Documente Academic
Documente Profesional
Documente Cultură
Partner Marketing
from Palo Alto Networks
This how-to guide has been It contains a whole host of (we hope!) useful information
including some sample marketing assets, plus files for
specifically developed for you to download and use. There is also a ‘cheat sheet’,
a sample call script for your sales team to use and links
Palo Alto Networks partners, to other pieces that you may find helpful. Plus there
to help you take our shared are links to the partner portal and to Palo Alto Networks
branding guidelines.
messages to market.
Everything you need to run your own Security Lifecycle
Review campaign is here.
If there’s anything missing, or you need any help, please
contact your local Palo Alto Networks Channel Business
Manager, or email gtelford@paloaltonetworks.com
0100110010
is no longer a nuisance, it threatens businesses and even lives.
When network security is breached, many companies scrabble
around for answers. Who’s to blame? What did they do? Will it
1011101010 happen again? But by then it’s often too late and the damage
can be devastating: as many as 60% of small and medium businesses
that experience a data breach go out of business after 6 months.
1010101101
0 00001001
01
8 S
•
USE THIS
IN YOUR
ADVERTISING..
6. Palo Alto Networks SLR Campaign
Landing pages The recommended content for the landing Put together by experts, your confidential
page is as follows: SLR report will show you:
You will have received the PSD file for the
Landing Pages
nding Pa
Labanner ges (below). Each item on the
graphic Claim your free Securityan Lifecycle
ner can eaReview
sily be Which
• applications are in use,
nn er gra ph ic (be low). Each item on the b and the potential risks to exposure
banner can easily be hechanged
PSD file fousing
r t he the
ba here from [PARTNER NAME] and
You will have received the PSD file for the banner graphic (below). Each item on the banner can easily be
You will have received t
grouped layers.
d using the grouped Lay
ers .
changed using the grouped Layers. Palo Alto Networks Specific
• details on ways adversaries are
change
When network security is breached, it’s attempting to breach your network
easy for people to point the finger of blame. Comparison
• data for your organisation,
But avoiding a breach is always better than versus that of your industry peers
hunting for answers afterwards. So find out Actionable
• intelligence - key areas you
where you’re most at risk now – and take can focus on immediately to reduce your
action immediately. risk exposure
Get a free Security Lifecycle Review (SLR) To arrange your free and confidential
from [PARTNER NAME] in collaboration Security Lifecycle Review, please submit
with Palo Alto Networks and find out what’s your details on the form below, which will
really happening with your network. also give you immediate access to a sample
report. Our team will then be in touch.
ollows:
me nd ed co nte nt for the landing page is as f
The recommended content for the landing page is as follows:
The rec om Alto Networks
Re vie w he re fro m [PA RTNER NAME] and Palo
y Lifecycle
Claim your free Security Lifecycle Review here from [PARTNER NAME] and Palo Alto Networks
Claim your free Securit oiding a
y f or pe op le to po int th e finger of blame. But av
s breached, it’s eas
When network security is breached, it’s easy for people to point the finger of blame. But avoiding a e most at risk now –
When network security i ds. So find of where you’r
Email HTML
There are 3 different HTML templates
provided, each targeting different profiles: Are you doing everything you
can to avoid threats and Claim your Security
urity
It's better to avoid a sec
1. Early Stage/Awareness
Claim your Security Lifecycle Review -
breaches?
Lifecycle Review -
breach — than hunt for
without obligations
without obligations Have you got rules in place about who
To arrange your free and confidential Security Lifecycle Review, please submit your details on the form
excuses afterwards.
can use
what, and when?
below, which will also give you immediate access to a sample report. Our team will then be in touch. Do you have a clear view of
companies scrabble aroun
blame? What did they do?
d for answers. Who’s to
Will it happen again?
applications?
Do you know how many threats – known
and
3. Existing Customer too late and damage can be Claim your Security unknown are attacking your network?
But by then it’s often what’s happening on your Lifecycle Review -
devastating. As an existing customer, you already
Email HTML network? without obligations know you can
public sector trust us as a partner to be looking after
We’ve seen huge fines from your best
There are 3 different HTML templates provided, each targeting different profiles:
terminal – over 60% of compa possible.
ss after 6 months. TELL ME HOW running, and who is using them?
a data loss go out of busine Find out what’s really happening with
your network
Do you know how many threats – known and
happening with your traffic. Get a free Security Lifecycle Review
So find out what’s really w unknown are attacking your network? (SLR).
