Ask the Experts: Compliancy and Network Security Strategy

Welcome to Ask the Experts, brought to you by CloudServicesUniversity.com. In this video, Intelisys’ SVP Cloud Transformation Andrew Pryfogle discusses how compliancy effects your customers’ network security strategy with Evolve IP’s Scott Kinka. Find out more about network security and cloud services from from Scott and the Evolve IP team here: https://cloudservicesuniversity.com/supplier-directory/evolveip/

Andrew: All right guys, we’re into our next Ask the Experts session. We’ve been talking about network and data security, and building a security strategy for your customers. I wanted to bring in one of our smart guys in this portfolio of ours: Scott Kinka, who’s the CTO of Evolve IP. Scott, welcome, man.
Scott: I’m glad to be here.
Andrew: Appreciate you carving out a few more minutes for us. This is an important topic. I want to ask you about a network security strategy, and how compliancy drives or interacts with a network security strategy. This is coming up a lot, more and more, as people are more fearful about being in compliance with different regulatory agencies.
Scott: Yeah.
Andrew: Talk about how that should effect a strategy around network security.
Scott: Yes, I think there’s two–there’s sort of two precursors before we get into the technical aspects of talking about what to do in compliance. I think there’s two things. Most compliance standards have two pieces, right? One is, have a plan and be able to demonstrate it. Right? While they’re not all always completely specific about doing this one thing. But they’re very specific about, “Meet these general standards,” “Have a plan, document a plan,” and then, “If we come in to check that you can do that plan, make sure that you can actually do it,” right, so …
That’s largely what our customers are facing. The second piece to that is really about standards but not precedents. There are certain compliance standards out there that are very specific. They say, “Data needs to be encrypted at rest,” and that’s a technical conversation. But many of them just say, “Typical industry controls need to be in place.” Right? Well, who’s going to necessarily say what that means? Right? It’s either going to be your auditor–and are they a nice guy or a gal or not, right–or a judge. Which, if you are in that position, it’s not a great spot to be in, right?
Unfortunately, in not all of these cases is there precedent set. In other words, there would have to be a violation, with a marketing court case out there that people were aware of, and the judge to pass something down, to say what “industry standard” means. But what our partners really need to consider in this process, the things that are generally part of these scenarios are:
Firewall and security policies, that’s fairly obvious. Right? Making sure that they understand who is using all of their applications, so that’s around authentication. Right? What are the methodologies used to get into corporate stuff. That’ll involve password strength; it’ll involve factor authentication, which is a password and something–a token, an ID–you get the idea. They’re very specific in a lot of cases about monitoring and logging, which means that it doesn’t … No compliance standard says you can’t ever get infiltrated, because that’s impossible. We’re not all going to always keep up with the bad guys. But what they do say is that when you are, you have to be able to tell us what happened. Right? Which means that logging on everything–routers, firewalls, IDS, the servers where these applications sit–have to be able to be produced. It’s very important that customers consider a logging and monitoring methodology on these servers.
And then, I think you’ll hear there’s probably another category that specifically attaches to the cloud. One is encryption. You’ll hear a lot about encryption, and what does that mean? Very simply what that means is, is my methodology to get to this cloud service, and then the location of the data on disk. Is it encrypted where it sits, and is it encrypted in transit between me and the endpoint? So encryption. And then the other one would be privacy.
This is in some places where lack of precedent sometimes effects people’s willingness to buy cloud, because in a lot of cases cloud is a multi-tenant environment. So you do have some compliancy scenarios that will say, “Okay, you can use somebody else’s data center, but let’s make sure that there’s not something else on that piece of gear.” And that will depend on the auditor again. It’ll depend on the specific requirement. But in most cases your service provider will be able to answer the appropriate questions. It’s really a matter of steering that customer into: write down what you’re doing; make sure you demonstrate that you can do it; make sure you are logging in case you get infiltrated; and then of course, making the appropriate selections from a service provider’s perspective on technologies like encryption and privacy.
Andrew: Perfect, perfect. Great stuff. There’s some great pearls in there. Hey, thanks for going deep on that. I appreciate it. And I’d really encourage Sales Partners–and tell me if you agree, Scott. I mean, if you get into this kind of conversation with a customer, the answer is, “Yes, this is really important. Yes, you should be worried about it. I’ve got a great idea. I’ve got access to some of the smartest guys in this business that can come alongside and design this type of solution for you,” and get the engineers at our key suppliers at the table that can help them do this. I know Evolve IP, it’s right up your alley to be able to do that. Is that true?
Scott: Yeah. I mean, our job is to empower the Sales Partner to look really great on these types of deals, so what we always encourage is: don’t be afraid to ask the questions, and don’t be afraid to have your answer be, “I’m going to bring in my team.”
Andrew: Yeah, perfect. Perfect. Love it. Hey guys, that’s Scott Kinka, guys. We know him. We love him. He’s a stud in our cloud portfolio, and specifically as a member of the faculty here at the Cloud Services University. Check out Evolve IP’s learning center here at the University, and check out the stuff that Scott’s saying, man–what he’s blogging, where he’s out there talking. He’s a smart guy you’ll learn a lot from, and Evolve IP can come alongside and help you close a lot of these big, complex deals in the cloud. Scott–hey, thanks, man. Thanks for jumping in again.
Scott: Pleasure.
Andrew: All right. Good selling, everyone.

