2
Symantec Endpoint Protection Sales Script Question: How are you currently protecting your endpoint systems (laptops, desktops, and servers)? Answer 1: Symantec AntiVirus™ Is your maintenance contract current?* Current maintenance—Customers that are current with maintenance or support contracts for previous versions of their licensed Symantec AntiVirus software can upgrade to the appropriate Symantec Endpoint Protection licenses at no additional charge. These customers will receive an email, or a letter if we do not have an email address, from Symantec directing them to https://fileconnect.symantec. com/licensing, where they can select a language, enter their existing serial number, and then download the product directly. They can also request that a CD be mailed to them. Expired maintenance—Existing customers that do not have current maintenance/support may purchase version upgrades at specially discounted prices (20 percent off the MSRP of full licenses). Symantec Endpoint Protection 11.0 is the comprehensive, next-generation version of Symantec AntiVirus that helps provide advanced threat protection for laptops, desktops, and servers. It is a tremendous value, offering unmatched management and functionality. Let me give you a few reasons to upgrade. Reasons to upgrade to Symantec Endpoint Protection Single agent install and management—All of this technology is integrated into a single agent and managed from a single console. Smaller footprint—The footprint is now only 24 MB, which is much smaller than that of the competition’s less complete packages as well as Symantec’s core security products. More security—Symantec Endpoint Protection offers more than just antivirus technology; it also includes best-of-breed antispyware, desktop firewall, intrusion prevention, and device control. TruScan™—Behavior-blocking technology gives you true zero-day protection from zero-day attacks. Unlike leading antivirus products on the market, it has identified over 1,000 new threats per month—with the lowest false positive rate of 0.004 percent. That equates to fewer than 40 false positives for every 1 million PCs scanned! Generic exploit blocking—Vulnerability-based protection requires only one signature to protect the vulnerability from an attack and all of its variants including unknown threats. Device control—Device control helps prevent data loss from insider theft and allows control over vulnerable USB ports (i.e., MP3 players, USB drives, etc.) Network access control as an easy add-on—Adding network access control to attain complete endpoint security is as easy as turning on the license. Symantec Network Access Control is included in the initial install of Symantec Endpoint Protection and will appear in the management console once it is activated. Completely customizable—While all of this functionality is available, you can choose to turn on only the technology you want to use today, with the option to take advantage of the remainder at a later time. Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network? If so, Symantec Network Access Control will give you the ability to limit access to your network if the device is not up to date or compliant with security policy. Network access control offers you two benefits: (1) It greatly reduces the chances of a threat being carried into your network by traveling employees, contractors, or telecommuters. (2) It helps ensure that any managed endpoint device entering the network meets the requirements of your security policy. This eliminates the weakest link and confirms that every one is up to date. Migration * For additional support, call our reseller hotline at (888) 780-7962. Answer 2: No Protection at the Endpoint Even if you only have desktops and no connection to the Internet, you still need to protect your endpoint systems. Endpoints are vulnerable to attack via a USB drive, CD/DVD, or other input device. Threats can come from multiple sources, not only the Internet, and every device needs its own protection. Also, protection with only antivirus software is inadequate. Today, threats are quicker, sneakier, and carry a devastating payload. You need complete protection that includes the following technologies: • Antivirus to protect your systems from viruses and stop them from spreading • Antispyware to stop spies from stealing confidential information • Desktop firewall to keep thieves from accessing endpoints and using them as a point of attack • Intrusion prevention to block devastating zero-day attacks and variants of attacks • Device control to prevent knowing and unknowing users from using USB, CD/DVD, or even MP3 players on the network to either load malicious code or “slurp” confidential information Symantec Endpoint Protection 11.0 includes all of these technologies to give you the most complete endpoint protection available in a single agent and managed from a single console. Former Product New Product Symantec AntiVirus Corporate Edition Symantec Client Security Confidence Online™ for Corporate PCs (Whole Security) Symantec Sygate™ Enterprise Protection } }} Symantec Endpoint Protection Symantec AntiVirus Enterprise Edition } }} Symantec Multi-tier Protection Symantec AntiVirus with Groupware Protection Symantec Client Security with Groupware Protection } }} Symantec Endpoint Protection Small Business Edition Symantec Network Access Control (LAN and/or DHCP) } }} Symantec Network Access Control Symantec Network Access Control (Gateway and/or CNAC) } }} Symantec Network Access Control Starter Edition Symantec Sygate Enterprise Protection (with Self-Enforcement) } }} Symantec Endpoint Protection and Symantec Network Access Control Starter Edition

Symantec Endpoint Protection Sales Script Question: …eval.symantec.com/.../Disti_Toolkit/content/Sales/sep_sales_script.pdf · Symantec™ Endpoint Protection Sales Script Question:

Embed Size (px)

Citation preview

Page 1: Symantec Endpoint Protection Sales Script Question: …eval.symantec.com/.../Disti_Toolkit/content/Sales/sep_sales_script.pdf · Symantec™ Endpoint Protection Sales Script Question:

Symantec™ Endpoint Protection Sales Script

Question: How are you currently protecting your endpoint systems (laptops, desktops, and servers)?

