Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Summer is ICE Season! How this is the perfect time to sell the ICE.

Slides:



Advertisements
Similar presentations
Company Name Sample Template Presenter Name
Advertisements

Distribution Technology…Oxymoron or True Competitive Advantage? Steve Weber Program Director.
Business Continuance Disaster Recovery Planning Preparing for the Unexpected Presented by Team TELUS and David Chalk of Chalk Media Kevin to introduce.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 JUNIPER NETWORKS Moving up the Partner Program.
Upgrade services, hosting & business continuity Simpler is better: Delivering IT as a Service John Allen: Business Development Manager Anix Managed Services.
Tomorrows Technology For Todays Business. McAfee.com Background Internets largest consumer ASP Online security, privacy and PC management services Largest.
ACT Canada TDM Summit Halifax| October, 2008 Telework Pilot : The City of Calgary.
Usenet Training May 4-7, 2004 Orlando, FL At Disneys Coronado Spring Resort.
Cost-Effective Software Deployment
Pamela Norris Project Manager Kraft Kennedy & Lesser, Inc.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
June 19, 2007Role of HAZUS-MH in Geospatial Preparedness The Role of HAZUS-MH in Geospatial Preparedness: A Perspective from the DHS Office of the Chief.
IP PABX Product Another Fine. One World, One PBX.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
| Copyright © 2009 Juniper Networks, Inc. | 1 ICE (In Case of Emergency) for SA Series SSL VPN Appliances Overview.
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
TECHNOLOGY ROADMAP FOR CPA FIRMS IN 2011 By: Andrew Spottswood.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
1 Effective, secure and reliable hosted security and continuity solution.
Palo Alto Networks Jay Flanyak Channel Business Manager
2-1. McGraw-Hill/Irwin Copyright © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2 Money Management Skills.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter Eleven Cost Behavior, Operating Leverage, and CVP Analysis.
© 2009 VMware Inc. All rights reserved Confidential Overview: vCenter Server Heartbeat Q
How to commence the IT Modernization Process?
Strategy Review Meeting Strategy Review Meeting
HP Virtual Tape Library (VTL) Appliance Powered by IPStor Ross Parker – Sales Director, Northern Europe.
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Our Technology Comes with People Disaster Recovery Planning Glenn Lytle, Vice President Sales, Lumos Networks July 28,
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Norman SecureSurf Protect your users when surfing the Internet.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
SmartSynch NOTE: The representations as to SmartSynch’s offerings are those of SmartSynch and Verizon Wireless makes no representation as to their accuracy.
Centralized Management Services Dawn Malinowski Wisconsin Public Power Inc Sun Prairie, WI.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
SEEP Annual Conference November 2008 Fundraising Business Plan Pitch Outline Kim Alter Will Morgan November 4, 2008.
CRISIS-MANAGEMENT PLANNING Every business should develop a Security Crisis-Management team.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
MOBILE PHARMACY Harriet Carter – October 12, 2014 Wilmington University - EDT 6005.
Luminex Virtual Tape Storage System Brian Sullivan Director of Computer Operations Broward County Public Schools 1.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Why Small Businesses needs Managed IT Services in Vancouver, BC?
Head in the Clouds, feet on the ground David Massey Chief Technology Officer.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Copyright 2016, Techarex Networks LLC. | | Call Toll-Free : Benefits Of Hosted QuickBooks For CPA Firms.
Barracuda Subscription and Support Upsell Opportunities
Technology and Business Continuity
Work on the Fly Hosted Solutions for Timeslips Customers
Providing Application High Availability
CIS 333 Course Experience Tradition/ snaptutorial.com
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
Virtual Private Network
Cloud Consulting Services and Solutions
Agenda The current Windows XP and Windows XP Desktop situation
Capitalize on Your Business’s Technology
Presentation transcript:

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Summer is ICE Season! How this is the perfect time to sell the ICE solution on the Secure Access SSL VPN

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 Hurricane Season is June 1 – November 30: A great time to talk about ICE

