Selling Security to SMBs with 4 th gen Intel Core Processors 1
After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is important to small and medium businesses How to recommend solutions to fit your customers needs How to overcome common customer sales objections 2
Understanding Your Customer Needs SMBs buy when Replacing obsolete, lost, or stolen devices Impeded by older systems running business and security applications slowly Older systems are unavailable due to repair issues Employees need mobile devices to use in or outside of the of fice Adding new employees Windows* XP and Of fice* 2003 Support is Ending On April 8, 2014, businesses will no longer receive updates, including security updates, for Windows XP from Microsoft. 3
Business IT Security Risks Security threats continue to rise, increasing risk of data breaches, data loss and lost business 87% of SBs had a security breach in the last year (up from 76% a year ago) 1 83% of SMBs surveyed admitted they have no formal cyber-security plan 2 60% of SBs will close within 6 months of a cyber-attack 3 39% of all targeted cyber attacks in 2012 were aimed at SMBs with <1,000 employees. 4 Focus of attacks: Customer data Bank account information Intellectual property 4
Your Sales Opportunities Here is why NOW is the time to talk to your SMB customers: 2/3 of small businesses are planning to purchase a PC, most small businesses plan to purchase a desktop followed by notebooks 5 60% of small business owners are planning to purchase tablets within the next year 6 47% of small businesses are not aware that Microsoft is ending support for Windows* XP 5 Use your expertise to help customers make the best choice that meets their needs with devices based on Intel Core processors 5
Advise Customers Show your customers how new technology can address critical IT security concerns 6
Security Built-in: Threat Mitigation 4th generation Intel Core processor with built-in security features 7,8 Security Bene fits: Threat Mitigation Identity Protection: Ensures safe access to business network with a hardware-generated one-time password 9 Operating System Protection: Stops malware at boot-up 8 Protects the BIOS from malware and unauthorized updates 8 And with Microsoft Windows* 8 Pro: Keeps documents and emails more secure with enhanced security features like built-in firewall, antivirus, and rootkit malware protection 7
Security Built-in: Data Protection 4th generation Intel Core processor with built-in security features 7,8 Security Bene fits: Data Protection Data Security: Keep business and customer data encrypted without impacting system performance 10 Protection On-the-Go: Provides remote locking capabilities if a device is lost or stolen 8 And with McAfee* SaaS Endpoint Protection Suite : Antivirus protection and centralized, online management console to monitor all systems, regardless of location 8
Innovation Rede fined New Intel Core processors bring amazing innovations with built-in security protection Data Security Keep business and customer data encrypted 9 Identity Protection Hardware-protected onetime password 7 O/S Protection Stops malware at boot-up and protects the BIOS from unauthorized updates 8 Protection On-The-Go Remote locking capabilities if a device is lost or stolen 10 Business Performance For a computing experience like never before Ultra-thin Designs Enabling thinner, lighter & more beautiful designs; creating the WOW factor that pulls people in High Quality Touchscreens Rich multi-touch displays provide a WOW experience to the user 9
Recommend the Best Solution Show customers how new devices built with Intel Core processors will meet their needs now, and continue to grow with them in the future 10
Right Device for the Task 4 th gen Intel Core processor-based form factors Tablet 2 in 1 Ultrabook Clamshell All-in-One PC Integrate seamlessly into your business with more peripheral and driver support with compatibility for all x86 applications. Versatility for business a tablet when you want it, a laptop when you need it. A touch enabled business laptop that has the performance to keep up with your business. Space saving designs and multitouch screens. An Intel Architecture-based Device for Every Small Business Need 11
Recommend the Right Device For business security protection Built-in Security SMB uses Recommendation Identity Protection O/S Protection Encryption On-the-Go Requires access to business and customer information on the go Collaborative tools and video conferencing Multiple demanding applications open at same time Presenting to customers and suppliers Requires access to business and customer information on the go Collaborative tools and video conferencing Customer database management Complex financial spreadsheets Need for more GB storage Ultrabook 2 in 1 Ultrabook Clamshell All-In-One PC With Intel Inside and Windows* 8 Pro Get better protection of business data and devices 12
