Part 2. Product Positioning
Connected Customers         www.flickr.com/photos/cajie/364732208
More and more of ourtime surfing the web                       www.flickr.com/photos/ccdoh1/3459618962
Drowning in of data
theProblem
Data security www.flickr.com/photos/kenyee/2817511001
Always connected    www.flickr.com/photos/defragged/522405926
Two sources of risk:People we knowPeople wedon’t know
Evil forces at work                      www.flickr.com/photos/laughingsquid/4277630860
What do they look like?          www.flickr.com/photos/strobe-/7592200456
People we knowwww.flickr.com/photos/makelessnoise/759311624
End point protection                       www.flickr.com/photos/dimenticato/2600683772
Massive data leaks     www.flickr.com/photos/rustytanton/260708043
Modern day pirateswww.flickr.com/photos/tavallai/4766144788
False sense of security        www.flickr.com/photos/thesussman/5235066810
End point protection
Ineffective End Point Protection                http://www.flickr.com/photos/edgeplot/2520607830/
An accident waiting to happenwww.flickr.com/photos/xlibber/3870106899
theOpportunity
Help them to choose                      www.flickr.com/photos/oregondot/6235945692
Guide them to the right solution               www.flickr.com/photos/pursuethepassion/3822008906
Show them the best way forward
Get it wrong               www.flickr.com/photos/roome/3390682853
Get it rightwww.flickr.com/photos/winemegup/3641912321
1 2 3         3 ideas for    today’s webinar
1   Make the problem real and threatening    Show them how SEP SBE 2013 simply takes2   the PAIN away3   Sell the “Return ...
Create a sense of urgency                            www.flickr.com/photos/amagill/3225245640
Create a sense of urgency 28
Cyber terrorism is multi-taking mayhem                                  www.flickr.com/photos/15271532@N00/1172675049
Gone before you know it          www.flickr.com/photos/jurvetson/478786571
Move in, move out                    www.flickr.com/photos/brewbooks/3934958171
Steal your businesswww.flickr.com/photos/stillmemory/880277551
The fatal blue screen  www.flickr.com/photos/o2sources/2311353972
Disruptive change    www.flickr.com/photos/mwichary/3690887427
Fear of attack  www.flickr.com/photos/sziszo/2632802003
Cloud Security Strategy?                           www.flickr.com/photos/26046024@N06/2735134853
We are totally secure
Data Security Cloud Architects                    http://ad009cdnb.archdaily.net/wp-content/uploads/2012/06/20120110_JG_29...
Connected Customers
1   Make the problem real and threatening    Show them how SEP SBE 2013 simply takes2   the PAIN away3   Sell the “Return ...
All your security risks simply…
Continuous inspection                        www.flickr.com/photos/rooreynolds/3868326564
Secret Agentwww.flickr.com/photos/magiker/2377684727
Protecting all your valuable data                     www.flickr.com/photos/rooreynolds/3913175831
Protecting all your End Points                                 www.flickr.com/photos/thelostwanderer/125511639
Pre-emptive cleaning Predictive analytics
Cleaned continuously beforeyou get access to your data
Now is the timeclean up your act
1   Make the problem real and threatening    Show them how SEP SBE 2013 simply takes2   the PAIN away3   Sell the “Return ...
What if you want comeback from the Cloud?
Return path
You can’t teach an old dog new tricks
Return pathwww.flickr.com/photos/29456235@N04/3665618772
Today’s Webinar in
1   Make the problem real and threatening    Show them how SEP SBE 2013 simply takes2   the PAIN away3   Sell the “Return ...
Effective End Point Protection                                 www.flickr.com/photos/29233640@N07/3779987744
Data cleansing                 www.flickr.com/photos/richardwest/2792878444
Peace of MindDavid R EdniePresident & CEOSalesChannel EuropePh: +33 676 60 09 25 (FR)Email: david@saleschannel-europe.comW...
Symantec Endpoint Protection - Product Positioning
Upcoming SlideShare
Loading in...5
×

Symantec Endpoint Protection - Product Positioning

615

Published on

People make a decision to buy when the pain of the problem is greater than the pain of change. Learn how to develop the pain by taking customers to the negative future - the nightmare of losing all their valuable business data because they were unprotected, then show them the positive future they will enjoy when they have installed End Point Protection Small Business Edition 2013 from Symantec.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
615
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Symantec Endpoint Protection - Product Positioning

  1. 1. Part 2. Product Positioning
  2. 2. Connected Customers www.flickr.com/photos/cajie/364732208
  3. 3. More and more of ourtime surfing the web www.flickr.com/photos/ccdoh1/3459618962
  4. 4. Drowning in of data
  5. 5. theProblem
  6. 6. Data security www.flickr.com/photos/kenyee/2817511001
  7. 7. Always connected www.flickr.com/photos/defragged/522405926
  8. 8. Two sources of risk:People we knowPeople wedon’t know
  9. 9. Evil forces at work www.flickr.com/photos/laughingsquid/4277630860
  10. 10. What do they look like? www.flickr.com/photos/strobe-/7592200456
  11. 11. People we knowwww.flickr.com/photos/makelessnoise/759311624
  12. 12. End point protection www.flickr.com/photos/dimenticato/2600683772
  13. 13. Massive data leaks www.flickr.com/photos/rustytanton/260708043
  14. 14. Modern day pirateswww.flickr.com/photos/tavallai/4766144788
  15. 15. False sense of security www.flickr.com/photos/thesussman/5235066810
  16. 16. End point protection
  17. 17. Ineffective End Point Protection http://www.flickr.com/photos/edgeplot/2520607830/
  18. 18. An accident waiting to happenwww.flickr.com/photos/xlibber/3870106899
  19. 19. theOpportunity
  20. 20. Help them to choose www.flickr.com/photos/oregondot/6235945692
  21. 21. Guide them to the right solution www.flickr.com/photos/pursuethepassion/3822008906
  22. 22. Show them the best way forward
  23. 23. Get it wrong www.flickr.com/photos/roome/3390682853
  24. 24. Get it rightwww.flickr.com/photos/winemegup/3641912321
  25. 25. 1 2 3 3 ideas for today’s webinar
  26. 26. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  27. 27. Create a sense of urgency www.flickr.com/photos/amagill/3225245640
  28. 28. Create a sense of urgency 28
  29. 29. Cyber terrorism is multi-taking mayhem www.flickr.com/photos/15271532@N00/1172675049
  30. 30. Gone before you know it www.flickr.com/photos/jurvetson/478786571
  31. 31. Move in, move out www.flickr.com/photos/brewbooks/3934958171
  32. 32. Steal your businesswww.flickr.com/photos/stillmemory/880277551
  33. 33. The fatal blue screen www.flickr.com/photos/o2sources/2311353972
  34. 34. Disruptive change www.flickr.com/photos/mwichary/3690887427
  35. 35. Fear of attack www.flickr.com/photos/sziszo/2632802003
  36. 36. Cloud Security Strategy? www.flickr.com/photos/26046024@N06/2735134853
  37. 37. We are totally secure
  38. 38. Data Security Cloud Architects http://ad009cdnb.archdaily.net/wp-content/uploads/2012/06/20120110_JG_2901dusk-1000x752.jpg
  39. 39. Connected Customers
  40. 40. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  41. 41. All your security risks simply…
  42. 42. Continuous inspection www.flickr.com/photos/rooreynolds/3868326564
  43. 43. Secret Agentwww.flickr.com/photos/magiker/2377684727
  44. 44. Protecting all your valuable data www.flickr.com/photos/rooreynolds/3913175831
  45. 45. Protecting all your End Points www.flickr.com/photos/thelostwanderer/125511639
  46. 46. Pre-emptive cleaning Predictive analytics
  47. 47. Cleaned continuously beforeyou get access to your data
  48. 48. Now is the timeclean up your act
  49. 49. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  50. 50. What if you want comeback from the Cloud?
  51. 51. Return path
  52. 52. You can’t teach an old dog new tricks
  53. 53. Return pathwww.flickr.com/photos/29456235@N04/3665618772
  54. 54. Today’s Webinar in
  55. 55. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  56. 56. Effective End Point Protection www.flickr.com/photos/29233640@N07/3779987744
  57. 57. Data cleansing www.flickr.com/photos/richardwest/2792878444
  58. 58. Peace of MindDavid R EdniePresident & CEOSalesChannel EuropePh: +33 676 60 09 25 (FR)Email: david@saleschannel-europe.comWebsite: www.saleschannel-europe.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×