Category Archives for "Managed Services News"

May 26

Broadcom Partners Get New Expert Advantage Program

By | Managed Services News

Expert Advantage expands specialized services partnerships.

Broadcom partners now have access to Expert Advantage, an expanded global channel services partner program to drive growth across Broadcom Software solutions.

Expert Advantage expands specialized services partnerships to better serve joint customers and maximize their software investments. Broadcom recognizes that partners with highly specialized skill sets and localized expertise play a critical role in helping customers achieve their digital transformation and cybersecurity goals.

Cameron Sedgwick is head of global services and education for Broadcom Software. He said customers are looking for a strategic software partner, not a vendor, who takes an R&D-first approach to helping them solve complex challenges. Those include accelerating growth, optimizing business for efficiency and keeping everything protected.

Broadcom's Cameron Sedgwick

Broadcom’s Cameron Sedgwick

“To meet this need, we created a new group focused exclusively on business-critical enterprise solutions for complex environments, Broadcom Software,” he said. “At the same time, we also recognized that as our software business evolved, we needed to broaden our partner ecosystem to a diverse network of trusted, highly specialized and localized experts to provide the services customers need throughout their entire life cycle.”

Expert Advantage enables Broadcom Software to integrate potential future acquisitions into its enterprise software portfolio, Sedgwick said.

Polling Partners

Broadcom took input from customers and partners while developing Expert Advantage, Sedgwick said. It asked what kind of partner program would benefit them most.

It needed to benefit partners as well as customers, he said. Moreover, it needed to reward them for investing in services-oriented offerings. Those include technical support, professional services and managed services.

Expert Advantage provides this, Sedgwick said. It promotes partners’ accomplishments, while avoiding any kind of friction with sales or other groups.

Expert Advantage enables more partners to offer services to Broadcom Software customers, “dramatically expanding our ecosystem of partners,” Sedgwick said.

Partners can develop and sell services that are unique and which differentiate them in the market, he said. That offers customers more choice.

Competitive Advantage

The Expert Advantage Finder Tool profiles partners’ experience, services offerings and what makes them unique in the market. That gives partners a distinct competitive advantage with customers, Sedgwick said.

Working closely with Broacom’s sales organization, partners can now extend their capabilities to new, local markets, he added.

“The more success they have with our customers, the more we will be able to reward them by heralding that success and experience to others,” Sedgwick said.

Ramanath Suryaprakash is Infosys‘ associate vice president of partner ecosystems and global alliances.

“The Expert Advantage partner program will allow Infosys and Broadcom Software to deepen its strategic relationship and to find mutually beneficial outcomes for our customers,” he said. “We remain committed to our strategic partnership.”

May 26

Zix Extends Partner Program to UK, Germany

By | Managed Services News

Germany and the UK are “an exciting and critical milestone for the program,” says Zix’s CEO.

Zix is expanding its global partner program in Germany and the UK.

Zix German partners can now take advantage of localized cloud email security, productivity and compliance offerings. These include advanced threat protection, secure file share and a dedicated partner portal.

In the UK, partners can add data archive residency to their product portfolios.

CEO Dave Wagner said Zix is expanding its partner program globally. He added that Germany and the UK are “an exciting and critical milestone for the program.”

Wagner said Zix’s relationship with Microsoft allows partners “to build a full portfolio of security, compliance and productivity solutions from one vendor.”

Zix's David Wagner

Zix’s David Wagner

“We are excited to bring the dedicated level of support we are known for to both markets,” he said. He added that the vendor was expanding “our dedicated, in-country resources across all key functions.”

New Revenue Streams

As a “channel-first company,” Zix says it is investing in its partner programs. This is “to meet its partners’ evolving needs.”

The company has been implementing product changes based on survey feedback from its 5,000+ partners. This includes its recent acquisition of CloudAlly, the cloud backup and recovery solution.

The additions make the previously daunting task of consolidation and migration of multiple vendors simple, it said.

Zix also said its products will open up new revenue streams. Historically, Zix partners could extend the lifetime value of their customer relationships by increasing their mix of Zix solutions. This, it said, grows profit though increasing margins, recurring revenue while enjoying partner incentives.

