Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cisco Threat Scan Proof of Value (PoV) Programme

Similar presentations


Presentation on theme: "Cisco Threat Scan Proof of Value (PoV) Programme"— Presentation transcript:

1 Cisco Threat Scan Proof of Value (PoV) Programme
Start benefiting today

2 Do your customers know what’s happening in their networks?
Now you can help to protect what they can’t see. The ASA Family will gain visibility and deeper intelligence for their business. Understand how you help them to reduce risk, give you competitive advantage and make security a growth engine for your business.

3 Cisco Threat Scan PoV Programme Guide
This guide will help you to take advantage of this outstanding opportunity to increase your Cisco Security business and help you protect your customers network. 8 Winning Factors Boost revenue for your business Offer Cisco’s revolutionary NGFW (Next Generation Firewall) Allow your customers to gain visibility and deeper intelligence with the ASA 5506 Help your customers to cut costs and complexity; increase security (compared with traditional solutions) Let them “Try before they buy” with a 2-week FREE trial All you need to do is install the ASA at your customers site Generate a comprehensive threat attack report after 2-weeks Formalize an offer to purchase the appropriate ASA, FirePOWER license and Service contract

4 The Guide covers: The ASA Family Why run the Cisco PoV?
How to market the Cisco Threat Scan PoV Programme How to run the Cisco PoV programme Target pain points Why is the ASA revolutionary Common objection handling Technical support Reporting Assessment-Led Selling Program – opportunity for extra discount

5 The ASA Family Threat defence solutions are often complex, costly and can be hard to manage. Cisco’s ASA family with FirePOWER software offers more. The industry’s first adaptive, threat-focused next-generation firewall that’s intelligent, simple, intuitive, cost-effective and incredibly secure. The winning factors of the ASA family Experience the revolutionary next-generation firewall Visibility and deeper security intelligence with the ASA Increase security (compared with traditional solutions) Offer a “Try before you buy” installation Comprehensive threat attack report after 2 weeks No obligation to purchase A class-leading, intelligent, threat-centric solution that’s simple, intuitive, cost-effective and incredibly secure. ‘Since May 2015, Cisco has reduced the median time to detection (TTD) of known threats in our networks to about 17 hours —less than one day. This far outpaces the current industry estimate for TTD, which is 100 to 200 days.’

6 Lower cost and complexity
As well as delivering the highest levels of threat defence, the Cisco ASA 5506 offers businesses unrivalled cost and control benefits. By consolidating multiple security layers in a single platform, the ASA 5506 with FirePOWER Services helps customers: Reduce the need to buy multiple security solutions from different vendors Eliminate the complexity and drain on resources associated with managing disconnected solutions Streamline operations by correlating threats to better detect and prioritise threats based on their risk Automate security processes to help speed remediation against changing threat conditions

7 Want to know more about the ASA 5506? Watch these short videos
Introducing Cisco ASA with FirePOWER Services: Defend Against Today’s Attacks:

8 2. Why run the Threat Scan PoV?
The short answer: it’s because truly effective threat defence is more in demand than ever. What’s more, figures* show that, today, businesses are seeking powerful but flexible tools for securing networks that do not place a burden on their smaller staffs or relatively conservative budgets. This is precisely what Cisco’s ASA 5506 offers. Its unique combination of benefits are massive. Our Threat Scan PoV programme gives your customers the perfect opportunity to see these benefits for themselves. As you’ll see, the Threat Scan PoV programme is simple to run and completely free for your customers. So you should expect take up to be high, and after the (2-week) trial, many will purchase the system. Why? Because they will see the unrivalled intelligence the ASA/Reporting provides. The result? Unbeatable threat defence and a significant boost in Security revenues for your business. Everyone, as they say, is a winner! * Cisco ASR 2015, p40

9 3. How to market Cisco’s Threat Scan PoV Programme
We will provide you with a suite of resources to promote the programme to your customers, including customisable s, brandable web banners and a social media kit including tweets, posts and images. These will Be easily customisable for your brand Contain a clear explanation of the offer and benefits to your customers Provide downloadable assets to help you promote the offer Contain a simple form for you to request a POV on our Threat Scan landing page

