SlideShare a Scribd company logo
1 of 14
IBM Security Systems




   Arrow Business Partner Jam –
   Tuesday 17th July 2012

   Vicki Cooper, Security Systems Sales
   Manager
   IBM Security Systems
   IBM Software Group UKI




© 2012 IBM Corporation
1                                         © 2012 IBM Corporation
IBM Security Systems



       IT Security is a board room discussion




    Business             Brand image       Supply chain      Legal            Impact of        Audit risk
    results                                                  exposure         hacktivism


    Sony estimates       HSBC data         Epsilon breach    TJX estimates    Lulzsec 50-day   Zurich
    potential $1B        breach            impacts 100       $150M class      hack-at-will     Insurance PLc
    long term            discloses 24K     national brands   action           spree impacts    fined £2.275M
    impact –             private banking                     settlement in    Nintendo, CIA,   ($3.8M) for the
    $171M / 100          customers                           release of       PBS, UK NHS,     loss and
    customers*                                               credit / debit   UK SOCA,         exposure of
                                                             card info        Sony …           46K customer
                                                                                               records




2                                                                                                 © 2012 IBM Corporation
IBM Security Systems


Security leaders shared their views on how the security landscape is
changing




3                            Source: IBM Center for Applied Insights   © 2012 IBM Corporation
IBM Security Systems


    Targeted Attacks Shake Businesses and Governments




                            IBM Security X-Force® 2011 Trend and Risk Report
4                                                                              © 2012 IBM Corporation
IBM Security Systems


    Solving a security issue is a complex, multi-dimensional puzzle

                            Employees         Consultants        Hackers       Outsourcers         Customers   Suppliers
        People




                                 Structured                  Unstructured                    At rest                In motion
         Data




                            Systems applications            Web applications                 Web 2.0               Mobile apps

     Applications




     Infrastructure




                         It is no longer enough to protect the perimeter –
                        siloed point products will not secure the enterprise

5
5                                                                                                                      © 2012 IBM Corporation
IBM Security Systems


    Intelligence: Leading products and services in every segment




6                                                            © 2012 IBM Corporation
IBM Security Systems


IBM’s Vision for Infrastructure Threat Protection – Roadmap

Security                                                            Network
Intelligence                                                                           Risk
                           Log Manager            SIEM              Activity                               Future
Platform                                                                              Manager
                                                                    Monitor



Threat                                                                                           2
Intelligence                Vulnerability Data      Malicious Websites    Malware Information        IP Reputation
and Research


Advanced               Management
Threat
Protection            1                                                          3                   4
Platform                                         Content                             Network
                             Intrusion                         Web Application                                         IBM Network
                                                 and Data                            Anomaly             Future
                            Prevention                           Protection                                            Security
                                                 Security                            Detection




                  1   1Q12: Launched IBM Security Network IPS Powered by X-Force
                  2   2Q12: Launch X-Force IP Reputation Feed for QRadar

                  3   2Q12: Launch QRadar Network Anomaly Detection



7                                                                                                                    © 2012 IBM Corporation
IBM Security Systems


    In this “new normal”, organizations need an intelligent view
    of their security posture
                                                                                               Optimized
                                                                                               Organizations use
                                                                          In Sec               predictive and
                                                                            te u               automated security
                                                                              lli rit
                                                                                 ge y          analytics to drive toward
                                                                                   nc          security intelligence
                                                                                     e




                                                               O
                              Automated




                                                                 pt
                                                                    im
                                                                      iz
                                                                        ed
                                                     Prr
                                                     P                                   Proficient
                                                        offi
                                                         o                               Security is layered into
                                                           ic i
                                                            ci                           the IT fabric and
                                                               en
                                                               en                        business operations

                      Basic                                      tt
                                          Ba
                              Manual




             Organizations
                                             si




         employ perimeter
                                               c




         protection, which
      regulates access and
    feeds manual reporting
                                          Reactive                Proactive

8                                                                                                     © 2012 IBM Corporation
IBM Security Systems


Business Partner Value in the Sales Process – SVI Programme


                                     Business Partner                          Opportunity
        Sales Process
                                       Contribution                            Registration

                           Identifying and qualifying new customer
            Identify       opportunities for SWG’s products
                                                                                  accurately
                                                                                   captures
                           Developing and delivering compelling value                 the
            Sell           propositions, proof of concepts, etc. that result       Business
                           in customers selecting SWG’s products                   Partner’s
                                                                                 contribution
                           Providing fulfillment services such as contract        in a timely
            Fulfill        management, order management, credit risk,               fashion
                           and shipping and logistics




9                                                                                 © 2012 IBM Corporation
IBM Security Systems


    Aligning Business Partner Incentives to Value


                                                             Linked
                                                                                                                Total
                                             Identify                      Sell                  Fulfill       Earning
           SVI
                                                                                                               Potential

                                                           (Fee Payment)                         As normal

         Base Discount                           5%                        5%*                 No Change        10%+


+        SMB Premium                             +5%                      +5%*                 No Change        20%+



OR       Value Advantage Plus                    +10%                      +15%                  15%         40%

                                                                              (Rebate)

                            – Reward for “identify” is dependent upon qualification for “sell”
                            – Rewards for “identify” and “sell” are independent of “fulfill”

                                                                                                               (Assuming partner
                           – Value Advantage Plus remains as an alternative for “sell” rewards                  identifies, sells &
                           – Fee payments processed immediately after software claim                                  fulfills)




    10                                                                                                          © 2012 IBM Corporation
IBM Security Systems


Marketing Support for Business Partners Generating Opportunity


                                                            BP
                                                        Opportunity
                                                        Identification




VAD Led Campaigns                                    Mid Market Specific           IBM Led
  -VAD Rebate Program          Co-Marketing                                                           BP autonomous
                                                           OnChannel         BP participates in IBM   Self-led and funded
-& Campaign as a Service     - 50/50 IBM/BP funded
                                                     75%-25% IBM/BP funded      Led campaigns              campaigns
    - VAD funds 100%




 Discuss with                 Build your               Dedicated MM           Check the IBM           Leverage IBM
 your VAD on                  marketing plan           campaigns              Brand Plans,            Content
 their 2012 plans             and put                  only. Request          visit                   (through IBM
 and where they               requests via             via your VAD.          BluePlanner             Brand Assets
 can support you              your VAD                 Campaign               regularly and           and Pre-
 based on your                provided you             executed A-Z           enquire via yr          packaged
 contractual                  meet the pre-            by OnChannel           BP Rep if               campaigns from
 engagement and               requisites (see          agency                 anything of             IBM Brand
 your own                     slide 5)                                        interest                Marketing, on
 business and                                                                                         PW or in the
 marketing plans                                                                                      Co-Marketing Center
                                                                                                      )


11                                                                                                      © 2012 IBM Corporation
IBM CONFIDENTIAL

      IBM Security Systems



BP Certifications update – July 15th

  Tests put in place:
    – Security Sales Mastery
    – QRadar Technical Certification
                 FROM                                                               TO


      Rational
       Group                   Tivoli                                              Security Group
        AppScan                 I&AM
                                                                                        ISS/Threat
                                                                                           I&AM
                                               ISS                                  Application Security
     Automation                                                Automation
       Group                                                                                               Data Group
     Tivoli Endpoint         Data Group                          Group
     Manager (BigFix)
                                                                 Tivoli Endpoint                              Guardium
                               Guardium                         Manager (BigFix)


                                                               Partners required to pass:
     Partners required to pass sales and technical             - 1 security sales mastery and:
     certifications for Rational, Tivoli, Information          -2 Technical Certs for each of the groups (specific to
     management – Sales and Tech Sales to sell the portfolio   those products the want to resell
     (ex. 3 Sales and upwards for 8 - 10 technical             - Guardium & TEM Tech Certs apply to Security auth.
     certifications                                            As few as 4 total Tech Certs can earn all three
                                                               authorizations.
12                                                                                                         © 2012 IBM Corporation
IBM Security Systems


Why IBM Security: Breadth, deep expertise, integration

     Leadership
        10+ years of leadership and innovation in Intrusion Detection/Prevention
        Help protect many of the largest organizations in the world

     Integration
        Integrates with other security tools such
         as IBM’s AppScan suite to deliver more intelligent
         Web application security

       Expertise
        Backed by X-Force, one of the largest security                             research
         teams
        9 security research centers combined with 9
         security operations centers around the world
        Consolidated management of hundreds of IPS
         sensors, as well as other security solutions

13                                                                                  © 2012 IBM Corporation
IBM Security Systems




                            ibm.com/security

14                                             © 2012 IBM Corporation

More Related Content

What's hot

eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene RodriguezReenergize
 
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSecuring Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSalahuddin Khawaja
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief Mestizo Enterprises
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 

What's hot (19)

VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
 
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSecuring Mobile - A Business Centric Approach
Securing Mobile - A Business Centric Approach
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 

Similar to IBM Security Systems Sales Partner Program

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorFMA Summits
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 

Similar to IBM Security Systems Sales Partner Program (20)

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 

More from Arrow ECS UK

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 

More from Arrow ECS UK (20)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

IBM Security Systems Sales Partner Program

  • 1. IBM Security Systems Arrow Business Partner Jam – Tuesday 17th July 2012 Vicki Cooper, Security Systems Sales Manager IBM Security Systems IBM Software Group UKI © 2012 IBM Corporation 1 © 2012 IBM Corporation
  • 2. IBM Security Systems IT Security is a board room discussion Business Brand image Supply chain Legal Impact of Audit risk results exposure hacktivism Sony estimates HSBC data Epsilon breach TJX estimates Lulzsec 50-day Zurich potential $1B breach impacts 100 $150M class hack-at-will Insurance PLc long term discloses 24K national brands action spree impacts fined £2.275M impact – private banking settlement in Nintendo, CIA, ($3.8M) for the $171M / 100 customers release of PBS, UK NHS, loss and customers* credit / debit UK SOCA, exposure of card info Sony … 46K customer records 2 © 2012 IBM Corporation
  • 3. IBM Security Systems Security leaders shared their views on how the security landscape is changing 3 Source: IBM Center for Applied Insights © 2012 IBM Corporation
  • 4. IBM Security Systems Targeted Attacks Shake Businesses and Governments IBM Security X-Force® 2011 Trend and Risk Report 4 © 2012 IBM Corporation
  • 5. IBM Security Systems Solving a security issue is a complex, multi-dimensional puzzle Employees Consultants Hackers Outsourcers Customers Suppliers People Structured Unstructured At rest In motion Data Systems applications Web applications Web 2.0 Mobile apps Applications Infrastructure It is no longer enough to protect the perimeter – siloed point products will not secure the enterprise 5 5 © 2012 IBM Corporation
  • 6. IBM Security Systems Intelligence: Leading products and services in every segment 6 © 2012 IBM Corporation
  • 7. IBM Security Systems IBM’s Vision for Infrastructure Threat Protection – Roadmap Security Network Intelligence Risk Log Manager SIEM Activity Future Platform Manager Monitor Threat 2 Intelligence Vulnerability Data Malicious Websites Malware Information IP Reputation and Research Advanced Management Threat Protection 1 3 4 Platform Content Network Intrusion Web Application IBM Network and Data Anomaly Future Prevention Protection Security Security Detection 1 1Q12: Launched IBM Security Network IPS Powered by X-Force 2 2Q12: Launch X-Force IP Reputation Feed for QRadar 3 2Q12: Launch QRadar Network Anomaly Detection 7 © 2012 IBM Corporation
  • 8. IBM Security Systems In this “new normal”, organizations need an intelligent view of their security posture Optimized Organizations use In Sec predictive and te u automated security lli rit ge y analytics to drive toward nc security intelligence e O Automated pt im iz ed Prr P Proficient offi o Security is layered into ic i ci the IT fabric and en en business operations Basic tt Ba Manual Organizations si employ perimeter c protection, which regulates access and feeds manual reporting Reactive Proactive 8 © 2012 IBM Corporation
  • 9. IBM Security Systems Business Partner Value in the Sales Process – SVI Programme Business Partner Opportunity Sales Process Contribution Registration Identifying and qualifying new customer Identify opportunities for SWG’s products accurately captures Developing and delivering compelling value the Sell propositions, proof of concepts, etc. that result Business in customers selecting SWG’s products Partner’s contribution Providing fulfillment services such as contract in a timely Fulfill management, order management, credit risk, fashion and shipping and logistics 9 © 2012 IBM Corporation
