State Of Selling Security

Slides:



Advertisements
Similar presentations
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Advertisements

Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Entré NetMonitor Proactive IT monitoring, Management and support Think DIFFERENT about IT.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Computer System Support   The costs of installing, operating and maintaining computer systems are called total costs o ownership or TCO  TCO includes.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
1 Cost Efficiency Savings from an IT perspective Ravi Nannapaneni Principal Engineer Principal Engineer Intel Corporation Intel Corporation.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
IBM System x Systems Management Made Easy ibm
The time to address enterprise mobility is now
Your Guide to VMware Channel Marketing Partner Programs
Chapter 6: Securing the Cloud
3 Do you monitor for unauthorized intrusion activity?
Cybersecurity - What’s Next? June 2017
LANDesk® Management Suite 8.6 with ThinkVantageTM Technologies
System Access Authentication
Common Methods Used to Commit Computer Crimes
Top 5 Ways To Change The #Marketing Conversation with Your Customer Around PC Refresh December 2016.
Windows 10 Enterprise E3 for Small and Medium Business
Trends in Ransomware Distribution
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Windows Server 2012 Standard Additional License After Point of Sale (APOS) version for OEM What is the new Windows Server 2012 Standard Additional License.
Forensics Week 11.
Microsoft 365 Business Customer Targeting 2/6/18
ITIC 2017 Hourly Cost of Downtime and Minimum Reliability Requirements Survey March/April 2017 Laura DiDio Principal.
Today’s Risk. Today’s Solutions. Cyber security and
Dell EMC & Intel SMB Partner & MSP Recent Content
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Dell EMC & Intel SMB Partner & MSP Recent Content
Lenovo & Intel SMB Partner & MSP Recent Content
Strong Security for Your Weak Link:
11/19/2018 4:38 AM Microsoft 365 Business Customer Targeting Janine Brittain - EXEED 2/6/18 © Microsoft Corporation. All rights reserved. MICROSOFT.
Dell EMC & Intel SMB Partner & MSP Recent Content
SMB practice development: Security play
Dell EMC & Intel SMB Partner & MSP Recent Content
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Navigating Security Seas in a Small Ship with a Limited Crew
Dell EMC & Intel SMB Partner & MSP Recent Content
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
IBM System x Systems Management Made Easy ibm
Securing the Threats of Tomorrow, Today.
SMB practice development: Security play
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
HP & Intel SMB Partner & MSP Recent Content
Dell EMC & Intel SMB Partner & MSP Recent Content
Dell EMC & Intel SMB Partner & MSP Recent Content
Automating Profitable Growth™
Lenovo & Intel SMB Partner & MSP Recent Content
Protecting your data with Azure AD
Lenovo & Intel SMB Partner & MSP Recent Content
Lenovo & Intel SMB Partner & MSP Recent Content
Guidance: This sales script is designed to be used. after
Move your data to the cloud with Azure and {Partner Company Name}
Lenovo & Intel SMB Partner & MSP Recent Content
No!. [NEXT SLIDE] LOGO HERE.
3 Do you monitor for unauthorized intrusion activity?
Agenda The current Windows XP and Windows XP Desktop situation
<offer name> with Microsoft 365 Business Secure Deployment
Change. For the Better After 14 January 2020, Microsoft will no longer provide security updates or support for Windows 7. But you can keep the good times.
Figuring out CyberSecurity Return On Investment
3 Do you monitor for unauthorized intrusion activity?
6 Business Benefits of Channel Marketing Automation
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cloud Computing for Wireless Networks
Presentation transcript:

State Of Selling Security Eric Townsend Intel Corporation July 2018

Why ARE We Talking To You Today Update On Business Security Trends Discuss Top 3 Security Use Cases You Can Deploy With Your Customers Make You Aware of Resources To Help You Scale

Eric Townsend Lead America SMB Partner & MSP Marketing Activities 2017: spent over 800+ hours with SMB channel partners Involved with Channel Peer Groups For 10 Years Working with Various Industry Partners RMMs Distribution Partners Lets Get Connected http://www.linkedin.com/in/ericdtownsend https://twitter.com/Eric_D_Townsend

State of the SMB Customer Environment  

 

Lets talk about security

Polling Question #1 How Many Of Your Customers Have Been Impacted By Ransomeware in The Past 12 Months? 0 - 25% of My Customers 25 - 50% of My Customers 50 - 75% of My Customers More than 75% of My Customers

