ITC Awards
Menu
There should be a ‘when, not if’ approach to security issues in the channel: LogRhythm

There should be a ‘when, not if’ approach to security issues in the channel: LogRhythm

Claims the channel has to increase its awareness of the shift

There should be a ‘when not if’ approach to security issues in the channel: LogRhythm

There should be a ‘when not if’ approach to security issues in the channel: LogRhythm

The channel should approach IT security as “when it happens” instead of “if it happens”, according to independent security intelligence company, LogRhythm.

The company’s worldwide operations engineering vice-president, Trent Heisler, and A/NZ director of sales, Simon Howe, spoke to ARN about some of the trends they’ve noticed within the IT security space and what the channel can do to get on board the bandwagon.

“We talk about if not when a company’s security is about to be breached. But today, the average time it takes for a company to understand that it’s been a victim of a breach is more than 200 days – that’s over seven months,” Heisler said.

He claimed there needs to be a shift of mindsets and budgets, from being prevention centric to having pervasive visibility with technologies that detect security breaches, especially since the Internet of Things (IoT) is an ever-expanding waistline that needs to be protected.

“This increases the time to response and falls in line with detecting something in months and years to just minutes or hours. And with all these different entry points, the attack surface continues to expand.”

Howe mentioned that there are a few ways in which the channel can increase its awareness of this shift.

According to Howe, the channel is aware of this shift of going from prevention centric technologies to having pervasive visibility but highlighted the importance of the channel’s agility.

“Firstly it needs to be agile in terms of how it’s going to deliver this technology and this capability to customers – so be it assisting a customer to develop an on-premise solution for them or the partner to manage or to have a hosted or Cloud based offering,” he said.

In addition to that, Howe said the channel needs to also be flexible in terms of the technologies it’s delivering. “The threat landscape is moving very quickly. The technologies need to move very quickly in this space as well and that is what the partners to be ahead of.”

Read more: ESET ditches exclusive distribution model

Partnerships within the channel is also another key area businesses should look into.

“It’s important for partners to recognise where they want to build out their portfolio and to look to leverage the relationships they might have with other partners to deliver a more complete solution.

“We’re a 100 per cent channel business so it’s very important to us that we also leverage the market and the channel relationships of Exclusive Networks (LogRhythm’s sole non-exclusive distributor) to help eradicate security threats,” Howe added.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags Exclusive NetworkssecurityLogRhythm

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments