killer applications part i: email · 2015-04-01 · source: gartner, magic quadrant for mobile data...

62
1 Killer Applications Part I: EMail

Upload: others

Post on 13-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

1

Killer Applications Part I: EMail

Page 2: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

2

Agenda

• Kick Off – Brian Wesolowski

• Industry and Security – Natasha Royer Coons

• Email (BCEE, Good & RIM) - Jason Moody

• Devices, Pricing & Promotions – Tally Lawson

• Q & A

• Drawing

Page 3: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

3

Sprint PCS Vision Smart DevicesMOBILE DEVICES

Palm Powered™ Phones

Treo™ 650 by Palm™

Microsoft® WindowsMobile™ Phones

PPC-6700

BlackBerry®

Blackberry 7250

Page 4: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

4

Industry and Security

Page 5: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

5

Wireless handheld growth: rising dramatically

2 6 2767

137

221

321

399

2001 2002 2003 2004 2005 2006 2007 2008

Worldwide Mobile Phone Shipments:High-End and Converged Devices Only2001-2008Millions

Note: Data includes high-end mobile phones (including those with QWERTY keypads) and converged devices.Source: IDC, Worldwide Mobile Phone 2005-2008 Forecast, March 2005

2003-2008

CAGR

72%

Page 6: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

6

Firms Are Increasing Spending On IP and Mobility

21%

33%

43%

41%

55%

59%

39%

54%

51%

49%

39%

37%

54%

25%

16%

8%

6%

4%

7%

54%5%

Landline voice

Landline data

Mobile voice

Mobile data

WAN VOIP

LAN IPT

IP Services (e.g. MPLS) LessThe sameMore

“How will your spending change in 2005?”

Base: 623 telecom decision-makers at North American and European enterprisesSource: Forrester’s Business Technographics May 2005 North American And European

Network And Telecommunications Benchmark Study

Page 7: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

7

Mobility Adoption: Companies adopt mobility faster than planned

Page 8: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

8

Mobile adoption: Plans migrate To LOB applications

Page 9: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

9

Firewall security and handheld security are biggest concerns

48%

23%29%

Firewall Transmission Handheld

Which area of wireless security concerns you most?

Source: Good Security Survey of 563 IT professionals, October, 2005

Page 10: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

10

Corporate data risk on the handheld: also rising

It is estimated that through 2006:

Corporate Data

!

90% of mobile devicescontaining enterprise data will have insufficient power-on protection and storage encryption to withstand casual to moderate hacker attacks

Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04

Page 11: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

11

Enterprises require extra handheld protection

30% of handhelds are lost every year1

Executives and managers (those most likely to have confidential info on their handhelds) make up 37 percent of enterprise mobile users2

22% of end users keep a list of passwords on their handheld3

1 SANS Institute2 Frost and Sullivan Mobile Office report3 RSA Security Password Management Survey, September 20054 Computer Security Institute

A single security breach cost U.S. companies $526,000 in 20054

Page 12: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

12

How Email works

Page 13: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

13

1. Push or Pull email delivery

2. Attachments

3. Beyond Email: PIM and Data synchronization

Key features often discussed by customers

Page 14: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

14

Push Mail

> The Server delivers email to the Treo without owner intervention as mail arrives at the host server

> Delivery happens in the background while Treo is ‘off’ or other tasks are going on

Pull Mail

> The owner asks the Smartphone to “get mail”

> The client email to automatically go and get mail at set intervals (every 30 Minutes)

> Simplest and least expensive solutions

Push Me / Pull You

Page 15: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

15

The State Of email Attachments

We’ve come a long way in the last year

All major solutions have “Attachment Support”

> Ask Questions as functionality varies across solutions. Some Can:

• Download and Display attachments as Text via viewer

> Intelligent Downloading

• Memory Management to keep from filling your device memory

Full Excel Attachment

Word, Excel, PowerPoint, .pdf, JPEG, Wav, more

Page 16: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

16

Smartphone

Smartphone email architectures

IT-managed serverWeb

Web

POP3 mailSprint, Yahoo, Earthlink, etcetera …

Web

firewall

RedirectorMail server

wirelessnetwork

Page 17: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

17

Email architectures explained

POP3 mail RedirectorUser's PC behind the firewall forwards email.

