Exclusive Networks continues global trend with Infinipoint
Distributor seals third worldwide deal in a matter of a few weeks as it adds more depth to its security portfolio
Exclusive Networks has made a habit in recent times of signing global agreements with vendors, as the distributor continues to establish itself as a partner that operates on a worldwide level.
The past few weeks have seen the channel player build on relationships with Juniper Networks and F5 Networks, and it has followed that up with a global deal with zero-trust player Infinipoint.
The deal will see Exclusive taking the technology out to mid-market targeted partners, starting in Europe with the UK, France and Germany before going more global next year.
Graham Jones, managing director of Exclusive Networks UK, said that it prided itself on adding value, and that was being recognised by vendors.
“We’ve always said there are the small guys and there are the big guys, and we’ve managed to bridge the gap, by trying to be a large global value added distributor,” he said.
Jones added that the recent IPO had not necessarily triggered the global deals but the fact the firm was listed and now sharing its valuation and growth ambitions had helped enhance its reputation.
“I think the IPO was separate to this, but obviously it gave us some credibility,” he added. “I really want people to prefer to buy from us.”
Identity as a service
Ariel Kriger, global vice-president of sales and business development at Infinipoint, said it was looking to make waves in the device identity-as-a-service segment and wanted a distributor that could support its growth ambitions.
“Exclusive Networks was the natural choice to support our market acceleration, possessing the necessary specialist cyber expertise and global scale to enthuse, educate and serve pent-up partner demand for this gap in the zero-trust market,” he said.
“Extending a zero-trust security posture to devices remains an essential and urgent requirement for every work-from-anywhere workforce,” said Kriger.
“To do it properly, you have to do it by design, with adaptive access controls acting on device context, continuously checking device posture not just at the point of access – all the while not burdening the IT department or negatively impacting end user productivity.”