5 for 15: Adam Smith, F-Secure A/NZ country manager

The keys to 2015 from industry leaders

Key channel plays for 2015

Data protection is now a key issue facing the channel as end users increasingly move towards mobile. This is further exacerbated by the advent of BYOD. It has become evident that basic malware protection is not enough to ensure data security, especially given the current threat landscape. Businesses are therefore looking for more holistic cyber security approaches.

F-Secure is now seeing channel partners looking to pursue a consolidated data security strategy (now including mobile devices) that can be managed by a single, Cloud-based management console.

Key technology for 2015

With multi-device (including mobiles and tablets) becoming a reality for employees accessing their company systems, data protection solutions need to follow employees beyond the office. A single breach can damage customer trust and partner relationships as well as brand and shareholder value.

Business and private users usually only use two or three passwords for all of their accounts, creating a security risk that could let malicious or unauthorised parties access data through a simple password hack. As a result, password management applications are filtering through from the consumer sector. Given the complexity of the passwords generated, it’s essential that the password application has the ability to automatically synchronise across all the user’s devices.

Key message to the channel for 2015

Read more: 5 for 15: Peter Bender, Veeam Software A/NZ channel and alliances manager

The threat landscape is evolving at an alarming pace, both in terms of the complexity and ingenuity of the attacks, and the sheer volume of threats, which doubled last year alone. Businesses should educate themselves and their staff on what’s out there and what solutions are available to assist customers. Don’t forget, this is not meant to be a customer's domain of expertise; their focus is running their businesses. It is incumbent on a channel company to help them mitigate their risk in this space.

Key warning to the channel for 2015

Doing what was done yesterday is not going to work tomorrow.

Read more: INSIGHT: Top cybersecurity questions every board needs to address

It’s important that the channel looks at ways to climb up the value chain. Security is no longer a case of installing a few firewalls and loading some anti-virus software onto your customers PCs.

In corporate security, the Software-as-a-Service business model and cloud-based delivery are disrupting the traditional way of selling security and providing services. Understand how this can help and leverage it.

Key to your company’s success in 2015

Quite simply our reseller and technology partners are the key to our success.

Since our inception in 1988, F-Secure has always had one goal in mind- to help our customers and clients protect their digital assets with advanced software and services in terms of three pillars: security, privacy, and identity.

We can’t do this without the support of our reseller base, whose commitment to promoting our technologies and solutions to their customers justify our 100 per cent commitment to our channel-only business.

Join the CSO newsletter!

Error: Please check your email address.

More about F-SecuremobilesVeeamVeeam Software

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by By Hafizah Osman

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place