Transcript
Page 1: Symantec Endpoint Protection Sales Script Question: …eval.symantec.com/.../Disti_Toolkit/content/Sales/sep_sales_script.pdf · Symantec™ Endpoint Protection Sales Script Question:

Symantec™ Endpoint Protection Sales Script

Question: How are you currently protecting your endpoint systems (laptops, desktops, and servers)?

Answer 1: Symantec AntiVirus™

Is your maintenance contract current?*• Current maintenance—Customersthatarecurrentwithmaintenance

orsupportcontractsforpreviousversionsoftheirlicensedSymantecAntiVirussoftwarecanupgradetotheappropriateSymantecEndpointProtectionlicensesatnoadditionalcharge.Thesecustomerswillreceiveanemail,oraletterifwedonothaveanemailaddress,fromSymantecdirectingthemtohttps://fileconnect.symantec.com/licensing,wheretheycanselectalanguage,entertheirexistingserialnumber,andthendownloadtheproductdirectly.TheycanalsorequestthataCDbemailedtothem.

• Expired maintenance—Existingcustomersthatdonothavecurrentmaintenance/supportmaypurchaseversionupgradesatspeciallydiscountedprices(20percentofftheMSRPoffulllicenses).SymantecEndpointProtection11.0isthecomprehensive,next-generationversionofSymantecAntiVirusthathelpsprovideadvancedthreatprotectionforlaptops,desktops,andservers.Itisatremendousvalue,offeringunmatchedmanagementandfunctionality.Letmegiveyouafewreasonstoupgrade.

Reasons to upgrade to Symantec Endpoint Protection• Single agent install and management—Allofthistechnologyis

integratedintoasingleagentandmanagedfromasingleconsole.

• Smaller footprint—Thefootprintisnowonly24MB,whichismuchsmallerthanthatofthecompetition’slesscompletepackagesaswellasSymantec’scoresecurityproducts.

• More security—SymantecEndpointProtectionoffersmorethanjustantivirustechnology;italsoincludesbest-of-breedantispyware,desktopfirewall,intrusionprevention,anddevicecontrol.

• TruScan™—Behavior-blockingtechnologygivesyoutruezero-dayprotectionfromzero-dayattacks.Unlikeleadingantivirusproductsonthemarket,ithasidentifiedover1,000newthreatspermonth—withthelowestfalsepositiverateof0.004percent.Thatequatestofewerthan40falsepositivesforevery1millionPCsscanned!

• Generic exploit blocking—Vulnerability-basedprotectionrequiresonlyonesignaturetoprotectthevulnerabilityfromanattackandallofitsvariantsincludingunknownthreats.

• Device control—DevicecontrolhelpspreventdatalossfrominsidertheftandallowscontrolovervulnerableUSBports(i.e.,MP3players,USBdrives,etc.)

• Network access control as an easy add-on—Addingnetworkaccesscontroltoattaincompleteendpointsecurityisaseasyasturningonthelicense.SymantecNetworkAccessControlisincludedintheinitialinstallofSymantecEndpointProtectionandwillappearinthemanagementconsoleonceitisactivated.

• Completely customizable—Whileallofthisfunctionalityisavailable,youcanchoosetoturnononlythetechnologyyouwanttousetoday,withtheoptiontotakeadvantageoftheremainderatalatertime.

Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network?Ifso,SymantecNetworkAccessControlwillgiveyoutheabilitytolimitaccesstoyournetworkifthedeviceisnotuptodateorcompliantwithsecuritypolicy.Networkaccesscontroloffersyoutwobenefits:(1)Itgreatlyreducesthechancesofathreatbeingcarriedintoyournetworkbytravelingemployees,contractors,ortelecommuters.(2)Ithelpsensurethatanymanagedendpointdeviceenteringthenetworkmeetstherequirementsofyoursecuritypolicy.Thiseliminatestheweakestlinkandconfirmsthateveryoneisuptodate.

Migration

* For additional support, call our reseller hotline at (888) 780-7962.

