+ All Categories
Home > Documents > Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense –...

Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense –...

Date post: 27-May-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
11
As part of Symantec’s mission to Engage, Enable, and Support Channel Partners we’ve created focused Sales Plays. Each play is designed to quickly provide an opportunity overview by solution, that targets increased revenue potential for you our partners. Within each sales play you’ll find product overview, use cases, sell- ing scenarios, links to enablement, marketing and campaign assets to help drive awareness with your customers. Symantec Sales Play Email Security.cloud
Transcript
Page 1: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

As part of Symantec’s mission to Engage, Enable, and Support Channel Partners we’ve created focused Sales Plays.

Each play is designed to quickly provide an opportunity overview by solution, that targets increased revenue potential for you our partners.

Within each sales play you’ll find product overview, use cases, sell-ing scenarios, links to enablement, marketing and campaign assets to help drive awareness with your customers.

Symantec Sales PlayEmail Security.cloud

Page 2: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

MenuOverviewWhy is email today’s No. 1 threat vector? Email is ubiquitous, impersonating a credible sender is simple, unaware users are easily fooled, and email attacks make cyber criminals a lot of money with little effort. Where once we were concerned with basic spam and phishing emails, now we’re on guard for highly targeted and sophisticated attacks including spear phishing, ransomware, and business email compromise (BEC).

Solution Value

Email security is a $2 Billion total addressable market (IDC) with a 7.9% CAGR for cloud email security services.

Symantec Email Security.cloud is a complete email security solution that safeguards cloud email such as Office 365 and G Suite and on-premises email such as Microsoft Exchange. It blocks new and sophisticated email threats such as ransom-ware, spear phishing, and business email compromise with a multilayered defense and insights from the world’s largest civilian global intelligence network. And it does all this with the industry’s highest effectiveness and accuracy.

Why it matters to your Customers:1. Moving to Office 365 and worried about lack of advanced

security for threat protection and data protection

Benefits to your customer:• Prevent sophisticated phishing attacks with comprehen-

sive link protection including email isolation.• Gain deep visibility into targeted & advanced attacks with

advanced email security analytics

• Protect and control access to Office 365 apps, content, and internal email.

• Prevent data leakage across email and Office 365 apps with industry-best DLP

2. Worried about advanced email attacks such as credential phishing, ransomware, and Business Email Compromise.

Benefits to your customer:• Prevent insidious phishing attacks with deep link inspec-

tion that includes integrated email isolation • Block the latest ransomware attacks with comprehensive

behavior analysis, sandboxing, and link protection• Stop Business Email Compromise with impersonation

controls and sender authentication

3. Emerging threats evade traditional signature based security and lack visibility into targeted & advanced email attacks.

Benefits to your customer:• Respond faster to targeted attacks with insights from

advanced email security analytics.• Quickly hunt and correlate threats by streaming email

security intelligence to the Security Operations Center

4. Concerned about loss of sensitive data on the email chan-nel; need to meet compliance requirements

Benefits to your customer:• Keep sensitive data safe and compliant with built-in

data protection policies• Protect sensitive data and address legal & compliance

requirements via tight integration with Symantec DLP

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Email is the #1 delivery mechanism for malware. 46% Increase in Ransomware variants. 71% of Targeted Attacks use

Spear Phishing Campaigns

Page 3: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

• Prevent the most sophisticated email threats with virtual ma-chine-aware sandboxing and payload detonation powered by advanced machine learning

Prevent data leakage and keep sensitive emails private• Protect confidential data and help meet compliance & privacy

requirements with built-in DLP controls• Prevent data loss across your environment via tight integration

with Symantec Data Loss Prevention• Safeguard the security and privacy of sensitive emails with

advanced, built-in policy-based encryption controls

Isolate URLs in email for Ultimate Link Protection• Defend users from spear phishing and advanced attacks with

email threat isolation technology; remotely execute and render suspicious email links in a secure execution environment.

