Risk
5/11/2011
10:11 PM
50%
50%

SIEM Vendor Gains Traction Among VARs

Longtime partner BryTech commends TriGeo for its solutions and approach to the channel.

When it comes to choosing vendor partners, solution providers take a number of factors into account--chief among them, viability, margins, and channel-friendliness.

So it's no wonder that TriGeo Network Security is filling its VAR ranks with relative ease. The vendor is working hard to recruit partners strategically as it further penetrates the midmarket space with its Security Information and Event Management (SIEM) solutions. In the past eight months or so, TriGeo has formed new alliances with about a half-dozen new solution providers.

One of TriGeo's longtime partners is Smyrna, Ga.-based BryTech, an integrator that sells to a broad range of companies, 80% of which are SMBs. "TriGeo's channel program is what sold me," said Carl Garrett, regional sales director at BryTech. "They co-sponsor our security events and forums, helping us put together invite lists, flying in their experts, and helping us with presentation material. They even split the cost of events 50-50."

BryTech customers say TriGeo's support is "off the charts--an 11 on a scale of 1 to 10," Garrett said. What's more, TriGeo keeps the lines of communication open and protects the solution provider's margins, which Garrett describes as outstanding. "We speak to the folks at Trigeo two or three times a week to discuss marketing strategies. They help us find new opportunities."

A key draw of TriGeo's solutions is real-time log analysis, which Garrett says other vendors in the SIEM space don't offer. This allows companies to proactively seek out potential problems before they occur instead of reactively engaging in damage control.

"TriGeo's products work well for any company where security and government regulations are big concerns," Garrett said. This includes financial services firms such as banks and credit unions (Sarbanes Oxley), healthcare companies (HIPAA), and retail operations (PCI).

"BryTech is one of several channel partners TriGeo currently works with across the country," said Michelle Dickman, president and CEO of the SIEM vendor. "We value our channel partners. They open up doors for us to potential new customers, and we work together to grow not only the TriGeo brand but their brands as well."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.