Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    VARs Stress Security

    By
    Pedro Pereira
    -
    June 13, 2005
    Share
    Facebook
    Twitter
    Linkedin

      When it comes to security, danger lurks everywhere. threats come in the form of garden-variety viruses, worms and spam, as well as more sophisticated forms of intrusion such as spyware and hacking. But thats not all. IT security these days also requires formulating strict data access policies to comply with federal regulations to protect sensitive information. And when remote access and wireless connections are at play, additional layers of security and access control become necessary.

      End-user organizations are beginning to get a sense of the full scope of the security need, and some are even allocating more of their IT budgets to security, say VARs and integrators. But many, if not most, still have a limited understanding of the need for airtight data protection.

      “For many customers their consciousness stops at needing to install a firewall, implementing virus protection and e-mail security,” said Bill Riddick, president of Computer Service Partners Inc., in Raleigh, N.C.

      Riddicks company is one of the many VARs and integrators evangelizing the need for customers to think of security as an ongoing project that entails assessment, prevention and remediation.

      Often customers buy a security solution, have it installed and assume that by doing so they have disposed of their security issues, said Chris Redshaw, president of Future Vision Inc., also in Raleigh. Then a new virus hits or a more sophisticated hacker exploits a breach, and customers wonder if theyve been had.

      Future Vision conducts assessments free of charge and recommends actions and time frames for addressing issues. If the assessment turns up six issues, it may be that only one or two represent an immediate need, while the others can be solved later, Redshaw said.

      The assessment is important because it exposes problems the customers dont even know they have. Through assessments, a VAR can determine if a customer has appropriate protection against outside intruders, locate where data resides and travels, and ensure that internal users access to data is restricted according to their need to know, said Ray Morton, director of technical services at Daly Computers Inc., in Clarksburg, Md.

      “The security for a computer is only the tip of the iceberg,” Morton said.

      Customers often dont realize they need these assessments, or they put them off for budgetary reasons. The result is exposure through breaches that can be exploited by outside intruders or even internal users who may or may not be acting maliciously.

      VARs and integrators see security as one of the major ongoing business opportunities in the IT channel. Security projects help move product, including software, storage and servers.

      More important, security opens the door to recurring revenue potential for VARs and integrators that bundle security installations and maintenance with managed services contracts.

      “We offer customers several layers of network defense and solutions that scale to their businesses,” said Tommy Wald, president of Riata Technologies, in Austin, Texas. “Managing these solutions [for] customers has become a mainstay in our managed services practice.”

      PMV Technologies, in Troy, Mich., also offers security as part of managed services, said Executive Vice President Scott Goemmel. Under managed services contracts, PMV takes over all or part of a customers IT department and, therefore, is responsible for running and protecting the customers systems.

      “Were accountable, and weve structured our program so we share the risk with our customers,” Goemmel said.

      For small and midsize customers, having security handled as a managed service is a cost-effective way to ensure that experienced engineers with the proper certifications are watching over their systems, Goemmel said.

      For PMV, it is also cost-effective because managed services afford the company a level of install-based consistency that would not be possible in traditional settings. So when an anti-virus update or firewall patch is needed, getting it to managed services customers becomes easier, Goemmel said.

      VARs and integrators have identified the SMB (small and midsize business) market as a growth opportunity for security. As the level of technology that SMBs adopt increases in sophistication, so does the need for data protection.

      Be it biometrics or smart cards to control access, regular software updates to fight viruses and worms, or increasing server and storage capacity to accommodate security needs, protecting data is critical to business. And while too many organizations havent done enough to protect themselves, VARs and integrators are pleased that awareness is increasing.

      Pedro Pereira is a contributing editor for The Channel Insider.

      Pedro Pereira
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×