SlideShare a Scribd company logo
Internet Security ServicesDM meeting 10/21/09Herb Moyer – ISS Sales Exec
What is the initiative? What is the Strategy? What are the right questions to ask the Customer? How does ISS benefit me as a Sales Executive? How does ISS benefit the Customer? What is the Sales Presentation you can present to the customer? Overview
ISS Initiative Overview Jeskell goal:  establish a security/networking business that resells technology and provides value add service to those clients IBM goal:  jump start business partners that can find and close customers and support those customers to use their offerings Agreement: 2 years Jeskell generates 7M in sales IBM pays Jeskell 600K Jeskell “dedicates” two sales, one project mgr, 1 exec sponsor IBM supports Jeskell with various resources:
Reps Contact Herb Moyer or David Scribner Moyer/Scribner engage Flynn/ISS to develop ops 50/50 gp split Existing Customer Base:  Moyer/Scribner reach out Survey customers to know what they do for security today FusionStorm? Relationships Moyer/Scribner led efforts with carriers and finance vertical FS Security consulting practice? ISS support Team Set up to funnel leads to us Strategy
Forecast ADDS Pharmaceuticals			$       1,900 DHL					$    537,000 NTTA					$1,000,000 Williams Lea				$    100,000 Exel					$       50,000 Telefonica				$     150,000 Northrup Grumman			$        58,000 DHS					$      500,000
What are the right questions to ask?   Do you know where your Data resides? Do you know who has access to your data? Do you want to prevent attackers from being able to redirect calls or perform eavesdropping, toll fraud/service theft, or Phishing? Do you want to stop all types of Internet threats before they penetrate your network and disrupt your business? Are you looking for comprehensive security protection at the gateway and network level that doesn’t jeopardize network bandwidth or availability? Do you need a pre-emptive security solution that ensures protection before threats pose a risk?
What are the right questions to ask?   (cont.)  Would your organization benefit from an integrated security solution that lowers it complexity and reduces cost? How would you like a 100% guaranteed protection or your money back? Do you want your server secured or not?
How can ISS benefit the Customer? You are protected from both known and unknown threats before impact Security assets are mapped and centrally managed New users are detected and documented Network bandwidth efficiency is optimized Security conditions and events are documented and reported Help desk traffic is reduced New applications are tested and evaluated more effectively before deployment Network availability and reliability are improved
New customer?  Initial sales expectations Lead with Assessments 	Security Health check	 ($60k) 	Security Risk Assessment 	Identity and Access Management Services 	Application Security Services	($60k) 	PCI  Assessments
Providing a recurring revenue stream Increasing the average deal size Protecting your Customer Base Creating Sales opportunities Ensuring customer loyalty and repeat business Improving customer satisfaction Allowing you to capitalize on the fastest growing segment in security How does ISS benefit me and put money in my pocket?
Discounts $$$$$$ Hardware 			28% off  Software  			35% off  Professional Services 	17% off  Managed Services 		25% off  Maintenance 			20% off
ISS Sales presentation (attach the Iss presentation)
Questions ?????
Contact information Herb Moyer ISS Sales Exec Direct:   (571) 332-1531 hmoyer@jeskell.com Lead, Follow, Or Get Out Of My Way!

More Related Content

What's hot

PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017PrecisionLender
 
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysisBA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond
 
LucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group PresentationLucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group Presentation
Darren Cunningham
 
SSR Overview 2008
SSR Overview 2008SSR Overview 2008
SSR Overview 2008
granicki
 
Data Sheet - IAM Kickstart
Data Sheet - IAM KickstartData Sheet - IAM Kickstart
Data Sheet - IAM KickstartRob Hart
 
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Scout RFP
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
Sharath Kumar
 
Collaborating in Context - NexJ Systems
Collaborating in Context - NexJ SystemsCollaborating in Context - NexJ Systems
Collaborating in Context - NexJ Systems
Symphony.com
 
10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider
July Systems
 
Demand Generation : Customized sales outreach program - UK
Demand Generation : Customized sales outreach program - UKDemand Generation : Customized sales outreach program - UK
Demand Generation : Customized sales outreach program - UK
Datamatics Business Solutions Ltd.
 
