Press "Enter" to skip to content

Digital Shadows Adds Depth to Channel Program

Digital Shadows this week launched a four-tier channel program as part of an effort to encourage partners to incorporate the company’s SearchLight data loss prevention service within a cybersecurity practice.

Partners that meet or exceed thresholds at each of these levels will be provided with additional access to discounts, market development funds (MDF) and technical certifications, says Davitt Potter, director of managed security service provider (MSSP) and channel sales for the Americas at Digital Shadows.

Davitt Potter

The goal is to encourage partners to resell SearchLight or extend an existing managed service to include the ability to monitor data leakage on the Dark Web and possibly coordinate with law enforcement officials to eliminate sites selling stolen data, says Potter.

“We want partners to make it a part of a workflow,” says Potter.


Do you have the resources you need to run and manage your channel partners?

If not look no further than Gorilla Onboard.  For over 25 years they have been providing the services and talent the drives the channel. Partner recruitment services, Channel Account Managers, and Partner Marketing Management are just a few of the services they provide.


Interest in mitigating threats emanating from the Dark Web is rising because more cybercriminals have begun to offer stolen data via auction sites to the highest bidder rather than simply extorting a ransom payment to gain access to the key used to encrypt it. Critical data could wind up in the hands of an organization’s rival without anyone in the organization ever realizing it.

To combat that threat a small number of services that leverage search engine technologies to monitor the Dark Web have emerged. Those services afford partners an opportunity to add an offering to their portfolio that doesn’t require as much cybersecurity expertise to set up and manage as, for example, a firewall.

Digital Shadows has already doubled the amount of revenue being generated via partners in the last year, says Potter.

When it comes to stolen data most organizations just want to know what data was stolen so the can, for example, change the terms and conditions of a contract to render the data stolen worthless. Regardless of how tools such as SearchLight are employed it’s certain is that as organizations discover the scope of illicit activity on the Dark Web that affects them there is now a lot more interest both in understanding how it works and how best to thwart those leveraging it to profit from cybercriminal activity.

Be First to Comment

Leave a Reply