Market Growth

Paul Balkwell is VP of international sales at Zix. He said Zix has seen consistent market growth in Germany and the UK over the last three years.

“We have heard the need for more solutions firsthand from our partners in these regions,” he said.

“We have worked hard to tailor our partner program to fit the individual needs of businesses in these regions. [We will] provide them with a brand-new stream of revenue by selling more … Zix products.”

Zix’s localized support portal has knowledge-based articles, training webinars and access to live support staff around the clock.

Zix’s dedicated German partner team is in Munich and its UK team is in Bracknell.

 

May 25

Microsoft Advances Cloud-Native Solutions in Hybrid Scenarios

By | Managed Services News

Microsoft kicked off its annual Build conference with a focus on cloud-native apps.

MICROSOFT BUILD — Eying an accelerated shift to cloud-native solutions, Microsoft has outlined advances to its Azure infrastructure and applications. The company unveiled a flurry of releases on Tuesday at its Build conference. Among them: Its Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) is now generally available.

Microsoft Build is the company’s annual event for developers. It provides a road map for Microsoft’s entire ecosystem of partners on the next wave of solutions. The theme was consistent: Microsoft’s applications for productivity, collaboration, information management, communications and industrial automation are shifting toward container-based, cloud-native software.

Likewise, Microsoft is enhancing its Azure Arc hybrid cloud infrastructure, which it designed to improve the portability of Kubernetes-based microservices and containers.

“The apps of the future will be cloud-native, and you should be able to run them anywhere across on-premises, edge and multicloud,” Microsoft CEO Satya Nadella said in opening remarks kicking off Build. The company is holding the event virtually this week.

Azure Hybrid View Microsoft Build 2021“Azure application services will now be able to run on Kubernetes and anywhere with Azure Arc,” Nadella said. “This means you can now run your favorite Azure application services on premises, at the edge or in other clouds.”

The general availability of AKS-HCI comes eight months after Microsoft released the first technical preview. During the period, the company added four updates to the preview.

AKS-HCI is a solution to deploy, secure and manage the life cycle of Kubernetes clusters running in data centers and edge locations. It lets developers and administrators manage cloud-native, modern apps in an “Azure-consistent manner.”

Expanded Support for Azure Application Services

Microsoft released the preview of Azure application services that can run in Kubernetes-based environments. As described by Gabe Monroy, VP of Azure developer experiences, these app services can run in Azure, on premises, as well as in AWS and Google Cloud. Microsoft is offering it through Azure Arc.

“Any Cloud Native Computing Foundation (CNCF)-conformant Kubernetes cluster connected through Azure Arc is now a supported deployment target for Azure application services,” according to Monroy. Specifically, the application services include:

  • Azure App Service: A managed service for building, deploying and scaling web apps.
  • Azure Functions: Enables simplified event-driven programming to build serverless apps.
  • Logic Apps: A container-based integration platform as a service (iPaaS) with a library of over 400 connectors to create automated workflows for connecting apps, data, service and backend systems.
  • Azure API Management: A hybrid multi-cloud platform designed to enable unified management of APIs.

Azure IoT Edge Updates

Also on the hybrid cloud front, Microsoft offered updates to its edge portfolio, Azure IoT.  Among them is the general availability of nesting capabilities for Azure IoT Edge. This new update allows industrial customers to secure critical assets that require conformance with the ANSI/ISA-95 standard for network isolation.

“This IoT Edge solution adds to other significant advancements that make it easier for companies to benefit from IoT, including Azure Defender for IoTAzure IoT Edge security enclavesDevice Update for IoT Hub, and Azure Digital Twins, according to the announcement by Microsoft partner product manager Christopher Berlin.

Microsoft’s Azure IoT Edge for Linux on Windows, code-named EFLOW, is also now generally available. Azure IoT Edge for Linux on Windows allows customers to use both Windows and Linux rather than having to choose.

May 25

Shocking Case of Racially Abusive Bullying Exposed at Tech Giant

By | Managed Services News

Colleagues called the man an “Arab shoe bomber” as part of prolonged racist abuse during his time at the distributor.

