One of Cisco’s top cybersecurity channel partners, Sentinel Technologies is taking security-as-a-service to the next level through its SecuritySelect platform that’s driving more than 200 percent year-over-year growth in security sales.
"We’ve really taken a holistic and advanced approach to how we sell security," said Robert Keblusek, CTO of the Downers Grove, Ill.-based solution provider, ranked No. 117 on CRN’s 2017 Solution Provider 500 list. "Security isn’t a one-time purchase anymore. It’s an ongoing effort regardless of whether the customer is doing it themselves, or we’re doing it in conjunction with them, or if they want to fully hand everything to us. We’ve wrapped all of our offerings and programs around those different options for our customers and prospects, and they’re welcoming it with open arms."
Sentinel’s SecuritySelect architecture brings together hundreds of different products from vendors like Cisco, Attivo Networks, Carbon Black and Palo Alto Networks into a single management dashboard, with à la carte licensing agreements.
[Related: 12 Hot Networking Products For The Summer]
"If a customer has Palo Alto Networks, Check Point, Sophos, Cisco – there’s hundreds of products we can integrate so we can start to get the visibility across everything they already own," said Keblusek. "We then increase visibility with our own sensors."
The platform is enabling Sentinel, who expects to reach $225 million in sales this year, to grow security-as-a-service revenues by upwards of 250 percent in 2017, while its overall security business is over 200 percent.
Using the cybersecurity framework suggested by the National Institute of Standards and Technology (NIST), SecuritySelect provides solutions around identifying, protecting, detecting, responding and remediation. Offerings include asset management, risk assessment, data security, continuous monitoring, mitigation and recovery planning, to name just a few.
Sentinel’s Security Operations Center (SOC) option inside SecuritySelect closely monitors the network and related infrastructure 24 hours a day, all year, to detect and eliminate both exterior and interior threats as they emerge. Methodologies include behavioral monitoring and digital forensics to identify and isolate potential issues for further analysis and investigation to quickly find and stop the source of an attack.
"SOC gets you executive level consulting on an on-demand basis," said Keblusek, adding that Sentinel’s SOC business is up 300 percent this year.
"We’re very focused on reducing the bad-guy time to operate and reducing the customers time to detect. Right now, the industry average is about 146 days – we’re taking that down to only a few days," said Keblusek. "Our sensors and our SIEM (security information and event management) detect things relatively immediately."
National electrical construction company MYR Group is one of Sentinel’s customers who is leveraging these services. "Sentinel [is] knowledgeable, responsive and extremely helpful with analyzing our threat detection landscape," said Jean Luber, vice president of Information Technology at MYR Group Inc., in an email to CRN.