Telarus Advanced Solutions: Cybersecurity Practice Overview
The February 1st Telarus Tuesday call welcomed Telarus CPO and Co-Founder Patrick Oborn. Patrick Oborn reviewed our Cybersecurity practice with Jason Stein, VP of Cybersecurity on the Advanced Solutions team for Telarus. In this power-packed 90-minute conversation, we learned about security trends for 2022, discussed how each security provider performed in 2021, overview new security suppliers Telarus added to its portfolio in 2021, learned about the different ‘swim lanes’ within Security (Identify, Protect, Detect, Respond, and Recover) and how each provider fits, and learned about Telarus’ plans for next-generation Security provider selection tools in 2022. We went over the Cybersecurity Academy Schedule for 2022.
Advanced Solutions Team
The Advanced Solutions team focuses on a specialty and nuances of deals and opportunities, leading to growth and success. The team enables partners to sell more in their focused categories.
Security
It is one of the seven swim lanes of technology that Telarus focuses on. Here is a brief breakdown of Security.
- Identify
- Virtual CISO
- Cyber Consulting
- Vulnerability Assess
- Penetration Test
- Compliance
- Phishing Simulation
- Awareness Training
- Protect
- Managed Firewall
- Web Security
- Email Security
- Endpoint Protection
- Managed Cloud FW
- Data Protection
- Zero-Trust Framework
- Remote User VPN
- Patch Management
- Detect
- Log Management (SIEM)
- AI Machine Learning
- Intrusion Detection
- Intrusion Prevention
- SOC as a Service
- Respond
- Incident Response
- Containment / Eradication / Restore
2022: Key Objectives
- Brand Awareness Expansion
- Reminding all our partners to have conversations about security
- Partner Education (Local Emphasis)
- Round out the Security
- Guided and White-Labelled Security Sales Tools
- Supplier Proactivity
2022: UC Trends to Watch
These are industry trends that are also making an impact in the channel. Cyber insurance is a topic that is necessary for all organizations. There are many requirements to keep within insurance policy guidelines and procedures. Telarus can assist in making sure of compliance.
Cybersecurity Framework
Fundamental Steps
Identify
- General Cybersecurity Consulting
- Vulnerability Assessments
- Penetration Testing
- Compliance Readiness
- Virtual CSO
- Phishing Simulation
- Awareness Training
- Business Impact Analysis
Protect
- Managed Security Services (Firewall, Web, Email)
- Global DDoS Protection
- Endpoint Protection
- Managed Cloud Firewall
- Web Application Firewall
- Privacy and Data Protection
- Zero Trust and Software-Defined Perimeter
- Microsegmentation
- Mobile Enterprise Management Solutions
- Remote User VPN
- Patch Management
- Secure Access Service Edge
Detect
- Intrusion Detection and Prevention
- Security Log Monitoring (SIEM)
- Advanced Threat Hunting
- SOC (Security Operations Center) as a service
- Advanced Threat Detection and Awareness
- Machine Learning / AI
- Cloud Security Monitoring
- Log Management
- Threat Analytics
- Threat Analytics
- Managed Security Service (MSS)
- Managed Detect and Respond (MDR)
- Managed Endpoint Detect and Respond (EDR)
Respond
- Incident Response, Containment, and Eradication
- Active Remediation, MSS, and Endpoint Response
- Active SOC Response
- Advanced Global Incident Response
- Active Endpoint Threat Response
Recover
- DRaaS
- BUaaS
- Asset Reconstruction and Recovery
- Continuity Planning
Patrick provided an overview of Telarus’s providers; watch the Telarus Tuesday Call to get a comprehensive list of our providers.
For more detailed information discussed in the call, please watch the recording on YouTube! The entire recording is available here.
To learn more about Telarus, visit Telarus.com.