Welcome!

This area is designed to help you utilize the ALPS Portfolio to create reoccurring streams of revenue into your Firm while also benefiting your clients.

How to register your lead:

Registering is as easy as sending an email to partner@acadialps.com with any clients you refer. You can BCC it in your communication to the client, or send us a list of client referrals. We will inform you in a timely manner if there are any conflicts.

Tools for success:

Send a questionnaire

Incorporating the ALPS assessment questionnaire into your client assessment process is the easiest way to gain an understanding of your clients’ compatibility with the ALPS Portfolio. Feel free to adopt the questions into your own process, or share our premade form.

Co Host a Webinair

ALPS is happy to Co-Host a webinar to demonstrate the various value propositions inside the portfolio. Use the button to send ALPS an email to organize a custom tailored offering to your clients.

ARR Calculator

Estimate the amount of ARR your firm can generate using the CPA Calculator.

Email Templates:

Cybersecurity Templates:

Dear {Name},

We are happy to announce that {Your Firm} has introduced a portfolio of innovative solutions that can solve the critical business problems of today.

ALPS is a network of 80+ Senior Advisors who curated a portfolio of Industry Solutions ranging across Cybersecurity, Compliance and Automation.

Through our partnership with ALPS, {Your Firm} is able to offer 60 min workshops to discover areas of benefit.

We’ve identified {Client firm} as a beneficial client to undergo the Cybersecurity workshop, where ALPS will review your ability to

  • Fight ransomware
  • Discover and monitor SaaS
  • Reduce network vulnerabilities

Please use this link to schedule a time to connect.

Thanks,

{Your Firm}

Client Collateral

Grip

www.grip.security 

The Grip SaaS Security Control Plane (SSCP) provides our customers with a complete picture of SaaS usage and a platform to govern those apps, including what has become known as shadow SaaS (a.k.a. “shadow IT). These are apps that are not managed through single sign-on (SSO), Multi-factor Authentication (MFA) or an identity provider (IdP). Not only does Grip deliver these missing controls, but it provides insights into policy dodging and use justification. By allowing our customers to track authentication methods and get risk-based application prioritizations, their security teams can focus on what matters. 

Read More

What you need to know: Grip is innovative. It doesn’t use agents or proxies to find and track SaaS, so customers are stumped by how they do it. When they find out that Grip uses a natural language processor (NLP) to parse email (from SaaS vendors), they are always impressed. Customers will then ask about privacy issues, and Grip answers by reassuring that its system only sees apps being accessed via corporate credentials --which CISOS have an obligation to manage. What Grip has done here is very clever. Customers quickly appreciate the uniqueness and elegance of their approach. 

ZTA brings significant benefits in user experience, agility, adaptability, and ease of security policy management. As stated, ease of adoption/implementation is also a key value driver, as Cyolo can have a large enterprise customer up and running in less than a week. 

Unlike its competitors, Cyolo places the security controls where the users and applications are. This distinguishes Cyolo on several levels including:  

  • It is equally effective in providing secure access coverage to on-prem and cloud-based apps (competitive vendors are optimized for the cloud and do not handle legacy infrastructure well).
  • Cyolo does not hold the client’s user data, credentials, encryption keys or access policies in the cloud and there is no IPSEC tunnel to the assets. As a result, Cyolo is a much faster solution (as much as 4X), as the overhead associated with just the encryption and decryption processes alone create latencies that often require customers to purchase additional bandwidth.

Cyolo is the only true zero trust solution we have found for the reasons mentioned above (i.e., handing over the customer’s keys to a third-party vendor is antithetical to zero trust) so it is especially well-suited to hybrid environments where there is a mix of cloud and on-prem, legacy apps and resources.

Put simply, Cyolo provides an essential capability –a cornerstone of evolving SSE/SASE security models—much more effectively than competitive alternatives. In short, it provides “over the horizon” defensive capabilities, as Cyolo’s architecture is smarter, safer, and more flexible. 

Grip Security has solved the SaaS security problem with a platform that can secure all SaaS applications (sanctioned and unsanctioned), delivers security and economic value (very clear ROI), and works across every device (managed or unmanaged).  It is also used to identify former employees who still have access to SaaS applications and zombie SaaS applications, meaning those that are no longer used but still have active corporate logins or company data. 

And by consolidating redundancies, eliminating unused apps, and helping customers avoid the “SSO tax,” Grip’s ROI story can be trusted. The savings are real, so much so that for most large enterprises, Grip is cost-neutral.

Once again, what Grip does is foundational to security programs. Understanding who and what SaaS applications are being used across an enterprise is an essential component of modern cybersecurity, especially for modern-thinking CISOs who are increasingly aligning themselves with business-line leaders. 

