SlideShare a Scribd company logo
Positioning a startup 
in a big old fat market 
René Bonvanie 
November 7, 2014
Palo Alto Networks at a glance 
Corporate highlights 
Founded in 2005; first customer shipment in 2007 
$16Bn+ enterprise security market
Marketing’s role 
 Position the company 
 Obsess about the story 
 Enable sales 
 Obsess about demand 
3 | ©2014, Palo Alto Networks. Confidential and Proprietary.
More details on what to obsess about 
 Audacity 
 Simplicity 
 Positioning discipline 
 Sacred words 
 Competition : rear-view, side-view, and front-view 
 Dare to be different and stand out 
 Metrics – especially leading indicators 
4 | ©2014, Palo Alto Networks. Confidential and Proprietary.
5 years ago 
5 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Our core value proposition 
An enterprise security platform 
that safely enables all applications 
through granular use control 
and prevention of known and unknown cyber threats 
for all users on any device across any network.
And its ‘bigger’ brother 
Palo Alto Networks is the only enterprise security platform 
7 | ©2014, Palo Alto Networks. Confidential and Proprietary. 
That safely enables all applications 
through granular use control 
and prevention of known and unknown cyber threats 
for all users on any device across any network 
Unlike traditional firewalls, UTM’s, and 
disparate stand-alone security point-products 
That offer limited control for some applications and 
limited detection of some cyber threats
What not to obsess about 
8 | ©2014, Palo Alto Networks. Confidential and Proprietary.
You need simplicity 
9 | ©2014, Palo Alto Networks. Confidential and Proprietary.
3 tips for the CEOs in the room 
1. Customers aren’t investors 
2. Do not think of sales & marketing: think of go-to-market 
3. Don’t buy your marketing; build it 
10 | ©2014, Palo Alto Networks. Confidential and Proprietary.
You need simplicity 
Threat Intelligence Cloud 
Palo Alto Networks 
Advanced Endpoint Protection 
Next-Generation Firewall 
Palo Alto Networks 
Next-Generation Firewall 
Palo Alto Networks 
Threat Intelligence Cloud 
 Inspects all traffic 
 Blocks known threats 
 Sends unknown to cloud 
 Extensible to mobile & virtual 
networks 
 Gathers potential threats from 
network and endpoints 
 Analyzes and correlates threat 
intelligence 
 Disseminates threat intelligence 
to network and endpoints 
Advanced Endpoint Protection 
 Inspects all processes and files 
 Prevents both known & unknown exploits 
 Integrates with cloud to prevent known & 
unknown malware

More Related Content

What's hot

Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Asia Pte Ltd
 
Overview on 5G PPP project INSPIRE-5Gplus for security and trust in 5G
Overview on 5G PPP project INSPIRE-5Gplus for security and trust in 5GOverview on 5G PPP project INSPIRE-5Gplus for security and trust in 5G
Overview on 5G PPP project INSPIRE-5Gplus for security and trust in 5GProjectINSPIRE5Gplus
 
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...Tanaza
 
Webcast (Ingles)
Webcast (Ingles)Webcast (Ingles)
Webcast (Ingles)saptron
 
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...NetworkCollaborators
 
LaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedLaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedJermaine Isaac
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet securityKaviya452563
 
Physical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open StandardsPhysical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open StandardsMemoori
 
Door lock and camera system solutions
Door lock and camera system solutionsDoor lock and camera system solutions
Door lock and camera system solutionsMobiloitte
 
FIWARE Global Summit - Trusting the Edges
FIWARE Global Summit - Trusting the EdgesFIWARE Global Summit - Trusting the Edges
FIWARE Global Summit - Trusting the EdgesFIWARE
 
20150420_One Pager FINAL
20150420_One Pager FINAL20150420_One Pager FINAL
20150420_One Pager FINALTonny Rabjerg
 
SC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecuritySC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecurityDan Vasile
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software DeliveryTiffany Jachja
 

What's hot (20)

UL TS - CSA NL SUMMIT
UL TS - CSA NL SUMMITUL TS - CSA NL SUMMIT
UL TS - CSA NL SUMMIT
 
Netpluz Managed Services Portfolio
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services Portfolio
 
