Winning the Cyber Security Small-Medium Business Opportunity. Steve Pataky VP, WW Channels & Alliances

Similar documents
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Data Center security trends

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Unknown threats in Sweden. Study publication August 27, 2014

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Advanced Threats: The New World Order

Symantec Cyber Security Services: DeepSight Intelligence

Spear Phishing Attacks Why They are Successful and How to Stop Them

Advanced Threat Protection with Dell SecureWorks Security Services

The Symantec Approach to Defeating Advanced Threats

We Prevent Breaches (and surprises) Intelligent Prevention

Anti-exploit tools: The next wave of enterprise security

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Randy Lee FireEye Labs. Understanding Modern Malware.

IT Security Strategy and Priorities. Stefan Lager CTO Services

Managing Web Security in an Increasingly Challenging Threat Landscape

RETHINKING CYBER SECURITY

Next Generation Firewalls and Sandboxing

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Fighting Advanced Threats

Securing Your Business with DNS Servers That Protect Themselves

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Integrating MSS, SEP and NGFW to catch targeted APTs

After the Attack. The Transformation of EMC Security Operations

How To Get A Cloud Service For A Small Business

How To Manage A Network Security Risk

Cloud Services Prevent Zero-day and Targeted Attacks

Securing Your Business with DNS Servers That Protect Themselves

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Securing Cloud-Based

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Gaining the upper hand in today s cyber security battle

IBM Security re-defines enterprise endpoint protection against advanced malware

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Perspectives on Cybersecurity in Healthcare June 2015

Evolution Of Cyber Threats & Defense Approaches

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

WRITTEN TESTIMONY OF

24/7 Visibility into Advanced Malware on Networks and Endpoints

A New Approach to Assessing Advanced Threat Solutions

SECURITY REIMAGINED. FireEye Network Threat Prevention Platform. Threat Prevention Platform that Combats Web-based Cyber Attacks

Big Threats for Small Businesses

CyberArk Privileged Threat Analytics. Solution Brief

Cisco Advanced Malware Protection for Endpoints

Defending Against Data Beaches: Internal Controls for Cybersecurity

Unified Security, ATP and more

Persistence Mechanisms as Indicators of Compromise

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

Advanced Cyber Threats in State and Local Government

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Practical Steps To Securing Process Control Networks

Modular Network Security. Tyler Carter, McAfee Network Security

Zak Khan Director, Advanced Cyber Defence

Is security awareness a waste of time?

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N July 2011

Developing Secure Software in the Age of Advanced Persistent Threats

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

A Case for Managed Security

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

FireEye Fuel Partner Program

Risk Analytics for Cyber Security

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

The Advanced Cyber Attack Landscape

Enterprise Security Platform for Government

Securing the endpoint and your data

2012 Endpoint Security Best Practices Survey

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

The Hillstone and Trend Micro Joint Solution

Protection Against Advanced Persistent Threats

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

WHITE PAPER: THREAT INTELLIGENCE RANKING

Defending Against Cyber Attacks with SessionLevel Network Security

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Transcription:

Winning the Cyber Security Small-Medium Business Opportunity Steve Pataky VP, WW Channels & Alliances

Current State of Cyber Security Innovation Creates Perfect Platform of Evil Cyber Threats More Advanced & Complex than Ever Current Security Models Ineffective New Models Required NEW THREAT LANDSCAPE Copyright 2014, FireEye, Inc. All rights reserved.

How the Bad Guys Work 111011101101 Exploit an application or OS vulnerability Callback to Command & Control Malware Download Lateral Spread Data Exfiltration Exploit detection critical Every stage after the exploit can be hidden or obfuscated

The High Cost of Being Unprepared THREAT UNDETECTED REMEDIATION Initial Breach of Companies Learned They Were Breached from an External Entity 229 Days Median # of days attackers are present on a victim network before detection. 3 Months 6 Months 9 Months of Victims Had Up-To-Date Anti-Virus Signatures Source: M-Trends Report

A Very Real Threat for SMBs 1 2 3 4 5 Data is more valuable than you think 77% 77% of global cybercrime is targeted at small and midsized businesses Cyber attacks are low risk/high return for criminals 10% A mere 10% of police-recorded cybercrime incidents result in a conviction. SMBs are an easier target than the enterprise 64% 64% of SMBs do not have any data security policies. Many SMBs are unaware of the dangers 58% 58% of management does not see cyber attacks as a significant risk. Most SMB security tools are built for yesterday s threats Copyright 2014, FireEye, Inc. All rights reserved.

SMB Market Knowledge SMBs are the new threat gateway, but they don t know it. Market education is essential. FireEye has great enterprise credentials which we are leveraging in the SMB market. The FireEye platform is designed to supplement and complement traditional Firewall and AV security approaches and close the protection gaps that SMBs are exposed to. Our decision maker is predominantly IT with business leaders and owners.