A former Exertis employee is claiming £6.6 million (US$9.3 million) in damages after suffering what he says is racist abuse by colleagues.

Kieran Sidhu, 36, worked at the Hampshire, UK-based distributor until quitting three years ago.

Sidhu was subjected to a prolonged racist campaign during his time at the company, reports The Daily Mail. He has already won claims of race discrimination, racial harassment and constructive dismissal against the firm.

Sidhu was told he was the “only ethnic on the team” and labelled an “Arab shoe bomber.” He was also called a “temperamental Syrian immigrant’ who was “f***ing for Isis.”

The British-born salesman is a Sikh and of Scottish and Indian descent.

These were not the only instances of an alleged prolonged bullying campaign. Local newspaper The Basingstoke Gazette reports that his team falsely accused him of being gay. They simulated sex acts with bananas and made lewd remarks about sausages. They also tried to make him put on women’s lingerie in the office.

A colleague located his home on Google Maps and likened his neighbourhood to war-torn Aleppo in Syria. He also offered Sidhu’s car for sale on website webuyanycar.com and taunted him that it was only worth £100.

When Sidhu reported the racist abuse, he says his manager took clients from him. He also tried to force him out of the company “because he did not fit in with the team.”

‘Bully’ Gets a Promotion

Moreover, two of the men accused of bullying Sidhu – identified by The Metro as Stuart Smith and John Cleary – have kept their jobs. The distributor even gave one a promotion.

The Metro reports Sidhu’s abuse in detail. It reports that one of the alleged perpetrators’ LinkedIn profile shows he got the position of Amazon and online accounts Director in 2020. This was three years after the bullying was first investigated.

It says marketing director Rob Fitzsimons would not answer questions about whether the three men still worked at Exertis. Instead, he said there was diversity training and insisted they “carried out a thorough internal investigation.”

Exertis this year has stepped up its efforts for greater diversity and inclusion in the workplace. It has also called for support for the LGBTQ+ community. However, many will question these efforts if abusers reportedly remain in their jobs.

Depression and Anxiety

Meanwhile, Sidhu left the firm suffering from extreme depression and anxiety. Dr. Jonathan Ornstein, a psychiatrist, said he has a “very low chance of recovery.” Sidhu also is “unlikely to be able to work again.”

Sidhu is seeking £6,638,938 million for lost earnings, injury to feelings and aggravated damages at a remedy hearing in September.

“The size of my client’s compensation claim reflects not only the gravity of the ordeal he suffered but the psychiatric assessment that, in all probability, his career is over,” said Sidhu’s solicitor, Lawrence Davies.

The case is attracting growing outrage in the UK. Actor Danny John Jules was one of those Tweeting his contempt at the actions of the Exertis employees.

 

 

May 25

Colonial Pipeline Attack Leads to New Pipeline Industry Regulations

By | Managed Services News

One expert says regulations have never helped a company improve its cybersecurity.

The Colonial Pipeline ransomware attack has prompted the Department of Homeland Security (DHS) to begin regulating cybersecurity in the pipeline industry.

The attack pushed gas prices higher and disrupted supply in the eastern United States. According to Bloomberg, Colonial Pipeline paid nearly $5 million in ransom to the Darkside ransomware group.

The attack highlighted the vulnerability of critical infrastructure.

The DHS sent us the following statement:

“The Biden Administration is taking further action to better secure our nation’s critical infrastructure. Transportation Security Administration (TSA), in close collaboration with [the] Cybersecurity and Infrastructure Security Agency (CISA), is coordinating with companies in the pipeline sector to ensure they are taking all necessary steps to increase their resilience to cyber threats and secure their systems. We will release additional details in the days ahead.”

According to the Washington Post, the TSA’s new security directive will require pipeline industry companies to report cyber incidents to TSA and CISA. They also must have a cyber official with a 24/7 direct line to TSA and CISA to report an attack.

Moreover, companies have to assess the security of their systems as measured against existing cyber guidelines. Fixing any gaps has been voluntary until now.

Companies must correct any problems and address shortcomings or face financial penalties.

Before this, the TSA has relied on collaboration rather than mandatory requirements on pipeline industry companies.

Positive Impact Expected

Tyler Shields is JupiterOne‘s CMO.

