You are on page 1of 13

Unlock recurring revenuesin a

cloud-first world
1
What is Westcon Next Generation
Solutions (NGS)?
Westcon NGS is our solution-driven Go-to-market motion,
helping resellerpartners to driverecurring revenue around:
• Zero TrustAccess
• IoT/OTSecurity
• Next GenSOC
• Secure Cloud andDevOps
We are working with best-of-breed vendors in these spaces
and will help our partners identify the solutions best suited
to them, theircustomers and long-termstrategy.

2
Why any security reseller should
consider NGS technologies

Growing opportunity
• NGS focuses on cloud and aaS security solutions generating recurring revenue, driving
increased business predictability andstability.
• The global security market is predicted to grow by $64bn by 2023(~10% YoY). Westcon NGS focuses
on technologies thatgrowatabouttwicethat rate (~20%).
• We are partnering with NGS technology providers outperforming the marketand growing up to 3x
YoY.

Security vision
• Security is a moving target, keeping up with the ever-evolving security threats requires resellers and
their customers to consider new and emergingtechnologies.
• Support changing business needs, demanding scalability and flexibility, by focusing oncloud-native
security technologies from the cloud and to the cloud.
• Position yourself as trusted, value-added provider of full security solutions, creating customer loyalty
and a competitive advantage when pitching for newbusiness.

A holistic technology portfolio


• A well-rounded security technology portfolio contains both, the traditional technology leaders
with large install bases and market recognition, aswell as emerging and pure-play vendors.

3
How Westcon can support your NGS journey

Solutions-led Technology synergies Expertise Training


We deal in solutions not specific We have developed abest-of- breed Our NGS dedicated teams support We offer a large portfolio of vendor
vendor technologies. Our NGS portfolio of emerging, cloud-native you to identify the opportunity, qualifications and training as well as
business is built around solution vendors across the four NGS define an NGS strategy, enable your vendor- agnostic courses,
pillars and we’ll work with you to solution pillars. These new team, drive demand, supportPOCs/ collaborating with bodies such as the
identify which market you’d like to technologies integrate with our demos and close adeal. DevOps Institute.
explore and which vendors serve existing vendor portfolio creating
this market’s needs. the opportunity forstrategic
synergies and technology cross
and upsell.

4
Zero Trust
Access

Solution based Go-To-Market


Four NGS SolutionPillars

Next
Gen
SOC

Secure
SolutionAreas Cloudand
DevOps

Endpoint an Network and


d Mobile Infrastructure IoT/OT
Security
Identity

Data and
Applications Cloud

5
Business challenges driving Next Generation Solutions
Digital transformation increases the risk of cyberattacks

Lack of visibility Increased attacksurface Increased amountof Scarcity ofskilled


Rapid adoption of cloud apps, services As businesses transform their securityalerts securityanalysts
and mobile devices has resulted in a less network becomes increasingly As complex enterprises embrace the Increased numbers of dedicated SOCs has
clearly defined perimeter and lack of complex resulting inexpanding attack cloud, they are often buried in resulted in analystssalaries sky-rocketing.
visibilityfor securityteams. surfaces that are hard to secure. unmanageable amounts ofsecurity alerts, Businesses have to prove productivity and
paralysing expensive and hard to find ROI of these expensive resources.
security analysts resulting in slow response
rates to meaningful alerts.

Increasedvolume of Disparate workforce and Absolute need to provide


shared data customerbase security withoutaffecting
The ever increasing amount of data being The mobile workforce is growing faster network or application
shared digitally andthe surge of global data than ever, working from multiple locations performance
privacy legislations, makes keeping and networks using managed or When businesses adopt SaaS applicationslike
company data identified and safe a real unmanaged devices. Customers may Office 365 or G Suite, it isoftenbusiness
struggle. access company portals or digitalservices. critical for these to work seamlessly and at
speed.

6
Next-Gen Portfolio Pillars

Zero Trust Access Next Gen SOC Cloud Security & DevOps IOT/OT Security
‘Never trust, always verify’Keep assets, Detect attacks and breachesearly, in the Make cloud and app development secure Visibility of OT and IoT environments with
data and apps safe - wherever theylive face of exploding threat volumes and and automated threat detection and risk assessment
sophistication

• ThreatIntelligence • OT Endpoint Security


• Network Detection& • Zero Trust Cloud Security
• SDP/ZTNA • OT Network Segmentation
Network Response • N-S, E-W FW
• Crypto Segmentation • OT Network Monitoring
• Security Policy • FWaaS
Management • DDOS Protection

• Application Delivery
• Secure WebGateway
• CSPM
• BrowserIsolation • EDR • NAC
• CASB
Infrastructure • Centralised Security • SIEM-UEBA • Secure RemoteAccess
• Container Security
Management • SOAR
• API Security / WAF/WAAP
• Monitoring/ Dashboarding

Identity • Access Mgmt /IDaaS • Access Mgmt /IDaaS

Applications • Data Classification • Vulnerability Management


• Vulnerability Management • Vulnerability Management
and Data • DLP • DLP

7
NGS differentiation vendors
Zero Trust Access Next Gen SOC Cloud Security &DevOps IOT/OT Security
SDP/ZTNA Crypto Threat Network Detection & Zero Trust Cloud N-S, E-W FW OT Endpoint OT Network
• Pulse Secure Segmentation Intelligence Response Security • Check Point Security Segmentation
• Symantec • Certes • Infoblox • Palo Alto • Palo Alto • Palo Alto • Symantec • Check Point
• Netskope • F5 Networks Networks Networks • TrendMicro • Palo Alto
• F5 • Vectra • F5 Networks