Overview on 5G PPP project INSPIRE-5Gplus for security and trust in 5G
Overview on 5G PPP project INSPIRE-5Gplus for security and trust in 5GOverview on 5G PPP project INSPIRE-5Gplus for security and trust in 5G
Overview on 5G PPP project INSPIRE-5Gplus for security and trust in 5G
 
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
 
Webcast (Ingles)
Webcast (Ingles)Webcast (Ingles)
Webcast (Ingles)
 
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
LaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedLaTronic 8 Page Web Optimized
LaTronic 8 Page Web Optimized
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet security
 
Physical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open StandardsPhysical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open Standards
 
Door lock and camera system solutions
Door lock and camera system solutionsDoor lock and camera system solutions
Door lock and camera system solutions
 
Appi fi
Appi fiAppi fi
Appi fi
 
FIWARE Global Summit - Trusting the Edges
FIWARE Global Summit - Trusting the EdgesFIWARE Global Summit - Trusting the Edges
FIWARE Global Summit - Trusting the Edges
 
20150420_One Pager FINAL
20150420_One Pager FINAL20150420_One Pager FINAL
20150420_One Pager FINAL
 
SC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT SecuritySC Congress Amsterdam 2016 - IoT Security
SC Congress Amsterdam 2016 - IoT Security
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
{unscripted} 2020 : A Conference for Simplifying and Scaling Software Delivery
 
DVRCV Smartsafe A4
DVRCV Smartsafe A4DVRCV Smartsafe A4
DVRCV Smartsafe A4
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Stores
StoresStores
Stores
 

Similar to Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks

Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaBravo Tecnologia
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?Leonard Lee
 
Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Splunk
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 

Similar to Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks (20)

Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Kaspersky - Apresentação Corporativa
Kaspersky - Apresentação CorporativaKaspersky - Apresentação Corporativa
Kaspersky - Apresentação Corporativa
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Nuro Secure Messaging
Nuro Secure MessagingNuro Secure Messaging
Nuro Secure Messaging
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clients
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 

Marketing Tools for the Enterprise with Rene Bonvanie, Palo Alto Networks

  • 1. Positioning a startup in a big old fat market René Bonvanie November 7, 2014
  • 2. Palo Alto Networks at a glance Corporate highlights Founded in 2005; first customer shipment in 2007 $16Bn+ enterprise security market
  • 3. Marketing’s role  Position the company  Obsess about the story  Enable sales  Obsess about demand 3 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 4. More details on what to obsess about  Audacity  Simplicity  Positioning discipline  Sacred words  Competition : rear-view, side-view, and front-view  Dare to be different and stand out  Metrics – especially leading indicators 4 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 5. 5 years ago 5 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 6. Our core value proposition An enterprise security platform that safely enables all applications through granular use control and prevention of known and unknown cyber threats for all users on any device across any network.
  • 7. And its ‘bigger’ brother Palo Alto Networks is the only enterprise security platform 7 | ©2014, Palo Alto Networks. Confidential and Proprietary. That safely enables all applications through granular use control and prevention of known and unknown cyber threats for all users on any device across any network Unlike traditional firewalls, UTM’s, and disparate stand-alone security point-products That offer limited control for some applications and limited detection of some cyber threats
  • 8. What not to obsess about 8 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 9. You need simplicity 9 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 10. 3 tips for the CEOs in the room 1. Customers aren’t investors 2. Do not think of sales & marketing: think of go-to-market 3. Don’t buy your marketing; build it 10 | ©2014, Palo Alto Networks. Confidential and Proprietary.
  • 11.
  • 12. You need simplicity Threat Intelligence Cloud Palo Alto Networks Advanced Endpoint Protection Next-Generation Firewall Palo Alto Networks Next-Generation Firewall Palo Alto Networks Threat Intelligence Cloud  Inspects all traffic  Blocks known threats  Sends unknown to cloud  Extensible to mobile & virtual networks  Gathers potential threats from network and endpoints  Analyzes and correlates threat intelligence  Disseminates threat intelligence to network and endpoints Advanced Endpoint Protection  Inspects all processes and files  Prevents both known & unknown exploits  Integrates with cloud to prevent known & unknown malware

Editor's Notes

  1. With this platform A true platform. Not a hodge podge of products Purpose built, ground up Tightly integrated Highly automated Easily extensible Addresses all enterprise security needs and is flexible in how and when the customer deploys the capabilities. This is the only true platform solution in the market Bring in competitors at each point so it is clear we are the only ones with the whole picture.