SlideShare a Scribd company logo
1 of 3
Download to read offline
PARTNER SALES SUMMARY
NETWORK INTERCEPTOR™
Detecting & Preventing Advanced Targeted Attacks, 24/7
Small to medium sized businesses are struggling to reduce complexity while maintaining
defenses against a growing threat landscape. Many smaller organizations are increasingly
the targets of cyber attacks, and operate in highly regulated industries, driving a compelling
need to protect assets, client information and intellectual property.
Network Interceptor is a service that combines technology and human‐driven analysis to
monitor corporate networks and detect known and unknown security threats, 24x7. It
delivers real‐time detection, analysis, mitigation and incident response by experts
at eSentire’s Security Operations Center, providing enterprise class protection to
small to medium size businesses.
It’s deployed as a continuous managed service that leverages the architecture of a network
appliance sensor to monitor client networks. Core capabilities include real‐time
deep‐packet inspection, full packet capture, human assisted machine learning,
behavior‐based anomaly detection, signature‐based intrusion detection and
prevention, and security analyst communications.
Pricing varies by number of employees, number of locations and the throughput of the customer’s
network.
Pricing is available for Gold, Silver, SOHO and Virtual options
Assistance with sizing opportunities is available through the eSentire Pricing Calculator, or through
your Channel Account Manager.
Complementary solution
to customer’s existing
security investments
Delivers real-time
protection and active
resolution of security
threats by proven experts
Allows customers to
maintain compliance with
rigorous regulations
Budget-friendly billing
reduces need for expensive
capital investments
Finance, Legal, BioPharma,
Healthcare
Small to mid-size who are tied to
regulations: SEC, HIPAA, SOX
Organizations with small IT staff or
small/nonexistent security team
Companies that need to protect
intellectual property
Companies who have been the
victim of a breach
Companies with global
presence/multi-national
SCOPING NEW OPPORTUNITIES
KEY BENEFITS
Reduces complexity and
eliminates high costs of
staffing a dedicated
security team
TARGET VERTICAL INDUSTRIES
TARGET CUSTOMERS
24/7 Security
Operations Center
Containment
Mitigation
Threat Signal
Data for Analysis
Firewall
Switch Switch
Router
Network Interceptor
eSentire
Internet
Regulatory bodies across all industries are requiring compliance to cyber security rules, becoming a key driver for small to
mid-size clients to adopt a more comprehensive security posture. Protecting assets, information and preventing fines, loss of
revenue and risk to reputation.
A proactive security approach gives clients, stakeholders and investors assurance that assets, personal information and
intellectual property are being diligently protected, and reduces risk to business continuity.
62% of breaches in 2014 were at the SME level. Medium tier businesses are being targeted because they typically can’t
match the security processes of larger companies. Most SME’s don’t have expert security resources on staff to monitor,
analyze and mitigate threats. Creating a dedicated security team in-house is cost prohibitive to smaller organizations.
81% of companies attacked in 2014 were not able to identify the breach themselves and on average it took them 188 days
to realize security had been compromised. Network Interceptor provides real-time threat protection, analysis and mitigation
- we'll know about an attack immediately and mitigate it.
Network Interceptor analyzes and detects both known and unknown “zero-day” cyber threats in real time by using
technology coupled with our security expertise, finding threats before they cause damage.
Regulatory bodies are requiring the performance of annual security audits, levying fines and sanctions against those who
can’t demonstrate implementation of adequate security measures. Network Interceptor helps organizations harden
defenses and document compliance.
Are you familiar with ‘zero-day’ or unknown
cyber threats such as phishing, social
engineering, and targeted attacks?
Are there any ongoing security audits or
new audits on the horizon?
Are there regulatory concerns currently -
SEC, FCA, FINRA, HIPAA?
Are your investors/clients/stakeholders
inquiring as to your security posture?
Do you have a dedicated security team?
Do you know if your organization has been
breached/compromised? Would you know?
QUALIFYINGQUESTIONS
“We’ve got security covered”
Customer has purchased security
technologies such as IDS, Next
Generation Firewall, SIEM, etc.
Are you monitoring your logs 24x7?
How often are you tuning your devices?
