UK IT Channel News | IT Channel Oxygen
  • News
  • Topics
    • Vendor
    • Distributor
    • Partner
    • Indepth
    • Sustainability
    • M&A
    • People Moves
    • AI
    • Tech trends
  • Sustainability
  • About Us
  • Partner with us
Members
Must-Know Distributors
Oxygen 250
No Result
View All Result
  • News
  • Topics
    • Vendor
    • Distributor
    • Partner
    • Indepth
    • Sustainability
    • M&A
    • People Moves
    • AI
    • Tech trends
  • Sustainability
  • About Us
  • Partner with us
No Result
View All Result
UK IT Channel News | IT Channel Oxygen
No Result
View All Result
Home Cybersecurity

Sophos CEO: ‘I don’t think it’s a good idea to compete with Microsoft and Google’

Joe Levy opens up on SecureWorks integration progress as he teases launch of new identity offering

Doug Woodburn by Doug Woodburn
26 September 2025
in Cybersecurity, Big Interview, Indepth, Vendor
Joe Levy, Sophos

Levy in London

Share on LinkedinShare on Twitter

Peers including Palo Alto, CrowdStrike and Okta have announced they’ve sold over $1bn via AWS Marketplace. How much business does Sophos do through hyperscaler marketplaces, and how would you assess the partner opportunity here?

There’s a massive opportunity there, and I think one of the motivators is just that the spend incentive structures the marketplaces have constructed – where if a customer of theirs has an annual commitment for a certain amount of spend, some of that commit could be fulfilled by marketplace transactions. It’s a wonderful market incentive ecosystem they’ve built there.

We’re in the very early stages of leveraging that right now. We’re a big AWS customer today – we run Sophos Central and SecureWorks infrastructure out of AWS, and we have detailed quarterly business reviews with them about opportunities for us to bring more cybersecurity services to their customers.

With Chris Bell leading our global channel strategy, he has a mandate to grow our hyperscaler business and we’re going to be making some pretty significant investments in our partnerships with them.

How do you see the threat landscape evolving and what’s the one threat people aren’t talking about enough?

There are a couple that have recently made the news more frequently than any of us would like to see.

One of them is the DPRK fake IT worker threat.

Another, which is a much more difficult problem for any of us to get our hands around, is the third-party risk threat, the most recent of which was Collins Aerospace. There are too many examples to mention, but [it also includes] the drift attack against the Salesforce customers.

We are a Salesforce customer. We were fortunate that our configuration did not create any exposure for us, whereas many of our peers were exposed.

These are just two recent examples of commercial third party threats, then there are open source third-party threats as well, such as the node package manager exploits we’ve been hearing about.

These are going to have to get a little more airtime with leadership in organisations and boards, to better prepare organisations to get their heads around what their third-party risk looks like.

I also think it should start shaping some of the non-IT security practices around employee recruitment, employee onboarding, credential verifications for our employees…. It’s a very easy attack vector for attackers to successfully exploit, and they tend to follow the path of least resistance. And this has exposed itself as a weak underbelly in many organisations, where they’re just not well-equipped to deal with this threat.

Anything that takes the threat outside the purview of the security controls that are in place, and brings it into the domain of HR operations, or takes it off of company-issued devices and into social media communications like WhatsApp… the attackers have realised they’re probably going to face too much resistance within the IT systems so they’re pulling the attacks paths out of the IT systems now, and that’s a trend we’ll probably see continue.

Interview continues on final page….

Page 4 of 5
Prev1...345Next
Tags: CrowdstrikeGoogleMicrosoftOktaPalo Alto NetworksSecureworksSophosTop
Previous Post

‘Big day’ for Behan as he reveals CAE exit

Related Posts

Mark McCormack, Academia
Big Interview

‘There are still gaps’ – Academia reveals fresh M&A plan

26 September 2025
Rohit Ghai, Barracuda Networks
People Moves

Former RSA CEO made big fish at Barracuda Networks

24 September 2025
Canon EV fleet
Sustainability

Canon goes all electric and hybrid in UK fleet overhaul

23 September 2025
Larry Ellison, Oracle
People Moves

5 things to know as Oracle appoints two new CEOs

23 September 2025
Simon Bennett, TD Synnex landscape
AI

‘I want us to be the go-to distributor for AI acceleration’ – TD Synnex UK exec

22 September 2025
Jamie Daum, inforcer
Vendor

inforcer CEO dubs Microsoft Intune move ‘major step forward for MSPs’

22 September 2025
Panel, Channel Chat 2025
Careers & Skills

‘I haven’t seen many new people coming in’ – has the UK IT channel become a closed shop?

19 September 2025
Scott Constable, Vespertec
Sustainability

‘The more I learn, the more I realise it’s a viable solution’ – Vespertec exec on appetite for crowd-splitting immersion cooling

18 September 2025

Follow Us

IT Channel Oxygen keeps you informed on the UK IT channel and its sustainable transformation. Learn more

  • About
  • Our Team
  • Partner with us
  • Privacy Policy
  • Terms & Conditions
  • News
  • Cookie Policy (UK)

© 2025 IT Channel Oxygen

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
No Result
View All Result
  • Oxygen 250
  • Must-Know Distributors
  • Member area
  • KOcycle Zone
  • Big Interview
  • News
  • Indepth
  • About
  • Partner with us

© 2025 IT Channel Oxygen