IT-managed serverExample: Good and Blackberry

Treo 650POP3 mail

web

Carrier-hosted serverExample: Sprint Business Connection Enterprise Edition

MailServer

firewall

IT-managed serverTreo 650

firewall

MailServerTreo 650

Redirector

MailServer

firewall

Treo 650Carrier-hosted

server

Web

Web

Page 18: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

18

Sprint Business Connection

Page 19: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

19

Sprint PCS Business ConnectionSM for Enterprise Mobility

palmOne® TreoTM 650

Sprint PCS Business ConnectionSM

Enterprise Edition

• Wireless Sync - email, calendar

• Wide selection of devices to meet user needs

• End-to-end AES security encryption

• Low cost solution

Page 20: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

20

CalendarEmail Contacts

• Push updates to handset• MS Exchange, Lotus Notes, POP3, IMAP4 and ISP email

• Email push, voice access and alerts

• Real-time access to personal contacts or corporate directory

Sprint Value Proposition: End User

Sprint PCS VisionSM Phones with PDA Functionality: Palm® OS

Sprint PCS Business Connection Enterprise Edition

Page 21: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

21

Sprint PCS Business Connection Enterprise Edition Network Solution

All the control without the servers or software

Sprint Value Proposition: IT Administrator

Direct connection between enterprise application and Sprint Data Center

End-to-end security (from enterprise firewall to Sprint Data Center to Sprint device)

Web-based user and service administration, with full set of Web-based usage reports

Choice of connectivity options ranging from SSL to FrameRelay and VPN

Page 22: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

22

GoodLink

Page 23: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

23

… In Real TimeGoodLink is Outlook in Your Hand

Page 24: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

24

Thousands of familiar, standard applicationsEasy for end-users to learn and useGreater efficiency for end-userExtendible platform supports other, popular

third party applications

Plus Mobile Access tothe Applications Customers Need

Page 25: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

25

GoodLink Runs on the Industry Standard Handhelds that Corporate Customers Want

Treo650 Treo600 PPC6600/PPC6601

Page 26: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

26

GoodLink Benefits for Mobile Workers

• Real-time access to e-mail and PIM

• Support for rich attachments

• Wireless OTA IT upgrades and support

• Integrated voice/data PDA devices provide an “all-in-one” mobile solution and laptop alternative

Page 27: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

27

Robust IT Management Toolkit

• IT can centrally manage and update policies to protect corporate data

Bullet Proof Security

• Server-to handheld encryption using AES (Advanced Encryption Standard)

• Verisign security • FIPS 140-2 Certified• Remote data obliteration

Affordable • Handhelds can be set up and managed in remote locations wirelessly, realizing lower cost of ownership and more efficient use of scarce IT resources

GoodLink Meets the Needs of the Enterprise

Page 28: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

28

GoodLink Solution

Firewall

GoodLinkServer

Good AccessServer

Exchange

SAP

Siebel

Oracle

Good SecurityOperations

Center WirelessNetworks

Handhelds withGoodLink

Positive Acknowledgement Architecture

End-to-End Encryption

LEGEND

Page 29: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

29

Putting It All Together

GoodLink offers the best wireless messaging solution for enterprises

2-Way Wireless “Push” Synchronization

Increases productivity by having real-time access to all messaging and PIM information and rich attachments

Enterprise-class Security Bullet proof security that provides protection of corporate information at all times

Secure OTA Management Wireless OTA installation and management of all mobile software and wireless policies, allowing Zero-IT touch and low overall TCO

Industry Leading Devices and Operating Systems

The right handheld for every user with support for industry-standard handhelds

Page 30: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

30

Global Address Look-up

Type in the first few characters and a drop down list will display likely options after a few seconds

Select the correct entry, and proceed to compose in the message and hit ‘Send’

Access Predefined E-mail Lists

Page 31: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

31

Viewing Attachments

Messages with attachments are marked with a paperclip icon

While viewing the message tap on the file name or icon, to open or use 5-way navigation and hit center key

A menu will give download options

The file can be viewed in several formats or stored on the SD card

Page 32: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

32

Accessing Contacts

From the GoodLink Today Screen, click on the ‘Contacts’ icon from the applications bar

From the palm phone, click on the ‘Contacts’ icon on the lower phone panel

Page 33: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

33

Viewing the Calendar

Click on the ‘Calendar’ icon in the Applications bar

View by Day, Agenda or Month view

Use 5-way the navigation key to go forward and backward on your calendar

Different colors connote appointments out of the office, confirmed, tentative, etc.

Meeting invitations can be accepted or declined from the handheld

Page 34: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

34

Notes and Tasks

See a list of current Notes or Tasks by selecting from the home screen applications bar

Add new Notes or Tasks by selecting ‘New’

Tasks can be assigned a due date or reminder, as well as priority status

Page 35: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

35

Good Technology: Good Technology: Leading Wireless InnovationLeading Wireless Innovation

Enterprise CustomersRapid Customer Adoption

Enterprises Building WirelessStrategies with Good Technology

3400

3000

2000

1600

1200900

70010060Aug 2002 Jan 2005

Page 36: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

36

Good Technology: Providing ChoiceGood Technology: Providing Choice

The ApplicationsYou Need

The DevicesYou Want

Custom Applications

Intranets

Hosted Services

Page 37: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

37

Blackberry

Page 38: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

38

Blackberry - 3 Options

Blackberry Enterprise Server –Seamless integration with Microsoft Exchange, Lotus Domino and Groupwise

BlackBerry Internet Service – 10 email accounts checked every 15 minutes

Desktop Redirector also provide mail integration –Desktop must be left on.

Page 39: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

39

Components of the BlackBerry Solution

The BlackBerry Wireless Handheld

BlackBerry Desktop Software

BlackBerry Enterprise Server (BES) Software

Wireless Service on the Nationwide Sprint PCS Network

2

3 4

1

1

Page 40: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

40

What is the BlackBerry Enterprise Server (BES)?

Seamlessly integrates handheld with existing enterprise email account

Works with Microsoft Exchange, Lotus Domino or Novell GroupWise corporate email servers

Advanced security using AES and Triple-DES encryption, FIPS certified

Centralized IT administration and support> Establishes/maintains a connection to the wireless network(s)

> Monitors BlackBerry users’ mailboxes

> Forwards to and receives messages from the handheld

Page 41: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

41

Push Technology

Through close integration, BES leverages the Mail System’s ability to deliver email in “real time”

> Exchange – MAPI Client> Domino – Add-in Task

Immediacy

Other solutions are “poke and pull” standards> User must “ask” for new mail by sending an sms request to the server (similar to

POP3)> Immediacy is NOT addressed

Page 42: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

42

Security, Security, Security

Persistent, 2-way connection between BES and Wireless Network

> Connection is secure – no inbound connection attempts allowed> BES automatically reconnects if connection is dropped

Triple DES Encryption, AES Supported> Advanced encryption technology – considered unbreakable> US Military standard

BESAdmin can enforce IT Policy OTA (over-the-air) to Handhelds

Page 43: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

43

Administration

Centralized control over BlackBerry Solution> BESAdmin can apply rules and global filters from the BESMgmt console > Wireless ITPolicy

Server Management> BES can be monitored using a variety of 3rd-party apps such as NetIQ

Page 44: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

44

BES Installation

• Can be installed in as little as 1 hour

• Installed by the Mail System Administrator

• Additional Users can be easily added via BESMgmt

• Pre-Installation doc> Send this to your customers

• With T-Support, customers can get direct installation support from RIM

Page 45: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

45

BES Installation (cont’d)

• System requirements for Microsoft Exchange BES v3.6> Pentium III, 500 MB RAM, 2 GB Disk space

• System requirements for Lotus Domino BES v2.2> Domino BES installs ON the Domino Mail Server

• Same as Domino specs

• System requirements for Novell Groupwise BES v4.0

Page 46: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

46

How do I choose?

