• SIMPLIFY. EXPAND. GROW.

    SIMPLIFY. EXPAND. GROW.

    SMB. CORE MIDMARKET. UPPER MIDMARKET. ECOSYSTEM
    LEARN MORE
  • ARTIFICIAL INTELLIGENCE

    ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • IT SECURITY TRENDS

    IT SECURITY TRENDS

    SMB & Midmarket Security Adoption Trends
    LATEST RESEARCH
  • CHANNEL PARTNER RESEARCH

    CHANNEL PARTNER RESEARCH

    Channel Partner Trends
    LATEST RESEARCH
  • FEATURED INFOGRAPHIC

    FEATURED INFOGRAPHIC

    2024 Top 10 SMB Business Issues, IT Priorities, IT Challenges
    LEARN MORE
  • CHANNEL INFOGRAPHIC

    CHANNEL INFOGRAPHIC

    2024 Top 10 Partner Business Challenges
    LATEST RESEARCH
  • 2024 TOP 10 PREDICTIONS

    2024 TOP 10 PREDICTIONS

    SMB & Midmarket Predictions
    READ
  • 2024 TOP 10 PREDICTIONS

    2024 TOP 10 PREDICTIONS

    Channel Partner Predictions
    READ
  • CLOUD ADOPTION TRENDS

    CLOUD ADOPTION TRENDS

    SMB & Midmarket Cloud Adoption
    LATEST RESEARCH
  • FUTURE OF PARTNER ECOSYSTEM

    FUTURE OF PARTNER ECOSYSTEM

    Networked, Engaged, Extended, Hybrid
    DOWNLOAD NOW
  • BUYERS JOURNEY

    BUYERS JOURNEY

    Influence map & care-abouts
    LEARN MORE
  • DIGITAL TRANSFORMATION

    DIGITAL TRANSFORMATION

    Connected Business
    LEARN MORE
  • MANAGED SERVICES RESEARCH

    MANAGED SERVICES RESEARCH

    SMB & Midmarket Managed Services Adoption
    LEARN MORE
  • WHITE PAPER

    WHITE PAPER

    SMB Path to Digitalization
    DOWNLOAD

Techaisle Blog

Insightful research, flexible data, and deep analysis by a global SMB IT Market Research and Industry Analyst organization dedicated to tracking the Future of SMBs and Channels.
Anurag Agrawal

Mid-Market Firms Get a Boost in Cybersecurity with Dell’s Latest Portfolio Enhancements

Dell’s recent enhancements to its security portfolio address midmarket companies' specific security concerns and goals. Dell has significantly expanded its security portfolio with in-house capabilities and partnerships to enhance its threat protection, management, and incident response capabilities. The company’s new additions are crucial in addressing mid-market businesses' security challenges. According to Techaisle data, cybersecurity prevention investments are the highest technology priority for core and upper midmarket firms. With an average spending increase of 8.6%, 64% of midmarket firms are boosting their investments in cybersecurity solutions. The main reason for this spending increase is advanced threats and the rise of remote working, as reported by 61% of firms. In today's digital environment, cyberattacks are becoming increasingly prevalent and sophisticated, posing a threat to companies of all sizes. The traditional approach to security revolved around building higher cyber walls, hoping that no one would cross them. However, in the last ten years, attackers have found ways to breach these walls, making it necessary to have preventive strategies in place. Businesses must therefore prepare for the possibility of breaches and their potential impacts. Consequently, they must have a comprehensive security portfolio that offers end-to-end protection – from detecting and preventing threats to minimizing the damage in the event of a breach and helping users recover their data.

