The real value of the security VAD

Add button on a calculator

Vendor consolidation has dominated the IT security space over recent years, with the market becoming increasingly influenced by larger vendors selling a broad portfolio of products; a high volume low margin sale.

In terms of resale and distribution, this consolidation has lead to a degree of channel rationalisation. When one vendor acquires another, it effectively acquires additional sales channels. In many cases, the channel will be by-passed completely with vendors selling online directly to the end user.

So with this in mind, what is the future for the smaller ‘value add’ channel players? Has Value Add Distribution lost its mojo?

Real knowledge

The high volume, low margin sales model adopted by the larger vendors is mirrored by broadline distributors. They buy product technologies at the cheapest price with a quick turnaround. These technologies are mainstream and are often sold alongside competing products by the same distributor. Broadline distributors have thousands of different products to sell and so don’t develop any real knowledge of the products.

The broadline approach is often the most appropriate for the larger mainstream vendors with commoditised products, where price is the focus. But the model is reactive to customer requirements, not proactive and ultimately it’s more about fulfilment than business development.

This is where the Value Add Distributor (VAD) still has a place. A vendor taking a leading edge technology to market needs a sales channel that understands the proposition; a partner that has the knowledge (or can easily obtain the knowledge) to communicate the benefits of an emerging technology to potential end user customers.

No-brainer

A VAD will operate in a niche market, understanding the context of the product and the needs of the customer. This means that the VAD has the ability to customise or package products together offering a ‘solution’ to the end user. The VAD becomes an extension of the vendor’s sales force. When presented with a choice between recruiting 20 people or partnering with a VAD which already has a team with established contacts and industry knowledge; in my view it’s a no-brainer.

So, when the future of the Value Added Distributor is questioned, I would argue that it’s more important than ever. While broadline will occupy the mainstream, the VAD proactively sells leading-edge specialist technologies, while they are still cutting edge.

The VAD is needed when a product is more than simply a price and a part number.

Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?