• Prevent credential theft by rendering suspicious websites in read-only mode, stops users from submitting sensitive data such as corporate passwords.

Respond quickly to Security Threats• Speed threat response with 60+ data points on clean & mali-

cious emails. • Analytics can easily be streamed into customer SOCs via inte-

grations with third-party SIEMs. • Most email vendors provide only a subset of this data and lack

visibility into clean emails.

Our SolutionSymantec Cloud Email Security solution is a multi-tenant, cloud-based system with data centers all around the world. It includes anti-spam, anti-malware, email threat isolation, DLP, encryption, and advanced threat protection (which is an add-on via ATP: Email). • Protects against targeted attacks, ransomware, spear phishing &

business email compromise• Insulates users from advanced email attacks with strong email

threat isolation • Gives deep visibility into advanced attacks and accelerates

threat response• Controls sensitive data and helps meet compliance & privacy

requirements

Prevent evolving and zero-day threats • Block spam, malware, and advanced email threats such as spear

phishing, ransomware, and business email compromise• Block advanced phishing attacks by following and performing

deep evaluation of suspicious links at email delivery and click-time

• No other vendor can provide an integrated solution that orches-trates a response at the email gateway (blacklists and remedi-ation) triggered by the detection of a threat at the endpoint or network gateway (web gateway).

• Leverage multilayered detection technologies such as machine learning, behavioral analysis, user and domain impersonation controls, and sender, file, and IP reputation.

Solution SummaryFacing the Challenges of Securing the Cloud GenerationIntelligent, across-the-board email security—whether for on-premises, cloud-based, or hybrid email systems—begins with a clear, realistic understanding of what your customers are up against.

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Service Plan Description

Email Protect Antimalware, antispam, real-time link following, and Behavior analysis (Skeptic Heuristics)

Email Safeguard All the features from Protect plus: Data Protection, Impersonation controls, Image Control, Enforced TLS encryp-tion, Policy based encryption essentials

Advanced Threat Pro-tection: Email (ATP Email)

Cloud-sandboxing and machine learning, click-time URL protection, Detailed email reporting, SIEM integration, Phishing Readiness Service, Office 365 clawback

Email Threat Isolation URL Isolation, Credential theft protection (read-only mode for phishing websites)

Policy Based Encryption Push encryption (secure PDF) and pull encryption (web pickup portal, Granular controls such as message expira-tion and recall, Allows users to send encrypted emails to any external recipient

Page 4: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Symantec Email Security LeadershipAfter nearly two decades of continuous improvement, Email Security.cloud now offers the industry’s most effective (98.77% blocked) and accurate (0.00% false positives) email security. It is also the most dependable cloud email securi-ty service: We back it with broad service level agreements (SLAs) that demonstrate our commitment to you. We monitor these SLAs using an aggressive set of metrics. For complete transparency, we continually publish and measure our perfor-mance against these SLAs—and we pay out a service credit if we don’t meet performance targets.

Why Symantec

Symantec is defining Email security by…RESTORING THE ABILITY TO TRUST EMAIL – the most dangerous attack vec-tor in use today – by delivering advanced protection using cutting edge threat isolation, advanced machine learning and global intelligence to stop the most sophisticated targeted attacks.

• Protecting against the MOST ADVANCED EMAIL ATTACKS with superior multi-layered defense and integrated email isolation

• Delivering the industry’s MOST SOPHISTICATED DATA SECURITY with built-in DLP and Encryption to protect critical content as it traverses the world of email.

• Innovating instrumented SOCs with advanced attack analytics and in-tegration with automation platforms to STREAMLINE DETECTION AND RESPONSE TO ATTACKS with deep email telemetry.

• As the ways people communicate change, we continue to deliver trust to email and messaging, as part of our INTEGRATED CYBER DEFENSE PLATFORM.