Mid-market enterprises are particularly susceptible to cyberattacks due to their limited resources compared to larger organizations. They face the same challenges as their larger counterparts but require more resources to defend themselves. To address these challenges, mid-market businesses need a security portfolio that can protect their operations from cyberattacks and minimize the risk of financial and reputational damage, especially as cyber threats become increasingly sophisticated. This article examines how recent updates to Dell’s security solutions portfolio can help mid-market businesses navigate the evolving threat landscape and enhance their protection capabilities.

dell midmarket cybersecurity

Anurag Agrawal

OpenText - A Cybersecurity Powerhouse Built on Strategic Acquisitions

OpenText's transformation from a Canadian document management company to one of the world's leading software providers is nothing short of remarkable. The driving force behind its growth has been a focus on cloud-based solutions, which led the company to go on an acquisition spree, bringing several specialized companies/brands under its umbrella. Cybersecurity is one arena where OpenText has taken a deliberate approach over the last decade with multi-billion dollars of capital investment to bring together critical purpose-built solutions to provide holistic coverage to its customers.

The company’s acquisition of data protection provider Carbonite (ninth cloud-specific acquisition overall) and endpoint/threat intelligence software provider Webroot marked a significant milestone in its quest to create a single, unified, and robust security portfolio.

With the Carbonite and Webroot acquisitions, OpenText became a go-to option for managed service providers (MSPs) and small and medium businesses (SMBs) seeking a one-stop shop for security and data protection, filling a void in the market with its broad portfolio. Experts have opined on OpenText’s offerings: “It's one vendor, one brand, one program, one partner strategy, one go-to-market, so small customers and partners don't need to work with multiple vendors. OpenText Cybersecurity can provide all of it."

However, this was just the beginning. OpenText's subsequent acquisitions of email encryption software provider Zix, security software provider AppRiver, Network Detection and Response provider Bricata, and enterprise software provider Micro Focus further strengthened its position in cybersecurity. The approach to consolidate all security and data protection services in a single platform – serving as the foundation to deploy the right capabilities and manage and administer their environment has made things easier for customers of all sizes. In addition, OpenText's comprehensive portfolio provides a robust and reliable option for businesses seeking to enhance their cyber resiliency. In the following sections, we will explore OpenText's trajectory to becoming one of the leaders in the cybersecurity domain.

opentext acquisitions 1

Anurag Agrawal

Continuously improving IT security is both an SMB challenge and a USD68B opportunity for suppliers

Small and midsized businesses find it challenging to defend their users, applications, and data against external threats. Data from Techaisle’s SMB and Midmarket security research reveals 63% of US SMBs report that they experienced one or more cyberattacks in the last year, contributing to an average of 3.6% of revenue loss attributable to security incidents. For 46% of SMBs, preventing cyber-attacks is one the most pressing and critical IT issues. Yet, 59% of SMBs are very confident that their firms could recover from a cybersecurity incident. Nevertheless, security issues cast a long shadow over SMB IT priorities, especially as firms embrace the benefits of hybrid work, hybrid IT, only to find that their environments become more complex and more challenging to manage and protect. SMBs respond by expanding security budgets – but they lack the staff and expertise to construct effective shields around their organizations. The channel, working with leading-edge products like those from Fortinet, Cisco, Dell Technologies, Palo Alto Networks, has an essential role to play in defending their clients’ SMB businesses against security threats.

The origins of the saying “it’s about the journey, not the destination” may be unclear. Ralph Waldo Emerson, theologian Lynn H. Hough, Canadian rapper Drake, or others may have said the phrase, but its applicability in an IT security context is clear. There is no endpoint at which security is ‘done’; security requires constant updating to stay current with expanding threat vectors.

This requirement for continuously improved IT security is both a challenge and an opportunity for security suppliers.

What is the opportunity?

Techaisle has pegged global SMB security spending in 2023 at $68 billion. However, high IT security spending levels and growth rates mask an underlying sense of confusion concerning safeguarding emerging cloud and hybrid IT environments – and a lack of resources to address this problem. Compounding – or perhaps, causing – the lack of clarity into cloud security issues and the relatively tepid adoption rates for cloud security solutions is that SMB IT operations are under-resourced. Without specialized staff, SMBs cannot keep pace with the constantly changing threat vectors and security options.

