Skip to content

Comet Backup Integration Partnership With Impossible Cloud

We’re proud to announce our partnership with cloud storage provider, Impossible Cloud. As a European-based company, this is a great option for IT Providers with GDPR compliance requirements. All data is securely stored within a European Cloud Provider in top-tier, GDPR-compliant, and ISO-certified data centers, eliminating the need for additional investment in data storage compliance.

Who is Impossible Cloud?

Impossible Cloud is Europe’s premier cloud storage solution, designed to provide businesses with secure, scalable, and cost-effective data storage.

Their platform features built-in ransomware protection, unlimited hot storage, and 100% S3 API compatibility. Advanced security measures and significant cost savings makes Impossible Cloud an ideal choice for businesses looking to enhance their data storage capabilities.

How the Integration Works

Comet’s user-friendly integration with Impossible Cloud allows you to easily select Impossible Cloud as your storage solution.

The integration includes Storage Template support for provisioning direct-to-cloud buckets for individual end-users. This feature can use Impossible Cloud’s IAM functionality for end-user support, as well as their partner API for MSPs who are looking to start reselling Impossible Cloud storage.

Object Lock for Protecting Data from Ransomware

Another great feature we have with Impossible Cloud is Object Lock integration for creating immutable backups. Object Lock puts the data in an immutable state—it’s accessible and usable, but it can’t be changed or deleted. This provides complete defense against ransomware attacks, giving you peace of mind for data stored in the cloud.

Impossible Cloud IAM Storage Template with Object Lock

Cost Savings

Another aspect that makes Impossible Cloud competitive for IT Providers is their price €7.99 per terabyte per month, with no egress or hidden fees. Impossible Cloud’s has a pay-for-what-you-use pricing structure which is designed to be transparent and predictable. This price is competitive with Wasabi, Backblaze and our own Comet Storage offering, with the benefit of allowing you to pay in Euros if you wish.

More Resources

Find out more about the Comet Backup and Impossible Cloud partnership in our documentation and on Impossible Cloud’s website.

Webinar

If you want to learn more about our integration partnership, join us for our joint webinar on Premier Cloud Storage & Backup for Europe’s MSPs on Wednesday, July 17th at 11am CET (Central European Time). If you can’t make it live, you can still register to get the recording sent to you after the webinar.

Register for the webinar here.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

What is responsible AI and how to overcome implementation challenges

Organizations today do see the value of responsible AI. But there’s a big difference between knowing what’s right, and getting it done.

According to IBM, over 80% of orgs have not met or exceeded “their stated principles and values” when it comes to ethical AI.

Source: IBM

This, of course, gives the few that do a massive advantage, as responsible AI becomes more important for companies that are innovating technology today.

For organizations wanting to take the next steps towards responsible AI, now is definitely the right time. But first, let’s explore the basics of responsible AI and why it matters.

Definition and importance of responsible AI

To properly understand responsible AI, let’s begin with a definition, and then move on to a more in-depth discussion.

What is responsible AI?

Responsible AI is exactly as it sounds: using artificial intelligence in a responsible, legal, ethical way. For IT organizations, responsible AI ensures that system usage doesn’t lead to:

  • Discrimination
  • Injustice
  • Breaking the law
  • Physical or emotional damage
  • Data and privacy breaches, among other things

Why is it important to consider ethics and responsibility in AI development?

AI is a very powerful technology that is spreading fast into almost every aspect of societal functioning. Like other technologies, it can contribute to a better world or it can become a dangerous tool and make existing problems worse.

Companies that develop AI in an ethical and responsible way are protecting their customers’ emotional, physical, and data safety. With this responsible approach, these organizations gain the trust and privilege to keep operating, growing, and contributing via AI to the betterment and development of our world.

What’s the impact of AI on society and the potential risks of irresponsible AI usage?

While the benefits of AI are enormous, so are the potential risks and downsides. When used irresponsibly, AI could:

  • Exacerbate existing social inequalities. For example, AI could allocate better loans or medical care to certain groups of people over others, or give source credits to certain groups and not others, thus maintaining inequality.
  • Put people at physical, emotional, or financial risk by exposing their data.
  • Expose organizations to data breaches and the serious consequences, such as large fines, legal implications, and reputational damage.

