge Include SASE

By | Managed Services News

The SASE model for remote access and security could enable the next phase of digital transformation for an MSP’s customers.

The increased use of remote and cloud-based resources resulting from the COVID-19-fueled work-from-home trend has highlighted another trend that was already underway before the pandemic: The network edge isn’t what it used to be.

According to a 2019 Gartner report, “The Future of Network Security is in the Cloud,” the entire concept of the network perimeter has rapidly evolved. “The enterprise perimeter is no longer a location,” Gartner says. “It is a set of dynamic edge capabilities delivered when needed as a service from the cloud.”

The data center isn’t at the center of connectivity requirements anymore as companies shift to a dynamic access model. More users, devices and applications are located outside the organization than within.

According to Gartner, complexity, latency, and the need for decryption and inspection of encrypted traffic will increase demand for the secure access service edge (SASE), which consolidates networking and security-as-a-service capabilities into a cloud-delivered service.

That’s because digital transformation is built on anytime/anywhere access to applications and services. Building out from the data center can actually inhibit digital progress.

To ensure low latency, businesses will need edge computing capabilities that are distributed and operate closer to systems and devices.

That’s where the value of SASE offerings will be critical.

According to Gartner, “SASE offerings will provide policy-based software-defined secure access from an infinitely tailorable network fabric. Security professionals can precisely specify the level of performance, reliability, security, and cost of every network session based on identity and context. The emergence of SASE will create a significant opportunity for security and risk professionals to enable the changing security access requirements of digital transformation, providing secure access capabilities to a variety of distributed users, locations and cloud-based services.”

Inspection engines and algorithms will move closer to end users and edge devices. Endpoint identities will include branch offices, IoT devices and individual users operating a mobile device. All of these identities need access to network capabilities across the network.

According to Gartner: “Secure access decisions must be centered on the identity of the entity at the source of the connection (user, device, branch office, IoT device, edge computing location and so on).”

A SASE approach enables security teams to deliver secure network security services consistently, no matter where the network access occurs.

These solutions require robust toolsets. Barracuda, for example, has introduced Barracuda CloudGen WAN, a secure, global SD-WAN service built on Microsoft Azure. Using CloudGen WAN, companies and service providers can create a practical SASE solution in the public cloud.

In a recent report, “Secure SD-WAN: The Launch Pad into Cloud,” Barracuda found that SD-WAN is being used by more than half of organizations that have added security to the public cloud to address lack of access control and backhauling traffic.

CloudGen WAN is a SaaS service deployed directly from the Azure Marketplace for as many regions as needed and administered centrally in the CloudGen WAN portal for all office locations and remote endpoints.

With SASE, organizations can reduce security complexity and costs by consolidating secure access services. SASE also enables new applications and services because they are securely available to partners and contractors. There is also lower latency and greater transparency for users.

SASE also enables zero-trust network access because access is based on user/device identity.

SASE adoption will be disruptive.

Gartner provided several recommendations for

Aug 17

COVID-19 Presents Channel Opportunities Around Edge Computing

By | Managed Services News

Managing and securing new distributed environments brings opportunity for channel around edge computing.

There has been much talk as to how technologies like IoT and 5G will impact where and how companies collect and process data.

The answer is that their growth is fueling the move away from centralized data processing. It is shifting to where data is increasingly generated, processed and consumed — the “edge” of the network. Indeed, Gartner has stated that by 2025, 75% of enterprise data is expected to be created and processed at the edge.

However, the opportunity for the channel around edge computing may arrive much earlier than that. Forrester analyst Jay McBain says the move to remote working during the early stages of COVID-19 in March fueled an increase in procuring and provisioning edge products for 72% of channel partners.

Now in August, McBain says customers are talking about automation, cloud acceleration, security, compliance and governance of this new edge topology.

Forrester's Jay McBain

Forrester’s Jay McBain

“We have business professionals at home on a consumer notebook, on a consumer network, going through a consumer router, shared with their neighbors getting access to enterprise class data and systems,” he said. “Securing this remote topology at every layer from physical security to edge authentication, network and web, applications and data is top of mind and a growing opportunity for the channel.”

