Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

Similar documents
Securing the SMB Cloud Generation

Symantec Endpoint Protection

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Kaspersky Small Office Security 5. Product presentation

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Endpoint Protection 12

Security Made Simple by Sophos

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Symantec Protection Suite Add-On for Hosted Security

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Symantec Endpoint Protection 14

Security Gap Analysis: Aggregrated Results

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

9 Steps to Protect Against Ransomware

Symantec Endpoint Protection Cloud (SEPC)

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Symantec Endpoint Protection Family Feature Comparison

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Symantec Endpoint Protection 11.0

HOSTED SECURITY SERVICES

What is an Endpoint Protection Platform?

for businesses with more than 25 seats

ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Free antivirus software download

for businesses with more than 25 seats

TREND MICRO SMART PROTECTION SUITES

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Kaspersky Open Space Security

Symantec Small Business Solutions

Trend Micro Enterprise Endpoint Comparative Report Performed by AV-Test.org

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

How To Removing Personal Antivirus Security Pro From Windows 8

with Advanced Protection

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

How To Remove Personal Antivirus Security Pro Virus

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Seqrite Endpoint Security

FIREWALL BEST PRACTICES TO BLOCK

Trend Micro Endpoint Comparative Report Performed by AV-Test.org

How To Remove Personal Antivirus Security Pro Virus Windows 8

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Symantec Ransomware Protection

TREND MICRO SMART PROTECTION SUITES

RANSOMWARE. All Locked Up and No Place to Go. Mark

Service Provider View of Cyber Security. July 2017

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Office 365 Buyers Guide: Best Practices for Securing Office 365

AT&T Endpoint Security

MRG Effitas 360 Degree Assessment & Certification Q4 2017

Getting over Ransomware - Plan your Strategy for more Advanced Threats

How To Remove Personal Antivirus Security Pro Virus Manually

NetDefend Firewall UTM Services

THE ACCENTURE CYBER DEFENSE SOLUTION

MRG Effitas 360 Degree Assessment & Certification Q1 2018

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

MRG Effitas 360 Assessment & Certification Programme Q4 2015

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Symantec Endpoint Protection

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION

EM L01 Introduction to Mobile

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

Symantec Security Monitoring Services

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

What is a mobile protection product?

Exam : Title : symantec small Business security. Version : DEMO

PROTECTION SERVICE FOR BUSINESS. Datasheet

Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ]

Microsoft 365 Business FAQs

McAfee Public Cloud Server Security Suite

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

DOCUMENT* PRESENTED BY

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Changing face of endpoint security

Stop Ransomware In Its Tracks. Chris Chaves Channel Sales Engineer

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

SOLUTION MANAGEMENT GROUP

Anti-Virus Comparative

Kaspersky Security Network

Transcription:

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

Disclaimer The information provided by Symantec in this document is the confidential and proprietary information of Symantec ( Information ). Without Symantec s prior written permission, our Information, either in whole or in part, must not be reproduced in any form or by any means or disclosed to others or used for purposes other than its evaluation by the Symantec Partner under NDA. The Information and any document to which it is attached are subject to any internal review process and change without notice at any time of either party. Whilst care and attention has been exercised in the preparation of the Information, Symantec does not accept responsibility for any inaccuracy or error or any action taken in reliance on the Information. To the extent permitted at law, any warranties whether express or implied by statute, law or otherwise are hereby disclaimed and excluded. 2

Discussion Items 1 Threat Landscape and Norton 2 Norton Security for Professionals 3 Target Market and Competitive Matrix 4 Overcoming Objections 3

Discussion Items 1 Threat Landscape and Norton 2 Norton Security for Professionals 3 Target Market and Competitive Matrix 4 Overcoming Objections 4

Threat Landscape and Small Businesses Why is this relevant to a small business owner? LARGEST GROWTH AREA 43% ONE MILLION 35% For targeted attacks 1 Of all targeted attacks are against SMBs (<250) 1 New malware threats released each day 1 Increase in ransomware in 2015, and it s now spread into mobile and Mac environments 1 Many small businesses lack the resources or capacity to protect themselves against an increasingly sophisticated threat landscape involving zero-day and ransomware attacks. 5

Everyone Has a Story What s Ours? Heritage & Reputation Security Expertise Technology Leadership We are pioneers in security We are transparent in our mission to keep you and your data safe We adapt as technology changes and threats evolve We have over 30 years of security expertise We have 14 security centers located around the world, running 365x24x7 We discover new threats within minutes or hours We have 40M attack sensors in over 150 countries We prove time and again that our technology is the most effective We are focused on being fast and light on system resources

In the Past Year We ve Leapfrogged Cybercriminals Capabilities with Strengthened Protection of Our Security Layers Network File Protection Reputation Behavioral Recovery System Hardening IMPROVED! Our intrusion prevention engine protects you at the network layer from hackers, botnets and drive-by-downloads distributed from compromised websites, and ransomware. NEW FEATURES! Our antivirus engine protects you from a variety of malware including viruses, Trojans, rootkits, ransomware, cryptoware and keyloggers. Our crowd-based analytics engine uses reputation data to protect you from spammers, scammers and phishers looking for your personal and financial information as you operate online. Our behavioral engine called SONAR unmasks and blocks suspicious acting malware masquerading as innocent programs, including ransomware. We help you to root out problems, undo damage caused by malware and can repair your operating system using cloudbased repair tools IMPROVED! We can also restore your most critical files after a disaster. NEW FEATURES! We protect you from cybercriminals attempting to force previously unseen malware onto your computer through vulnerabilities in your software. 7

Proactive Exploit Protection: Another Important Layer of Protection Common Customer Activity The customer clicks a hyperlink sent through social media. The customer loads a web page that has a good reputation. A java applet on a web page begins to exploit a software vulnerability on the customer s PC. A customer downloads a file from the web and begins to install it. A customer selects to run an application on their PC. How Norton Protects at Each Stage Norton s URL Insight reputation engine checks the reputation of websites to determine if it has been known to distribute malware. Norton s Intrusion Prevention System scans the entire page for malicious code while analyzing network traffic in order to find malware. Norton s Proactive Exploit Protection analyzes interactions with software applications looking for exploit techniques. Norton s File Insight checks the file reputation. Norton Antivirus features kick in (including Auto-protect and Emulation) to analyze the file for malware. Norton s SONAR behavioral analysis engine looks for suspicious behavior from seemingly innocent applications. If Norton finds a bad reputation, it blocks the web page from loading. If Norton finds a malware or malicious code it blocks it from the customer s computer. If Norton discovers an exploit occurring, it quickly identifies the attack and blocks it. If Norton discovers malware it quickly blocks all activity and quarantines the file. If Norton unveils a malicious application, it blocks it and rolls back all changes that we made. Copyright 2016 Symantec Corporation Company Confidential 8

Ransomware Attack Chain 1. Malware Delivery Common Variations Different ransom amounts Delete or infect backup Target specific user files or all user files Download additional threats Propagate onto servers, USBs, cloud 4. Encryption Command 2. Malware Installation 3. Call C&C Server 9

Where There Is An Attack Chain There Is A Kill Chain 1. Malware Delivery Anti-Spam Intrusion Prevention Proactive Exploit Prevention IP Reputation (SafeWeb) File Reputation (Download Insight) Behavior (SONAR) 4. Encryption Command 2. AntiVirus Malware Engine Installation Behavior (SONAR) Machine Learning Engine Intrusion Prevention 3. Call C&C Server 10

Discussion Items 1 Threat Landscape and Norton 2 Norton Security for Professionals 3 Target Market and Competitive Matrix 4 Overcoming Objections 11

NORTON SECURITY FOR PROFESSIONALS Norton Security for Professionals lets you easily secure your employees PCs, Macs, smartphones and tablets, with just a few clicks. Safeguards your business data across multiple devices against viruses, malware, spam and other threats, with a subscription that can grow with your business. Let employees manage their own protection by adding new devices through an intuitive web management portal. Lets you run your business with the ultimate peace of mind. 12

Employee Employee Admin What is Norton Security for Professionals Norton branded Endpoint Security Service IM.Cloud Console Designed for small businesses and professionals Product components: User protection clients and portals: 5 Devices per user (per employee)* Local backup Supports PC, Mac, Android, ios Norton Management console (employee) Administrator console provided by IM.Cloud for user management Norton Management Console NSFP Norton Management Console NSFP *limit per user is 5 Devices 13

Summary How Norton Can Help Intelligent Protection Layers Easy to Deploy and Use Affordable Simplify Workday Proven world-class security with advanced endpoint protection against emerging threats Protects against zero-day threats and ransomware Utilises world leading global intelligence Single, 5 Device license allows flexibility across PC, Mac, Android and ios Real-time, always-on security Easy end user setup without the need of an IT expert End users can easily add and remove software from their devices from their own console Monthly or annual billing With multi-platform support no need for additional products Can be installed by end customer with minimal configuration or support Identity Safe - remembers, secures, and automatically enters your usernames and passwords so they cannot be lost or stolen Download Insight- helps ensure your downloads are safe and not malicious before you open them

Discussion Items 1 Threat Landscape and Norton 2 Norton Security for Professionals 3 Target Market and Competitive Matrix 4 Overcoming Objections 15

Target Market Small business owner with less than 100 employees Business owners who see value in subscription approach to software with monthly or annual billing Businesses transitioning to cloud-enabled technologies Businesses with varying numbers of employees through growth or frequent restructures and employee turnover

