ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Exclusive interview - How the channel can help protect NZ’s cyber space.

By Ben Moore
Thu 18 Jan 2018
FYI, this story is more than a year old

Exclusive Networks NZ general manager Alex Teh has a mission - to get New Zealand enterprise up to speed with cybersecurity, and he says that the channel is the answer.

After selling his UK based cybersecurity company a year ago, he moved back to New Zealand and has spied a gap in the market that needs to be filled.

ChannelLife sat down with Alex to hear the numbers and get his perspective.

Tell me the numbers, what are we talking about here in terms of cyber threat in New Zealand?

Well, we have the second highest rate of ransomware attacks in the southern hemisphere.

The international average for the number of days that it takes to detect a breach is 250; in New Zealand, it’s 520.

One-fifth of our population has experienced some sort of attack, that’s about 800,000 people.

The CEO of every publicly listed company has experienced phishing, or as we call it ‘whale-hunting’, and because their email address and everything is out there, people are posing as CEOs in order to target others.

Those are some confronting numbers. What are Exclusive Networks doing to help combat this?

It's Exclusive Networks' job, and the channel's job, to ensure that our partners are trained, have the right information, and have the ability to provide intelligent advice to their customers.

The world of distribution providing warehousing and credit facilities as value-added is simply not good enough anymore.

Distributors have to do a better job at education and training.

They should be a true extension of the vendor, technically, commercially, strategically, all of those important things that help partners grow their cybersecurity business. 

Why has NZ fallen behind other countries with this?

I don't know, I haven't been around for 16 years, but I see a market gap and there is a massive opportunity for organisations that can breach the gap.

I also think distribution has been cannon fodder for staff poaching, which means the good ones are always leaving for vendor jobs or reseller jobs because those organisations tend to pay more.

However, I think that gives distributors an opportunity to bring up, coach, train young, new blood into the industry.

I would prefer to hire a young, enthusiastic, intelligent person that I can mould than a dinosaur any day (we laugh). You can quote me on that.

I will! As someone who has been on the outside for some time, how do you see the NZ channel?

We're quite mature as a channel-led business environment.

A lot of our resellers and managed service providers (MSPs) are quite advanced in the provision of managed services, cloud services, and outsource services.

As a market, we have developed that way due to the fact everyone is fighting over the same resources, which is why partners that have been able to build technical capabilities that can be provided to a wider group of organisations have been extremely important to the growth of the channel in NZ.

From a cybersecurity perspective, I think that the channel is learning to do more but when you look at what international organisations and international government bodies are doing around cybercrime, I don't think that we are doing enough.

Europe and Australia have introduced compliance drivers, the GDPR  (General Data Protection Regulation) and the breach and notification law, which allow central government bodies to fine organisations for data breaches.

I think organisations that lose that data need to be held accountable and it is the channel's responsibility to provide the capabilities to provide defence against these types of leakage and attacks.

There has also been a lot of progress in the technology of cybersecurity with the integration of AI.

Great that you brought that up, I grew up in the generation of The Terminator and The Matrix and my generation have a fear that AI could be the cause of global destruction just because they watched too many Hollywood movies but In my opinion, AI is instrumental in the provision of cyber defence.

Read more about Alex’s opinion on AI in cybersecurity.

It's more acceptable than ever to just put everything on the cloud both as a business and personally, especially the next generation of digital natives, which means that a lot of data can be found in one place.

You've hit the nail on the head. Although I'm fully in agreement that the adoption of cloud is fantastic for NZ companies, I also would challenge the fact that the security around cloud services such as Azure and AWS have not adequately been addressed.

When I’ve asked companies that are using AWS or Azure, "What are you doing about securing your data in the cloud?" many individuals that I've spoken to have said, “We haven't thought about that yet.”

If I was a hacker or writing malicious code, that is gold. If I took out an MSP or a cloud provider I'd not only get that one company, I would get a whole variety of information from all their customers that I could take advantage of – just imagine if was compromised.’

What can channel players do right now?

Build up their cybersecurity portfolio, rather than just focusing on having a good anti-malware product at the endpoint and having a good next-gen firewall product at your gateway.

I think that's the opportunity for the channel; you will see partners that specialise in security really thrive in the future because rather than selling them a firewall and an antivirus you're selling an entire solution set.

For example, when an organisation is looking at putting in a DLP product, they should look at the business outcome they are trying to achieve.

I would recommend they look at classifying and structuring their data before buying a DLP product and then making sure that when the DLP product is installed, we give their users the ability to transfer that information and data securely by providing a good managed file transfer product to use.

Putting in a solution set of products like that requires specialist value-add from a partner that has been trained to look at the workflow rather than just shipping a product to a customer.

How long until NZ catches up with its data breach regulation?

Less than 5 years.

