comstor security initiative
TRANSCRIPT
Comstor Security Initiative
Comstor Security Initiative
© 2016 WestconGroup, Inc.
SecurityInitiative
There are 10 billion connected sensors & devices that pass personal information and business data back and forth from the cloud. Each employee carries more than 3 devices and wearables which creates an even greater surface area to defend.
Distributed Denial of Service (DDoS) attacks are being reported in the press almost monthly which would suggest that far more attacks go unreported (In part due to the potential embarrassment for the targeted organisation). A recent Cisco study of 115,000 devices connected to the internet found that 92% were running software with known vulnerabilities.
Your customers will have to adapt to upcoming changes in laws and regulations in the country and in the European Union (EU), which will require them to make security a priority. Through our market research Comstor has found that our customers:-
• Feel anxious about the increasing complexity and threats and they have technologyofferings that are not developing with the challenges customers are facing
• Continue to be let down by solutions that don’t evolve as the threat evolves
• Waste time, resources and distraction as a result of multiple Vendor up skillingrequirements
• Become locked into declining margin sales or losing business because they don’thave a relevant and complete Security offering.
Cyber security is projected to be a $170 billion market by 2020.
Work in partnership with Comstor and Cisco to unlock the potential of Cyber security
BY GARTNER FORCAST WE ARE EXPECTION DOUBLE DIGIT GROWTH FOR MANAGED (IT OUTSOURCING), CLOUD-BASED SERVICES
There has never been a better time for your business to join the Comstor Security Initiative and accelerate your business.
c
Security Services Spending (2015-2018)
2015
$44B9.3% CAGR
2018
$58B9.9% CAGR
2015-2018CAGR | 9.6%
Services Spend2015 | 61%
Forecast: Information Security, Worldwide(Product & Services)
2015
$72B8.4% CAGR
Sou
rce:
Gar
tner
(May
201
4)
2018
$93B8.5% CAGR
Data Loss Prevention (DLP) $1.2B 2015 | 24.4% CAGR (2015-2018)
(2015) Security Services Spending
IT Outsourcing (Managed) $16B 2015 | 15% CAGR (2015-2018)
2015-2018CAGR | 8.7%
Note:Less Consumer Spend
$16BManagedServices
Implementation Services
ConsultingServices
Largest Growth
$14B
$12B
CAGR | 15.2%
CAGR | 6.4%
CAGR | 6.0%
2014-2015
2018 - ForecastWW Security Services Spending & CAGR
2018 Spending ($58B) 2015-2018 CAGR (9.6%)
($millions)
Hardware Support Services $1.4B CAGR | 6.0%
Cloud-Based Security Services Market, Worldwide
2015
$3.2B20.2% CAGR
2017
$4.1B13% CAGR
Sou
rce:
Gar
tner
(Oct
ober
201
3)
2015-2017CAGR | 14.1%
© 2016 WestconGroup, Inc.
SecurityInitiative
• What is your biggest security concern and is your security spend and expertise properlyallocated to address that risk?
• Do you have a clear picture of your overall security posture and of how it relates toindustry best practices?
• Do you currently conduct security assessments, such as penetration tests / threat scanon a bi-annual basis?
• How realistic is your plan to address the security gaps that you might have today?
• Do you have an established process to address computer security breaches?
• How confident are you of your ability to demonstrate compliance?
• Given the skills gap that exists in security, do you view the ability to recruit and retaintalent and expertise as a top priority?
Discover your customers environment, challenges and business goals to become their trusted advisor and guide them to their effective and effective Security solution:
Your Customers & Their Security Threats
Ask your customers ...
• Has an attack occurred?
• What is the scope of the compromise?
• How do you contain the attack?
• How do you prevent future attacks?
• Should you communicate breaches?
Your Customers WILL be experiencing Security breaches!
© 2016 WestconGroup, Inc.
SecurityInitiative
End-to-End Security Portfolio Full Visibility FirePOWER Services
Cisco provides an End-to-End Security Portfolio to secure your network during the whole attack continuum. With Cisco and Comstor you can deploy threat intelligence that detects, analyzes and protects against both known and emerging threats.