Security Lifecycle Revie We run these in conjunction with Palo
– URL Changes
network traffic. Get a free Alto
1. Early Stage/Awareness (SLR). We run these in
conjunction with Palo Alto
Quadr ant leader and
Find out what’s really happening with your network
traffic. Get a free Security Lifecycle Review (SLR).
Networks, a Gartner Magic Quadrant
next generation security company who
leader and
Networks, a Gartner Magic g to maintain our lifestyles in the digital
are working
company who are workin
2. Existing Prospect
We run these in conjunction with Palo Alto
next generation security protect businesses like yours.
age and
in the digital age and
When you have created your landing page,
Networks, a Gartner Magic Quadrant leader and
to maintain our lifestyles TELL ME HOW
next generation security company who are working
protect businesses like yours.
3. Existing Customer
Partner Name
to maintain our lifestyles in the digital age and CLAIM YOUR FREE SLR
the HTML and simply replace all with your We will give you a FREE report as part of your
review that will clearly show you:
• Which applications are in use, and the
own link.
• attemptin
Specific details on ways adversaries are
potential risks to exposure Partner Description g to breach your network
adversaries are • Comparison data for your organisat
• Specific details on ways • Which applications are in use, and the
when you have created your landing page, you need to add the links to the HTML. To do this,
ion,
rk
netwoisation
ting to breach your organ , potential risks to exposure versus that of your industry peers
Comparison data for your
• attemp SLR_email_3_existing _customers.html[26/09/
indust ry peers • Specific details on ways adversaries are • Actionable2016, 15:53:38]
intelligence - key areas you can
versus that of your
search for “REPLACE LINK” in the HTML and simply replace all with your own link.
• Actionable intelligence
15:51:58]
SLR_email_1.html[26/09/2016, focus on immediately to
- key areas you can
reduce your risk
attempting to breach your network
• Comparison data for your organisation,
focus on immediately to reduce your risk
exposure.
versus that of your industry peers
exposure.
• Actionable intelligence - key areas you can
focus on immediately to reduce your risk
exposure. Partner name
Partner name Partner description
Partner description SLR_email_2_existing _prospects.html[26/09/2016, 15:53:37]
Partner name
Partner description
Connect: Contact:
95054.
Connect:
© 2016 Palo Alto Networks, Inc. All Rights
Contact:
- Partner/Logo changes
d. 4401 Great America
s, Inc. All Rights Reserve Privacy Policy | Terms of Use | Subscribe
© 2016 Palo Alto Network Preferences Connect: Contact:
| Email Feedback | Email Preferences
Email Feedback | Email
of Use | Subscribe |
Privacy Policy | Terms www.paloaltonetworks.com
© 2016 Palo Alto Networks, Inc. All Rights Reserved. 4401 Great America Parkway, Santa Clara, CA 95054.
In the HTML There are 2 options for including information either about Palo Alto Networks or
om
www.paloaltonetworks.c
Privacy Policy | Terms of Use | Subscribe | Email Feedback | Email Preferences
www.paloaltonetworks.com
your own organization. These can be located in the HTML with Identifiers/notes. See below
search for “REPLACE LINK” in the HTML and simply replace all with your own link.
Partner/Logo changes
It's better -to avoid a security Claim your Security
breach — than hunt for Lifecycle Review -
excuses afterwards.
– Partner/Logo In the HTML There are 2 options for including information either about Palo Alto Networks or
changes
without obligations
When network security is breached, many
In the HTML there your own organization. These can be located in the HTML with Identifiers/notes. See below
companies scrabble around for answers. Who’s to
are 2 options for including information either about Palo Alto Networks or your own organisation.
blame? What did they do? Will it happen again?
Partner name
Partner description
footer is specific to Palo Alto Networks. This needs to be changed to represent your own organisation.
Privacy Policy | Terms of Use | Subscribe | Email Feedback | Email Preferences
www.paloaltonetworks.com
- Legal Footer
The current legal footer is specific to Palo Alto Networks. This needs to be changes to represent
Step 2: Open a new empty email in outlook >> Click “Attach File”
Sending Email in Outlook
Step 3: Locate the HTML or Plain Text file on your PC and change the “inse
Step1: Make your edits to the HTML and Save as an HTML or plain text file.