How do you know if malware has gotten
through your defenses?
Do you have the skilled resources in place to
monitor your environment?
We are a complementary service that works with what you have in place already to
ensure its value and reliability. Our security analysts watch your network traffic
24x7x365, enabling us to recognize breaches before you do. We provide the
benefits of an in-house SOC for a fraction of the cost. Standing up a SOC with
around the clock coverage can cost up to $2M, according to IDC estimates.
“We’re too small to be a target”
Customer thinks their small
footprint makes them a less 
attractive target to cyber criminal.
What is the value of the assets or intellectual 
property you have under management?
Do you work with other SME’s and
counterparts on a daily basis?
Around 43% of mid-sized businesses have suffered loss from cyber attack, but only
around 20% have measures in place to help. Many of these breaches stem through
their partner network, specifically because they are small, and might not have the
capability to detect, block, and respond to incoming threat.
“We outsource our IT”
Customer has IT outsourcing
provider and think they are
covered.
What visibility is there at the board, or
executive level around the issue of security?
Has your outsource IT provider created an
incident response plan for you?
Security is not simply an IT issue, but a business continuity concern with
board‐level visibility. It needs to be handled differently.
“We’re moving to the Cloud”
Customer is using a cloud provider
and thinks security is taken care of.
Does your cloud security strategy encompass
end users on the network?
Are you familiar with phishing attacks?
Moving to the cloud doesn’t eliminate security risks. Successful phishing attacks
target internal users – taking control of an endpoint to gain access to what’s in the
cloud. Comprehensive monitoring, analysis and mitigation by security experts
significantly reduces the risk of a breach, and complements existing cloud
strategies.
OVERCOMINGOBJECTIONS
SCENARIO QUESTIONS TO ASK POSITIONING WITH THE CUSTOMER
Dell SecureWorks is a primary competitor for Network Interceptor. Secondary competitors include MSSP’s, SIEM providers and security hardware vendors that
have varying capabilities, architectures, service levels, cost profiles and weaknesses. Contact your Channel Account Manager for more information.
All data stays on customer network, preserving security. No data is sent to cloud-based services.
SecureWorks iSensor can provide active prevention capabilities only when placed in an inline mode, introducing
latency and a single point of failure. eSentire allows “passive” monitoring – not inline – to ensure that zero network
latency is introduced.
eSentire performs continuous packet capture, which aids in forensic investigations of attacks, providing much
richer data sets to investigators. Dell only records packet capture if a threat has already been identified.
Our 1:8 customer to Security Analyst ratio ensures a high‐touch, personalized experience while allowing
immediate access to our SOC Analysts.
Inline Architecture
Full and Continuous
Packet Capture
Personalized, High
Touch Service
Data Residency
Feature Comparison
Zero day threat
protection with human
analysis & intervention
Signature + Intelligence
based threat protection
Embedded Incident
Response
eSentire eSentire Network Interceptor Advantage
Threat detection and analysis is highly automated and less effective with Dell's solution. eSentire's
anomaly-based analysis and human intervention approach offers superior protection.
Network Interceptor incorporates behavior-based detection in addition to signature and threat intelligence, a
distinct advantage over Dell when dealing with advanced threats. eSentire continuously updates our sensors in
the field as opposed to only 2x weekly updates from Dell.
eSentire embeds incident response within its service. Dell requires a separate retainer to provide it.
Dell
SELLING AGAINST THE COMPETITION
HOW TO WIN AGAINST DELL
Copyright © 2015 eSentire, Inc. All rights reserved. www.esentire.com | @esentire | partners@esentire.com
Human vs. Automation
Increased reliance on “automated security” has
been identified as a key reason for security
failure. We also provide the human element.
Compare SLAs
Dell promises to keep their infrastructure up, not
respond to events.
Reliance
Needs other security infrastructure to be effective.
Detection
Heavy reliance on signature-based detection and
threat intelligence alone is not effective in dealing
with targeted attacks (zero-day).
Review Quotes Carefully
Compare SLAs and embedded services so
customers understand what's included.
Service Levels
Reinforce our high touch service model.
COMPETITIVEEDGE