Cisco Security Solution
Attack Continuum
Security Software and Services
Firewall
NGFW
NAC + Identity Services
VPN
UTM
NGIPS
Web Security
Email Security
Advanced Malware Protection
Network Behavior Analysis
Malware Sandboxing
Before AfterDuring
ThreatScan POV
© 2016 WestconGroup, Inc.
SecurityInitiative
End-to-End Security Portfolio Full Visibility FirePOWER Services
Only Cisco Can Provide this Level of Visibility. The more infrastructure you can see the more you can protect.
Cisco Security Solution
ThreatScan POV
Threats
Typical IPS
Users
File Transfers
Web Applications
ApplicationProtocols
Typical NGFW
Malware
Client Applications
Operating Systems
Mobile Devices
VOIP Phones
Routers and Switches
Printers
C & C Servers
Network Servers
Cisco ASA with FirePOWER Services
© 2016 WestconGroup, Inc.
SecurityInitiative
End-to-End Security Portfolio Full Visibility FirePOWER Services
Cisco ASA with FirePOWER Services combines the world’s most deployed firewall with the industry’s most effective next-generation intrusion prevention system (NGIPS) and Advanced Malware Protection. It is the first threat-focused next-generation firewall (NGFW).
Cisco Security Solution
ThreatScan POV
► Cisco® ASA firewalling combined with Sourcefire® next-generation IPS► Integrated threat defense over the entire attack continuum► Best-in-class security intelligence, application visibility and control
(AVC), and URL filtering
Features
► Superior, multilayered threat protection
► Unprecedented network visibility
► Advanced malware protection
► Reduced cost and complexity
Benefits
© 2016 WestconGroup, Inc.
SecurityInitiative
End-to-End Security Portfolio Full Visibility FirePOWER Services
The Comstor Security team can help you to take advantage of the latest Cisco security product: ASA with Firepower.
Both Cisco and Comstor are so sure of the security level that we offer proof of value opportunity for partners and their customers. By setting up an ASA to run a security network monitor (no need to change anything in the network) we let the Cisco appliance see what is happening across the network. After 2-4 weeks we extract a report that shows the security status and the threats it would have blocked.
Cisco Security Solution
ThreatScan POV
Leverage ASA 5500-X Equipment with SSD and FirePOWER Services
POV Risk Reports
How Does It Work
• Partner or end-user signs the POV T&Cs
• Comstor ships a unit from our stock to thepartner or directly to its end user
• Comstor or partner setup the unit in end-userpremises
• After 2-4 weeks of monitoring a detailed reporton the Security status of the network is issuedto end-user through its partner
• The end user would have the choice to eitherkeep the unit or return it
© 2016 WestconGroup, Inc.
SecurityInitiative
• Incremental revenuethrough offeringmultiple securitytechnologies fromthe industry leadingvendor and 3:1 pull through ofother Cisco Architectures
• Above market profitability margins through theCisco Security Ignite Program
• A go to market security portfolio andsupport program focused on execution andprofitability
• Time savings through reduced complexityby working with one vendor for all yoursecurity solutions
• Confidence that your whole securityoffering will deliver the highest securitystandards and be kept up to date withdevelopments in the market as a result of Ciscoinvesting over 3.5 billion in security
• We have a dedicated teamwith a great understandingof the solutions and profitabilityprograms, focussed onsupporting you to win deals
• Our award winning Mentorenablement program delivers on average+64% revenue for partners through helpingthem plan, develop and execute theirCisco Security Business Plan
• Using Cisco ThreatScan, Comstor offer aFREE Proof of Value (POV) try beforeyou buy service to identify risk and threatscurrently present in your customers network
• Our end to end Comstor ServicesOrganisation has the capabilityto support you with advanced technicalcapabilities
• We offer a financial rebate incentiveon delivery of Proof of Value End User RiskAssessments
Our offer to our partners What we deliver Why we are different
The Comstor Security Initiative gives immediate access to a world class, expert set of resources that will support you with your security business.
How Comstor can help
We offer an end to end Cisco Security Solution, with a dedicated Security Team, that through our CSI Security Practise Enablement Programme provide the necessary technical, sales and marketing skills to help you sell, develop and grow your Cisco Security business to:
• Cisco resellers that don’t currently sell Ciscosecurity and want to develop a Cisco SecurityPractise
• Cisco resellers that currently sell Cisco Securitybut want to develop and grow their securitybusiness
• Cisco resellers that don’t currently sell Securityand want to develop a Cisco Security Practise
• Resellers that sell Security and would benefitfrom selling Cisco Security
© 2016 WestconGroup, Inc.