Market Awareness Overview
Market Awareness OverviewMarket Awareness Overview
Market Awareness Overview
marketawareness1
 

What's hot (11)

PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017PrecisionLender Overview - April 2017
PrecisionLender Overview - April 2017
 
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysisBA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
BA and Beyond 19 - Lynda Girvan - Keynote Agile analysis
 
LucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group PresentationLucidEra Silicon Valley User Group Presentation
LucidEra Silicon Valley User Group Presentation
 
SSR Overview 2008
SSR Overview 2008SSR Overview 2008
SSR Overview 2008
 
Data Sheet - IAM Kickstart
Data Sheet - IAM KickstartData Sheet - IAM Kickstart
Data Sheet - IAM Kickstart
 
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
Keep it Simple and Make it Fun: Change Management Success Stories from Unityw...
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Collaborating in Context - NexJ Systems
Collaborating in Context - NexJ SystemsCollaborating in Context - NexJ Systems
Collaborating in Context - NexJ Systems
 
10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider10 Things To Look For In Your LBS Provider
10 Things To Look For In Your LBS Provider
 
Demand Generation : Customized sales outreach program - UK
Demand Generation : Customized sales outreach program - UKDemand Generation : Customized sales outreach program - UK
Demand Generation : Customized sales outreach program - UK
 
Market Awareness Overview
Market Awareness OverviewMarket Awareness Overview
Market Awareness Overview
 

Viewers also liked

Have Better Toys
Have Better ToysHave Better Toys
Have Better Toys
apotonick
 
Time to Stop Wasting Time
Time to Stop Wasting TimeTime to Stop Wasting Time
Time to Stop Wasting Time
angiebakke
 
Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2Giusi Piras
 
Trevlar Portfolio0809
Trevlar Portfolio0809Trevlar Portfolio0809
Trevlar Portfolio0809
trevlar
 
Survive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google FormsSurvive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google Forms
angiebakke
 
Getting started
Getting startedGetting started
Getting started
REDA BITAR
 
Dra2 online course slide show
Dra2 online course slide showDra2 online course slide show
Dra2 online course slide showangiebakke
 
CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!apotonick
 
Tecido osseo e nervoso
Tecido osseo e nervosoTecido osseo e nervoso
Tecido osseo e nervoso
Alexandre Reinas
 

Viewers also liked (10)

Have Better Toys
Have Better ToysHave Better Toys
Have Better Toys
 
Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
Time to Stop Wasting Time
Time to Stop Wasting TimeTime to Stop Wasting Time
Time to Stop Wasting Time
 
Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2Pensieri Sul Viaggio In Russia2009 2
Pensieri Sul Viaggio In Russia2009 2
 
Trevlar Portfolio0809
Trevlar Portfolio0809Trevlar Portfolio0809
Trevlar Portfolio0809
 
Survive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google FormsSurvive the First Day the Easy Way with Google Forms
Survive the First Day the Easy Way with Google Forms
 
Getting started
Getting startedGetting started
Getting started
 
Dra2 online course slide show
Dra2 online course slide showDra2 online course slide show
Dra2 online course slide show
 
CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!CRUD Is Not REST! Hypermedia For Y'All!
CRUD Is Not REST! Hypermedia For Y'All!
 
Tecido osseo e nervoso
Tecido osseo e nervosoTecido osseo e nervoso
Tecido osseo e nervoso
 

Similar to Dm Iss

6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
Continuum
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
manoharparakh
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
SPLICE Software
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
Peter Bassill
 
Computer Solutions Inc. Valuators
Computer Solutions Inc.  ValuatorsComputer Solutions Inc.  Valuators
Computer Solutions Inc. Valuatorsjlorf
 
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
Vuzion
 
Managed services smb nation june 2011
Managed services   smb nation june 2011Managed services   smb nation june 2011
Managed services smb nation june 2011
Alistair Forbes
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
Protected Harbor
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1nbcoenen
 
CMAX Solutions Company Profile
CMAX Solutions Company ProfileCMAX Solutions Company Profile
CMAX Solutions Company Profile
Prakash Singh
 
Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1Chad Caldwell
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
Mr. Business Magazine
 
Eminence Technology Presentation
Eminence Technology PresentationEminence Technology Presentation
Eminence Technology PresentationAmit Pareek
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Lviv Startup Club
 
Proventiv Sales Presentation
Proventiv Sales PresentationProventiv Sales Presentation
Proventiv Sales PresentationMSI Services
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
Visionet Systems, Inc.
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
Securestorm
 
TM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertipsTM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertips
Gustavo Gattass Ayub
 

Similar to Dm Iss (20)

6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Computer Solutions Inc. Valuators
Computer Solutions Inc.  ValuatorsComputer Solutions Inc.  Valuators
Computer Solutions Inc. Valuators
 
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
WPC 2016 - Keys to building a strong EMS offer & sales practice with the CSP ...
 
Managed services smb nation june 2011
Managed services   smb nation june 2011Managed services   smb nation june 2011
Managed services smb nation june 2011
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1
 
CMAX Solutions Company Profile
CMAX Solutions Company ProfileCMAX Solutions Company Profile
CMAX Solutions Company Profile
 
Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1Insurance IV One Pager_v2.1
Insurance IV One Pager_v2.1
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Eminence Technology Presentation
Eminence Technology PresentationEminence Technology Presentation
Eminence Technology Presentation
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
 
Proventiv Sales Presentation
Proventiv Sales PresentationProventiv Sales Presentation
Proventiv Sales Presentation
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
TM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertipsTM Forum 2014: Insights at your fingertips
TM Forum 2014: Insights at your fingertips
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Dm Iss

  • 1. Internet Security ServicesDM meeting 10/21/09Herb Moyer – ISS Sales Exec
  • 2. What is the initiative? What is the Strategy? What are the right questions to ask the Customer? How does ISS benefit me as a Sales Executive? How does ISS benefit the Customer? What is the Sales Presentation you can present to the customer? Overview
  • 3. ISS Initiative Overview Jeskell goal: establish a security/networking business that resells technology and provides value add service to those clients IBM goal: jump start business partners that can find and close customers and support those customers to use their offerings Agreement: 2 years Jeskell generates 7M in sales IBM pays Jeskell 600K Jeskell “dedicates” two sales, one project mgr, 1 exec sponsor IBM supports Jeskell with various resources:
  • 4. Reps Contact Herb Moyer or David Scribner Moyer/Scribner engage Flynn/ISS to develop ops 50/50 gp split Existing Customer Base: Moyer/Scribner reach out Survey customers to know what they do for security today FusionStorm? Relationships Moyer/Scribner led efforts with carriers and finance vertical FS Security consulting practice? ISS support Team Set up to funnel leads to us Strategy
  • 5. Forecast ADDS Pharmaceuticals $ 1,900 DHL $ 537,000 NTTA $1,000,000 Williams Lea $ 100,000 Exel $ 50,000 Telefonica $ 150,000 Northrup Grumman $ 58,000 DHS $ 500,000
  • 6. What are the right questions to ask? Do you know where your Data resides? Do you know who has access to your data? Do you want to prevent attackers from being able to redirect calls or perform eavesdropping, toll fraud/service theft, or Phishing? Do you want to stop all types of Internet threats before they penetrate your network and disrupt your business? Are you looking for comprehensive security protection at the gateway and network level that doesn’t jeopardize network bandwidth or availability? Do you need a pre-emptive security solution that ensures protection before threats pose a risk?
  • 7. What are the right questions to ask? (cont.) Would your organization benefit from an integrated security solution that lowers it complexity and reduces cost? How would you like a 100% guaranteed protection or your money back? Do you want your server secured or not?
  • 8. How can ISS benefit the Customer? You are protected from both known and unknown threats before impact Security assets are mapped and centrally managed New users are detected and documented Network bandwidth efficiency is optimized Security conditions and events are documented and reported Help desk traffic is reduced New applications are tested and evaluated more effectively before deployment Network availability and reliability are improved
  • 9. New customer? Initial sales expectations Lead with Assessments Security Health check ($60k) Security Risk Assessment Identity and Access Management Services Application Security Services ($60k) PCI Assessments
  • 10. Providing a recurring revenue stream Increasing the average deal size Protecting your Customer Base Creating Sales opportunities Ensuring customer loyalty and repeat business Improving customer satisfaction Allowing you to capitalize on the fastest growing segment in security How does ISS benefit me and put money in my pocket?
  • 11. Discounts $$$$$$ Hardware 28% off Software 35% off Professional Services 17% off Managed Services 25% off Maintenance 20% off
  • 12. ISS Sales presentation (attach the Iss presentation)
  • 14. Contact information Herb Moyer ISS Sales Exec Direct: (571) 332-1531 hmoyer@jeskell.com Lead, Follow, Or Get Out Of My Way!