comstor security initiative

14
Comstor Security Initiative

Upload: others

Post on 18-May-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Comstor Security Initiative

Comstor Security Initiative

Comstor Security Initiative

Page 2: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

There are 10 billion connected sensors & devices that pass personal information and business data back and forth from the cloud. Each employee carries more than 3 devices and wearables which creates an even greater surface area to defend.

Distributed Denial of Service (DDoS) attacks are being reported in the press almost monthly which would suggest that far more attacks go unreported (In part due to the potential embarrassment for the targeted organisation). A recent Cisco study of 115,000 devices connected to the internet found that 92% were running software with known vulnerabilities.

Your customers will have to adapt to upcoming changes in laws and regulations in the country and in the European Union (EU), which will require them to make security a priority. Through our market research Comstor has found that our customers:-

• Feel anxious about the increasing complexity and threats and they have technologyofferings that are not developing with the challenges customers are facing

• Continue to be let down by solutions that don’t evolve as the threat evolves

• Waste time, resources and distraction as a result of multiple Vendor up skillingrequirements

• Become locked into declining margin sales or losing business because they don’thave a relevant and complete Security offering.

Cyber security is projected to be a $170 billion market by 2020.

Work in partnership with Comstor and Cisco to unlock the potential of Cyber security

BY GARTNER FORCAST WE ARE EXPECTION DOUBLE DIGIT GROWTH FOR MANAGED (IT OUTSOURCING), CLOUD-BASED SERVICES

There has never been a better time for your business to join the Comstor Security Initiative and accelerate your business.

c

Security Services Spending (2015-2018)

2015

$44B9.3% CAGR

2018

$58B9.9% CAGR

2015-2018CAGR | 9.6%

Services Spend2015 | 61%

Forecast: Information Security, Worldwide(Product & Services)

2015

$72B8.4% CAGR

Sou

rce:

Gar

tner

(May

201

4)

2018

$93B8.5% CAGR

Data Loss Prevention (DLP) $1.2B 2015 | 24.4% CAGR (2015-2018)

(2015) Security Services Spending

IT Outsourcing (Managed) $16B 2015 | 15% CAGR (2015-2018)

2015-2018CAGR | 8.7%

Note:Less Consumer Spend

$16BManagedServices

Implementation Services

ConsultingServices

Largest Growth

$14B

$12B

CAGR | 15.2%

CAGR | 6.4%

CAGR | 6.0%

2014-2015

2018 - ForecastWW Security Services Spending & CAGR

2018 Spending ($58B) 2015-2018 CAGR (9.6%)

($millions)

Hardware Support Services $1.4B CAGR | 6.0%

Cloud-Based Security Services Market, Worldwide

2015

$3.2B20.2% CAGR

2017

$4.1B13% CAGR

Sou

rce:

Gar

tner

(Oct

ober

201

3)

2015-2017CAGR | 14.1%

Page 3: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

• What is your biggest security concern and is your security spend and expertise properlyallocated to address that risk?

• Do you have a clear picture of your overall security posture and of how it relates toindustry best practices?

• Do you currently conduct security assessments, such as penetration tests / threat scanon a bi-annual basis?

• How realistic is your plan to address the security gaps that you might have today?

• Do you have an established process to address computer security breaches?

• How confident are you of your ability to demonstrate compliance?

• Given the skills gap that exists in security, do you view the ability to recruit and retaintalent and expertise as a top priority?

Discover your customers environment, challenges and business goals to become their trusted advisor and guide them to their effective and effective Security solution:

Your Customers & Their Security Threats

Ask your customers ...

• Has an attack occurred?

• What is the scope of the compromise?

• How do you contain the attack?

• How do you prevent future attacks?

• Should you communicate breaches?

Your Customers WILL be experiencing Security breaches!

Page 4: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

End-to-End Security Portfolio Full Visibility FirePOWER Services

Cisco provides an End-to-End Security Portfolio to secure your network during the whole attack continuum. With Cisco and Comstor you can deploy threat intelligence that detects, analyzes and protects against both known and emerging threats.

