Feeds

Oz channel in the spotlight for Kaspersky

Product launches backed with reseller support

Boost IT visibility and business value

Along with a new product release, Kasperky Lab is also prepping a 12-month assault on Australia’s IT channel with the aim of growing its business here by 20 per cent in the current financial year.

Andrew Mamonitis, ANZ managing director for Kaspersky’s local office, says that the company’s consumer brand-building of recent years (which has seen it taking sports sponsorships in Sydney and Melbourne) is going to be supplemented with more attention to the channel.

With unnamed competitors taking on more direct business, Mamonitis sees an opportunity to pick up new partners for Kaspersky Lab. In particular, he said, partners of other security vendors are finding themselves growing to a level where they can pitch to large enterprise and government contracts, “only to find themselves competing with their vendor”.

Other attractions to the channel, he said, would be margin protection for partners even in discounted deals, and in upgrade sales. “We won’t disadvantage the channel partner for renewing a customer they signed up 12 months ago,” he said.

Identifying other channel initiatives in the works, Mamonitis highlighted increasing attention to industry verticals, and greater business-to-business marketing efforts. Those include a promotion, K-Kash, which gives resellers a sliding top-up from Kaspersky of between 7.5 percent and 15 percent of a deal price depending on the number of licenses sold.

The products behind the launch are the company’s Endpoint Protection 8.0 and Security Center 9.

EP 8.0 integrates with Kaspersky’s cloud-based database. To overcome administrator concerns over sending signature or application data back to Kaspersky, only a snapshot of the suspicious behaviour is sent back, said the company’s Asia-Pac technical VP, Nathan Wang.

“We can then search the Internet for similar behaviours, threats or files,” he said, “without trading out privacy.”

The cloud approach – increasingly popular among all security vendors – is designed to accelerate responses, Wang explained.

The Security Center 9 provides “single pane of glass” policy management for devices from smart phones up. Combining both a hardware and software inventory allows policy to be set at the user, device, connection type an application level.

SC 9 also provides another angle for the channel, Wang said. “A distributor, reseller or service provider can sell, install, and then offer the management, monitoring and reporting to the customer as a service.” This particularly suits resellers with small business customers, he said. ®

The essential guide to IT transformation

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.