Answer 1: Symantec AntiVirus™

Is your maintenance contract current?*• Current maintenance—Customersthatarecurrentwithmaintenance

orsupportcontractsforpreviousversionsoftheirlicensedSymantecAntiVirussoftwarecanupgradetotheappropriateSymantecEndpointProtectionlicensesatnoadditionalcharge.Thesecustomerswillreceiveanemail,oraletterifwedonothaveanemailaddress,fromSymantecdirectingthemtohttps://fileconnect.symantec.com/licensing,wheretheycanselectalanguage,entertheirexistingserialnumber,andthendownloadtheproductdirectly.TheycanalsorequestthataCDbemailedtothem.

• Expired maintenance—Existingcustomersthatdonothavecurrentmaintenance/supportmaypurchaseversionupgradesatspeciallydiscountedprices(20percentofftheMSRPoffulllicenses).SymantecEndpointProtection11.0isthecomprehensive,next-generationversionofSymantecAntiVirusthathelpsprovideadvancedthreatprotectionforlaptops,desktops,andservers.Itisatremendousvalue,offeringunmatchedmanagementandfunctionality.Letmegiveyouafewreasonstoupgrade.

Reasons to upgrade to Symantec Endpoint Protection• Single agent install and management—Allofthistechnologyis

integratedintoasingleagentandmanagedfromasingleconsole.

• Smaller footprint—Thefootprintisnowonly24MB,whichismuchsmallerthanthatofthecompetition’slesscompletepackagesaswellasSymantec’scoresecurityproducts.

• More security—SymantecEndpointProtectionoffersmorethanjustantivirustechnology;italsoincludesbest-of-breedantispyware,desktopfirewall,intrusionprevention,anddevicecontrol.

• TruScan™—Behavior-blockingtechnologygivesyoutruezero-dayprotectionfromzero-dayattacks.Unlikeleadingantivirusproductsonthemarket,ithasidentifiedover1,000newthreatspermonth—withthelowestfalsepositiverateof0.004percent.Thatequatestofewerthan40falsepositivesforevery1millionPCsscanned!

• Generic exploit blocking—Vulnerability-basedprotectionrequiresonlyonesignaturetoprotectthevulnerabilityfromanattackandallofitsvariantsincludingunknownthreats.

• Device control—DevicecontrolhelpspreventdatalossfrominsidertheftandallowscontrolovervulnerableUSBports(i.e.,MP3players,USBdrives,etc.)

• Network access control as an easy add-on—Addingnetworkaccesscontroltoattaincompleteendpointsecurityisaseasyasturningonthelicense.SymantecNetworkAccessControlisincludedintheinitialinstallofSymantecEndpointProtectionandwillappearinthemanagementconsoleonceitisactivated.

• Completely customizable—Whileallofthisfunctionalityisavailable,youcanchoosetoturnononlythetechnologyyouwanttousetoday,withtheoptiontotakeadvantageoftheremainderatalatertime.

Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network?Ifso,SymantecNetworkAccessControlwillgiveyoutheabilitytolimitaccesstoyournetworkifthedeviceisnotuptodateorcompliantwithsecuritypolicy.Networkaccesscontroloffersyoutwobenefits:(1)Itgreatlyreducesthechancesofathreatbeingcarriedintoyournetworkbytravelingemployees,contractors,ortelecommuters.(2)Ithelpsensurethatanymanagedendpointdeviceenteringthenetworkmeetstherequirementsofyoursecuritypolicy.Thiseliminatestheweakestlinkandconfirmsthateveryoneisuptodate.

Migration

* For additional support, call our reseller hotline at (888) 780-7962.

Answer 2: No Protection at the Endpoint

EvenifyouonlyhavedesktopsandnoconnectiontotheInternet,youstillneedtoprotectyourendpointsystems.EndpointsarevulnerabletoattackviaaUSBdrive,CD/DVD,orotherinputdevice.Threatscancomefrommultiplesources,notonlytheInternet,andeverydeviceneedsitsownprotection.Also,protectionwithonlyantivirussoftwareisinadequate.Today,threatsarequicker,sneakier,andcarryadevastatingpayload.Youneedcompleteprotectionthatincludesthefollowingtechnologies:

• Antivirustoprotectyoursystemsfromvirusesandstopthemfromspreading

• Antispywaretostopspiesfromstealingconfidentialinformation

• Desktopfirewalltokeepthievesfromaccessingendpointsandusingthemasapointofattack

• Intrusionpreventiontoblockdevastatingzero-dayattacksandvariantsofattacks

• DevicecontroltopreventknowingandunknowingusersfromusingUSB,CD/DVD,orevenMP3playersonthenetworktoeitherloadmaliciouscodeor“slurp”confidentialinformation

SymantecEndpointProtection11.0includesallofthesetechnologiestogiveyouthemostcompleteendpointprotectionavailableinasingleagentandmanagedfromasingleconsole.

Former Product New Product

SymantecAntiVirusCorporateEditionSymantecClientSecurityConfidenceOnline™forCorporatePCs(WholeSecurity)

SymantecSygate™EnterpriseProtection

} }} Symantec Endpoint Protection

SymantecAntiVirusEnterpriseEdition } }} Symantec Multi-tier Protection

SymantecAntiViruswithGroupwareProtectionSymantecClientSecuritywithGroupwareProtection } }}

Symantec Endpoint Protection Small Business Edition

SymantecNetworkAccessControl(LANand/orDHCP) } }} Symantec Network Access Control

SymantecNetworkAccessControl(Gatewayand/orCNAC) } }} Symantec Network Access Control

Starter Edition

SymantecSygateEnterpriseProtection(withSelf-Enforcement) } }}

Symantec Endpoint Protection and Symantec Network Access Control Starter Edition

Page 2: Symantec Endpoint Protection Sales Script Question: …eval.symantec.com/.../Disti_Toolkit/content/Sales/sep_sales_script.pdf · Symantec™ Endpoint Protection Sales Script Question:

Copyright©2007SymantecCorporation.Allrightsreserved.Symantec,theSymantecLogo,ConfidenceOnline,Sygate,SymantecAntiVirus,andVeritasaretrademarksorregisteredtrademarksofSymantecCorporationoritsaffiliatesintheU.S.andothercountries.Microsoft,Windows,andWindowsVistaareeitherregisteredtrademarksortrademarksofMicrosoftCorporationintheUnitedStatesand/orothercountries.Othernamesmaybetrademarksoftheirrespectiveowners.PrintedintheU.S.A.11/07 13517677

1. What functionality is included in that product?• SymantecEndpointProtection11.0isacomprehensive,next-

generationversionofSymantecAntiVirusthathelpsprovideproactivethreatprotectionforlaptops,desktops,andservers.Itincludesantivirus,antispyware,desktopfirewall,intrusionprevention,anddevicecontroltechnologiesinasingleagentandmanagedfromasinglemanagementconsole.

• ThisintegratedtechnologyusesuniqueVxMStechnologyfromVeritas™,allowingdeeperintegrationwiththeoperatingsystemtodetectandremovethestealthiestspywareandrootkits.(Source:ThompsonCyberSecurityLabs)

• Symantechasconsistentlybeatenthecompetitioninprotectionagainstpolymorphicthreatsandwastheonlyvendortodetect100percentintheFebruary2007AVComparativesreview.[Source:AVComparatives,Anti-ViruscomparativeNo.13(February2007)]

2. What is the footprint of your combined endpoint solution? TheSymantecEndpointProtectionfootprintisonly24MBforall

ofthesetechnologies,dramaticallylessthanthatoflesscompletecompetitiveproducts.Thisrepresentsan80percentreductionfrompreviousversions,freeingupvaluablediskspaceforotherimportantapplicationsandimprovingendpointperformance.

3. How many management agents do you use for your endpoint security solution?

Howwouldyouliketouseonlyoneconsoleandoneagenttomanageyourantivirus,antispyware,desktopfirewall,intrusionprevention,devicecontrol,andnetworkaccesscontroltechnologies?ThatisexactlywhatSymantecEndpointProtection11.0letsyoudo.Inaddition,networkaccesscontrolcapabilityisintegratedintotheagentforSymantecEndpointProtectionandonlyneedstobelicensedtobeupandrunning,withnoadditionalagentstodeploy.Howisthatforvalue?

4. Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network?

Ifso,SymantecNetworkAccessControlwillgiveyoutheabilitytolimitaccesstoyournetworkiftheendpointdeviceisnotuptodateorcompliantwithsecuritypolicy.Networkaccesscontroloffersyoutwobenefits:(1)Itgreatlyreducesthechancesofathreatbeingcarriedintoyournetworkbytravelingemployees,contractors,ortelecommuters.(2)Ithelpsensurethatanymanagedendpointdeviceenteringthenetworkmeetstherequirementsofyoursecuritypolicy.Thiseliminatestheweakestlinkandconfirmsthateveryoneisuptodate.