JuipiterOne's Tyler Shields

JuipiterOne’s Tyler Shields

“It is always significant when a government group or organization puts out new regulations or mandates,” he said. “The efficacy of the regulation typically comes down to … does the regulation have teeth.”

This particular regulation should have a positive impact on security at pipeline companies, Shields said. That’s due to the downside of failure being both financially and brand significant.

“Government fines and other damages are a strong incentive for security improvement,” he said.

Joseph Neumann is cyber executive advisor at Coalfire. He said regulations have never helped a company improve its security. Only requiring the reporting of incidents doesn’t help the industry or anyone, he said.

Coalfire's Joseph Neumann

Coalfire’s Joseph Neumann

“If any regulations were to be passed down, mandatory external audits and security assessments are really the only way to get these companies to improve their overall security,” Neumann said.

Power generation sectors frequently lag behind in security, with aging infrastructure and legacy systems in place for decades, he said.

Moreover, blending corporate and operational technology networks has created a “nasty opportunity for bad things to occur,” Neumann said.

Comprehensive Long-Term Plan Needed

The administration needs to work with Congress to develop a comprehensive long-term plan that involves partnerships, Neumann said.

“The federal government itself is struggling to keep its systems secure as seen from the recent SolarWinds breaches and rush mitigations pushed down by the DHS,” Neumann said. “Everyone needs to be rowing the boat in the same direction to tackle this global problem of ransomware and cybercriminals.”

Monti Knode is director of customer and partner success at Horizon3.AI.

“Unless the federal government is appointing a new regulatory lead or new enforcement mechanisms, this regulation already exists, specifically for oil or gas refineries as defined within Cybersecurity Regulatory Framework for Covered Critical Infrastructure Act,” he said. “Reporting is one aspect. And they may even be exempt from public disclosure. But what we need is clear guidance related to ransomware and extortion, and how much decision space private industry retains when they are considered covered critical infrastructure.”

John Bambenek is threat intelligence advisor at Netenrich.

“As we have seen, pipelines are critical infrastructure that can lead to real problems if they are disrupted,” he said. “Notification to the federal government of cyberattacks is less significant than whatever protective regulations they issue. But the facts are we have thousands of pages of policies, regulations and studies on security for the federal government and they still get breached. A regulatory approach based on preventing the last incident is always going to be lacking in terms of preventing the future incidents.”

May 25

Prodoscore’s Powell: Productivity Insights Essential to Return-to-Work Model

By | Managed Services News

Visibility into the data around employee productivity and unique insights about their work will become key.

Industry veteran David Powell will rely on a career of channel experience to succeed at Prodoscore, the productivity insights company.

Prodoscore recently introduced the new executive amid another round of funding.

Powell, who has been in the IT industry and MSP space for 25 years, has been on both the channel and vendor side of things. He was instrumental in the growth of the managed services business unit at LogicMonitor before its sale to Vista Equity Partners. He then did advisory work for Inverness Graham following its acquisition of Corsica Technologies. Powell joined Corsica as CRO and played a key role in its growth and acquisition of four additional MSPs. 

In 2020, he joined Perch Security, helping the company continue its period of rapid growth. When ConnectWise purchased Perch at the end of 2020, Powell became SVP of growth.

Anticipating Market Moves

Prodoscore's David Powell

Prodoscore’s David Powell

“I’ve always been able to stay one step ahead of where the market is moving,” says Powell. “For example, taking a VAR and turning it into a successful MSP, or going into the cybersecurity space and really pressing the envelope in terms of what MSPs were and are doing. Just in general in the VAR and MSP space, I’ve been a little bit ahead of where the market is moving. Now at Prodoscore, I feel like that’s the opportunity here as well.”

Powell attributes this keen market intuition to being a voracious learner, and is able to assimilate data quickly. The conclusions drawn from that allow him to follow his nose down some interesting, helpful channel rabbit holes.

“I don’t mind stepping into spaces that people don’t understand, and then try to make sense of them,” says Powell. “I’ve always had a ‘rising tide lifts all boats’ mentality when it comes to the channel, so I try to take what I’ve learned and spread it around. I want everyone to do well, so I share what I’ve learned as often as I can.”

