Check Point 2013-2014 Partner Marketing Campaign Plan



Similar documents
The Hillstone and Trend Micro Joint Solution

Uncover security risks on your enterprise network

The New Face of Next Generation Firewalls

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

CHECK POINT SOFTWARE TECHNOLOGIES REPORTS 2013 FIRST QUARTER FINANCIAL RESULTS

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Check Point Positions

The Attacker s Target: The Small Business

Security Administration R77

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

THE GENERATION GAP IN COMPUTER SECURITY:

Cloud and VM Based Security

Achieve Deeper Network Security

Next-Generation Firewalls: Critical to SMB Network Security

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Winning with Check Point Secure Web Gateway. Sales Training. August [Restricted] ONLY for designated groups and individuals

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

WEB CONTENT SCANNER SDK

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

The Benefits of SSL Content Inspection ABSTRACT

Navigate Securely with Check Point and FishNet Security

Next Generation Enterprise Network Security Platform

The Cisco ASA 5500 as a Superior Firewall Solution

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

How UTM-1, DLP and Application Control Protect your IT environment

Radware Solutions for NGDC

How To Buy Nitro Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Fortinet Advanced Threat Protection- Part 3

15 JAAR VOOROP IN ICT SECURITY

Network Control Meets Endpoint Security

Enterprise Software Security Strategies

Achieve Deeper Network Security and Application Control

Elastic Grid Best Practices

Cloud Services Prevent Zero-day and Targeted Attacks

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

WildFire. Preparing for Modern Network Attacks

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Vulnerability Management

Gartner Magic Quadrant Update Dedicated IPS Field & Partner Talking Points

SourceFireNext-Generation IPS

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:

Agenda , Palo Alto Networks. Confidential and Proprietary.

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

FROM PRODUCT TO PLATFORM

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Intro to Firewalls. Summary

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Bezpečnosť bez kompromisov

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

Make the move to The Next Generation Firewall

Networking for Caribbean Development

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Carbon Black and Palo Alto Networks

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

GOING BEYOND BLOCKING AN ATTACK

Turnkey B2B Lead Generation Campaigns

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Data Center security trends

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Unified Security Management and Open Threat Exchange

Whitepaper. Ten questions that every IT manager should ask. A Buyer s Guide to Hosted Security:

Managing Web Security in an Increasingly Challenging Threat Landscape

Top 10 Reasons Enterprises are Moving Security to the Cloud

MARKETING AUTOMATION: CAMPAIGN PLANNING AGENDA AND CONSIDERATIONS

The Identity Defined Security Alliance

Better Together: Microsoft Office 365 & Symantec Office 365

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

10 Things Every Web Application Firewall Should Provide Share this ebook

Own, launch, grow and support your cloud backup and recovery offering

Cloud Based Security for SMBs. Ian Milligan-Pate Director MSP & SaaS, Americas Tyler Murphy Business Development Manager NA & EMEA

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

ENABLING FAST RESPONSES THREAT MONITORING

NETWORK SECURITY SOLUTIONS

Sponsorship at a Glance

Requirements When Considering a Next- Generation Firewall

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

How To Build Security By Silo

Workshop. Avril 2015 Benoit Buonassera

Unified Security, ATP and more

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

facebook Are you using facebook for your business?

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Zscaler Internet Security Frequently Asked Questions

Unified Threat Management, Managed Security, and the Cloud Services Model

Cyber intelligence exchange in business environment : a battle for trust and data

Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH

*TKtr *W4>K. Government of India itwm mitm Ministry of Labour & Employment W T HSlPT&llem. Directorate General of Mines Safety TENDER NOTICE

UNMASKCONTENT: THE CASE STUDY

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Secure Software Begins in the Development Process

How To Secure Your Business

Transcription:

Check Point 2013-2014 Partner Marketing Campaign Plan 1

Welcome To keep pace with the changes and complexities of today s security challenges, you need a partner that is uniquely equipped to provide security solutions that evolve at the speed of business. As the security market leader, with a 100% focus on security and 100% of its sales through partners, Check Point is committed to working with you, our partner, to enable your customers to do business in a secure future. 2

Check Point Vision Pioneer Leader Innovator 3D Security Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Top Scores for Next Gen Firewall by NSS Labs, 2013 Best Firewall by SC Magazine & a leader in Gartner s Network Firewall Magic Quadrant. Customers include 100% of the Fortune 100. Software Blade Architecture is the first and only security architecture that delivers total, flexible and manageable security to companies of any size. Redefines security as a 3-dimensional business process that combines policy, people and enforcement for greater protection and helps organizations implement a blueprint for security that aligns with business needs. 3

Navigating this Presentation 4 major Check Point campaigns for 2013 and 2014 Pick and choose the activities that best suit your needs Activities outlined with step-by-step directions for a successful campaign Find editable campaign assets on PartnerMAP 4

2013 Campaigns + Activities 1 2 3 4 2013 Security Report Leader in Next Gen Firewall Threat Prevention Roadshow Software Blade Training 5