Answer 3: Competitive Product

ManufacturerAntivirus

(signature-based)Antispyware

(signature-based)Firewall

Generic Exploit Blocking1

Behavior-based Intrusion

Prevention2Device Control

Single Console, Single Agent per

Client

Performance in VB100 Tests3

Symantec(SymantecEndpointProtection11.0,SymantecNetworkAccessControl11.0)

3 3 3 3 3 3 33

100%“Pass”inallteststakensince

1999

(McAfeeVirusScanEnterprise8.5i)

3 3

TCP/UDPportblockingonly;nolocationawarenessorrulesengine No

Rulesonly;nosignatures,

behavior,orproac-tivethreatscan

No

Singleconsole,multipleagentsperclientwhenusingePolicyOrchestrator

Failed13times,1999–2007,includingin2007on

WindowsVistaplatform

(McAfeeTotalProtectionforSmallBusiness)

Nologging,customrules,orlocationswitching

No 3

(McAfeeTotalProtectionforEnterprise)

3 3Rulesand

signaturesonly;nobehavior

1console,3separateproducts,Multipleagentsand

modules

Failedon64-bitWindowsXPandWindowsVistaplatforms,

December2006

Microsoft®(ForefrontClientSecurity)

3 33

IncludedwithWindows®XPandWindowsVista®

No No

RequiresGroupPolicyManagement

Console

ManagementrequiresWSUS,MOM,Active

Directory,andSQLServerReporting

services

FailedonWindowsVista,February2007

Trend Micro(TrendMicroOfficeScanCorporateEdition7.3)

3 3Lackscentral

loggingNo No No 3

Failedon64-bitWindowsXPandWindows

Vistaplatforms,December2006

Source:SymantecanalysisbasedonproductanddocumentationreviewofSymantecEndpointProtection11.0andSymantecNetworkAccessControl11.0,McAfeeVirusScanEnterprise8.5i,McAfeeTotalProtectionforSmallBusiness,McAfeeTotalProtectionforEnterprise,TrendMicroOfficeScanCorporateEdition7.3,andMicrosoftForefrontClientSecurity,May2007.Productdetailssubjecttochangewithoutnotice.1 GenericExploitBlockinganalyzesnetworktraffictargetingvulnerablesoftwareratherthanspecificexploits,sosecurityresearchersmaydeliverprotectionbeforeanexploithasbeenpostedorreleased:http://www.networkworld.com/news/tech/2004/083004techupdate.html.2 Host-basedintrusionpreventionsystemsmaya)limitapplicationactionsaccordingtorules(rule-based),b)comparenetworktraffictothatproducedbyknownmalware(signature-based),orc)applyascoringmechanismtodetectsuspiciousbehaviorby

applications(behavior-based).3 PerformancedatacompareSymantecandcompetitorantivirussolutionsonly,effectiveMay1,2007.DataarefromindependentcomparativetestsofproductsconductedbyVirusBulletin,availablewithfreeregistrationatwww.virusbtn.com.Symantecdatafrom

SymantecNortonAntiVirusproductsv5.02.04(11/99),SymantecNortonAntiVirusCorporateEditionv7.61.935(6/02),SymantecAntiVirus8.00.93744.1.0.15(2/03),andsuccessorversionsoftheseproducts.McAfeedatafromNAIVirusScanv4.0.3.4040(25/8/99)(11/99),NAINetShieldforNetWarev4.5.0(9/00),NetworkAssociatesMcAfeeNetShieldv4.50(9/01),McAfeeVirusScanv6.02.1019.1(6/02),NAIVirusScanEnterprise7.004..404261(6/03),McAfeeNetShield4.62(8/04),McAfeeLinuxShield1.1.0.665i686(4/05),McAfeeVirusScanEnterprise8.0.044004483(6/05),andsuccessors.TrendMicrodatafromTrendMicroTrendServerProtect5.21(11/01),TrendMicroPC-cillin20007.61.0.1437.195(2/02),TrendServerProtectLinux1.1(5/03),TrendInternetSecurity11.2013117.1001.885.00(6/04),TrendMicroOfficeScanCorporateEditionv.7.3(10/06),andsuccessors.MicrosoftdatafromMicrosoftOneCare(6/06)andMicrosoftWindowsLiveOneCare1.5(2/07).Productdetailssubjecttochangewithoutnotice.

McA

fee