1. Key channel plays for 2015?
FireEye is a partnering company. Our routes to market are deliberately dependent on our partner ecosystems to extend our sales, support and service capabilities. This gives our partners the opportunity to sell FireEye solutions and drive additional revenue opportunities to build their overall security business and deepen their relationship with clients through new offerings.
2. Key technology for 2015?
Chances are clients will come asking for Advanced Persistent Threat (APT) solutions in 2015. We now see budget being specifically allocated for APT defence and while that is a great starting point for how to update a security posture, no single technology can keep an organisation secure. Cyber-attacks are constantly changing, so our defenses must evolve. Security architecture has to be adaptive and meet the individual threat profile for each organisation.
3. Key message to the channel for 2015?
FireEye is moving aggressively to help our partners update their security practices to combat modern threats, and most importantly, develop the right approach to keep their clients secure. With FireEye, partners can expand their security practice and offer new revenue opportunities from across our solutions. In particular FireEye-as-a-Service offers our partners the opportunity layer in the right solution and expand with service and support. We can also fill in with particular services, for example, incident response and advanced threat intelligence, both of which are an opportunity to leverage our solutions to offer additional value services to their customers and enhance their overall relationship.
4. Key warning to the channel for 2015?
Your security practice of yesterday won't keep today's threat out - adapt or die. Today, a complete security practice needs to have the capabilities to move from detection to remediation in minutes - before a breach can cause serious damage. Every channel company needs to have the ability to offer solutions that prevent, detect, respond and remediate breaches.
5. Key to their company for 2015?
We believe companies need to adopt a new approach to securing their operations and intellectual property. The focus should shift from applying static products to a past problem and, instead, to building a security architecture that adapts to the threats they face in near real-time. In doing so, detection, prevention, analysis, and response capabilities will all become as agile as the attackers themselves.