ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Exclusive Interview: Chillisoft to challenge the channel with new chief

By Ben Moore
Fri 13 Jul 2018
FYI, this story is more than a year old

20 years ago Kiwi Geoff Cossey started Chillisoft, trying out a few different approaches, as a young business does, before finding a gap in the New Zealand IT industry that he knew he could fill - the lack of cybersecurity.

To solve this problem Cossey brought the widely renowned ESET software into the country, selling the first ever licence in NZ in 2002.

Since then, Cossey and Chillisoft have made ESET the number one endpoint security solution in New Zealand and gained 1000 partners across Oceania.

“I was drawn to his experience in the industry”

Cossey has now decided that the time is right to bring on a new business partner with the background, foresight and entrepreneurial know-how to kick Chillsoft up a notch.

Enter Alex Teh, a Kiwi-kid done good who exited his own UK-based cybersecurity company two years ago with $40 million in turnover.

“After 20 years I began to think ‘what else could we do?’, and so I began defining a role for an executive search process,” Cossey tells ChannelLife.

“Alex came out of left-field for me. I was drawn to his experience in the industry, and his openness on to how to work together as partners and what that could mean for the company, the staff, and the wider market. He will bring fresh ideas, energy and enthusiasm to the business all around our core relationship with ESET.”

Teh made the choice to move from his role as Exclusive Networks Pacific country manager in order to flex some of the muscles he developed building his own business.

“I was attracted to becoming a business owner and partner and applying my entrepreneurial skills to cybersecurity distribution,” Teh says.

“One reason I have invested in Chillisoft is that it reminds me of my company in the UK called Vigil Software. We were focused on Marshal Software and that business grew to $40 million in turnover and 50 staff when I sold it in 2016.”

“Machine learning - this is something ESET has been offering for years”

As Cossey and Teh move forward they are planning for Teh to take over more of the day to day running of the company while Cossey gets a little more time to look after his other interests.

But before that, there is plenty to do - For starters, there is some discussion about bringing on new vendors to create a more cohesive and comprehensive solution portfolio, all based around supporting the solid core of ESET, a company in which Teh already sees the value.

“I am thrilled to be working with a vendor that is the market leader globally,” Teh says.

“Their tech has always far exceeded its competitors because they are an innovator and are constantly developing.”

He outlines three reasons he sees ESET as a step above the rest:

“One - It is the lightest agent out of all the vendors, it’s infinitely less resource hungry.

“Two - The amount of WAN traffic noise it creates is far less than the competition.

“Three - The company is an innovator - It has been using machine learning in its solutions since 1995 and machine learning-based detection since 2011.

“All these companies who talk about being ‘next-generation’ because they use machine learning - this is something ESET has been offering for years. AI is one of the many tools that are required to provide complete protection.”

“Cybersecurity needs to be boutique and focused because it’s more critical”

The nature of the distribution game has been shifting faster than ever in the recent industry climate.

Value-add is becoming more specific to each market, pre- and post-sales support is expected, and white label marketing is becoming more so - box-dropping and broad-based distribution are quickly becoming out-dated.

In this regard, Chillisoft as a boutique cybersecurity distributor could be considered ahead of the game.

“We have 15 staff at the moment, including a solid tech team who can handle any tier one or two support issues, and a sales team that can even handle tier one if they need to,” Teh says. There are amazing systems for the turnaround of quotes, always-available tech support and efficiency of processes which create value for partners dealing with smaller value transactions.

“There are some products in IT that are adequately served by a warehouse approach, but cybersecurity needs to be boutique and focused because it’s more critical - there is more at stake. Being 100% focused allows you to be the go-to people for knowledge, understanding and solutions in this area. That’s why we are in the perfect position to service vendors and partners.”

“Our ultimate goal to be a true extension of the partner”

Cossey and Teh want to reassure current and future partners that this focus is going to be kept front and centre as they move forward.

“Chillisoft will remain extremely selective and mindful,” Cossey says.

“I’ve been doing this 20 years and I’ve seen that change is constant and today there is not much more than there’s ever been. There are always new opportunities and problems that technology can solve.”

“Specialisation is extremely important. We eat and breathe cybersecurity. Our ultimate goal to be a true extension of the partner, using our services to help them look better and bigger,” Teh adds.

“Chilisoft is the cybersecurity distie that does the simple things really well and the difficult things better than anyone else.”

