Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

News

November 4, 2020 |

Security Dangers Present Risk and Reward for Partners, According to Tech Data

Security VP Alex Ryals discussed current and long-term threats, as well as technologies for mitigating them, during a keynote presentation at the company’s Security Enforce event today.

The swift, and likely lasting, rise of work-from-home computing has exposed end users to a frighteningly diverse set of threats, according to Alex Ryals, Tech Data‘s vice president of security solutions for the Americas.

“There’s a whole different risk factor working from home,” he said this morning during a keynote at Tech Data’s second annual Security Enforce conference.

Ryals highlighted multiple Tech Data services that partners can use to mitigate those risks during his presentation, including an offering previously known as Remote Home Secure that is now named RECON Home. 

“This is an assessment service that you can sell to your customers, and the idea is simple: We want to go in and train and equip employers to know a little bit about how to secure work-from-home employees, and we want to go interview and train employees.”

Ryals called attention to Tech Data’s information sharing and analysis organization, called RECON ISAO, as well. The threat intelligence service, which receives continuous input from a community of external analysts as well as the Arizona Cyber Warfare Range and National Cyber Warfare Foundation, is designed to keep partners on top of the latest trends and exploits.

Users who get hacked despite offerings like RECON ISAO, Ryals added, can utilize Tech Data’s Incident Response Emergency service, which draws on expertise from three outside vendors with incident response expertise.

“We can quickly help you get lined up with someone to help with the digital forensics and the recovery process for your customer without any delay,” he stated.

Ryals also encouraged Enforce attendees to promote third-party solutions from Tech Data’s product catalog to customers with home-based employees, especially in categories like web, email, and endpoint security. “Endpoint’s so important because we have work-from-home employees with lots of new laptops, and companies are starting to have budgets loosen up so they can replace their endpoint with a next-gen endpoint solution,” he said.

Security analytics tools are a growth opportunity as well, Ryals added. “We have so much data and information coming in from our security devices and appliances that customers don’t know what to do to find information that’s really relevant,” he observed.

Ryals also forecast increased sales of firewalls next year, even though they’ve been down in 2020. “I think the reason is because customers oftentimes have a firewall good enough for now to keep them for the next couple of quarters,” he said.

Ryals guided listeners through a rundown of emerging threats likely to become more urgent in the future during his keynote. Those include attacks leveraging artificial intelligence.

“Hackers use this kind of technology very creatively,” he reported, pointing to digitally fabricated videos as an example. “We’ve seen a lot of these fake videos start to crop up in 2019 and in ’20. We’re going to see even more deepfake videos in ’21,” he predicted.

Attacks targeting 5G networks and devices will become increasingly common next year and beyond as well, he continued, in part because 5G is a more software-based technology than its predecessors. 

“We all know that software is much more likely to have vulnerabilities in it than hardware does,” noted Ryals, who recommended installing endpoint security and VPN products on mobile devices to guard against 5G attacks.

Exploits utilizing quantum computing technology, though a less imminent threat, will eventually pose enormous risks too, he predicted. “Quantum computers can crack passwords and encryption incredibly fast. If you have a 14-digit password encrypting some sort of a dataset for you on a hard drive or something, you could decrypt that over a year probably with a modern computer,” Ryals said. “You could probably do that in about a minute with a quantum computer.”

The first Security Enforce event, held last year at this time in Chandler, Ariz., coincided with the launch of Tech Data’s Cyber Range, a hands-on cybersecurity education and demonstration facility for partners and their customers. That site has been closed to visitors since March due to the coronavirus, but remains open to partners virtually. 

“In fact, in October alone, we held 17 virtual events in our cyber range,” said Ryals, who hopes to resume in-person engagements early next year.

Ryals also discussed how investments from Apollo Global Management, the private equity firm that that now owns Tech Data, are helping the company streamline operational processes and consolidate disparate tools during his keynote.


Editor’s Choice

Broadcom-VMware Shakeout: How the Channel Has Been Affected By the Big Industry Acquisition

April 11, 2024 |

Industry experts weigh in on the “messy breakup” that MSPs were left with after Broadcom’s acquisition of VMWare.

Selling Cybersecurity: How MSPs Can Become Crucial Partners in Managing Risk

March 27, 2024 | David Powell

MSPs should try to bring an end customer into the cybersecurity fold. Here are some ways to help drive that.

3 Questions with Ingram Micro’s Sanjib Sahoo on Integrating AI into Managed Services

March 25, 2024 |

Ingram Micro’s EVP and chief digital officer shares some insights on how MSPs can effectively integrate artificial intelligence into their business operations.


Related News

Growing the MSP

Explore ChannelPro

Events

Reach Our Audience