Ken Mills

President

Ken Mills serves as President of Intelisys and is committed to driving growth for Intelisys and our partners. As a distinguished technology executive with over two decades of experience, Ken has previously held leadership roles at EPIC iO, Dell Technologies and Cisco, and served as a fellow with the U.S. Department of State. His strategic mindset has been an integral part of launching innovative products and solutions in the fields of AI, IoT, and 5G. Ken is driven by his curiosity and passion for groundbreaking technology and complex problems, and constantly explores new frontiers in the world of technology.

Monica Lutes

Manager, People & Culture, ScanSource, Inc. and Intelisys

As Manager, People & Culture, Monica has worked closely with Intelisys employees and leaders since 2018 and has worked with ScanSource companies since 2016. A Human Resources professional with 11 years of experience encompassing all areas of HR, especially employee relations, recruiting, compliance, and training, Monica approaches her role as Manager, People & Culture from a consultative perspective. Her goal is to provide advice and guidance to leaders so they can focus on growing the best teams for the business while also supporting employees’ goals.

Ansley Hoke

SVP Marketing, ScanSource, Inc. and Intelisys

Ansley Hoke is the Senior Vice President of Marketing at ScanSource, Inc., a role she has held since 2019, and extended her leadership to include Intelisys in 2023. She joined the company in 2001, serving in merchandising leadership roles for ScanSource POS and Barcode, including acting Vice President of Merchandising and then later VP of Merchandising for ScanSource Catalyst and overall VP of ScanSource Catalyst. She oversaw sales, supplier relations, and services. Known for her pivotal role in creating effective marketing strategies, Ansley has been integral in driving demand, enhancing partner programs, and significantly contributing to the company’s revenue growth and channel relationships.

Mike Baur

CEO of ScanSource, Inc. and Interim President of Intelisys

Mike Baur serves as Chairman and Chief Executive Officer at ScanSource. Mike has served as the Company’s President or CEO since its inception, as a director since December 1995, and as Chairman of the Board since February 2019. Mike has developed a deep institutional knowledge and perspective regarding ScanSource’s strengths, challenges and opportunities. He has more than 30 years of experience in the IT industry, having served in various leadership and senior management roles in the technology and distribution industries before joining ScanSource. Mike brings strong leadership, entrepreneurial, business building and development skills and experience to the Board.

Stephanie Bouras

Regional Vice President, Southeast

Driven by a partner-first philosophy and a passion for innovation, Bouras embodies a leadership style that’s both compassionate and data-driven. As the Regional Vice President, Southeast, at Intelisys, she’s leveraged her extensive marketing and sales experience to propel her team to new heights. A firm believer in aligning herself with her partners, she sees herself as a collaborator and an integral part of their business. This perspective has allowed her to forge deep connections and drive success. A Florida native, Stephanie’s attention to detail and unwavering commitment to her partners have been key factors in her success.

Michael Raspanti

Regional Vice President, Northeast

Michael joined Intelisys in June of 2020, as a long-time channel veteran. He is responsible for leading the Northeast Region, helping continue the tremendous momentum in one of our strongest markets while also recruiting new up and coming partners that will be the growth engine of our future success.

Kristy Thomas

Vice President, Partner Experience and Enablement

Thomas is responsible for Sales Partner enablement and education for all our technology segments, including CX, managed security, mobility, and connectivity. With over 20 years of executive background in telephony, UCaaS, CCaaS and Cloud services, Kristy enables her customers to think broader and deeper as she guides them through their decision journey. Some of the biggest deals in the channel have become a reality thanks to the expertise and humble excellence Kristy brings to her client’s projects.