Cisco Security Solution

Attack Continuum

Security Software and Services

Firewall

NGFW

NAC + Identity Services

VPN

UTM

NGIPS

Web Security

Email Security

Advanced Malware Protection

Network Behavior Analysis

Malware Sandboxing

Before AfterDuring

ThreatScan POV

Page 5: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

End-to-End Security Portfolio Full Visibility FirePOWER Services

Only Cisco Can Provide this Level of Visibility. The more infrastructure you can see the more you can protect.

Cisco Security Solution

ThreatScan POV

Threats

Typical IPS

Users

File Transfers

Web Applications

ApplicationProtocols

Typical NGFW

Malware

Client Applications

Operating Systems

Mobile Devices

VOIP Phones

Routers and Switches

Printers

C & C Servers

Network Servers

Cisco ASA with FirePOWER Services

Page 6: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

End-to-End Security Portfolio Full Visibility FirePOWER Services

Cisco ASA with FirePOWER Services combines the world’s most deployed firewall with the industry’s most effective next-generation intrusion prevention system (NGIPS) and Advanced Malware Protection. It is the first threat-focused next-generation firewall (NGFW).

Cisco Security Solution

ThreatScan POV

► Cisco® ASA firewalling combined with Sourcefire® next-generation IPS► Integrated threat defense over the entire attack continuum► Best-in-class security intelligence, application visibility and control

(AVC), and URL filtering

Features

► Superior, multilayered threat protection

► Unprecedented network visibility

► Advanced malware protection

► Reduced cost and complexity

Benefits

Page 7: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

End-to-End Security Portfolio Full Visibility FirePOWER Services

The Comstor Security team can help you to take advantage of the latest Cisco security product: ASA with Firepower.

Both Cisco and Comstor are so sure of the security level that we offer proof of value opportunity for partners and their customers. By setting up an ASA to run a security network monitor (no need to change anything in the network) we let the Cisco appliance see what is happening across the network. After 2-4 weeks we extract a report that shows the security status and the threats it would have blocked.

Cisco Security Solution

ThreatScan POV

Leverage ASA 5500-X Equipment with SSD and FirePOWER Services

POV Risk Reports

How Does It Work

• Partner or end-user signs the POV T&Cs

• Comstor ships a unit from our stock to thepartner or directly to its end user

• Comstor or partner setup the unit in end-userpremises

• After 2-4 weeks of monitoring a detailed reporton the Security status of the network is issuedto end-user through its partner

• The end user would have the choice to eitherkeep the unit or return it

Page 8: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

• Incremental revenuethrough offeringmultiple securitytechnologies fromthe industry leadingvendor and 3:1 pull through ofother Cisco Architectures

• Above market profitability margins through theCisco Security Ignite Program

• A go to market security portfolio andsupport program focused on execution andprofitability

• Time savings through reduced complexityby working with one vendor for all yoursecurity solutions

• Confidence that your whole securityoffering will deliver the highest securitystandards and be kept up to date withdevelopments in the market as a result of Ciscoinvesting over 3.5 billion in security

• We have a dedicated teamwith a great understandingof the solutions and profitabilityprograms, focussed onsupporting you to win deals

• Our award winning Mentorenablement program delivers on average+64% revenue for partners through helpingthem plan, develop and execute theirCisco Security Business Plan

• Using Cisco ThreatScan, Comstor offer aFREE Proof of Value (POV) try beforeyou buy service to identify risk and threatscurrently present in your customers network

• Our end to end Comstor ServicesOrganisation has the capabilityto support you with advanced technicalcapabilities

• We offer a financial rebate incentiveon delivery of Proof of Value End User RiskAssessments

Our offer to our partners What we deliver Why we are different

The Comstor Security Initiative gives immediate access to a world class, expert set of resources that will support you with your security business.

How Comstor can help

We offer an end to end Cisco Security Solution, with a dedicated Security Team, that through our CSI Security Practise Enablement Programme provide the necessary technical, sales and marketing skills to help you sell, develop and grow your Cisco Security business to:

• Cisco resellers that don’t currently sell Ciscosecurity and want to develop a Cisco SecurityPractise

• Cisco resellers that currently sell Cisco Securitybut want to develop and grow their securitybusiness

• Cisco resellers that don’t currently sell Securityand want to develop a Cisco Security Practise

• Resellers that sell Security and would benefitfrom selling Cisco Security

Page 9: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

• Dedicated Cisco Security-qualified account management,here to support you to win deals and build your internal capabilities

• Dedicated security qualified product management

• Dedicated presales and technical resource – enabling you to extend your ability todeploy solutions. All our technical teams have specialists that are Cisco-certified to fullyunderstand the function, capabilities, performance and implementation ofCisco-focused solutions. We are your white-labeled tech team.

