The company's worldwide operations engineering vice-president, Trent Heisler, and A/NZ director of sales, Simon Howe, spoke to ARN about some of the trends they've noticed within the IT security space and what the channel can do to get on board the bandwagon.
Cloud Storage - Comparison of 30 Services
"We talk about if not when a company's security is about to be breached. But today, the average time it takes for a company to understand that it's been a victim of a breach is more than 200 days -- that's over seven months," Heisler said.
He claimed there needs to be a shift of mindsets and budgets, from being prevention centric to having pervasive visibility with technologies that detect security breaches, especially since the Internet of Things (IoT) is an ever-expanding waistline that needs to be protected.
"This increases the time to response and falls in line with detecting something in months and years to just minutes or hours. And with all these different entry points, the attack surface continues to expand."
Howe mentioned that there are a few ways in which the channel can increase its awareness of this shift. According to Howe, the channel is aware of this shift of going from prevention centric technologies to having pervasive visibility but highlighted the importance of the channel's agility.
"Firstly it needs to be agile in terms of how it's going to deliver this technology and this capability to customers -- so be it assisting a customer to develop an on-premise solution for them or the partner to manage or to have a hosted or Cloud based offering," he said.
Read more:Security snafu as G20 leaders' passport details leaked
In addition to that, Howe said the channel needs to also be flexible in terms of the technologies it's delivering. "The threat landscape is moving very quickly. The technologies need to move very quickly in this space as well and that is what the partners to be ahead of."
Partnerships within the channel is also another key area businesses should look into.
"It's important for partners to recognise where they want to build out their portfolio and to look to leverage the relationships they might have with other partners to deliver a more complete solution.
Read more:ESET ditches exclusive distribution model
"We're a 100 per cent channel business so it's very important to us that we also leverage the market and the channel relationships of Exclusive Networks (LogRhythm's sole non-exclusive distributor) to help eradicate security threats," Howe added.
Read more:Veeam: Why backup is no longer enough