How To Get A New Computer For Your Business

Similar documents
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Introducing Intel Small Business Advantage

How To Get A Client Side Virtualization Solution For Your Financial Services Business

2012 Endpoint Security Best Practices Survey

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Intel Identity Protection Technology (IPT)

The Time Is Now. for Platform Refresh

Building a Business Case:

The Attacker s Target: The Small Business

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Global IT Security Risks

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Internet threats: steps to security for your small business

Endpoint Protection Small Business Edition 2013?

Endpoint protection for physical and virtual desktops

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

McAfee epolicy Orchestrator * Deep Command *

Cyber Security Solutions:

Enterprise-Ready Security for Business Clients with Intel Processors

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

The Key to Secure Online Financial Transactions

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

2014 Teradici Corporation.

Tablet computers provide new ways of working and new forms of value. Business Innovation Unleashed

Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration

What is a Managed Service Provider (MSP)? What is the best solution for an MSP?

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Endpoint protection for physical and virtual desktops

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

TECHNICAL VULNERABILITY & PATCH MANAGEMENT

Software Token Security & Provisioning: Innovation Galore!

Seven for 7: Best practices for implementing Windows 7

How To Get A Cloud Service For A Small Business

State of Security Survey GLOBAL FINDINGS

ACER ProShield. Table of Contents

How To Protect Your Data From Being Hacked

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Symantec AntiVirus Enterprise Edition

Reducing the cost and complexity of endpoint management

2012 NCSA / Symantec. National Small Business Study

Introduction (Contd )

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

McAfee SaaS Endpoint Protection Suite

Encryption Buyers Guide

Small and Midsize Business Protection Guide

10 best practice suggestions for common smartphone threats

Windows 8 Pro: For Small Business. Speaker Name, Title

Information Technology

Deeper Levels of Security with Intel Identity Protection Technology

Tiny is the new BIG: Why go thin when you can go Tiny

Symantec Endpoint Protection

Cyber Essentials Scheme

Business Attitudes Toward Cybersecurity 2014

How To Protect Your Endpoints From Attack

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Total Defense Endpoint Premium r12

Windows 7. Qing Liu Michael Stevens

2nd to 4th Generation Intel Core vpro Processor Family

Intel Xeon Processor E Product Family

2011 NATIONAL SMALL BUSINESS STUDY

Symantec Mobile Management 7.1

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Deploying Intel Architecturebased Tablets with Windows* 8 at Intel Tiffany Pany, Intel IT April 2013

Isaku Yamahata CloudOpen Japan May 22, 2014

Your complete guide to Cloud Computing

Five Trends to Track in E-Commerce Fraud

with PKI Use Case Guide

Windows Phone 8 Security Overview

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

AVeS Cloud Security powered by SYMANTEC TM

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Transcription:

Selling Security to SMBs with 4 th gen Intel Core Processors 1

After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is important to small and medium businesses How to recommend solutions to fit your customers needs How to overcome common customer sales objections 2

Understanding Your Customer Needs SMBs buy when Replacing obsolete, lost, or stolen devices Impeded by older systems running business and security applications slowly Older systems are unavailable due to repair issues Employees need mobile devices to use in or outside of the of fice Adding new employees Windows* XP and Of fice* 2003 Support is Ending On April 8, 2014, businesses will no longer receive updates, including security updates, for Windows XP from Microsoft. 3

Business IT Security Risks Security threats continue to rise, increasing risk of data breaches, data loss and lost business 87% of SBs had a security breach in the last year (up from 76% a year ago) 1 83% of SMBs surveyed admitted they have no formal cyber-security plan 2 60% of SBs will close within 6 months of a cyber-attack 3 39% of all targeted cyber attacks in 2012 were aimed at SMBs with <1,000 employees. 4 Focus of attacks: Customer data Bank account information Intellectual property 4

Your Sales Opportunities Here is why NOW is the time to talk to your SMB customers: 2/3 of small businesses are planning to purchase a PC, most small businesses plan to purchase a desktop followed by notebooks 5 60% of small business owners are planning to purchase tablets within the next year 6 47% of small businesses are not aware that Microsoft is ending support for Windows* XP 5 Use your expertise to help customers make the best choice that meets their needs with devices based on Intel Core processors 5

Advise Customers Show your customers how new technology can address critical IT security concerns 6

Security Built-in: Threat Mitigation 4th generation Intel Core processor with built-in security features 7,8 Security Bene fits: Threat Mitigation Identity Protection: Ensures safe access to business network with a hardware-generated one-time password 9 Operating System Protection: Stops malware at boot-up 8 Protects the BIOS from malware and unauthorized updates 8 And with Microsoft Windows* 8 Pro: Keeps documents and emails more secure with enhanced security features like built-in firewall, antivirus, and rootkit malware protection 7

Security Built-in: Data Protection 4th generation Intel Core processor with built-in security features 7,8 Security Bene fits: Data Protection Data Security: Keep business and customer data encrypted without impacting system performance 10 Protection On-the-Go: Provides remote locking capabilities if a device is lost or stolen 8 And with McAfee* SaaS Endpoint Protection Suite : Antivirus protection and centralized, online management console to monitor all systems, regardless of location 8

