DATA SECURITY

Credence Security, a Leading Cybersecurity and Digital Forensics Value-Added Distributor, has Launched a New Partner Portal

CREDENCE SECURITY | June 03, 2021

Credence Security, a Leading Cybersecurity and Digital Forensics Value-Added Distributor, has Launched a New Partner Portal
The demand for leading cybersecurity and digital forensics solutions is higher than ever. For over 20 years, Credence Security, a PAN-EMEA specialty distributor, has led in these areas along with governance, risk, and compliance, based in Dubai and regional presence in Johannesburg, London, Nairobi, New Delhi, and Saudi Arabia. Credence Security provides cybersecurity and digital forensics solutions to both public and private sector enterprises through a select network of specialist resellers.

In exciting news from the company, in response to its continued rapid growth, Credence Security recently announced the launch of its new Credence Security Partner Portal, which will enable easier deal registration, better tracking of opportunities, and SPIFF programs, access to sales and marketing materials, and much more. This is expected to be a precious tool for the company's resellers.

"Our channel partners are one of our most important relationships," commented Philip Cherian, Regional Channel Director. "We paid attention to our partner feedback and enhanced our Channel Partner Program and Partner Experience Portal, doubling down on our commitment to helping them succeed by continuing to invest in our Channel, tools, and infrastructure to support our partners across the region and make it even easier for them to do business with our vendors and us."

Credence Security is built on the foundation of 4 focus pillars – Continuous Adaptive Risk and Trust Assessment, Data Protection and Governance, Digital Forensics and Incident Response and Identity, Payments, and Data Security. "The value delivered in all of these areas is something that continues to grow, both as technology advances, but also from the company making every effort to understand the challenges partners and clients face so they can be more effectively addressed," commented Moe Bux, Regional Sales Director. "This strategy has been a key component in Credence Security's success and continued value-added growth."

The Credence Security Partner Portal launch arrives on the back of a record-breaking year for the channel team, which saw its best year across the channel in respect of:

• Channel team growth
• Overall revenue growth generated by our specialist resellers
• Partner growth in both geographical as well as vertical expansion

ABOUT CREDENCE SECURITY

Established in 1999, Credence Security, a PAN-EMEA specialty distributor, is cybersecurity, forensics, governance, risk, and compliance. Unlike most other distributors, we take a consultative "value-add" solution approach; we collaborate with our partners and their customers to understand their needs, both from a technology and business perspective, and then work very closely with our partners to deliver tailor-made solutions. Working closely with globally recognized, award-winning vendors including AccessData, ESET, Entrust, Magnet Forensics, ZeroFox, and Trustwave, Credence Security provides best-in-class, Cybersecurity and Forensics technologies and solutions to protect organizations against advanced persistent threats, malicious adversaries, and internal malpractice.

Spotlight

As a leading SaaS Customer Identity & Access Management provider for enterprises, Gigya is committed to maintaining only the highest level of performance and security. Our platform is optimized to deliver maximum efficiency and scalability while protecting your data with a series of strict security and compliance standards.

Spotlight

As a leading SaaS Customer Identity & Access Management provider for enterprises, Gigya is committed to maintaining only the highest level of performance and security. Our platform is optimized to deliver maximum efficiency and scalability while protecting your data with a series of strict security and compliance standards.

Related News

Hackers Are Using Google Analytics to Steal Your Credit Card Information

Search Engine Journal | June 29, 2020

Hackers are using Google Analytics to steal credit cards, passwords, IP addresses... basically everything shared with a hacked site.An investigation by Kaspersky Lab has uncovered a new hacking technique that uses Google Analytics to steal credit card numbers, user agents, IP addresses, passwords… basically everything.This isn’t an exploit in Google Analytics itself.Hackers are exploiting the trusted status given to Google Analytics by all browsers in order to steal information from hacked sites by using Google Analytics as a way to transfer that data.Kaspersky’s report noted that the exploit is stealing everything that is shared with the affected website, including credit card information but presumably that means password information as well.The exploit apparently steals “everything” from passwords, name and address, credit cards and even the personal information of the person sharing their information.

