UK IT Channel News | IT Channel Oxygen
  • News
  • Topics
    • Vendor
    • Distributor
    • Partner
    • Indepth
    • Sustainability
    • M&A
    • People Moves
    • AI
    • Tech trends
  • About Us
  • Partner with us
Members
Must-Know Distributors
Oxygen 250
No Result
View All Result
  • News
  • Topics
    • Vendor
    • Distributor
    • Partner
    • Indepth
    • Sustainability
    • M&A
    • People Moves
    • AI
    • Tech trends
  • About Us
  • Partner with us
No Result
View All Result
UK IT Channel News | IT Channel Oxygen
No Result
View All Result
Home Cybersecurity

Sophos CEO: ‘I don’t think it’s a good idea to compete with Microsoft and Google’

Joe Levy opens up on SecureWorks integration progress as he teases launch of new identity offering

Doug Woodburn by Doug Woodburn
26 September 2025
in Cybersecurity, Big Interview, Indepth, Vendor
Joe Levy, Sophos

Joe Levy in London

Share on LinkedinShare on Twitter

You closed your biggest ever acquisition in February in the shape of SecureWorks. Where are you in the integration?

We’re moving at pace on the integration, and have just achieved a milestone on the technology integration itself which brings the Sophos endpoint in as the primary sensor and primary agent in the Taegis environment.

We continue to support all the third parties we’ve worked with, so if the customers are running anyone else on their endpoint, we’ll continue to support them within the MDR service. Then we’re still continuing to grow the number of integrations we’ve got on the platform – over 350 integrations now. So that part of it is moving along very nicely.

We’re going to launch our ITDR offering next month – that’s Identity Threat Detection and Response. This is a great capability that the SecureWorks team had built based on the learnings from their engagements with their advisory services.

The phrase so many of us have heard now – ‘identity is the new perimeter’ – is absolutely true, and in many cases it becomes the first line of defence or first line of breach for organisations, so identity hygiene is absolutely critical.

Stolen credentials is still one of the primary ways attackers are getting into environments today, so the better an organisation can understand what their identity infrastructure and footprint looks like, the better they can understand the hygiene of their identity systems, whether they’re using pervasive multi-factor authentication for example, the better their odds at preventing an attack from occurring, or surviving one if it does succeed..

To what extent does this move mirror Palo Alto Networks’ planned acquisition of identity player CyberArk?

Identity is a very complicated market, and one of the fundamental elements of identity is the identity provider itself. If you think about who the primary identity providers are today, it’s Microsoft and Google. Then there are a number of identity companies that attempt to compete with them.

I don’t think it’s a good idea to compete with Microsoft and Google. I think it’s a good idea to partner with Microsoft and Google, which is our strategy.

I would go further, and say that any company which engages in a zero-sum game with them is probably burning inordinate amounts of capital. A much better deployment of their resources would be a partnering strategy.

I’m not going to go compete with Microsoft; I’m going to go and make Microsoft better. One of the ways we can do that is with offerings like our Identity Threat Detection and Response. Many of our customers are Microsoft subscribers, whether it’s Business Premium or an A5 or an E5 license. So many of them are using Entra ID. I want to make Entra ID better for them; I want to make Defender better for them. And that’s our strategy.

Interview continues on following page….

Page 2 of 5
Prev123...5Next
Tags: CrowdstrikefeaturedGooglememberMicrosoftOktaPalo Alto NetworksSecureworksSophosTrending
Previous Post

‘Big day’ for Behan as he reveals CAE exit

Next Post

‘Don’t wait’, Microsoft CSPs urged as $1m revenue gate looms

Related Posts

Graham Charlton, Softcat
Big Interview

Softcat CEO on its £2bn first-half, post-PO price hikes and ‘powerful package’

19 March 2026
Lisa Su, AMD
Tech trends

Mass market ‘not quite ready’ for AMD’s Agent Computer

16 March 2026
‘Expect more to follow’ – Cisco latest vendor to tighten pricing Ts and Cs
Tech trends

Cisco narrows quote protection window to 7 days on some products

13 March 2026
Antonio Neri and Simon Ewington at HP Discover 2024
Tech trends

HPE CEO likens post-PO repricing policy to ‘surcharge’

10 March 2026
‘Do it as early as you can’ – The Channel Community duo issue mentee warcry
Careers & Skills

‘Do it as early as you can’ – The Channel Community duo issue mentee warcry

6 March 2026
Hollie Whittles, Purple Frog at Downing Street
AI

Purple Frog exec’s AI plea after trip to Number 10

5 March 2026
‘Certain vendors may be rendered obsolete’ – 3 MSSP leaders on Claude Code Security launch
Cybersecurity

‘Certain vendors may be rendered obsolete’ – 3 MSSP leaders on Claude Code Security launch

4 March 2026
Dale Foster, Climb
Big Interview

Climb CEO: ‘We’re going to run a private-equity play in western Europe’

3 March 2026
Next Post
Andy Porter, Giacom

‘Don’t wait’, Microsoft CSPs urged as $1m revenue gate looms

IT Channel Oxygen keeps you informed on the UK IT channel and its sustainable transformation. Learn more

  • About
  • Our Team
  • Partner with us
  • Privacy Policy
  • Terms & Conditions
  • News
  • Cookie Policy (UK)

© 2026 IT Channel Oxygen

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
No Result
View All Result
  • Oxygen 250
  • Must-Know Distributors
  • Member area
  • Big Interview
  • News
  • Indepth
  • About
  • Partner with us

© 2026 IT Channel Oxygen