SlideShare a Scribd company logo
1 of 14
Internet Security ServicesDM meeting 10/21/09Herb Moyer – ISS Sales Exec
What is the initiative? What is the Strategy? What are the right questions to ask the Customer? How does ISS benefit me as a Sales Executive? How does ISS benefit the Customer? What is the Sales Presentation you can present to the customer? Overview
ISS Initiative Overview Jeskell goal:  establish a security/networking business that resells technology and provides value add service to those clients IBM goal:  jump start business partners that can find and close customers and support those customers to use their offerings Agreement: 2 years Jeskell generates 7M in sales IBM pays Jeskell 600K Jeskell “dedicates” two sales, one project mgr, 1 exec sponsor IBM supports Jeskell with various resources:
Reps Contact Herb Moyer or David Scribner Moyer/Scribner engage Flynn/ISS to develop ops 50/50 gp split Existing Customer Base:  Moyer/Scribner reach out Survey customers to know what they do for security today FusionStorm? Relationships Moyer/Scribner led efforts with carriers and finance vertical FS Security consulting practice? ISS support Team Set up to funnel leads to us Strategy
Forecast ADDS Pharmaceuticals			$       1,900 DHL					$    537,000 NTTA					$1,000,000 Williams Lea				$    100,000 Exel					$       50,000 Telefonica				$     150,000 Northrup Grumman			$        58,000 DHS					$      500,000
What are the right questions to ask?   Do you know where your Data resides? Do you know who has access to your data? Do you want to prevent attackers from being able to redirect calls or perform eavesdropping, toll fraud/service theft, or Phishing? Do you want to stop all types of Internet threats before they penetrate your network and disrupt your business? Are you looking for comprehensive security protection at the gateway and network level that doesn’t jeopardize network bandwidth or availability? Do you need a pre-emptive security solution that ensures protection before threats pose a risk?
What are the right questions to ask?   (cont.)  Would your organization benefit from an integrated security solution that lowers it complexity and reduces cost? How would you like a 100% guaranteed protection or your money back? Do you want your server secured or not?
How can ISS benefit the Customer? You are protected from both known and unknown threats before impact Security assets are mapped and centrally managed New users are detected and documented Network bandwidth efficiency is optimized Security conditions and events are documented and reported Help desk traffic is reduced New applications are tested and evaluated more effectively before deployment Network availability and reliability are improved
New customer?  Initial sales expectations Lead with Assessments 	Security Health check	 ($60k) 	Security Risk Assessment 	Identity and Access Management Services 	Application Security Services	($60k) 	PCI  Assessments
Providing a recurring revenue stream Increasing the average deal size Protecting your Customer Base Creating Sales opportunities Ensuring customer loyalty and repeat business Improving customer satisfaction Allowing you to capitalize on the fastest growing segment in security How does ISS benefit me and put money in my pocket?
Discounts $$$$$$ Hardware 			28% off  Software  			35% off  Professional Services 	17% off  Managed Services 		25% off  Maintenance 			20% off
ISS Sales presentation (attach the Iss presentation)
Questions ?????
Contact information Herb Moyer ISS Sales Exec Direct:   (571) 332-1531 hmoyer@jeskell.com Lead, Follow, Or Get Out Of My Way!

More Related Content

What's hot

PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017PrecisionLender
 
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysisBA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysisBA and Beyond
 
LucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group PresentationLucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group PresentationDarren Cunningham
 
SSR Overview 2008
SSR Overview 2008SSR Overview 2008
SSR Overview 2008granicki
 
Data Sheet - IAM Kickstart
Data Sheet - IAM KickstartData Sheet - IAM Kickstart
Data Sheet - IAM KickstartRob Hart
 
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...Scout RFP
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
Collaborating in Context - NexJ Systems
Collaborating in Context - NexJ SystemsCollaborating in Context - NexJ Systems
Collaborating in Context - NexJ SystemsSymphony.com
 
10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS ProviderJuly Systems
 

What's hot (11)

PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017
 
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysisBA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
 
LucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group PresentationLucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group Presentation
 
SSR Overview 2008
SSR Overview 2008SSR Overview 2008
SSR Overview 2008
 
Data Sheet - IAM Kickstart
Data Sheet - IAM KickstartData Sheet - IAM Kickstart
Data Sheet - IAM Kickstart
 
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Collaborating in Context - NexJ Systems
Collaborating in Context - NexJ SystemsCollaborating in Context - NexJ Systems
Collaborating in Context - NexJ Systems
 
10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider
 
Demand Generation : Customized sales outreach program - UK
Demand Generation : Customized sales outreach program - UKDemand Generation : Customized sales outreach program - UK
Demand Generation : Customized sales outreach program - UK
 
Market Awareness Overview
Market Awareness OverviewMarket Awareness Overview
Market Awareness Overview
 

Viewers also liked

Have Better Toys
Have Better ToysHave Better Toys
Have Better Toysapotonick
 
Time to Stop Wasting Time
Time to Stop Wasting TimeTime to Stop Wasting Time
Time to Stop Wasting Timeangiebakke
 
Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2Giusi Piras
 
Trevlar Portfolio0809
Trevlar Portfolio0809Trevlar Portfolio0809
Trevlar Portfolio0809trevlar
 
Survive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google FormsSurvive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google Formsangiebakke
 
Getting started
Getting startedGetting started
Getting startedREDA BITAR
 
Dra2 online course slide show
Dra2 online course slide showDra2 online course slide show
Dra2 online course slide showangiebakke
 
CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!apotonick
 

Viewers also liked (10)

Have Better Toys
Have Better ToysHave Better Toys
Have Better Toys
 
Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
Time to Stop Wasting Time
Time to Stop Wasting TimeTime to Stop Wasting Time
Time to Stop Wasting Time
 
Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2
 
Trevlar Portfolio0809
Trevlar Portfolio0809Trevlar Portfolio0809
Trevlar Portfolio0809
 
Survive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google FormsSurvive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google Forms
 
Getting started
Getting startedGetting started
Getting started
 
Dra2 online course slide show
Dra2 online course slide showDra2 online course slide show
Dra2 online course slide show
 
CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!
 