More Related Content

More from Any Lab Test Waco

More from Any Lab Test Waco (7)

Diabetes facts and tips for a healthy lifestyle
Diabetes facts and tips for a healthy lifestyle Diabetes facts and tips for a healthy lifestyle
Diabetes facts and tips for a healthy lifestyle
 
DNA Testing
DNA TestingDNA Testing
DNA Testing
 
Any lab test now brand presentation
Any lab test now brand presentationAny lab test now brand presentation
Any lab test now brand presentation
 
Health Checkup & Tests That Could Save Your Life
Health Checkup & Tests  That Could Save Your LifeHealth Checkup & Tests  That Could Save Your Life
Health Checkup & Tests That Could Save Your Life
 
8 things your doctor wants you to do
8 things your doctor wants you to do8 things your doctor wants you to do
8 things your doctor wants you to do
 
Thyroid hormone-testing-waco
Thyroid hormone-testing-wacoThyroid hormone-testing-waco
Thyroid hormone-testing-waco
 
Thyroid diseases-symptoms
Thyroid diseases-symptomsThyroid diseases-symptoms
Thyroid diseases-symptoms
 

Recently uploaded

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 

Recently uploaded (20)

Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 

Network Interceptor Battle Card Final

  • 1. PARTNER SALES SUMMARY NETWORK INTERCEPTOR™ Detecting & Preventing Advanced Targeted Attacks, 24/7 Small to medium sized businesses are struggling to reduce complexity while maintaining defenses against a growing threat landscape. Many smaller organizations are increasingly the targets of cyber attacks, and operate in highly regulated industries, driving a compelling need to protect assets, client information and intellectual property. Network Interceptor is a service that combines technology and human‐driven analysis to monitor corporate networks and detect known and unknown security threats, 24x7. It delivers real‐time detection, analysis, mitigation and incident response by experts at eSentire’s Security Operations Center, providing enterprise class protection to small to medium size businesses. It’s deployed as a continuous managed service that leverages the architecture of a network appliance sensor to monitor client networks. Core capabilities include real‐time deep‐packet inspection, full packet capture, human assisted machine learning, behavior‐based anomaly detection, signature‐based intrusion detection and prevention, and security analyst communications. Pricing varies by number of employees, number of locations and the throughput of the customer’s network. Pricing is available for Gold, Silver, SOHO and Virtual options Assistance with sizing opportunities is available through the eSentire Pricing Calculator, or through your Channel Account Manager. Complementary solution to customer’s existing security investments Delivers real-time protection and active resolution of security threats by proven experts Allows customers to maintain compliance with rigorous regulations Budget-friendly billing reduces need for expensive capital investments Finance, Legal, BioPharma, Healthcare Small to mid-size who are tied to regulations: SEC, HIPAA, SOX Organizations with small IT staff or small/nonexistent security team Companies that need to protect intellectual property Companies who have been the victim of a breach Companies with global presence/multi-national SCOPING NEW OPPORTUNITIES KEY BENEFITS Reduces complexity and eliminates high costs of staffing a dedicated security team TARGET VERTICAL INDUSTRIES TARGET CUSTOMERS 24/7 Security Operations Center Containment Mitigation Threat Signal Data for Analysis Firewall Switch Switch Router Network Interceptor eSentire Internet
  • 2. Regulatory bodies across all industries are requiring compliance to cyber security rules, becoming a key driver for small to mid-size clients to adopt a more comprehensive security posture. Protecting assets, information and preventing fines, loss of revenue and risk to reputation. A proactive security approach gives clients, stakeholders and investors assurance that assets, personal information and intellectual property are being diligently protected, and reduces risk to business continuity. 62% of breaches in 2014 were at the SME level. Medium tier businesses are being targeted because they typically can’t match the security processes of larger companies. Most SME’s don’t have expert security resources on staff to monitor, analyze and mitigate threats. Creating a dedicated security team in-house is cost prohibitive to smaller organizations. 81% of companies attacked in 2014 were not able to identify the breach themselves and on average it took them 188 days to realize security had been compromised. Network Interceptor provides real-time threat protection, analysis and mitigation - we'll know about an attack immediately and mitigate it. Network Interceptor analyzes and detects both known and unknown “zero-day” cyber threats in real time by using technology coupled with our security expertise, finding threats before they cause damage. Regulatory bodies are requiring the performance of annual security audits, levying fines and sanctions against those who can’t demonstrate implementation of adequate security measures. Network Interceptor helps organizations harden defenses and document compliance. Are you familiar with ‘zero-day’ or unknown cyber threats such as phishing, social