![Page 1: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/1.jpg)
Creating the story
APJ Security Perfect Pitch Contest
![Page 2: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/2.jpg)
Audio
• All participant will be muted on entry
• If by any chance your audio is
disconnected
during the session, please go to the
Communicate tab on the Webex
session main
menu and select Audio Conference
Questions
• To submit Questions during the
session, please use the Q&A
box
![Page 3: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/3.jpg)
• Welcome and Contest Overview
• Judging Criteria
• Creating your pitch: Tips and Insights
• Contest Details and Next Steps
• Q&A
AGENDA:
![Page 4: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/4.jpg)
Welcome & Contest Overview
Diwakar Dayal, Security Channel Leader – APJ &GC
![Page 5: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/5.jpg)
Judging Criteria
![Page 6: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/6.jpg)
Judging Criteria
• Knowledge of LOB
challenge (40%)
• Link Cisco Security
solutions to resolve
the LOB challenge:
(40%)
• Creativity and
Delivery (20%)
The pitch duration is 10 minutes with no more than 15 slides, the contestant must be able to pitch Cisco Security solutions to a new customer, or for an existing customer, up-sell, cross-sell and refresh. The pitch should include at least 3 of the 5 key selling points of Cisco Security solutions:
• INTEGRATED ARCHITECTURAL APPROACH
• EFFECTIVE SECURITY
• UNMATCHED VISIBILITY
• REDUCED TIME-TO-DETECTION
• RETROSPECTIVE SECURITY
![Page 7: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/7.jpg)
Creating your pitch: Tips and Insights
![Page 8: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/8.jpg)
Lu Li
Partner Engineering EN & Security
Creating your pitch
Examples, Resources
APJ Partner Organization
![Page 9: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/9.jpg)
Agenda• Judging Criteria
• Perfect Pitch Goal
• Key Selling Points & Examples
• Resources
![Page 10: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/10.jpg)
The contestant must be able to pitch Cisco Security solutions to a new customer, or for an existing customer, up-sell, cross-sell and refresh.
Judging Criteria - Goal
![Page 11: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/11.jpg)
• Integrated Architectural Approach
• Effective Security
• Unmatched Visibility
• Reduced Time-to-Detection
• Retrospective Security
Selling Points (WHAT & SO WHAT)
WHAT SO WHAT
Reduce Complexity, Continuous Control
Simple to Use
Detect Potential Risk
Reduce Risk
Advanced Threat Protection
![Page 12: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/12.jpg)
Examples
![Page 13: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/13.jpg)
Integrated Architectural Approach
BEFOREDiscover
Enforce
Harden
AFTERScope
Contain
Remediate
Attack Continuum
Network Endpoint Mobile Virtual Cloud
Detect
Block
Defend
DURING
Point in Time Continuous
![Page 14: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/14.jpg)
MAC
AMP for
Networks
PC
AMP for
Cloud Web Security
& Hosted Email
CWS
Virtual
AMP on Web &
Email Security
Appliances
Mobile
AMP on ASA
Firewall with
FirePOWER
Services
AMP for Endpoints
AMP Private Cloud
Virtual Appliance AMP Threat Grid
Dynamic Malware Analysis +
Threat Intelligence Engine
Effective Security – Advanced Malware Protection (AMP)Meeting an organisations security requirements
![Page 15: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/15.jpg)
Effective Security - AMPCisco AMP Is a Leader in Security Effectiveness and TCO and Offers Best Protection Value
Best Protection Value
99.2% Breach Detection Rating, the
highest of all vendors tested
Lowest TCO per Protected-Mbps
Other Products Do Not Provide
Retrospective Security After a Breach
Cisco® Advanced Malware Protection
Se
cu
rity
Eff
ective
ness
TCO per Protected-Mbps
NSS Labs Security Value Map (SVM) for Breach Detection Systems
![Page 16: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/16.jpg)
Retrospective Security & Visibility - AMP
Antivirus
Sandboxing
Initial Disposition = Clean
Point-in-time
Detection
Initial Disposition = Clean
Cisco AMP
Blind to scope
of compromise
Actual Disposition = Bad = Too Late!!