Network Security Policy FWaaS OT Network DDOS Protection


Management • Check Point Monitoring • F5
• Firemon • Palo Alto • CyberX • Netscout
• Skybox Networks
• F5
• Check Point

Secure Web Browser Isolation EDR SIEM-UEBA Application CSPM NAC Secure Remote
Gateway • Symantec • Symantec • SumoLogic Delivery • Check Point • Pulse Secure Access
• Netskope • Menlo • TrendMicro • F5 • Palo Alto • PulseSecure
• Symantec • Palo Alto Networks • F5
• F5 Networks CASB • Netskope
• Menlo • Check Point • Netskope
• Cybereason • Symantec Container Security
SOAR • Check Point • Palo Alto
Infrastructure • Palo Alto • Menlo Networks
Networks • TrendMicro
API Security / • Check Point
WAF /WAAP
• F5 Monitoring/
• Pulse Secure Dashboarding
• Check Point • SumoLogic

Access Mgmt/ Access Mgmt/


IDaaS IDaaS
Identity • Ping Identity • Ping Identity

Data Classification DLP Vulnerability Vulnerability DLP Vulnerability


• Titus • Symantec Management Management • Netskope Management
• Skybox • Palo Alto • Symantec • CyberX
Applications • Check Point
Networks
• Palo Alto • PaloAlto
and Data • Networks • TrendMicro Networks
• Check Point
• Trend Micro
• Menlo

8
Our NGS vendor portfolio - Zero TrustAccess
Westcon NGS vendor What does the vendor do? How do reseller partners benefit from working with thisvendor?

Industry-leading zero trust security solutions that are Help your customers scale their data assurance posture to support the depth and breadth of any environment, whether deployed
network agnostic and have zero impact on performance top-of-rack, in a virtual environment, between data centres or simply across the WANor SD-WAN, while moving the conversation to
business impacts andROI.

A pure-play cloud security vendor that provides adaptive Help your customers accelerate their digital transformation journey with a proven security platform that is data-centric, cloud-
data-centricsecurity smart andfast.

Identity security providing multi-factor authentication, Help developers and enterprise IT customer to be agile and rapidly extend identity to their applications and environments – on-
intelligent access controls and identity data prem, cloud orhybrid
management.

Fast, reliable data identification and data Help your customers secure the ever-increasing amount ofshared data andrespond to the surge in global data privacy legislation.
classification Any DLP project should start with data identification and classification.

The world’s only cloud proxy platform with an Isolation Differentiate yourself from your competitors by offering a real industry-first security solution, specifically designed to enable
Core your customers digital transformation and SaaSadoption.

Other Westcon
vendorsplaying in
this arena

9
Our NGS vendor portfolio - Next Gen SOC
Westcon NGS vendor What does the vendor do? How do reseller partners benefit from working with thisvendor?

The leader in AI-based network detection and response Help your customers move from reactive to proactive threat hunting to drive next generation security. Vectra's large technology
solutions for cloud, SaaS and on-prem footprints ecosystem and vendor integrations open up the conversation to a large market.

A cybersecurity management solution that brings together Help your customers unite disparate solutions to enable process-driven services and support customers’ long-term business
millions ofdata points to give clear insight of what they mean initiatives.
for anorganisation

A holistic network security policy management solution Provide your customers with a solution that keeps their network safe without sacrificing speed. FireMon has integrations with most
leading security brands, offering resellers great up- and cross sell opportunities.

The market leader in continuous intelligence, delivering Licensed via a unique credit-based licensing model, Cloud SIEM Enterprise will provide the most cost- effective way to
real-time analytics and insights from a single, cloud-native provide prioritised and contextualised threatdata.
platform to speed decision- making and improve customer
experiences

A market-leader inenterprise class endpoint detection Provide CISOs a unique value proposition, future-proofing their businesses from sophisticated cyberthreats and automating the
and response (EDR) solutions work previously done by securityanalysts

Other Westcon
vendorsplaying in
this arena

10
Our NGS vendor portfolio - Cloud Security & DevOps
Westcon NGS vendor What does the vendor do? How do reseller partners benefit from working with thisvendor?

A pure-play cloud security vendor that provides adaptive Help your customers accelerate their digital transformation journey with a proven security platform that is data-centric, cloud-
data-centricsecurity smart and fast, following data everywhere itgoes.

The market leader in continuous intelligence, delivering Licensed via a unique credit-based licensing model, Cloud SIEM Enterprise will provide the most cost- effective way to
real-time analytics and insights from a single, cloud-native provide prioritised and contextualised threatdata.
platform to speed decision- making and improve customer
experiences.

Identity security providing multi-factor authentication, Help developers and enterprise IT customer to be agile and rapidly extend identity to their applications and environments – on-
intelligent access controls and identity data prem, cloud orhybrid
management.

The world’s only cloud proxy platform with an Isolation Differentiate yourself from your competitors by offering a real industry-first security solution, specifically designed to enable
Core your customers digital transformation and SaaSadoption.

Other
Westcon vendors
playing in this arena

11
Our NGS vendor portfolio - IoT/OT Security
Westcon NGS vendor What does the vendordo? How do reseller partners benefit from working with this vendor?

Market leader in IoT andindustrial cyber Help your customers prevent attacks on industrial IoT/OT systems and be at the
security leading edge of new cyber threat prevention trends.

Other
Westcon vendors
playing in this arena

12
Are you ready to take
the next step?
Speak to your Westcon Account
Manager to set up a
• Next Generation Solutions consultation
• Discuss which NSG solutioncomplements your
technology portfoliobest
• Experience the NGS solution for yourselfand request a
demo

Email:xxx
Web: xxx
© 2020 Westcon-Comstor, All rightsreserved

You might also like