“Insert as Text”
Step 2: Open a new empty email in outlook >> Click “Attach File”
Step 3: Locate the HTML or Plain Text file on your PC and change the “insert” command to
“Insert as Text”
Sending Email in Outlook
Step1: Make your edits to the
HTML and Save as an
HTML or plain text file
Step 2: Open a new empty email in
outlook >> Click “Attach File” Step 4: You now have the email in an Outlook window and can send it to y
Step 3: Locate the HTML or
Plain Text file on your PC Step 4: You now have the email in an Outlook window and can send it to your contact.
and change the “Insert”
command to “Insert as Text”
“ So I’m touching base with you because we noticed that you “ The Security Lifecycle Review (SLR) is a great
[qualifying lead]. So what got you interested in having a way to get visibility of what is really happening
Security Lifecycle Review? on your network.
(Answer) For example, it will clearly show where you may
Okay great. have potential risks on your network that could
Are you involved with network architecture/IT administration?” affect your security.
It will give you a full understanding of which
applications are being used, including any
“ We saw that you [qualifying campaign], have you had a chance ‘shadow’ applications, that may not have been
to see what the Security Lifecycle Review is all about? authorised by the IT department. It will show
(Answer) URL traffic, content types, and will catalogue all
potential threats on the network – known and
Okay great. Are you involved with network architecture?” unknown and those linked to user behaviour.
Best of all, it will give you clear recommendations
for dealing with the risks that are identified.
“ We noticed you [qualifying campaign] and I was just calling to
see what you’re interest in the Security Lifecycle Review was. Does that sounds of interest?”
(Answer)
Okay great. Are you involved with network architecture?”
Ask them for their role
CLOSING
“ Before I forget to ask, what is your role in the company?”
“ Are you the IT Manager in the company?” " I’ve got all the information that I need and I’ll
pass that along to the team.
Suggest an SLR
Did you have any other questions for me? "
“ Okay I see. If you’re available [time], I can have one of our
team contact you to arrange an SLR?” (Q/A)
Gauge their current plans and configuration " I’ll send over some more information and a
sample report, so keep an eye out for those. And
“ So with regards to your security infrastructure, what are you also, if anything comes up, feel free to give me a
looking to accomplish in the near future? call or shoot me an email.
(Explanation) /I have you down for a call/meeting on
What is the timeline for this project?
[date] at [time],
(Answer)
What are you currently using as a security solution? so we’ll see you then.
(Explanation)
Take care, have a great day.”
Okay I see…how large is your network?
(Answer)
How many users/how many branches?
(Answer)
What are some of your requirements?”
POSSIBLE QUESTIONS/ANSWERS
Why do I need this? How much is this?/I’m worried it will be too expensive.
Previously, legacy firewalls were good for keeping networks It really depends on your network. Many of our current
secure. A business could control traffic based on simply ports customers initially started off with an SLR to see what their
and protocols and be okay. However, with current technology current security measures are missing before moving to replace
and applications the way they are, this is no longer enough. their units. However, I know that we typically save our clients
Applications can use evasive tactics such as port hopping, about 65% in capital costs and 80% in operational costs.
tunneling, and SSL encryption to evade current detection
systems. Ransomware and the need to protect end points are I’m busy.
also extending the network and using a mix of legacy point
Okay, would it make more sense for me to call you back on
products doesn’t give you the overall view of your network that
[date/time]?
you need.
I’m not interested.
Okay, well if you don’t mind me asking, what are your reasons?
I’ll go ahead and send you a sample report that you can look at in
your spare time. I’ll provide my contact information in case you
have any questions or comments. Thank you for your
time [name].
It’s not in my budget. I have no problems with my security.
If we found any compelling security holes in your network, Unfortunately, traditional security systems and firewalls cannot
would you consider working this into your budget for the see what they’re not looking for. Security systems implement
next time you allocate resources to your security infrastructure? a negative security model, where firewalls allow everything
Also, because of the technology we invented, we are able and block known applications. At Palo Alto Networks, we have
to dramatically reduce network sprawl in companies. flipped this over in our firewalls; we use a positive enforcement
We typically save our clients 65% in capital costs and 80% model where we deny everything by default (so that unknown
in operational costs. applications will not get through) and allow applications
specifically identified by the administrator.
Having an SLR will not cost anything and you are under no
obligation at all. You’ll get a detailed report showing all
your network traffic, highlighting volumes, potential risks
and threats – both known and unknown and we can
leave this with you.
8. SLR Cheat Sheet