Turns back time, Scope
Known
Constant Analysis
Dynamic disposition
updates
Not 100%
Analysis Stops
Initia
l de
cis
ion
Sleep Techniques
Unfiltered Protocols
Encryption
Polymorphism
Obfuscation
Initia
l de
cis
ion
Actual Disposition = Bad = Blocked
Retrospective Detection,
Analysis Continues
![Page 17: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/17.jpg)
Malware Triage Nightmare
Where do I start?
How bad is the situation?
What systems were impacted?
How do we recover?
How do we keep it from happening again?
Responding to an infection = Headaches = Time = $$ = Limited effectiveness
![Page 18: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/18.jpg)
Cisco Confidential 18C97-732214-00 © 2014 Cisco and/or its affiliates. All rights reserved.
Advanced Industry Disclosures
Outreach Activities
Dynamic Analysis
Threat Centric Detection Content
Snort IPS Rules
Sandbox
Vulnerability Updates
Security Intelligence
Email & Web Reputation
100 TB
Intelligence
1.6M sensors
150 million+
endpoints
35%
email world wide
FireAMP™, 3+
million
13B Web Req
AEGIS™ &
SPARK
Open Source
Communities
1.1M+ Malware
Samples per Day
1B SBRS Queries
per Day
3.6PB Monthly
though CWS
Email Endpoints Web Networks IPS Devices
WWW
Reduced Time-to-Detection
10I000 0II0 00 0III000 II1010011 101 1100001 110
110000III000III0 I00I II0I III0011 0110011 101000 0110 00
I00I III0I III00II 0II00II I0I000 0110 00
101000 0II0 00 0III000 III0I00II II II0000I II0
1100001110001III0 I00I II0I III00II 0II00II 101000 0110 00
100I II0I III00II 0II00II I0I000 0II0 00
Threat
Intelligence
Research
ResponseCollective
Security Intelligence
![Page 19: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/19.jpg)
Open your Mind
![Page 20: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/20.jpg)
Boram Kim
GSSO Security Channel SE
Creating your pitch
Intelligent Cybersecurity for the Real World
![Page 21: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/21.jpg)
What are we facing now? - The Security Problem
Changing
Business ModelsDynamic
Threat Landscape
Complexity
and Fragmentation
![Page 22: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/22.jpg)
The security industry today
![Page 23: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/23.jpg)
There is no Silver bullet
DURINGDetect
Block
Defend
AFTERScope
Contain
Remediate
BEFOREDiscover
Enforce
Harden
Gaps in protection as new attack
vectors emerge
Point-in-time defenses can
be evaded
Malware prevention is not
100%
? ?? ?
![Page 24: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/24.jpg)
The threat-centric security model
Network Endpoint Mobile Virtual Cloud
Point in Time ContinuousThreat Intelligence
DURINGDetect
Block
Defend
AFTERScope
Contain
Remediate
BEFOREDiscover
Enforce
Harden
![Page 25: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/25.jpg)
Visibility Across Threat VectorsYou can’t protect what you can’t see
DURINGDetect
Block
Defend
AFTERScope
Contain
Remediate
BEFOREDiscover
Enforce
Harden
Branch CloudData
CenterEndpoint CampusEdge Operational
Technology
![Page 26: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/26.jpg)
Combined with the Best Threat Intelligence CapabilitiesWorld-Class Threat Research
19.7BThreats Per Day
1.4M
1.1M
1.8B
1B
8.2B
Incoming Malware
Samples Per DaySender Base
Reputation Queries
Per Day
Web Filtering
Blocks Per Month
AV Blocks
Per Day
Spyware Blocks
Per Month
250Threat Researchers
100TBThreat Intelligence
![Page 27: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/27.jpg)
Advanced Malware ProtectionAMP Everywhere: See Once, Protect Everywhere
Networks WebEndpoint
AMP Intelligence Sharing
W W W
Visibility
Threat
Intelligence
![Page 28: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/28.jpg)
Premiere Portfolio in the Industry
Best of Breed | Architectural Approach
Threat Intelligence
Visibility
CloudNetwork Integrated
Web
W W W
NGFW/NGIPSAdvanced Threat
Policy and AccessUTM
Integrated for Best Threat Protection
![Page 29: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/29.jpg)
Why Cisco Security
Consistent Control
Complexity Reduction
Consistent Policies
Across the
Network and
Data Center
Fits and Adapts
to Changing
Business Models
Global Intelligence
With the Right
Context
Detects and Stops
Advanced Threats
Advanced Threat Protection
UnmatchedVisibility
![Page 30: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/30.jpg)
trust.cisco.com
cisco.com/go/security
![Page 31: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/31.jpg)
Anshul Kaushik
CSE- Security
January 2017
Creating your Pitch
Security for the Digital Economy
![Page 32: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/32.jpg)
If you knew you were going to be compromised,
would you do security differently?