SecurityInitiative
• Dedicated Cisco Security-qualified account management,here to support you to win deals and build your internal capabilities
• Dedicated security qualified product management
• Dedicated presales and technical resource – enabling you to extend your ability todeploy solutions. All our technical teams have specialists that are Cisco-certified to fullyunderstand the function, capabilities, performance and implementation ofCisco-focused solutions. We are your white-labeled tech team.
• Join our Threatscan Proof of Value program and we will enable you to upsell fromproducts to solutions and we’ll equip you with everything you need to identify newcustomers, use free of charge hardware from our stock, install the units, manageand present results and ultimately upsell more Cisco solutions.
• Achieving ESS Security specialisation gives you access to specific Cisco programs. Forthose of you looking to enter the Security market but also when you already have anexisting Security practice with other vendors.
• Comstor has developed our Mentor Programme which enables you to build aprofitable Security practice. Our on boarding team can provide access to businessplans, sales and technical training as well as providing access to all of Cisco’s securityresearch and sales acceleration programs.
• The Comstor services organisation can support you through our staffed support desk,Cisco services, professional services, global deployment and training
• Win your deals with our latest Cheat Sheets and Competitive Guides.
The Comstor Security Initiative gives immediate access to a world class, expert set of Cisco support services through a team who understand your needs as a partner, and all backed by Cisco
CSI (Comstor Security Initiative) Program
How to work with us?
Build a Partnership Today
Comstor’s CSI team are excited to be able to offer this program to our partners. The 1st step in building a new, or developing your existing security practice is to visit CSI website Or call one of our dedicated teams.
There are $170bn reasons to make that call today!
www.comstorsecurityinitiative.com
© 2016 WestconGroup, Inc.
SecurityInitiative
Here are the proof points to our offer. Interested? Contact your Comstor Account manager.
How to be successful with Comstor and Security ?
How profitable is it selling Cisco Security?
POV: How does that work?
Time savings & reduced complexity: How is that?
Financial rebate: What is this, how would I achieve this?
Services organisation: What examples can you give of how this would this support me?
Mentor business planning: What is this and what would it do for me?
Through a proven methodology of business planning and regular mentoring, the Comstor Mentor program helps partners develop and execute on a Cisco security business plan « The Comstor Mentor Program has enabled us to expand our Cisco business. We recently achieved the „Express Security“ specialization, through which we earn more money when selling Cisco security solutions.« Roland Meichner, ProComp, Germany
Comstor and Cisco is supporting resellers by strong front-end pricing and also back-end rebates. Drive your profitability by utilising Cisco promotions and programs including Security Ignite, VIP, OIP, TMP for competitive front-end pricing and back-end rebates
We have a process in place and will work with you to provide stock for your end user which can be kept or returned after the POV period of up to 4 weeks. Discover more opportunities: 9 out of 10 POVs show breaches and leaks in end user environment!
By having the availability of an end to end security solution from Cisco, you’ll benefit from working with one vendor in terms of engagement, product knowledge and accreditation training, thus saving your time and money
Once you sign up to the POV program and commit to achieving an agreed POV and revenue target, we will commit to an additional rebate of up to 3%
We have an experienced team of technical engineers that can support you in POV installs as part of the program and also further with professional services where required
© 2016 WestconGroup, Inc.
SecurityInitiative
Comstor UKMerchant's House Love LaneCirencesterGloucestershireGL7 1YTTel: +44 1285 647000
Comstor Security Team
Jay McdonaldCisco Security Architecture Business Lead +44 1285 627136 [email protected]
Daniel BlackwellCisco Security Product Manager +44 1285 627184 [email protected]
James LakemanCisco Security BDM +44 7342 084868 [email protected]
Emma CowleyCisco Security Sales Executive +44 1285 627228 [email protected]
Antony HendersonCisco Security Product Sales Specialist +44 1285 627291 [email protected]
Ashley PilbeamCisco Security Pre Sales Consultant +44 1285 647052 [email protected]
Jason RobertsCisco Solutions Architect +44 7920 724336 [email protected]
www.comstorsecurityinitiative.com
Comstor Security Initiative
Comstor Security Initiative