What makes Symantec Email Security Better:Prevent threats with the highest efficacy and ac-curacy through multi-layered defense and strong email isolation – Our combination of multiple, advanced detection technologies and strong email threat isolation in an integrated solution prevents the most email threats with the fewest false positives. This goes far beyond the capabilities of competitors, which have lower threat efficacy and lack email isola-tion capabilities.

Realize integrated cyber defense at scale – No other vendor can provide an integrated solution that orchestrates a response at the email gateway (black-lists and remediation) triggered by the detection of a threat at the endpoint or network gateway (web gateway).

Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong email isolation, deep visibility, and holistic phishing awareness & education.

Competitive Highlights:• Only vendor offering integrated Email Threat

Isolation• Superior ATP capabilities (top leader in Radicati APT

report)

• Bundled with Industry Best Symantec DLP Cloud Service

• Advanced security for Office 365 (email + DLP +CASB)

• Industry best SLAs• Integrated Cyber Defense (email + endpoint + network

+ ATP)

Key Differentiators

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 5: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Why this is Important to your Customers

Symantec Email Security .cloud Proofpoint Email Protection “point product security”

Spam Protection Keeping mailboxes free of spam is difficult – requires multiple levels of real-time intelli-gence and technologies to be effective.

Enterprise-grade capabilities, including connec-tion-level detection, multiple layers of heuristics & intelligence and real-time link following capabili-ties.

Reputation analysis and machine learning via MLX engine, which has high False Positives due to its tendency to trigger on new domains(i.e. new partner or customer).

Malware Protection Customers need multiple layers of advanced protection, including real-time evaluation of threats to stop the latest, emerging threats.

Multiple layers of detection, including proprietary signature-based scanners, advanced machine learning, advanced heuristics, real-time link follow-ing, and impersonation controls

IP reputation, 3rd party signature-based scanner from either McAfee OR F-Secure, and machine learning.

URL Protection Spear phishing uses weaponized links to dupe users into downloading malware. A solution is only half effective if it ignores URLs.

Follows and evaluates all links at delivery time to detect threats embedded in malicious URLs, including obfuscated attacks.

URL protection requires an add-on or upgrade to Proofpoint Targeted Attack Protection.

DLP and Encryption Visibility and control of data contained in emails is crucial. An solution needs to apply flexible policies.

Powerful, built-in data protection for email. Strong, built-in policy-based encryption. Symantec DLP integration enables a single set of DLP policies across all channels.

DLP and Encryption require an add-on or upgrade module. Email-only DLP with just basic detection technologies.

Competitive - How we Stack up vs. Proofpoint

Why this is Important to your Customers

Symantec Advanced Threat Protection + Email Threat Isolation

Proofpoint Targeted Attack Protection + Isolation

Integrated Defense Advanced threat protection relies on a multi-vector approach that extends beyond protection to detection and response.

Correlation, prioritization and response to threats integrated across Endpoint, Email, Network, and Web from a single portal.

Little enterprise-level integration with other control points other than integration with Palo Alto Networks. Response requires an add-on or upgrade to Threat Response module.

URL Protection New malicious URLs are constantly being cre-ated, relying on 3rd party notification is not enough. URLs must be inspected in real-time to determine their nature.

Follows all links at delivery and click time, in-cluding concealed links such as shortened URLs, redirects, and time delays. Includes integrated email isolation, which isolates suspicious links and renders phishing links in read-only mode.

Rewriting links in “URL Defense” limited to check-ing URLs against third party block lists only at time of click. No integrated email isolation and no read-only rendering of phishing links

Attachment Protection Multi-layered defense is needed to identify and prevent increasingly evasive malware, which often hide in email attachments.

Advanced heuristics, cloud sandboxing, and ma-chine learning inspect email attachments and detect malicious activity.

Depends on file reputation and cloud sandbox-ing to block attachments, with no advanced heuristics.

Threat Intelligence Intelligence on incoming and outgoing threats to your customers can exponentially help security defenses.

Detailed, customizable reporting on each clean and blocked email, with 60+ data points including prior-itization, source, classification and file information built-in

Logging of blocked emails only with no visibility into clean emails. SIEM integration & reporting requires an add-on or upgrade from TAP.

