Mobile security represents untapped growth opportunity for ICT channel players

According to results of the recent CONTEXT ChannelWatch survey, the majority of resellers across EMEA believe there are increased opportunities in selling mobile products.

The CONTEXT ChannelWatch report, which surveys close to 7000 resellers in EMEA, highlights that 88% of resellers backed this fast-growing sector. Tablets (67%), notebooks (56%) and smartphones (49%) were singled out as driving distribution sales.

As the annual Infosecurity Show in London gets underway today, the ChannelWatch results show that more specifically, mobile security was highlighted as representing a potentially large untapped growth opportunity for many channel players. Half of all respondents from Western Europe said they currently don’t address security projects for mobiles for their business customers. Of those that do, the vast majority (69%) focus on small and medium sized businesses (SMBs).

In Eastern Europe, nearly two-thirds of channel players (64%) are currently not involved in mobile security projects for business customers – a much higher figure than in the West (50%). Of those that do, the vast majority (76%) focus on SMBs.

While half of the resellers polled said they weren’t engaged in security projects yet, this represents a huge opportunity for them going forward. With security top of mind in many businesses we expect to see growth in this area going forward.

CONTEXT ChannelWatch is an annual research study that provides the most detailed insight into reseller behaviour, opinions and attitudes from across EMEA. With 6799 responding to the 2014 review making it the largest study of its kind.

Working closely with our distribution Panel, we achieve the maximum response in each market and region by inviting our participating distributors to send to their entire database. The online survey is then completed by the reseller response aggregated to ensure that confidentiality remains. More on CONTEXT ChannelWatch here.

 

Leave a comment

Filed under IT Distribution, Mobile technology, Security

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s