ENTERPRISE TECHNOLOGY
Organisations
want to associate
themselves with
channel partners
who are well-versed
with the security
threat landscape in
the region.
Ray Kafity, Vice President,
Middle East, Turkey and Africa,
Attivo Networks.
for attack prevention. For example,
the Attivo Networks ThreatDefend
Platform is strategically designed to
provide early detection of threats like
Advanced Persistent Threat (APT), BOT,
ransomware attacks, stolen credentials
and man-in-the-middle (MitM), in
addition to accelerated cyber incident
response tools and methods. Furthermore,
deploying the Attivo Camouflage for
Dynamic Behavioral Deception provides
automated self-learning technology to
match the environment for the highest
levels of authenticity. This technology
will also simplify operations with
automated deployment and will respin
deceptions after an attack to avoid attacker
fingerprinting and evasion.
All in all, the channel needs to ensure
their approach helps organisations
meet the length and breadth of their
security concerns. They need to raise the
conversation to drive the focus to current
cybersecurity solutions and become
consultants to customers instead. For the
reason being, as technology evolves into a
new era of modernity, the cyber landscape
also evolves as a complex new dimension
for warfare.
BEYONDTRUST
Morey Haber, Vice President of
Technology, BeyondTrust
Organisations are facing an unparalleled
variety of threats from ransomware to
targeted attacks. According to the 2017
Verizon Data Breach Investigation Report
(DBIR), 62% of breaches featured hacking,
with a whopping 81% of hacking-related
16
breaches leveraging either stolen and/
or weak passwords. In addition, 51% of
breaches included malware and 43% were
socially driven attacks.
Businesses are trying to keep up by
hiring the best talent, installing defence
solutions, and testing policies and
procedures in the case of an incident or full
out attack. Unfortunately, many businesses
cannot tackle all of these problems due to
size, budget and expertise.
This is where the channel can help
more than ever. Just like a multi-tasking
operating system, a good security
professional can easily help multiple
organisations simultaneously while still
leaving bandwidth for other tasks. It
is about economies of scale; by using
a security partner part time to help
shore up defences, instrument policies
and procedures, and even assist with
The vendors we
have relied on
to provide these
solutions are
evolving to help
provide them in
real time, and
security-focused
channel partners
leverage their
expertise across
multiple clients
simultaneously to
meet scalability.
Morey Haber, Vice President of
Technology, BeyondTrust.
resources and technologies. Organisations
can outsource the monitoring, response
and even policy testing as a part of these
MSP offerings and implement technology
that the channel partner has years of
experience implementing.
CISCO
Scott Manson, Cybersecurity Lead
– Middle East and Africa, Cisco
Morey Haber, Vice President of Technology,
BeyondTrust.
monitoring of threats, businesses of
all sizes can benefit from security best
practices typically reserved to enterprise
environments or having full time staff.
Awareness of security threats is
critical. The vendors we have relied on
to provide these solutions are evolving
to help provide them in real time, and
security-focused channel partners leverage
their expertise across multiple clients
simultaneously to meet scalability from
the smallest business to multinational
enterprises. These consultants can be ‘pay
for hire’, but the trends in the channel
are changing. More and more channel
security partners are becoming Managed
Service Providers (MSPs) to scale their
As we’ve seen so far in 2017, malicious
criminals are finding new ways to access
company data. The avenue of attack is
staying the same with denial-of-service
(DDos) and malware attacks leading the
hunt for data exploitation. Criminals,
as a majority, still look to make a profit.
However, in 2018 we will see a change
in the methods criminals use to exploit
information. Criminals look to exploit
human vulnerabilities, not just system
vulnerabilities. The next generation of
attacks will use data and analysis to emulate
the behaviour of specific users. With the
amount of data that we, as everyday users,
are pushing out into the Internet, criminals
can begin to formulate a backbone story to
our job and daily life. This is where social
engineering comes into play.
One of the most challenging trends in
the channel is the dramatic shift in business
Issue 11
INTELLIGENT TECH CHANNELS