Where to Begin

So where should the channel start with edge computing? For UK channel firm EfficiencyIT, the opportunity lies in pinpointing the customer’s exact business needs.

“Consultancy is crucial, and there isn’t one single answer to each of our customers’ problems; everyone is different and that’s the approach we take,” said managing director Nick Ewing. “Rolling out edge computing isn’t the same as selling PCs. Every data center is sized differently; it’s housed in a different location and uses different technologies. We go in, identify the pain points and help them overcome them. Usually it’s to do with knowing what’s happening with their IT and when.

“Customers are pretty good at identifying what they need their technology to do,” Ewing added. “They are less comfortable at being able to identify exactly what they have, where it’s located and how it can best be deployed and managed to support their business. That’s where we really find our sweet spot, helping our customers visualize their IT environments so they can monitor and manage both their local IT and wider edge compute.”

2 Types of Partners

Unsurprisingly, a growing number of vendors are recognizing the move to edge computing and are tailoring their partner engagement accordingly.

Schneider Electric recently expanded its partnerships with Lenovo, Stratus Technologies and industrial software specialist AVEVA. It wanted to produce new reference designs and pre-integrated systems that address the convergence of IT and OT — a key market for edge computing.

Schneider Electric's David Terry

Schneider Electric’s David Terry

“Within that space there is a greater need for the skills of two different partner types, IT solutions providers and industrial systems integrators,” said David Terry, VP, IT channels, Schneider Electric, Europe.

As such, the firm has created an ‘Industrial Edge Community,” which allows the two groups to engage with each other and facilitate new business on IT/OT projects. It has also added a new edge module to its Opportunity Registration Program (ORP). So this offers partners greater margins and profits for …

Aug 14

Contactless Technology Attacks Threaten Individuals, Businesses

By | Managed Services News

Hackers know people are using their mobile devices now more than ever.

With COVID-19 related social distancing requirements, contactless technology like quick response (QR) codes are skyrocketing in popularity and frequency. But contactless technology also poses a threat to users less familiar with their risks and more curious to scan them.

Contactless technology attack vectors typically include QR codes, barcodes and magstripes on credit cards and ID cards. A hacker can embed a malicious URL containing custom malware into a QR code. It could then exfiltrate data from victims’ devices when scanned.

A malicious URL in a QR code could also direct to a phishing site. The site then encourages victims to divulge banking or other personal information, which the hackers could then steal.

To learn more about the threat posed by contactless technology, we spoke with Alex Mosher, MobileIron‘s global vice president of solutions. He also talks about how unified endpoint management (UEM) can help stop contactless technology attacks.

MobileIron's Alex Mosher

MobileIron’s Alex Mosher

MobileIron’s phishing protection for iOS and Android devices now detects and remediates phishing attacks across all mobile threat vectors.

Channel Futures: Have attacks involving contactless technology increased during the pandemic?

Alex Mosher: I don’t necessarily think there has been a greater volume of contactless attacks, but we’ve seen an increase in attacks across other mobile threat vectors during the pandemic. Hackers know that people are using their mobile devices – and in many cases, their own unsecured devices – more than ever before to connect with others, complete online payments and access corporate data. That’s why they are increasingly targeting mobile devices and applications with sophisticated attacks. I expect we’ll continue to see mobile attacks trend upward as the pandemic continues to surge.

CF: Do contactless technology attacks threaten both individuals and businesses? If so, how?

AM: Yes, contactless attacks threaten both individuals and businesses. A contactless attack on your mobile device could not only result in your personal information being compromised, but it could potentially weaponize that device against your company and result in sensitive corporate data being leaked. That’s why enterprises need to ensure mobile devices that have access to business resources are secure.

CF: Why are so many mobile users left unprotected from these types of attacks?

AM: It’s easy to manipulate users on mobile devices because people interact with mobile devices much differently than they do with laptops and desktops. For example, the mobile user interface prompts users to take immediate actions, while limiting the amount of information available due to small screen size. That’s why being able to stop attacks on mobile devices is incredibly important.

