Intelligent Tech Channels Issue 75 | Page 54

EXPERT SPEAK

HOW CHANNEL PARTNERS CAN GET OUT OF THE LOWS WITH CISOS

A quick win for the security customer is a quick way for channel partners to build rapport with them and if the narrative is adequately delivered , it can build confidence at a time when this is sorely lacking , explains Murad Hamed from Qualys .

The GCC cybersecurity channel serves a nervous customer base . Never , it seems , has the attack surface been so extensive and the threat actor so sophisticated . Digital assets are now strewn across a range of third-party infrastructures . It is difficult to point to a network boundary or to define the location of data or the status of a workload . These blurred lines are what keep CISOs up at night . How can they possibly protect it all ? Answer : with help from experts . The channel can play a critical role in helping business leaders from the Red Sea to the Indian Ocean manage their cyber risk .

Ever since regional companies packed their proverbial bags and headed for the cloud , they have been worrying about how to protect assets they can no longer control .
The role of the channel can extend to evaluation itself .
Murad Hamed , Channel Account Manager Middle East , Qualys
Risk triage has become a watchword in the Gulf as governments introduce more regulatory obligations to protect their economic progress .
But today ’ s hybrid IT infrastructures contain so many hidden risks , as remote employees collaborate daily with those in the office and in the field . The applications that connect these colleagues are clearly essential in a way they were not prior to 2020 .
But such platforms are made vulnerable by the fact that they cannot function in a cost-effective way without being connected to the public Internet . And if employees want to collaborate with external parties , business partners , vendors , consultants , and so on , it becomes even more problematic without the Internet .
Qualys ’ 2023 TotalCloud Insights report revealed that around 4 % of cloud assets are exposed to the Internet Wilds , in that their IP addresses are on display for everyone to see . Many of these assets are critical to efficient operations , making reconfiguration awkward . But we must deploy additional security measures to address their vulnerability .
The channel can relay this chain of logic to end customers .
In pitches , implementations , and support settings , partners can refer to examples like managed file transfer , MFT
54 www . intelligenttechchannels . com