Core principles of responsible AI

So what defines responsible AI? What are the guardrails that contrast ethical, responsible AI from risky and dangerous AI development? Let’s break down the core principles of responsible AI and what they mean.

Transparency

Transparency means ensuring that AI systems are understandable and their decision-making processes are explainable, including which data they’re using. This helps organizations understand their own actions in AI development, and the impact on customers, verifying ethical processes and assuring long-term business health.

Fairness

According to Deloitte’s Transparency and Responsibility in Artificial Intelligence report, bias can run deep — in statistics, data, and the way these are measured.

Source: Deloitte

This highlights the urgent need to create accountability for AI systems and the humans behind them.

Responsible AI works to prevent biases in AI algorithms and promote equality among users. In an interview with Atera, Sarah Bird, chief product officer of responsible AI at Microsoft, explored three levels of fairness:

  • Providing equal service, no matter the customer’s language, accent or dialect.
  • Allocating resources, like loans and medical care, without discrimination and bias.
  • Avoiding stereotypes and demeaning content generation.

Accountability

Establishing clear accountability for AI actions and outcomes is a key aspect of responsible AI. This includes human supervision and setting processes for testing and adjusting the system throughout the development process.

Accountability also includes keeping the humans behind the ‘machine’ accountable — with training and stakeholder reviews, for example.

Privacy

Privacy is a leading concern in the IT industry, and also flows into the responsible AI process.  Alongside breach prevention, it’s important to verify that AI systems do not expose private information, or use private or breached data to serve users.

Safety and security

Finally, ensuring AI systems are safe, secure, and reliable is a core principle of responsible AI. It is concerned with privacy, data, and asset protection — but also with protecting the emotional and physical integrity of users.

For example, demeaning and triggering content, or breaching information that would make someone susceptible to emotional or physical abuse are less-talked about (but no less important) safety aspects of responsible AI.

Challenges in implementing responsible AI

AI systems are incredibly complex. Often, there’s a need for a cross-company effort to overcome some of the key challenges in leading responsible AI. The following challenges may hamper efforts to implement responsible AI, however, with some out-of-the-box thinking and strategizing, they can be overcome.

Identifying and mitigating biases in data and algorithms

In tackling the incredibly difficult challenge of bias in AI, Microsoft developed a 20-page document delineating hate speech guidelines. According to Bird, the company required an expert linguist to mitigate the document before developing the technology for Bing Chat. The AI technology now scores the content for hate speech and enables real time adjustments.

Yet, bias is so deeply rooted in humans (including those in charge of AI systems) that supervision upon supervision is likely required, plus feedback from users, to overcome it for truly responsible AI.

Balancing innovation with ethical considerations

Sometimes, companies are faced with the choice between innovation and responsible AI, and need to strike the right balance. There are endless ways this can arise, for example:

  • Developing a technology that drives better medical outcomes, but requires access to sensitive patient or hospital information to be effective.
  • Creating a software that lets every small business owner act as a designer, thus gaining a competitive advantage. But when the business owner asks for a photo of a woman, the instant result never reflects the diversity of the population.

In cases like these, responsible AI demands a deeper exploration about how to innovate AI to achieve an ethical outcome.

Ensuring compliance with regulatory standards and guidelines

This encompasses multiple aspects, including:

  • Compliance in the massive data aggregation required to feed AI algorithms
  • Keeping the data safe once it’s being used by your AI system
  • Creating protection from system misuse by ill-intent players

In addition to these broader compliance issues, each organization must also prioritize industry-specific regulatory compliance to realize their responsible AI goals.

Strategies for responsible AI

We’ve covered a lot of theoretical ground about what responsible AI might look like. Now it’s time to take purposeful action towards responsible AI. Here are some strategies to guide you:

Adopt a human-centric approach to AI development

Consider what people need to make the most of your AI-based system — but also what could hurt their experience or wellbeing. Put humans in charge of system supervision, and provide training to help them overcome their own bias.

