The channel is helping to bake in endpoint security
With endpoints expanding, how can the channel approach security with integrated technologies that protect every device?


Security has transformed as enterprises have become more flexible organizations with widely dispersed workforces, with this shift demanding a new approach to endpoint security for channel suppliers.
There’s an effort to integrate robust cyber security into a plethora of digital devices typically used across a company's processes and workers. Workers migrating to their homes and other remote sites has shifted the debate towards integrated approaches that include a core hardware component.
Industry Insight
A more holistic approach is needed to make sure comprehensive security is available for every digital device, says IDC in a report assessing the security landscape, in partnership with HP. It highlights hardware-based “root-of-trust” technologies that can bake security in below the level of the operating system, in particular.
Ransomware, phishing, malware, and compromised email systems are all clear and present dangers for enterprises and their digital devices in use. With multi-channel attacks also becoming more common, VARs and MSPs are pivoting to incorporating a hardware-based approach into cyber security defences.
"Customers are increasingly looking to purchase services rather than just devices, and channel partners can offer those who have concerns about hybrid workers’ security add-ons like remote management capabilities for desktop as a service (DaaS) models,” Dr Ian Pratt, HP’s global head of security for personal systems tells ITPro. “Services like these, which add an extra layer of protection at the endpoint for their customers, are a great opportunity to generate a recurring revenue stream for the Managed Service Provider.”
An end-to-end approach to digital security is a clear trend in the channel marketplace. Enterprises are looking to reduce their tech stack to reduce costs and improve efficiency, and enhance digital security in a landscape business owners see as increasingly risky to their operations.
Built-in endpoint security
One attack vector that’s continued to expand is firmware updates, with examples including LoJax and MosaicRegressor. Hardware used by dispersed workforces has been under sustained attack for several years, and having firmware authentication built into the hardware is a robust response to this level of cyber attack. Channel suppliers are increasingly seeing demand for this kind of integrated security as businesses look to create a more robust and flexible cyber security envelope.
ChannelPro Newsletter
Stay up to date with the latest Channel industry news and analysis with our twice-weekly newsletter
Increasing the availability of devices with built-in endpoint security for channel suppliers is a differentiator in the marketplace. Businesses have always bought best-of-breed, and when their security needs are considered, the choice available is expanding. VARs are progressively being asked to simplify the procurement of devices and, with these purchases, also support more comprehensive security. VARs' relationship with vendors lets them influence how security hardware architectures should advance to meet the defensive needs of their clients.
Built-in endpoint security including HP’s Wolf Security for Business, as well as Intel’s Boot Guard and Hardware Shield protect devices by defending the BIOS. Vendors are also embracing artificial intelligence (AI), with notebook PCs from Lenovo and Asus embedding this technology to deliver built-in security that VARs can offer to businesses seeking to boost cyber security through hardware procurement.
“Advanced security tooling can work alongside network security and user authentication to protect endpoint devices by increasing visibility, prevent tampering, or malware infections utilising machine learning techniques to move beyond signature-based protection,” says Rick Hemsley, UK&I government and public sector cyber security lead, EY. “This combined approach will enhance the overall security posture of the business and provide greater protection against evolving threats.”
The channel’s role in safeguarding enterprises
Nearly a third (29%) of businesses attribute a data breach in hardware to an external attack, according to Forrester. For many companies protecting their remote workers have become a priority. Deploying VPNs, for example, has formed the basis of secure remote network connectivity. However, as threat actors have become more sophisticated, and workers now use multiple devices in several locations, a hardware approach to digital security is expanding to become the foundation onto which all other defenses are built.
“Hardware-based security offers better protection from manipulation and interference than its software-based counterpart because it’s more difficult to alter or attack the physical device or data entry points,” says Michela Menting, digital security research director at technology research firm ABI Research.
In addition, Chris Vaughan, VP, technical account manager, Tanium, also points out that enhanced hardware security doesn't add more complexity for users: "The good news is that while it takes a lot of work to hack hardware security devices, it doesn’t require reskilling on the employees’ part to take advantage of the added security.”
Moving forward, the channel will play a vital role in ensuring their customers have the latest hardware that defends their businesses from the expanding threat landscape enterprises see expanding.
“Consider the threat landscape, security requirements, scalability, integration, performance impact, ease of deployment and management, vendor reputation and support, TCO, future-proofing and training,” says Nathan Charles, head of customer experience at cyber security specialist OryxAlign.
“Choose a hardware-based endpoint security solution that aligns with your needs, protects endpoints, and integrates well with existing infrastructure, all while being cost-effective and providing reliable support.”
For business leaders looking to enhance their digital security at the time of new hardware purchases, the built-in endpoint security options now available across channel providers are expanding.
The accepted approach to creating robust cyber security has been to protect devices with security software that runs above the operating system, with that layer increasingly vulnerable. Channel partners are now critical to create the zero-trust security all enterprises need. This level of protection must begin at the hardware level to ensure comprehensive defenses are always operational.
David Howell is a freelance writer, journalist, broadcaster and content creator helping enterprises communicate.
Focussing on business and technology, he has a particular interest in how enterprises are using technology to connect with their customers using AI, VR and mobile innovation.
His work over the past 30 years has appeared in the national press and a diverse range of business and technology publications. You can follow David on LinkedIn.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Strategies for guarding against emerging cyber risks and invisible threats
Industry Insights Attacks are evolving at a rapid pace, here are the key areas where the channel can help businesses bolster their defenses for the year ahead
By Mick Paisley Published
-
The role of cyber security in the UK’s tech renaissance
Industry Insights As the UK aims to be a tech superpower by 2030, robust cyber security is crucial to protect against increasing threats to emerging technologies and critical infrastructure
By Gavin Mee Published
-
Consolidate to simplify application security: Why this is a business imperative
Industry Insight New research shows 70% of organizations struggle with complex, disjointed security testing solutions - fragmentation leads to wasted resources, inefficiency and elevated risk levels.
By Jason Schmitt Published
-
Why businesses should embrace the zero trust networking trend
Industry Insight Cyber attacks are on the rise and VPNs no longer constitute robust network security - zero trust network access (ZTNA) offers a modern, achievable security solution for businesses of all sizes
By Chris McKie Published
-
Busting nine myths about file-based threats
Whitepaper Distinguish the difference between fact and fiction when it comes to preventing file-based threats
By ITPro Published
-
The Total Economic Impact™ of the Intel vPro® Platform as an endpoint standard
Whitepaper Cost savings and business benefits enabled by the Intel vPro® Platform as an endpotnt standard
By ITPro Published
-
From complexity to clarity: The channel opportunity in streamlining cyber security
Industry Insight Upcoming legislation and a rapidly evolving threat landscape means organizations can't afford to lose track of security transformation plans - and the channel can play a key role in bolstering defenses
By Scott Walker Published
-
The Total Economic Impact™ of IBM Security MaaS360 with Watson
Whitepaper Cost savings and business benefits enabled by MaaS360
By ITPro Published