Shaw Technology Case Study

Shaw Technology is a large IT service provider that offers a wide array of technology services like email hosting, collaboration, network design and support, server management and security. The 12 year-old company continues to grow and serves more than 250 clients in diverse market segments including healthcare, manufacturing and legal across the United States, as well as in Central America and Spain.

  • Company: Shaw Technology
  • Industry: Managed Service Provider
  • Location: Montgomery, Ala
  • Established: 2010
  • Interviewed: Chandler Bise, Security Engineer

“Dark Web ID is something that we can offer to clients at a really good price for what they get − 24/7 monitoring alerts for new compromises.”

Chandler Bise Chandler Bise, Security Engineer

The Challenge

In early 2020, Shaw Technology began developing the cybersecurity side of their business. The company needed to find ways to provide strong, proactive protection for their clients at an excellent value to be competitive. Shaw Technology sought the right tools to ensure they provided clients with top notch defense from the beginning of their business relationship as well as a high level of client satisfaction, building solid working relationships with their customers.

Goals of Shaw Technology – ID Agent Relationship

  • Provide clients with strong, affordable defenses immediately
  • Deliver a top-quality client experience that fosters a strong relationship
  • Develop their security business and position the company for growth in that area

The Solution

As Shaw Technology began establishing the foundation for their new security business, they looked to ID Agent as a partner. Dark Web ID enabled them to offer clients protection from dark web credential compromise at a great price. The addition of BullPhish ID to the company’s security services gave Shaw Technology the tools needed to offer clients the security and compliance training services they needed to fulfill regulatory requirements like CMMC. Together with other Kaseya products, Shaw Technology is able to nurture a successful security business offering customers excellent value at several affordable price points.

Other Benefits from Partnering with ID Agent & Kaseya

The resources available through the Kaseya Powered Services partner enablement platform provided Shaw Technology important growth-focused sales and marketing tools.

Shaw Technology has grown its revenue with tiered security services that can be easily tailored to a client’s needs.

The ability to run a live search and show clients and prospects their compromised credentials is a great way to demonstrate the need for enhanced security.

“BullPhish ID was definitely an added bonus, especially dealing with clients that do have HIPAA compliance, or CMMC for our DOD contracting clients.”

Chandler Bise Security Engineer, Shaw Technology

Find out how you can open doors with new prospects.

Book A Demo

Looking Forward

Shaw Technology plans to continue to grow its security services by fostering profitable client relationships. They aim to provide both current clients and new customers with the cybersecurity services that they need at an affordable price. The company is considering adding other complementary Kaseya products, like Graphus, to its security mix. Shaw Technology will also continue to leverage the added benefit of a relationship with Kaseya Powered Services in its ongoing marketing and sales efforts as it builds its security business.

“Packaging BullPhish ID and Dark Web ID along with the rest of Kaseya’s products while being able to offer our clients an affordable price for the value is extremely helpful in not only growing our business, but also helping our clients’ businesses grow.”

Chandler Bise Security Engineer, Shaw Technology
Case Studies

From our customers

View Now
IDA_Case-Study_Xavier-Uni-Resource

Xavier University of Louisiana

See how Xavier University of Louisiana leverages Dark Web ID and BullPhish ID to mitigate cyber risks and boost the institution’s cyber resilience.

View Study
IDA_Case-Study_LoyolaSchool-Resource

Loyola School

See how Loyola School’s one person IT team overcame email security challenges with Graphus and BullPhish ID.

View Study
IDA_Case-Study_Thiry

Thiry Technology Services

See how Thiry Tech helps defense contractors maintain security and compliance with IT Complete.

View Study