OTAVA’s New Continuous Security Posture Framework Explained

thumbnail OTAVA’s New Continuous Security Posture Framework Explained

Learn about OTAVA’s new S.E.C.U.R.E. framework and in our latest Partner POV episode.

Written By: Aminu Abdullahi
Apr 3, 2024
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In a special two-part episode of Channel Insider: Partner POV, host Katie Bavoso spoke with TJ Houske, CEO of OTAVA, about the introduction of the company’s new S.E.C.U.R.E. framework and his views on AI security.

Houske’s diverse background in engineering, architecture, and strategic business development has been instrumental in driving OTAVA’s ingenious approach to multi-cloud solutions and security. His expertise offers a unique perspective at the intersection of business and security.

OTAVA: From ‘bare metal to secure and compliant multi-cloud solution’

In the first part of the interview, Houske explained OTAVA’s evolution over its three decades of existence, noting that the company started as a “bare metal,” evolved into cloud with roots in “data protection and compliance,” and has transitioned into a “secure and compliant multi-cloud solution” provider.

Houske highlighted OTAVA’s focus on providing secure multi-cloud solutions, emphasizing the importance of continuous security posture advancement and the introduction of the S.E.C.U.R.E. framework.

Listen to Part 1 of the podcast:

Watch the Part 1 video:

The S.E.C.U.R.E. framework

Houske provided insights into OTAVA’s new S.E.C.U.R.E. framework. “OTAVA introduced the S.E.C.U.R.E. framework to support organizations’ continuous security posture advancement,” said Houske.

The components of the S.E.C.U.R.E. framework are as follows:

  • Shrink: Managed firewall, WAF (web application firewall), and MFA (multi-factor authentication).
  • Examine: Monitoring and reporting.
  • Contain: Endpoint AM, server AM, and email security.
  • Undo: BaaS (backup as a service) and DPaaS (data protection as a service).
  • Recover: DRaaS (disaster recovery as a service).
  • Evaluate: Patching vulnerability and scanning.

Houske further explained that the framework was designed to provide a clear and practical approach to security, combating the trends of confusion and complexity in the tech industry.

“I think that genuinely, there are a lot of companies that make a lot of profit on confusion, and to make this simple, it’s still complex; it just doesn’t have to be complicated. I really like that; that’s what the framework allows us to do: have more thorough conversations that really help customers get the business outcomes that they’re trying to achieve.”

Use case scenario and application of the S.E.C.U.R.E. framework

“When you talk about S.E.C.U.R.E. from a use case scenario from a consumer standpoint, how do they apply the framework in real time?” asked Bavoso.

In response, Houske broke down a use-case scenario using the S.E.C.U.R.E. framework. He emphasized the importance of reducing threat vectors, examining the effectiveness of security measures, containing security incidents, undoing any damage, recovering from incidents, and continuously evaluating security measures. By following this framework, organizations can better protect themselves from security threats and recover quickly in case of an incident.

Focus on AI and security

OTAVA CEO Houske touched on the growing importance of AI security in the current market landscape. Referencing his speech at the Channel Partners Expo, “At the Expo, you know the topic that they asked me to spend time on was securing generative AI,” said Houske.

He discussed concepts such as data anonymization, the ethical use of AI, and the importance of governance in AI implementation. Houske explained how the S.E.C.U.R.E. framework can be applied to AI security, providing a structured approach to protect against potential risks and ensure responsible AI usage.

For more on how MSPs can properly use AI, read MSPs’ Guide to Building an AI Strategy.

Vendors supporting the S.E.C.U.R.E. framework

“What vendors or solutions are supporting the secure framework?” asked Bavoso.

Houske highlighted Fortinet and Broadcom as vendors that OTAVA is particularly “bullish” on. He commended Fortinet for its platform-based ecosystem, which offers comprehensive security solutions aligned with OTAVA’s multi-cloud approach. Additionally, he spoke highly of Broadcom’s workload optimization and security capabilities, emphasizing the significance of choosing established and reputable vendors to safeguard critical data and assets.

Becoming a Premier Partner in the Broadcom Partner Program

In part two of the interview, Bavaso and Houske discussed the impact of changes in VMware licensing following Broadcom’s acquisition. Houske also delved into OTAVA’s experience joining the Broadcom Advantage Partner Program.

“We have an ecosystem. We’ve done well with it over the years. Now, it’s maturing and evolving to include new elements that relate specifically to the Broadcom program. But that’s not new to OTAVA. We’ve been doing that for a very long time, and we have hundreds of partners that already participate, both agent, reseller, and white label, you know, into that system,” said Houske.

Listen to Part 2 of the podcast:

Watch the Part 2 video:

Impact of millennial buyers

Regarding the changing landscape of buyers, Houske pointed out that millennials are more educated and more decisive in their purchasing decisions. He emphasized the importance of understanding buyer behavior and providing quick, relevant responses to meet their expectations.

“If you can be quicker to get to the facts and answer those questions for them to show relevancy, you have a great opportunity, and you can move a lot quicker,” said Houske. “That’s the biggest change that I see and I respect it.”

Getting in touch with OTAVA

You can contact OTAVA by visiting their website, watching their content on YouTube, listening to their podcast episodes on platforms like Apple and Spotify, or contacting their sales team to schedule a consultation.

Plug in to the video or podcast above to gain more insights from Katie Bavoso and TJ Houske. Remember to like and subscribe for future interviews, special episodes, and opportunities!

Who else made the HSP250? Browse the whole list to find out!

thumbnail Aminu Abdullahi

Aminu Abdullahi is a contributing writer for Channel Insider and an B2B technology and finance writer with over 6 years of experience. He has written for various other tech publications, including TechRepublic, eSecurity Planet, IT Business Edge, and more.

Recommended for you...

Video: Q2 2025 Channel Insights and Trends with the Channel Insider Editorial Team

A fast-paced editorial recap of Q2 2025 in the IT channel covering leadership shakeups at Kaseya, layoffs at Intel, federal obstacles pausing major acquisitions, AI adoption slowdowns, quantum security threats, evolving partner programs, and global economic tensions.

Katie Bavoso
Jul 17, 2025
XTIUM CEO and EMEA Leader on Global Business Opportunities

Global MSP XTIUM formally expands into EMEA with HQ in the Netherlands, unifying services for regional growth and global IT support.

Video: Inside MSP Owners Group: Juan Fernandez’s Vision for MSP 5.0, Rollups, and Employee Ownership

Juan Fernandez shares why he started the newly formed MSP Owners Group and what makes his rollup MSP different from others.

Katie Bavoso
Jul 2, 2025
Video: How Servix Solved Brado’s Remote Logistics IT Challenges with Scale Computing Edge Clusters

Discover how Servix and Brado tackled remote IT infrastructure challenges using Scale Computing edge solutions.

Katie Bavoso
Jul 1, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.