Implement robust data governance frameworks

This is a threefold effort:

  • Determine guidelines for responsible AI, such as data privacy, transparency, and fighting bias in the system.
  • Put technical controls in the system to prevent it from acting irresponsibly, like generating hate speech or sharing private data.
  • Prioritize human supervision.

Monitor and evaluate AI systems regularly

Define real time alerts in your system to scale your monitoring for responsible AI. However, be sure to keep human technicians on top of your systems to stay on the extra-safe side.

Set evaluation goals and regular accountability reviews with managers, as well as processes for developing and testing fixes for what doesn’t work.

Engage cross-company teams and stakeholders

According to Sarah Bird, Microsoft’s chief product officer of responsible AI, when Microsoft started working with GPT 4 technology, it first brought together experts from different fields to get to know the system’s strengths and challenges. Cross-company collaboration can reduce blindspots and offer more creative, innovative solutions.

But for responsible AI to become an essential part of your operations, you need management stakeholders that can advocate for it at the C-suite level. Lee Hickin, Microsoft’s AI technology lead in Asia, told Atera that he’s already seeing “chief AI officers, chief AI risk officers [and] chief data ethics officers,” especially in highly sensitive industries.

Educate AI practitioners about ethical and safe AI practices

Even with the best intentions, humans are not immune to bias, so the AI systems they operate are not immune either. Additionally, many data breaches are due to human error — even among professionals working in areas like IT and marketing, where you might expect there would be increased awareness.

Source: Tessian

Therefore, educating anyone involved in AI operations at your company is key. Hickin suggests rewarding this education by putting employees’ new insights into real work problems. This will give a sense of meaning and encourage them to want to learn even more.

Responsible AI isn’t easy, but it’s worth the effort

Responsible AI helps develop a more equal world, with greater care for emotional, physical, and data safety. It also protects companies from losing sensitive information to data breaches, which comes with steep fines and causes serious damage to reputation and customer trust.

Done right, responsible AI can be one of your strongest pillars in the marketplace. Implement responsible AI with robust data governance frameworks, engage cross-company teams and stakeholders, monitor and evaluate AI systems regularly, and mostly — remember the human element.

Although AI is “artificial”, it was created by humans for humans. So in addition to the rules, technologies, and tactics, always put your people at the forefront of your AI development. This is the ultimate key to responsible AI.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Atera
Small and medium IT operators are the heroes behind the scenes supporting companies around the world. They care a lot for their clients (external or internal) and often work virtually 24/7. However, small and medium IT service providers have always been underserved.
Atera was built for exactly that. With the vision to simplify and streamline the work of Managed Service Providers and IT professionals. To create something that saves them time, energy, and money. To free them from needing to constantly put out fires.
That vision created the remote-first IT management software – enabling IT professionals to shift from reactive task takers to proactive problem solvers.
Now operating from our beautiful offices on Rothchild in Tel Aviv, Atera is currently used by thousands and thousands of IT professionals all over the world (105+ countries).
As we rapidly grow, our goal remains the same: to transform the IT industry with revolutionary technology, while creating one of the happiest and healthiest work environments in the world.

The Evolution of the 802.1X Standard: A Journey Through Time

The march of technology, relentless and unyielding, has always been punctuated by milestones that define an era. One such milestone in the realm of network security is the 802.1X standard. Like the great railroads of the 19th century that stitched a continent together, 802.1X has woven a fabric of security and trust across the vast, sprawling expanse of digital networks. Its story is one of innovation, adaptation, and foresight, reflecting the broader saga of technological progress.

The Genesis of the 802.1X Standard

The tale begins in the late 1990s, a period marked by the burgeoning growth of the Internet. As businesses and individuals increasingly relied on network connectivity, the need for robust security mechanisms became paramount. Enter the Institute of Electrical and Electronics Engineers (IEEE), an organization with a storied history of setting industry standards.

