Strong partnerships are essential for surviving the crowded security market

Mockup image with padlocks to symbolise a cyber security vulnerability
(Image credit: Shutterstock)

Even within the fast-growing technology sector, the cyber security market has gone from strength to strength in recent years thanks to a greater awareness of threats and increasing data protection regulations like the EU's GDPR. Gartner predicts that worldwide security spending will increase by eight percent this year, reaching $96 billion (£71.72 billion) by the end of 2018.

The ongoing growth in global security spending presents a huge opportunity for the channel, with an unparalleled chance to secure new prospects as well as enhancing existing customer relationships with advanced security solutions.

That said, this unprecedented market demand comes with extremely heavy competition, with security vendors around the world looking to carve a share of the market for themselves. This means that channel partners and security vendors must approach new prospects with a unified, organised strategy if they are to succeed. A relationship built on mutual trust between vendor and channel, and strengthened with creative new approaches, is essential for this success.

Trust and confidence

In the fast-moving security market, the channel needs to do its due diligence before signing on a new vendor to ensure the product fits well with their stack and network of customers and contacts. Vendors, likewise, need to ensure they are taking on partners who are a good fit for their product and market plans. Good partners with the right experience and contacts will deliver quick wins, while a bad fit can lead to lacklustre results.

A well-balanced stack of security products is especially valuable as many organisations are looking to significantly increase, or even completely replace, their security strategies to meet regulations such as PCI-DSS 3.2, ISO 27001 and the Cyber Essentials scheme. This presents an ideal opportunity for channel partners armed with a comprehensive array of data management and security solutions to close some major new business deals.

The vendor needs to ensure partners are thoroughly on board and demonstrate the value of the product and the market need it's filling. With the security market so crowded, they need to establish how it's a must-have, not just nice-to-have. In-depth training sessions and a high degree of technical and sales support from the vendor will help partners buy into the product and increase their chances of closing deals.

Aside from the practical side of things, business culture is also very important. Both sides need to be happy to work with each other and share a similar mindset. Vendors also need to understand the channel and the importance of being 100% committed to it to avoid accidentally stepping on their partners' toes or making more work for them.

Having a cohesive approach to selling is very important, and both sides need to work closely together on opportunities. Channel partners can take the vendor in with them for sales meetings and work as a team through the initial messaging, solution demos, and proof of concept. The vendor meanwhile will greatly appreciate knowing they can count on the support of their partner doing the heavy lifting alongside them such as filling in RFIs and RFPs, and defining the criteria for success in joint Proof of Concept (PoC) trials.

Rewarding relationships

For the vast majority of channel partners, sales margins are easily the single most important aspect of any vendor relationship. With this in mind, it's important that a vendor offers margins that will provide the appropriate reward for the work their partners put in.

That said, while profits are always going to be the main concern, it's also important to bring in some more personal aspects to the relationship. One such example is regular social selling events, which act as a great way of getting our partners and key decision makers in a room together in a more informal setting.

These can then be themed around fun social events such as film clubs, pub outings, and provide a nice opportunity to get to know partners and key decision makers while providing a nice bonus alongside financial rewards. For example, we also offer a bonus award for the partners who come up with the most inventive social selling ideas as a way of encouraging creativity.

With a strong working relationship and understanding of each other's objectives and practices, vendors and channel partners can create powerful alliances that are well placed to take advantage of the on-going boom in cyber security.

Jim Harvey is regional director, Europe, at Thycotic

Latest in Security
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
23andMe logo and branding pictured on a sign outside the company headquarters in Sunnyvale, California.
Millions of 23andMe users’ genetic data could be up for grabs – and experts worry it’s a looming privacy nightmare
Malware Detected Warning Screen with abstract binary code 3d digital concept
Fake file converter tools are on the rise – here’s what you need to know
Oracle logo pictured on the front of the company headquarters in Redwood City, California.
Oracle breach claims spark war of words with security researchers
Cybersecurity concept image showing digitized padlock with data points flowing out from behind.
Security experts warn of ‘contradictory confidence’ over critical infrastructure threats
Latest in Feature
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?
A range of HP devices set on pedestals on the keynote stage at HP Amplify 2025 in Nashville, with a large screen in the background bearing the HP logo against a white background. The devices include AI PCs, laptops, and printers.
HP hones its edge AI ambitions at Amplify 2025