Wallarm Recognized on CRN 2018 Emerging Vendor List

We are delighted to share that CRN® has named Wallarm to its 2018 Emerging Vendors List in the Security Category category. The complete Emerging Vendors list will be featured online at www.crn.com/emergingvendor.

This list recognizes up-and-coming technology suppliers who are shaping the future of the IT channel through
unique technological innovations. The list is divided into seven categories: Cloud, Data Center, Security, Big Data, Unified Communications, Internet of Things (IoT) and Storage. In addition to celebrating these notable companies, the Emerging
Vendors list serves as a valuable resource for solution providers looking to expand their portfolios with cutting-edge technology.

“The technology suppliers on CRN’s 2018 Emerging Vendors list are creating a bright future for the IT channel, aggressively developing products to meet complex IT market demands, while positively impacting the bottom line of
solution providers,” said Bob Skelley, CEO, The Channel Company.

“The array of leading-edge products delivered by these organizations will have a lasting impact on the channel for years to come.”

“Wallarm provides protection from the simplest, to the most advanced hacker attacks to companies of all sizes conducting transactions on the net. We expect this nomination to help us accelerate our channel program and recruit more partners to help Wallarm deliver application security worldwide”, said Johan Nordstrom, Wallarm Chief Business Development Officer.

About The Channel Company
CRN ® is a brand of The Channel Company. The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the
technology marketplace. www.thechannelco.com

Tags: Awards

Recent Posts

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

2 days ago

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

3 weeks ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

3 weeks ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

4 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

1 month ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

1 month ago