Credence Security, the Middle East region’s premier Value Added Distributor for cybersecurity, forensics, governance, risk and compliance solutions, has announced its partnership with ColorTokens, a global leader in unified, cloud-based security solutions. Under the agreement, Credence Security will offer ColorTokens’ Xshield and Xprotect products to customers across the Middle East, Africa and India (MEAI) region.
“Traditional security approaches assume that everything inside of an enterprise network can be trusted,” said Lee Ealey-Newman, VP Channels for EMEA and APAC at ColorTokens. “Yet the Digital Transformation we see in today’s modern workplace means enterprises are adopting multi-cloud strategies, with an increased focus on dynamic microservices. Organisations need stronger security postures if they are to prevail against an increasingly malevolent threat landscape.”
As targeted attacks and insider threats become more common across the region, protecting the corporate perimeter is no longer sufficient. ColorTokens has adopted a Zero Trust approach designed to protect enterprise environments of all scale from careless, compromised or even criminal users. Such an approach drastically reduces the risk of unauthorised access to critical applications and data.
“We see a significant opportunity in this partnership to leverage Credence’s established ecosystem, long-time expertise and local presence,” continued Ealey-Newman. “Credence’s Value Added solution approach will help ColorTokens deliver optimal business benefits to a wider range of partners and end customers across the PAN-EMEA region.”
ColorTokens’ award-winning, Xshield, provides full visibility and security of workloads from the data centre to the cloud. It allows security teams to improve their security posture with granular drill downs and software-defined micro-segmentation that is unchained from the network. Xprotect provides advanced, proactive endpoint security, insulating devices from breaches, malware, ransomware and zero-day attacks with an easy to deploy, cloud-based approach that only grants permissions to company-sanctioned applications.Click below to share this article