A Key Milestone on My PerimeterX Journey: Announcing Our Partner Program

PerimeterX Partner Program

As we announced the PerimeterX Partner Program today, I started to think about my first discussion with PerimeterX CRO Dave Brown about the company. We talked about the power of the company’s cloud-native platform and the real-world impact they were having for companies. We talked about the need to expand their partner ecosystem. I told Dave, “I have some ideas how this can be done, so give me two weeks.” I went back to Dave with a plan that would be a win for PerimeterX customers, the partner ecosystem, and PerimeterX itself. To me, for any plan to work, it is critical that multiple audiences could benefit. Customers and prospects should be able to leverage their existing trusted partner/advisor, and for partners I wanted them to bring new discussions about the technology stack—and new insights—to expand their engagement with their clients.

Now let’s fast forward…

I joined PerimeterX at the end of March, just as the world was shutting down in light of the pandemic. It’s been an interesting five months…working from home, meeting the people and learning the business. One of the big reasons I joined the company was the potential to grow the business by expanding our go-to-market approach to include a full ecosystem of partners. And today is a big milestone for me and for the company as we announce the PerimeterX Partner Program!

The PerimeterX Partner Program includes solution providers, marketplace, and technology partners. Program members get sales and technical enablement, account and go-to-market planning services and opportunities to increase their revenue by offering their customers a complete and differentiated web app protection solution.

I’m excited that companies like EVOTEK, Fishtech Group, GuidePoint Security, Optiv, Sycomp,and Veristor have joined, and that the existing PerimeterX Partners Adobe, AWS, Contrast Security, DataDog, Fastly, Google, Hitachi, Microsoft, Okta, (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at: