SlideShare a Scribd company logo
1 of 33
B I T D E F E N D E R P A R T N E R A D V A N T A G E P R O G R A M
Market Opportunities. Case Studies. Partner Engagement
| 1
J U L Y , 2 0 2 3
M I C H A L D O M I N I K – B I T D E F E N D E R I N D O C H I N A M A N A G I N G D I R E C T O R
GRAVITYZONE™
THE SECURITYPLATFORMFOR
END-TO-ENDBREACH AVOIDANCE
AUGUST 21,
2023
2
WHY BITDEFENDER
38
%
LEADING TECHNOLOGY
PROVIDER.
38% of all secuíity vendoís
integíate Bitdefendeí
technologies
BEST
PREVENTIO
N
UNMATCHED ATTACK
PREVENTION.
Consistently 1 íanked
píotection
peífoímance
INTEGRATE
D
PLATFORM
THE FIRST INTEGRATED SECURITY
PLATFORM FOR ENDPOINT,
NETWORK, CLOUD & HUMAN
Risk Analytic, EDR, XDR managed
from a single console
ROMANI
A
SINCE
2001
AUGUST 21,
2023
GRAVITYZONE™
THE SECURITYPLATFORMFOR
END-TO-ENDBREACH AVOIDANCE
3
• ľotal Secuíity
• Inteínet Secuíity
• Antiviíus Plus
• Antiviíus foí Mac
• Mobile Secuíity foí
Andíoid
• Mobile Secuíity foí iOS
• Family Pack
• Small Office Secuíity
PRIVAC
Y
• Píemium VPN
• Passwoíd Manageí
IDENľIľY
PROľECľION
• Digital Identity Píotection
• Identity ľheft Píotection
• GíavityZone Business Secuíity Enteípíise
• GíavityZone Business Secuíity Píemium
• GíavityZone Business Secuíity
• GíavityZone Secuíity foí MSPs
SECURIľY
PRODUCľS
• Endpoint Detection and Response
(EDR)
• GíavityZone XDR
• Cloud and Seíveí Secuíity
• Secuíity foí Containeís
• GíavityZone Secuíity foí Email
• GíavityZone Secuíity foí Woíkstations
• GíavityZone Secuíity foí Mobile
• GíavityZone Patch Management
• GíavityZone Stoíage Secuíity
SECURIľY AS A
SERVICE
• Managed Detection and Response
• Managed Detection and Response Seívices foí MSPs
HOME USE
SECURIľY
DEVICE SECURIľY
BUSINESS
SECURIľY
SECURIľY PACKAGES
AUGUST 21,
2023
GRAVITYZONE™
THE SECURITYPLATFORMFOR
END-TO-ENDBREACH AVOIDANCE
4
OUR MISSION
We aíe commiľľed ľo help secuíe youí
oíganizaľion fíom bíeaches and business
disíupľions.
Cybeí aľľacks can impacľ an oíganizaľion in many
ways
— fíom minoí disíupľions in opeíaľions ľo majoí financial
losses.
Malwaíe
(a píogíam designed ľo disíupľ oí gain unauľhoíized access inľo a sysľem)
is ľhe mosľ common ľype of cybeíaľľack
and one of ľhe biggesľ ľhíeaľs in ľhe IT
indusľíy.
The mosľ fíequenľly aľľacks aíe fíom
íansomwaíe, woíms, viíuses, ľíojans, and
Ïíom 2022 global malwaíe aľľacks
incíeased again because of geopoliľical
uníesľ.
5.5 billion malwaíe aľľacks weíe deľecľed aíound ľhe woíld in
2022.
The majoíiľy aľľacks aíe occuííing in ľhe Asia-Pacific íegion.
Cambodia is one of ľhe mosľ
exposed counľíy ľo
cybeícíimes.
Accoíding Global Cybeí-Safeľy Index of SEON
ľhaľ combines daľa fíom diffeíenľ cybeísecuíiľy indices.
Cybeísecuíiľy and infoímaľion secuíiľy aíe aľ ľhe
ľop of ľhe CIO's invesľmenľ píioíiľies since 2020.
66% of inľeíviewed CIOs in 2023 plan
ľo incíease ľheií invesľmenľ in cybeísecuíiľy.
5%
incíease woíldwide spending in IT
11%
incíease spending on infoímaľion secuíiľy and íisk
managemenľ
15%
yeaí-oveí-yeaí gíow global spending on cybeísecuíiľy
22%
gíow ľhe global secuíiľy sofľwaíe maíkeľ
J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
9
Customers’ Challenges
• Data and system protection.
• Employees productivity.
• The company reputation.
• Business espionage.
• Cybersecurity regulation compliance.
CASE STUDY
|
10
150+
OEM Partners
Confidential
SiteR
eference-Government
Confidential – for internal use only
SiteR
eference– Healthcare,Hospital
Confidential – for internal use only
SiteReference– Telecom,TechnologyandInsurance
Confidential – for internal use only
SiteR
eference– Corporate
