Phoenix recruits resellers, integrators

Phoenix Technologies is recruiting federal resellers and integrators to advance its device authentication product, which may get a boost from a recent Federal Information Processing Standard publication.

Phoenix recently released TrustConnector 2, a device authentication product that establishes a unique identity for devices on a network. The product aims to limit network access to only the devices that have been granted permission. The National Institute of Standards and Technology earlier this month released the final version of FIPS 200, which incorporates device authentication as a security control. The compliance deadline is March 2007.

Against this backdrop, Phoenix now targets value-added resellers and integrators that can help introduce the emerging product category in the federal sector.

'The products we are bringing are not yet being specified by the federal government,' noted Keren Cummins, public sector vice president at Phoenix. 'It's a new product category from the perspective of the federal customer,' she added. 'We are identifying integrators we think can help shape the government's perceptions, expectations, and requirements.'

Phoenix opened a Washington, D.C. office in late 2005 and has rolled out a Trusted Partner Network program for working with channel allies. In February, Phoenix announced that immixTechnology will hold General Services Administration schedule contracts for both TrustConnector 2 and Recover Pro 6.

The latter product is a desktop recovery application. GTSI offers Recover Pro on its Scientific and Engineering Workstation Procurement (SEWP) III contract.

In addition to the larger resellers and integrators, Phoenix plans to work with 8(a) firms and service-disabled veteran owned small businesses, according to Cummins. Phoenix, she added, has put a program into place 'to identify key partners in those communities."

-30-

About the Author

John Moore is a freelance writer based in Syracuse, N.Y.

inside gcn

  • IoT security

    A 'seal of approval' for IoT security?

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group