Sophos. Allan Widell Channel Account Executive. 24. August 2017

Similar documents
Synchronized Security

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central

Synchronized Security: Outsmart Hackers by Coordinating Your Defenses

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Security Made Simple by Sophos

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

AKAMAI CLOUD SECURITY SOLUTIONS

Sophos Überblick. Stefan Jantzer Sales Executive

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Sophos MSP Connect. One flexible MSP program to connect you and your customers to one complete and simple security solution.

Next Generation Enduser Protection

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Sophos XG Firewall. IP Partners ICT Systems & Services.

with Advanced Protection

INTRODUCING SOPHOS INTERCEPT X

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Comodo Certificate Manager

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Services solutions for Managed Service Providers (MSPs)

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Synchronized Security

CloudSOC and Security.cloud for Microsoft Office 365

ForeScout Extended Module for Splunk

Microsoft 365 Business FAQs

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Cybersecurity The Evolving Landscape

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Best Practices in Securing a Multicloud World

Guide to Cyber Security Compliance with GDPR

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Cybersecurity & Security as a Service Trends. SteakOut, June 29, 2017

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Competitive Matrix - IRONSCALES vs Alternatives

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

Managed Endpoint Defense

Securing the SMB Cloud Generation

Commercial Product Matrix

A Data-Centric Approach to Endpoint Security

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Symantec Endpoint Protection 14

Kaspersky Security for Small and Medium Business

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

HOSTED SECURITY SERVICES

Kaspersky Security. The Power to Protect Your Organization

SophosLabs 2019 Threat Report

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

BETTER Mobile Threat Defense (BMTD)

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

Office 365 Buyers Guide: Best Practices for Securing Office 365

Make security part of your client systems refresh

TREND MICRO SMART PROTECTION SUITES

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Securing the Modern Data Center with Trend Micro Deep Security

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

McAfee epolicy Orchestrator

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

IBM Cloud Internet Services: Optimizing security to protect your web applications

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Endpoint Security Buyers Guide

Securing Today s Mobile Workforce

TREND MICRO SMART PROTECTION SUITES

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Symantec Small Business Solutions

CORPORATE BUSINESS SOLUTIONS

Securing Your Most Sensitive Data

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

THE RISE OF GLOBAL THREAT INTELLIGENCE

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

EMPLOYEE SKILLS TRAINING PLATFORM. On-access skills training and measurement for all employees

White Paper. How to Write an MSSP RFP

RHM Presentation. Maas 360 Mobile device management

AT&T Endpoint Security

How to Write an MSSP RFP. White Paper

Secure Access for Microsoft Office 365 & SaaS Applications

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

RSA INCIDENT RESPONSE SERVICES

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Security-as-a-Service: The Future of Security Management

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

May the (IBM) X-Force Be With You

Kaspersky Managed Service Providers Program

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

Put an end to cyberthreats

Transcription:

Sophos Allan Widell Channel Account Executive 24. August 2017

Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security made simple Single, integrated cloud-based management console Synchronized security: each security product actively communicates and shares threat intelligence information across endpoint, network, and entire portfolio Channel First sales model 3

Mid-Market Focus with Value Proposition that Resonates with Enterprises of All Sizes % OF SOPHOS BILLINGS IT SECURITY MARKET SOPHOS CUSTOMER EXAMPLES 20% Large > 5,000 Employees $4.9Bn 18% OF TOTAL c. 22K ENTERPRISES 57% Mid-Market 100 5,000 Employees $18.5Bn 69% OF TOTAL c. 1M ENTERPRISES 23% SMB < 100 Employees $3.5Bn 13% OF TOTAL c. 64M ENTERPRISES

MQ Leader in Network and Endpoint MAGIC QUADRANT for UNIFIED THREAT MANAGEMENT MAGIC QUADRANT for ENDPOINT PROTECTION PLATFORMS Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Rajpreet Kaur, 30 August, 2016 Magic Quadrant for Endpoint Protection Platforms, Eric Ouellet, Ian McShane, Avivah Litan 30 January, 2017 5

Understanding IT Needs Reduce Complexity Enhance Protection Increase Efficiency Juggling multiple consoles Making products play well together Critical shortage of staff 46% Organizations believe they have a problematic shortage of cybersecurity skills ESG Group Cybersecurity Skills Shortage: A State of Emergency

Understanding IT Needs Reduce Complexity Exploit-based attacks Crpytocoin Generator 5% Generic Malware 10% Malvertising 3% Ransomware 42% Enhance Protection Ransomware Phishing Increase Efficiency Exploits 40% Source: Sophos Labs

Understanding IT Needs Reduce Complexity Enhance Protection Increase Efficiency Take advantage of SaaS and the Cloud Support Hybrid IT models Reduce maintenance costs By 2020, a corporate nocloud policy will be as rare as a no-internet policy is today Gartner, June 2016 Market Insight: Cloud Computing s Drive to Digital Business Creates Opportunities for Providers

Synchronized Security Sophos products share real-time security information via Sophos Central and then automatically respond to threats. Unparalleled protection Automated incident response Real-time insight and control 9

Synchronized Security Platform and Strategy Admin Manage All Sophos Products Self Service User Customizable Alerts Partner Management of Customer Installations Sophos Central In Cloud On Prem UTM/Next-Gen Firewall Wireless Email Web Endpoint/Next-Gen Endpoint Mobile Server Encryption Cloud Intelligence Analytics Analyze data across all of Sophos products to create simple, actionable insights and automatic resolutions Sophos Labs 24x7x365, multi-continent operation URL Database Malware Identities File Look-up Genotypes Reputation Behavioural Rules APT Rules Apps Anti-Spam Data Control SophosID Patches Vulnerabilities Sandboxing API Everywhere 10

