Presentation is loading. Please wait.

Presentation is loading. Please wait.

My Check Point experience

Similar presentations


Presentation on theme: "My Check Point experience"— Presentation transcript:

1 My Check Point experience
By Lauren katz

2 Projects Created two go-to-market strategies to increase SMB sales, one for within a specific country, and one for within a specific region. Created a technical presentation for entering the mobile security market.

3 Market strategy project
Steps Achieved sales certificate Learned about products and current sales strategies as well as the techniques used for cyber security such as threat extraction and threat emulation. Business Analysis of the geography Filtered data for specific countries in the region and compared the data to worldwide data and data from other regions Estimated value of the total SMB market Estimated Check Point’s share of the SMB market Estimated our potential share of the SMB market Spoke to distributors and resellers in the region Researched competitors’ sales and partners Used Salesforce to evaluate current opportunities with customers Proposed the route to achieve the proposed potential share Used qualitative and quantitative support from above steps Created an internal presentation and a presentation tailored for distributors and resellers

4 Market strategy project
Results Was able to propose a route to increase sales by approximately $5 million in one region and $2 million in another region. Through filtering data I was able to make suggestions to increase sales from top 10 customers, top 10 channels, and the other smaller channels that were hard for Check Point to reach

5 Mobile security project
Steps Research highest security risks and concerns Research how hackers can hack into mobile devices and with what technical commands Understand SS7 and Sigtran security and the protocols used for each Look into competitor’s solutions and market reach Create a technical presentation for developers and product managers to understand mobile security without any background knowledge Included relevant definitions, images, steps of protocols, hacking commands, market research, and competitor products.

6 My contribution to the team’s goal
Distributors in these two regions had expressed great interest in Check Point’s product but needed a push to get started I did all the research for them so they could start following the proposed strategy They don’t have the same data that Check Point has so with my research we could tell the distributors how to expand the market effectively without giving them access to sales data. Check Point had not expanded to mobile security yet, but were receiving requests to do so. I did all of the background research of the market and how mobile security works, what threats are out there, and what other companies are doing, so that developers and product managers could decide if and how they wanted to enter the market. I was able to use my computer science skills to tailor the presentation to developers and cover all of the technical aspects of mobile security.

7 What I learned How to manipulate data using Excel to observe relevant patterns for sales and market shares. How cyber and mobile security work  how the products are innovative technologically and how computers and mobile devices can be protected and hacked into. Importance of feedback and communication Had helpful check ins and got feedback from my mentor, VP of PM, and distributors  each had unique and helpful information that was crucial to my final presentation.


Download ppt "My Check Point experience"

Similar presentations


Ads by Google