The lack of insight by small businesses becomes clear: only 5% have IT security staff. 44% of midmarket firms have an average of three full-time internal security staff, but the demands of a business of this size would exceed a single individual’s bandwidth. The percentages more than double for upper-midmarket firms. Simply put, SMBs lack the bench depth needed to dedicate IT resources to security. Everywhere within the SMB segment, there is a mismatch between available resources and the depth of the skills required to keep pace with security needs.

The lack of understanding of a threat associated with a widely-used platform on the one hand, and the lack of IT staff resources available to address security concerns on the other, produces a clear conclusion: SMBs need suppliers to step up to the delivery of secure IT environments.

In many cases, these suppliers will be the mainstream channel partners who supply the SMB’s technology and act as the IT management presence within the SMB’s business. In other cases, including in many midmarket environments, the source of security products and services will be specialized managed security providers who focus tightly on operating SOCs and protecting client environments. In some scenarios, firms will ‘land’ by entering a client account from one of these positions and then ‘expand’ to serve a broader range of IT supply needs – crowding out competitors who can’t address the risk and compliance issues that are central to the CEO’s mandate.

What is the security supplier call to action?

As security suppliers move towards managing SMB security needs, they need to address the pace at which their clients absorb new offerings. Small businesses will not embrace eight new technologies, nor are midmarket firms going to integrate fourteen new solutions into their environments. Even if this were possible from a budget perspective, it would cause chaos in the business.

Instead, suppliers of security services need to co-create a security roadmap with their SMB, which starts with assessing the customers’ executive teams’ tolerance for risk. What absolutely must be secured, and in what order? The security supplier can then identify the solutions that best fit the customer’s immediate and longer-term needs and then deploy, integrate and manage the solutions over time. After all, data shows that 45% of SMBs feel it will be beneficial for them if an external services firm can help define and implementing security policies.

One key point of exposure in this process is the ability to ensure that different solutions work together. In the cloud world, and increasingly in the on-premise world as well, channel partners and MSPs focus on integrations: the breadth of a single vendor’s product line, plus – and importantly – the extent to which third parties develop and support links to a firm’s products.

There will be no slowdown in the digital transformation of SMBs; their business infrastructure will increasingly rely on technology. Likewise, there will be no slowdown in the threats to that infrastructure; as reliance on technology increases, so does the potential bounty for attackers. And as a result, there will be a continuous and growing need for IT security services – which will sustain firms adept at delivering and managing security solutions that combine expertise and industry-leading technology.

Anurag Agrawal

Top 10 SMB and Midmarket Predictions for 2021

In all sectors, 2020 was a challenging year – and as a result, 2021 is challenging from a market planning perspective. The disconnect between 2020 and 2019 was so severe that it rendered spend forecasts virtually useless: IT suppliers reacted to shifting market trends in real-time. As we enter 2021, IT product and service suppliers look to create a context for understanding the range of outcomes that the new year may bring. Techaisle's 2021 report series illuminates issues and requirements in the vast SMB market to support that effort. To start 2021, here are our top 10 predictions.

1. Digital inequality will be more important than the digital divide
2. Quest for reinvention, innovation, resiliency will drive bursts of incremental transformation goals
3. The hybrid workplace will require HR focus and drive adoption of workspace, workflow solutions
4. Meaningful customer partners and not trusted advisors will determine supplier success
5. Pragmatism will overtake progressiveness in technology adoption for a future-ready organization
6. Requirements for automation and enhanced IT services will become time-critical
7. Security and risk mitigation will focus on a safe middle ground
8. Systems of insight will move into the analytics mainstream
9. AI will arrive as a capability integrated within other solutions
10. Open source adoption will become an indicator of cloud success

Research You Can Rely On | Analysis You Can Act Upon

Techaisle - TA