Target Market Existing customers of Cloud marketplace or small businesses that purchase their solutions from resellers/marketplace Business owners with limited IT skills, but serve as IT frontline for their business Customers with a make it work, tactical mindset Professionals who are familiar with and gravitate to Norton consumer solutions

Norton Brand Opinion in the Small Business Segment Norton Symantec McAfee Kaspersky Trend AVG Microsoft % % % % % % % Brand Opinion Excellent/Very Good 43 39 35 38 37 45 48 Brand Presence Hear Very Often 17 6 8 6 5 12 24 Social Engagement Has Recommended 8 5 6 3 4 6 10 Unaided Awareness 46 14 39 17 15 20 9 Purchase Endpoint Security Consideration 26 13 16 13 12 20 N/A Primary Brand 17 7 11 6 9 16 14 Source: Symantec/Norton Brand Impact Study, 2015 18

Norton Brand Usage in the Small Business Segment Recent study shows that almost one quarter of micro and small businesses were using Norton as their main IT security system, with a further 5% using Symantec Brand Usage Norton 22% AVG 16% McAfee or Intel Security 11% AVAST 9% Trend Micro 7% Microsoft Security Essentials 7% Kaspersky 6% Symantec 5% ESET 2% Sophos 1% Source: Symantec/Norton Australian small business cybersecurity survey, August 2016 19

Competitor Matrix in Small Business Trend Micro AVG Norton consistently beats Trend in Passmark Software s Consumer Security Performance Benchmark tests - Overall Performance Score 3 Norton offers more features than AVG on your mobile, Mac and PC. Norton consistently outperforms Trend on both Dennis Lab 1 and SE 2 Lab protection tests. Norton Security delivers better overall performance than AVG Internet Security. 2 Norton includes: Dedicated firewall, IPS Technology, In a product review by AV-Test, over 12,000 samples were used to detect malware and Norton Security achieved close to 100%, while AVG was only able to achieve around 97%. 1 1. http://dennistechnologylabs.com/reports/s/a-m/2015/av-test 2. https://selabs.uk/en/reports/consumers 3. http://www.passmark.com/benchmark-reports/index.htm

When to Sell NSFP Vs. SEP.Cloud Norton Security for Professionals Symantec Endpoint Protection Cloud Ideal for businesses with < 100 employees > 50-1,000 employees Operating Systems Windows, Mac, Android, ios* Windows, Windows server, Mac* Management Cloud managed service Cloud managed or on-premise Server Protection Endpoint Security Yes (Windows) Anti-virus and antispyware Yes Yes Desktop firewall Yes Yes Intrusion prevention Yes Yes Password Manager (ID Safe) Yes No Custom security policy creation No Yes Licensing Per User 5-devices (Annual, Monthly) Per User 5-devices (Annual, Monthly) Pricing (5D MSRP) $149 per year $70.49 per year * some features may not be available on ios * Mac is supported with on-premise deployments If securing multi-os devices for each employee with a self service model is critical where IT resources are limited, choose Norton Security for Professionals. If server protection is required for companies under 100 employees, you can sell Symantec Endpoint Protection server license. 21

Discussion Items 1 Threat Landscape and Norton 2 Norton Security for Professionals 3 Target Market and Competitive Matrix 4 Overcoming Objections 22

Objection: I heard that security software will slow down our computers Response: Independent testing consistently ranks Norton number one in protection and performance, so you ll get the best protection that keeps your device running smoothly. Copyright 2016 Symantec Corporation Company Confidential 23

Objection: We don t need security, I have it built in with Microsoft Windows Response: Operating system providers do not have decades of expertise in protecting against malware. Norton has over 30 years of experience in being the security expert in protecting against malware and crimeware. Protecting you is the only thing we concentrate on. Security solutions that are built into an operating system don t always offer protection against the latest threats. This could leave your computer vulnerable to new and emerging threats not yet classified and pushed out to computers. The defender freeware is also only available on PC while Norton is multi-platform offering. Copyright 2016 Symantec Corporation Company Confidential 24

Objection: We use free AV software program, it seems to work fine. Response: Traditional antivirus software will not protect you from these new threats. In fact, traditional antivirus software may only capture 50% of today s threats. You need multiple layers of protection backed by decades of security expertise and one of the largest intelligence networks in the world, so we ll see and protect you from the newest threats first. Copyright 2016 Symantec Corporation Company Confidential 25

Objection: I am using the Norton consumer product. Why should I switch to this Professional version? Response: Norton Security for Professional is ideal for businesses that don t have a dedicated IT person or in-house IT resources/support, requiring scalable, cloud-based endpoint security service that can grow and change with their business and be billed in flexible monthly or annual subscription options. Copyright 2016 Symantec Corporation Company Confidential 26

Thank you!. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 27