Overcome Buyer Objections Have an open conversation with your customers and address their needs with proof points 13
The Sales Conversation Why would the end of life of Microsoft XP affect my business security? Running your company on outdated technology puts your business at risk: Support for Windows* XP and Of fice* 2003 is ending on April 8, 2014. You will no longer receive updates, including Security updates, for Windows XP from Microsoft. When no longer receiving security updates, PCs will be vulnerable to harmful viruses, spyware, and other malicious software, which can steal or damage your business data and information. 14
The Sales Conversation The safety of our business and customer data is a top concern. How can we make sure our employees can take devices out of the of fice safely? With the latest mobile devices, such as an Ultrabook, data is safer and more secure than ever before with built-in security features that: Guard systems and data from malware attacks 8 Provide secure access to the company network 9 Help protect against identity theft 8 15
The Sales Conversation My old PC is fine - why should I buy a new one? Security threats continue to rise, and older PCs do not have the latest security features. This increases the risk to your business for data loss. Did you know that 87% of small businesses had a security breach in the last year 1? Intel Core processor-based devices provide you the latest security protection built-in to: Stop malware attacks at boot-up 8 Ensure secure access to your network 9 Keep documents and email more secure with the added security features of Windows* 8 Pro And with the McAfee* SaaS Endpoint Protection Suite, all systems can be monitored, regardless of location, with the online management console. 16
Give Your Small Business Customers Security Protection 1. Understand the needs of your customer: Older PCs are more vulnerable to attacks and less reliable Need for new ways to work in and out of the of fice Windows* XP and Of fice* 2003 support is ending 2. Advise them on how new technology can support the way they want to do business: Security protection built-in New computing experience and form factors Intel Inside and Windows* 8 Pro - better protection of business data and devices McAfee* SaaS Endpoint Protection Suite - monitor all systems, regardless of location 3. Recommend the best solution for their needs with devices built with Intel technology. Meeting the Emerging Needs of the Business User 17
Legal Content 1. Information Security Breaches Survey 2013. UK https://www.gov.uk/government/uploads/system/uploads/attachment_data/ file/200455/bis-13-p184-2013-information-security-breaches-surveytechnical-report.pdf 2. Forbes, Why Investing In Online Security Makes Sense For Small To Medium-Size Businesses, Dec,18, 2012 http://www.forbes.com/sites/capitalonespark/2012/12/18/the-best-offense-is-a-good-defense-why-investing-in-online-security-makes-sense-for-smbs/ 3. Fox Small Business Center: Most Small Businesses Don t Recover from a Cyber-Attack. http://smallbusiness.foxbusiness.com/technology-web/2013/03/21/most-small-businesses-dont-recover-from-cybercrime 4. 2013 Internet Security Threat Report, Volume 18, Symantec http://www.symantec.com/security_response/publications/threatreport.jsp 5. Techaisle Whitepaper Small Business PC Refresh Study May 2013 www.techaisle.com 6. A Look at Mobility for Small Businesses, Aug 24, 2011, US based. http://www.att.com/gen/press-room?pid=17789 7. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon con figuration. Consult your system manufacturer for more details. For more information, see http://security-center.intel.com/ 8. (Intel PPT) No computer system can provide absolute security. Requires an enabled Intel processor, enabled chipset, firmware, software and may require a subscription with a capable service provider (may not be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more information, visit http://www.intel.com/go/anti-theft.. Consult your system manufacturer and/or software vendor for more information. 9. (Intel IPT) No computer system can provide absolute security. Requires an Intel Identity Protection Technology-enabled system, including an enabled Intel processor, enabled chipset, firmware, software, and Intel integrated graphics (in some cases) and participating website/service. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com/. Consult your system manufacturer and/or software vendor for more information. 10. (Intel AES-NI) Intel AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-intel software to execute the instructions in the correct sequence. AES-NI is available on Intel processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/. 18
2013 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Core, Intel Inside, and Ultrabook are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. 19