SMB Go-to-Market Strategy Product Portfolio & SMB Bundles Dedicated SMB Sales Team SMB Market Education Demand Gen Campaigns Go-to-Market with Partners

The Objective: Continuous Threat Protection Time to Detect Time to Fix REAL TIME Prevent THEFT OF ASSETS & IP COST OF RESPONSE DISRUPTION TO BUSINESS REPUTATION RISK

FireEye s Technology: State of the Art Detection ANALYZE (500,000 OBJECTS/HOUR) DETONATE CORRELATE Network Exploit Email Malware Download Mobile Files Callback Lateral Transfer Exfiltration Within VMs Across VMs Cross-enterprise

FireEye Product Portfolio Email Threat Prevention Threat Analytics Platform Mobile Threat Prevention Email Threat Prevention SEG MVX Dynamic Threat Intelligence Network Threat Prevention IPS SWG Host Anti-virus Endpoint Threat Prevention IPS Content Threat Prevention Mobile Host Threat Anti-virus Prevention MDM

SMB Promotion Bundle Web bundle Small Medium Large X-Large NX 1400 NX 2400 NX 4400 NX 7400 Support Support Support 1-year Continuous Monitoring* Support 1-year Continuous Monitoring* Promotional Web bundle (20 Mbps) Promotional Web bundle (50 Mbps) Promotional Web bundle (250 Mbps) Promotional Web bundle (1 Gbps)

SMB Promotion Bundle Web Email X-Small Small Small-Medium Medium Medium-Large Large X-Large NX 1400 EX 3400 NX 2400 EX 3400 NX 4400 EX 3400 NX 4400 EX 5400 NX 4400 EX 8400 NX 7400 EX 5400 NX 7400 EX 8400 Support Support Support Support 1-year Continuous Monitoring* Support 1-year Continuous Monitoring* Support 1-year Continuous Monitoring* Support 1-year Continuous Monitoring* Promotional bundle (20 Mbps) Promotional bundle (50 Mbps) Promotional bundle (250 Mbps) Promotional bundle (250 Mbps) Promotional bundle (250 Mbps) Promotional bundle (1 Gbps) Promotional bundle (1 Gbps)

SMB Promotion Bundle Web ETP bundle Small Medium Large X-Large NX 1400 ETP NX 2400 ETP NX 4400 ETP NX 7400 ETP Support Support Support 1-year Continuous Monitoring* Support 1-year Continuous Monitoring* Promotional Web bundle (20 Mbps) Promotional Web bundle (50 Mbps) Promotional Web bundle (250 Mbps) Promotional Web bundle (1 Gbps)

FireEye Market Segment Sales Coverage GAM SAM TM SMB Opportunity Commercial Account Manager Global Corporate Sales

Targeting the SMB SMB<500 SMB 500-2000 IT Practitioner/Decision Maker Business Decision Maker IT Professional Less likely to have IT security specialty Need for more education about both APTs and effects on business Relies on IT Pro for technical decsions Needs education about business impacts of APTs Already has awareness of the new threat landscape Needs to show Value/ROI of solution

SMB Collateral for Awareness & Market Education Stage 1 5 Reasons You re a Target Understanding Cyber Enemies Spiceworks Infographic Stage 2 WP-5 Reasons You re a Target Spiceworks Survey Report Combatting Cyber Threats 5 Point Battle Plan SMB Strategies Stage 3 Use Case PDF The FireEye Advantage Myth of Sandboxes 16

SMB Co-brandable Demand Gen Campaigns 17

Partner Actions Understand SMB threat landscape and market drivers Build your SMB cyber security value proposition and solutions. Educate your customers Engage your Westcon sales team Execute SMB demand generation campaigns Develop SMB account opportunities Win the business!

About FireEye Innovator of Advanced Persistent Threat (APT) protection solutions ~2500 Employees in 6 Continents, with HQ in Milpitas, CA 2000 Customers, in every region, every industry 90% of business through partners IPO in September, 2013 Launched on NASDAQ Stock Exchange under symbol FEYE Acquired Mandiant in Jan 2014 Industry Innovator to Industry Consolidator Infrastructure High Tech Healthcare Financial Services, Insurance Retail Government

Your Westcon Team A little about Westcon.. A little about the Security Team.. Global company, headquartered in Tarrytown, NY Approaching US$5 billion in revenues Founded in 1985 Present in 60 countries, across six continents With over 100 offices, we ship to more than 100 countries 25 logistics/staging facilities Backed by close to 3,000 associates 20,000 transacting customers globally 15 Security Account Managers in NY & CO 800-527-9516 4 Security Field BDM s to grow with Steve Brezniak West Ron Bachman North Central Ron Carter South East Lou Guiga North East 3 Account Managers in the Developing Accounts Team Kelly, Justin and Ryan FireEye is also in other business units at WGNA Brad Wilkins Product Sales Manager for FireEye Brad.Wilkins@Westcon.com 303-566-2644 Jonathan Massey Pre-Sales Solutions Engineer for FireEye Jonathan.Massey@Westcon.com 303-566-2675

Thank You Security Reimagined