sb-nz logo
Story image

CrowdStrike announces revamped partner programme

29 Jan 2019

Endpoint protection provider CrowdStrike has announced a new tiered program for reseller partners. 

The Elevate Partner Program is a unified partner program that incorporates all security solutions, partners and their go-to-market models.

It encompasses a “whole-ecosystem” approach based on six paths to partner engagement and profitability -- Channel, Technology Alliances, MSSPs, OEMs, CrowdStrike Platform, and Cloud Procurements.

The Elevate Program aims to better enable new and existing partners to develop expertise around specific technology areas and industries, so they can expertly serve their customers and differentiate through their partnership with CrowdStrike, one of the industry leaders in endpoint protection.

“The updated CrowdStrike Elevate Partner Program, a tiered benefits program for CrowdStrike partners, establishes a framework for resellers to effectively leverage their partnership with CrowdStrike to accelerate sales and introduce new revenue stream opportunities,” says CrowdStrike worldwide business development and channels vice president Matthew Polly.

The newly introduced program tiers include the following classifications: Associate, Resell Focus, Resell Elite, and Partner Security Service.

The new Elevate Partner Program also includes a new Partner Security Services Specialisation component so partners can differentiate their offerings.

All partners, regardless of their category – including service provider, technology alliance, OEM, etc. – and regardless of tier level, can obtain a Partner Security Services Specialisation.

This specialisation is meant to function as a “stamp of approval” that allows partners to differentiate their offerings and provides a competitive advantage to those who achieve this level of service.

“As a security solutions integrator, Optiv is committed to helping our clients plan, build, and run holistic, outcome-based cybersecurity programs,” said Todd Weber, vice president of partner research and strategy, Optiv.

Consortium Networks president Larry Pfeifer says, “We are excited to be a member of the CrowdStrike Elevate Partner program and provide our customers with the ability to prevent, detect and respond to threats.

“CrowdStrike’s platform approach to delivering a suite of endpoint protection capabilities through a single agent aligns with customers’ needs to reduce enterprise complexity without compromising threat protection and the user experience.”

Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Lumen launches managed security services for APAC market
The new service is designed to provide enterprise businesses with a proactive, connected security strategy to enhance threat detection and protection across endpoints. More
Story image
Attack from DOS: In Zero We Trust
In combination with malware, DDoS attacks on banks have been used to cause distraction so the transfer of stolen funds goes unnoticed. More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More