Silver Bullets vs. ProofpointLead with Advanced Threat Protection capabilities (ATP: Email and Isolation)

• Proofpoint doesn’t have a meaningful offering for Isolation• Symantec threat analytics are far superior with over 60+ data points

including visibility into clean email• Symantec follows and evaluates malicious links through multiple hops

at both delivery and click-time while Proofpoint only checks reactive blacklists at click-time.

• We are a clear leader in ATP (see Radicati APT report) with integrated capa-bilities across email, endpoint and network, Superior SLAs

Differentiate with DLP & CASB, customer is moving to O365 or G Suite• The powerful combination of Symantec Email + DLP + CASB means we

have an industry best solution for any customer who is moving to Office

365 or G Suite• ProofPoint has limited CASB and DLP capabilitiesIntegrated Cyber Defense (ICD)• Sell ICD outcomes at C-Level (better security, simplified and lower cost)

automated orchestration & remediation between email, network, endpoint and cloud

• Correlation between email, network and endpoint means we can connect the dots on stealthy attacks across control points

Symantec is called out by Analysts as an Industry Leader• In their 2016 market report, IDC positioned Symantec as the

overall market leader in email security and highlight that we have the most comprehensive SIEM integration in the market.

• In their 2016 report Radicati commented that Symantec offers effective, accurate threat protection with low false positives.

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 6: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Key Capabilities Symantec Proofpoint Microsoft Mimecast

Link Protection - Follows and evaluates suspicious links in real-time both before email delivery and again at click-time

(Checks blacklists) (Checks blacklists)

Threat Protection Efficacy

(Avg. Efficacy)

(Avg. Efficacy)

Comprehensive Malware Isolation (Email, Endpoint)

(Web Isolation Only)

Credential Phishing Protection

Advanced Threat Analytics - Threat intelligence that includes 60+ data points on every clean and malicious email

(Only basic analytics) (Only basic analytics)

Multi-Vector Correlation & Response (Email, Endpoint, Web)

Security Awareness Training

Strongest Office 365 Security (Email, CASB, DLP)

(basic DLP & CASB)

Holistic Messaging Security (Email, Slack, FB, etc.)

(basic CASB)

“Objections” ResponseOffice 365 security is free. Why do I need Symantec?

• Office 365 built-in security isn’t good enough since it has poor efficacy, marginal threat protection, and basic data loss prevention. Even Gartner says that Office 365 deployments will need third-party email security tools (50% by 2020).

Proofpoint is the market leader in email security, why would we go with Symantec?

• Symantec has the #1 market share in email (IDC) and has been recognized by IDC and Radicati as a leader in email security.

Will Email Threat Isolation result in a degraded browsing experience?

• Email Threat Isolation provides a seamless user experience through the native browser. • This experience is indistinguishable from natively opening links directly to the web.

I’ve already got ATP: Email. Why do I need Email Threat Isolation?

• Many customers need elevated levels of protection from sophisticated phishing and ransomware attacks.• Email Threat Isolation also offers stronger protection against credential theft.

Symantec is a legacy vendor, we need cutting edge security.

• Symantec uses advanced technologies such as machine learning, real-time link evaluation, behavior analysis, and cloud sandboxing to block threats.

• Symantec is also the first and only vendor to use email isolation to insulate users from advanced email attacks.

Competition and Objection HandlingSymantec delivers comprehensive security to protect the entire company. A market leader covering multiple attack vectors, not just Email Security.• Integrated Cyber Defense covering multiple attack vectors

- email, network, cloud, and endpoint. Best of breed compo-nents that are tightly integrated.

• Highly effective protection with reduced management over-heads.