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 3 What is ICE: In Case of Emergency A license on Secure Access: one time cost #1 SSL VPN: all the benefits of the industry leading solution Selling from a position of strength Allows instant, temporary addition of max number of users to a Secure Access appliance 8 weeks Turns on all features Developed to address market need of immediate network access due to an emergency situation Users only need to know how to use a web browser Addresses the remote access portion of a Disaster Recovery (DR) plan It is available on the SA4000 and SA6000 SA4000-ICE list price is $18,000 SA6000-ICE list price is $30,000 On/ off switch: use only for as long as you need Flexibility and control

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 But its not just Hurricanes that can close the office

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 Use Weather related and other downtime causing issues to start ICE conversations Hurricanes Tornadoes Floods Earthquakes Snow storms Pandemics Terrorist attacks User Errors Software errors Viruses Other attacks Transit Strikes Maintenance Component failure Are your customers prepared for downtime?

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 ICE can lead to more revenue from Disaster Recovery Services Business Impact Analysis Risk Assessment Mitigation Strategy Process Design Business Continuity and Disaster Recovery Planning Testing Emergency Response Management DR Program Management A 2006 AT&T study found many businesses lack in house expertise on Business Continuity/ DR Planning

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 ICE can lead to more revenue from hardware sales DX Up to 30% increase in SA performance SA clusters need a load balancer so attach a DX FW Most common cross sell with SA, great for redundancy IDP Coordinated threat management means SA and IDP work together to identify and isolate threats Routers Great for redundancy RSA tokens 2 factor authentication, now available as soft tokens Protects their current investment

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 ICE: Easy to Activate, Easy to Track Easy activation Easy to track

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 Juniper s Networks SSL VPN Leadership Source: Gartner (December 2006) Gartner Magic Quadrant for SSL VPN North America, 4Q06 The Forrester Wave: SSL VPN Appliances Q Source: 2006 Forrester Wave Report 10,000 Secure Access Customers = Juniper is the clear choice

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 When do Customers Buy ICE? Pipe burst in Texas HQ and offices were closed Got ICE P.O. the next day Transit strike in NYC Many customers called us Hurricanes in Florida closed offices for weeks Customers immediately saw the value of ICE Snowstorms in the Northeast Customers use ICE in 1-2 day increments Some customers only buy ICE Fills a gap in their DR plan Some customers look at ICE but buy Secure Access for regular use Heard the ICE pitch and realized how good SA is

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Case Study: Washington, DC Law Firm Office closed due to location in DC and weather Two SA-4000 High Availability Clusters Production – 100 simultaneous users Disaster recovery – 50 simultaneous users ICE license on each cluster Increases simultaneous user count to 1000 Enables Secure Meeting feature Secure Access for all users when office is hard to reach –Snow days –True emergencies Monitoring tells administrator when to enable ICE.

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 12 Case Study: County in California Security Mgr uninterested for 9 months due to lack of upgrade budget Had Cisco IPSec VPN for remote access County Emergency Preparedness Project = Budget + County Executive Sponsorship Brought in by County Executive to discuss ICE with network security team Entire Security Team attended and got it Solved both daily remote access needs + emergency access needs with SA/ICE solution Increased deal size to $160K 2 SA6000SPs, ICE, SA2000 Security Team is now Championing Juniper Pushing IDP, FW, Routers, WX, DX Used ICE solution and Secure Access to get in Sold ICE at the Executive Level to build executive support + budget

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 13 Who to Target, Questions to Ask Titles Director/Manager Network Ops Director/Manager IT Security Director/ Manager of Risk or Emergency Preparedness Ask who is in charge of remote access, COOP Planning Questions to ask What challenges do you face when trying to provide network access during an emergency? How does your Disaster Recovery plan account for standby sites being unavailable? How important is it to find a solution that maintains employee productivity even when they cant use their work computers? How do prepare for weather related outages?

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 14 Recap ICE is a license on Secure Access SSL VPN The #1 SSL VPN: selling from a position of strength ICE provides instant remote access On/off switch = flexibility and control ICE is a way into accounts SSL is always a good way in ICE leads to more revenue Lots of services revenue in DR