Productivity Insights

This lends itself well to Powell’s new role at Prodoscore, which provides employee visibility and productivity software.

According to Powell, technology has become largely undifferentiated — everyone has a similar set of offerings. The way to differentiate is more aligned to the business conversation. This means figuring out one’s unique value proposition and homing in on business outcomes. Powell says that this will be his focus at Prodoscore. 

In boardrooms across the globe, companies are trying to figure out how to return to work. What does that look like in this hybrid landscape? Powell says that Prodoscore takes the data from the systems that people use and combines it with AI to produce a productivity score. 

The Future of Work

“This is a very interesting time for companies in America and around the world,” said Powell in his appointment announcement. “Many of their employees are beginning to return to the office after a year of fully remote work. Research shows that 30%-50% of the workforce may stay remote. Company leadership is trying to determine, ‘How do we know if our employees are productive?’ Visibility into the data around employee productivity and key insights about their work are going to be essential to the return-to-work model. Prodoscore is uniquely positioned to provide employers that visibility and give them actionable insights to efficiently manage their business going forward.”

This visibility into environments gives companies valuable insights into how their employees work; not only that, but how to uniquely address any issues that may arise. This will enable the flexibility that companies will badly need with this new hybrid work model.

May 25

Unexpected Threats Emerge in Latest Cato Network Security Analysis

By | Managed Services News

You might think the majority of cyberthreats comes from Russia, but you’d be wrong.

Cyberthreats might not be as sexy as you think they are, but they still can cause serious damage.

Cato Networks‘ latest network security analysis tells a different story than how “exotic” headlines describe cyberattacks. High-profile cases involving foreign groups and extremely advanced attack methods have dominated the news lately, but cyberthreats often come in far more mundane packages.

Maor, Etay_Cato

Cato’s Etay Maor

For example, although the Russian SolarWinds hack dominated news coverage last year, U.S. locations accounted for the vast majority of attack sources in the first quarter.

“Blocking network traffic to and from ‘the usual suspects’ may not necessarily make your organization more secure,” said Etay Maor, Cato’s senior director of security strategy. “Threat actors are hosting their Command & Control servers on ‘friendly’ grounds, including the U.S., Germany, and Japan.”

Cato Networks security

Source: Cato Networks

In addition, Cato argues that cybercriminals more commonly harness older exploits, which makes security patches all the more important. Many of the exploits have existed for up to 20 years.

“While organizations always need to keep up with the latest security patches, it is also vital to ensure older system and well-known vulnerabilities from years past are monitored and patched as well,” Maor said. “Threat actors are attempting to take advantage of overlooked, vulnerable systems.”

According to Cato, attackers often went after software like vSphere, Oracle WebLogic and Big-IP. They also targeted hardware, such as routers that contain remote administration vulnerabilities.

Cato revealed data trends from the 850-plus enterprise networks it oversees in its Q1 SASE Threat Research Report. Cato based its findings on 190 billion network flows that ran through Cato private network backbone. Out of those flows, Cato’s security controls listed 16 billion events, 181,000 cyberthreats and 19,000 incidents.

Top Apps

Cato listed Microsoft Office, Google Apps, Skype/Teams, TeamViewer and AnyConnect as the five cloud applications people use most. However, TikTok accounted for a large number of flows. Indeed, TikTok flows out-totaled Gmail’s — and we’re talking about enterprise networks. The trading app Robinhood joined TikTok as another popular consumer app.

“The increase in consumer applications not only consumes bandwidth but poses a security risk to enterprises,” Maor said. “As the type of data flow and applications changes, so does the way in which threat actors exploit vulnerabilities, and in turn, the way enterprises secure their networks must change as well.”

According to the report, network discovery scans triggered the most events, followed by reputation-based communication.

Source: Cato Networks

Cato converges security and networking features into the same cloud-based platform, utilizing more than 60 global points of presence. The Tel Aviv, Israel-based company last month updated its partner program to reflect a more “MSP-centric” approach.

May 25

Racially Abused Exertis Employee Seeks Record Damages After Bullying

By | Managed Services News

Colleagues called the man an “Arab shoe bomber” as part of prolonged racist abuse during his time at the distributor.