Confidential – for internal use only
SiteR
eference– Retails
Confidential – for internal use only
J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
1 7
Case Study
THE CHALLENGE
• The high volume of trouble calls
• No access to metrics about security system performance or
malware attacks
THE SOLUTION
Since the former services provider had licensed a Symantec anti-
virus solution, the city’s security staff evaluated Symantec along
with Sophos, Kaspersky, and Bitdefender
WHY BITDEFENDER
• The best response time to zero-day exploits and new malware
• Minimizing impact on performance
• Competitive cost
The city deployed the
GravityZone Enterprise
Security on-premise on
4,000 endpoints in 40
locations
The city government
- one of the most populous
city in the United States
J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
1 8
Case Study
• Desktops and laptops become very slow, lowering productivity
of employees
• Ransomware attacks were bypassing the previous security
product and encrypting file shares.
Bitdefender kills off ransomware, and improves infrastructure
performance and user experience while simplifying security management
THE CHALLENGE
THE SOLUTION
IT evaluated Trend Micro, Cylance, Microsoft, Sophos, and
Bitdefender solutions.
WHY BITDEFENDER
• Rich features from protection against zero-day threats to patch
management to application-policy management
• Single console to easily manage our entire physical, virtual,
cloud, and mobile infrastructure
GravityZone Enterprise Security to
protect over 3,500 machines,
including physical and virtual
workstations and servers,
and 1100 Android devices.
IT Environment
- Nutanix
- VMware
- Citrix
- Microsoft
Barnsley Council is a local
government authority in
South Yorkshire, U.K.
J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
Policy &
Procedures
Implementation
& Configuration
Training &
Awareness
Education
Execution &
Evaluation
Upgrade
Following New
Challenges
| 1 9
Real Cybersecurity
TECHNOLOGY
IS JUST A TOOL
95% of all successful cyber attacks
is caused by human error
21 août2023| Confidentiel
A partnership born from a passion for high
performance and technological innovation.
In cybersecurity and Formula 1, every millisecond counts.
Technology makes all the difference in who has the
advantage.
Bitdefender researchers, security analysts, and engineers
are on the cutting edge of cybersecurity, developing threat
and behavioral analytics from its network of millions of
monitored and protected endpoints to prevent, detect and
respond to threats faster.
«Bitdefender shares with Scuderia Ferrari a heritage of
excellence and a demonstratedtrackrecordof building state
of the art,innovativetechnologiesto deliverwinning results. »
FlorinTalpes
Co-founderand CEO,Bitdefender
J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
| 2 1
Bitdefender Certification Roadmap
Steps:
1. Live training from certified staff of our local
distributor or regional representatives
2. Joining final online courses and exams
Benefits:
1. Additional discounts and extra margin
2. Extra revenue for services
3. Authorization rights to provide services
• Implementation
• After-sales support
• GravityZone console review
M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
Value Added Reseller Partnership Levels
| 2 2
DIAMOND
PLATINUM
Certificates:
• 2 sales
• 2 technical
Certificates:
• 1 sales
• 1 technical
M A Y , 2 0 2 0 | C O N F I D E N T I A L P R E S E N T A T I O N
How To Become A
Bitdefender Partner?
| 2 3
J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
Partner Advantage Programs
| 2 4
#1 ranked technology. Experts’ choice
Working together, simple, easy and straightforward
Lifetime recurrent & protected revenues
R E S E L L I N G
C H A N N E L
P R O G R A M
Free certification training
Free presalessupport
MDF Support
P A R T N E R
B E N E F I T S
Special prices approval on justified requests for registered and approved projects
P R O T E C T
A C C O U N T
Revenue sharing model for licenses and services
Channel account protection for registered projects and renewals
M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
Bitdefender Channel Distribution Model
| 2 5
D I S T R I B U T O R
B I T D E F E N D E R R E S E L L E R E N D U S E R
M S P P a r t n e r
H Y B R I D P a r t n e r
M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
J O I N Q U A L I F Y
R E W A R D E N G A G E
E N A B L E
R E T A I N
Partners’ Lifecycle
| 2 6
Sign-up via our
distribution channel
Share your company
profile and opportunity
prospects
Register your projects
Complete certification
training
Win projects with Bitdefender
Place orders
Win high margin and rebates
Apply for MDF
Renew your last customers
Win new customers
Stay up-to-date
M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
New Opportunity Registration
| 2 7
N E W C U S T O M E R
Identify, develop and win a new project for
Bitdefender which qualifies for the New Opportunity
Registrationprogram.
R E G I S T E R
O P P O R T U N I T Y
Follow the process for registering the new opportunity online:
• Via project registration web service
• Vie sending email to our distributor with project details
G E T D I S C O U N T A N D
P R E S A L E S S U P P O R T
Qualified projects are rewarded with the best
discountand free presales support.
https://partner.bitdefender.com.kh/
M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N
Sales Process
| 2 8
1. Register your project via our distribution channel or portal
• Deal registration discount
• Free presales support
• Account protection
2. Get presales support from certified experts
• Analyzing the customer requirement
• Documentation sharing and localization
• POC (test) deployment (1 POC for 1 client only)
3. Pricing quotation
• Special price approvals on justified requests
4. Purchase order
5. Implementation by certified staff
6. Customer satisfaction survey
7. Upgrade and renewal lifetime
• Retention channel marketing and protection
21 août2023| Confidentiel
Highly satisfied users
Bitdefender solutions have the highest satisfaction rate
3030
How to Save on
Cybeísecuíity?
31
The Cost of Saving on Cybersecurity
What is the most important to most
organizations?
• Reputation
• Financial stability
Common consequences of cybersecurity
incident:
1. Financial losses
2. Exposing critical data to competitors
3. Reputation damage
4. Legal liability
5. Data loss
6. Loss of productivity
7. Business continuity problems
The
company
reputation
Save 3 0 $
/user
32
How to Save on Cybersecurity?
What is the weakest point of cybersecurity?
• Human behavior
• Personal computers and mobiles (endpoints)
What is the most cost-effective security solution?
• Endpoint protection software
• High security solution using less computer resources
What is the most important for security software?
• Protection level
Which endpoint security solution has the highest security rank?
• Bitdefender*
*According European cybersecurity technology institutesAV-Test,AV-Comparatives, Bitdefender is the best in
protection regarding overall score between Jan 2011-Apr 2021 accordingAV-Test, so for last 10 years.
THANK YOU!
| 33
channel@bitdefender.com.kh

More Related Content

Similar to Bitdefender Partner Program 2023_08_TH.pptx

Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Webinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insightsWebinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insightsThe Digital Insurer
 
S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)Predix
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023The Digital Insurer
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyananthakrishnansblit
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiamallblitz0
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Mindtree Ltd.
 
US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020Neil Dave
 
QOTEQ Investment Deck
QOTEQ Investment DeckQOTEQ Investment Deck
QOTEQ Investment DeckUcluster
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteMobiloitte
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
Insurance digital transformation - key challenges
Insurance   digital transformation - key challengesInsurance   digital transformation - key challenges
Insurance digital transformation - key challengesArif Mohammed
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 

Similar to Bitdefender Partner Program 2023_08_TH.pptx (20)

Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Webinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insightsWebinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insights
 
S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochi
 
Redington Value Journal - June 2017
Redington Value Journal - June 2017Redington Value Journal - June 2017
Redington Value Journal - June 2017
 
Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...Robust anti-theft technology driving customer preference for a leading manufa...
Robust anti-theft technology driving customer preference for a leading manufa...
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
Learning from Industry Cloud Leaders
Learning from Industry Cloud LeadersLearning from Industry Cloud Leaders
Learning from Industry Cloud Leaders
 
US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020
 
QOTEQ Investment Deck
QOTEQ Investment DeckQOTEQ Investment Deck
QOTEQ Investment Deck
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Value Plus July Edition - 2015
Value Plus July Edition - 2015Value Plus July Edition - 2015
Value Plus July Edition - 2015
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - Mobiloitte
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
Insurance digital transformation - key challenges
Insurance   digital transformation - key challengesInsurance   digital transformation - key challenges
Insurance digital transformation - key challenges
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 

More from PawachMetharattanara

BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxBIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxPawachMetharattanara
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdfPawachMetharattanara
 
Smart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxSmart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxPawachMetharattanara
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdfPawachMetharattanara
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfPawachMetharattanara
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfPawachMetharattanara
 
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ  Quicktron Robotic .Thailand(1).pdfหนังสือเชิญ  Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdfPawachMetharattanara
 
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docxPawachMetharattanara
 
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPresentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPawachMetharattanara
 
อบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxอบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxPawachMetharattanara
 
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxpresentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxPawachMetharattanara
 
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdfPawachMetharattanara
 
แผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfแผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfPawachMetharattanara
 

More from PawachMetharattanara (20)

BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptxBIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
BIZ model 2024nnnmmmmmmmmmmmmmmmmmmm.pptx
 
DLS_CP_Payment Rev.00.pdf
DLS_CP_Payment Rev.00.pdfDLS_CP_Payment Rev.00.pdf
DLS_CP_Payment Rev.00.pdf
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
 
Smart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptxSmart Parking รพ.กล้วยน้ำไท.pptx
Smart Parking รพ.กล้วยน้ำไท.pptx
 
KPI 2021 Sale ( Nov ).pptx
KPI 2021 Sale ( Nov ).pptxKPI 2021 Sale ( Nov ).pptx
KPI 2021 Sale ( Nov ).pptx
 
1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf1. คู่มือคนสอน คนเรียน PMS.pdf
1. คู่มือคนสอน คนเรียน PMS.pdf
 
Presentation1333.pptx
Presentation1333.pptxPresentation1333.pptx
Presentation1333.pptx
 
Presentation1unv2.pptx
Presentation1unv2.pptxPresentation1unv2.pptx
Presentation1unv2.pptx
 
Presentation1ubv.pptx
Presentation1ubv.pptxPresentation1ubv.pptx
Presentation1ubv.pptx
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
 
Univiwe Training 2023.pdf
Univiwe Training 2023.pdfUniviwe Training 2023.pdf
Univiwe Training 2023.pdf
 
Uniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdfUniview Company Introduction with brief solution(1).pdf
Uniview Company Introduction with brief solution(1).pdf
 
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ  Quicktron Robotic .Thailand(1).pdfหนังสือเชิญ  Quicktron Robotic .Thailand(1).pdf
หนังสือเชิญ Quicktron Robotic .Thailand(1).pdf
 