  • 10. IBM Security Systems Aligning Business Partner Incentives to Value Linked Total Identify Sell Fulfill Earning SVI Potential (Fee Payment) As normal Base Discount 5% 5%* No Change 10%+ + SMB Premium +5% +5%* No Change 20%+ OR Value Advantage Plus +10% +15% 15% 40% (Rebate) – Reward for “identify” is dependent upon qualification for “sell” – Rewards for “identify” and “sell” are independent of “fulfill” (Assuming partner – Value Advantage Plus remains as an alternative for “sell” rewards identifies, sells & – Fee payments processed immediately after software claim fulfills) 10 © 2012 IBM Corporation
  • 11. IBM Security Systems Marketing Support for Business Partners Generating Opportunity BP Opportunity Identification VAD Led Campaigns Mid Market Specific IBM Led -VAD Rebate Program Co-Marketing BP autonomous OnChannel BP participates in IBM Self-led and funded -& Campaign as a Service - 50/50 IBM/BP funded 75%-25% IBM/BP funded Led campaigns campaigns - VAD funds 100% Discuss with Build your Dedicated MM Check the IBM Leverage IBM your VAD on marketing plan campaigns Brand Plans, Content their 2012 plans and put only. Request visit (through IBM and where they requests via via your VAD. BluePlanner Brand Assets can support you your VAD Campaign regularly and and Pre- based on your provided you executed A-Z enquire via yr packaged contractual meet the pre- by OnChannel BP Rep if campaigns from engagement and requisites (see agency anything of IBM Brand your own slide 5) interest Marketing, on business and PW or in the marketing plans Co-Marketing Center ) 11 © 2012 IBM Corporation
  • 12. IBM CONFIDENTIAL IBM Security Systems BP Certifications update – July 15th  Tests put in place: – Security Sales Mastery – QRadar Technical Certification FROM TO Rational Group Tivoli Security Group AppScan I&AM ISS/Threat I&AM ISS Application Security Automation Automation Group Data Group Tivoli Endpoint Data Group Group Manager (BigFix) Tivoli Endpoint Guardium Guardium Manager (BigFix) Partners required to pass: Partners required to pass sales and technical - 1 security sales mastery and: certifications for Rational, Tivoli, Information -2 Technical Certs for each of the groups (specific to management – Sales and Tech Sales to sell the portfolio those products the want to resell (ex. 3 Sales and upwards for 8 - 10 technical - Guardium & TEM Tech Certs apply to Security auth. certifications As few as 4 total Tech Certs can earn all three authorizations. 12 © 2012 IBM Corporation
  • 13. IBM Security Systems Why IBM Security: Breadth, deep expertise, integration Leadership  10+ years of leadership and innovation in Intrusion Detection/Prevention  Help protect many of the largest organizations in the world Integration  Integrates with other security tools such as IBM’s AppScan suite to deliver more intelligent Web application security Expertise  Backed by X-Force, one of the largest security research teams  9 security research centers combined with 9 security operations centers around the world  Consolidated management of hundreds of IPS sensors, as well as other security solutions 13 © 2012 IBM Corporation
  • 14. IBM Security Systems ibm.com/security 14 © 2012 IBM Corporation

Editor's Notes

  1. There are three basic areas of contribution or value that you may be compensated for …and they map directly to the essential elements of the sales process: “ Identify” – that’s finding and validating new opportunities – especially opportunities in new customers “ Sell” – taking the opportunity and running with it to close the deal – applying your sales and technical expertise to convince the customer that you have the right solution to their business problem – based, of course, on IBM software technology… “ Fulfill” – managing the order and delivery logistics to get the right products to the right customer, on time It is relatively simple to compensate our partners for the fulfillment piece of this – this is what we have always done… We know which partners deliver what, and to whom, through Passport Advantage – our customer discount system However, appropriately compensating for these other activities – Identify & Sell – is more difficult. It requires that we know who performed them. Passport Advantage can’t help us there. That’s why a secure and easily accessible deal registration system becomes a critical element of this new incentive design Deal registration systems can capture the details of a Business Partner’s contribution (who has invested time, skills, etc…) – simply, quickly and accurately - from the outset of the opportunity. So… now we are able to track who is contributing what, …and where… … let’s see how this will work in earnest – with some real numbers…