A former Exertis employee is claiming £6.6 million (US$9.3 million) in damages after suffering what he says is racist abuse by colleagues.

Kieran Sidhu, 36, worked at the Hampshire, UK-based distributor until quitting three years ago.

Sidhu was subjected to a prolonged racist campaign during his time at the company, reports The Daily Mail. He has already won claims of race discrimination, racial harassment and constructive dismissal against the firm.

Sidhu was told he was the “only ethnic on the team” and labelled an “Arab shoe bomber.” He was also called a “temperamental Syrian immigrant’ who was “f***ing for Isis.”

The British-born salesman is a Sikh and of Scottish and Indian descent.

These were not the only instances of an alleged prolonged bullying campaign. Local newspaper The Basingstoke Gazette reports that his team falsely accused him of being gay. They simulated sex acts with bananas and made lewd remarks about sausages. They also tried to make him put on women’s lingerie in the office.

A colleague located his home on Google Maps and likened his neighbourhood to war-torn Aleppo in Syria. He also offered Sidhu’s car for sale on website webuyanycar.com and taunted him that it was only worth £100.

When Sidhu reported the racist abuse, he says his manager took clients from him. He also tried to force him out of the company “because he did not fit in with the team.”

‘Bully’ Gets a Promotion

Moreover, two of the men accused of bullying Sidhu – identified by The Metro as Stuart Smith and John Cleary – have kept their jobs. The distributor even gave one a promotion.

The Metro reports Sidhu’s abuse in detail. It reports that one of the alleged perpetrators’ LinkedIn profile shows he got the position of Amazon and online accounts Director in 2020. This was three years after the bullying was first investigated.

It says marketing director Rob Fitzsimons would not answer questions about whether the three men still worked at Exertis. Instead, he said there was diversity training and insisted they “carried out a thorough internal investigation.”

Exertis this year has stepped up its efforts for greater diversity and inclusion in the workplace. It has also called for support for the LGBTQ+ community. However, many will question these efforts if abusers reportedly remain in their jobs.

Depression and Anxiety

Meanwhile, Sidhu left the firm suffering from extreme depression and anxiety. Dr. Jonathan Ornstein, a psychiatrist, said he has a “very low chance of recovery.” Sidhu also is “unlikely to be able to work again.”

Sidhu is seeking £6,638,938 million for lost earnings, injury to feelings and aggravated damages at a remedy hearing in September.

“The size of my client’s compensation claim reflects not only the gravity of the ordeal he suffered but the psychiatric assessment that, in all probability, his career is over,” said Sidhu’s solicitor, Lawrence Davies.

The case is attracting growing outrage in the UK. Actor Danny John Jules was one of those Tweeting his contempt at the actions of the Exertis employees.

 

 

May 25

The Dark Side of TLS Encryption

By | Managed Services News

Attackers are adopting TLS encryption to prevent defenders from detecting and stopping the deployment of malware and theft of data.

Cybercriminals are known for using seemingly useful and harmless tools against unsuspecting organizations, and they’ve done it again. According to a new report by Sophos, 46% of malware communicating with a remote system over the internet was found to be using TLS encryption to conceal communications and evade detection. This is a staggering percentage, considering that just last year that number was only 23%.

In the wake of revelations about mass Internet surveillance, the use of TLS (Transport Layer Security) has grown because of the privacy and security it affords for a wide variety of internet communications. In fact, according to browser data from Google, the use of HTTPS has grown from just over 40% of all web page visits in 2014 to 98% in March. Cybercriminals have caught onto these benefits as a result, and now malware operators are also adopting TLS to prevent defenders from detecting and stopping the deployment of malware and theft of data.

Behind the Increase in TLS Encrypted Malware

A large portion of the growth in overall TLS encryption use by malware can be linked in part to the increased use of legitimate web and cloud services protected by TLS—such as Discord, Pastebin, Github and Google’s cloud services—as repositories for malware components, as destinations for stolen data, and even to send commands to botnets and other malware. It is also linked to the increased use of Tor and other TLS-based network proxies to encapsulate malicious communications between malware and the actors deploying them.