In 1999, the IEEE recognized the necessity for a standardized approach to port-based network access control. The goal was straightforward yet ambitious: to create a method that ensures only authorized devices and users could access a network. The result was the birth of the 802.1X standard, formally approved in 2001. This was not just another protocol but a visionary framework designed to address the evolving challenges of network security.

The Anatomy of 802.1X

At its core, 802.1X is an authentication mechanism for devices attempting to connect to a Local Area Network (LAN) or a Wireless LAN (WLAN). It operates at the network layer, utilizing the Extensible Authentication Protocol (EAP) to manage authentication interactions. The process involves three key components: the supplicant (the device seeking access), the authenticator (usually a switch or access point), and the authentication server (typically a RADIUS server).

When a device attempts to join a network, the supplicant sends a request to the authenticator. The authenticator, acting as a gatekeeper, forwards this request to the authentication server. If the server verifies the credentials, the authenticator allows the device to access the network. This elegant dance ensures that only trusted devices gain entry, providing a formidable defense against unauthorized access.

Security Advantages of 802.1X

The implementation of 802.1X brings a host of security benefits, akin to fortifying a medieval castle with moats and drawbridges. First and foremost, it provides a robust mechanism for verifying user identities. By requiring authentication before network access is granted, it significantly reduces the risk of unauthorized devices infiltrating the network.

Moreover, the 802.1X standard supports multiple authentication methods through EAP, ranging from simple passwords to sophisticated biometric verification. This flexibility allows organizations to tailor their security protocols to match their specific needs and threat landscapes.

Another critical advantage is the support for dynamic key management. Once a device is authenticated, 802.1X can facilitate the distribution of encryption keys, ensuring that data transmitted over the network is secure from eavesdroppers. This is particularly vital in wireless networks, where the airwaves are susceptible to interception.

In addition to these security enhancements, 802.1X also aids in network management and monitoring. By providing detailed logs of authentication attempts, it allows administrators to detect and respond to suspicious activities swiftly. This visibility into network access events is a powerful tool in the ongoing battle against cyber threats.

The Evolution Continues

As with any technological standard, 802.1X has not remained static. Over the years, it has evolved to meet the changing demands of the digital landscape. Enhancements have been made to improve its scalability, performance, and interoperability with other security protocols.

One significant development is the integration of 802.1X with other network security frameworks, such as Network Access Control (NAC) systems. This synergy creates a more comprehensive security posture, allowing organizations to enforce policies that govern not just who can access the network but also what they can do once inside.

Furthermore, the rise of mobile and cloud computing has spurred adaptations in 802.1X to accommodate these new paradigms. For instance, advancements in EAP methods have been made to support seamless and secure authentication for mobile devices and remote users. This ensures that the security principles of 802.1X extend beyond the traditional confines of corporate networks.

The Road Ahead for the 802.1X Standard

Looking to the future, the trajectory of 802.1X appears poised for further innovation. As cyber threats become more sophisticated, the need for adaptive and resilient security measures will only grow. The ongoing development of machine learning and artificial intelligence presents intriguing possibilities for enhancing 802.1X. Imagine a network that not only authenticates devices but also continuously monitors and learns from their behavior, proactively identifying and mitigating threats in real-time.

Another area ripe for advancement is the integration of the 802.1X standard with emerging technologies such as the Internet of Things (IoT). As billions of connected devices come online, ensuring their secure integration into networks will be paramount. Enhancements to 802.1X could provide the robust authentication and access controls needed to secure this new frontier.

In conclusion, the story of 802.1X is a testament to the relentless pursuit of security in the face of ever-evolving challenges. From its inception in the late 20th century to its current role as a cornerstone of network security, 802.1X has continually adapted and advanced. As we look to the future, it stands ready to evolve further, safeguarding the networks that underpin our increasingly connected world. Like the great achievements of the past, its legacy will be one of vision, resilience, and unwavering commitment to progress.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Tarsus Distribution Partners with Scale Computing to Deliver a VMware Alternative to the Southern African Market

JOHANNESBURG, South Africa – 23 May 2024 – Tarsus Distribution has partnered with Scale Computing, a market leader in edge computing, virtualization, and hyper-converged solutions, to deliver simple, reliable, affordable and easy-to-deploy infrastructure solutions via Scale Computing’s award-winning SC//Platform while simultaneously expanding its technology offerings to its channel partner network. 