• Comprehensive advanced threat protection for email with

unique capabilities such as integrated threat isolationCustomer Email Requirements• Best-in Class Spam and Malware Defense• Integrated Content Isolation• Protects Intra-Company, Outbound & Inbound• Flexible Form Factor (Cloud, on-Premises & API Connec-

tors• Machine Learning/Artificial Intelligence (Rich Data &

Analytics Platform)

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 7: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

The Symantec Email Security.cloud market opportunity is huge for our channel partners. The total addressable market for SaaS email security according to IDC Messaging Security Forecast for 2018 is $915 Million with a 7.9% CAGR.

Having conversations with your customers around Email Security is easy and can help you address key con-cerns your customers are dealing with. You’ll want to reach out to IT/Messaging Infrastructure, Information Security and Security Operations as your key buyers and influencers.

Telling the Email Security.cloud StoryEmail remains the #1 threat vector for organizations, as the ubiquity of email and ease of impersonation makes email attacks lucrative for cybercriminals, who often target individu-al users since they are typically the weakest link in the cyber-security chain. The widespread adoption of traditional email security solutions has caused attackers to move beyond basic spam and phishing emails to highly targeted and sophisticated email threats such as ransomware, spear phishing, and Busi-ness Email Compromise (BEC).

These attacks are frequently targeted and use social engi-neering to trick vulnerable users into downloading malware, clicking on suspicious links, or falling for scam emails. They also leverage complex smokescreen techniques to avoid detec-tion such as hiding malware in innocuous-looking documents, obfuscating malicious links, or typosquatting email domains.

Delivering What Your Customers Need:

Customers need a solution that supplements the security of cloud-based productivity tools such as Office 365 or G Suite with a multi-layered approach that effectively and accurately detects both new and known spam & email threats, including sophisticated threats such as spear phishing, ransomware, and Business Email Compromise. Moreover, customers need inte-grated threat isolation to insulate their users from advanced email attacks such as credential phishing or ransomware.

Customers need a security-focused vendor that has an inte-grated defense strategy across multiple threat vectors in a security environment. This unified approach helps customers strengthen their overall security posture and improve security

outcomes by sharing intelligence and learnings across security products.

Key Stats that shape Email Security ConversationsToday threats can come from new and unexpected sources. With each passing year, not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

Threats

• $12 Billion cost of Business Email Compromise over the last 5 years.

• 71% of Targeted attacks used Spear Phishing emails• 1 out of 131 emails contains a malware attack• 61% of organizations were hit by a ransomware attack• 46% Increase in new Ransomware variants• 50% by 2020 - Gartner says that Office 365 will need

third-party email security toolsSymantec Support and Scale• 60M+ URLs processed daily and 10k+ Bad Links Blocked

daily• 2.8B Malicious emails stopped in2017• 1B Phishing emails stopped in 2017• 100% Symantec SLAs for virus protection, service avail-

ability and email delivery• 0.00% - false positives for email security

We are best positioned to increase your customers protection, ability to detect threats and respond faster to keep their busi-nesses safe. When you partner with Symantec you are provid-ing the best security for your customers.

Selling Strategy & Key Stats

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 8: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Email Security.cloudSymantec provides the industry’s most complete cloud and on-premises email security portfolio. This protec-tion comprises multiple layers of security technologies. Symantec email security is part of our Integrated Cyber Defense Platform, covering and integrating web, endpoint, and email security, threat analytics, security orches-tration and automation, and more.

and Email Threat Isolation. Highly integrated products provide customers with Information protection across every channel with a single solution; enterprise-class cloud security for email and web; Cloud security for all messaging applications; threat protection, detection, and response across email, endpoint, and network.

Customer Prospecting Questions:• Are you migrating to Office 365 email or G Suite? If so,

are you concerned about its security?

• Is renewal of your existing email security solution coming up? If so, how effective is it at stopping new & advanced threats?

• Are you concerned about advanced spear phishing or ransomware attacks (Isolation)

• How are you identifying and responding to sophisticated attacks targeting your users’ email? (ATP: Email)

• How are you preventing users from sharing sensitive data in email? (DLP)

• Do you need to encrypt emails for security, compliance, or privacy reasons (Encryption)?