CF: Can MSSPs and other cybersecurity providers help prevent contactless technology attacks? If so, how?

AM: MSSPs and other cybersecurity providers need to help today’s companies rethink their security strategies to focus on the technology at the center of the everywhere enterprise: mobile devices. A mobile-centric zero trust security approach can provide the visibility and IT controls needed to secure, manage and monitor every device, user, app and network being used to access business data.

CF: How can UEM help protect against these types of threats?

AM: With UEM, organizations can achieve comprehensive control over their business data and employees can increase productivity. A UEM solution allows for continuous enforcement and protection of data, both on the device and on the network. Organizations can also build upon UEM with a mobile threat defense solution to detect and remediate mobile threats such as contactless attacks, even when a device is offline.

Network Security Startup Scores $40 Million in Funding

Perimeter 81, a secure access service edge (SASE) and network-as-a-service provider, has completed a $40 million Series B funding round led by Insight Partners.

The financing will help support Perimeter 81’s growth, and accelerate the company’s …

Aug 14

Be a Partner Your Customers Need During the Pandemic

By | Managed Services News

A few key steps can turn short-term customers into long-term advocates.

Neustar's Brian McCann

Brian McCann

No successful business operates in a vacuum. To meet the digital demands of today, organizations rely on vendors for everything. That means from simple storage solutions to complex digital ecosystems. In hindsight, the process of managing these customer relationships before the COVID-19 pandemic was relatively straightforward. Network security providers could focus on balancing cost and usability, the need for speed and the delivery of uninterrupted digital services. As long as you had the tools and analytics required to fulfill performance and security requirements, customers were satisfied.

However, like everything else, the pandemic has dramatically changed the relationship between service providers and their customers. As organizations have shifted their workforce and business channels to digital, our role in supporting those customers’ needs must shift, too.

Though being a great partner in a time of crisis does demand more, it is what clients need, and this extra effort turns short-term customers into long-term advocates. Here are some tips for how to best approach partnerships right now.

Be Quicker

Companies were already quickening the cadence of digital implementation before the pandemic. Now, digital strategies that might have mapped out over months or years have been replaced by initiatives that go live in a matter of days or weeks. Many initiatives that were until recently seen as a smart long-term play or a means to streamline efficiency and lower costs have suddenly become mission critical.

Executive teams are under extreme market pressure to digitalize business lines, and after witnessing successful examples from every industry over the last several months of scrambled rollouts executed quickly out of necessity, there’s an increasing willingness to move fast. Executives used to meticulously planned, phased and tested deployments suddenly face a dynamic where being overly careful may now be a recipe for failure, and getting it done quickly is the most prudent strategy. For many larger organizations, this represents a significant polarity shift to the standard IT orthodoxy.

Despite the will, many organizations don’t have the internal resources to execute right away. The only way to establish digital platforms quickly is through the support of third-party ecosystems. Leadership teams recognize this. Instead of focusing on what can be done internally, organizations are now looking to get the most they can out of partners.

Vendor partners need to be ready to implement solutions faster than ever. The perfect solution months down the road isn’t going to satisfy customers. Instead, drive lean and iterative development toward a minimum viable product.

Be Bolder

Digital transformation for many businesses was inevitable, but there was still a lack of urgency from management teams pre-crisis. The pandemic has changed that. Once-hesitant organizations leapt into action as uncertainty and volatility became the new normal.

As COVID-19 forces companies to embrace digital channels, now is the time to push for the bold digital efforts that will transform businesses for the better – especially if …

Aug 14

MSP 501 Flashback: Cloud Services Platform Vendor ZNet Technologies Thrives

By | Managed Services News

The 2019 MSP 501 Newcomer Award winner explains how it successfully diversified and is handling the pandemic.

ZNet Technologies, the 2019 Channel Partners MSP 501 Newcomer Award winner, perfectly timed the development of its cloud services platform.

