Secure Computing Partner Survival Guide
Transcription
Secure Computing Partner Survival Guide
Secure Computing Partner Survival Guide Secure Computing® is a global leader in Enterprise Security solutions. Powered by our TrustedSource™ technology, our award-winning portfolio of solutions help our customers create trusted environments inside and outside their organizations. Secure Computing Partners Survival Guide Table of Contents Working with Secure Computing Distributors....................................................................................3 Web Resources...................................................................................................................................3 Who’s Who at Secure Computing......................................................................................................4 Introduction to Secure Computing....................................................................................................5 How to Sell: Secure Computing..................................................................................................6 Secure Firewall (Sidewinder) – Net It out...........................................................................................10 How to Sell: Secure Firewall (Sidewinder)...................................................................................11 Secure Mail (IronMail) – Net It Out...................................................................................................15 How to Sell: Secure Mail (IronMail)............................................................................................16 Secure Web (Webwasher) – Net It Out..............................................................................................19 How to Sell: Secure Web (Webwasher).......................................................................................20 How to Sell: Secure Web Protection Service..............................................................................24 How to Sell: Secure Web SmartFilter..........................................................................................27 Secure SafeWord – Net It Out..........................................................................................................30 Secure Computing Corporation Corporate Headquarters 55 Almaden Blvd., 5th Floor San Jose, CA 95113 USA Tel +1.800.379.4944 Tel +1.408.494.2020 Fax +1.408.494.6508 European Headquarters Berkshire, UK Tel +44.(0).1344.312.600 French Headquarters Paris la Defense, France Tel +33.1.46.67.27.27 German Headquarters Unterschleißheim, Germany Tel +1.49.89.710.461.10 How to Sell: Secure SafeWord....................................................................................................31 Secure SnapGear – Net It Out..........................................................................................................34 How to Sell: Secure SnapGear...................................................................................................35 TrustedSource – Net It Out...............................................................................................................39 How to Sell: Secure Support and Services........................................................................................41 How to Sell: Payment Card Industry Data Security Standards (PCI DSS)..........................................44 How to Sell: Secure Web 2.0 Anti-Threat Initiative (SWAT)...............................................................47 Cyber Security for Critical Infrastructure...........................................................................................50 Product Promotions.........................................................................................................................53 Using Domain Health Check for Lead Generation............................................................................53 Product Evaluations and Demonstration Units..................................................................................53 Cross Selling Secure Computing Solutions.......................................................................................55 Middle East Headquarters Dubai, United Arab Emirates Tel +971.4.3913504 Netherlands Headquarters Hilversum, Netherlands Tel +31(0)35.64.62.616 Swedish Headquarters Kista, Sweden Tel +46(0)8.588.370.40 © 2008 Secure Computing Corporation. All rights reserved. Secure Computing, IronMail, MobilePass, SafeWord, SecureOS, SecureSupport, Sidewinder, SmartFilter, SnapGear, Strikeback, Type Enforcement, and Webwasher are trademarks of Secure Computing Corporation, registered in the U.S. Patent and Trademark Office and in other countries. SecureWire, SmartReporter, and TrustedSource are trademarks of Secure Computing Corporation. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Working with Secure Computing Distributors Partners are advised to utilize the services provided by their preferred Secure Computing Distribution Partner. Distributors can offer a range of “value added” services, for example: • Assist with the sales training of partner staff white paper lead generation programs, seminar or Webinar activities, telemarketing programs, and event support. a. https://partner.securecomputing.com/ i. Password and username are required. Please contact partnersfirst@securecomputing.com to request access b. Web-based training and demos (https://partner. securecomputing.com/index.cfm?skey=24) • Handle queries relating to order status • Log and chase product renewals i. Sales accreditation (https://partner. securecomputing.com/index.cfm?skey=632) • Maintain and design marketing plans ii.Technical (https://partner.securecomputing.com/ index.cfm?skey=24) • Apply for market development funds • Participate in planning meetings (marketing and sales) • Create custom reseller-branded marketing programs • Present at partner seminars c. Quarterly promotions (https://partner. securecomputing.com/promos.cfm) d. Export rules (https://partner.securecomputing.com/ index.cfm?skey=518) • Provide demonstration facilities • Provide literature • Provide pre-sales and post-sales technical support • Provide product evaluations • Provide sales training e. Success stories (https://partner.securecomputing.com/ our_customers.cfm) f. Knowledge base (https://partner.securecomputing. com/supportkb.cfm) g. Product manuals (https://partner.securecomputing. com/techpubs.cfm) • Provide scalability testing facilities h. SecureFlash newsletter (https://partner. securecomputing.com/news_current.cfm) • Provide systems engineer resources • Respond to part number queries i. Branding guidelines, graphics and logos (https://partner.securecomputing.com/graphics.cfm) • Respond to pricing queries • Installation services by certified technicians • Offer financing programs at no additional cost j. Literature order form (https://partner. securecomputing.com/litorder.cfm) Web Resources k. Localized materials (https://partner.securecomputing. com/index.cfm?skey=686) as of May 13, 2008 The following is a list of where to find additional product and sales information located on either public or private sites. 1.Quick reference m.Contacting Secure Computing (https://partner. securecomputing.com/sales_info.cfm) a. Partner one-stop shop for all information: PartnersFirst n. Finding an authorized Secure Computing distributor (https://partner.securecomputing.com/distributor_ locator.cfm) b. Customer-facing materials, Webcasts, news: Secure Computing Web site o. Evaluation Agreement Forms ( request forms from your Secure Computing account manager) 3.Secure Computing Web site Content 2.PartnerFirst Content Marketing tools are available to help you with the creation of marketing campaigns to generate leads. Contact your Secure Computing Distributor, Channel Account Manager or Regional Marketing Specialist for assistance with 3 l. Competitive information (https://partner. securecomputing.com/index.cfm?skey=59) a. Visit http://www.securecomputing.com b. White papers Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 c. Case studies d. Product overviews e. Pre-recorded Webcasts/Webinars/videos f. Links to weekly product Webinars 3.Secure Computing EMEA Marketing a. For general marketing enquiries: emea-marketing@securecomputing.com b. Director, EMEA Marketing i. Katy Sutcliffe g. 3rd-party product reviews ii.+44-1344-312630 h. 3rd-party authored papers and research iii.Katy_sutcliffe@securecomputing.com i. Upcoming events j. SecureNews newsletter k. Press releases Who’s Who at Secure Computing as of May 20, 2008 The following provides contact information for Secure Computing. 1.Quick reference a. For EMEA partner sales assistance: Contact your regional sales office, details below. b. For EMEA partner marketing assistance: Contact EMEA Marketing, details below c. For customers needing technical support, training or professional services: Contact Support, Network Services and Training, details below. 2.Secure Computing EMEA Sales Offices a. UK, Ireland, Israel, South Africa & EMEA HQ i. +44 (0) 1344.312.600 b. Central & Eastern Europe i. +49 (0) 89.71.04.61.10 c. Southern Europe & North Africa i. +33 (0). 46.67.27.27 d. Nordic i. +46.0(8).588.370.40 e. Benelux i. +31.35.6462.616 f. Middle East i. +971.4.391.3504 c. EMEA Marketing Specialists i. Dan Trotman – Northern Europe: ii.Dan_trotman@securecomputing.com d. Natalie David – Southern Europe & Middle East: i. Nathalie_david@securecomputing.com e. Ilka List – Central & Eastern Europe: i. Ilka_list@securecomputing.com 4.Support, Network Services, and Training a. VP Support and Network Services i. Gary Bibeau ii.+1 (651) 628-5363 iii.Gary_bibeau@securecomputing.com b. Director, Firewalls i. Ron Johnson ii.+1 (651) 628-1560 iii.Ron_johnson@securecomputing.com c. Director, Web Gateways and Authentication i. Christopher Cinnamo ii.+1 (651) 628-6263 iii.Christopher_cinnamo@securecomputing.com d. Director, Mail Gateways i. Doug Borse ii.+1 (678) 904-9263 iii. Doug_borse@securecomputing.com e. Director, Services and Training i. Julie Cota ii.+1 (651) 628-5379 iii. Julie_cota@securecomputing.com Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 4 Introduction to Secure Computing • Secure Computing® is one of the largest pure-play security companies in the world • Secure Computing is public (SCUR), profitable, and global • Secure Computing 2007 annual revenues were $238 million USD • Secure Computing has over 22,000 customers in 106 countries • Secure Computing has ~ 1000 employees with offices in 20 countries »» Over 400 hardware and software engineers »» Over 175 support personnel • Secure Computing has over 2600 partners worldwide • Secure Computing’s portfolio consists of the following major products: »» TrustedSource – The leading global intelligent reputation service in the world, TrustedSource™ technology scans hundreds of billions of items a month and assigns reputation scores to IP addresses, URLs, domains, email messages and images. Secure Firewall (Sidewinder), Secure SnapGear, Secure Mail (IronMail), Secure Web (Webwasher), Secure Web SmartFilter, and other 3rd party products use TrustedSource’s reputation scores to instantly recognize attacks, even the first time they are encountered. »» Secure Firewall (Sidewinder) – Secure Firewall is the leading application layer firewall appliance on the market. It is the number one choice with enterprises that need to secure the most important data in the world. »» Secure SnapGear – Secure SnapGear is the leading UTM firewall for small, branch or remote offices or for home use. Managed centrally with Secure Firewall, SnapGear can provide a complete security firewall solution. »» Secure Mail (IronMail) – Secure Mail is the leading email security appliance for its unique ability to stop inbound threats and prevent outbound data loss all in one unit. »» Secure Web (Webwasher) – Secure Web protects your desktop machines from Internet threats. Uniquely positioned to counter Web 2.0 threats, Secure Web stops more malware with fewer false positives than any other solution available. »» Secure Web Protection Services – Secure Web Protection Service offers exceptional Web security through a reliable, hassle-free security-as-a-service (SaaS) deployment option. With no applications or hardware to install or deploy, organizations simply redirect Web traffic to a Secure Computing data center for exceptional protection. »» Secure Web SmartFilter – Secure Web SmartFilter is the leading URL filtering product in use with schools and enterprises worldwide. Secure Web SmartFilter prevents users from traveling to unwanted Web sites, ensuring policy compliance and eliminating risks associated with the Internet. »» Secure SafeWord – Secure SafeWord is a line of strong two-factor authentication devices and software to ensure that only known users can access critical data. 5 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 How to Sell: Secure Computing Who Is Secure Computing? Secure Computing is a global leader in Enterprise Security appliance and software solutions. Our TrustedSource technology, integrated with our award-winning portfolios of email, Web, and firewall security solutions provides the world’s most extensive real-time reputation scoring. Our products provide anti-hacking, anti-spam, anti-virus, anti-phishing, anti-malware, and anti-spyware protections to ensure Web security, network security, and email security, as well as prevention of data leakage, compliance with regulations, auditing, reporting, and, strong authentication and identity management. • Founded in 1984 – more than 24 years of enterprise security leadership • More than 22,000 customers, including a majority of the Dow Jones Global 50 • Used by the most securityconscious enterprises and government agencies in the world • Over 150 patents issued or pending • Worldwide network of partners • Approximately 1,000 employees • Headquartered in San Jose, CA, with offices around the globe • Publicly traded on NASDAQ (SCUR) since 1998 • 2007 Fiscal Revenues: $237.9m How Does Secure Computing Help Our Customers? Business Benefits • Protection of valuable network infrastructure: Companies invest significant resources in their enterprise networks, and protecting that investment is paramount to ensuring the integrity of corporate data and equipment. Our products have been proven time and again to be best-of-breed solutions for the most demanding corporate, government and educational networks in the world. • Corporate reputation preservation: A high-profile hack can devastate a company’s image and inflict serious long-term damage to its reputation. By securing their networks against external attack and against leaks from the inside, we help our customers ensure they stay out of the headlines for the wrong reasons and maintain healthy relationships with customers and partners. • What happens in the network stays in the network: Product roadmaps, design information, customer databases, financial records, and countless other types of critical data reside on, and travel across, enterprise networks every day. This information is crucial to an organization’s success and if obtained by the competition or a malicious hacker, the entire organization could be decimated, and perceived competitive advantage lost. Secure Computing products keep the most important corporate intellectual property and information safe from prying eyes. • Staying on the right side of the law: Laws around the world require companies to take steps to protect their networked information. Penalties for violations of these acts, i.e. PCI, HIPAA, GLBA, SOX and others, range from monetary fines to prison time for violators. The investment in Secure Computing products pales in comparison to the potential financial and legal damage that could occur if private information is leaked. Secure Computing helps ensure that our customers are in compliance with information security regulations, and can help customers create specific rules pertaining to their industries. Technical Benefits • Peace of mind: Secure Computing deserves its leader reputation in the enterprise security space. Our Secure Firewall (Sidewinder) has an unblemished reputation, and has never been hacked; Secure Mail (IronMail) is consistently placed in the Leaders Quadrant in Gartner’s annual review of messaging gateway appliances; Secure Web (Webwasher) consistently ranks #1 out of 29 products evaluated in an on-going anti-malware study. In addition, Secure Computing has never had to issue a single security patch. • Automatic real-time updates via TrustedSource: TrustedSource monitors reputations of Internet senders and does not require a database to be installed on local appliances. As such, all of our products integrated with TrustedSource are automatically kept up-to-date on the latest threats. This allows our customers to focus on revenue-generating activities rather than be distracted by manual maintenance requirements. • World-class research and development: The depth and breadth of our Research team allows us to consistently lead the way in identifying new threats and developing solutions to stop them. Our primary focus has been on security from day one, and we’ve proven time and again that we’re the best at what we do. TrustedSource: The Cornerstone of Secure Computing Products The most precise and comprehensive Internet host reputation system in the world, TrustedSource characterizes Internet traffic and makes it understandable and actionable. TrustedSource’s unrivaled effectiveness is a direct result of Secure Computing’s unique view into enterprise Internet traffic. By accumulating data from thousands of sensors located in 51 countries, TrustedSource creates a profile of all “sender” activity on the Internet and then utilizes this profile to watch for deviations from expected behavior. The system then generates multiple “reputation scores” based on the behavior of the sending host and content of the materials. This score is incorporated into Secure Computing products to enable them to quickly and accurately reject unwanted traffic. You can see TrustedSource’s power for yourself at www.trustedsource.org. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 6 Secure Computing Products Secure Computing has developed a portfolio of securityspecific offerings that are each proven by years of use, strong industry acceptance, and numerous awards and certifications. No other pure-play security vendor in the world can offer such a broad spectrum of enterprise security offerings. Secure Mail (IronMail) Secure Mail delivers a centrally managed, integrated, best-of-breed messaging gateway security appliance for enterprises of all types and sizes. Secure Mail features an integrated, policy-based encryption solution that automates and enforces corporate IP protection policies with no end-user intervention. Network World Magazine recently named the Secure Computing Encryption solution the “Clear Choice Test” winner for enterprise email encryption. • TrustedSource integration provides best-in-class, behavior-based reputation scoring to proactively block up to 80 percent of inbound connections before they ever reach the enterprise mail servers • Eliminates the need to archive spam messages for up to 7 years • Inbound threat protection from spam, viruses, phishing, hackers and denial-of-service attacks • Outbound leak prevention helps protect against regulatory or corporate policy compliance violations or theft/leakage of confidential information or intellectual property • Provides multiple encryption standards, as well as “push” and “pull” security • Scalable to meet the needs of any business, from ISPs and carriers to large enterprises, as well as small-to-medium businesses Secure SafeWord • Positively identifies users of missioncritical applications using remote access such as VPN, Citrix, and Outlook Web Access • Tokens provide unique, one-time pass codes for secure login • Delivers an easy, fast installation experience that runs on existing servers • Streamlines administration and deployment • Establishes proof-positive identity of remote users Secure Firewall (Sidewinder) Secure Firewall (Sidewinder) is the world’s strongest self-defending firewall/VPN. Built with a comprehensive combination of high-speed application proxies, TrustedSource reputation-based global intelligence, and a complete arsenal of signature-based security services, our Unified Threat Management (UTM) firewalls defend networks and Internet-facing applications from all types of malicious threats, both known and unknown. • Consolidates all major security functions under a single management interface • Defends networks and Internet-facing applications from all types of malicious threats including encrypted • High-speed application proxies streams • TrustedSource reputation• Blocks viruses, spyware and based global intelligence spam & secures employees use of the Internet • Signature-based security services • Creates a forensic-quality audit trail for regulatory • VoIP security compliance and reporting • Proven to be the world’s strongest self-defending firewall The Secure SafeWord Identity and Access Management solution provides proofpositive user identity for users of VPNs, Citrix applications, Webmail, Outlook Web Access and other Web applications, and Windows and UNIX logins. Secure Web SmartFilter • Designed for Microsoft environments; offers tight integration with Active Directory • Proven database of more than 20 million blocked Web sites in 90+ categories • Easy to install and easy to use • Secure SafeWord comes tailored to work with any remote access system, including Citrix, Cisco, Check Point, and Nortel environments • With tokens that never expire, Secure SafeWord offers the lowest total cost of ownership of any authentication solution 7 Secure Web SmartFilter protects organizations from the risks associated with employee Internet use. By controlling inappropriate Internet use with Secure Web SmartFilter, organizations can enhance Web security, reduce legal liability, increase productivity, and preserve bandwidth for business-related activities. • With more than 30 supported platforms, Secure Web SmartFilter products fit seamlessly into almost any network and work with the most popular proxy servers, caching appliances, firewalls, and security solutions • One very competitive price covers everything including all software and upgrades, the Secure Web SmartFilter database subscription, and full access to Secure Computing’s award-winning 24x7 support • Secure Web SmartFilter EDU (Software for Education) provides education-specific categories for schools Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure SnapGear The Secure SnapGear firewall/UTM appliance line provides small-to-medium businesses (SMB), small offices, home offices, retail stores, etc. a very cost-effective security gateway with all of the primary VPN components necessary to secure any connection. • Consolidates all major security functions under a single management interface • UTM feature set: Firewall, anti-virus, Intrusion detection, anti-spam, URL filtering • True appliance - no moving parts • TrustedSource reputationbased global intelligence provides proactive (not merely reactive) security management • Blocks viruses, intrusions, and spam; secures employee use of the Internet • Most cost-effective UTM appliance on the market • Provides more efficient virus and malware scanning while reducing the amount of disk storage required compared to traditional caching solutions Secure Web 2.0 Anti-Threat (SWAT) • SWAT’s purpose is to demonstrate how Secure’s solutions protect against Web 2.0 threats. Payment Card Industry Data Security Standards (PCI-DSS) • Can support an unlimited number of VPN tunnels, leveraging VPN offloading technology; can compete with VPN concentrators Critical Infrastructure Protection (CIP Standards) • SnapGear’s OEM options allow customers to tailor the appliance to their specific needs, including customized branding and functionality Secure Web (Webwasher) adds an urgently needed layer of security for today’s Web environment which includes both inbound and outbound threats from the Web 2.0 world. Secure Web provides immediate protection against threats such as malware hidden in blended content, encrypted SSL traffic, and email. This in-depth security also protects organizations from outbound threats such as potential loss of confidential information that can leak out on all key Web protocols (HTTP, HTTPS, and FTP). • Secure Web Cache – Industry’s first and only security-aware cache for Web 2.0 powered by TrustedSource global reputation. Secure Web Cache uses a revolutionary new design that employs proactive scanning and security reputation prior to delivering a cached object to an end user Secure has launched solutions-oriented initiatives that are targeted, multi-product sets that address specific issues. • Feature set rivals that of enterprise firewalls that cost 10x as much Secure Web (Webwasher) • Includes URL filtering, anti-virus, anti-spam, anti-malware, SSL scanning, content reporting, and IM and peer-to-peer security Secure Computing Initiatives for 2008 • Combines local behavior analysis with TrustedSource global reputation security technology • Self-tuning security network for Web-based threats • Best malware protection in the business • Provides protection for encrypted traffic • High-performance proxy • Inbound and outbound defenses • Flexible deployment options • Secure’s PCI initiative highlights our solutions that can jumpstart a compliance project. • Secure has a long history of protecting critical networks (power, water, oil and gas, etc.). This initiative demonstrates how all of our products can combine to comply with CIP regulations. Secure Computing Awards and Accolades • Full product line-up recognized as finalists in an unprecedented eight categories for The SC Magazine Awards 2006 Europe • Secure Mail: Gartner Leader’s Quadrant for Email Security Boundary Magic Quadrant • Secure Mail: Secure Computing positioned as “Top Player” in Radicati Group’s Email Security Appliances Market Report • Secure Mail: Best Security Solution for Healthcare (SC Magazine) • Secure Mail: “Best Buy” for 2007 for email content filtering products (SC Magazine) • Secure SafeWord: Named “Reader Trust Finalist” in SC Magazine Award Program and Best of 2006 • Secure Firewall: ‘Best Enterprise Firewall’ (SC Magazine) • Secure Firewall: Editor’s Choice Award for Functionality and Security (Communications Week) • Secure Firewall: Named a ‘Best Midmarket Product of the Year’ by CMP’s VARBusiness Magazine • Secure Firewall: Awarded the Common Criteria Certification at the most stringent EAL 4+ security level • Secure Web: Gartner Leader’s Quadrant for Secure Web Gateway Magic Quadrant • Secure Web: #1 out of 29 vendors in detecting malware (PC Magazine) • Secure Web: 5 Stars in a test of Web content filtering solutions (SC Magazine) • Secure Web: 4 times named best anti-malware solution on the market (AV-Test.Org) • Multiple solutions in one appliance Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 8 Benefits of Partnering with Secure Computing PartnersFirst – The Program that Puts You First Sales Support PartnersFirst As a Secure Computing PartnersFirst partner, you’ll gain higher credibility, a new level of differentiation, increased competency, greater visibility, profitability, and a stronger relationship with your customers and prospects. Profit Margin As a Secure Computing partner, you’ll quickly discover that we exceed our competition by offering the best overall security margins in the marketplace. The program is designed to help your business provide unmatched security solutions, while assuring a profitable contribution to your business. Our products are selectively distributed and we select our partners for long term growth and success. Every year, we receive consistent feedback from our partners that our profit margins are the industry’s best and we intend to uphold our reputation. Secure Computing provides you with a comprehensive set of resources to support you throughout the sales lifecycle. Whether you are looking for competitive analyses, technical papers, ROI calculators, success stories, or just up-to-date product specifications, you will always find just what you need to sharpen your selling skills and enhance your product expertise. Marketing Secure Computing offers a wide array of marketing resources to help support your lead generation goals in the most effective way possible. From co-branded advertisements and direct mailers to turnkey seminar-ina-box tools, you’ll find an abundant supply of marketing resources available at the click of a mouse. n PartnersFirst Web site Secure Computing offers an advanced partner Web site through which you gain access to a host of tools and resources to help you market and sell Secure Computing solutions more effectively. From sales tools, to marketing resources, to product information, to education and training, we are confident you will find what you are looking for on the PartnersFirst Web site. Education and Training As a cutting-edge security solutions provider, you need to be well-equipped to handle any selling engagement. At Secure Computing we invest heavily in our award-winning training programs and work hard to ensure you are armed with the knowledge necessary to win in the field. As a PartnersFirst member, you benefit from a comprehensive suite of education and training programs—from online sales training to instructor-led classroom training, we have what it takes to ensure your success. Communication At Secure Computing we vow to keep you informed at all times, and in a timely fashion! At Secure Computing we vow to keep you informed at all times and in a timely fashion. Our regular partner newsletters ensure constant and consistent communication, whether it’s product announcements, special promotions, new sales or marketing tools, or upcoming events. 9 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure Firewall (Sidewinder) – Net It Out • Secure Firewall (Sidewinder) is a multi-function, application-layer firewall appliance that competes with packet-level firewalls like Check Point, Cisco ASA and NetScreen. • We have tens of thousands of Secure Firewall customers. They’re typically mid-sized to large companies and government agencies around the world, like: »» American Express »» The FBI & CIA »» Singapore Airlines »» Deutsche Bank »» And governments around the world – like the US, the UK, Japan, Australia, and more • A key difference about Secure Firewall is that it is first and foremost an application layer firewall. In fact, it’s the number one application layer firewall in the business! • Today’s hackers & criminals are all targeting known vulnerabilities in very specific versions of Web server software, browser software, SQL and Oracle databases, voice over IP servers—things like that. In fact, you might be interested in knowing over 70% of attacks coming across the Internet today are applicationspecific attacks. Over 70%! • A couple of other important things that are unique to the Secure Firewall appliance are: »» Our first-to-market use of in-the-cloud reputation services (TrustedSource) to tell Secure Firewall in real time exactly who the known bad senders are so we can just automatically drop that traffic at the connection level. This stops tons of malicious junk from streaming into your network and clogging up your mail servers. »» High-speed decryption/re-encryption services on key encrypted protocols like SSL, SFTP, and SSH to do application security scanning on all that encrypted traffic. »» Secure Firewall can use the geographic location of a requester to determine what level of security to apply. If a request originates from a known suspicious country, then Secure Firewall can automatically add more authentication checks for even more security. This can prevent a phisher who has stolen credential from using them successfully. • Secure Firewall can uniquely do four things for you: »» Significantly reduce your exposure to Internet attacks, including emerging new threats in areas like voice over IP (VoIP). »» It will make your compliance audits go easier because of our high-end security certifications and proven credentials, and our extensive set of pre-built reports for compliance regulations (Secure Firewall Reporter). »» It can potentially save you time and money if you eliminate some of your existing security solutions and use the services that come with Secure Firewall instead. »» Avoid having to do any emergency security patch projects for your firewalls; we have never had to release a security patch for Secure Firewall in over 12 years because of our patented operating system. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 10 How to Sell: Secure Firewall (Sidewinder) What is Secure Firewall (Sidewinder)? • Streamlines management with single-screen rule set-up, automatic updates, and central management of many Firewalls through Secure Firewall CommandCenter. Secure Firewall (Sidewinder) appliances are market-leading next generation firewalls that provide application visibility and control beyond Unified Threat Management (UTM) for multi-layer security and the highest network performance. Unique Features/Differentiators for Secure Firewall • High speed network and application Firewall with comprehensive visibility and control of applications • Complete IPS/IDS and Anti-Virus signature services • Only Firewall with reputation-based global intelligence (TrustedSource technology) and Secure Firewall Geo-Location • Security for the latest vulnerable protocols like VoIP, Oracle, MS-SQL, Citrix, multi-media, and more • Eliminates the blind spot of encrypted applications • First and only firewall with reputation-based global intelligence • Blocks botnets, zombies, viruses, worms, Trojans, intrusion attempts, spam and phishing tactics, cross-site scripting, SQL injections, denial of service (DoS), and more • Proven firewall without a single CERT advisory, in stark contrast to competitors • Secures employees’ use of the Internet and blocks spam • Creates a forensic-quality audit trail for regulatory compliance and reporting Secure Firewall Key Features and Benefits • Surpasses application visibility to control them including who and how they can be used for the most popular applications like email, HTTP/S (Web), Multi-media (H.323), Oracle, Citrix, SQL, VoIP (SIP), SSH, FTP, and other highuse services. • TrustedSource and Secure Firewall Geo-Location provide security ESP to dramatically reduce exposure to attack, as well a save bandwidth, processing time, and infrastructure expenses. • Kills evasive blended attacks that other security products can’t see. • Decrypts and filters encrypted applications (SSL, SSH, SFPT, SCP), the new playground for hackers. • Blocks the latest attacks like cross-site scripting and SQL injections for full Web server protection. • Combines five or more individual security systems in one appliance (Firewall, VPN, anti-virus, anti-spam, IPS/IDS, reputation services, employee Web filtering, etc). • Unequalled reputation for delivering highest-grade security. • Award-winning Secure Firewall Reporter SEM is included at no cost for real-time event monitoring, alerting and reporting. It includes complete information for all major regulatory requirements including Sarbanes-Oxley (SOX), PCI, GLBA, HIPAA, and FISMA. 11 • VoIP, Web, and numerous other applications are visible and controllable • Common Criteria EAL4+ certification for Application Firewalls. No other firewall has this level of EAL4+ certification. • Award-winning Secure Firewall Reporter SEM is included at no cost • Decrypting and filtering of encrypted applications Target Customers • Network Administrators • Technology decision-makers (CIO, CSO, IT Director/ Manager) • Firewall Administrators (in larger companies) What Issues Does Secure Firewall Address? Business Issues • Put precious security dollars where the biggest threats are g Applications • Eliminate the blind spot of encrypted applications (SSH, SFTP, SCP, SSL/ HTTPS) • Reduce exposure to attack Technical Issues • Stop botnets and zombies from infiltrating the network and new attacks like cross-site scripting and SQL injections • Security with efficient management • Save bandwidth, processing time, and infrastructure expenses • 70% to 80% of Attacks are Targeted at Applications: Secure Firewall gives not only application visibility but control beyond UTM for the most popular applications like email, HTTP/S (Web), Multi-media (H.323), Oracle, Citrix, SQL, VoIP (SIP), SSH, FTP, and other high-use services. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 • Overcomes Stateful-inspection Firewall Deficiencies: Secure Firewall cloaks the internal network and prevents application finger-printing. • Superior Architecture and Performance: From the beginning Secure Firewall was architected to deliver application protection at Gigabit speeds, unlike competitors’ slow performance due to bolting a form of application protection onto old architectures as an afterthought. • Eliminates the Blind Spot of Encrypted Applications: Only Secure Firewall decrypts and filters this traffic which is merely passed through by other firewalls. • 24/7 Uptime Demands: Secure Firewall provides seamless high availability and is highly redundant with dual power supplies and RAID capabilities. • Eliminates Manual Patches and Updates: Automatic updates eliminate constant reaction and patching for latest attack vector. Secure Firewall also never has emergency security patches to demand time, energy and monitoring. Secure Firewall Appliance Specifications Model Form Factor 210 410 510 1100 Mini 1U Small 1U Small 1U Ent. 1U 2100 2U 2150 2U 4150 5U Yes Yes Yes Yes Yes Yes Yes Unlimited User License Recommended Users Packet Speed 150 300 600 Med. Lg Med. Lg Large Enterprise 180 Mbps 275 Mbps 650 Mbps 1.9 Gbps 1.9 Gbps 3.1 Gbps 3.8 Gbps Stateful Speed 170 Mbps 250 Mbps 600 Mbps 1.8 Gbps 1.8 Gbps 2.9 Gbps 3.6 Gbps Connections App. Speed 50 k+ 100 k+ 500 k+ 1 mil 1 mil 1.6 mil 2 mil 140 Mbps 230 Mbps 250 Mbps 1.4 Gbps 1.4 Gbps 2.2 Gbps 2.7Gbps Objection Handling • “Application filtering is slow”: Competitors are slow because they bolted application filtering onto stateful inspection architecture as an afterthought. Not so with Secure Firewall, and in our testing, we perform at over 2.7 GB/sec, which is the fastest application performance in the industry. • “The Secure Firewall interface isn’t as user-friendly as Product X”: Secure Firewall v7 has a completely redesigned interface that is simpler and easier to use than any of our competitors, with a true single-screen rule view. • “Secure Firewall doesn’t have a low enough price point for my home office users/SMB users”: We also offer Secure SnapGear, and both Secure Firewall and Secure SnapGear can be centrally managed. • “Secure Firewall is too expensive”: This simply isn’t true when you compare apples to apples. Additionally, many of our competitors don’t allow you to consolidate multiple security functions into a single box, or if they do, they force you to choose which functions to consolidate. With Secure Firewall, you can run all of the functions on one box, which lowers your costs of maintenance and the number of vendor relationships to manage. • “Secure Firewall hasn’t been successfully attacked because there aren’t as many in use as other brands”: Secure Firewall is deployed in the largest global corporations, government agencies and financial institutions around the world and not only do they demand the absolute highest level of protection, but they’re also the most frequently attacked sites because of their high profile. Qualification Questions • Applications are the new playground for hackers. Are you protecting against the latest attacks for the most popular applications like email, HTTP/S (Web), Multimedia (H.323), Oracle, Citrix, SQL, VoIP (SIP), SSH and FTP? • Another new playground for hackers is encrypted applications. Does your current Firewall inspect encrypted traffic like SSL/ HTTPS, SFTP, SSH, SCP? • Does your firewall provide proactive protection from unknown attacks? • How are you protecting your organization from zombies and botnets? • Can your firewall protect your Web services from the latest attacks like cross-site scripting and SQL injections? • Who is sending you traffic? Can you filter traffic by country code? • You are probably aware of the payment card industry regulation PCI-DSS but are you aware that it requires all organizations processing credit card transactions to have an application Firewall in front of their Web-facing applications? • Are you looking to reduce complexity of managing multiple-point security products? • Are you looking for more detailed reports to ensure that you are compliant? • If a government regulatory body requested a compliance audit, would you be prepared to generate the necessary reports? • How much time do you spend manually updating and applying patches when new vulnerabilities are identified? Up-Sell/Add-Ons Secure Firewall Encrypted Application Filtering Secure Firewall IPS Secure Firewall Anti-Virus Secure Web SmartFilter Secure Firewall CommandCenter Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 12 Cross-Selling Cisco ASA: Strengths • Secure Firewall CommandCenter: Delivers central management for 10, 50, or hundreds of Secure Firewalls. Maximize operational efficiency, simplify policy control, streamline software updates and prove regulatory compliance. Create virtual instances to manage many enterprises with one appliance, and simplify Firewall integration with Wizard Tools. • Secure SnapGear: Multifunction network security appliance for small and medium-sized businesses. Can be deployed as just a firewall, as a VPN gateway, a UTM security appliance, or as a complete office network-ina-box Internet appliance for small businesses, with all of the wide area networking tools needed to serve large enterprise remote offices. Awards and Accolades • SC Magazine 2007: Best Enterprise Firewall • SC Magazine 2007: Best Buy • Leading “Challenger” for 2H07 Gartner Enterprise Network Firewall Magic Quadrant • Market Share: #1 vendor in security spending; however ASA is a new, immature offering. Secure Firewall is proven in multitudes of corporations. • Cisco “Feet on the Street”: Despite Cisco’s extensive reach, our channel partners can earn 25% (or more) rather than 5-8% by competing among Cisco VARs. Cisco ASA: Weaknesses • Individual SSM Modules: ASA is not a true multifunction appliance; only one slot for one physical security function per box. • PICK ONE PER BOX: IPS Card OR Content Security (a/v, URL, a/s) OR 4-port GB NIC. • Weak Security: No Common Criteria certification. Based upon PIX source code (dozens of vulnerabilities, source code on the Internet). Cost to manage patches is an enormous disadvantage. No multi-protocol reputation based filtering to proactively block botnets, zombies, and blended attacks. • SC Magazine Best of 2006 • Limited High Availability: Low-end ASA devices cannot use high availability. Competing Products • Incomplete Appliance Breadth: No Cisco box scales to large enterprise comparable to our 2150 and 4150 models, only to our model 1100. • See our unique differentiators section in this document as well as the bullets below. Check Point: Strengths Juniper (NetScreen): Strengths • Market Share: Juniper has built a considerable customer base; use customer references and key accounts to counter this strength when the issue arises. • Claims Superior Deep Inspection: On Juniper this equals IPS signatures exclusively; on Secure Firewall we have an IPS database, customizable signatures, hardware acceleration, and full application visibility and control. • Superior Usability: The release of Secure Firewall 7.0 eliminates any perceived advantage Juniper may have once held here. Juniper (NetScreen): Weaknesses • Slower Application Performance: Turning on application inspection drops performance from 12 Gbps to 0.375 Gbps, a 96% reduction in throughput! • Less Granular Application Filtering: Deep inspection is global – either fully on or fully off; no per-policy tailoring for IPS, no other embedded services (a/v, etc). • Weak Security: Out-of-box, the system default for Juniper is basic packet filtering; both stateful and application inspection must be specifically enabled. No multi-protocol reputation based filtering to proactively block botnets, zombies, and blended attacks. 13 • Check Point #1 status in the Firewall Market: This is #1 in legacy software firewalls, not appliances, and not in UTM; Secure Firewall has dozens of worldwide displacement reference accounts. • Application and Web Intelligence: An advantage in perception only. An IS VP from a Tier-1 US bank said, “We disabled Check Point Application and Web Intelligence because performance was terrible” during a deal where Secure Firewall displaced 12 Check Point systems. Check Point: Weaknesses • Poor Performance in Application Filtering: 3rd-party testing performed by Trusted Strategies in June 2007 showed Secure Firewall to be up to 300% faster than Check Point on application filtering and just as fast in stateful filtering. • Only Off-box Services in NGX: No embedded a/v, a/s, or URL filtering. • Software-based: The operating system and firewall are patched separately, a big increase in administration and total cost of ownership (TCO). • Weak Security: History of CERT advisories and wellknown root exploits. No multi-protocol reputation based filtering to proactively block botnets, zombies, and blended attacks. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure Firewall Product Evaluation Customers can view a video demo at: http://www.demosondemand.com/clients/ securecomputing/001/page/ Sign-up for a weekly “live” Secure Firewall Webcast at: http://www.securecomputing.com/weekly_webinar.htm How do customers obtain an evaluation? Point customers to http://www.securecomputing.com/goto/ securefirewall and have them click on the “Evaluate Product” link in the top-right corner. Normal appliance evaluations are 30 days, however the timing of the evaluation may be extended on a situational basis. n Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 14 Secure Mail (IronMail) - Net It Out • Secure Mail (IronMail) is a complete line of bi-directional email security appliances, for both inbound and outbound email security. Its primary purpose is to Protect Email, Enforce Policy and Encrypt Sensitive Data with 99% accuracy and 0.0001% false positives (less than 1/1,000,000). • Secure Mail has been identified by industry experts for many years as simply being the best in the email security business. • There are thousands of Secure Mail customers of all types and sizes around the world, but typically, Secure Mail customers are mid-sized to larger companies with pretty demanding email security needs like: »» JP Morgan Chase »» HSBC banks throughout the world »» Harley Davidson »» The New York Times »» Pepsi Co., and »» Coca Cola • At the heart of Secure Mail (IronMail), is our anti-spam technology, but Secure Mail is a lot more than just an anti-spam appliance. For example, whether you need to get rid of spam, encrypt key email messages with zero-client policy based encryption, or stop important data from leaking out in outbound mail, Secure Mail does all of that… and even more than that. • Analyst firms that cover email security like Gartner, IDC, and Radicati identify Secure Mail as an industry leader in messaging security. • We compete a lot with Proofpoint and Cisco’s IronPort. And more and more we are replacing simple, low end spam products like Barracuda that you may have heard of. Most spam-only products just haven’t been able to keep ahead of the spam problem, and so we are seeing a lot of replacement activity going on. • Secure Mail (IronMail) is really all about doing complete, bi-directional enterprise class email security as fast and accurately as is technically possible to do—our Secure Mail engineers are absolute fanatics about building the best leading edge technology in the email security business! • The latest areas that our engineers are most heavily into right now are enhancing our leadership position in the reputation-based security market with our TrustedSource service, and delivering easier, more robust enforcement of compliance regulations with advanced encryption and data leakage tools. • Bottom line with Secure Mail is that the technical press and the analysts confirm it’s just a great product—and for our customers—it just works! Spam goes away, and encryption and data leakage policies are automatically enforced, all with one solution. 