Page 47: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

47

Email Backend – customer has multiple versions of Exchange or mixed environment

Mobility Growth - customer anticipates that his mobile deployment will grow to 100+ users over time

Handheld Choice – users on Windows Mobile, Palm, Symbian

TCO - customer is willing to pay somewhat higher solution acquisition cost in exchange for low management & support costs over time

Reliability - customer wants a service-based solution with a Network Operations Center that is continuously optimized to work with different wireless networks.

Support - customer wants a direct support relationship with the software vendor

Software Cost - customer wants to minimize solution acquisition cost & is less concerned about TCO over time

BlackBerry

Connect

SevenBlackBerryon RIM

Security Consciousness - customer has strict security requirements and controls

User Base - customer has <10 mobile users (now & in the future)

Beyond Email - customer anticipates needing to mobilize applications beyond email (e.g. ERP, CRM)

MSFT

(2006)*

SYNCGoodConsideration

Cus

tom

er Q

uest

ions

Solution Recommendation Good Fit OK Fit Poor Fit

Page 48: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

48

Why Sprint for Wireless Email?

“Sprint has assembled all these resources while maintaining a financial position that is sound and stable.” — Gary Forsee

Sprint Chairman & CEO

Advanced Sprint Nationwide PCS Network can keep your employees connected in more than 99% of major cities and all major airports

CDMA network / EV-DO strategy

Widest selection of wireless email compatible devices

Integrated billing makes adding or removing wireless email accounts both quick and easy

Dedicated Sprint BIM and TSS teams

Trusted source for growing portfolio of mobility solutions

Easy to Use Enterprise Mobile Email and PIM

Page 49: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

49

Device Promotions

Page 50: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

50

Winter Data Device Blitz for CL Customers

Save an additional $200 on BlackBerry 7250, powered by Sprint PCS

$449.99 SRP

$150.00 2-yr Agreement

$200.00 Instant Rebate Credit

$ 99.99 Net Out of Pocket for Customer

Save an additional $200 on BlackBerry 7520, powered by Nextel

$449.99 SRP

$150.00 2-yr Agreement

$200.00 Instant Rebate Credit

$ 99.99 Net Out of Pocket for Customer

Save an additional $250 on Sprint PCS Vision Smart Device Treo 650 by Palm

$499.99 SRP

$150.00 2-yr Agreement

$250.00 Instant Rebate Credit

$ 99.99 Net Out of Pocket for Customer

•Customer must sign a 2-year Sprint Wireless Agreement to qualify•There is no limit to the number of phones •Not combinable with any other device offers in the market•Corporate Liable customers only.•New customer activations only. •BlackBerry 7250 credits require activation of a voice & a data plan.•BlackBerry 7520 credits require data plan activation.•Offers are subject to change at any time.

•Customer must sign a 2-year Sprint Wireless Agreement to qualify•There is no limit to the number of phones •Not combinable with any other device offers in the market•Corporate Liable customers only.•New customer activations only. •BlackBerry 7250 credits require activation of a voice & a data plan.•BlackBerry 7520 credits require data plan activation.•Offers are subject to change at any time.

Effective 3/12 the Winter Blitz for the Treo 650 will

increase to $250 and the $50 MIB will expire on 3/11

Effective 3/12 the Winter Blitz for the Treo 650 will

increase to $250 and the $50 MIB will expire on 3/11

Dates of availability: 1/29/2006 to 4/1/2006

Page 51: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

51

Sprint 60 Day Experience for CL Customers

Business customers receive 60 days to fully experience the advantages of Sprint smart devices and data cards.

> If for any reason the customer s not completely satisfied with the selected device, he or she can return it within 60 days of purchase for a full refund on the net equipment price and will not incur the ETF.

> The customer is responsible for all services charges .

> The codes must be provisioned to the account at the point of sale.

The following CDMA Smart Phones are eligible for the program.

> Smart Devices• palmOne Treo 650

• PPC 6601

• PPC 6700

• RIM BlackBerry 7250

• RIM BlackBerry 7750

Take one for a test drive today!

Program extended through 4/1/06

Page 52: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

52

Pricing and Promos

© 2005 Sprint Nextel. All rights reserved. SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint Nextel. MOTOROLA and the Stylized M Logo are registered in the U.S. Patent and Trademark Office. The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks or registered trademarks of Research In Motion Limited – used by permission.

Page 53: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

53

Blackberry Pricing

Blackberry for iDEN and CDMA

$39.99 for 5MB

> Includes

• 5MB data

• Internet or BB Browsing

• Java Application Data Usage

• NOL Browsing & Help (iDEN)

$49.99 for Unlimited

> Includes

• Unlimited data

• Internet or BB Browsing

• Java Application Data Usage

• NOL Browsing & Help (iDEN)

RSW76320$4,847.00

RSW76229$2,651.00

RSW76228$565.00

RSW76227$342.00

RSW76226$78.00

CALs for BES 4.0

BES 20 RSW76022 EXCH; RSW76025 DOM$3,300.00

BES for Microsoft Exchange 4.0

iDEN BES Prices

BBCAL 500USRS$22599$22,599.00

BBCAL 100USRS$4847$4,847.00

BBCAL 50USRS$2651$2,651.00

BBCAL 10USRS$565$565.00

BBCAL 5USRS$342$342.00

BBCAL 1USR$78$78.00

CALs for BES 4.0

BESMSE4.0 20USR$3300$3,300.00

BESMSE4.0 1USR$2399$2,399.00

BES for Microsoft Exchange 4.0

CDMA BES Prices

Page 54: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

54

Blackberry Starter Kit Promotion

Blackberry Starter Kit available through 4/1/06

> Program intended to assist customers by offering a $1500 credit towards the $2399.00 BES 4.0 1 USER Server that includes 1 CAL. Promotion includes an additional 5 free CAL’s.

> 2 Year term required and the purchase of voice and data plans for each line.

> Customer must purchase 6 handhelds between 9/1/2005 and 4/1/06

> Customer may combine 7100i, 7250 and 7520 as long as the combined total equal six.

> May be combined with Winter Blitz Promotion offering $200 additional credit towards 7520 and 7250.

Page 55: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

55

GoodLink Pricing & Promotion

GoodLink Starter Kit Promotion available through 4/1/06

> Program intended to assist customers by reducing the rate of GoodLink CAL’s. Promotion applysa $25 credit towards the CAL price of $99 per unit (in blocks of 10)

Available to new and existing CL customers on the CDMA Network

GoodLink Licenses must be purchased in blocks of ten.

May be combined with Winter Blitz Promotion

GoodLink for CDMA

$35.00 as Primary Plan

> Vision Pack REQUIRED

$30.00 as Attachable with Voice Plan

> Vision Pack REQUIRED

One Time Server Fee

> $1500.00

License Fees, blocks of 10 only:

> $990.00 one time fee per block 10

Page 56: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

56

Business Connection Enterprise Edition (BCEE) Pricing & Promotion

BCEE Starter Kit Promotion available through 4/1/06

> Program intended to assist customers by waiving the $250 set up fee for a BCEE installation, and provide a “one month” free service credit on each BCEE when purchasing and deploying in groups of 10 BCEE seats. ($200 value/10 BCEE seats)

Available to new and existing CL customers on the CDMA Network

BCEE Licenses must be purchased in blocks of ten.

May be combined with Winter Blitz Promotion

BCEE for CDMA

Requires activation of a Voice Plan and a Vision Pack

> $200.00 per block of 10 ($20 per seat) ONLY sold in blocks of 10

> One Time Set Up Fee

> $250.00

Page 57: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

57

Summary of Wireless Email Starter Kits

Provide your customers with an opportunity to try out and save when deploying wireless email services:

• BCEE Starter Kit

(CDMA only – Save up to $450 on installation and MRC)

• GoodLink Starter Kit

(CDMA only - Save on $250 on License)

• BlackBerry Starter Kit

(both iDEN and CDMA – Save $1500 on single-user BES and 5 free CALs)

Program extended through 4/1/06

Page 58: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

58

Process for Ordering CDMA ProductsPreliminary Credit Check

Lightbridge: 800 908 0781 – Pre-Sale Credit Check for wireless Pincode: 63985 Partner Name: SRINT PCS/SLDN (universal name)Information that will be needed(Corporate Liable) (Individual Liable)Business name Individual’s NameBusiness address Home AddressContact Home TelephoneBusiness phone Date of BirthFederal Tax ID Social Security #Write down decision & reference # for BOF order entry.

Contact Master Agent

Customer Receives Equipment

•Once preliminary credit check has been done, contact Master Agent to obtain correct paperwork and contracts.

•If credit decision on CL account required a deposit or did not meet the desired amount of lines, contact MA to initiate a credit class upgrade request.

Collect Paperwork and Order Details.

•Complete paperwork/contracts and obtain detailed order information.

•Submit to Master Agent for processing. MA will provide SLA’s for order processing.

•Complete Email Pre-Qualification form and submit to MA. MA submits to Solutions Consultants (Jason Moody and Natasha Royer).

•Customer receives handsets activated with voice/data services.

•Initial call with customer, SC’s, MA and sub-agent takes place to discuss implementation plan and timeline.

•Implementation call takes places at determined date and time.

Page 59: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

59

Process for Ordering iDEN ProductsPreliminary Credit Check

Lightbridge: 800 908 0781 – Pre-Sale Credit Check for wireless Pincode: unique code per MA Partner Name: Master Agent NameInformation that will be needed(Corporate Liable) (Individual Liable)Business name Individual’s NameBusiness address Home AddressContact Home TelephoneBusiness phone Date of BirthFederal Tax ID Social Security #Write down decision & reference # for BOF order entry.

Contact Master Agent

Customer Receives Equipment

•Once preliminary credit check has been done, contact Master Agent to obtain correct paperwork and contracts.

•If credit decision on CL account required a deposit or did not meet the desired amount of lines, contact MA to initiate a credit class upgrade request.

Collect Paperwork and Order Details.

•Complete paperwork/contracts and obtain detailed order information.

•Submit to Master Agent for processing. MA will provide SLA’s for order processing.

•Inform MA of intent to order email product. MA engages Solutions Consultant (Jason Moody and Natasha Royer) to help set up call with RIM representative.

•Customer receives handsets activated with voice/data services.

•Implementation call takes place between Rim and customer for installation of BES server.

Page 60: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

60

CDMA Documentation – Implement & Maintain

Qualification Form

> www.spp.sprint.com> wireless tab> products> wireless email> Cross Product info (bottom of page)> Wireless Email Solution Qualification Form

– Complete form and submit to MA. MA will submit to Solution Consultant (Jason Moody).

Adding CAL’s/Upgrade Server

> www.spp.sprint.com> wireless tab> products> wireless email> Blackberry – Implement & Maintain> GoodLink/Blackberry Seat/Server/Server Upgrade & Support Request Form

– Complete Wireless Email Solutions Seat/Server/Server Upgrade & Support Request Form

– MA will obtain form from SC (Jason Moody) and will submit completed form to SC.

Page 61: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

61

iDEN Documentation – Implement & Maintain

iDEN

> http://indirect.nextel.com> Products & Services> Sprint Services –Wireless Data Services> Core Data Services – Email Services> BB7520 Overview & Associated Marketing Bulletins> Order Entry Instructions (right hand side)

• New Activation – MA keys new order in FDT toll with correlating SOC code for desired BES server and # of CAL’s.

• Upgrade Server/Add CAL’s - MA/Partner contacts the National Sales Support (800-639-6399).

PLEASE NOTE - You will be asked for your sales agent ID and state you are calling from. Please have customer account number, password/tax id, # of CAL’s desired and shipping address.

Page 62: Killer Applications Part I: EMail · 2015-04-01 · Source: Gartner, Magic Quadrant for Mobile Data Protection 1H 04. 11 Enterprises require extra handheld protection ... 2 Frost

62

Q&A and Drawing

© 2005 Sprint Nextel. All rights reserved. SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint Nextel. MOTOROLA and the Stylized M Logo are registered in the U.S. Patent and Trademark Office. The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks or registered trademarks of Research In Motion Limited – used by permission.