2 min read

Information-centric security vendor launches channel program

Security & Privacy

A developer of information-centric security (ICS) solutions has launched its channel program and is looking for channel partners in Canada.

Based in St. Louis, Global Velocity’s ICS solutions and its Securio platform allow companies to get a comprehensive view of where their sensitive data is located, where it’s going, how it’s getting there and if it’s secure. Designed for the cloud paradigm, ICS emphasizes the security of the data itself, rather than of networks or data centres.

Global Velocity says resellers can use the solution to extend their other cybersecurity product and services offerings, and realize new revenue opportunities with vulnerability assessments and security audits. Its new Securio Channel Partner Program is designed to help resellers increase sales and help customers detect and prevent data breaches and maintain governance compliance.

“Trusted advisors are critical in the security world for customers. Small-and medium-sized businesses struggle with complicated cybersecurity systems and are not prepared to defend themselves. They must turn to their trusted advisors to help businesses protect their data from the inside out,” said Global Velocity CEO Greg Sullivan, in a statement. “It is these trusted advisors Global Velocity is seeking with the launch of the Securio Channel Partner Program.”

The program has three tiers – Silver, Gold, and Platinum – with an annual license sale goal, and annual program sales that are waived in the first year. There are also training requirements for sales and engineering team members. Benefits include annual and residual commissions, deal registration, a ;ead referral program, support, and sales and marketing support.

Because Securio software can be based in the cloud, the vendor said partners can be up and running quickly delivering the new protection to their customers.

“Too much information security spending still focuses on the prevention of attacks, while not enough has been done to create or improve information monitoring and response capabilities,” Sullivan said. “Security officers often measure success by the number of intrusion attempts thwarted.  Cyber thieves measure success by the quantity and quality of data they are able to steal.  We should also be measuring our success and failures from the perspective of the data.”