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
07 TOR ระบบ Smart Classroom ขนาด 50 ที่นั่ง 231220.docx
 
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.pptPresentation DGF Logistics Thailand.คุณอรุณ.1.ppt
Presentation DGF Logistics Thailand.คุณอรุณ.1.ppt
 
อบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptxอบรมพื้นฐาน 2023.pptx
อบรมพื้นฐาน 2023.pptx
 
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptxpresentationsolutioncovidschool-230115131900-5c73fd21.pptx
presentationsolutioncovidschool-230115131900-5c73fd21.pptx
 
Catalog Quick.pdf
Catalog Quick.pdfCatalog Quick.pdf
Catalog Quick.pdf
 
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
01416_PPT_FG_DAY1-บ่าย_651219V2.pdf
 
แผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdfแผนที่PICKชีวิต.pdf
แผนที่PICKชีวิต.pdf
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 

Bitdefender Partner Program 2023_08_TH.pptx

  • 1. B I T D E F E N D E R P A R T N E R A D V A N T A G E P R O G R A M Market Opportunities. Case Studies. Partner Engagement | 1 J U L Y , 2 0 2 3 M I C H A L D O M I N I K – B I T D E F E N D E R I N D O C H I N A M A N A G I N G D I R E C T O R
  • 2. GRAVITYZONE™ THE SECURITYPLATFORMFOR END-TO-ENDBREACH AVOIDANCE AUGUST 21, 2023 2 WHY BITDEFENDER 38 % LEADING TECHNOLOGY PROVIDER. 38% of all secuíity vendoís integíate Bitdefendeí technologies BEST PREVENTIO N UNMATCHED ATTACK PREVENTION. Consistently 1 íanked píotection peífoímance INTEGRATE D PLATFORM THE FIRST INTEGRATED SECURITY PLATFORM FOR ENDPOINT, NETWORK, CLOUD & HUMAN Risk Analytic, EDR, XDR managed from a single console ROMANI A SINCE 2001
  • 3. AUGUST 21, 2023 GRAVITYZONE™ THE SECURITYPLATFORMFOR END-TO-ENDBREACH AVOIDANCE 3 • ľotal Secuíity • Inteínet Secuíity • Antiviíus Plus • Antiviíus foí Mac • Mobile Secuíity foí Andíoid • Mobile Secuíity foí iOS • Family Pack • Small Office Secuíity PRIVAC Y • Píemium VPN • Passwoíd Manageí IDENľIľY PROľECľION • Digital Identity Píotection • Identity ľheft Píotection • GíavityZone Business Secuíity Enteípíise • GíavityZone Business Secuíity Píemium • GíavityZone Business Secuíity • GíavityZone Secuíity foí MSPs SECURIľY PRODUCľS • Endpoint Detection and Response (EDR) • GíavityZone XDR • Cloud and Seíveí Secuíity • Secuíity foí Containeís • GíavityZone Secuíity foí Email • GíavityZone Secuíity foí Woíkstations • GíavityZone Secuíity foí Mobile • GíavityZone Patch Management • GíavityZone Stoíage Secuíity SECURIľY AS A SERVICE • Managed Detection and Response • Managed Detection and Response Seívices foí MSPs HOME USE SECURIľY DEVICE SECURIľY BUSINESS SECURIľY SECURIľY PACKAGES
  • 4. AUGUST 21, 2023 GRAVITYZONE™ THE SECURITYPLATFORMFOR END-TO-ENDBREACH AVOIDANCE 4 OUR MISSION We aíe commiľľed ľo help secuíe youí oíganizaľion fíom bíeaches and business disíupľions.
  • 5. Cybeí aľľacks can impacľ an oíganizaľion in many ways — fíom minoí disíupľions in opeíaľions ľo majoí financial losses. Malwaíe (a píogíam designed ľo disíupľ oí gain unauľhoíized access inľo a sysľem) is ľhe mosľ common ľype of cybeíaľľack and one of ľhe biggesľ ľhíeaľs in ľhe IT indusľíy. The mosľ fíequenľly aľľacks aíe fíom íansomwaíe, woíms, viíuses, ľíojans, and
  • 6. Ïíom 2022 global malwaíe aľľacks incíeased again because of geopoliľical uníesľ. 5.5 billion malwaíe aľľacks weíe deľecľed aíound ľhe woíld in 2022. The majoíiľy aľľacks aíe occuííing in ľhe Asia-Pacific íegion. Cambodia is one of ľhe mosľ exposed counľíy ľo cybeícíimes. Accoíding Global Cybeí-Safeľy Index of SEON ľhaľ combines daľa fíom diffeíenľ cybeísecuíiľy indices.
  • 7. Cybeísecuíiľy and infoímaľion secuíiľy aíe aľ ľhe ľop of ľhe CIO's invesľmenľ píioíiľies since 2020. 66% of inľeíviewed CIOs in 2023 plan ľo incíease ľheií invesľmenľ in cybeísecuíiľy.
