ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Partner content
Story image

Q&A: Green Light Worldwide's Vinny Narain chats about the company's plans for NZ

By Sara Barker
Thu 4 Nov 2021

Green Light Worldwide recently established a firm boots-on-the-ground presence in New Zealand with new hires and a reinvigorated commitment to bringing its specialised skillset of workforce-as-a-service (WaaS), consulting services, professional services, managed services and advisory services.

We spoke to Green Light's New Zealand business development manager Vinny Narain about the company, its Workforce-as-a-Service (WaaS) offering, and its presence in the New Zealand market.

Why did you choose to work for Green Light? 

Their partner-only model sets them apart from anyone else in the local market. Being part of the team that is building this in New Zealand was an extremely exciting prospect. I saw this as a natural extension of my previous roles managing various engineering and service delivery teams over the last 20 years. I could see significant growth potential for both Green Light, their partners, and myself.

Why do you think their business model works in New Zealand?

To get ahead you must stand out from the competition. Green Light's unique go-to-market strategy alongside its focus on delivering tailored client solutions. This allows our partners to build revenue quickly without the need to incur the cost of onboarding additional staff.

Green Light has the systems and teams in place to quickly find appropriate resources and will work with Partners directly to ensure Projects can be delivered on time and within budget. We also have access to a large pool of resources to assist with any other remedial activities they may have.

What does Green Light offer that makes them different from other IT service providers out there?

Green Light is primarily an outcome-focused service provider, which means they have skin in the game when it comes to delivery milestones. We have also heavily invested in our internal PMO and Service Delivery teams to ensure we can effectively deliver what we set out to.

We operate on a partner-only model and are vendor-neutral, this means that we white label our services, enabling our customers to grow their revenue streams without diluting their brand.

Green Light will also work with our customers' sales and pre-sales teams to uncover and successfully win new business opportunities for them.

What is your most effective service?

Green Light has five main service lines however we are seeing real traction in New Zealand with one particular service. Workforce as a Service, or WaaS, is Green Light’s short-term, task-based resourcing service that enables customers to supplement their workforce at short notice. This is done by providing skilled, experienced IT professionals to complete ad-hoc work on a temporary basis. We ensure the right resources with the right skills and equipment are ready for our clients to manage and direct.

Charges are based on effort undertaken which can be anywhere from a minimum 2.5-hour engagement up to 30 days. It is a very effective way to put task-based work in safe hands.

Where, specifically, can clients see value in using your WaaS service?

There are four main areas where we are mainly seeing traction with our WaaS offering:

  • As above, the first area is queue overflow. Green Light can provide resources to supplement a client’s current team to assist when there are high ticket numbers. We have a range of skilled professionals that our partners can flex into when needed.

    We provide this service to some New Zealand systems integrators, where we augment their teams in the main centres when their ticket numbers become unmanageable, and in more remote areas we are often the sole provider. Whether it’s installing, maintaining, or break-fix of supermarket checkouts and POS systems, or kiosks for ordering burgers, or checking in at the airport, our team has it covered.
  • The second area is patching. We have a team of skilled professionals that can help with requirements across infrastructure and networking devices. Green Light can also work within a client’s change windows to ensure they meet patching compliance.
  • Laptop or PC build and deployments is the third most popular area. We have a build factory that can build and deploy PCs and laptops with the client’s image. We can receive the equipment, unbox, build, and send it to the intended recipients.
  • And lastly is projects. We can provide a fixed price quote for repeatable and bespoke projects. Our skillset covers a wide range of ICT disciplines and we can provide resources into a specific location or work remotely. Our teams of engineers are spread across the regions from Northland to Invercargill.

What infrastructure or resources do you have in the A/NZ market?

Green Light has more than 14 years of experience and has built an impressive team of resources. We currently have more than 137,000 resources on our virtual bench, with over 30,000 of those based in New Zealand.

We have resources placed in most regional and remote areas of both the North and South Islands so we are often called upon to pick up spill-over tickets in those areas. 

If a partner or enterprise end-user wanted to engage with you, what is the best way?

Contact me via email at, on LinkedIn, and learn more about Green Light here.

Related stories
Top stories
Story image
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
Microsoft previews Power Platform website design offering
Microsoft has announced the preview of Power Pages, the fifth product in its Power Platform family, designed for low-code makers and professional developers.
Story image
Dynabook refreshes Portégé X30L series with the Portégé X30L-K
The new model contains hybrid-architecture Intel 12th Gen Core P-Series 28W processor options, Wi-Fi 6E, along with Intel Iris Xe graphics.
Story image
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Getac and Optalert expand partnership to promote industrial safety
Getac’s ZX70 Android tablets will be used to support Optalert’s Eagle Industrial early-warning drowsiness detection system for use in mining and transportation.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Story image
Hands-on review: HyperX Pulsefire Haste wireless mouse and HyperX Pulsefire XL Mat
With its lightweight Pulsefire Haste wireless mouse and RGB lit Pulsefire XL Mat, HyperX sets out to up your game and add a little colour to your desktop.
Story image
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
WhatsApp and QR codes the next scam threat - report
KnowBe4 has warned it expects to see an increase in QR Codes and the WhatsApp chat platform being used for phishing and other scams. 
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Artificial Intelligence
Frost & Sullivan recognises Genesys as leader in new reports
Frost & Sullivan has recognised Genesys as a leader in the cloud contact centre market for its robust cloud and digital capabilities.
Story image
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
'Alarming' rise in ransomware threats - Verizon report
As criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful.
Story image
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.