armor 2016 partner programs · 2018. 4. 27. · • iprm • • ddos • • waf • • nids •...
TRANSCRIPT
-
The Leader in Active Cyber Defense
CONFIDENTIAL DO NOT DISTRIBUTE
Armor 2016 Partner Programs
DAN MANNION | VP Partner & Alliances
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Agenda
• Who is Armor?• The Armor Security Focus
• The Armor Partner Program• Peters & Associates
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Companies are Faced with a Dilemma……
Only armor delivers a strong cyber security posture through integrated intelligence, defense & control
DO IT YOURSELF• Recruit, hire and retain
proven cyber security team
• Select and integrate multiple network and endpoint security tools
• Develop sustainable and effective security policies, including threat analysis, vulnerability analysis and incident response
• Develop 24/7 SOC, source 50-plus threat intelligence feeds, integrate SIEM and develop automated process to eliminate noise
• Add additional support headcount
Building and maintaining an effective security posture is possible,but takes significant tools, talent and techniques.
Our Value Proposition
Security toolsaren’t the answer
Armor reduces cost & complexity of active cyber defense
VS
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Example CustomersH
ealth
care
Fina
ncia
l Ser
vice
s /
Paym
ents
Info
rmat
ion
Sec
urity
(post breach)
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT 5
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Finding the Needles
6
• Hypervisor Firewall• Hardened Operating System• Patch Management• Anti-Malware Protection• OS File Integrity Monitoring• Log Management & SIEM• Vulnerability Scans
• IPRM •
• DDOS •
• WAF •
• NIDS •
FOR EVERY
35,000,000ATTACKS BLOCKED
JUST 1 ATTACK GETS THROUGH
ARMOR AVERAGES ~2 DAYS OF DWELL TIME
INDUSTRY AVERAGES ~205 DAYS OF DWELL TIMEVS
OVER 250,000,000 ATTACKS PER MONTH
THREAT INTELLIGENCE
SECURITY OPERATIONS
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Security Operations Talent
200+ YEARS IT SECURITY EXPERIENCE100+ YEARS U.S. MILITARY EXPERIENCE30+ YEARS NSA EXPERIENCE30+ SECURITY INDUSTRY CERTIFICATIONS
• Former SOC Director for U.S. Army Cyber Command
• Former Chief of Operations of the DOD’s Global NetOps Center for JTF-GNO (Cyber Command)
• Former Cryptologist for the National Security Agency
• Certified Chief Information Security Officers (CCISO)
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT 8
PROTECTED BY WORLD-CLASS SOC
The World’s MostSecure Managed Cloud
For organizations that store, access or manage critical or sensitive data workloads that require the best in trust, performance and security.
VIRTUAL PRIVATE CLOUD
• Defended by ArmorActive Cyber Defense
• High-Performance Cloud Infrastructure
• Off-Site Multi-Tenant Deployment
REAL-TIME THREAT INTELLIGENCE & MITIGATION
100X SHORTER DWELL TIMES
INCLUDES 24-7 SECURITY & SUPPORT
INTEGRATED INTELLIGENCE, DEFENSE & CONTROL
PURPOSE-BUILT FOR PCI & HIPAA COMPLIANCE
BLOCKS3,500,000 ATTACKS PER MONTH
VM-Level Security
Defend valuable data workloads and applications — no matter where they’re located. Armor’s security and threat intelligence solutions protect third-party clouds or customer-owned environments.
COREADVANCED VM-HARDENING
24-7 SECURITY& SUPPORT AVAILABLE
RIGHT WORKLOAD, RIGHT SECURITY
6 PROVEN SECURITY LAYERS
GUARDED BY ELITE CYBERSECURITY PROS & WORLD-CLASS SOC
• VM Hardening
• Patch Monitoring
• Log & Event Management
• Anti-Malware Management
• File Integrity Monitoring
• Vulnerability Scans
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Typical Workloads
Outsourcing Adoption Cycle
1 2 3 4 5 6 7 8 9
LOW SECURITYREQUIREMENT
MEDIUM SECURITYREQUIREMENT
HIGH SECURITYREQUIREMENT
Data Classification Level
Cloud-based Solutions Public clouds / DIY +Software security solutions
with
Private clouds / DIY +Managed security solutions
or
PRIVATE INFORMATION HIGHLY SENSITIVE INFORMATIONPUBLIC OR NON-SENSITIVE INFORMATION
Innovators
Early Adopters
Early Majority
Laggards
Late Majority
Innovators
Early Adopters
Early Majority
Laggards
Late Majority
Innovators
Early Adopters
Early Majority
Laggards
Late Majority
Focused on SecurityProduct portfolio based on workload risk levels supporting your multi-cloud strategy
9
-
The Armor Partner Program
10
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
What type of Armor Partner are you?
Managed Service Provider
Leverage Armor’s cloud security solutions to enhance your offerings. Increase margins with additional benefits that scale with your business.
Technology Partner
SaaS providers who want the most secure and compliant cloud environment for their customers? Differentiate yourself in the market today with the world class Secured by Armor offerings.
Reseller Partner
Offer your customers the most effective way to protect themselves in the cloud. Feel confident adding Armor’s cloud security solution to your portfolio.
Referral Partner
Armor Referral partners help sell the Armor Anywhere and Armor Complete solutions to businesses of all sizes. Earn sizeable commissions by promoting Armor solutions.
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT 12
A Single Pane of GlassVISUALIZE YOUR SECURITY POSTURE
GAIN SECURITY COMPONENT DETAILS AND STATUS
LEVERAGE SIMPLE INSTALLATION PROCESSES
SEE YOUR GLOBAL VM ENVIRONMENT
GET SUPPORT VIA SECURE COMMUNICATION
ENJOY STRAIGHTFORWARD USER MANAGEMENT
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
Sales and Marketing Benefits
13
Armor Guardian Partner Level 1Partner Portal Access
Armor Partner Logo
Marketing Materials:
Sales Collateral, Technical & Sales Presentations, Compete documentation, Customer Evidence
Learning Library: Technical and Sales resources
Armor Management Portal
Deal Registration
Armor Partner Support Team
Armor Guardian Partner Level 2: All of the above plus the below benefits
Exclusive PR
Online Events/Webinars with Armor
Social Marketing Engagement
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT 14
Ric joined Peters &Associates in December 1989, with significant experience in technology consulting and vendor management. He has served as a customer-centric voice on a wide variety of leading technology vendor committees.
Ric and his team of business,project management and technical professionals are responsible for delivering business value to the customers. He is passionate about connecting customers to solutions that materially impact their businesses, and steadfastly remains focused on “customer first.”
Ric Opal
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT
The Peters & Associates Story
15
• Who we are• Our target customers• The traditional Peters & Associates security offering• Why we chose to partner with Armor
-
CONFIDENTIAL DO NOT DISTRIBUTE | BETWEEN YOU AND THE THREAT 16
Join the Armor Partner Program
Are you a:
Managed Service Provider
Reseller Partner
Technology Alliance Partner
Referral Partner
If so we want you to join the New Armor Partner Program
Rich Incentives
Marketing, Sales and Technical Resources
Partner Community Portal
And much more
Visit www.armor.com/partners and apply today