It’s no longer a question of if you’ll be breached,
it’s a question of when
![Page 33: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/33.jpg)
Security as a Business Enabler
![Page 34: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/34.jpg)
![Page 35: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/35.jpg)
Cisco’s #1
Priority
Threat-
Centric
Security
Billions
Invested
5K
People
StrongCognitive
Sourcefire
ThreatGRID
Neohapsis
OpenDNS
Portcullis
Lancope
Broad/De
ep
Portfolio
Trusted
Advisor
#1
Cybersecu
rity
Company
Expandin
g
Services
Capabiliti
es
Pervasive
Security
Cisco Is Investing in Security Growth
![Page 36: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/36.jpg)
Services
Attack Continuum
Before During After
Branch Operational
Technology
CloudData
Center
Endpoint CampusEdge
SECURITY EVERYWHERE
![Page 37: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/37.jpg)
More Effective Against Sophisticated Attacks
Source: Cisco Annual Security Report, 2016
Less than
1 Day(13 Hours currently)
200 VS.
DAYS
Industry Cisco
Much Faster Than Most Organizations Discover Breaches
![Page 38: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/38.jpg)
Cisco = Security
DISCUSS
![Page 39: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/39.jpg)
Expanded deal
size thru cross
arch selling
Increased
Services’
revenues
and margins
Differentiation
from other
partners
Why Cisco
Full Suite of
Profitability
Programs &
Enablement
Broadest, Most Effective Security Portfolio in the Industry
![Page 40: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/40.jpg)
trust.cisco.com
cisco.com/go/security
![Page 41: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/41.jpg)
Contest Details and Next Steps
![Page 42: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/42.jpg)
Amazing prizes await you!
Winners shall be selected from each Theatre. There shall
be prizes in each theatre. • 1st Prize in each Theatre shall be a trip to the Cisco Live!
Melbourne Conference in March 2017
• 2nd Prize in each Theatre – iPad
• 3rd Prize in each Theatre – iWatch
All in local languages except for ASEAN final is in ENGLISH.
![Page 43: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/43.jpg)
December January February
Timeline
12/16: Registration
Opens
March
March 7-10: Cisco Live!
Melbourne
1/27: Eliminations
2/9: Winners
Announced
2/2: Semi Finals
1/12: Enablement
Session
2/8: Finals
![Page 44: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/44.jpg)
Next Steps
Start Building Your
Perfect Pitch
Your local Cisco Security
Account Manager will
reach out to you
Leverage Perfect Pitch
Website’s Resources
![Page 45: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/45.jpg)
Resources
• Sample Pitch in different languages: http://www.cisco.com/c/en_sg/partners/perfect-pitch-2016/security-resources.html
• Selling Security for Partners: http://www.cisco.com/c/en/us/products/security/partner.html
• Cisco Security Community: https://communities.cisco.com/community/technology/security
• Presales support (GVE): http://www.cisco.com/c/en/us/partners/support-help.html
![Page 46: APJ Security Perfect Pitch Contest...APJ Security Perfect Pitch Contest Audio • All participant will be muted on entry • If by any chance your audio is disconnected during the](https://reader033.vdocuments.net/reader033/viewer/2022053009/5f0d1c5c7e708231d438bb1e/html5/thumbnails/46.jpg)