15 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 How to Sell: Secure Mail (IronMail) What is Secure Mail (IronMail)? Target Customers? Protection for Enterprise Email Systems – Protect, Enforce, Encrypt Ideal Prospects/Influencers/ Recommenders Secure Mail (IronMail) is a hardened mail gateway appliance designed to sit in front of a customer’s existing mail server to provide complete threat protection, policy enforcement, and encryption. • Concerned about data leakage and/or subject to state, federal or international regulations on data privacy and protection. Threat Protection: Spam, viruses, malware, phishing, directory harvest (DHA), denial of service (DoS), and bounceback attacks, or hackers trying to take down or take over the email system. • Needing to securely communicate with partners and/or customers (email encryption). Policy Enforcement: Aid with regulatory compliance (HIPAA, PCI, SOX, GLBA), data leakage prevention of customer and corporate assets like credit card numbers, intellectual property, source code, patents, financial information, patient information, customer lists, etc. Encryption: Flexible B2B and B2C encryption to anyone, anywhere. No client software is needed; full support for mobile devices including Blackberry and Treo. Industry leadership: Secure Mail protects the mail servers of more than 30% of the Fortune 500 companies. What Issues Does Secure Mail Address? Business Issues • CSO/CIO Qualification Questions Situational Questions • How well is your current email security/anti-spam solution working? Is spam getting through or is good mail being blocked? • Virtually eliminates the risk of malware infection via email Problem Questions Technical Issues • One appliance solution for complete email security – Protect, Enforce, Encrypt • Adaptive/Proactive Protection – Secure Mail (IronMail) automatically adapts to new types of spam and malware threats using TrustedSource global intelligence • Management – Centralizes management of all inbound/ outbound Internet email through one appliance, one console • Integrates with most 3rd-party management and SIM solutions like Openview, Tivoli, MOM, ArcSight, and Q1 Labs • IT Director/Manager • Email Manager • Compliance Director/ Manager • Do you need to send secure or encrypted email to partners or customers? • Helps protect an organization’s online brand and reputation • Seeks to consolidate current spam, virus, policy or encryption solutions into one appliance. Decision Makers • Improves employee efficiency by eliminating more than 99.9% of spam • Predefined policies assist with regulatory compliance • Is unhappy with or concerned about scalability of existing anti-spam or mail gateway solution. • How do you know sensitive information is not being sent out via email? • Is your email security vendor a start-up? What will happen if they go out of business? • Do you see an increase in spam every time spammers introduce a new spamming technique? Image spam, PDF spam, etc? • Have users ever reported delays in receiving Internet email? • Has your server ever ended up on a public blacklist? • Have you ever been fined for emailing out customer/ patient information? Implication Questions • Are you looking to deploy the market leading, best-ofbreed email security appliance? Needs/Payoff Questions • Are you currently deploying multiple email security devices (appliances, software, etc.) and looking to consolidate those? • Are you looking for a cost effective way to encrypt messages? • Does your IT department spend too much time reviewing quarantine lists? False positives? • Are you looking for a solution that can provide a lower total cost of ownership? Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 16 Secure Mail Appliance Basic Specifications Secure Mail Gen4 Appliances Model Message Volume Form Factor E5200 150K Msgs/ Hr 2U Rack mount E2200 75K Msgs/ Hr 1U Rack mount S120 45K Msgs/ Hr 1U Rack mount # of 8 4 2 Processors 4 GB 4 GB 4 GB Memory Disk Space 600 GB 150 GB 150 GB 4 2 2 Interfaces Secure Mail Gen3 Appliances S10D 10K Msgs/ Hr 1U Rack mount E5000 100K Msgs/ Hr 2U Rack mount E2000 45K Msgs/ Hr 1U Rack mount S100 25K Msgs/ Hr 1U Rack mount 1 2 1 1 1 GB 2 GB 1 GB 1 GB 80 GB 300 GB 80 GB 80 GB 1 4 2 1 Cross-Selling/Up-Selling/Add-Ons • Anti-Virus – Secure Mail (IronMail) supports three anti-virus engines: Secure Anti-Virus, McAfee, and Sophos. For layered security, any two engines, or all three, can run simultaneously on a single appliance. • Encryption – This add-on module for Secure Mail encrypts outgoing email. It is a clientless solution so anyone with an email account, such as Gmail, Yahoo, or Hotmail can receive an encrypted message. We also resell PGP and Voltage. • Secure Mail Edge – Edge is designed to sit in front of a customer’s existing email gateway (Secure Mail, Barracuda, Symantec, IronPort, or any other) with minimal change to the network infrastructure and can block up to 85% of incoming spam and viruses before they infiltrate the network. Secure Mail Edge saves bandwidth, processing time and email server capacity. It also eliminates the need to archive spam because it never accepts mail from malicious senders. • Secure Mail Advanced Compliance – This appliance includes our next-generation content scanning technologies for advanced data leakage protection and regulatory compliance. (fingerprinting, lexical analysis, and data clustering) • Secure Mail Quarantine Server – This appliance allows quarantined messages from multiple Secure Mail appliances to be consolidated on a single box. CQS can easily store up to 1.5-million messages. • Secure Mail Central Management – This appliance can be used to centrally manage multiple Secure Mail appliances in large scale enterprises. • IronIM – This Instant Messaging module has been moved to Secure Web (Webwasher). As of 1/1/2008, the Secure Mail Email Protection Subscription includes the following modules at no additional cost: • Webmail Protection – Extends protection to Webmail applications like Outlook Web Access, iNotes, etc. • Image Analysis – Detects and blocks pornographic images within both inbound and outbound email. • Gateway-to-Gateway Encryption – Automatically encrypts outbound emails via TLS, S/MIME, or PGP. 17 Key Features and Benefits • Secure Mail, with TrustedSource, provides organizations with the most complete protection available against inbound threats • Automatic Secure Mail Threat Response Updates ensure that every Secure Mail appliance has the most current spam and malware protection available • Dynamic Quarantine provides real-time, proactive protection against spam and malware outbreaks • Employs the most robust content scanning technology for detecting sensitive information • Provides IT with granular control for handling messages with sensitive information • Most flexible B2B and B2C encryption (7 options) • End user quarantine allows individuals to decide which messages/senders are good or not. End users can also whitelist trusted senders Unique Features/Differentiators • TrustedSource Global Reputation System analyzes billions of messages per month using more than 100 different factors; this results in a granular message rating of +180 to -180 (IronPort can only score messages from +10 to -10) • Secure Mail’s SpamProfiler combines local information available from the network with TrustedSource’s global intelligence to make the most accurate decision of whether a message is good or bad • Complete protection against pornographic images; this is above and beyond Secure Mail’s image spam filtering capabilities • B2B encryption (TLS, S/ MIME and PGP) is included in the Email Protection subscription • Webmail protection included in the Email Protection subscription • Integrated connection blocking technologies (Connection Control, Directory Harvest Protection and DoS Protection) protect against attacks by stopping malicious IP connections at the network layer Objection Handling • “Secure Mail is too expensive”: Secure Mail (IronMail) has been repackaged and repriced to maintain its competitive positioning. The Secure Mail S10D is available for less than 2,000 USD • “Secure Mail is too complex”: On average, administrators spend less than 1 hour/week managing Secure Mail. It ships pre-configured with Secure’s best practices for inbound threat protection and outbound policy compliance/enforcement. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 • “TrustedSource doesn’t receive as much raw data as other reputation services”: “What you see” is more important than “how much you see.” TrustedSource analyzes more business and commercial email traffic then another other reputation service in the world. (Our competitors mostly see consumer traffic going to ISPs.) In side by side comparisons, TrustedSource has better data 72% of the time; TrustedSource has the equivalent amount of data 26% of the time. Customers can verify this by visiting www.trustedsource.org and www.senderbase.org and searching for the same domain on both sites. For example, comcast.net, verizon.net, hotmail.com, etc. Proofpoint: Strengths • “I prefer a managed solution”: The TCO of managed service is still higher than the TCO of an appliance. Managed services offer limited LDAP directory integration, very little outbound data leakage protection and encryption and a shorter retention period of quarantine messages. • Uses third-party reputation service – Commtouch Competing Products • Security/Stability – Frequent patches and upgrades IronPort: Strengths • Easy to setup • Easy to use GUI • Owned by Cisco; “Cisco shops” often purchase all Cisco equipment • Single box solution (mail gateway. B2B and B2C encryption) NOTE: ONLY available to customers with <1000 users IronPort: Weaknesses • Lacks granularity and feature set that Secure Mail has. Even their competitive documents state this • Poor queue/quarantine/message management solution • Poor reporting/logging (10 vs 34 of Secure Mail) • Flexible delivery model: appliance, virtual appliance, or hosted solution • Easy to deploy and manage • Sound reporting • Strong outbound scanning (DLP) capabilities Proofpoint: Weaknesses • False Positives – Relies heavily on end-user white/ blacklists • No proven Outbreak Filtering – Commtouch engine has yet to be seen working • Web-only customer support – Augmented with on-site SEs for major accounts • No ability to handle spam surges • No LDAP failover support, no support for POP3 or IMAP4, no secure Webmail support • Immature IP reputation – Added a few months ago in June, 2007 • Web interface is difficult to navigate as it’s broken down into categories • Company lacks stability and is an acquisition target • Landmine: Show any analyst rating – Gartner has always placed them in the “Visionary” quadrant. SC Magazine says: “Requires effort to use and tolerance for a price tag.” • Limited dashboard Functionality Awards and Accolades • Almost all of their core technology is acquired or licensed • SC Magazine, 12/07: Rated Secure Mail “Best Buy of 2007” with 5 stars in every category • Very weak Web 2.0 protection offering and lacks anti-malware • SenderBase gets most of its raw data from ISPs (consumer traffic) • Has nothing to compare with Secure Mail’s advanced compliance engine. Partnered with Vontu which got acquired by Symantec. Now partners with Reconnex (another acquisition target) • Heavy CLI required for advanced filtering policies • No ability to handle spam surges—nothing to compare with Edge • Landmine: Granularity is a huge plus against IronPort. Our compliance is “much easier” to setup and much more comprehensive. Reporting, Dictionary robustness and Flexibility with custom quarantine queues are some more plus points. • Radicati, 08/07: Secure Computing in Top Players Quadrant in Market Quadrant for Email Security Appliances, 2007 • IDC: Secure Mail is the market leader in email security appliances • Search Security 2006: Secure Mail rated the highest score of ALL 60 finalists to be selected as the “Best of the Best” • SC Magazine, 2006: Best Security Solution for Healthcare • Network World, 2006: “Best Product for Messaging,” “Best Encryption Solution – Editor’s Choice Award” award • PC Magazine, 2005: Best of the Year Email Security Product n Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 18 Secure Web (Webwasher) - Net It Out • Secure Web (Webwasher) is a security appliance that sits between your internal desktop users and the Web sites they visit. Secure Web appliances block employee access to non-business or in-appropriate Web sites, and (more importantly!) they protect your desktop machines from compromise or infection when your employees are using their browsers to surf the Web. With a Secure Web appliance sitting between your users and the Web sites they visit, you don’t have to worry about your desktop machines being turned into zombie machines, getting infected with spyware, or being damaged by malware. • Secure Web typically competes with products from Blue Coat Systems and Websense. • We expect that most companies will be investing in a Web security gateway, particularly as they realize that the simple URL blocking that they probably deployed in the past is just not enough to protect them from the new Web-based threats out there today. We already have thousands of Secure Web customers around the world. Right now, typical customers tend to be larger, well known companies whose employees use the Internet a lot, like… »» UBS financial »» Whirlpool, and »» Swiss Re • The delivery of malware is dramatically shifting from an email attachment problem, to a Web browser problem. • The combination of Secure Web’s best-in-class anti-malware engine and its unique use of real-time Web reputation data from our global TrustedSource centers puts Secure Web in a security class all by itself… quite frankly, Secure Web wins on security every time. • Our outbound Web reporting and blocking will help you avoid legal issues or the need to terminate and replace employees because they were able to go anywhere on the web that they wanted to. • More importantly, installing a Secure Web (Webwasher) security appliance on your network is one of the best ways for you to avoid having to clean up infected desktop and laptop machines because of a malware outbreak getting in—industry statistics estimate that the cost for unplanned security clean-up projects ranges up to $30 in direct costs per machine, plus up to 10 times that in IT time and productivity losses. So Secure Web will definitely pay for itself by avoiding those unplanned costs. • Secure Computing provides our award-winning Web security in two ways: as a hardened appliance and as a service. The following pages describe both, as well as Secure Web SmartFilter, the world’s #1 URL filtering solution. 