Sophos researchers also documented an increase in the use of TLS in ransomware attacks over the past year, especially in manually deployed ransomware—in part because of attackers’ use of modular offensive tools that leverage HTTPS. But the vast majority of what researchers detect day-to-day in malicious TLS traffic is from initial-compromise malware: loaders, droppers and document-based installers reaching back to secured web pages to retrieve their installation packages.

All of this adds up to a more than 100% increase in TLS-based malware communications since 2020. And that’s a conservative estimate, as it’s based solely on what Sophos researchers identified through telemetry analysis and host data. As a result, defending against malware attacks has become just that much more difficult. Without a defense in depth approach, organizations are increasingly less likely to detect potential threats before they have been deployed by the attackers.

Network Security Opportunities for Channel Partners

With cyberattacks constantly happening, businesses of all types and sizes must be able to detect and stop attacks. However, they need to be able to focus on doing what they do best–and have a partner they can trust to provide advanced, next-gen protection.

Sophos Firewall and the new XGS Series appliances deliver the speed and protection that channel partners need to secure their customers. For network admins, this completely re-engineered hardware platform finally takes a common dilemma off the table: how to scale up protection for today’s highly diverse, distributed and encrypted networks without throttling network performance.

Sophos Firewall includes native support for TLS 1.3 and provides a user interface that clearly shows if traffic has caused issues and how many users were affected. With just a couple of clicks, you can exclude problematic sites and applications without reverting to a less-than-adequate level of protection. Sophos Firewall is also easily managed on the cloud-based Sophos Central platform, saving channel partners time and resources with the ability to easily manage multiple firewalls and different solutions from one single pane of glass.

With so many organizations still not understanding what technologies are needed to protect against exploits, ransomware and encrypted traffic, channel partners now need to become critical security advisers and service providers to their customers. Together with Sophos and solutions like Sophos Firewall, partners have a significant opportunity to grow their own security knowledge and network security revenue, while also improving their customers’ protection.

This guest blog is part of a Channel Futures sponsorship.

 

May 25

Forcepoint Hires F5 Networks, Forescout Vets as New Sales Leaders

By | Managed Services News

The appointments come on the heels of Forcepoint hiring a new channel chief.

Forcepoint has appointed two new sales executives, previously with F5 Networks and Forescout Technologies, for North America and EMEA.

Peter Brant is senior vice president of North America sales and Myles Bray is senior vice president of EMEA sales. They will be responsible for driving forward the company’s customer-first strategy.

Forcepoint's Peter Brant

Forcepoint’s Peter Brant

Last week, Forcepoint announced the hiring of Parag Patel as senior vice president of global channel sales.

Brant brings more than 20 years of global enterprise sales leadership and experience. Before joining Forcepoint, he was senior vice president of North America sales at F5 Networks. There, he drove the company’s transformation from an on-premises Fortune 500 hardware vendor to a security-focused, software and cloud solution provider.

Before F5, Brant grew Fortinet’s Americas sales 500%, and 300% while at SonicWall.

“I’ve met with thousands of customers on their security priorities and only Forcepoint has the comprehensive portfolio and simplified step-by-step approach to deliver on the promise of modern security,” he said. “The opportunity is enormously exciting as we chart the next industry milestone to reshape the future of cybersecurity for the benefit of customers worldwide.”

Driving EMEA Sales

Forcepoint's Myles Bray

Forcepoint’s Myles Bray

Bray has spent more than 10 years in the security industry, most recently as Arqit’s chief revenue officer. Prior to Arqit, he led Forescout‘s EMEA and channel sales efforts. Under his leadership, Forescout’s European sales grew more than 300% in less than four years.

Bray has also served in EMEA sales leadership roles with F5, VCE, Impact Group Europe and EMC.

“CEOs and CISOs understand that cloud-based security has been available for years,” he said. “What’s game-changing about Forcepoint‘s approach is the laser focus on protecting the integrity of the business and its critical data across today’s hyper-distributed workforce. I’m excited to help customers and partners drive both full protection and frictionless growth in a seamless way that only Forcepoint can deliver, with our converged, cloud-native platform that brings together secure access and data security.”

>