The India-based company won the award last year after pivoting its business from hosting and domain services to cloud services. Starting in 2017, the company successfully productized and marketed its in-house cloud platform to customers. The product, RackNap, has helped grow the company’s business by automating cloud delivery for users.

That dramatic change in direction for ZNet is now paying dividends, senior VP and CEO Sabarinathan Sampath told Channel Partners. With COVID-19 affecting the world, business is even more hectic for the company due to its well-timed cloud platform.

The MSP 501 Newcomer Award goes to a first-time MSP 501 nominee that is shaking things up. Channel Futures chose ZNet Technologies for the 2019 award because of the dynamic path it took in its own digital transformation. Needing a better cloud services platform for its own use, the company developed one in 2014. When it worked well, the ZNet wisely decided to offer it to customers — and the strategy took off. With only a hunch, the company used its own digital transformation journey as a blueprint for the customers it serves.

Sampath, Sabarinathan_ZNet

ZNet’s Sabarinathan Sampath

In a Q&A with Channel Futures, Sampath talks about how ZNet Technologies is doing today in the aftermath of COVID-19.

Channel Futures: It has been a busy few years for the company. What are your thoughts about the progression? 

Sabarinathan Sampath: Looking back, I feel proud of what we have accomplished to date. Since we started in 2009, we had this goal of making ZNet a leader in the hosting and domain industry. But there were also challenges in this line of business that needed to be addressed to achieve the goal. So we wanted to expand our offerings. Around 2015, the cloud market was booming, and we thought to explore the opportunities in this market. Then, Microsoft gave us an opportunity to work as a cloud service provider partner. This was a completely new offering and really helped in building our reputation in the market. We then signed up with other cloud providers as well.

CF: That’s what led to your RackNap cloud services platform?

SS: Soon, the cloud demand started to rise, and we started facing challenges in selling cloud services and managing the operations. We knew we needed to reorganize the process. This is when we decided to productize our in-house software that we had built and commercialize this as RackNap. This cloud services delivery platform really helped us to streamline our business processes. We launched RackNap commercially in 2017.

CF: And after all these changes, value-added distributor RP Tech India acquired ZNet in February 2019?

SS: That acquisition paved new ways for our organization. We saw more growth by strengthening our partner network, and thus, we became a distributor of cloud services. We had the means and the know-how to empower our partner network to grow with us. Also, we signed up with Acronis, Alibaba Cloud and GlobalSign to sell their services as a distributor.

CF: Does your progress in such a short time surprise you?

SS: I am pleased to see the fruits of our hard work showing now. Even during COVID-19, we have not stopped. We are working hard to continue to service our clients. I am so impressed by how we …

Aug 13

Under-the-Radar Cloud News: Google Cloud, AWS, Azure, More

By | Managed Services News

We’re showcasing cloud news you’ll want to catch up on.

Channel partners have been slammed with COVID-19 deployments. It’s been easy to miss out on the latest cloud news. Here, we bring together some of the more under-the-radar cloud announcements you may want to know.

Synergy Research Group Cloud Infrastructure MarketFor instance, second-quarter cloud infrastructure spending reached new heights. The impetus? COVID-19, which surely comes as no surprise.

As organizations sent employees to work from home, they shifted IT spending to support cloud technologies for remote access. That added up to more than $30 billion in outlay worldwide, according to new figures from Synergy Research Group – $7.5 billion more than the same period a year earlier.

“As far as cloud market numbers go, it’s almost as if there were no COVID-19 pandemic raging around the world,” said John Dinsdale, a chief analyst at the research firm. “As enterprises struggle to adapt to new norms, the advantages of public cloud are amplified. The percentage growth rate is coming down, as it must when a market reaches enormous scale, but the incremental growth in absolute dollar terms remains truly impressive. The market remains on track to grow by well over 30% in 2020.”

Per Synergy, Amazon Web Services remains the leader, holding around 33% of market share. Microsoft Azure came in next at 18% for the third consecutive quarter. And Google Cloud Platform rose a little higher to 9%, Synergy said. Collectively, China-based cloud providers Alibaba, Tencent and Baidu now claim more than 12% of the global market, according to Synergy.