• Join our Threatscan Proof of Value program and we will enable you to upsell fromproducts to solutions and we’ll equip you with everything you need to identify newcustomers, use free of charge hardware from our stock, install the units, manageand present results and ultimately upsell more Cisco solutions.

• Achieving ESS Security specialisation gives you access to specific Cisco programs. Forthose of you looking to enter the Security market but also when you already have anexisting Security practice with other vendors.

• Comstor has developed our Mentor Programme which enables you to build aprofitable Security practice. Our on boarding team can provide access to businessplans, sales and technical training as well as providing access to all of Cisco’s securityresearch and sales acceleration programs.

• The Comstor services organisation can support you through our staffed support desk,Cisco services, professional services, global deployment and training

• Win your deals with our latest Cheat Sheets and Competitive Guides.

The Comstor Security Initiative gives immediate access to a world class, expert set of Cisco support services through a team who understand your needs as a partner, and all backed by Cisco

CSI (Comstor Security Initiative) Program

How to work with us?

Build a Partnership Today

Comstor’s CSI team are excited to be able to offer this program to our partners. The 1st step in building a new, or developing your existing security practice is to visit CSI website Or call one of our dedicated teams.

There are $170bn reasons to make that call today!

www.comstorsecurityinitiative.com

Page 10: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

Here are the proof points to our offer. Interested? Contact your Comstor Account manager.

How to be successful with Comstor and Security ?

How profitable is it selling Cisco Security?

POV: How does that work?

Time savings & reduced complexity: How is that?

Financial rebate: What is this, how would I achieve this?

Services organisation: What examples can you give of how this would this support me?

Mentor business planning: What is this and what would it do for me?

Through a proven methodology of business planning and regular mentoring, the Comstor Mentor program helps partners develop and execute on a Cisco security business plan « The Comstor Mentor Program has enabled us to expand our Cisco business. We recently achieved the „Express Security“ specialization, through which we earn more money when selling Cisco security solutions.« Roland Meichner, ProComp, Germany

Comstor and Cisco is supporting resellers by strong front-end pricing and also back-end rebates. Drive your profitability by utilising Cisco promotions and programs including Security Ignite, VIP, OIP, TMP for competitive front-end pricing and back-end rebates

We have a process in place and will work with you to provide stock for your end user which can be kept or returned after the POV period of up to 4 weeks. Discover more opportunities: 9 out of 10 POVs show breaches and leaks in end user environment!

By having the availability of an end to end security solution from Cisco, you’ll benefit from working with one vendor in terms of engagement, product knowledge and accreditation training, thus saving your time and money

Once you sign up to the POV program and commit to achieving an agreed POV and revenue target, we will commit to an additional rebate of up to 3%

We have an experienced team of technical engineers that can support you in POV installs as part of the program and also further with professional services where required

Page 11: Comstor Security Initiative

© 2016 WestconGroup, Inc.

SecurityInitiative

Comstor UKMerchant's House Love LaneCirencesterGloucestershireGL7 1YTTel: +44 1285 647000

Comstor Security Team

Jay McdonaldCisco Security Architecture Business Lead +44 1285 627136 [email protected]

Daniel BlackwellCisco Security Product Manager +44 1285 627184 [email protected]

James LakemanCisco Security BDM +44 7342 084868 [email protected]

Emma CowleyCisco Security Sales Executive +44 1285 627228 [email protected]

Antony HendersonCisco Security Product Sales Specialist +44 1285 627291 [email protected]

Ashley PilbeamCisco Security Pre Sales Consultant +44 1285 647052 [email protected]

Jason RobertsCisco Solutions Architect +44 7920 724336 [email protected]

Page 12: Comstor Security Initiative

www.comstorsecurityinitiative.com

Page 13: Comstor Security Initiative

Comstor Security Initiative

Page 14: Comstor Security Initiative

Comstor Security Initiative