“Our new partnership with Scale Computing is an important step in our efforts to set new standards in IT efficiency and reliability, fostering growth and operational excellence for businesses across our markets. Their focus on practical and reliable computing solutions aligns perfectly with what our partners and their customers need,” said Alan Hawkins, General Manager: Enterprise Solutions at Tarsus Distribution. “By working together, we can offer a straightforward approach to complex IT challenges, helping our customers streamline their operations and save on costs. We believe this partnership stands to make a real difference for businesses looking for stability and simplicity in their IT infrastructure.”

Many of today’s virtualization solutions consist of multiple vendor products, making them more complicated and expensive than necessary. Moreover, properly configuring disparate server and storage components takes up valuable department resources, and that’s even before a company has installed and configured hypervisors or tested for compatibility and performance. Together, Tarsus Distribution and Scale Computing are bringing a virtualization alternative to the Southern African market.

The SC//Platform combines simplicity, high-availability and scalability, replacing the existing infrastructure and providing high availability for running virtual machines (VMs) in a single, easy-to-manage platform. Regardless of hardware requirements, users can run applications in a fully integrated platform, and the same innovative software and simple user interface provides the power to run infrastructure efficiently at the edge.

“Scale Computing’s commitment to innovation and reliability has made it a standout provider of edge computing solutions, not just in existing markets, but with great potential for growth in emerging ones,” said Scott Mann, Global Channel Chief and Vice President of International Sales at Scale Computing. “Our partnership with Tarsus Distribution represents a strategic move to extend our reach within greater Southern Africa, a market rich with opportunity. Tarsus Distribution is known for its expertise in logistics and a deep understanding of the local IT landscape. We are confident that this collaboration will deliver unparalleled value to businesses throughout Southern Africa, offering them scalability, operational efficiencies, and cost savings that are critical in today’s fast-paced digital world. We look forward to a successful partnership and to bringing our cutting-edge solutions to more customers across the region.”

The imperative for IT leaders to simplify operations and reduce costs in navigating the dynamic IT infrastructure landscape is clear. Scale Computing’s customers typically experience a substantial reduction in ongoing management costs, ranging between 60 and 80 percent. This partnership symbolises our mutual commitment to innovation and excellence, aiming to set new industry standards in delivering advanced technology solutions and offering a viable VMWare alternative that caters to customers’ diverse and evolving needs.

To find out more about migrating from your existing virtualization platform or if you are virtualizing from scratch for the first time, please contact us here.

About Tarsus Distribution

As Southern Africa’s leading value-added technology distributor, Tarsus Distribution represents top tier global hardware, software and information security brands. The company has made extensive investments in providing digital tools and logistics systems that empower channel partners with the speed, efficiency and flexibility they need to meet the needs of today’s demanding and connected customer.

Tarsus Distribution sets itself apart in a commoditized and competitive market by partnering with the channel to provide complete solutions to the end-client — from consulting about the business requirement to fulfillment of the order. In addition to an unsurpassed national logistics engine and integrated supply chain, Tarsus Distribution offers the channel technical support capabilities and tailored channel financial services.

Tarsus Distribution is a Level 1, 51% black-owned and 30% black female-owned B-BBEE businesses under the Amended ICT Sector Codes.

More information about Tarsus Distribution is available at:

www.tarsus.co.za
https://www.linkedin.com/company/tarsus-distribution/
https://www.facebook.com/TarsusDistribution

Contacts:

Monique Crosson
Marketing Operations Manager
T: +27 11 531 1000

About Scale Computing

Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore™ technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest-growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing’s products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, G2, and TrustRadius.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

SalesTechStar Interview with Joseph Rodriguez, CRO at Portnox

Originally published on SalesTech Stars.

Hi Joseph, tell us about yourself and what piques your interest about being in the B2B SaaS market?

