President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Building the case for Windows 8.1 Flexible Workstyle deployment Windows 8.1 Business Value Workshop Microsoft Consulting Services can help you build the.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Backup Modernization with NetBackup Appliances
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Discover the Latest in Partner Training for Solutions Specialists Ian Reed Sr. Director, Partner Enablement Dana Hutanu Director, Partner Enablement WWA&C.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Windows 7 & Office 2010 Glenn Osako Partner Territory Manager West Region SMB Microsoft Corporation Best productivity on a modern foundation.
GPS 2011 Slide - 1 THE CERTIFICATION REVOLUTION HOW IT INDUSTRY CERTIFICATION HAS REVOLUTIONIZED THE AMERICAN SCHOOL SYSTEM Denise Spence, Dunbar High.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
End User License Agreement Permission to use and redistribute this Document is granted, provided that (1) the below copyright notice appears in all copies.
Next Generation Partner Program Fady Iskander Symantec Corp.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Build Your Business by making the Right Connections.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
President’s Forum and WSML 2012 SYMSTRAT 01: Enterprise Sales Conversations for Cloud Computing Dave Elliott, Dan Graves, Dan Lamorena, Mike Reynolds,
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
FY16 Q3 Enterprise West QBR
Windows Phone Intended use:These slides tell the business story with information on mobilizing business apps in Windows Phone 7.5 (code named “Mango”)
2011 EMEA. Larry Orecklin Vice President, Worldwide Specialist Sales Microsoft Corporation.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. The Value Review.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Vodafone Business Cloud
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Deployment Planning Services
Office 365 Security Assessment Workshop
Deployment Planning Services
EMS Everywhere Workshop Overview February 2017
Deployment Planning Services
Understanding EU GDPR from an Office 365 perspective
Deployment Planning Services
Instructional slide to Partner: REMOVE BEFORE PRESENTING TO CUSTOMER
Enterprise-grade solutions for a mobile-first, cloud-first world
Microsoft Dynamics Planning Services
Microsoft Education Solutions - Partner Conversation Flow
Microsoft 365 Education – Partner Quick Reference Card
Seamlessly add video into O365 app or other apps with Microsoft Stream
Discover apps to help drive your business on Microsoft AppSource
Seamlessly add video into O365 app or other apps with Microsoft Stream
Learn how to use and customize the Dynamics AX interactive help system
Grow Your Business with Office 365 Yammer: Working Social
Bulloch Information Session
Microsoft Data Insights Summit
How to deliver a Microsoft Cloud Workshop
Presentation transcript:

President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1

2 President’s Forum and WSML 2012 Course Introduction The rapid and constant evolution of the Mobile space results in an ever changing set of business challenges. How can you harness this changing landscape to drive new opportunities? In this course you will experience how to have solution-based conversations for ““Bring Your Own Device” (BYOD) and “Critical Data Protection” and walk away armed with the tools and knowledge necessary to practice these conversations.

Devices Corporate-OwnedPersonally-Owned Managed Unmanaged Future Devices M Corp PCs 300M Smartphones 15M Tablets M Corp PCs 293M Personal PCs 819M Smartphones 116M Tablets Consumerization is Driving Disruption 3 Embracing the Personally-Owned & Unmanaged – “BYOD” Relevent Devices Today Full Control Info/App Access Only Traditional Focus Evolving Focus Data Sources: Gartner, & IDC

1.Recognize how the IT trend conversation flows into related solution conversations. 2.Learn where to find and how to use key conversation tools and resources. 3.Gain competency by practicing relevant conversations with your peers. 4.Leverage experience and knowledge gained to train sales teams and deliver targeted customer value. Course Objectives 4 President’s Forum and WSML 2012

Course Agenda President’s Forum and WSML 2012 Set the stage for Solution Conversations – 5 min 1 Demonstrate Solution Conversations – 25 min 2 Solution Conversation Workshop – 75 min 3 Workshop Debrief – 10 min 4 Recap and Close – 5 min 5 5