The point is, workers are remote, they use any device they want, and they have access to new SaaS applications every day, so the shift from IT-managed-everything to business-led IT has already been proven inevitable. Thought leading CISOs now accept this, and Grip’s solution exists because of this. That’s why Grip and smart CISOs get along so well. 

Grip is also well liked because products that are positioned as competitive don’t solve the problem. They were born in the age of physical networks, managed devices, and a limited number of SaaS applications. For example, CASB capabilities don’t translate to the modern SaaS environment. A fast CASB deployment (e.g., NetSkope) is measured in months and generates a huge volume of unactionable data that analysts must still process. It’s a huge, wasted effort that costs large enterprises millions before they give up.  Grip probably has the shortest “time to wow” in cybersecurity today.  Customers can start using it and see value the same day. 

Intro Email

The shift to Business Led IT

Datasheet

Risk Assessment

Free risk assessment - Admin domain access

Case Study

Leading Fintech Company

 

 

thumbnail of Grip SaaS Security Case Study_Abnormal.pptx

Case Study

Security Company

 

 

thumbnail of Battlecard Framework – Grip

Battlecard

 

 

thumbnail of Battlecard Framework – Grip

ROI

 

 

thumbnail of Grip-Case-Study-NFP

NFP

 

 

thumbnail of SSCP WP-SSE Blind Spots

GRIP ZSCALER

 

 

thumbnail of Grip-Frost-Security-Innovation-Award

NEW PRODUCT INNOVATION

 

 

Demo and Training Call

 

 

Cyolo

www.cyolo.io

Cyolo is a market-leading, second-generation zero-trust access (ZTA) solution provider. Since the pandemic, this technology has experienced explosive growth as organizations look to reduce risk and securely support their extended, remote workforces and partners. According to Gartner, at least 70% of new remote access deployments will be served mainly by ZTA instead of VPN services by 2025—up from less than 10% at the end of 2021.

Read More

What you need to know: ZTA provides users secure access to anything, anywhere. The accessing device and the network origin don’t matter, as everything keys on identity. ZTA forms one of the key technical underpinnings of the emerging Secure Service Edge (SSE) market. This tech is not only foundational to enterprise security programs, but the benefits of implementing ZTA are realized immediately, making it an obvious first step for organizations looking to rapidly improve their security posture and create “security momentum.” For example, replacing legacy network-level VPN access is a very typical use case, as is replacing various secure remote access products that don’t fully cover legacy infrastructure or third-party access needs. ZTA provides contextual, risk-based, and least privilege access to applications (not networks), so it’s a very light lift to implement. 

ZTA brings significant benefits in user experience, agility, adaptability, and ease of security policy management. As stated, ease of adoption/implementation is also a key value driver, as Cyolo can have a large enterprise customer up and running in less than a week. 

Unlike its competitors, Cyolo places the security controls where the users and applications are. This distinguishes Cyolo on several levels including:  

  • It is equally effective in providing secure access coverage to on-prem and cloud-based apps (competitive vendors are optimized for the cloud and do not handle legacy infrastructure well).
  • Cyolo does not hold the client’s user data, credentials, encryption keys or access policies in the cloud and there is no IPSEC tunnel to the assets. As a result, Cyolo is a much faster solution (as much as 4X), as the overhead associated with just the encryption and decryption processes alone create latencies that often require customers to purchase additional bandwidth.

Cyolo is the only true zero trust solution we have found for the reasons mentioned above (i.e., handing over the customer’s keys to a third-party vendor is antithetical to zero trust) so it is especially well-suited to hybrid environments where there is a mix of cloud and on-prem, legacy apps and resources.

Put simply, Cyolo provides an essential capability –a cornerstone of evolving SSE/SASE security models—much more effectively than competitive alternatives. In short, it provides “over the horizon” defensive capabilities, as Cyolo’s architecture is smarter, safer, and more flexible. 

One Pager

No Change Management Needed

One Pager

Shared Services Requires Shared Security Responsibility 

 

Battlecard

 

 

Unique Value Proposition

 

 

thumbnail of Cyolo Datasheet 2022 – Driving Digital Business (1)

Cyolo Datasheet 2022 

 

thumbnail of Cyolo-Architecture-Workshop-AAG (1) (1)

Architecture Value Workshop

 

thumbnail of Cyolo-BV-Workshop

Business Value Workshop

 

Cyolo Training Video

 

 

CyberAssureTech

One Pager

Why CyberAssureTech?

INVOKE

Logo Page

CONFIDENTIAL

thumbnail of Finance IA Opportunities

Finance IA Opportunity

 

thumbnail of aria_cloud_flyer_august_2022

Aria Cloud

 

thumbnail of INVOKE – Supply Chain & IA Guide[61]

Supply Chain & IA Guide

 

thumbnail of Use cases and case studies Manufacturing[67]

Use Cases and Case Studies

 

BRIGHTSPOT

Whitepaper

How Brightspot Transformed Content Management in the Research Industry