Meeting IT Managers Needs 11

Reduce Complexity Manage all your security in one place A single, intuitive console Products actively engineered to work together Control from anywhere, anytime even your phone 12

Enhance Protection Gartner Magic Quadrant ENDPOINT PROTECTION Advanced protection from a global security leader Proven anti-ransomware and anti-exploit protection Signatureless endpoint protection Backed by SophosLabs Multiple awards from analysts and 3 rd party experts Sophos Mobile: Best Buy and five stars Sophos Endpoint: 2 AAA awards Magic Quadrant for Endpoint Protection Platforms, Eric Ouellet, Ian McShane, Avivah Litan 30 January, 2017 Sohos XG Firewall 5-Star A-List Sophos Encryption Winner: Data Encryption Sophos UTM: Readers Choice Award 13

Increase Efficiency Cloud-based No hardware maintain Flexible, responsive Automatic updates Access from anywhere 14

Sophos Central A cloud-based management platform with a comprehensive range of security service options Manage all your Sophos products from a single cloud-based platform 15

3 Interfaces Partner Dashboard Admin Self Service Allows Partners to manage multiple customer installations Enables IT mangers to deploy and manage all their security through a single interface Allows users to customize security status and notifications

Partner Dashboard Single Console Easy Trial and Conversion Makes Cross- Sell Easy Offer complete range of security services View cross-sell opportunities Deploy and manage from anywhere, any time even your phone!

Partner Dashboard Single Console Easy Trial and Conversion Makes Cross- Sell Easy Manage all your customers, and all their products, through a single console Simplify management with the intuitive interface Reduce vendor management overheads by consolidating with Sophos

Simple 30-day trial process activated by customer or partner Partner Dashboard Partners can monitor trial status through Partner Dashboard Quick and easy conversion to purchased license Single Console Start trial Convert trial Easy Trial and Conversion Makes Cross- Sell Easy Partner Dashboard

Partner Dashboard Existing customers can try additional products in just 2-clicks! Single Console Easy Trial and Conversion Makes Cross- Sell Easy Admin Interface (Customer)

Next Steps Try for free for 30 days Explore our pre-configured online demo Check out the demo videos Get no-obligation pricing www.sophos.com/central 21

Partnership with Sophos

Partner Sales Tools Partner Portal Quoting and deal registration Renewal management Training and certification Sales tools / pricing / battlecards Asset registration and reporting Events / news Partner App Partner Portal in your pocket Sophos news and alerts Webcasts / podcasts / assets on the go Upcoming Sophos events / registration 24

Co-Branded Marketing Campaigns XG Firewall Intercept X Next-Gen Endpoint Synchronized Security PowerPoint Deck Office 365 UTM Elevated Next-Gen Encryption White Paper Sophos Home Sophos vs. Symantec Ransomware Landing Page Next-Gen Web Sophos Sandstorm Next-Gen Mobile Banner Ads Co-branded Emails 25

Sophos Partner Program: Marketing Support FREE Channel Service Center customizes campaigns for partners Email marketing support from our in-house team Sophos Site-in-a-Box enables partners to add a Sophos section to their websites in a couple of clicks Referral ID ensures all leads you generate go straight back to you Marketing Development Funds to help partners further grow their business (criteria apply) 26

Partner roadshow Tilmeld dig her 27

How far do you want to go to manage the risk to your data and IT assets? Risk mitigation BASIC IT SECURITY SCALE LOWEST RISK Top causes for data loss* Hacking, malware, or malicious code (57%) Portable devices and physical loss (17%) Unintended disclosure (22%) Other (4%) Common ways to loose data Advanced malware Ransomware and exploits Unauthorized access and credential theft Lost or stolen laptops and storage devices Lost or stolen mobile devices, tablets, and IoT devices Human error, loss via email, or loss via cloud storage Malicious insider Remediation Endpoint Protection Intercept X Server Security Device Encryption Sophos Mobile SafeGuard Encryption Sophos Central On premises Effort LOWER HIGHER * Percentages based on number of incidents according to data from Privacy Rights Clearinghouse

Introducing SOPHOS PHISH THREAT

Sophos Central Phish Threat Sophos Phish Threat is an advanced security testing and training platform designed to reduce your largest attack surface your end-users with effective security awareness testing and training. Optimized to help IT Organizations address the alarming increase in phishing and compliance threats, Sophos Phish Threat helps change user behaviour and reduce organizational risk through routine, real-world phishing simulations reinforced with effective training and actionable reporting. #1 Pick a Phishing Attack Campaign #2 Pick a Security Training Module #3 Manage End- User Response & Awareness

#1 Pick a Phishing Attack Campaign Import End-Users Select a Testing Campaign Select an Attack Email

#2 Pick a Security Training Module Select desired Training Module based on Campaign Objectives

#3 Manage End- User Response & Awareness Reporting and Results Security Posture by Organization, Department or Individual Performance

Sophos Home Free professional-grade security for home PCs and Macs Always-on Antivirus Protection Unwanted App Detection Automatic Blocking of Malicious Websites Parental Web Filtering Easy, remote management of up-to 10 computers 750,000+ users and growing! Our test was flawless Exceeds the standards of its competitors Best-in-class protection while leaving a small performance impact. Sophos Home includes some sophisticated management features not typically found in consumer-side free antivirus products. Neil J Rubenking 35