Answer 2: No Protection at the Endpoint

EvenifyouonlyhavedesktopsandnoconnectiontotheInternet,youstillneedtoprotectyourendpointsystems.EndpointsarevulnerabletoattackviaaUSBdrive,CD/DVD,orotherinputdevice.Threatscancomefrommultiplesources,notonlytheInternet,andeverydeviceneedsitsownprotection.Also,protectionwithonlyantivirussoftwareisinadequate.Today,threatsarequicker,sneakier,andcarryadevastatingpayload.Youneedcompleteprotectionthatincludesthefollowingtechnologies:

• Antivirustoprotectyoursystemsfromvirusesandstopthemfromspreading

• Antispywaretostopspiesfromstealingconfidentialinformation

• Desktopfirewalltokeepthievesfromaccessingendpointsandusingthemasapointofattack

• Intrusionpreventiontoblockdevastatingzero-dayattacksandvariantsofattacks

• DevicecontroltopreventknowingandunknowingusersfromusingUSB,CD/DVD,orevenMP3playersonthenetworktoeitherloadmaliciouscodeor“slurp”confidentialinformation

SymantecEndpointProtection11.0includesallofthesetechnologiestogiveyouthemostcompleteendpointprotectionavailableinasingleagentandmanagedfromasingleconsole.

Former Product New Product

SymantecAntiVirusCorporateEditionSymantecClientSecurityConfidenceOnline™forCorporatePCs(WholeSecurity)

SymantecSygate™EnterpriseProtection

} }} Symantec Endpoint Protection

SymantecAntiVirusEnterpriseEdition } }} Symantec Multi-tier Protection

SymantecAntiViruswithGroupwareProtectionSymantecClientSecuritywithGroupwareProtection } }}

Symantec Endpoint Protection Small Business Edition

SymantecNetworkAccessControl(LANand/orDHCP) } }} Symantec Network Access Control

SymantecNetworkAccessControl(Gatewayand/orCNAC) } }} Symantec Network Access Control

Starter Edition

SymantecSygateEnterpriseProtection(withSelf-Enforcement) } }}

Symantec Endpoint Protection and Symantec Network Access Control Starter Edition

Page 2: Symantec Endpoint Protection Sales Script Question: …eval.symantec.com/.../Disti_Toolkit/content/Sales/sep_sales_script.pdf · Symantec™ Endpoint Protection Sales Script Question:

Copyright©2007SymantecCorporation.Allrightsreserved.Symantec,theSymantecLogo,ConfidenceOnline,Sygate,SymantecAntiVirus,andVeritasaretrademarksorregisteredtrademarksofSymantecCorporationoritsaffiliatesintheU.S.andothercountries.Microsoft,Windows,andWindowsVistaareeitherregisteredtrademarksortrademarksofMicrosoftCorporationintheUnitedStatesand/orothercountries.Othernamesmaybetrademarksoftheirrespectiveowners.PrintedintheU.S.A.11/07 13517677

1. What functionality is included in that product?• SymantecEndpointProtection11.0isacomprehensive,next-

generationversionofSymantecAntiVirusthathelpsprovideproactivethreatprotectionforlaptops,desktops,andservers.Itincludesantivirus,antispyware,desktopfirewall,intrusionprevention,anddevicecontroltechnologiesinasingleagentandmanagedfromasinglemanagementconsole.

• ThisintegratedtechnologyusesuniqueVxMStechnologyfromVeritas™,allowingdeeperintegrationwiththeoperatingsystemtodetectandremovethestealthiestspywareandrootkits.(Source:ThompsonCyberSecurityLabs)

• Symantechasconsistentlybeatenthecompetitioninprotectionagainstpolymorphicthreatsandwastheonlyvendortodetect100percentintheFebruary2007AVComparativesreview.[Source:AVComparatives,Anti-ViruscomparativeNo.13(February2007)]

2. What is the footprint of your combined endpoint solution? TheSymantecEndpointProtectionfootprintisonly24MBforall

ofthesetechnologies,dramaticallylessthanthatoflesscompletecompetitiveproducts.Thisrepresentsan80percentreductionfrompreviousversions,freeingupvaluablediskspaceforotherimportantapplicationsandimprovingendpointperformance.

3. How many management agents do you use for your endpoint security solution?

Howwouldyouliketouseonlyoneconsoleandoneagenttomanageyourantivirus,antispyware,desktopfirewall,intrusionprevention,devicecontrol,andnetworkaccesscontroltechnologies?ThatisexactlywhatSymantecEndpointProtection11.0letsyoudo.Inaddition,networkaccesscontrolcapabilityisintegratedintotheagentforSymantecEndpointProtectionandonlyneedstobelicensedtobeupandrunning,withnoadditionalagentstodeploy.Howisthatforvalue?

4. Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network?

Ifso,SymantecNetworkAccessControlwillgiveyoutheabilitytolimitaccesstoyournetworkiftheendpointdeviceisnotuptodateorcompliantwithsecuritypolicy.Networkaccesscontroloffersyoutwobenefits:(1)Itgreatlyreducesthechancesofathreatbeingcarriedintoyournetworkbytravelingemployees,contractors,ortelecommuters.(2)Ithelpsensurethatanymanagedendpointdeviceenteringthenetworkmeetstherequirementsofyoursecuritypolicy.Thiseliminatestheweakestlinkandconfirmsthateveryoneisuptodate.