Related stories
Top stories
Story image
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
PwC NZ unveils new Cloud Security Operations Center
PwC New Zealand has unveiled its new Cloud Security Operations Center for the entire Microsoft technology stack.
Story image
Lightspeed launches all-in-one marketing platform in A/NZ
ECommerce provider, Lightspeed has launched a new all-in-one marketing solution, Lightspeed Marketing & Loyalty in Australia and New Zealand.
Story image
Artificial Intelligence
SAS unveils AI experience to improve kids' batting abilities
SAS has created The Batting Lab, an interactive experience using AI, computer vision and IoT analytics to help kids improve their baseball and softball swings.
Story image
Commerce Commission
ComCom welcomes new marketing codes for the telecom industry
The Commerce Commission is welcoming the creation of new marketing codes for the telecommunications industry.
Story image
Cradlepoint expands its Cellular Intelligence capabilities
Cradlepoint has announced additional Cellular Intelligence capabilities with its NetCloud service.
Story image
Hard numbers: Why ambiguity in cybersecurity no longer adds up
As cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. Getting rid of ambiguity becomes necessary.
Story image
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
New SAS service overcomes subscription fatigue for media companies
SAS has launched SAS 360 Match which helps media companies move towards a AVOD model to generate revenue as subscribers cancel.
Story image
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Fonterra to use automated guided vehicles by Dematic
New Zealand's dairy giant Fonterra is upgrading its manufacturing facility in Edendale with new automated guided vehicles (AGVs) from Dematic.
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Remote Working
How zero trust and SD-WANs can support productive remote working
The way people connect with applications and data has changed, users are remotely accessing resources that could be stored anywhere from a corporate data center to the cloud.
Story image
NCSC advisory highlights poor security configurations
The GCSB's National Cyber Security Centre (NCSC) has released a cyber security advisory identifying commonly exploited controls and practices.
Story image
Apple previews new features for users with disabilities
Apple says new software features that offer users with disabilities new tools for navigation, health and communication, are set to come out later this year.
Story image
A third of companies paying ransom don’t recover data - report
Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
Story image
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
New Relic enters multi-year partnership with Microsoft Azure
New Relic has announced a strategic partnership with Microsoft to help enterprises accelerate cloud migration and multi-cloud initiatives. 
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Managed service providers: effective scoping to avoid costly vendor pitfalls
Managed security services are outsourced services focusing on the security and resilience of business networks.
Story image
Artificial Intelligence
AI-based email security platform Abnormal Security valued at $4B
"A new breed of cybersecurity solutions that leverage AI is required to change the game and stop the rising threat of sophisticated and targeted email attacks."
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Workato unveils enhancements to enterprise automation platform
"The extra layer of protection with EKM, zero-logging, and hourly key rotation gives customers a lot more visibility and control over more sensitive data."
Story image
Commerce Commission
ComCom appeals $2.25 million fine in Vodafone FibreX case
The Commerce Commission has filed an appeal in the High Court against a $2.25 million fine imposed on Vodafone NZ for its offending under the Fair Trading Act.
Story image
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Application Performance Monitoring / APM
Why SolarWinds Partners will have big wins in 2022
We summarise the key recent changes that the monitoring software vendor has made to accelerate its channel business.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
WolfVision announces new range of visualisers
WolfVision has announced a new range of visualisers to help meet multiple industry demands for remote learning and educational solutions.
Story image
Legrand unveils Nexpand, a data center cabinet platform
Legrand has unveiled a new data center cabinet platform, Nexpand, to offer the necessary scalability and future-proof architecture for digital transformation.
Story image
Meadows exits Ingram Micro New Zealand on a good note
We look at the resignation of Danny Meadows from Ingram Micro's New Zealand Unified Communications & Collaboration business unit.
Story image
PNY launches XLR8 Gaming EPIX memory products in A/NZ
PNY has launched its XLR8 Gaming EPIC-X RGB™ DDR4 Silver 3200MHz and 3600MHz memory products in Australia and New Zealand.
Story image
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Digital Transformation
How to modernise legacy apps without compromising security
At a time when digital transformation has become central to business, even the most important applications come with a ‘use-by’ date.
Story image
New digital traffic light system to tackle construction defects
Smarter Defects Management launches its PaaS digital system and says it will revolutionise managing defects in the construction industry.
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.