Check Point 2013-2014 Partner Marketing Campaign Plan 1
Welcome To keep pace with the changes and complexities of today s security challenges, you need a partner that is uniquely equipped to provide security solutions that evolve at the speed of business. As the security market leader, with a 100% focus on security and 100% of its sales through partners, Check Point is committed to working with you, our partner, to enable your customers to do business in a secure future. 2
Check Point Vision Pioneer Leader Innovator 3D Security Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Top Scores for Next Gen Firewall by NSS Labs, 2013 Best Firewall by SC Magazine & a leader in Gartner s Network Firewall Magic Quadrant. Customers include 100% of the Fortune 100. Software Blade Architecture is the first and only security architecture that delivers total, flexible and manageable security to companies of any size. Redefines security as a 3-dimensional business process that combines policy, people and enforcement for greater protection and helps organizations implement a blueprint for security that aligns with business needs. 3
Navigating this Presentation 4 major Check Point campaigns for 2013 and 2014 Pick and choose the activities that best suit your needs Activities outlined with step-by-step directions for a successful campaign Find editable campaign assets on PartnerMAP 4
2013 Campaigns + Activities 1 2 3 4 2013 Security Report Leader in Next Gen Firewall Threat Prevention Roadshow Software Blade Training 5
What s hiding in your network? The Check Point 2013 Security Report examines top security threats, risky web applications that comprise network security, and loss of data caused by employees unintentionally. Landing Page w/ Lead Form The following marketing activities should drive end users to download the report and eventually sign up for a 3D security analysis. Banner Ads 3D Analysis Sample Report Email Campaign 1 2013 Security Report Telemarketing Campaign 6
Activity Details 2013 Security Report Based on research of nearly 900 companies, this report reveals major security risks organizations are exposed to on a daily basis. Banner Ads & Email Promote the 2013 security report Download Report Schedule Your Own Analysis Email campaign driving to landing page Lead form on landing page to schedule analysis Telemarketing Campaign Follow up calls for security report download leads Schedule analysis 7
What s hiding in your network? 2013 Security Report Report Highlights: 63% 75% 54% 36% were infected with bots visited malicious websites had at least one potential data loss incident of financial organizations sent credit card information outside of the organization 8
What s hiding in your network? Email & Banner Ads Objective See what hidden risks we ve discovered! Call to Action Download the report Target Net New Customers 9
What s hiding in your network? Schedule Your Own Analysis Objective 3D Security Analysis follow up Call to Action Schedule an onsite analysis Target Prospects who downloaded 13 report 10
What s hiding in your network? Telemarketing Campaign Follow up Schedule a 3D security analysis report with prospective customers 11
The Leader in NGFW Email Campaign Banner Ads As a leader in the security industry, high marks on analyst test scores are a crucial component of the Check Point brand. This campaign brings to attention our high rankings on 2013 NSS Labs tests. 2 Landing Page w/ Lead Form NSS 2013 NGFW SVM 12
Activity Details Email Blast Driving to NSS landing page Download the test results: NSS 2013 NGFW SVM Roadshow Email campaign driving to NSS landing page Download the test results: NSS 2013 NGFW SVM 13
The Leader in NGFW Objective Learn More about the leader in Next Generation Firewall Call to Action Download test results Target Net New Customers Existing Customers 14
Threat Prevention Roadshow in-a-box Follow Up Survey Half Day Seminar Cyber threats are not slowing down in 2013 and organizations are looking for ways to protect themselves and win the cybercrime battle. The roadshow is a way for your customers to learn how to minimize security threats with Check Point solutions. Full Day Seminar Email 3 Presentations Signage 15
Activity Details Banner Ads Email blast inviting customers Email Campaign Host half day or full day seminar 16
Threat Prevention Roadshow in-a-box Objective Get hands-on experience with CP Threat Prevention solutions Call to Action Register for Roadshow Target C-level Net new prospects Existing customers 17
Software Blade Training in-a-box Email Through Software Blade training, you can strengthen relationships and build a more knowledgeable customer base. The activities outlined will help you conduct your own training to enable your customers. Education 4 Registration List 18
Activity Details Banner Ads Advertise training to drive registration Email Campaign Email invitation to drive registration and awareness Training Materials Presentations Agenda Signage Guides 19
Software Blade Training in-a-box Objective Stop the Next Big Attack with Check Point Software Blades Call to Action Register for Training Target System Admins System Engineers Sales Engineers Those seeking CP certification 20
Agenda DAY 1 09:00 Identity Awareness (IA) Software Blade Description, Deployment and Best Practices 10:00 AppControl and URL Filtering (URLF) Software Blades Description, Deployment and Best Practices 11:00 HTTP Inspection 11:30 IA, AppControl, URLF Scenario Labs (technical labs to use the product in different scenarios) 12:00 IA, AppControl, URLF Practical Exercises (real Life deployment scenarios) 12:30 Lunch 01:30 Data Loss Prevention (DLP) Software Blade Description, Deployment and Best Practices 02:30 DLP Software Blade Scenario Labs (technical labs to use the product in different scenarios) 03:30 DLP Software Blade Practical Exercises (Real Life deployment scenarios) 04:30 Licensing and Pricing 05:30 Wrap up and Q&A DAY 2 09:00 Threat Prevention Software Blades Description, Deployment and Best Practices 10:00 Threat Prevention Software Blades Scenario Labs 11:00 Threat Prevention Software Blades Practical Exercises (Real Life deployment scenarios) 12:00 Lunch 01:00 IPS Software Blade Description, Deployment and Best Practices 02:00 IPS Software Blade Scenario Labs (technical labs to use the product in different scenarios) 03:00 IPS Software Blade Practical Exercises (Real Life deployment scenarios) 04:00 IPS Software Blade Best Practices 04:30 Licensing, Pricing and 3D Security Analysis 05:00 Wrap up and Q&A 05:30 Certification Exam 21
Summary Use the activities highlighted to run seamless Check Point campaigns These activities include lead generation, education, and awareness Find editable co-branded materials for your use Utilize Check Point to assist in the planning and implementation of these activities Find these campaign materials and more in Marketing Tools on Check Point s PartnerMap 22
Download Materials Or open campaign page here: https://usercenter.checkpoint.com/usercenter/portal/js_pane/partnermapid,partnerhomeid?pageurl=partners/resources/campaign-central/index.html 23
Thank you! For questions regarding campaigns, co-branding, and marketing materials please contact: Andrea Navarro anavarro@checkpoint.com For other questions about Check Point s products, pricing, or partner programs please contact: Partner Alliance cpp@checkpoint.com 24