What s hiding in your network? The Check Point 2013 Security Report examines top security threats, risky web applications that comprise network security, and loss of data caused by employees unintentionally. Landing Page w/ Lead Form The following marketing activities should drive end users to download the report and eventually sign up for a 3D security analysis. Banner Ads 3D Analysis Sample Report Email Campaign 1 2013 Security Report Telemarketing Campaign 6

Activity Details 2013 Security Report Based on research of nearly 900 companies, this report reveals major security risks organizations are exposed to on a daily basis. Banner Ads & Email Promote the 2013 security report Download Report Schedule Your Own Analysis Email campaign driving to landing page Lead form on landing page to schedule analysis Telemarketing Campaign Follow up calls for security report download leads Schedule analysis 7

What s hiding in your network? 2013 Security Report Report Highlights: 63% 75% 54% 36% were infected with bots visited malicious websites had at least one potential data loss incident of financial organizations sent credit card information outside of the organization 8

What s hiding in your network? Email & Banner Ads Objective See what hidden risks we ve discovered! Call to Action Download the report Target Net New Customers 9

What s hiding in your network? Schedule Your Own Analysis Objective 3D Security Analysis follow up Call to Action Schedule an onsite analysis Target Prospects who downloaded 13 report 10

What s hiding in your network? Telemarketing Campaign Follow up Schedule a 3D security analysis report with prospective customers 11

The Leader in NGFW Email Campaign Banner Ads As a leader in the security industry, high marks on analyst test scores are a crucial component of the Check Point brand. This campaign brings to attention our high rankings on 2013 NSS Labs tests. 2 Landing Page w/ Lead Form NSS 2013 NGFW SVM 12

Activity Details Email Blast Driving to NSS landing page Download the test results: NSS 2013 NGFW SVM Roadshow Email campaign driving to NSS landing page Download the test results: NSS 2013 NGFW SVM 13

The Leader in NGFW Objective Learn More about the leader in Next Generation Firewall Call to Action Download test results Target Net New Customers Existing Customers 14

Threat Prevention Roadshow in-a-box Follow Up Survey Half Day Seminar Cyber threats are not slowing down in 2013 and organizations are looking for ways to protect themselves and win the cybercrime battle. The roadshow is a way for your customers to learn how to minimize security threats with Check Point solutions. Full Day Seminar Email 3 Presentations Signage 15

Activity Details Banner Ads Email blast inviting customers Email Campaign Host half day or full day seminar 16

Threat Prevention Roadshow in-a-box Objective Get hands-on experience with CP Threat Prevention solutions Call to Action Register for Roadshow Target C-level Net new prospects Existing customers 17

Software Blade Training in-a-box Email Through Software Blade training, you can strengthen relationships and build a more knowledgeable customer base. The activities outlined will help you conduct your own training to enable your customers. Education 4 Registration List 18

Activity Details Banner Ads Advertise training to drive registration Email Campaign Email invitation to drive registration and awareness Training Materials Presentations Agenda Signage Guides 19

Software Blade Training in-a-box Objective Stop the Next Big Attack with Check Point Software Blades Call to Action Register for Training Target System Admins System Engineers Sales Engineers Those seeking CP certification 20

Agenda DAY 1 09:00 Identity Awareness (IA) Software Blade Description, Deployment and Best Practices 10:00 AppControl and URL Filtering (URLF) Software Blades Description, Deployment and Best Practices 11:00 HTTP Inspection 11:30 IA, AppControl, URLF Scenario Labs (technical labs to use the product in different scenarios) 12:00 IA, AppControl, URLF Practical Exercises (real Life deployment scenarios) 12:30 Lunch 01:30 Data Loss Prevention (DLP) Software Blade Description, Deployment and Best Practices 02:30 DLP Software Blade Scenario Labs (technical labs to use the product in different scenarios) 03:30 DLP Software Blade Practical Exercises (Real Life deployment scenarios) 04:30 Licensing and Pricing 05:30 Wrap up and Q&A DAY 2 09:00 Threat Prevention Software Blades Description, Deployment and Best Practices 10:00 Threat Prevention Software Blades Scenario Labs 11:00 Threat Prevention Software Blades Practical Exercises (Real Life deployment scenarios) 12:00 Lunch 01:00 IPS Software Blade Description, Deployment and Best Practices 02:00 IPS Software Blade Scenario Labs (technical labs to use the product in different scenarios) 03:00 IPS Software Blade Practical Exercises (Real Life deployment scenarios) 04:00 IPS Software Blade Best Practices 04:30 Licensing, Pricing and 3D Security Analysis 05:00 Wrap up and Q&A 05:30 Certification Exam 21

Summary Use the activities highlighted to run seamless Check Point campaigns These activities include lead generation, education, and awareness Find editable co-branded materials for your use Utilize Check Point to assist in the planning and implementation of these activities Find these campaign materials and more in Marketing Tools on Check Point s PartnerMap 22

Download Materials Or open campaign page here: https://usercenter.checkpoint.com/usercenter/portal/js_pane/partnermapid,partnerhomeid?pageurl=partners/resources/campaign-central/index.html 23

Thank you! For questions regarding campaigns, co-branding, and marketing materials please contact: Andrea Navarro anavarro@checkpoint.com For other questions about Check Point s products, pricing, or partner programs please contact: Partner Alliance cpp@checkpoint.com 24