sb-nz logo
Story image

emt calls for resellers looking for cloud security solution

20 Jul 2020

Cybersecurity software specialist, emt Distribution, is looking for cloud-savvy resellers to deliver Stealthbits data-centric security solutions to customers.

It claims the market is growing due to a combination of compliance requirements and the need to protect sensitive data from targeted cyber attacks.

Stealthbits offers a three-pronged approach to data security with solutions aligned to data access governance, active directory management and security, and privileged access management. 

With the recently-released StealthAUDIT 10.0, Stealthbits’ data-centric security solutions now cover Amazon S3 and Azure SQL, expanding on its protection of on-premises SharePoint, Exchange, Unix/Linux/Windows/NAS file systems, SQL and Oracle databases, and cloud-based services including Office 365, Dropbox and Box.

As a result, emt Distribution is recruiting new Stealthbits partners with cloud expertise, particularly those providing services around Amazon Web Services (AWS). 

It is also ramping up partner enablement, and sales and marketing support activities.

emt provides technical training on Stealthbits solutions, including introductory and advanced courses, and helps optimise returns with the Stealthbits partner programme and deal registration rewards. 

As a value-added distributor, it assists in marketing campaigns, from supplying relevant content to organising educational and engaging webinars on important cybersecurity topics.

emt also engages in the end-to-end sales process including product introductions and demonstrations, proof of concepts (PoCs) and technical assistance to help partners and their customers achieve results.

The need to comply with cyber regulations like the Australian Prudential Regulation Authority’s (APRA) Prudential Standard CPS 234 for information security and the Australian Cyber Security Centre’s (ACSC) Essential Eight is another business driver.

“Demand for Stealthbits solutions has been doubling in Australia and New Zealand every year,” says emt Distribution CMO Scott Hagenus. 

“As well as ransomware attacks, a lot of the demand has been driven by CPS-234. Financial organisations need to understand where their sensitive data is and demonstrate how they secure it. Many of them are doing it in stages, and that is driving ongoing business for Stealthbits partners.”

According to Stealthbits CMO Adam Laub, the increasing sophistication of cyber attacks – like those conducted by the North Korean Lazarus Group and others – has highlighted the need for organisations to secure Active Directory (AD).

“Besides being a primary target for takeover, Active Directory acts as a useful tool from the moment of compromise for an attacker. With nothing more than read-level rights, which every user has, an attacker can tap into a treasure trove of information to determine which accounts and systems they need to target in order to own AD and access the data they’re looking for,” said Laub.

“Recent breaches and others like we saw at a high-profile Australian university early last year, highlight the very real need for organisations to make a solid, concerted effort in securing their Active Directory infrastructure. In recent cases involving Lazarus, the ability to monitor and even prevent suspicious inbound traffic to their Active Directory Domain Controllers could have alerted target organisations to the attacker’s presence much earlier in the attack kill chain, while they were still in the reconnaissance phase of their mission.”

Story image
The SASE triangle: How a CASB protects managed apps
Enterprises that fail to adapt to the modern business world when it comes to security are likely to fall prey to data breaches and experience a host of other problems, writes Bitglass product marketing manager Will Houcheime.More
Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More
Link image
Track, analyse, act: The e-commerce metrics you need
E-commerce technology leaders need to track, analyze, and act on large volumes of business and system performance data. Danny Miles, the CTO of Dollar Shave Club, shares a powerful framework for thinking about and prioritizing e-commerce metrics.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
No slowing for collab-tech as Kiwis embrace hybrid working
Technology investment and adoption is a top focus for New Zealand firms post-COVID-19, new Poly research reveals.More