President’s Forum and WSML Mobile Solution Conversation Demonstrations

Bring Your Own Devices (BYOD) 7 Device Management SMM & Athena Data Loss Prevention DLP for Mobile Device Security Mobile Security Secure Content Management Norton Zone App Security & Management Nukona Enterprise Management SCCM & SMP Enterprise & Cloud Access Control O3 & mPKI BYOD Corporate Owned

Critical Data Protection 8 Device Management SMM & Athena Data Loss Prevention DLP for Mobile Device Security Mobile Security Secure Content Management Norton Zone App Security & Management Nukona Enterprise Management SCCM & SMP Enterprise & Cloud Access Control O3 & mPKI BYOD Corporate Owned

President’s Forum and WSML Solution Conversation Workshop Overview

Participant “Solution Kits” President’s Forum and WSML Each Participant should have the following: 2-page Mobile Trend Conversation Guide 2-Page Consumerization: BYOD/BYOA Conversation Guide 2 Page Critical Data Protection Conversation Guide 1-page Spot Accreditation Checklist for Solution Conversations  Please note that you will not be accredited – but may leverage for context 3 Conversation Graphics (two solution / one trend) Feel free to whiteboard the solution using the paper & pens provided.

Workshop Agenda President’s Forum and WSML ActivityWho LeadsTimeSupporting Materials Workshop: choose one of the two Conversations – Study & prepare to present Table Teams30 min Conversation Demonstrations, Experience, Solution Kits, blank paper Break into pairs and present back to each other (play customer when not presenting) All Table team participants 30 minSolution Kit, blank paper With the aid of your Table Lead discuss the exercise & Best Practices for Roll-out Table Lead and all participants 15 minTable Lead Feedback form to capture people’s input

Workshop Instructions Start by reviewing the “Table Instructions”. Pick a “Table Lead” who will keep the table on track and conduct a debrief following the exercise. Pick the Solution Conversation from the two demonstrated that you will learn and role-play to a partner at your table. Use the overall Trend Conversation Guide as background, and a way to start the conversation. Pick a partner at your table to practice and role-play your Solution Conversation. Keep to time per the agenda and Table Instructions. After practicing the Solution Conversation with your partner, provide feedback to your Table Lead per their guidance. President’s Forum and WSML Note to keep this slide up as groups go to their workshop

President’s Forum and WSML Wrap-up

Rolling this out to your Teams President’s Forum and WSML Solution Kits can be accessed via the “Cascade Kit” – All Conversation Guides and Supporting Slides included Additional Content in the Cascade Kit will include: – Manager Guidance & Next Steps – how to Accredit your teams – Accreditation Checklist FY13 Sales Conversation Materials (for additional information and resources click on the Trend below) MobileCloudVirtualizationThreat Landscape Information Explosion Overall Trend Conversation Guide Conversation Slides Overall Trend Conversation Guide Conversation Slides Overall Trend Conversation Guide Conversation Slides Overall Trend Conversation Guide Conversation Slides Overall Trend Conversation Guide Conversation Slides Redefining Mobile Protection Conversation Guide Conversation Slides Building Resilient Private Clouds Conversation Guide Conversation Slides Business Critical Virtualization Conversation Guide Conversation Slides Malicious Insider Conversation Guide Conversation Slides Better Backup for All Conversation Guide Conversation Slides Securing Public Clouds Conversation Guide Conversation Slices Security Solution for Virtualization Conversation Guide Conversation Slides Advanced Targeted Threats Conversation Guide Conversation Slides Information Governance Conversation Guide Conversation Slides Solution Accreditation Form Manager Guidance for Accrediting their Teams Accreditation Tracking Spreadsheet Matrix of all Trend and Solution Conversation material is on the SCORE Strategic Trends homepage; linked to Cascade Kit

Closing Comments President’s Forum and WSML You should now be able to: 1.Recognize how the trend conversation flows into related solution conversations. 2.Know where to find and how to use key conversation tools and resources. 3.Speak more competently about the solutions based on practicing the conversation with your peers. 4.Leverage experience and knowledge gained to train sales teams and deliver targeted customer value.

Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. President’s Forum and WSML

End of Presentation 17