100+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2018 EDITION] Ransomware has passed malware as the biggest impacts in 2017 Globally, cybercrime was the 2nd most reported crime in 2016 (Source: PWC) An attacker resides within a network for an average 146 days before detection. (Source: Microsoft) Hackers are attacking computers and networks at a “near-constant rate”, with an average of one attack every 39 seconds. (Source: University of Maryland) Most network intrusions—63 percent—are the result of compromised user passwords and usernames. (Source: Microsoft) $500 billion: Microsoft’s estimate for the total potential cost of cybercrime to the global community. (Source: Microsoft) $14 billion: The amount the U.S. government spent in 2017 on cybersecurity. (Source: CIO) 43 percent of cyber attacks against businesses worldwide target small companies. (Source: Symantec) Link To Report: https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/ Source: Comparitech

How Are Security Attacks Are Happening Source: hackmageddon.com

Who Is Being Targeted Source: hackmageddon.com

Polling Question #2 How Important Are Security Demands In Your 2018 PC Refresh Sales Opportunities? It Will help drive 25% of PC REFRESH Sales Opportunities It Will help drive 50% of PC REFRESH Sales Opportunities It Will help drive 75% of PC REFRESH Sales Opportunities It Will help drive 90+% of PC REFRESH Sales Opportunities

Top 3 Security Use Cases You Can Deploy With Your Customers Security Patching Machine quarantine & Reimage Multifactor Authentication

Security Patching Use Case Patching is critical – missed patches create risk and are costly to remediate Intel vPro Technology’s remote power on/off insures patches get done NOW End user value: Better security, no 8:00 am reboots that delay productivity Service Provider value Lower costs as chasing failed patches is eliminated Improved performance on customer-facing patching reports

Machine Quarantine & Re-imaging Use Cases Use Case: quickly isolate a suspect PC from the rest of the network and minimize the malware remediation costs Technology Used Isolate using Intel vPro remote power down Remote diagnose using Intel vPro’s out-of-band (below the OS) ability Remote re-imaging using Intel vPro’s KVM Remote Control (rather than spending more than 10 minutes on the diagnosis) End user value Minimizes impact of successful attacks Reduces downtime to minimize loss of productivity Service provider value Simplifies remediation Results in a cleaner end-state on the PC Saves time and guesswork “We ran into an issue yesterday on a non-vPro machine where the customer had fallen for a malware scam. We had to walk the user thru BIOS settings on the phone, which is painful. vPro would have definitely shortened the time to resolve an issue like that. Not having to drive to our customers—some are hours away—saves us a lot of time. We save over three hours on an OS repair.. Sam Suglio, Operations Manager, DMA Tech Solutions

Multifactor Authentication (MFA) Use Cases Multifactor authentication combines “something you are”, “something you have”, “something you know”, and/or “somewhere you are” to confirm user identity Intel Authenticate provides authentication function at the hardware level where tampering is much more difficult End user value: much better security Service provider value Dramatically improved offering to in area of top customer concern Widely available on 6th, 7th and 8th Gen Core vPro Processor-based systems

Tools To Help You Scale

vPro Security Activation program For qualified Lenovo Channel Partners who: Manage at least 500 endpoints for SMB customers Operate in North America Takes you step-by-step through deploying vPro Security technologies Qualify for free seed systems Focus on sell-able solutions Interested? Let us know at activation@intelmsp.com

Security Sales Tools Briefcase https://msp.intel.com/uploads/Intel_Client_Security_Briefcase.zip

Q’3 2018 ITP 8th Gen Core vPro & Optane Branded Points Promotions https://msp.intel.com/resources/Lenovo

Polling Question #3 Which of These Tools Would Help You In The Sales Process Around Security & PC Refresh? Sales Brief Showing The Different Security Features Between Windows 7 & Windows 10 Pro Intel Based PC Solutions Infographic Listing Top Security Stats Of 2017 Social Media Images About Security Impacts On Businesses in 2017 Technical Whitepaper Detailing What The New 8th Gen Core vPro & Windows 10 Pro Features Can Help A Company Be More Secure

Summary – Call To Action Educate your customer on Today’s Security Threats Sign Up For the Intel Security Activation Program Take Advantage of ITP Q’3 Points Promotions Related To Lenovo Desktops & Notebooks

Side Channel Security Issue External Security Advisory landing page: https://security-center.intel.com/ Email For Reporting Security Issues secure@intel.com