19 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 How to Sell: Secure Web (Webwasher) What is Secure Web (Webwasher)? Secure Web (Webwasher) is a complete Web gateway security appliance, providing best-of-breed, bi-directional protection against Web 2.0 security threats. It protects organizations from malware, data leaks, Internet misuse and related issues, while ensuring policy enforcement, regulatory compliance, and a productive application environment. According to reviews published by multiple tech magazines, including eWEEK and PC Magazine, Secure Web is the number one-rated anti-malware solution on the market. Secure Web Key Features and Benefits • Multiple Web Gateway Security solutions in a single appliance • URL Filter, Anti-Malware, Anti-Virus, SSL Scanner, Content Reporter • #1 rated Anti-Malware solution on the market • Proactive Scanning™ protects against day-zero and blended threats where other security solutions fail because of timedelayed update of the signature database or control list • Reputation-based Web filtering and advanced protection powered by TrustedSource technology • Self-tuning security network for Web-based threats • Protection for encrypted traffic: Secure SSL scanning with certificate updates • Real-time and forensic reporting, including security dashboard • Extremely scalable and flexible reporting on all managed Web traffic including reports on viruses and malware • Protection against data leaks on all Web protocols • A high-performance proxy for enterprise deployments • Innovative Secure Web Cache for today’s Web 2.0 environment • Flexible deployment options • Secure administration with two-factor authentication • Availability: Secure Web is available on an ultra-secure appliance or as software for Solaris, Linux, (RedHat, Suse, Debian) and Windows What Issues Does Secure Web Address? Business Issues • Inbound threats: Secure Web protects against inbound Web-based threats such as spyware, phishing, viruses, worms, Trojans, and other types of malicious code. • Outbound threats: Secure Web is designed to protect against Web-based outbound threats such as leaks of confidential data, customer records, intellectual property, and other sensitive information through a Web protocol. • Employee productivity: Limit employee access to distracting Web content. • Legal liability: Limit employee access to inappropriate Web content. Technical Issues • High-performance proxy – Secure Web is an enterpriseclass proxy for HTTP, HTTPS, and FTP traffic. Flexible authentication and routing features as well as built-in clustering support and availability on an ultra-secure appliance make Secure Web (Webwasher) an ideal choice for perimeter protection. • SSL Blind Spot – Secure Web is the first security product available with fully integrated SSL inspection. SSL traffic (HTTPS) is widely seen as the new back door through an organization’s security barrier and must be secured the same way traditional HTTP traffic is secured. • Easy deployment – Secure Web appliances come completely preinstalled and with a proven default configuration that allows fast, easy, and error-free deployment. Secure Web’s unique Security Shield monitor ensures a secure configuration without loopholes, and always up-to-date anti-malware and URL data. • Integrated functionality – Secure Web (Webwasher) completely integrates multiple protections that would otherwise require multiple stand-alone products, such as Web filter, anti-virus, anti-spyware, SSL scanner, and content control filters in one single and easy-to-manage solution. This leads to significant savings in terms of management, deployment, and handling/purchasing. • Single point of administration – Secure Web’s policy management enables administrators to specify policies once that apply to all products and are valid for all Web, SSL, and FTP traffic. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 20 • Secure Web Cache – Industry’s first and only securityaware cache for Web 2.0 powered by TrustedSource global reputation. Secure Web Cache uses a revolutionary new design that employs proactive scanning and security reputation prior to delivering a cached object to an end-user. This provides much more efficient virus and malware scanning while dramatically reducing the amount of disk storage required compared to traditional caching solutions. • Secure Administration – Secure Web enforces secure administrative access with Secure Computing’s Secure SafeWord two-factor authentication. Target Customers • How are you managing your employee Web usage and/ or enforcing your own internet usage policy? Secure Web Evaluation • Seeks to consolidate multiple security solutions into one • Seeks to mitigate Web 2.0 risks • Has no gateway anti-virus solution or is unhappy with performance of the existing solution • Realizes the need to control SSL traffic • NetApp NetCache users looking for an alternative Web gateway solution focused on security • Wants detailed reports on all gateway traffic for a large number of users • Seeks to deploy more than one gateway AV solution and wants to avoid a hit in performance Secure Web Appliance Specifications Model WW500 WW1100 WW1900 WW2900 Form 1U Rack Mount 1U Rack Mount 1U Rack Mount 2U Rack Mount RAM 2 GB 2 GB 4 GB 4 GB Processor Single Dual Core 2 Dual Core 2 Quad Core Cache 512 KB 2 X 2 MB 4 MB 2 X 4 MB Disk 160 GB SATA 2 X 160 GB SATA 2 X 300 GB SAS 2 x146 GB SAS + 4x300 GB SAS RAID - RAID 1 RAID 1 RAID 1/ RAID 5 single single redundant redundant 2x 10/100/1000 4x 10/100/1000 4x 10/100/1000 4x 10/100/1000 Decision Makers • Have you considered consolidating your Web gateway security (i.e. HTTP, HTTPS, SSL, AV, Anti-Malware, etc) into a single solution to mitigate or reduce total cost of ownership associated with these technologies while increasing the manageability of your network? • What types of inbound or outbound Web threats would you have security software manufacturers focus on today? • Typically 1000 users and up (SME250 if less than 1000 users) Power • Has your organization deemed it necessary to elevate your Web content filtering solution into a more comprehensive security offering? • What types of pro-active Web scanning capabilities have you implemented that are not reliant upon signatures? Influencers/Recommenders/Ideal Prospects Interfaces Qualification Questions How Do Customers Obtain an Evaluation Point customers to http://www.webwasher.com/ and have them click on the “Evaluate Product” link in the top-right corner. Normal appliance evaluations are 30 days. However, the timing of the evaluation may be extended on a situational basis. Cross-Selling/Up-Sell/Add-Ons With the Secure Web 6.6 release, all Secure Web appliances are shipped with certain capabilities enabled including: Secure Web Cache, proxy, authentication, SSL Scanner, and select filters such as advertising filter and document inspector. Additional Secure Web capabilities are available in different modules and are sold separately so customers can pick and choose the level of protection they want. Modules include: • Web Filter •Anti-Malware •Anti-Virus • Content Reporter Secure Web also integrates with: • Secure Mail (IronMail): Secure Computing provides innovative layered security solutions to stop inbound and outbound messaging threats in an integrated, bestof-breed, and technologically superior appliance. • Secure Web IM: Extend security protections to instant messaging traffic, including LDAP integration, gatewayto-gateway IM encryption and support for public IM clients such as AIM, Yahoo, and MSN. • CSO/CIO • IT Director/Manager • Network Manager • Network Security Manager 21 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Awards and Accolades Websense: Weaknesses • Expensive, stand-alone URL filtering solution • SurfControl acquisition distraction • SC Magazine 2007: 5 stars • Port Authority acquisition distraction • No reputation-based URL filtering • PC Magazine 2007: Rated #1 out of 29 vendors in detecting malware • No proactive Anti-Malware protection • No signature-based anti-virus protection • SC Magazine: Best of 2006 • No SSL Inspection • SC Magazine 2006: Content Security “Best Buy” • Lacks HTTP, HTTPS, and FTP bi-directional • Limited deployment options • eWeek 2006: Secure Web (Webwasher) Anti-Malware protection ranked #1 Blue Coat: Strengths • PC Magazine 2008: Secure Web Achieves 99.9% success in malware test Unique Features/Differentiators for Secure Web • Reputation-based protection powered by TrustedSource • Best malware protection in the industry • Fully integrated SSL scanning with certificate updates • Secure Web Cache • Secure administration using two-factor authentication Objection Handling “Secure Web is too expensive”: The April 2006 SC Magazine review awarded Best Buy honors to Secure Web with a 5-star rating in the Value for Money category. • Legacy Web 1.0 infrastructure-based filtering cache • Blue Coat’s flagship ProxySG family of appliances has the ability to support URL filtering, malware filtering, and application control. • Widespread deployment in large data centers. • On-box deployment of nine different URL filtering lists. One of the nine options is Blue Coat’s WebFilter, which it prices aggressively. • Blue Coat’s proxies recognize and filter many common P2P applications and enable flexible policies to control these applications. • In 2006, Blue Coat purchased the Network Appliance NetCache customer base, its main competitor for highend proxy appliances, and Permeo Technologies, which gave it a solution for client-side filtering, application control, and acceleration. “Secure Web needs redirection from another proxy”: Secure Web (Webwasher) is an enterprise strong independent proxy for HTTP, HTTPS, and FTP traffic. Flexible authentication and routing features as well as built-in clustering support and availability on an ultra secure appliance make Secure Web an ideal choice for perimeter protection. Blue Coat: Weaknesses Competing Products • Requires a separate box for legacy anti-virus Websense: Strengths • SSL scanning requires additional hardware and puts unencrypted data “on the wire” • Websense is a standout leader in the traditional URL filtering market, with approximately 50% (by revenue) enterprise market share in 2005. • Websense Security Labs, which is responsible for detecting numerous zero-day threats, is a significant resource that is not well-known, even by Websense customers. • Secure Computing’s focus is Security; Blue Coat focuses more on infrastructure • Category-based URL filtering only; no Web reputation • No proactive anti-malware protection; offer only 3rdparty anti-virus • SSL scanning doesn’t include certificate updates • Expensive hardware, whereas Secure Computing appliances to include 3-year NBD onsite warranty • Legacy Web 1.0 infrastructure-based cache • Recently licensed Inktomi’s proxy software, which will form the nucleus of a new, appliance-based SWG solution. • Making an aggressive attempt to move beyond its Web focus with its acquisition of Port Authority and SurfControl. Acquisition of Port Authority gives Websense best-of-breed DLP technology and SurfControl offers email and hosted capabilities. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 22 Trend Micro: Strengths • Trend Micro historically has had a strong reputation for scalable gateway anti-spyware protection; the InterScan Web Security Suite (IWSS) has been used for several years by enterprises for anti-spyware protection. • Trend Micro has made improvements in the quality of their URL filtering database, and they have recently added URL reputation data and more IM and application control functionality. • Trend Micro also has active content inspection and database capabilities. • IWSS currently addresses much of the SWG functionality required by enterprises, even if it is not best-of-breed for each category, especially for existing customers that can take advantage of a suite license. Trend Micro: Weaknesses • Limited reputation-based filtering • No SSL inspection • Don’t offer 3-Year NBD onsite hardware warranty • No proactive anti-malware protection • No data leakage protection • No Secure Web Cache n 23 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 How to Sell: Secure Web Protection Service What Is Secure Web Protection Service? Secure Web Protection Service offers exceptional Web security through a reliable, hassle-free security-as-a-service (SaaS) deployment option. With no applications or hardware to install or deploy, organizations simply redirect Web traffic to a Secure Computing data center for exceptional protection. • Web filtering: By controlling Web access and enforcing an Internet use policy, Web surfing distractions are kept at bay, productivity is increased, legal liability is reduced, bandwidth is preserved for business activity, and security is enhanced. • Reputation-based filtering: Secure Computing has set a new standard for proactive detection through TrustedSource technology, our industry-leading reputation system. Relying on extensive knowledge of Internet entities and the constantly changing global threat landscape, the TrustedSource network enhances Web filtering by identifying potentially malicious behavior and enabling organizations to block these threats in real-time. • Anti-Malware/Spyware protection: Immediately protect networks from known and unknown threats including viruses, Trojans, and spyware. Unlike traditional security solutions that rely only on the known viruses or signatures, Secure Web Protection Service’s Anti-Malware protection uses several proactive, intent-based filters to stop today’s constantly changing Web 2.0 threats. • Informative reports and dashboards: Quickly understand how organizations are using the Web and the threats they are protected against. Instant snapshots provide this information without running a report while numerous, easy-to-use reporting templates are available for more detailed information. Key Features and Benefits • Easy, cost-effective deployment »» No on-site hardware or software to maintain, upgrade or support »» Lower upfront and IT staffing costs »» Operational expense rather than capital • Real-time threat protection »» Stops threats before they enter the network »» Up-to-the-moment TrustedSource intelligence • Scalability and performance »» 99.999% availability »» No noticeable latency while browsing »» No hardware additions or upgrades as traffic volumes increase • Reporting and dashboards »» Instant snapshots of Web traffic without running a report »» Informative, easy-to-use reports keep you in the know • Notifications and alerts »» End-user notifications and block messages are easily customizable »» Alert options give administrators instant knowledge about blocked site access Target Customers • 5000 users or less • Limited IT resources • Highly distributed environments • Seeks to mitigate Web 2.0 risks • Seeks to consolidate multiple security solutions into one service • Already outsourcing other critical IT functions Unique Features/Differentiators • Native technologies – Secure Computing owns, builds, and maintains the technologies »» Great margins for our valued partners • Long history in Web and Email security – we are the industry experts • Leverages best-of-breed Web security technologies: Secure Web (Webwasher), Secure Web SmartFilter, and TrustedSource »» Secure Web is the #1 ranked Anti-Malware solution for Web 2.0 and zero-day threats, according to independent tests* »» Secure Web was designated a leader in the Gartner Magic Quadrant for Secure Web Gateway in 2007 »» Comprehensive reputation-based protection through TrustedSource augments category-based Web filtering • Successful 6+ year record operating hosted infrastructure (TrustedSource) • Instant, hassle-free setup »» Simply redirect Web traffic to Secure Computing data center »» Easy-to-use Web-based interface for creating policies Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 24 What Issues Do Secure Web Protection Services Address? Business Issues • Lower upfront and IT staffing costs • Operational expense rather than capital • Employee productivity: Limit employee access to distracting Web content • Legal liability: Limit employee access to inappropriate Web content • Web 2.0 threats: Protect against Web-based threats such as spyware, phishing, Trojans, and other types of malicious code • Bandwidth savings: Preserve bandwidth for business-related activities Technical Issues • Satisfies 24/7 uptime demands »» 99.999% availability • Web 2.0 threats: Real-time protection reduces the time required by IT staff to clean-up after infections and attacks. • Proactive protection: By scanning a Web page’s active content and understanding its intent or predicted behavior, your customers get proactive protection against spyware, zero-hour threats, blended threats, and targeted attacks. Anti-virus solutions that solely rely on signature updates or heuristics cannot provide this level of protection. • Reputation-based security through TrustedSource: Secure Computing is uniquely positioned to provide the best global intelligence due to the combination of our core security technologies in the Web, Network, and Messaging areas. • Easy, cost-effective deployment »» No on-site hardware or software to maintain, upgrade or support »» Simply redirect Web traffic to Secure Computing data center »» Easy-to-use Web-based interface for creating policies »» Frees IT resources for other tasks • Scalability and performance »» No noticeable latency while browsing »» No hardware additions or upgrades as traffic volumes increase Qualification Questions • How are you managing your employee Web usage and/or enforcing your Internet use policy? 