Answer 3: Competitive Product

ManufacturerAntivirus

(signature-based)Antispyware

(signature-based)Firewall

Generic Exploit Blocking1

Behavior-based Intrusion

Prevention2Device Control

Single Console, Single Agent per

Client

Performance in VB100 Tests3

Symantec(SymantecEndpointProtection11.0,SymantecNetworkAccessControl11.0)

3 3 3 3 3 3 33

100%“Pass”inallteststakensince

1999

(McAfeeVirusScanEnterprise8.5i)

3 3

TCP/UDPportblockingonly;nolocationawarenessorrulesengine No

Rulesonly;nosignatures,

behavior,orproac-tivethreatscan

No

Singleconsole,multipleagentsperclientwhenusingePolicyOrchestrator

Failed13times,1999–2007,includingin2007on

WindowsVistaplatform

(McAfeeTotalProtectionforSmallBusiness)

Nologging,customrules,orlocationswitching

No 3

(McAfeeTotalProtectionforEnterprise)

3 3Rulesand

signaturesonly;nobehavior

1console,3separateproducts,Multipleagentsand

modules

Failedon64-bitWindowsXPandWindowsVistaplatforms,

December2006

Microsoft®(ForefrontClientSecurity)

3 33

IncludedwithWindows®XPandWindowsVista®

No No

RequiresGroupPolicyManagement

Console

ManagementrequiresWSUS,MOM,Active

Directory,andSQLServerReporting

services

FailedonWindowsVista,February2007

Trend Micro(TrendMicroOfficeScanCorporateEdition7.3)

3 3Lackscentral

loggingNo No No 3

Failedon64-bitWindowsXPandWindows

Vistaplatforms,December2006

Source:SymantecanalysisbasedonproductanddocumentationreviewofSymantecEndpointProtection11.0andSymantecNetworkAccessControl11.0,McAfeeVirusScanEnterprise8.5i,McAfeeTotalProtectionforSmallBusiness,McAfeeTotalProtectionforEnterprise,TrendMicroOfficeScanCorporateEdition7.3,andMicrosoftForefrontClientSecurity,May2007.Productdetailssubjecttochangewithoutnotice.1 GenericExploitBlockinganalyzesnetworktraffictargetingvulnerablesoftwareratherthanspecificexploits,sosecurityresearchersmaydeliverprotectionbeforeanexploithasbeenpostedorreleased:http://www.networkworld.com/news/tech/2004/083004techupdate.html.2 Host-basedintrusionpreventionsystemsmaya)limitapplicationactionsaccordingtorules(rule-based),b)comparenetworktraffictothatproducedbyknownmalware(signature-based),orc)applyascoringmechanismtodetectsuspiciousbehaviorby

applications(behavior-based).3 PerformancedatacompareSymantecandcompetitorantivirussolutionsonly,effectiveMay1,2007.DataarefromindependentcomparativetestsofproductsconductedbyVirusBulletin,availablewithfreeregistrationatwww.virusbtn.com.Symantecdatafrom

SymantecNortonAntiVirusproductsv5.02.04(11/99),SymantecNortonAntiVirusCorporateEditionv7.61.935(6/02),SymantecAntiVirus8.00.93744.1.0.15(2/03),andsuccessorversionsoftheseproducts.McAfeedatafromNAIVirusScanv4.0.3.4040(25/8/99)(11/99),NAINetShieldforNetWarev4.5.0(9/00),NetworkAssociatesMcAfeeNetShieldv4.50(9/01),McAfeeVirusScanv6.02.1019.1(6/02),NAIVirusScanEnterprise7.004..404261(6/03),McAfeeNetShield4.62(8/04),McAfeeLinuxShield1.1.0.665i686(4/05),McAfeeVirusScanEnterprise8.0.044004483(6/05),andsuccessors.TrendMicrodatafromTrendMicroTrendServerProtect5.21(11/01),TrendMicroPC-cillin20007.61.0.1437.195(2/02),TrendServerProtectLinux1.1(5/03),TrendInternetSecurity11.2013117.1001.885.00(6/04),TrendMicroOfficeScanCorporateEditionv.7.3(10/06),andsuccessors.MicrosoftdatafromMicrosoftOneCare(6/06)andMicrosoftWindowsLiveOneCare1.5(2/07).Productdetailssubjecttochangewithoutnotice.

McA

fee


Recommended