I have over 20 years of SaaS Enterprise sales and Go-to-Market experience. This includes my current role as CRO at Portnox, revenue leadership positions at Spredfast (now Khoros) and Upland Software. e.

I approach every interaction with genuine care, whether it is with the sales team, customers and prospects, or my peers. I truly enjoy working shoulder to shoulder with our incredible sales team to deliver unprecedented revenue-growth, expansion, and retention.

The team aspect of it is very important to me. A good example – last month we brought the sales organization to Austin for a sales rally. We spent the time not only talking about the business and key focus areas. In addition, we took part in team building exercises and dinners to get to know and trust each other on a personal level.

I also love planning sessions with my peers on the Portnox Executive Leadership team to think about focus areas for the next six months and into the following year.

It’s invigorating to genuinely solve a challenge for customers. I love it when I have a solution that solves real problems. At Portnox, we are solving cybersecurity issues and challenges for customers – making their environment and devices and employees safer. I sat in the offices of a large customer last week, and the team was so grateful for all the problems we helped them solve. They feel like they’ve taken a giant leap in security safeguards and are helping them create their security strategy.

The combination of teamwork, strategic planning, and the genuine impact we have in solving real problems for companies is what makes being in the B2B SaaS market incredibly fulfilling for me.

Read More: SalesTechStar Interview with Allison Metcalfe, CRO at Cloudinary

As a revenue and sales leader: what are the five fundamentals you follow as a daily practice that you also instill in your team?

As a revenue and sales leader, I adhere to five fundamental practices daily, which I also instill in my team. These practices are essential for maintaining excellence and achieving consistent success, particularly in the competitive SaaS industry.

  1. Do What We Say We’re Going to Do: Reliability is crucial. Delivering on our promises builds trust and credibility with our clients and colleagues. This practice ensures accountability and fosters a culture of dependability.
  2. Be On Time: Punctuality reflects our respect for others’ time and our commitment to professionalism. Whether it’s a meeting, a call, or a project deadline, being on time demonstrates discipline and reliability. It’s a simple yet powerful habit that sets a positive tone for all interactions.
  3. Prep, Prep, Prep: Thorough preparation is non-negotiable. We emphasize the importance of being well-prepared for every engagement, whether it’s a sales pitch, a client meeting, or an internal discussion. This includes understanding the client’s needs, researching their business, and anticipating potential questions or challenges.
  4. Add Value: Our goal is to consistently add value to our clients’ businesses. This goes beyond selling a product or service; it’s about understanding their challenges and providing solutions that genuinely address their needs. We train our team to focus on how we can help our clients achieve their goals, not just on the features of our offerings.
  5. Understand the Customer’s Business: Deeply understanding our customers’ businesses is critical. This involves recognizing their unique challenges, industry dynamics, and strategic objectives. By doing so, we can tailor our approach and provide insights that resonate with them, positioning ourselves as trusted advisors rather than just vendors.

In addition to these fundamentals, we emphasize value-based selling. This approach is centered on understanding what the customer is genuinely trying to solve. Our training focuses on identifying the core issues our customers face, such as achieving security compliance goals or protecting their devices, rather than merely highlighting product features. By asking the right questions and truly listening to our customers, we can align our solutions with their specific needs, ultimately delivering greater value and fostering long-term partnerships.

Can you take us through some of the revtech and salestech that you’ve relied on over the years to drive goals?

We rely on several revolutionary technologies to drive our sales goals and optimize our processes. Here are a few that have been indispensable:

Gong is an AI-powered sales listening tool is something I couldn’t live without. Gong records our calls and provides data, analytics, and metrics that are invaluable for understanding and improving our sales interactions. For instance, I can see the percentage of time our sellers talk versus listen on a call, the breakdown of demo versus presentation calls, and the most commonly asked questions from prospects. This data allows us to be proactive in training our sales team, ensuring they are always improving and aligning with best practices.

Another AI-oriented tool, 6Sense, has been critical in identifying the right prospects who are actively in the market for our solutions. It helps us craft the right type of message, ensuring that we’re reaching the right person at the right place and time. The data-driven insights from 6Sense make our sales team incredibly efficient, allowing them to target the right people with precision. I’ve used 6Sense in every organization I’ve been a part of, and it consistently delivers results.