  • 8. 5% incíease woíldwide spending in IT 11% incíease spending on infoímaľion secuíiľy and íisk managemenľ 15% yeaí-oveí-yeaí gíow global spending on cybeísecuíiľy 22% gíow ľhe global secuíiľy sofľwaíe maíkeľ
  • 9. J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N 9 Customers’ Challenges • Data and system protection. • Employees productivity. • The company reputation. • Business espionage. • Cybersecurity regulation compliance.
  • 17. J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N 1 7 Case Study THE CHALLENGE • The high volume of trouble calls • No access to metrics about security system performance or malware attacks THE SOLUTION Since the former services provider had licensed a Symantec anti- virus solution, the city’s security staff evaluated Symantec along with Sophos, Kaspersky, and Bitdefender WHY BITDEFENDER • The best response time to zero-day exploits and new malware • Minimizing impact on performance • Competitive cost The city deployed the GravityZone Enterprise Security on-premise on 4,000 endpoints in 40 locations The city government - one of the most populous city in the United States
  • 18. J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N 1 8 Case Study • Desktops and laptops become very slow, lowering productivity of employees • Ransomware attacks were bypassing the previous security product and encrypting file shares. Bitdefender kills off ransomware, and improves infrastructure performance and user experience while simplifying security management THE CHALLENGE THE SOLUTION IT evaluated Trend Micro, Cylance, Microsoft, Sophos, and Bitdefender solutions. WHY BITDEFENDER • Rich features from protection against zero-day threats to patch management to application-policy management • Single console to easily manage our entire physical, virtual, cloud, and mobile infrastructure GravityZone Enterprise Security to protect over 3,500 machines, including physical and virtual workstations and servers, and 1100 Android devices. IT Environment - Nutanix - VMware - Citrix - Microsoft Barnsley Council is a local government authority in South Yorkshire, U.K.
  • 19. J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N Policy & Procedures Implementation & Configuration Training & Awareness Education Execution & Evaluation Upgrade Following New Challenges | 1 9 Real Cybersecurity TECHNOLOGY IS JUST A TOOL 95% of all successful cyber attacks is caused by human error
  • 20. 21 août2023| Confidentiel A partnership born from a passion for high performance and technological innovation. In cybersecurity and Formula 1, every millisecond counts. Technology makes all the difference in who has the advantage. Bitdefender researchers, security analysts, and engineers are on the cutting edge of cybersecurity, developing threat and behavioral analytics from its network of millions of monitored and protected endpoints to prevent, detect and respond to threats faster. «Bitdefender shares with Scuderia Ferrari a heritage of excellence and a demonstratedtrackrecordof building state of the art,innovativetechnologiesto deliverwinning results. » FlorinTalpes Co-founderand CEO,Bitdefender
  • 21. J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N | 2 1 Bitdefender Certification Roadmap Steps: 1. Live training from certified staff of our local distributor or regional representatives 2. Joining final online courses and exams Benefits: 1. Additional discounts and extra margin 2. Extra revenue for services 3. Authorization rights to provide services • Implementation • After-sales support • GravityZone console review
  • 22. M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N Value Added Reseller Partnership Levels | 2 2 DIAMOND PLATINUM Certificates: • 2 sales • 2 technical Certificates: • 1 sales • 1 technical
