State Of Selling Security Eric Townsend Intel Corporation July 2018
Why ARE We Talking To You Today Update On Business Security Trends Discuss Top 3 Security Use Cases You Can Deploy With Your Customers Make You Aware of Resources To Help You Scale
Eric Townsend Lead America SMB Partner & MSP Marketing Activities 2017: spent over 800+ hours with SMB channel partners Involved with Channel Peer Groups For 10 Years Working with Various Industry Partners RMMs Distribution Partners Lets Get Connected http://www.linkedin.com/in/ericdtownsend https://twitter.com/Eric_D_Townsend
State of the SMB Customer Environment
Lets talk about security
Polling Question #1 How Many Of Your Customers Have Been Impacted By Ransomeware in The Past 12 Months? 0 - 25% of My Customers 25 - 50% of My Customers 50 - 75% of My Customers More than 75% of My Customers
100+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2018 EDITION] Ransomware has passed malware as the biggest impacts in 2017 Globally, cybercrime was the 2nd most reported crime in 2016 (Source: PWC) An attacker resides within a network for an average 146 days before detection. (Source: Microsoft) Hackers are attacking computers and networks at a “near-constant rate”, with an average of one attack every 39 seconds. (Source: University of Maryland) Most network intrusions—63 percent—are the result of compromised user passwords and usernames. (Source: Microsoft) $500 billion: Microsoft’s estimate for the total potential cost of cybercrime to the global community. (Source: Microsoft) $14 billion: The amount the U.S. government spent in 2017 on cybersecurity. (Source: CIO) 43 percent of cyber attacks against businesses worldwide target small companies. (Source: Symantec) Link To Report: https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/ Source: Comparitech
How Are Security Attacks Are Happening Source: hackmageddon.com
Who Is Being Targeted Source: hackmageddon.com
Polling Question #2 How Important Are Security Demands In Your 2018 PC Refresh Sales Opportunities? It Will help drive 25% of PC REFRESH Sales Opportunities It Will help drive 50% of PC REFRESH Sales Opportunities It Will help drive 75% of PC REFRESH Sales Opportunities It Will help drive 90+% of PC REFRESH Sales Opportunities
Top 3 Security Use Cases You Can Deploy With Your Customers Security Patching Machine quarantine & Reimage Multifactor Authentication
Security Patching Use Case Patching is critical – missed patches create risk and are costly to remediate Intel vPro Technology’s remote power on/off insures patches get done NOW End user value: Better security, no 8:00 am reboots that delay productivity Service Provider value Lower costs as chasing failed patches is eliminated Improved performance on customer-facing patching reports
Machine Quarantine & Re-imaging Use Cases Use Case: quickly isolate a suspect PC from the rest of the network and minimize the malware remediation costs Technology Used Isolate using Intel vPro remote power down Remote diagnose using Intel vPro’s out-of-band (below the OS) ability Remote re-imaging using Intel vPro’s KVM Remote Control (rather than spending more than 10 minutes on the diagnosis) End user value Minimizes impact of successful attacks Reduces downtime to minimize loss of productivity Service provider value Simplifies remediation Results in a cleaner end-state on the PC Saves time and guesswork “We ran into an issue yesterday on a non-vPro machine where the customer had fallen for a malware scam. We had to walk the user thru BIOS settings on the phone, which is painful. vPro would have definitely shortened the time to resolve an issue like that. Not having to drive to our customers—some are hours away—saves us a lot of time. We save over three hours on an OS repair.. Sam Suglio, Operations Manager, DMA Tech Solutions
Multifactor Authentication (MFA) Use Cases Multifactor authentication combines “something you are”, “something you have”, “something you know”, and/or “somewhere you are” to confirm user identity Intel Authenticate provides authentication function at the hardware level where tampering is much more difficult End user value: much better security Service provider value Dramatically improved offering to in area of top customer concern Widely available on 6th, 7th and 8th Gen Core vPro Processor-based systems
Tools To Help You Scale
vPro Security Activation program For qualified Lenovo Channel Partners who: Manage at least 500 endpoints for SMB customers Operate in North America Takes you step-by-step through deploying vPro Security technologies Qualify for free seed systems Focus on sell-able solutions Interested? Let us know at activation@intelmsp.com
Security Sales Tools Briefcase https://msp.intel.com/uploads/Intel_Client_Security_Briefcase.zip
Q’3 2018 ITP 8th Gen Core vPro & Optane Branded Points Promotions https://msp.intel.com/resources/Lenovo
Polling Question #3 Which of These Tools Would Help You In The Sales Process Around Security & PC Refresh? Sales Brief Showing The Different Security Features Between Windows 7 & Windows 10 Pro Intel Based PC Solutions Infographic Listing Top Security Stats Of 2017 Social Media Images About Security Impacts On Businesses in 2017 Technical Whitepaper Detailing What The New 8th Gen Core vPro & Windows 10 Pro Features Can Help A Company Be More Secure
Summary – Call To Action Educate your customer on Today’s Security Threats Sign Up For the Intel Security Activation Program Take Advantage of ITP Q’3 Points Promotions Related To Lenovo Desktops & Notebooks
Side Channel Security Issue External Security Advisory landing page: https://security-center.intel.com/ Email For Reporting Security Issues secure@intel.com