Additional Discovery Path for New Prospects:• How do you prevent advanced threats so that the SOC/IR

team can focus on fewer incidents?• How can SOC/IR get visibility into targeted attacks in

your business email?• How do you enable the inspection of outbound content

for DLP? • How do you respond faster to threats and prevent similar

attacks on other control points?

Key User StoriesSafe Cloud Adoption - comprehensive security that strength-ens and secures Office 365 and G Suite.

Why Symantec:

• Prevents the most advanced email attacks with strong email isolation

• Deepest visibility into email attack campaigns

• Best protection for data and Office 365 apps via integration with Symantec DLP and CASB

Protection Against Advanced Threats, Ransomware and Ze-ro-Day Threats

Why Symantec:

• Multi-layered with advanced threat protection

• Strong threat isolation prevents sophisticated attacks

• Deep visibility via advanced analytics

• Comprehensive impersonation defense and security aware-ness

Use Cases• Greenfield: Customers moving to Office 365 or G Suite - gain

better security, analytics, and data protection than current native security

• Competitive: Proofpoint, Mimecast and Microsoft - Point Product only solutions. With Symantec you can offer cus-tomers a complete email security solution that breaks down information silos and offers integrated cyber defense from a single vendor.

• Up-Sell & Cross-Sell: Expand security protections with prod-uct integrations with: Symantec Endpoint Protection, DLP Cloud, Web Security Service, CloudSOC (CASB), ATP Email

Use Cases

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 9: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Buyers and InfluencersWith the increase in threats covering all business sizes Email Security can span from the Small/Medium size busi-nesses (100 seats) up to the largest of enterprises. Discussions should lead with the cloud-delivered story and pivot to hybrid/on-prem based on your customers needs.

Buyer PersonasCustomer Cares About:• Reducing phishing attacks, malware & spam• Email delivery (latency and accuracy)• Minimize operational complexity • Minimizing Cost (server infrastructure, etc)• Email availability & archiving• Email quarantining

VP of Collaboration, Productivity & Infrastructure, Mes-saging Admin:

• Wants to stop malware and viruses from infecting email users, prevent spam & bulk mail from reaching inboxes

• Needs to ensure users have quick and reliable email service

Info Security Director, CISO, Security Ops/Incident Response Director:

• Needs to block new and hard-to-detect attacks while protecting users from targeted attacks and malicious URLs

• Wants to detect and remediate advanced threats via visibility & investigation capabilities

• Looking to ensure confidentiality of sensitive data and integrity of emails

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 10: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Up-Sell & Cross-Sell Opportunities

Up-Sell Opportunities for Email Security:Email Threat Isolation• Eliminate advanced email attacks and their risks by isolating suspi-

cious links• Prevent credential phishing and account takeover attacks by ren-

dering websites in read-only mode• Requires no hardware or softwareATP: Email• Blocks stealthy threats with cloud sandboxing and advanced ma-

chine learning• Follows and evaluates malicious links in real-time at time-of-click

without relying on blacklists & signatures• Gives deep visibility into targeted email attacks with advanced

email security analyticsSymantec Policy-Based Encryption Advanced - Keep confiden-tial emails secure and private with advanced policy-based encryption controls• Automatically encrypt sensitive emails with a secure PDF or web

pickup portal, which provide both push and pull-based encryption.• Gain granular control over encrypted emails through policy-driven

enforcement that includes the ability to expire and recall messages.• Increase trust in encrypted messages by customizing emails, notifi-

cations, and the web portal with your company brand.

Cross-Sell Opportunities:Data Loss Prevention Cloud Service for Email with ESS - Get powerful data loss prevention and email security capabilities that go be-yond the basic ‘checkbox’ security found in Microsoft Office 365, Google Gmail, and Microsoft Exchange.

• Stop sensitive information from leaving your public cloud and on-premises email systems.

