Feeds

Tumbleweed blows across channel

Email security firm wants to 'go deeper and wider'

The Power of One eBook: Top reasons to choose HP BladeSystem

Messaging security vendor Tumbleweed recently adopted a new indirect global market strategy but reckons direct sales will continue to grow.

The firm, which has traditionally stuck to the direct business model and a customer base primarily made up of government, banking, finance and healthcare organisations, said it hoped to push up market share by partnering with resellers, system integrators and infrastructure folk.

Tumbleweed EMEA managing director Craig Whitney, who joined the vendor in May this year, told The Register that the firm had previously "concentrated on the security elite and we've done extremely well there.

"What we see now is a huge opportunity to go deeper and wider in different vertical markets or even market sectors such as the mid-tier and SMB space. In order to do that we need to really embrace the channel."

He said that up to now Tumbleweed, which was founded in 1993 and is NASDAQ-listed, had not been particularly well known within the channel. However, he reckoned that the firm has had a very positive response from potential partners following the launch of its new channel Alliance Programme last month.

Asked if part of its new channel strategy could be seen as a face-saving operation within the squeezed European direct market place, Whitney said:

"There's still a heck of a lot of growth that we see in the direct market, but the growth potential is probably a lot greater in terms of going to other markets where we haven't played before."

When Tumbleweed posted its preliminary Q2 results in July this year, it admitted that revenue had fallen short of expectations.

The firm hopes to bring around 30 European partners on board by the end of this year. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.