Posted on May 21, 2021
Want to interview Chase?Contact
First, because it’s pretty damn cool. Cybersecurity industry businesses tend to utilize powerful imagery in their logos and brand identities. Wolves, rhinos, bears, falcons, Vikings, locks, spiders, foxes, and lots of dragons are all over the market. Ask why a company chose its logo and you’ll usually get some quick comment about how their image shows strength or conveys powerful defensive capabilities. Sure, that makes sense. Honestly, this market is interesting and forward-looking in that we can collectively point to those images as representing an overall security brand stance. But if you try and dig deeper into many of those brands and logos, you’ll often find that the thinking behind that logo doesn’t go much further than a neat picture and some serious marketing dollars.
We chose to go deeper than that. Ericom is an established brand with a strong heritage in secure connectivity and remote access technologies, but it has been evolving that offering to include cybersecurity capabilities. With the company continuing its move to add cloud cybersecurity services, we seized the opportunity to combine a soon-to-launch new technology offering with a new brand that represents where we’re going. We chose to anchor this new brand and logo – along with our new technology – in a well-crafted, carefully considered persona that represents what we offer to our customers and MSSP partners, and is in line with our company culture. This was not an easy task, and the journey had its ups and downs; but we are proud of the result and think that it stands out in the market.
First, to choose an image for our logo, we ran a word association experiment that went like this:
I asked 25 people who were not cybersecurity folks or cyber marketers to jot down the first words that came to mind when I put these terms before them.
That pretty much nailed down that a “sword” equals an edge; the best sword is a Kitana; and the best user of that sword is a Samurai. Cool.
Now, the next questions were, “Is a Samurai a good image to associate with our brand? Does the history of the Samurai represent the qualities and ethos that we want people to associate with the Ericom brand?”
That required some research. All I knew about Samurai before this exercise was based on a not-awful movie in which Tom Cruise dressed up as one, and got his ass kicked numerous times. And of course, I knew that Samurai were basically the feudal Japanese equivalents of knights. That was the extent of my knowledge, yikes.
So, I started to read a lot of historical and academic publications on the history of the Samurai. And the more I read up on the history and ethos of those ancient Samurai, the more they seemed like a great image to associate with our brand. Let me break down what that research led us to understand.
The word Samurai originally meant “one who serves,” which is what Ericom aspires to be. We’re dedicated to serving our customers and we’re proud of our servant leadership culture.
Samurai lived by the Bushido code of behavior, which laid out how they should act in their personal and professional lives. As a philosophy and system of belief that places a great deal of importance on loyalty and duty, it perfectly aligns with our corporate values and company culture. Going even deeper, we learned that the Bushido code comprises some key principles or virtues that Samurai were expected to uphold.
Sometimes you get lucky, and sometimes you know more than you think you do. In this case, I personally learned a lot and felt fortunate to have found an image that resonates with exactly who “we” want to be at Ericom. While not one of those 25 word-associators could have named even one of the Samurai values, they were spot on in sensing that the image was right for our brand, and consistent with the principles and values with which each one of us approaches our task of protecting our customers from cyberthreats.
One emerging solution architecture that has gained traction to help secure modern distributed organizations is called Secure Access Service Edge (SASE).
According to a Bloomberg report, the attack on Colonial Pipeline can be traced to the company's insufficient diligence in following a number of IT best practices related to its remote access solutions.
Midsize enterprises, and the MSSPs that serve them, are typically an afterthought for big enterprise security vendors. Enter ZTEdge - the right solution at half the cost.