Tecido osseo e nervoso
Tecido osseo e nervosoTecido osseo e nervoso
Tecido osseo e nervoso
 

Similar to Dm Iss

6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to MarketContinuum
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in securityPeter Bassill
 
Computer Solutions Inc. Valuators
Computer Solutions Inc.  ValuatorsComputer Solutions Inc.  Valuators
Computer Solutions Inc. Valuatorsjlorf
 
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...Vuzion
 
Managed services smb nation june 2011
Managed services   smb nation june 2011Managed services   smb nation june 2011
Managed services smb nation june 2011Alistair Forbes
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborProtected Harbor
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1nbcoenen
 
CMAX Solutions Company Profile
CMAX Solutions Company ProfileCMAX Solutions Company Profile
CMAX Solutions Company ProfilePrakash Singh
 
Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1Chad Caldwell
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Eminence Technology Presentation
Eminence Technology PresentationEminence Technology Presentation
Eminence Technology PresentationAmit Pareek
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Lviv Startup Club
 
Proventiv Sales Presentation
Proventiv Sales PresentationProventiv Sales Presentation
Proventiv Sales PresentationMSI Services
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSecurestorm
 
TM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertipsTM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertipsGustavo Gattass Ayub
 

Similar to Dm Iss (20)

6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Computer Solutions Inc. Valuators
Computer Solutions Inc.  ValuatorsComputer Solutions Inc.  Valuators
Computer Solutions Inc. Valuators
 
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
 
Managed services smb nation june 2011
Managed services   smb nation june 2011Managed services   smb nation june 2011
Managed services smb nation june 2011
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1
 
CMAX Solutions Company Profile
CMAX Solutions Company ProfileCMAX Solutions Company Profile
CMAX Solutions Company Profile
 
Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Eminence Technology Presentation
Eminence Technology PresentationEminence Technology Presentation
Eminence Technology Presentation
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
 
Proventiv Sales Presentation
Proventiv Sales PresentationProventiv Sales Presentation
Proventiv Sales Presentation
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
TM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertipsTM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertips
 

Recently uploaded

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Dm Iss

  • 1. Internet Security ServicesDM meeting 10/21/09Herb Moyer – ISS Sales Exec
  • 2. What is the initiative? What is the Strategy? What are the right questions to ask the Customer? How does ISS benefit me as a Sales Executive? How does ISS benefit the Customer? What is the Sales Presentation you can present to the customer? Overview
  • 3. ISS Initiative Overview Jeskell goal: establish a security/networking business that resells technology and provides value add service to those clients IBM goal: jump start business partners that can find and close customers and support those customers to use their offerings Agreement: 2 years Jeskell generates 7M in sales IBM pays Jeskell 600K Jeskell “dedicates” two sales, one project mgr, 1 exec sponsor IBM supports Jeskell with various resources:
  • 4. Reps Contact Herb Moyer or David Scribner Moyer/Scribner engage Flynn/ISS to develop ops 50/50 gp split Existing Customer Base: Moyer/Scribner reach out Survey customers to know what they do for security today FusionStorm? Relationships Moyer/Scribner led efforts with carriers and finance vertical FS Security consulting practice? ISS support Team Set up to funnel leads to us Strategy
  • 5. Forecast ADDS Pharmaceuticals $ 1,900 DHL $ 537,000 NTTA $1,000,000 Williams Lea $ 100,000 Exel $ 50,000 Telefonica $ 150,000 Northrup Grumman $ 58,000 DHS $ 500,000
  • 6. What are the right questions to ask? Do you know where your Data resides? Do you know who has access to your data? Do you want to prevent attackers from being able to redirect calls or perform eavesdropping, toll fraud/service theft, or Phishing? Do you want to stop all types of Internet threats before they penetrate your network and disrupt your business? Are you looking for comprehensive security protection at the gateway and network level that doesn’t jeopardize network bandwidth or availability? Do you need a pre-emptive security solution that ensures protection before threats pose a risk?
  • 7. What are the right questions to ask? (cont.) Would your organization benefit from an integrated security solution that lowers it complexity and reduces cost? How would you like a 100% guaranteed protection or your money back? Do you want your server secured or not?
  • 8. How can ISS benefit the Customer? You are protected from both known and unknown threats before impact Security assets are mapped and centrally managed New users are detected and documented Network bandwidth efficiency is optimized Security conditions and events are documented and reported Help desk traffic is reduced New applications are tested and evaluated more effectively before deployment Network availability and reliability are improved
  • 9. New customer? Initial sales expectations Lead with Assessments Security Health check ($60k) Security Risk Assessment Identity and Access Management Services Application Security Services ($60k) PCI Assessments
  • 10. Providing a recurring revenue stream Increasing the average deal size Protecting your Customer Base Creating Sales opportunities Ensuring customer loyalty and repeat business Improving customer satisfaction Allowing you to capitalize on the fastest growing segment in security How does ISS benefit me and put money in my pocket?
  • 11. Discounts $$$$$$ Hardware 28% off Software 35% off Professional Services 17% off Managed Services 25% off Maintenance 20% off
  • 12. ISS Sales presentation (attach the Iss presentation)
  • 14. Contact information Herb Moyer ISS Sales Exec Direct: (571) 332-1531 hmoyer@jeskell.com Lead, Follow, Or Get Out Of My Way!