Exclusive Networks UK has today announced its distribution partnership with Elastica. The inability of traditional solutions to provide security and compliance for enterprise cloud app usage has created demand for a new breed of security solutions that analyst firms say will be adopted by 25% of enterprises by 2016.
The Cloud Access Security Broker space, according to Gartner, is No. 1 of the top 10 security technologies in 2014/2015. Gartner expects that in the coming year 27 percent of all enterprises will have over half of their IT in cloud applications. By 2017, 33 percent of enterprises will be adopting cloud applications.
Exclusive has already recruited new Elastica reseller partners and is executing an accelerated campaign of marketing events and lead generation activity to generate momentum.
“The widespread adoption of cloud services by UK enterprises has raised big questions about how threats can be detected – and data protected – which in turn presents major revenue potential for resellers that understand how to jump on this opportunity,” said Graham Jones, Country Manager at Exclusive Networks UK. “Resellers have helped customers deploy SOCs (Security Operations Centres) but these urgently need augmenting for cloud app security. Elastica has been at the forefront of delivering innovative cloud app security solutions that address this missing piece. Their solution is easy to deploy, letting customers grasp the value and start protecting their cloud app usage immediately. All the experts are predicting significant growth in the cloud app security market and we’re seeing a big appetite out there from enterprises.”
“We have seen Exclusive Networks over the years successfully support incredible market growth through a genuine value-adding approach,” said Karl Driesen, VP EMEA at Elastica. “Exclusive and its resellers can take full advantage of this unique market opportunity, which is poised to explode.”
Exclusive UK partners will have access to Elastica’s CloudSOC portfolio to help enterprises eliminate exposures of sensitive and regulated data, identify and thwart malicious activity, and achieve greater visibility into and control of their use of cloud applications.