10 4. How to run the Threat Scan PoV programme
We will supply you with the ASA product. The equipment provided by you to your customer will (usually) be the Cisco ASA 5506 or 5508 with FirePOWER software. This will be installed by you in monitor-only mode and will not be active on the network. The report, profiling network traffic over 14 days, will be generated by Cisco FireSIGHT. We will support you remotely or on-site. You will request a PoV from your us, your distributor The facility to register a PoV request on the Threat Scan landing page, All PoV requests must be linked to a qualified customer opportunity If the ASA is purchased after the 14-day period, we will invoice you. If it’s not purchased, you can return the unit to us as per our returns policy You provide your customer with a Cisco firewall solution, free, for a 2-week period After this, the system generates a threat attack report demonstrating its value

11 5. Target pain points There is a Cisco ASA model for businesses of all sizes, but the ASA 5506 is particularly suited to SMBs (< 499 employees)1. The offer is essentially sector-independent, as all organisations are at risk of cyber threats. In 2015 there was a significant increase in the level of outsourcing of security services by SMBs2. Though most businesses are aware of the need for threat protection, many do not implement a truly effective solution. The most common reasons are: Cost (management and TCO) System complexity Lack of expertise Requirement for multiple vendors and systems Need to constantly update the solution Unable to offer comprehensive protection The ASA 5506 addresses all of these pain points. 1/2. Taken this from the 2016 ASR

12 8. Why the ASA 5506 is revolutionary
Traditional security solutions ASA 5506 with FirePOWER Services Insufficiently secure The industry’s first threat-centric solution offering full malware and intrusion protection. Overly complex A simplified approach offering fully integrated threat protection and easy management. Costly A simpler, integrated system that reduces cost and complexity, resulting in much lower TCO. Hard to manage Simplified management and control options, requiring minimal expertise. Time consuming to keep up to date Dynamically responds to threats; grows with the business with minimum intervention.

13 7. Common objection handling
Objection: We already have a solution in place A. It’s likely to be insufficiently secure, hard to manage and costing you more than it needs to. The Cisco solution is unique in its ability to simplify management, cut costs and provide the very highest levels of security . In addition the Threat Scan PoV can check whether your current solution is actually protecting you with the Attack Risk Report you will receive at the end of the 2-week trial. Objection: We don’t need a solution A. Cybercrime is a real threat and all businesses of all sizes are targeted. Internally and externally. Unless you keep your security systems fully up to date, your business is at risk. Objection: It’s too much hassle to change our solution A. The trial will cost you nothing in terms of time or money. We will install the unit for the trial and provide you with the relevant support if you decide to purchase or remove it if you don’t. Following the trial, we will provide an Attack Risk Report for your network which may highlight security risks that you are not be aware of but that are critical to business security. Objection: It won’t be an improvement on our current solution A. This is a next-generation firewall. Third-party tests have shown that it out-performs all comparable solutions. From our experience we find vulnerabilities that are not remediated by other products.

14 8. Technical support We will support you on the delivery of the Cisco Threat Scan PoV. This will cover installation and configuration of the ASA, as well as how to generate the report and present the information to your customers. The report will include the following: Executive summary Assessment results Business risk of attacks Recommendations

15 9. Reporting We will support you to identify suitable customers to maximise the return of a Threat Scan installation. For each Threat Scan report generated, you are required to provide a copy of the Attack Risk Report front page – this allows us to track on the end user installations completed and to manage the return or purchase of the ASA. If the customers decides to purchase an ASA, we will help to register to opportunity to take advantage of the most favourable Cisco offer.

16 10. Assessment-Led Selling Program – opportunity for extra discount
The Assessment Led Selling Program rewards you with a 4% incremental discount for registering customer opportunities that are a direct result of a Threat Scan PoV installation. Full details can be found here. The program works as follows: Complete the Threat Scan installation To qualify, the $ opportunity must be more than $25,000 global list price Register the opportunity in Cisco Commerce Workspace here The request is normally accepted or rejected within 5 business days If accepted, you will receive 4% additional discount Further discount may be available via the following programs - Hunting (OIP) - Solution Led Selling (SIP) - Trade Migration Program (Trade In) Check here for more information Terms and conditions apply

17 Copyright 2017 Ingram Micro - all rights reserved.


Download ppt "Cisco Threat Scan Proof of Value (PoV) Programme"

Similar presentations


Ads by Google