engineering, and targeted attacks? Are there any ongoing security audits or new audits on the horizon? Are there regulatory concerns currently - SEC, FCA, FINRA, HIPAA? Are your investors/clients/stakeholders inquiring as to your security posture? Do you have a dedicated security team? Do you know if your organization has been breached/compromised? Would you know? QUALIFYINGQUESTIONS “We’ve got security covered” Customer has purchased security technologies such as IDS, Next Generation Firewall, SIEM, etc. Are you monitoring your logs 24x7? How often are you tuning your devices? How do you know if malware has gotten through your defenses? Do you have the skilled resources in place to monitor your environment? We are a complementary service that works with what you have in place already to ensure its value and reliability. Our security analysts watch your network traffic 24x7x365, enabling us to recognize breaches before you do. We provide the benefits of an in-house SOC for a fraction of the cost. Standing up a SOC with around the clock coverage can cost up to $2M, according to IDC estimates. “We’re too small to be a target” Customer thinks their small footprint makes them a less  attractive target to cyber criminal. What is the value of the assets or intellectual  property you have under management? Do you work with other SME’s and counterparts on a daily basis? Around 43% of mid-sized businesses have suffered loss from cyber attack, but only around 20% have measures in place to help. Many of these breaches stem through their partner network, specifically because they are small, and might not have the capability to detect, block, and respond to incoming threat. “We outsource our IT” Customer has IT outsourcing provider and think they are covered. What visibility is there at the board, or executive level around the issue of security? Has your outsource IT provider created an incident response plan for you? Security is not simply an IT issue, but a business continuity concern with board‐level visibility. It needs to be handled differently. “We’re moving to the Cloud” Customer is using a cloud provider and thinks security is taken care of. Does your cloud security strategy encompass end users on the network? Are you familiar with phishing attacks? Moving to the cloud doesn’t eliminate security risks. Successful phishing attacks target internal users – taking control of an endpoint to gain access to what’s in the cloud. Comprehensive monitoring, analysis and mitigation by security experts significantly reduces the risk of a breach, and complements existing cloud strategies. OVERCOMINGOBJECTIONS SCENARIO QUESTIONS TO ASK POSITIONING WITH THE CUSTOMER
  • 3. Dell SecureWorks is a primary competitor for Network Interceptor. Secondary competitors include MSSP’s, SIEM providers and security hardware vendors that have varying capabilities, architectures, service levels, cost profiles and weaknesses. Contact your Channel Account Manager for more information. All data stays on customer network, preserving security. No data is sent to cloud-based services. SecureWorks iSensor can provide active prevention capabilities only when placed in an inline mode, introducing latency and a single point of failure. eSentire allows “passive” monitoring – not inline – to ensure that zero network latency is introduced. eSentire performs continuous packet capture, which aids in forensic investigations of attacks, providing much richer data sets to investigators. Dell only records packet capture if a threat has already been identified. Our 1:8 customer to Security Analyst ratio ensures a high‐touch, personalized experience while allowing immediate access to our SOC Analysts. Inline Architecture Full and Continuous Packet Capture Personalized, High Touch Service Data Residency Feature Comparison Zero day threat protection with human analysis & intervention Signature + Intelligence based threat protection Embedded Incident Response eSentire eSentire Network Interceptor Advantage Threat detection and analysis is highly automated and less effective with Dell's solution. eSentire's anomaly-based analysis and human intervention approach offers superior protection. Network Interceptor incorporates behavior-based detection in addition to signature and threat intelligence, a distinct advantage over Dell when dealing with advanced threats. eSentire continuously updates our sensors in the field as opposed to only 2x weekly updates from Dell. eSentire embeds incident response within its service. Dell requires a separate retainer to provide it. Dell SELLING AGAINST THE COMPETITION HOW TO WIN AGAINST DELL Copyright © 2015 eSentire, Inc. All rights reserved. www.esentire.com | @esentire | partners@esentire.com Human vs. Automation Increased reliance on “automated security” has been identified as a key reason for security failure. We also provide the human element. Compare SLAs Dell promises to keep their infrastructure up, not respond to events. Reliance Needs other security infrastructure to be effective. Detection Heavy reliance on signature-based detection and threat intelligence alone is not effective in dealing with targeted attacks (zero-day). Review Quotes Carefully Compare SLAs and embedded services so customers understand what's included. Service Levels Reinforce our high touch service model. COMPETITIVEEDGE