Every member of our sales team uses LinkedIn Sales Navigator. It allows us to message key stakeholders of our customers or prospects one-on-one, fostering genuine connections on a business-oriented but social platform. The ability to connect and engage with prospects on LinkedIn has been a game-changer for us, enhancing our outreach and relationship-building efforts.

These tools have not only helped us achieve our sales goals but have also significantly improved our overall sales strategy and efficiency.

What are the five biggest challenges that modern sellers and revenue leaders face today and what tips would you share against these?

Modern sellers and revenue leaders face several significant challenges in today’s sales landscape. Here are the five biggest challenges and some tips to address them:

  1. Educated Buyers: Today’s buyers are more informed than ever before. They often don’t engage with salespeople until they are 60-70% through the sales process, meaning they already have a lot of knowledge about your product. This shift requires salespeople to be even more prepared and knowledgeable. Tip: Leverage tools like Gong and 6Sense to gain insights into what your customers are interested in before you even speak to them. Be prescriptive in your approach, demonstrating clear value and providing tailored solutions that address their specific needs.
  2. Reduced Time with Buyers: With buyers doing much of their research independently, salespeople have limited time to influence decisions. Tip: Make every interaction count. Focus on delivering high-value content and personalized experiences. Utilize data-driven insights to understand pain points and position your product as the ideal solution quickly and effectively.
  3. Shifting Messaging Needs: The way you communicate with potential customers has evolved dramatically. Buyers now expect more direct and relevant interactions. Tip: Use AI tools to gather data and to tailor messaging. Be clear about the value you bring and how your product can help them achieve their goals.
  4. Access to Decision-Makers: Getting direct access to ultimate budget holders and decision-makers can be challenging, as they are often focused on high-level strategy rather than tactical buying decisions. Tip: Focus on educating and arming your primary contact with the information and resources they need to sell your product internally. Provide them with compelling use cases, ROI data, and any support materials that can help them advocate for your solution.
  5. Adapting to Change: The sales environment is constantly evolving, and what worked 18 months ago might not work today. Staying ahead of the curve is essential. Tip: Continuously invest in learning and adapting to new technologies. Encourage a culture of agility and innovation within your sales team, always seeking out new ways to meet (and exceed!) the evolving needs and expectations of your customers.

By addressing these challenges head-on and leveraging the right tools and strategies, modern sellers and revenue leaders can navigate the complexities of today’s sales landscape and drive success.

Take us through your use of AI in salestech and how you enable your teams with upskilling and better processes so that new age tech is used optimally?

We layer in AI to enhance, not replace, human interaction in sales. While AI provides valuable data, it’s still crucial to connect genuinely with prospects. AI tools help us analyze calls and identify prospects, making our sales efforts smarter and more targeted.

However, we do more of our training around developing essential soft skills like empathy and active listening. This approach helps our teams be more prescriptive in their strategies and move prospects quickly to demos and proofs of concept. Ultimately, AI is a tool to make us smarter, but the human element of understanding and curiosity remains key to our success.

A few ways in which you think B2B tech sales should change?

B2B tech sales need to shift focus from an overload of techniques and tools to fostering genuine human connections. Despite the abundance of technology and data, sales remain fundamentally people driven. Instead of relying solely on sales methodologies, sales professionals should prioritize understanding and relating to prospects on a personal level. Be genuinely curious, respond authentically, and leverage your expertise to connect with and help clients, not just to sell to them. This approach will build stronger, more meaningful relationships and drive better results.

Some thoughts you’d share for fellow CROs before we wrap up?

Embrace adaptability and rapid decision-making. Constantly evaluate your internal talent to ensure it aligns with your go-to-market strategy and optimize resource allocation to manage costs effectively. The ability to change and iterate every quarter is crucial—don’t get stagnant. Leverage data and prioritize sales and revenue operations to drive efficiency and informed decision-making. Continuously review and adjust based on data insights to stay ahead and optimize performance.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×