Red-M, an offshoot of Madge Networks, is claiming success after signing eight resellers to its Red Alliance channel programme, as well as distributor Sphinx.
The firm is offering a range of hardware and software intrusion detection systems for wireless networks after quietly end-of-lining its Bluetooth access points (APs).
Mark Hatton, managing director of Sphinx, said. "We have a broad security portfolio, but no wireless security products.
"We signed up with Red-M because its technology is attractive to companies with no wireless infrastructures, as well as those with them. Also, it has absolute clarity in its channel programme."
Karl Feilder, chief executive of Red-M, claimed the vendor is also one of a few companies - if not the only one - to offer Bluetooth intrusion detection.
"We are in a position to deal with a multiplicity of threats, not just 802.11 a, b, and g," he claimed. "We are offering solutions that are similar to those from the likes of Reefedge, Trapeze, Aruba and Vernier."
Feilder added that most of his competitors in the intrusion detection market rely on probes to grab all wireless traffic and send it back to a central device for analysis. Red-M's probes are "smart enough" to just send back the threatening-looking traffic, he said.
"There are three types of customer out there: those going for a controlled roll-out of wireless; those going for it; and those that want no wireless access at all," Feilder said.
Red-M first offered Bluetooth access points in 2000. But despite positive reviews, the market for 802.11 wireless APs eclipsed Bluetooth APs in the UK and Europe.
However, Bluetooth is gaining ground in the US, and his company has had some success with the APs in Asia, Feilder said.
Telco also announced series of initiatives to drive digital growth in the UK
Nana Baffour opens up on Getronics' mammoth acquisition of Pomeroy
Analyst predicts SaaS will remain the dominant segment in the market as it grows 17 per cent in 2019
NSS Labs claims vendors are refusing to have their products tested effectively and are trying to restrict its access