• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Symantec Endpoint Protection - Product Positioning
 

Symantec Endpoint Protection - Product Positioning

on

  • 813 views

People make a decision to buy when the pain of the problem is greater than the pain of change. Learn how to develop the pain by taking customers to the negative future - the nightmare of losing all ...

People make a decision to buy when the pain of the problem is greater than the pain of change. Learn how to develop the pain by taking customers to the negative future - the nightmare of losing all their valuable business data because they were unprotected, then show them the positive future they will enjoy when they have installed End Point Protection Small Business Edition 2013 from Symantec.

Statistics

Views

Total Views
813
Views on SlideShare
812
Embed Views
1

Actions

Likes
0
Downloads
11
Comments
0

1 Embed 1

http://twitter.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Symantec Endpoint Protection - Product Positioning Symantec Endpoint Protection - Product Positioning Presentation Transcript

    • Part 2. Product Positioning
    • Connected Customers www.flickr.com/photos/cajie/364732208
    • More and more of ourtime surfing the web www.flickr.com/photos/ccdoh1/3459618962
    • Drowning in of data
    • theProblem
    • Data security www.flickr.com/photos/kenyee/2817511001
    • Always connected www.flickr.com/photos/defragged/522405926
    • Two sources of risk:People we knowPeople wedon’t know
    • Evil forces at work www.flickr.com/photos/laughingsquid/4277630860
    • What do they look like? www.flickr.com/photos/strobe-/7592200456
    • People we knowwww.flickr.com/photos/makelessnoise/759311624
    • End point protection www.flickr.com/photos/dimenticato/2600683772
    • Massive data leaks www.flickr.com/photos/rustytanton/260708043
    • Modern day pirateswww.flickr.com/photos/tavallai/4766144788
    • False sense of security www.flickr.com/photos/thesussman/5235066810
    • End point protection
    • Ineffective End Point Protection http://www.flickr.com/photos/edgeplot/2520607830/
    • An accident waiting to happenwww.flickr.com/photos/xlibber/3870106899
    • theOpportunity
    • Help them to choose www.flickr.com/photos/oregondot/6235945692
    • Guide them to the right solution www.flickr.com/photos/pursuethepassion/3822008906
    • Show them the best way forward
    • Get it wrong www.flickr.com/photos/roome/3390682853
    • Get it rightwww.flickr.com/photos/winemegup/3641912321
    • 1 2 3 3 ideas for today’s webinar
    • 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
    • Create a sense of urgency www.flickr.com/photos/amagill/3225245640
    • Create a sense of urgency 28
    • Cyber terrorism is multi-taking mayhem www.flickr.com/photos/15271532@N00/1172675049
    • Gone before you know it www.flickr.com/photos/jurvetson/478786571
    • Move in, move out www.flickr.com/photos/brewbooks/3934958171
    • Steal your businesswww.flickr.com/photos/stillmemory/880277551
    • The fatal blue screen www.flickr.com/photos/o2sources/2311353972
    • Disruptive change www.flickr.com/photos/mwichary/3690887427
    • Fear of attack www.flickr.com/photos/sziszo/2632802003
    • Cloud Security Strategy? www.flickr.com/photos/26046024@N06/2735134853
    • We are totally secure
    • Data Security Cloud Architects http://ad009cdnb.archdaily.net/wp-content/uploads/2012/06/20120110_JG_2901dusk-1000x752.jpg
    • Connected Customers
    • 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
    • All your security risks simply…
    • Continuous inspection www.flickr.com/photos/rooreynolds/3868326564
    • Secret Agentwww.flickr.com/photos/magiker/2377684727
    • Protecting all your valuable data www.flickr.com/photos/rooreynolds/3913175831
    • Protecting all your End Points www.flickr.com/photos/thelostwanderer/125511639
    • Pre-emptive cleaning Predictive analytics
    • Cleaned continuously beforeyou get access to your data
    • Now is the timeclean up your act
    • 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
    • What if you want comeback from the Cloud?
    • Return path
    • You can’t teach an old dog new tricks
    • Return pathwww.flickr.com/photos/29456235@N04/3665618772
    • Today’s Webinar in
    • 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
    • Effective End Point Protection www.flickr.com/photos/29233640@N07/3779987744
    • Data cleansing www.flickr.com/photos/richardwest/2792878444
    • Peace of MindDavid R EdniePresident & CEOSalesChannel EuropePh: +33 676 60 09 25 (FR)Email: david@saleschannel-europe.comWebsite: www.saleschannel-europe.com