I think that journalists will catch onto the fact that many people are interested to find out what data breaches have occurred in NZ and which boards and IT departments have swept it under the carpet hoping they will never be found out.

Do you think there have been any high-profile data breaches in the last few years that have gone unreported?

I know many and I've only been back in the industry a year.

I can't tell you about them as it's not my position and I have confidentiality agreements in place but the day will come where it’s mandated for those companies to let the market know that they've been breached.

And that day will be very soon.

Related stories
Top stories
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Artificial Intelligence
SAS announces new products amid cloud portfolio success
Analytics and AI company SAS is deepening its broad industry portfolio with offerings that support life sciences, energy, and martech.
Story image
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe SSDs with the WD_Black SN770 Game Drive.
Story image
Commerce Commission
ComCom appeals $2.25 million fine in Vodafone FibreX case
The Commerce Commission has filed an appeal in the High Court against a $2.25 million fine imposed on Vodafone NZ for its offending under the Fair Trading Act.
Story image
KnowBe4 celebrates reaching 50,000 customers worldwide
KnowBe4 has reached the milestone of 50,000 customers, adding nearly 2,500 in the first quarter of 2022 alone.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.
Story image
Cradlepoint expands its Cellular Intelligence capabilities
Cradlepoint has announced additional Cellular Intelligence capabilities with its NetCloud service.
Story image
Artificial Intelligence
SAS unveils AI experience to improve kids' batting abilities
SAS has created The Batting Lab, an interactive experience using AI, computer vision and IoT analytics to help kids improve their baseball and softball swings.
Story image
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
PNY launches XLR8 Gaming EPIX memory products in A/NZ
PNY has launched its XLR8 Gaming EPIC-X RGB™ DDR4 Silver 3200MHz and 3600MHz memory products in Australia and New Zealand.
Story image
Legrand unveils Nexpand, a data center cabinet platform
Legrand has unveiled a new data center cabinet platform, Nexpand, to offer the necessary scalability and future-proof architecture for digital transformation.
Story image
Artificial Intelligence
SAS launches human-focused responsible innovation initiative
SAS has launched a responsible innovation initiative, furthering its commitment to equity and putting people first.
Story image
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
Tyson Beckford partners with Element Case on new AppleWatch band
Celebrity Tyson Beckford has collaborated with STM Brands' Element Case brand to create a rugged new accessory.
Story image
Application Performance Monitoring / APM
Why SolarWinds Partners will have big wins in 2022
We summarise the key recent changes that the monitoring software vendor has made to accelerate its channel business.
Story image
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
New Relic enters multi-year partnership with Microsoft Azure
New Relic has announced a strategic partnership with Microsoft to help enterprises accelerate cloud migration and multi-cloud initiatives. 
Story image
Commerce Commission
ComCom welcomes new marketing codes for the telecom industry
The Commerce Commission is welcoming the creation of new marketing codes for the telecommunications industry.
Story image
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
New SAS service overcomes subscription fatigue for media companies
SAS has launched SAS 360 Match which helps media companies move towards a AVOD model to generate revenue as subscribers cancel.
Story image
Meadows exits Ingram Micro New Zealand on a good note
We look at the resignation of Danny Meadows from Ingram Micro's New Zealand Unified Communications & Collaboration business unit.
Story image
Remote Working
How zero trust and SD-WANs can support productive remote working
The way people connect with applications and data has changed, users are remotely accessing resources that could be stored anywhere from a corporate data center to the cloud.
Story image
Workato unveils enhancements to enterprise automation platform
"The extra layer of protection with EKM, zero-logging, and hourly key rotation gives customers a lot more visibility and control over more sensitive data."
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Artificial Intelligence
AI-based email security platform Abnormal Security valued at $4B
"A new breed of cybersecurity solutions that leverage AI is required to change the game and stop the rising threat of sophisticated and targeted email attacks."
Story image
A third of companies paying ransom don’t recover data - report
Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
Story image
Apple previews new features for users with disabilities
Apple says new software features that offer users with disabilities new tools for navigation, health and communication, are set to come out later this year.
Story image
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Lightspeed launches all-in-one marketing platform in A/NZ
ECommerce provider, Lightspeed has launched a new all-in-one marketing solution, Lightspeed Marketing & Loyalty in Australia and New Zealand.
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
The 'A-B-C' of effective application security
Software applications have been a key tool for businesses for decades, but the way they are designed and operated has changed during the past few years.
Story image
Managed service providers: effective scoping to avoid costly vendor pitfalls
Managed security services are outsourced services focusing on the security and resilience of business networks.
Story image
NCSC advisory highlights poor security configurations
The GCSB's National Cyber Security Centre (NCSC) has released a cyber security advisory identifying commonly exploited controls and practices.
Story image
Digital Transformation
How to modernise legacy apps without compromising security
At a time when digital transformation has become central to business, even the most important applications come with a ‘use-by’ date.