• Accurately inspect all content in outbound email traffic to prevent data loss that other solutions can miss.

Endpoint Protection - integrates with ESS to share detected threats so that blacklists can be enforced to accelerate response to emerging threats and stop spread of infectionATP Endpoint & EDR Cloud• Integrated EDR with SEP and additional capabilities via EDR Cloud;

easy to deploy & use IR tools for endpoint infrastructure• Validate threats at endpoint, conduct remediationCloudSOC (CASB)• Protect against advanced attacks in internal email and content for

Office 365 apps• Control access to apps and contentSymantec Messaging Gateway (SMG) - is an on-premises email security solution that provides powerful inbound and outbound messag-ing security.• Stop the latest emails threats such as spear phishing, ransomware,

and Business Email Compromise with multi-layered protection technologies

• Block new & targeted attacks with advanced technologies such as machine learning and threat isolation via integration with Symantec Content Analysis and Symantec Email Threat Isolation

• Respond faster to targeted attacks with in-depth threat intelligence on sophisticated attack campaigns

• Prevent leakage of sensitive information and meet your compliance & privacy requirements with built-in DLP and integrated encryption controls

Break the cycle of implementing yet another

new point product to defend against the latest and

greatest attack strategy. It’s time for an Integrated Cyber

Defense Platform that communicates and orches-

trates defenses across control points and attack vectors.

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources

Page 11: Symantec Sales Play Sales...Stop spear phishing attacks with the most com-prehensive defense – Symantec combats spear phishing attacks with multiple layers of protection, strong

Training Resources

All resources can be found by logging into Symantec PartnerNet: https://partnernet.symantec.com

You can access SSE and SSE+ from PartnerNET • View a complete SSE course list here• View a complete SSE+ course list here• Channel Webinar Calendar – here

Inside Technical Sales Teams – ( Americas / EMEA / APAC) Email Security .cloud Product Training on Learn Central Email Security - Technical Training SSE+

Email Security - Sales Training & Accreditation SSE

If you need help accessing the site or using its resources, email [email protected]

Product Quick Hits• Email Security.cloud – Product Overview• Email Security.cloud – Where it Fits• Email Security.cloud – How it Works• Email Security.cloud – User Stories• Email Security.cloud – What’s New

Sales & Marketing

As part of the Symantec Email Security.cloud demand gen-eration campaigns, we have numerous assets that you can share with your existing and prospective customer accounts. Please Visit: Symantec Partner Toolkit

Product Assets:• Video: Business Email Compromise Overview • Video: Cloud Generation Fireside Chat• Video: Ransomware Overview• Video: Spear Phishing Overview• Video: Advanced Email Security Analytics Overview• Video: Email Security Overview• Play Book: Email Security Cloud Cheat sheet• Email Security: Family Brochure• Data Sheet: Email Security Cloud• Data Sheet: Email Advanced Threat Protection• Solution Brief: Security Considerations for O365 • Solution Brief: Isolate Advanced Email Attacks• Solution Brief: DLP Cloud Service for Email • Customer Presentation: First Meeting Deck

• Email Security: Licensing Guide• Email Security: Migration Kit• Office 365: Channel Campaign Kit

Competitive Assets:• IDC & Radicati: Email Security Reports Kits• Battlecard: Email Security vs. Proofpoint• Battlecard: Email Security vs. Mimecast• Battlecard: Email Security vs. Microsoft

ZIFT123 - Contact2Lead Platform - access Multi-Touch Email Campaigns, Lead Forms, Website Content & Collateral Co-branding• www.symantec.zift123.com • Video Overview - Zift Capabilities

Partner Toolkit Browse content specific to your customers needs

Tools and Resources

Menu

Overview and Value

Solution Summary

KeyDifferentiators

Competitive Proofpoint

Competitionand Objections

Selling Strategy& Key Stats

Use CasesProspecting Questions

Buyersand Influencers

Up-Sell & Cross-SellOpportunities

Tools and Resources


Recommended