So take a few minutes away from your COVID-19 deployments to see what you’ve missed on the cloud front since the pandemic began. It’s all in the slideshow above.

Aug 13

Scale Computing HC3 Platform Adds Acronis SCS Security Services

By | Managed Services News

The two companies are expanding their existing partnership with broader security protections for public sector users.

Scale Computing is bolstering its HC3 hyperconverged computing platform for public sector customers by adding more Acronis security services.

Customers can now get the Scale Computing HC3 platform with new protection from Acronis SCS Cyber Backup 12.5 Hardened Edition. Scale already had a partner relationship with Acronis to provide other cybersecurity protections for non-public sector customers. Acronis is the parent company to Acronis SCS, which works only with public sector clients.

Scale Computing added the protection of Hardened Acronis SCS security services to better serve public sector customers. Many of those customers already use Scale Computing’s HC3 platform and needed the extra security.

Acronis SCS Cyber Backup 12.5 Hardened Edition is Acronis SCS’ flagship backup software for public sector users. Public-sector customers include federal, state and local government, public utilities, education, health care and nonprofit organizations.

The Hardened Edition is for public sector organizations that require the highest security for their workloads and users. That includes sensitive “no-internet” air-gapped environments, including supervisory control and data acquisition (SCADA) and industrial control systems.

Hardened Edition includes built-in active protection against ransomware and a wide range of data recovery protections and options.

Public Sector and Cybersecurity

For many public sector users, cyber threats are the biggest challenge they face, Alan Conboy, who works in the office of the CTO at Scale Computing, told Channel Futures.

Scale Computing's Alan Conboy

Scale Computing’s Alan Conboy

“They’re more likely to get hit by those kinds of things,” he said. “And to get help, they go to their channel partners.”

That’s why channel partners need the answer provided by the expanded partnership with the Acronis SCS Hardened Edition, said Conboy.

“They need a quick, cost-effective and technically-effective package that just stops the threat cold,” Conboy said.

“It takes the security to a new level,” said Conboy. “When the end user at a company clicks on a malicious file in an email, it blocks it and automatically reacts faster than the user knows what is happening.”

The latest deal with Acronis SCS extends the relationship between the companies to better serve public sector customers, he said.

The Partner Benefit

Scale Computing will offer both levels of Acronis security services to customers.

“Partners will be able to help customers find the right product for them,” said Conboy. “It deepens the protections that the channel partners can bring to the table easily and cost-effectively. It helps channel partners help solve today’s problems for customers.”

Scale Computing’s HC3 platform did not previously have these built-in protections for public sector users. The Acronis SCS product integrates directly into Scale Computing’s API stack to make the products work together seamlessly.

Dennis Hahn, an analyst with Omdia, said users need broader services to help them prevent ransomware and other attacks. Many public-sector Scale Computing HCI3 users may not have the deep IT skills of other operations, he said.

Omdia's Dennis Hahn

Omdia’s Dennis Hahn

“Obtaining an HCI product with the ransomware protection installed and configured properly provides piece of mind,” said Hahn.

HCI products like those offered by Scale Computing make sense for the edge, he added.

“When the IT equipment arrives, capabilities like ransomware protection can easily be provided as part of the full software stack. That makes deployment fast and easy,” said Hahn.

Aug 13

How Configr Relies on the Alternative Cloud

By | Managed Services News

The objective of alternative cloud platforms is simple—provide useful services and reliable support at a transparent price.

Alternative cloud providers are becoming popular for small and midsize businesses across the world, offering IT solutions that fit their needs, providing dependable customer support and not forcing any unnecessary features they’ll never use. The objective of alternative cloud platforms is simple—provide useful services and reliable support at a transparent price.

Linode prides itself on offering transparent and consistent pricing and a customer support team extremely technically qualified and available 24/7/365 with no tiers, no bots and no hand-offs. The “big three” public cloud providers–AWS, Azure and Google Cloud–can’t as easily make the same claim.