Read More

Leveraging Greater Social Engagement for Improved Cyber Hygiene

Cisco | May 19, 2020

Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. Practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. For example, despite the fact that we may be aware that using the same user ID or email account and password, for different cloud services, is considered risky behavior, and could result in a potential account hack or data breach, yet we do not change this behavior. How often do you share your best practices for securing your devices, cloud service applications, mobile applications and home networking equipment for connecting to the Internet with those around you in a social situation or manner? Do you recommend the use of available security settings to those around you in your social circles? Do you show them how to quickly implement the security settings? In this article we discuss some ways for improving cyber hygiene. Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. It’s worth to keep an eye out for the research going on regarding social cybersecurity, because it may have some answers to getting people and companies to better protect themselves. Learn more: CORONAVIRUS-THEMED CYBERATTACKS ON BUSINESSES RISE, EXPERTS RECOMMEND BEEFING UP NETWORK SECURITY “Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves.” ~ Stan Mierzwa, Director Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. This ranges from ensuring you install and keep your anti-virus or endpoint protection system up to date, apply software security updates, encrypt sensitive data, backup our important data, and this list can continue to grow. “Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk.” Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk. The Human-Computer Interaction Institute at Carnegie Mellon University and other researchers are bringing focus to this new scientific area of cybersecurity. As their website (www.socialcybersecurity.org) mentions, this group is leveraging insights from social psychology and other fields to develop novel interventions and strategies for nudging adoption of expert-recommended tools and practices. Can we leverage social interactions or the influence of social situations to enhance our cyber hygiene or help thwart cyber threats? The research results from interviews done provided a theme that the observability of security feature usage was a key enabler of socially triggered behavior change and conversation – in encouraging the spread of positive behaviors, discouraging negative behaviors, and getting participants in the study to talk about security. The work presented is innovative and brings encouragement and opportunities in how systems can be designed to encourage better cybersecurity behaviors. One can also think of Social Cybersecurity in contrast and comparison to the criminological theory called “Social Learning Theory”. In Social Learning theory, delinquents are likely to engage in deviant or criminal behavior when those actions have been positively reinforced. Learn more: PHISHING ATTACKS DISGUISED AS FAKE CERT ERRORS ON CISCO WEBEX USED TO STEAL USER CREDENTIALS

Read More

DATA SECURITY

Through Security Innovation Collaboration and Terranova Security, Organizations Can Create Unified Culture of Cyber Security

Terranova Security | July 28, 2021

The global partner of choice in security awareness training, Terranova Security, has announced a partnership with IT professionals' authority in software security training, Security Innovation. The partnership addresses creating a unified cybersecurity culture through role-based security awareness training, a critical business need for many organizations today. A unique challenge in creating a robust cybersecurity culture is faced by those managing cybersecurity-related training at organizations. Specific to their roles and responsibilities, Different departments and individuals need security awareness training. This actuality can lead to establishments often using numerous cybersecurity training programs to train their employees, which can upsurge the resources and cost of these efforts and blind spots when it comes to numerous cyber threats. Around topics such as phishing attempts, email safety, and strong password best practices, knowledge workers naturally need more comprehensive training. Conversely, around what can be done to nullify threats and how technology assets can be targeted, IT staff may require more focused training. However, technical teams like developers can require training in both areas to ensure that they're not only securing software and data but that they're not falling victim to an email phishing attempt. By asking users to toggle between numerous training programs to receive the essential training, establishments may complicate and discourage employees, leading to a feebler overall cybersecurity culture. With Terranova Security and Security Innovation, each organization's offering will be bolstered by more comprehensive content. The first one is recognized for providing best-in-class security awareness training for non-IT staff. The second one is recognized for providing outstanding security awareness training for IT staff. So, the result will be a seamless experience for the customer, both from a platform and a learning perspective. The partnership will deliver customers and their employee's access to an extensive array of security awareness training. Courses will include: • Methodologies backed by science • Hands-on simulations • The removal of complexity About Terranova Security The global security awareness training leader, Terranova Security, was selected by Microsoft as their partner of choice to bring the best in security awareness training content to customers. Successful Terranova Security awareness programs and phishing simulations have provided organizations worldwide with the most multilingual security awareness platform, the highest-quality content, intuitive phishing simulator, and training and communications portfolio in the industry. In addition, organizations continue to leverage the Terranova Security awareness 5-step framework, which provides an evidence-based, step-by-step approach to a successful security awareness program. About Security Innovation A pioneer in software security, Security Innovation, has literally written the book on How to Break Software Security. Organizations, since 2002, have relied on the company's training and assessment solutions to protect software wherever it runs.

Read More