Trend Micro appoints Westcon-Comstor as VAD

1 August 2019 News & Events, Information Security

Trend Micro has announced it has expanded the reach of value-added distributor Westcon-Comstor to include South Africa. Already a partner with Trend Micro for Sub-Saharan Africa and Indian Ocean Islands, Westcon-Comstor will expand its coverage and open up new markets for the company on the continent.

The last two years have seen significant investment from Trend Micro into growing its presence and reach across the African continent. Primarily, the company has been focusing on re-energising its channel, expanding its reach, and ensuring that its partners have the skills and tools to support its portfolio of cloud, network and endpoint security solutions.

“The security needs of partners and customers across Sub-Saharan Africa require a uniformed value-added distributor who is agile enough to adapt to moving market trends,” says Indi Siriniwasa, vice president, Sub-Saharan Africa, at Trend Micro. “To date, the Westcon-Comstor team have made great inroads across the continent, taking our enterprise security solutions to its channel and investing in developing the internal resources needed to support our reseller base.”

“As a result of Westcon-Comstor’s commitment and professionalism, it made perfect sense to expand its reach into South Africa, an area we are seeing extensive growth in. Furthermore, with more of the hyperscalers such as Azure, Google Cloud Platform and AWS, with whom we are partners and our solutions are aligned, pegging a stake in the ground in South Africa, it is even more critical to ensure our channel has the skills to support the end-user customer,” adds Siriniwasa.

As a global value-added distributor, Westcon-Comstor boasts worldwide logistics capabilities and within this can serve Pan-African businesses and multi-nationals from its head offices in Johannesburg and offices from across the world. With the distributor’s focus on training and enablement, its digital distribution services and the emphasis it places on pre- and post-sales support services, Trend Micro is looking to leverage the relationship to assist it in fast tracking partner competencies in the region, as well as further expand its growing African footprint.

“We are delighted to now be able to add South Africa as a region to our Trend Micro footprint. The Westcon-Comstor Security Solutions portfolio boasts a number of vendor partners with global synergies and relationships to Trend Micro, that we envisage will complement the sales efforts of our resellers into the future. This also closely aligns with our vision to be the preferred distributor in assisting our reseller’s customers and ensuring that their cloud journey is a secure one,” ends Rakesh Parbhoo, CEO at Westcon-Comstor.

For more information, visit www.trendmicro.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.