Five Mistakes US Cyberscurity Vendors Make In The UK

With the demand for quality cybersecurity solutions at an all-time high, many vendors are taking the opportunity to expand internationally. The UK is one of the most attractive choices to begin an international launch thanks to its shared language and vibrant tech and finance sectors.

Despite these advantages, launching in the UK still presents a number of challenges, and many vendors fall at the first hurdle by failing to account for some important differences in the market.

Below are five of the most common mistakes that can derail a cyber security launch in the UK.

1.Lack of local market knowledge
Vendors will often approach expanding to the UK as though they were adding a new location on their home soil. However, the market can differ drastically and creating a go-to-market plan without thorough research and local knowledge is a fatal mistake. The level of awareness, demand and competition for a given service or solution can completely alter the required strategy. For example, a vendor entering the market with messaging geared around being a disruptive innovator, only to find a local competitor with a five-year head start will have very little chance of making an impact.

2.Failing to understand UK distributors
The US and UK have very different perceptions of what a distributor does. Whereas it’s common for US vendors to think of distributors as purely concerned with the logistics of shipping product, UK distributors provide a wide range of value-added services. Their ability to connect the dots and get the right people in contact with the right products at the right time, can vastly accelerate time-to-launch. Appreciating the fundamental differences between UK and US distribution is critical in selecting the best local partners.

3.No local PR support
PR is an essential part of launching into a new market, with strong media coverage creating awareness and establishing the vendor as a thought leader, helping to build momentum for the sales and marketing teams. Many vendors assume they can simply manage PR in the UK through their existing US-based agency, but while it might seem like a cost saver, this approach will inevitably meet with failure. 

Local knowledge and contacts are essential for any successful PR campaign, and especially for a field like cyber security where competition is intense. The time difference will also make it impossible for even the earliest risers to take part in any breaking news opportunities, an important strategy for securing coverage and building contacts.

4.No local content
The UK media can be extremely provincial, giving high priority to any local stories and angles. As a result, US-centric campaigns and announcements that have made a big impact at home will often fail to make much of an impression with the UK press. Local elements such as UK-based statistics in reports, commentary on domestic news and regulatory issues will vastly improve a vendor’s ability to get the attention of the press and make it into the news cycle. In particular, UK journalists will usually prioritise UK-based companies above all else, so the ability to create UK customer case studies or arrange joint media activities with clients is incredibly valuable.

5.Keeping too much control at the head office
The matter of control is an issue that many vendors struggle with during international launches. It’s common to find the head office trying to retain too much control, with every activity and statement needing to go through a US-based decision maker. 
While a firm grip on international operations is often a good idea, particularly when strategies and messaging are still maturing, it can be very detrimental to PR efforts. 

To achieve the status of an influential player in the UK market and get involved in the crucial breaking news and national news cycles, it is essential to trust local representatives to take the initiative in giving interviews and signing off media comments. 

A convoluted approval process with a five-hour time delay will make it almost impossible to keep up with local competition and establish a rapport with key journalists.

Eclat:

You Might Also Read: 

UK Cybersecurity Firm Sophos Is Trouncing Silicon Valley:

Alphabet Launches A Cybersecurity Company - Chronicle:

 

« Trump / Kim Summit Attracts A Heavy Wave of Cyber Attacks
Zambia Wants Tough New Online Regulations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.