The Problem We Kept Seeing
Between us, Max and I have spent decades in cybersecurity — me on the business and commercial side, Max on the technical and engineering side. We kept seeing the same problem. A mid-market company with 200 employees would buy an endpoint security product from one vendor, a firewall from another, a vulnerability scanner from a third, and somehow cobble it together into a "security stack." Each vendor would tell them they were protected. None of them talked to each other. And when we asked about data exfiltration prevention, we got blank stares. The company would spend six figures on security products and still have no idea what data was leaving their network every day. That is not a security stack — it is a collection of unrelated tools and a prayer.
The Full English Breakfast
I explain our business model with a cooking analogy. Most security vendors sell you a tin of beans. Good beans — Heinz, even. But beans alone are not a meal. What you actually need is the full English breakfast: beans, bacon, sausages, eggs, mushrooms, toast, and a strong cup of tea. Each item from a supplier we have personally vetted and tested. Coro handles endpoint detection. Hadrian watches your attack surface. BlackFog prevents data exfiltration. Panorays manages third-party risk. No two items compete with each other on the plate. Every item serves a distinct purpose. And Kyanite Blue is the kitchen that puts it all together — or through Collective IP, we teach your team how to cook and serve it themselves.
Why the Reseller Model Is Broken
Traditional security resellers have a structural problem: they make more commission selling you the most expensive product, not the most appropriate one. They are incentivised to sell you Heinz when Bobby's Beans taste better and cost half as much. We built Kyanite Blue differently. We curate products that we believe are genuinely best-in-class in their specific domain. BlackFog is not a household name yet, but their anti data exfiltration technology has no meaningful competitor. Hadrian is an emerging leader in attack surface management that outperforms vendors charging three times as much. We back products that we would deploy on our own infrastructure — and we never carry two competing products in the same security domain. That means our recommendation is always about what is right for the client, not what pays us the highest margin.
What Comes Next
We built the Kyanite Blue platform so that every client can see exactly what is on their plate. The client dashboard shows every product deployed, every threat detected, every vulnerability found, and every third-party risk assessed — in one place, with no vendor login juggling. When we spot a gap — your breakfast is missing the sausages, so to speak — we surface the right product at the right time. No cold calls, no pressure. Just a clear view of what you have, what you are missing, and what it would cost to close the gap. David's vision was always to build something that multiplies reach without multiplying headcount. Technology that does the heavy lifting so we can focus on what actually matters: understanding each client's specific risk profile and making sure every product on their plate is earning its place.
The Name
Kyanite is a mineral that forms under extreme pressure and is known for its hardness and resistance. Blue kyanite specifically is associated with clarity and communication — fitting for a company whose entire proposition is cutting through the noise of an overcrowded security market and giving clients a clear view of their risk. It also, frankly, sounds better than "David and Max's Cybersecurity Beans." We considered that. Briefly.