Cambia, Vigilar Team
Cambia has formed a reseller relationship with Vigilar
ALPHARETTA, Ga. -- Cambia Security, a leading provider of security policy enforcement software, today announced it has formed a reseller relationship with Vigilar, Inc., an information security consulting firm. Under the agreement, Vigilar will market and distribute Cambia CM as part of its Threat Management product portfolio.
According to a recent IDC report, the security and vulnerability management software market as a whole is expected to grow by 17.8 percent annually, exceeding $3 billion by 2009. With this forecasted expansion of the market, the agreement between Vigilar and Cambia Security comes at an ideal time. Vigilar will resell Cambia CM to its established base of more than 2,000 clients in industries such as retail, healthcare, manufacturing, financial services and government agencies.
"Cambia CM is a great addition to our portfolio of network security products," said Lee Rudd, vice president of operations for Vigilar. "Network security is a top concern for our enterprise clients. With Cambia CM, we can provide them with an agentless solution that works continuously to safeguard network asset integrity. In addition, we know our clients want to reduce the time they spend on reporting for security audits, and Cambia CM can help our clients report for security audits faster yet retain security integrity, especially in enterprise environments that change almost daily."
"We are excited about our partnership with Vigilar, and believe that their expertise in information security and compliance will bring the benefits of Cambia CM to a wider range of enterprises," said Jethro Felton, vice president of sales and business development for Cambia Security. "By working with Vigilar, we will further strengthen our position in the overall network security market."
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024