  • 23. M A Y , 2 0 2 0 | C O N F I D E N T I A L P R E S E N T A T I O N How To Become A Bitdefender Partner? | 2 3
  • 24. J U L Y , 2 0 2 3 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N Partner Advantage Programs | 2 4 #1 ranked technology. Experts’ choice Working together, simple, easy and straightforward Lifetime recurrent & protected revenues R E S E L L I N G C H A N N E L P R O G R A M Free certification training Free presalessupport MDF Support P A R T N E R B E N E F I T S Special prices approval on justified requests for registered and approved projects P R O T E C T A C C O U N T Revenue sharing model for licenses and services Channel account protection for registered projects and renewals
  • 25. M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N Bitdefender Channel Distribution Model | 2 5 D I S T R I B U T O R B I T D E F E N D E R R E S E L L E R E N D U S E R M S P P a r t n e r H Y B R I D P a r t n e r
  • 26. M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N J O I N Q U A L I F Y R E W A R D E N G A G E E N A B L E R E T A I N Partners’ Lifecycle | 2 6 Sign-up via our distribution channel Share your company profile and opportunity prospects Register your projects Complete certification training Win projects with Bitdefender Place orders Win high margin and rebates Apply for MDF Renew your last customers Win new customers Stay up-to-date
  • 27. M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N New Opportunity Registration | 2 7 N E W C U S T O M E R Identify, develop and win a new project for Bitdefender which qualifies for the New Opportunity Registrationprogram. R E G I S T E R O P P O R T U N I T Y Follow the process for registering the new opportunity online: • Via project registration web service • Vie sending email to our distributor with project details G E T D I S C O U N T A N D P R E S A L E S S U P P O R T Qualified projects are rewarded with the best discountand free presales support. https://partner.bitdefender.com.kh/
  • 28. M A Y , 2 0 2 0 | P A R T N E R C O N F I D E N T I A L P R E S E N T A T I O N Sales Process | 2 8 1. Register your project via our distribution channel or portal • Deal registration discount • Free presales support • Account protection 2. Get presales support from certified experts • Analyzing the customer requirement • Documentation sharing and localization • POC (test) deployment (1 POC for 1 client only) 3. Pricing quotation • Special price approvals on justified requests 4. Purchase order 5. Implementation by certified staff 6. Customer satisfaction survey 7. Upgrade and renewal lifetime • Retention channel marketing and protection
  • 29. 21 août2023| Confidentiel Highly satisfied users Bitdefender solutions have the highest satisfaction rate
  • 30. 3030 How to Save on Cybeísecuíity?
  • 31. 31 The Cost of Saving on Cybersecurity What is the most important to most organizations? • Reputation • Financial stability Common consequences of cybersecurity incident: 1. Financial losses 2. Exposing critical data to competitors 3. Reputation damage 4. Legal liability 5. Data loss 6. Loss of productivity 7. Business continuity problems The company reputation Save 3 0 $ /user
  • 32. 32 How to Save on Cybersecurity? What is the weakest point of cybersecurity? • Human behavior • Personal computers and mobiles (endpoints) What is the most cost-effective security solution? • Endpoint protection software • High security solution using less computer resources What is the most important for security software? • Protection level Which endpoint security solution has the highest security rank? • Bitdefender* *According European cybersecurity technology institutesAV-Test,AV-Comparatives, Bitdefender is the best in protection regarding overall score between Jan 2011-Apr 2021 accordingAV-Test, so for last 10 years.