Cylance has been awarded the highly coveted MSPAlliance MSPWorld Cup Award™ at the MSPWorld Conference in New Orleans, LA. MSPAlliance and MSPWorld events are recognized worldwide as the premier gathering place for managed service providers (MSPs).
This award recognizes technology enabling companies that have demonstrated consistent efforts to advance the cause of managed service providers across the globe by providing cutting edge technologies and solutions.
Comprised of more than 40,000 member companies, MSPAlliance is committed to increasing the reliability and dependability of managed mission-critical IT services. Through the industry’s only accreditation program and code of ethics, the MSPAlliance empowers companies to improve their respective return on investment in technology procurement and implementation.
“We are happy to hear that Cylance, although a relative newcomer to the MSP space, has already been overwhelmingly recognized as a valuable asset by members of the MSPAlliance community and MSPWorld attendees,” said Charles Weaver, CEO of MSPAlliance.
“At every MSPWorld, we strive to bring to our attendees the best and most relevant members of the vendor community and this year, Cylance didn’t disappoint. Without the types of tools and technologies provided by companies such as Cylance, the MSP community would be hard pressed to deliver the types of quality services their customers demand.”
The MSPWorld Cup Awards were created so that the MSP community the world over, could easily identify those companies that have been recognized for having the best enabling technology in their respective fields.
The MSPWorld Cup is awarded by a blind committee of MSPAlliance Members appointed to evaluate each sponsor based on: Technology, Relevancy, Booth Presence, Community Spirit and Conference Participation.
“Cylance is thrilled to be recognized as a MSPWorld Cup Award Winner by the members of the MSPAlliance, further validating our prevention-first approach to security,” said Brian Stoner, Senior Director Global (Read more...)
This is a Security Bloggers Network syndicated blog post authored by The Cylance Team. Read the original post at: Cylance Blog