Innovation Rede fined New Intel Core processors bring amazing innovations with built-in security protection Data Security Keep business and customer data encrypted 9 Identity Protection Hardware-protected onetime password 7 O/S Protection Stops malware at boot-up and protects the BIOS from unauthorized updates 8 Protection On-The-Go Remote locking capabilities if a device is lost or stolen 10 Business Performance For a computing experience like never before Ultra-thin Designs Enabling thinner, lighter & more beautiful designs; creating the WOW factor that pulls people in High Quality Touchscreens Rich multi-touch displays provide a WOW experience to the user 9

Recommend the Best Solution Show customers how new devices built with Intel Core processors will meet their needs now, and continue to grow with them in the future 10

Right Device for the Task 4 th gen Intel Core processor-based form factors Tablet 2 in 1 Ultrabook Clamshell All-in-One PC Integrate seamlessly into your business with more peripheral and driver support with compatibility for all x86 applications. Versatility for business a tablet when you want it, a laptop when you need it. A touch enabled business laptop that has the performance to keep up with your business. Space saving designs and multitouch screens. An Intel Architecture-based Device for Every Small Business Need 11

Recommend the Right Device For business security protection Built-in Security SMB uses Recommendation Identity Protection O/S Protection Encryption On-the-Go Requires access to business and customer information on the go Collaborative tools and video conferencing Multiple demanding applications open at same time Presenting to customers and suppliers Requires access to business and customer information on the go Collaborative tools and video conferencing Customer database management Complex financial spreadsheets Need for more GB storage Ultrabook 2 in 1 Ultrabook Clamshell All-In-One PC With Intel Inside and Windows* 8 Pro Get better protection of business data and devices 12

Overcome Buyer Objections Have an open conversation with your customers and address their needs with proof points 13

The Sales Conversation Why would the end of life of Microsoft XP affect my business security? Running your company on outdated technology puts your business at risk: Support for Windows* XP and Of fice* 2003 is ending on April 8, 2014. You will no longer receive updates, including Security updates, for Windows XP from Microsoft. When no longer receiving security updates, PCs will be vulnerable to harmful viruses, spyware, and other malicious software, which can steal or damage your business data and information. 14

The Sales Conversation The safety of our business and customer data is a top concern. How can we make sure our employees can take devices out of the of fice safely? With the latest mobile devices, such as an Ultrabook, data is safer and more secure than ever before with built-in security features that: Guard systems and data from malware attacks 8 Provide secure access to the company network 9 Help protect against identity theft 8 15

The Sales Conversation My old PC is fine - why should I buy a new one? Security threats continue to rise, and older PCs do not have the latest security features. This increases the risk to your business for data loss. Did you know that 87% of small businesses had a security breach in the last year 1? Intel Core processor-based devices provide you the latest security protection built-in to: Stop malware attacks at boot-up 8 Ensure secure access to your network 9 Keep documents and email more secure with the added security features of Windows* 8 Pro And with the McAfee* SaaS Endpoint Protection Suite, all systems can be monitored, regardless of location, with the online management console. 16

Give Your Small Business Customers Security Protection 1. Understand the needs of your customer: Older PCs are more vulnerable to attacks and less reliable Need for new ways to work in and out of the of fice Windows* XP and Of fice* 2003 support is ending 2. Advise them on how new technology can support the way they want to do business: Security protection built-in New computing experience and form factors Intel Inside and Windows* 8 Pro - better protection of business data and devices McAfee* SaaS Endpoint Protection Suite - monitor all systems, regardless of location 3. Recommend the best solution for their needs with devices built with Intel technology. Meeting the Emerging Needs of the Business User 17

Legal Content 1. Information Security Breaches Survey 2013. UK https://www.gov.uk/government/uploads/system/uploads/attachment_data/ file/200455/bis-13-p184-2013-information-security-breaches-surveytechnical-report.pdf 2. Forbes, Why Investing In Online Security Makes Sense For Small To Medium-Size Businesses, Dec,18, 2012 http://www.forbes.com/sites/capitalonespark/2012/12/18/the-best-offense-is-a-good-defense-why-investing-in-online-security-makes-sense-for-smbs/ 3. Fox Small Business Center: Most Small Businesses Don t Recover from a Cyber-Attack. http://smallbusiness.foxbusiness.com/technology-web/2013/03/21/most-small-businesses-dont-recover-from-cybercrime 4. 2013 Internet Security Threat Report, Volume 18, Symantec http://www.symantec.com/security_response/publications/threatreport.jsp 5. Techaisle Whitepaper Small Business PC Refresh Study May 2013 www.techaisle.com 6. A Look at Mobility for Small Businesses, Aug 24, 2011, US based. http://www.att.com/gen/press-room?pid=17789 7. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon con figuration. Consult your system manufacturer for more details. For more information, see http://security-center.intel.com/ 8. (Intel PPT) No computer system can provide absolute security. Requires an enabled Intel processor, enabled chipset, firmware, software and may require a subscription with a capable service provider (may not be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more information, visit http://www.intel.com/go/anti-theft.. Consult your system manufacturer and/or software vendor for more information. 9. (Intel IPT) No computer system can provide absolute security. Requires an Intel Identity Protection Technology-enabled system, including an enabled Intel processor, enabled chipset, firmware, software, and Intel integrated graphics (in some cases) and participating website/service. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com/. Consult your system manufacturer and/or software vendor for more information. 10. (Intel AES-NI) Intel AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-intel software to execute the instructions in the correct sequence. AES-NI is available on Intel processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/. 18

2013 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Core, Intel Inside, and Ultrabook are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. 19