Becrypt’s revamped channel strategy will target the quasi-public sector

Construction

Endpoint security firm Becrypt is hoping to make inroads with organisations like the police force and critical national infrastructure with a revamped go-to-market channel strategy for its encryption products.

Becrypt will extend the single-tier approach it has used to sell its most recently-developed product, Paradox, to cover its more mature suite of Disk Protect encryption software after finding success in the new format.

The company’s go-to-market strategy with Paradox, a secure operating system developed in partnership with the National Cyber Security Centre (NCSC), is largely services-driven.

In its 18-month lifespan, this has fit the managed service provider (MSP) mould where the success has been in cases where the product is “entrenched” in a partner.

“It's really about working closely with a small group of focused and proactive partners,” Becrypt’s go-to-market specialist Jo Holliday told Channel Pro.

“So that's really the joy of a Paradox. We're keeping it quite close to us. We want to help the partner understand how to engage with the end-user because we're just learning that journey at sales.

“As I say, it's been in the market 18 months, where previously, the development of technology’s very much done in partnership with UK Gov. So bringing it to market is about a small group of real specialist partners. So that's really driven the change.”

Holliday added the company reviewed its go-to-market strategy with its encryption products and saw that it too had a small, static and focused collection of partners, questioning why the company couldn’t streamline and simplify its resources internally.

The company said it’s not looking to scale at this time given the lessons it’s still adopting from selling the relatively young Paradox, which takes a very different shape to its established encryption software. This is more software as a service (SaaS) versus Disk Protect which “does what it says on the tin”.

This single-tier approached has been chosen because Becrypt has found a multi-tier approach could be resource-hungry and difficult to manage, while this allows for an easily-communicated strategy. The company effectively wants a single layer between the vendor and the customer.

Once a referencable group of partner relationships have been established, the company then plans to come back to the market to scale its operations. But for now, the firm’s happy focusing on its small group of specialised partners who “know what we do” and “know who to sell it to”.

“Really, it's about just sort of bringing it all under one roof, again,” Holliday added, and “making sure that we are properly supporting it enabling the new technologies as well as supporting the growth of old."

The ambition is to extend an established base of government and core public sector customers, like the NCSC, to reach spaces like quasi-governmental organisations. These may span from healthcare to policing.

But organisations like oil and gas companies or banking giants with a strong threat posture, in particular, are prime targets for Becrypt’s encryption and secure OS products.

The "most exciting conversations" according to the company, are happening with organisations working with critical national infrastructure due to Becrypt’s already fairly established status in the core public sector.

Keumars Afifi-Sabet
Contributor

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.

Latest in Business
Digital handshake concept with Hand shake between two businessmen with digital hand
SYSPRO appoints Josef Al-Sibaie to spearhead global expansion
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Flexible work concept image showing woman working in office environment side by side with woman working from home.
IT professionals aren’t budging on flexible work demands – and more than half say they’ll quit if employers don’t meet expectations
Cybersecurity team members discussing strategy in an open plan office space, with male and female practitioners standing and others sitting at desks.
UK tech firms have a chance to trial a four-day week this year – here's how other pilot schemes fared
Cyber security concept image showing a digitized padlock sitting on a blue colored circuit board.
LevelBlue launches new partner program that’s “built for the future”
NHS logo displayed on a smartphone screen in white lettering on a blue background.
DHSC eyes infrastructure overhaul amid £114 million IT spending boost
Latest in News
Digital handshake concept with Hand shake between two businessmen with digital hand
SYSPRO appoints Josef Al-Sibaie to spearhead global expansion
A telephoto shot of Evan Goldberg, founder and EVP at Oracle NetSuite, pictured from the waist up speaking onstage at the opening keynote of SuiteConnect London 2025.
‘Every feature that comes into NetSuite over the coming years is going to have AI’: NetSuite’s Evan Goldberg on the future of the platform and how AI will drive customer success
ChatGPT logo and branding pictured in white coloring against a black backdrop.
DeepSeek and Anthropic have a long way to go to catch ChatGPT: OpenAI's flagship chatbot is still far and away the most popular AI tool in offices globally
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Flexible work concept image showing woman working in office environment side by side with woman working from home.
IT professionals aren’t budging on flexible work demands – and more than half say they’ll quit if employers don’t meet expectations
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack