Your SlideShare is downloading. ×
Symantec Endpoint Protection - Product Positioning
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Symantec Endpoint Protection - Product Positioning

574
views

Published on

People make a decision to buy when the pain of the problem is greater than the pain of change. Learn how to develop the pain by taking customers to the negative future - the nightmare of losing all …

People make a decision to buy when the pain of the problem is greater than the pain of change. Learn how to develop the pain by taking customers to the negative future - the nightmare of losing all their valuable business data because they were unprotected, then show them the positive future they will enjoy when they have installed End Point Protection Small Business Edition 2013 from Symantec.

Published in: Business, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
574
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Part 2. Product Positioning
  • 2. Connected Customers www.flickr.com/photos/cajie/364732208
  • 3. More and more of ourtime surfing the web www.flickr.com/photos/ccdoh1/3459618962
  • 4. Drowning in of data
  • 5. theProblem
  • 6. Data security www.flickr.com/photos/kenyee/2817511001
  • 7. Always connected www.flickr.com/photos/defragged/522405926
  • 8. Two sources of risk:People we knowPeople wedon’t know
  • 9. Evil forces at work www.flickr.com/photos/laughingsquid/4277630860
  • 10. What do they look like? www.flickr.com/photos/strobe-/7592200456
  • 11. People we knowwww.flickr.com/photos/makelessnoise/759311624
  • 12. End point protection www.flickr.com/photos/dimenticato/2600683772
  • 13. Massive data leaks www.flickr.com/photos/rustytanton/260708043
  • 14. Modern day pirateswww.flickr.com/photos/tavallai/4766144788
  • 15. False sense of security www.flickr.com/photos/thesussman/5235066810
  • 16. End point protection
  • 17. Ineffective End Point Protection http://www.flickr.com/photos/edgeplot/2520607830/
  • 18. An accident waiting to happenwww.flickr.com/photos/xlibber/3870106899
  • 19. theOpportunity
  • 20. Help them to choose www.flickr.com/photos/oregondot/6235945692
  • 21. Guide them to the right solution www.flickr.com/photos/pursuethepassion/3822008906
  • 22. Show them the best way forward
  • 23. Get it wrong www.flickr.com/photos/roome/3390682853
  • 24. Get it rightwww.flickr.com/photos/winemegup/3641912321
  • 25. 1 2 3 3 ideas for today’s webinar
  • 26. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  • 27. Create a sense of urgency www.flickr.com/photos/amagill/3225245640
  • 28. Create a sense of urgency 28
  • 29. Cyber terrorism is multi-taking mayhem www.flickr.com/photos/15271532@N00/1172675049
  • 30. Gone before you know it www.flickr.com/photos/jurvetson/478786571
  • 31. Move in, move out www.flickr.com/photos/brewbooks/3934958171
  • 32. Steal your businesswww.flickr.com/photos/stillmemory/880277551
  • 33. The fatal blue screen www.flickr.com/photos/o2sources/2311353972
  • 34. Disruptive change www.flickr.com/photos/mwichary/3690887427
  • 35. Fear of attack www.flickr.com/photos/sziszo/2632802003
  • 36. Cloud Security Strategy? www.flickr.com/photos/26046024@N06/2735134853
  • 37. We are totally secure
  • 38. Data Security Cloud Architects http://ad009cdnb.archdaily.net/wp-content/uploads/2012/06/20120110_JG_2901dusk-1000x752.jpg
  • 39. Connected Customers
  • 40. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  • 41. All your security risks simply…
  • 42. Continuous inspection www.flickr.com/photos/rooreynolds/3868326564
  • 43. Secret Agentwww.flickr.com/photos/magiker/2377684727
  • 44. Protecting all your valuable data www.flickr.com/photos/rooreynolds/3913175831
  • 45. Protecting all your End Points www.flickr.com/photos/thelostwanderer/125511639
  • 46. Pre-emptive cleaning Predictive analytics
  • 47. Cleaned continuously beforeyou get access to your data
  • 48. Now is the timeclean up your act
  • 49. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  • 50. What if you want comeback from the Cloud?
  • 51. Return path
  • 52. You can’t teach an old dog new tricks
  • 53. Return pathwww.flickr.com/photos/29456235@N04/3665618772
  • 54. Today’s Webinar in
  • 55. 1 Make the problem real and threatening Show them how SEP SBE 2013 simply takes2 the PAIN away3 Sell the “Return Path”
  • 56. Effective End Point Protection www.flickr.com/photos/29233640@N07/3779987744
  • 57. Data cleansing www.flickr.com/photos/richardwest/2792878444
  • 58. Peace of MindDavid R EdniePresident & CEOSalesChannel EuropePh: +33 676 60 09 25 (FR)Email: david@saleschannel-europe.comWebsite: www.saleschannel-europe.com