This mission is what made Linode the right choice for cloud services provider Configr. Founded in 2013 by Arthur Furlan and Felipe Tomaz, Configr serves customers throughout South America by democratizing cloud computing for agencies, freelancers and businesses of all sizes. One of Configr’s core values has always been the ability to simplify running a business in the cloud.

“Our clients are not cloud infrastructure experts,” said Felipe, Configr’s COO. “They are from industries like digital marketing or e-commerce that don’t typically have the knowledge or staff to install, configure and maintain their own cloud infrastructure. We provide technical and people expertise so they can focus on growing their business.”

The co-founders had worked with hyperscale cloud providers in the past and found the complexity, lack of transparency and high costs a challenge. For their business, they needed a cloud partner that could provide high-performance infrastructure at low, predictable rates coupled with a people-focused service approach.

Configr uses Linode Backups, Block Storage, Dedicated CPU and High Memory compute plans, allowing its customers to deliver highly reliable and scalable web applications. Configr has grown to hosting more than 3,000 servers with Linode.

Like Configr, many of your own clients don’t want, or need, the hassle of a large-scale cloud provider. They’ll end up with more tools and features than they need and a particularly generalized way of setting up and running the service.

“Linode offers us a great price point without a compromise in performance or forcing tools and features on us we don’t want,” said Arthur. “They also give us the service experience we need to help our customers grow.”

Simplicity is likely what your clients are asking for, and it is what alternative cloud providers like Linode offer. If you need an uncomplicated cloud services solution, consider making the switch to an alternative cloud provider like Linode.

Read the entire Configr story: “People-Focused Cloud Technology Delivers for Solutions Provider”.

Sam Smith is a Senior Customer Success Specialist at Linode, where he works with the company’s customers and partners, which include managed service providers, systems integrators and specialized service providers.

 This guest blog is part of a Channel Futures sponsorship.

Aug 13

Open Source Management Firm FOSSA Debuts First Partner Program

By | Managed Services News

The program was built to be flexible and with expansion in mind.

Open-source management company FOSSA on Thursday launched its first partner program for SIs, ISVs, VARs and cloud providers.

The FOSSA (Free and Open Source Software Analysis) Partner Program helps partners expand their open-source compliance and security management offers with a comprehensive enterprise solution.

The company also has appointed industry veteran Scott Andress as vice president of alliances. He has more than 20 years of enterprise channel leadership experience. He has held executive positions at Cloudera, Hortonworks, CSC and BEA Systems.

FOSSA's Scott Andress

FOSSA’s Scott Andress

“I took the role with FOSSA because I believe there is an explosive opportunity for open source scanning for compliance and security,” he said.

Andress most recently was Cloudera‘s vice president of global channels and alliances.

“The marketplace (customers) prompted the need for a partner ecosystem,” Andress said. “Our customers are looking for a vibrant ecosystem around open source compliance and security.”

FOSSA built the program with flexibility and expansion in mind, he said.

Straightforward Approach for Partners

“This program makes it very straightforward for partners to engage with FOSSA and we are eager to engage with the ecosystem,” Andress said.

There are several benefits that make open source software attractive to the enterprise, according to FOSSA. Those include cost, speed and flexibility. However, most enterprises rely on manual code reviews and spreadsheets to address license gaps and software vulnerabilities across engineering, legal and security.

FOSSA focuses on automating open source management workflow both within and outside the software development life cycle. This allows businesses to identify and mitigate risk, improve engineering efficiency, ensure code quality and maintain policy.

The FOSSA Partner Program gives partners a clear path to success. They provide customers with open source compliance and vulnerability management offerings.

“We launched FOSSA in 2018 as an open source project with developers in mind,” said Kevin Wang, FOSSA’s CEO. “With more than 1 million downloads, we realized that there was great potential for FOSSA to move into the enterprise. Launching the partner program is the next natural step in the FOSSA journey. We are so excited to have a channel veteran like Scott join our team to develop and execute on our partner strategy.”