25 • Are you looking to reduce the complexity of managing multiple point products for Web protection? • Is your capital budget being reduced and/or can be better served for other IT needs? • Have you considered outsourcing your Web protection? • Is liability due to inappropriate Web browsing a concern? • Are you concerned with nonwork related Web traffic? Secure Web Protection Service Evaluation How do customers obtain an evaluation? Secure Web Protection Service evaluations offer fast simple setup since no equipment or software needs to be shipped or installed. Customers can redirect traffic risk-free for a small group of people (ex. IT department) or the entire organization with the click of a button. Point customers to http://www.securecomputing.com/goto/swps/eval for a free 30-day evaluation. The timing of the evaluation may be extended on a situational basis. Currently the Secure Web Protection Service is being offered in the United States. We will shortly be expanding to a global offering. Objection Handling • Will the service always be available? My business requires Web access 24/7. At Secure Computing, we understand that reliability and uptime are paramount to success. Secure Computing has been reliably offering our hosted TrustedSource reputation service for missioncritical security appliances for more than 6 years with 100% uptime. We’ve now extended this reliability to our Secure Web Protection Service. With 99.999% availability, you’ll find the SLAs you need to successfully sell this service and meet your customers’ need for peace of mind. • We’re a small organization with limited IT resources. We can’t afford best-of-breed Web protection. With Secure Web Protection Service, you’ll find lower upfront costs as well as lower ongoing costs. Rather than installing, patching, upgrading, and maintaining various applications for Web protection, staff can be redirected to other mission critical IT needs. Organizations with limited IT resources quickly appreciate the benefits of simply redirecting Web traffic to a Secure Computing data center. • Do your current Internet security solutions protect against Web 2.0 threats including spyware, Trojans and other zero-hour threats? Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Competing Products ScanSafe: Strengths • First to market: entered US market in 2005 • Market Leader = 1000+ customers and growing rapidly • 40% of the market according to IDC • 100% channel focused, excellent channel (AT&T, Google) • Has combined Web and instant messaging offering • Supports user-level policies and remote users ScanSafe: Weaknesses • No native intellectual property/technology »» OEM Secure Web SmartFilter (among others) for URL filtering capabilities »» OEM AV from Kaspersky, Symantec • Growing hosted Web security market prime for a company with deep experience in Web security to give them serious, healthy competition »» Hosted Web security market will have 36% CAGR and outpace appliance and software markets over next 5 years (IDC) • No published independent tests showing malware catch rate. Secure Web Protection Service utilizes the awardwinning Secure Web Anti-Malware engine to provide the best defense as rated by independent studies*. • Information on the ScanSafe reputation service is limited. ScanSafe appears to offer Web intelligence, but not spam or email sender reputation intelligence that often is connected to infected Web pages. Secure Web Protection Service is integrated with the global TrustedSource reputation service and Secure Computing is uniquely positioned to provide the best global information intelligence due to our core security technologies in Web, Network, and Messaging. • Slow time-to-market questions their ability to execute and innovate: While founded in 1999, Web AV Scanning (first product) wasn’t introduced until four years later in 2003. Web Filtering was added in 2004 and spyware in 2005. This equals six years to get their complete product to market. Secure Computing, with native technologies, offered a full product at the initial launch of Secure Web Protection Service. • ScanSafe is a relatively small company which means stability, financial viability, and acquisition target can be concerns for some customers. • ScanSafe was ranked as ‘visionary’ in the Gartner Secure Web Gateway Magic Quadrant but lower on the ability to execute than three other competitors in the same quadrant. Secure Web (Webwasher) solution was in the ‘leaders’ quadrant. »» ScanSafe reporting was noted as a weakness in this report. MessageLabs: Strengths • Among market leaders in hosted email market »» Can sell into that base • 5% of the market according to IDC for hosted Web MessageLabs: Weaknesses • Initially entered hosted Web market by reselling ScanSafe • Relatively new to the market: launched its own service in late 2006, technical problems reported during launch • URL Filtering is licensed from SurfControl • Strong European presence. Presence not as strong in the US. • No published independent tests showing the malware catch rate. Secure Web Protection Service utilizes the award-winning Secure Web Anti-Malware engine to provide the best defense as rated by independent studies*. • No reputation-based filtering: Secure Web Protection Service is integrated with the global TrustedSource reputation service and Secure Computing is uniquely positioned to provide the best global information intelligence due to our core security technologies in Web, Network, and Messaging. Postini: Strengths – resells ScanSafe • Subsidiary of Google • Postini is the market leader in hosted email »» Can sell into that base • 3% of the market according to IDC Postini: Weaknesses • Relatively new to the market: started reselling ScanSafe in 2006 • No native intellectual property/technology – ScanSafe OEMs the technologies used in their solution • No published independent tests showing the efficiency or malware catch rate. Secure Web Protection Service utilizes the award-winning Secure Web Anti-Malware engine to provide the best defense against malware as rated by independent studies.* • Information on the breadth and depth of the ScanSafe reputation service is limited. Secure Web Protection Service is integrated with the best global intelligence from TrustedSource. Emerging Players: Websense through SurfControl acquisition (SurfControl previously acquired BlackSpider, a hosted email and Web solution), and WebRoot. * Jan 24, 2008 Secure Web (Webwasher) Achieves 99.9% Success in Anti-Malware Test http://blogs.pcmag.com/security watch/2008/01/antimalware_performance_testin.php n Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 26 How to Sell: Secure Web SmartFilter What is Secure Web SmartFilter? Secure Web SmartFilter filtering protects organizations from the risks associated with employee Internet use. By controlling inappropriate Internet use with Secure Web SmartFilter, organizations can enhance Web security, reduce legal liability, increase productivity, and preserve bandwidth for business-related activities. • Protects against today’s Web 2.0 security threats. Secure Web SmartFilter delivers the best protection with the powerful combination of reputation-based filtering powered by TrustedSource technology and TrustedSource Web Database. • Enforces Internet use policies with powerful features and a user-friendly interface. • Includes the Secure Web SmartReporter application, which provides real-time snapshots of Internet traffic, produces detailed reports for regulatory compliance, and combats spyware by identifying infected machines. • Secure Web SmartFilter EDU is designed specifically for use in educational institutions and is a great choice for K-12 schools. Compliant with the Children’s Internet Protection Act (CIPA). • Flexible policy management: »» Custom policies by user, group, IP, and IP range »» Filtering options by time-of-day, day-of-week, file type, URL/IP addresses, HTTP/HTTPS traffic »» Policy options include: deny, allow, coach, delay, authorized override, exempt URLs/categories, global block/allow • Real value – One very competitive price covers everything, including all software and upgrades, the TrustedSource Web Database subscription, and full access to Secure Computing’s award winning 24 x 7 support. • Secure Web SmartFilter EDU – The education edition of Secure Web SmartFilter is the premier choice of schools across the country. Easy-to-use and CIPAcompliant, Secure Web SmartFilter EDU offers Safe Search enforcement, education-specific categories and a variety of implementation options from which to choose. TrustedSource Integration Secure Web SmartFilter’s reputation-based Web filtering powered by TrustedSource is continually enhanced and updated as the threat landscape changes. • Integration with TrustedSource global reputation system provides proactive protection against sites that are hosted by entities known to be malicious. Secure Web SmartFilter Key Features and Benefits • Best Web Database in the industry – Provides a proven Database of more than 25 million blockable Web sites in nearly 100 categories. Built by our team of multi-lingual Web analysts using state-of-the-art technology, the coverage, quality, and accuracy of Secure Web SmartFilter is unmatched. • Enhanced security – With reputation-based URL filtering powered by TrustedSource and numerous categories, including spyware, malicious sites, and phishing. • Comprehensive coverage – Ensures a productive user experience and liability protection. • Custom category creation – Allows administrators to deny access to sites not categorized in the TrustedSource Web Database. • Graphical blocking messages – Can be customized to reflect a company’s Web usage policy. • Secure Web SmartReporter’s powerful and easy-touse reporting capabilities – Provide in-depth understanding of an organization’s Web usage; Web-based reporting enables multiple authorized users to access reporting without IT involvement. • Utilizes advanced, real-time analysis to identify sites with malicious intent prior to the content even being available on the site, so as spammers, phishers, and others are planning their next exploit, we’re now able to proactively assign a malicious intent reputation score. • Traditional URL category-only solutions can’t provide this level of proactive protection since content is not yet available. • TrustedSource allows Secure Web SmartFilter to provide the proactive protection that is needed for today’s dynamic Web 2.0 environment. Target Customers/Markets • Businesses, organizations, and government enterprises of all sizes that allow employee access to the Internet. Secure Web SmartFilter is currently deployed in 1 out of every 5 Fortune 500 companies. • Educational institutions that need to prevent access to Web sites with inappropriate content for children and in the US, also need to comply with CIPA compliance and filtering requirements. • Flexible deployment options – With more than 30 supported platforms, Secure Web SmartFilter products fit seamlessly into almost any network and work with the most popular proxy servers, caching appliances, firewalls, and security solutions. 27 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 What Issues Does Secure Web SmartFilter Address? Business Issues • Reduces risk of legal liability due to employee access of inappropriate Web sites • Increases employee productivity by reducing time spent on non-work-related sites • Filtering is a legal requirement in schools per CIPA compliance regulations • In-depth reporting via Secure Web SmartReporter enables customers to track Internet usage across the organization Malicious Sites and Spam email URLs, Secure Web SmartFilter provides excellent, broad protection against many Web security threats. Additionally, Secure Web SmartFilter provides security protection through reputation-based filtering powered by TrustedSource. Qualification Questions How are you managing your employee Web usage and/or enforcing your own Internet usage policy? • If currently have a solution in place: Technical Issues »» Is your current filtering subscription up for renewal? Are you looking for a cost-effective, high-quality replacement? • Secure Web SmartFilter integrates seamlessly into customers’ existing network infrastructure; multiple platforms deliver more options than competing products »» Would you be interested in lowering your cost of ownership with a tightly integrated on-box implementation? • Secure Web SmartFilter on-box implementations save time and money, as they do not require the purchase or maintenance of additional hardware appliances or servers • Filtering of potentially dangerous sites protects the enterprise network against malware, spyware, and Webbased phishing • Automatic real-time updates of the Internet Database ensure that it is kept up-to-date without IT intervention • Flexible deployment options: »» Run on the same server as the enterprise firewall, proxy server, or caching system »» Run on a separate server – In-line option – Pass-by option »» Available for purchase from OEM partners with Secure Web SmartFilter natively integrated on-box Objection Handling • “Secure Web SmartFilter doesn’t have the categories I need”: The latest release, Secure Web SmartFilter 4.2, includes 91 categories, giving customers the category granularity needed to customize policies to meet unique organizational needs. • “Secure Web SmartFilter won’t work with my Cisco PIX firewall”: Secure Web SmartFilter offers more than 30 different deployment options including both on-box and off-box deployments that work with many popular proxy cache solutions, security appliances, and firewalls, including Cisco PIX. • “Secure Web SmartFilter blocks adult content sites well but I need security protection as well”: Secure Web SmartFilter offers comprehensive coverage for the entire Web, including security. With numerous security-related categories from Spyware and Phishing to • If currently do not have a solution in place: »» Are you concerned about the security risks of employee Web access, including spyware? »» Are you concerned about the legal liabilities associated with improper use of the Internet? Have you ever had to terminate an employee due to inappropriate use of the Web? »» Do you feel that employees in your company could be more productive at work if they had a restricted Internet usage policy or tool in place? Cross-Selling/Up-Sell/Add-Ons With over 30 supported platforms, Secure Web SmartFilter products fit seamlessly into almost any network environment and work with major firewalls, routers, proxies, cache devices, and security appliances. Many Secure Web SmartFilter configurations are natively embedded into a host platform and run on-box, providing unrivaled speed, reliability, and affordability, since no additional hardware is required to host the filtering. Secure Web SmartFilter products also run off-box, providing additional flexibility and deployment options with minimal impact on your network. Secure Web SmartFilter Integrates with: • Secure Firewall (Sidewinder): Embedded on-box, Secure Web SmartFilter can be purchased as a convenient add-on module with any Secure Firewall implementation. • Secure Web (Webwasher): The TrustedSource Web Database now powers all Secure Computing filtering solutions, including Secure Web. Secure Web SmartFilter customers can easily transfer their Secure Web SmartFilter subscription to Secure Web (Webwasher) if additional Secure Web protections are needed such as Secure Web Anti-Malware and Secure Web SSL Scanner. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 28 Competing Products Awards/Certifications/ Memberships Websense: Strengths • Websense is a standout leader in the traditional URL filtering market, with approximately 50% (by revenue) enterprise market share • SC Magazine Best Web Filtering Solution 2006 • Websense Security Labs, while responsible for detecting numerous zero-day threats, is updated in Websense systems only after a threat has been discovered—a reactive approach that leaves organizations vulnerable to numerous threats for an unknown period of time • Member of Internet Watch Foundation • Accredited by the Internet Industry Association, Australia’s national Internet industry organization • Member of Anti-Phishing Working Group n • Licensed Inktomi’s proxy software, acquired Port Authority DLP technology, and acquired SurfControl email technology which will form the nucleus of a new, appliance-based solution Websense: Weaknesses • Expensive URL filtering solution • Security coverage not included in base enterprise product, premium category add-on for security • Legacy category-only Web filtering • SurfControl acquisition distraction • Predominantly sold as an off-box solution, requiring dedicated hardware and additional maintenance Blue Coat Blue Filter: Strengths • On-box filtering, easy to implement • Easy to purchase, competitively priced Blue Coat Blue Filter: Weaknesses • Secure Computing’s focus is security, while Blue Coat’s focus is on infrastructure • Category-based URL filtering only: no Web reputation • Expensive hardware • Coverage and accuracy fall short when compared to the TrustedSource Web Database • Fewer categories than Secure Web SmartFilter • Better spyware coverage: Secure Computing performs extensive spyware harvesting and offers the robust reporting solution, Secure Web SmartReporter, to help detect infected machines attempting to phone home 29 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure SafeWord - Net It Out • Secure SafeWord is all about fixing the known security problems associated with using regular passwords. It makes it easy to upgrade your password security wherever you need to with strong, one-time passwords that can’t be guessed or stolen. • TYPICAL EXAMPLES where people use Secure SafeWord all the time are with remote access applications like Citrix and VPN connections; or, to protect log-in access to application servers with really sensitive information on them like healthcare records or credit card numbers. • Standard Windows passwords that we make up in our heads and then use over and over again—for months or even years!—are way too easy to guess or steal. • On top of that, most of the compliance regulations today all require some form of stronger passwords than just using standard Windows passwords! • Rather than typing in a memorized password at a log-in prompt like you normally would, you push the button on a token, and it gives you the next password that should be used. Every time there’s a brand new password! And the cool thing is that Secure SafeWord’s one-time passwords are literally impossible to guess or steal! Which is why they’re referred to as strong passwords! • Secure SafeWord also offers software for the users who don’t like the idea of hardware tokens. Our Secure MobilePass client software generates one-time passwords on PDAs, cell phones and laptops. • Secure SafeWord has over 8,000 customers all over the world, from very small SMB customers, to the very largest two-factor authentication user in the whole world— Citigroup. Secure SafeWord’s easy to use and very affordable as well as having unlimited scalability and rock solid reliability. • Other worldwide customers include »» Citigroup »» Cisco »» Sony »» Boeing »» Oprah Winfrey’s Harpo, Inc. • There are three key differences about Secure SafeWord. »» First, Secure SafeWord works just flawlessly with the most popular remote access VPN solutions. In fact, a huge percentage of our tokens are purchased with Citrix, Cisco, Check Point or Nortel branding through their channel partners. »» Second, Secure SafeWord works far better with Windows than any other two-factor authentication product, and it’s managed through Microsoft Active Directory, which of course, the vast majority of companies use today. »» And finally, Secure SafeWord has the lowest total cost of ownership in the business because we use Microsoft management tools and existing hardware; because our tokens never expire and have to be replaced like RSA’s do every few years – and – I saved the best for last—because only our tokens come with a Lifetime Warranty!! If one of our tokens ever fails, we simply replace it at no cost to you—forever! Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 30 How to Sell: Secure SafeWord What is Secure SafeWord? Target Customers Secure SafeWord 2008 is a two-factor authentication solution that protects your most important information assets and applications. Influencers/Recommenders Secure SafeWord’s easy-to-use tokens and seamless integration with your existing Microsoft infrastructure make it simple to deploy two-factor authentication for VPNs, Citrix applications, Web applications, Webmail, and Outlook Web Access. • IT managers and administrators that deal with network access The Enterprise Solution Pack add-on to Secure SafeWord 2008 adds the SecureWire Access Gateway, enablement of Secure MobilePass software authenticators and additional administration management features. • CIO and COO/CFO concerned with network and identity/access security What Issues Does Secure SafeWord Address? How to Recognize A Prospect • Information security and compliance officer • Security consultant Decision Makers • Network Security Manager Business Issues Positioning Scenario for Secure SafeWord • Remote Access – Ascertaining the identity of users logging in remotely. Protection of key business resources and data from unauthorized access • Company is upgrading to the new Windows 2008 Server environment and needs a compatible authentication solution. • Compliance – Several regulations require enterprises/ government organizations to track and monitor user identity and access. • Companies need 24 X 7 access to applications, data and network resources • Web Access to user accounts – Banks etc. deploy strong authentication to counter password related threats including phishing • Help desk costs rise as IT resets forgotten or compromised passwords • Disappearing perimeter, more remote users from more locations • Proven vulnerabilities of memorized passwords as identity mechanism • Unauthorized sharing of user accounts – Online businesses that charge per user account implement token based strong authentication to ensure users do not share their login information with others. Online content providers and MSPs are good examples. Secure Computing example would be Clareity partnership Technical Issues • Company is offering more access to more resources to more people and need a secure mechanism to protect user identity • Company is using static, memorized passwords to obtain access to network resources • Company needs a simple, easy-to-use solution that is intuitive for users • Company is working with Microsoft Active Directory (AD) • Company is looking for a cost effective SSL VPN solution 31 • Increasingly mobile workforce that needs secure remote access • Regulatory obligations for access compliance and reporting • Company is working in a Windows environment with Microsoft Active Directory (AD) Secure SafeWord Key Features and Benefits • Protects your most important information assets and applications • Tokens never expire and come with a lifetime token warranty • Positively identifies remote VPN, Citrix and Outlook Web Access users • Solve regulatory compliance initiatives such as PCI DSS, HIPAA, HSPD-12, and FFIEC. • Designed for Windows environments with seamless integration with Microsoft AD • Delivers an easy, fast installation experience: runs on existing servers • Co-branding service for Secure SafeWord tokens is available. This enables banks, MSPs and other organizations to provide their customers hardware tokens with their own logos. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Unique Features/Differentiators for Secure SafeWord • Tokens never expire, come with lifetime token warranty • Support for latest 32 and 64 bit Windows platforms • Native Microsoft AD integration • User self enrollment • Scalability into the millions of users Objection Handling • Objection 1: I don’t want to have to replace tokens every 3 years when they expire. Answer: Unlike other tokens, Secure SafeWord tokens never expire. No need to replace tokens after 3 years. And the warranty for tokens is lifetime. • Objection 2: I don’t want to change my network infrastructure. Answer: Secure SafeWord can install in minutes right on your AD domain controller. No new hardware is needed. • Objection 3: I want something that is reliable. Answer: Secure SafeWord is used every day by millions of end users at thousands of companies worldwide, by some of the world’s largest companies. • Objection 4: I don’t want to buy several solutions for remote access. Answer: You can Enterprise Solution Pack add-on with SecureWire as an SSL VPN gateway along with Secure SafeWord strong authentication for a complete solution from a single vendor. • Objection 5: I don’t want to carry around a token. Answer: Use Secure MobilePass software tokens for mobile devices and desktops. System Requirements Secure SafeWord Server requirements Pricing and Promotions For pricing information please check pricelist. Secure SafeWord is competitively priced. Competitive Replacement Promotion Secure SafeWord participates in Secure Computing competitive displacement promotion. Use this to replace RSA and other installations. Please refer to the promotion brochure for details. Take 90% off of A Starter Pack Promotion Resellers can take 90% off of the Secure SafeWord starter pack to seed the market. It is a good add-on to any remote access Secure SafeWord New Business Bonus Promotion This promotion allows reseller reps to earn up to $5 per token sold to a new customer. Secure SafeWord Product Evaluation How Do Customers Obtain An Evaluation? Go to http://www.securecomputing.com/index.cfm?skey=181 And request a free evaluation kit containing tokens and all software mailed to the customer address. A simple form needs to be filled out. Evaluation kit is available for different flavors of Secure SafeWord. What Is the Evaluation Period? 30 days from the data installed. When Does the Evaluation Period Begin? From the day of installation of Secure SafeWord software. What Criteria Should Be Used to Judge the Success of the Evaluation? • Can run on existing hardware used for Active Directory 1.Product successfully installed in the customer environment • CPU - Pentium IV @ 1.2 GHz (min), 3.2 GHz (recommended) 2.User able to login using the OTP provided by the token • RAM - 1 GB (min), 4 GB (recommended) 3.Easy administration as compared to alternatives • Disk space - 3-5 GB (min) 10 GB (recommended) on NTSF-formatted drive Cross-Selling • Server OS - 32 or 64-bit Windows Server 2003 or 2008 • Secure Firewall (Sidewinder)/Secure SnapGear: Customers using above products are a good target for selling Secure SafeWord since remote access security is one of the main applications of Secure SafeWord. A twofactor authentication solution paired with remote access provides most security and flexibility. • Desktop OS - 32 or 64-bit Windows XP (SP2), or Vista • Customers of other Secure Computing products may provide green field opportunities for Secure SafeWord since in all likelihood they use some kind of remote access solution and Secure SafeWord OTP will complement that. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 32 Competing Products Vasco Data Systems International: Weaknesses RSA SecureID: Strengths • Not significant expertise in enterprise authentication • Dominant market and mind share • Poor reseller relationships and channel • Sound financial position of EMC • Wider product line for financial institutions Vasco Data Systems International: Pricing RSA SecureID: Weaknesses • Vasco products are competitively priced to Secure Computing Secure SafeWord products. n • Customers must renew their tokens every 3 years resulting in high TCO • Lack of focus for Windows and Active Directory Secure SafeWord Differentiators against RSA SecureID • Lower TCO, tokens never expire • Lifetime token warranty. • True Active Directory integration. • Enterprise Solution Pack add-on provides additional capabilities, including the new SecureWire Access Gateway for unlimited users. • Powerful, more scalable solution. Over 1 million tokens deployed at Citibank and 1.3 million at Banamex, the largest bank in Latin America. • Easier installation and deployment – 20 minutes install • Award-winning support RSA SecureID: Pricing RSA SecureID is priced at a 20-40% premium to all the other two factor authentication solution providers. Additionally, RSA tokens expire every three years necessitating a repurchase making the solution even more expensive. RSA SecureID: Sales Aids • Check out the Secure SafeWord ROI tool to see the tangible benefits over RSA • Secure Computing’s competitive replacement program makes replacement of RSA with Secure SafeWord more attractive to customers. Vasco Data Systems International: Strengths • Focus on financial consumer market e.g. banks providing tokens to their customers for e-banking • Strong partnerships with banking applications and system integrators • Competitive pricing • Wide variety of token form factors including smartcard and USB tokens 33 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure SnapGear - Net It Out • Secure SnapGear is an ‘all-in-one’ firewall that is ideally suited for home offices, small businesses, branch offices, retail locations, or remote data centers within the enterprise. SnapGear will authenticate remote devices requesting connections to the main data center or hub. It is also called a “UTM” (unified threat management) firewall. • SnapGear is a cost effective add-on to Secure Firewall (Sidewinder). Both can be centrally managed with Secure Firewall CommandCenter. • Secure SnapGear contains numerous security features in addition to: »» Central Management (Secure Firewall CommandCenter) »» Corporate level certified firewall (ICSA-Labs) »» Anti-virus (ClamAV) »» Intrusion Detection/Prevention (Snort) »» Anti-spam (TrustedSource) »» Security Event Management (Secure Firewall Reporter) • Secure SnapGear will consistently beat out competitors with its functionality, licensing system, performance, and price point. On top of the strong channel product lineup, Secure Computing also offers custom appliances for larger orders—for example, managed service providers find this offering very appealing. • SnapGear wins because of: »» Value for the price point »» Return on investment »» Extensive feature set »» Full VPN capability »» Unified threat management »» By simplifying the sales process »» Pricing, user licensing (none!) »» Allows focus to be on the customer’s needs »» Investment is backed by large security firm »» Secure Computing corporate strength »» Standards followed, open source solutions used, and industry certifications achieved • An interesting fact to point out is that Secure SnapGear is the only UTM firewall designed for small businesses and remote offices to incorporate a global reputation intelligence service, TrustedSource. • Secure SnapGear has an OEM option to allow large customers to private brand their own firewall. SnapGear comes in many form factors, including boards, software, wired, and wireless solutions. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 34 How to Sell: Secure SnapGear What Is Secure SnapGear? Target Customers The Secure SnapGear firewall/UTM appliance line provides small-to-medium businesses (SMBs), small offices, home offices, retail stores, etc., with a very cost-effective security gateway with all of the primary VPN components necessary to secure any connection. SnapGear is the one Network Gateway Security appliance every SMB/SME needs. SnapGear Channel Product Line: • Consolidates all major security functions under a single management interface • UTM (Unified Threat Management) feature set: Firewall, anti-virus, intrusion detection, anti-spam, URL filtering • True appliance – no moving parts • TrustedSource reputation-based global intelligence provides proactive (not merely reactive) security management • Blocks viruses, intrusions, and spam; secures employee use of the Internet • Built by Secure Computing – Manufacturer of the “Strongest Firewall in the World” Secure Firewall (Sidewinder) Secure SnapGear Key Features and Benefits • Most cost-effective UTM appliance line on the market • Feature set rivals that of enterprise firewalls that cost 10x as much • Can support an unlimited number of VPN tunnels, leveraging VPN offloading technology—can compete with VPN concentrators • Licensing system is NOT on a per-user or per-VPN tunnel basis, but on a per-appliance basis, making for a simple sales process • Squid (Web caching) built-in • Small-to-meduim businesses and enterprises • Distributed office environments • Retailers • Network administrators • Technology decisionmakers • Wireless campuses SnapGear OEM or Custom Product Market Examples: • Managed Service Providers (MSPs) • Hosted security service providers • Internet Service Providers (ISPs) • Telecommunication companies • Medical technology/device manufacturers What Issues Does Secure SnapGear Address? Business Issues • Consolidation of security devices • VPN endpoints (remote offices needing to connect to corporate services via a secure tunnel) • Protection from intrusion attack (IDS/IPS included with Secure SnapGear) • Need for a small form factor network security appliance at any endpoint (Example: point-of-sale locations) • Cost-effective VPN concentrator (VPN offloading gives ‘N’ number of tunnels) • Need for better quality of service surrounding a Voiceover-IP (VoIP) solution • Employees wasting time browsing Internet (leverage URL filtering capabilities) • VoIP connectivity management and security • Real-time connection tracking and filtering • Need for separate network segments (leverage VLANs) • SIP Proxy, Quality of Service with L7 classifier to prioritize traffic Addresses These Technical Issues • First and only SMB firewall with reputation-based global intelligence (TrustedSource) • Existing firewall weak on rule granularity: Secure SnapGear firewall rules are the most comprehensive in the SMB security appliance market • High availability/failover with load balancing • Full VLAN and switching capabilities • Viruses spreading through network: SnapGear includes anti-virus protection • Multiple form factors available, including custom appliances • Mail server bogged down with spam: TrustedSource blocks up to 80% of all spam from hitting the mail server 35 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 • High availability needed: SnapGear provides seamless high availability and can also be leveraged as a loadbalancing unit • Space availability is limited: SnapGear comes in a wide range of form factors to enable networking solutions in all locations • Printer sharing and network-attached storage required: SG565 includes USB ports to connect peripherals such as printers, hard drives, and flash drives Objection Handling • “I already have a firewall”: Likely this prospect is using a firewall that charges them for every add-on feature like anti-virus, intrusion detection, the number of VPN tunnels, the number of users that can connect through the device, and so on. Ask what they are paying for that annually. Likely they can buy a Secure SnapGear appliance to replace their existing solution for around the same price as their annual renewals on the add-ons they are buying. • “Secure SnapGear? Who or What is that?”: SnapGear comes from the leading provider of enterprise gateway security for businesses. Secure Computing is very well known in the market for developing the strongest firewall in the world (Sidewinder). Show the prospect the Gartner magic quadrants and all the other 3rd-party validation papers on the Secure Computing Web site that show the product and organization strength. Those who know security know Secure Computing, and small businesses that want the best should be considering SnapGear. • “Secure SnapGear pricing is quite low… does that relate to the product quality in any way?”: Absolutely not, and to alleviate any concern, Secure SnapGear has one of the best warranty and support programs on the market. The SMB/SME security appliance market is fairly saturated, and SnapGear isn’t a brand name everyone knows. To compete in such a market, few tactics are available, but attractive pricing is one of them. The vast majority of people who try SnapGear stick with SnapGear. Secure SnapGear has an unmatched feature set at this price point, and you can probably expect the price of SnapGear to increase as SnapGear mindshare expands. Qualification Questions Situational Questions • Small Business: Do you have a firewall? Do you have a gateway anti-virus or intrusion detection system? • Would you like to control the types of Web sites your employees can access during business hours? • Is your existing network security appliance warranty/ support plan up for renewal? • Is your business expanding? Are you hiring new employees? What fees will you face with your current firewall if you need to add more users or connections? Can your current appliance handle the additional throughput? Problem Questions • Is your mail server having trouble keeping up with all of the spam penetrating your network? Secure SnapGear could reduce that volume by up to 80%, extend the life of your server and alleviate some maintenance tasks. • How often are you tweaking and rebooting your existing firewall because it had a problem of some type? (Secure SnapGear reliability is becoming well known with a lifetime failure rate being less than the delivery failure rate of competitors. Lifetime failure rates include delivery failure rates.) • Does your existing networking solution have high availability with Quality of Service (QoS) features allowing you to prioritize different types of packets – like VoIP packets? • Are you able to troubleshoot network connectivity issues easily with your solution today? (Secure SnapGear has real-time connection analysis with filtering built-in.) Up-Sell/Add-Ons • URL filtering • TrustedSource anti-spam • Secure Firewall CommandCenter • Extended support & warranties available Cross-Selling • Secure Firewall (Sidewinder): Provides application-layer protection for an enterprise’s network gateway. Secure Firewall at larger central locations with Secure SnapGear at smaller distributed offices all managed by CommandCenter is a true end-to-end security solution, all provided by the same manufacturer ensuring interoperability. • Secure Firewall CommandCenter: Secure Firewall CommandCenter (sometimes referred to as Global Command Center) is Secure Computing’s enterpriseclass management solution that enables you to implement security policies and policy changes quickly, easily and accurately across multiple geographic locations and multiple gateway security appliances. • Are you using or planning to use VoIP? If so, does your current network help control VoIP-specific security threats? • Are you currently providing a guest wireless network to your visitors? (This is becoming a standard for customer/ prospect convenience.) Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 36 Competing Products Fortinet (FortiGate): Weaknesses SonicWALL: Strengths • Market presence/mindshare: SonicWALL is almost guaranteed to be in on any competitive scenario out there, purely due to their name recognition. Whether they are a good fit or not, they will be on the list to be evaluated in larger opportunities. • Product line breadth: SonicWALL has a good number of appliances that are tailored toward special needs. This product line will meet a very large number of market needs. Most resellers will tell you they don’t sell a lot of these specialized appliances, but they make the organization look good by gaining mindshare with unique business solutions just by having the product offerings. • Ease of use: Well known for their simple setup leveraging pre-set configurations, allowing non-technical users to set up the appliance very quickly. SonicWALL: Weaknesses • Intrusion detection/prevention setup: A very manual and tedious setup procedure is required to set up the more than 1300 signatures. This is in addition to the protection profile creation process that needs to be done in conjunction with the IDS/IPS system. • Lack of features: Missing firewall/networking features such as file sharing with USB memory sticks/hard drives, on-box Nessus Scanner, supporting BGP and OSPF. • Historical performance Issues: Customers in the past have claimed published throughput data by Fortinet is a bit ‘optimistic’ in its claims. • Throughput: Equivalent Secure SnapGear products beat Fortinet in both stateful inspection throughput and VPN throughput. WatchGuard: Strengths • Well known branding: The one feature most customers seem to like the most… the red appliances. • Price: SonicWALL appliances are more expensive than Secure SnapGear, but on top of that, almost nothing is included, other than the base appliance itself. To gain UTM functions, an additional operating system must be purchased, and either individual add-ons, or a block of features to finally get into the UTM category. • UTM bundles on higher-end units: Simple to purchase the additional functions/features to gain UTM feature set. It still requires the purchase of the advanced appliance software Fireware Pro. • Licensing model: Users and VPN tunnels are examples of limitations placed on their appliances. For example, many models are sold with licenses limiting them to only 10 or 25 users or 10 or 20 VPN tunnels (numbers may vary). If the customer is growing their business, they will have to pay more to this manufacturer to allow the connections to be made. SnapGear does not come with such micro management of our customers. All appliances include licenses with unlimited users and VPN tunnels. • Firmware upgrades: To gain all new functions, a new operating system is required, which WatchGuard is charging a considerable amount for. Also, when migrating older operating systems to new ones, not all functions are replicated, so customers risk losing features they may be using today. • Throughput and VLAN support: When comparing equivalent SonicWALL product models to SnapGear models, Secure SnapGear wins the throughput race and configurability of Virtual LANs. Fortinet (FortiGate): Strengths • Managed service offering: A managed service and central management offering from Fortinet provided to resellers is quite well known within the industry. Secure SnapGear offers this also, by leveraging Secure Firewall CommandCenter. One of SnapGear’s most prominent managed service providers manages more than 50,000 appliances. • Telco penetration: Fortinet has a good handle on numerous telco companies that wish to provide cheap networking appliances for their customers via leasing options and the like. This is an area where Secure SnapGear is making strides, as one of the largest telcos in the world is now leveraging Secure SnapGear appliances. 37 WatchGuard: Weaknesses • Ease of administration: Message board users complain about the difficulty in maintaining the appliance. • Product cost: Both the appliances themselves and all of the add-on features are known to be considerably overpriced for the functions provided. The constant charging for add-on features gives WatchGuard the reputation of nickel-and-diming customers. • Maintenance cost: Known to be quite expensive to existing customers to continue to get security upgrades. • Low-end units missing considerable functionality and throughput: Missing high-availability solutions, VLAN capabilities, Web cache, print server, restricted number of VPN tunnels, and more. All of the following are additional costs: Anti-spam, AV, IPS, WebBlocker, Live Security Service… • Responsiveness / losing resellers?: Many WatchGuard resellers and customers have been moving toward SnapGear products—and probably others as well. According to our sources, WatchGuard’s responsiveness to their channel has dropped considerably. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure SnapGear Product Evaluation How do customers obtain an evaluation? • Most Secure SnapGear sales do not require evaluation, but if someone would like to see the interface of Secure SnapGear, point them to the online emulator at www.snapgear.com, and click on “Evaluate Product.” If evaluations are required, resellers can purchase discounted demonstration units from their distributor to generate and manage an evaluation pool of appliances. n Secure SnapGear Specifications Model SG300 SG560 SG565 SG580 SG640 SG720 7”x 4.6”x 1.7” (178mm x 118mm x 43mm) 6.5”x 4.5”x 1” (168mm x 115mm x 26mm) 8.1”x 4.7”x 1” (206mm x 120mm x 26mm) 6.5”x 4.5”x 1” (168mm x 115mm x 26mm) PCI Card Small 1U <25 <100 <100 <200 <150 <1000 Stateful inspection throughput 25 Mbps 110 Mbps 110 Mbps 160 Mbps 80 Mbps 180 Mbps VPN - IPSec tunnels 40 100 150 200 150 400 VPN - PPTP tunnels 10 10 25 80 80 100 1-10/100 + 4 port switch (5 total) 1-10/100 + 4 port switch (5 total) 1-10/100 + 4 port switch (5 total) 1-10/100 + 4 port switch (5 total) 1-10/100 3-10/100 + 2-100/1000 (5 Total) X X X Dimensions Guideline for Users Ethernet interfaces VLAN (Port based) X * All models licensed w/unlimited users Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 38 TrustedSource - Net It Out • TrustedSource is the most revolutionary thing happening right now in email and Web security. It’s a brand new kind of in-the-cloud Internet security service that dramatically reduces the risk when your employees use the Internet, and it saves companies money and bandwidth. • TrustedSource is not about identifying specific viruses or attacks and then building signatures after the attack has happened. TrustedSource is all about identifying bad objects around the Internet that you simply want to avoid: like avoiding Zombie PCs that have been hijacked for use in a botnet, or help in avoiding infected Web sites, or avoiding specific URLs on Web sites that have malware under them, or avoiding spam emails that entice you to click on things that are bad for you. So no, TrustedSource doesn’t know what the specific attack is, but it does know what machines, what Web sites and what email messages are being used to distribute malware and other kinds of attacks. Now if I used a medical analogy here, I would say that TrustedSource helps you avoid getting sick by telling you who the infected people are that you should stay away from. • Our TrustedSource data centers mathematically analyze hundreds of billions of email messages and millions of Web sites every day to identify exactly which Internet objects (PCs, Web sites, things like that) are distributing malware or spam. For example, our data centers are identifying over 300,000 new Zombie PCs every single day; and our customers appreciate that because they don’t want to get infected, or accept email coming from botnets that are under the control of a bunch of criminals and spammers. So in the case of TrustedSource, highly advanced mathematical analysis is delivering a pretty wonderful thing! • TrustedSource analyzes thousands of characteristics on the traffic it looks at to produce its real-time reputation scores for things. That includes over two hundred unique characteristics just in images alone. We all know that false positives in the security business are bad… of course. In other words, if TrustedSource says it’s a Zombie PC and it’s wrong, we have a false positive situation. And quite frankly, that happens quite a bit in signature-based products like IDS systems. The thing that’s different here with TrustedSource is that it actually calculates a confidence score on a sliding scale from something having a very bad reputation to something having a good reputation. As we know, few things in life are just black or white. So the higher the reputation score we have for a Web site let’s say, the more confidence we have that it’s bad… that there’s malware there. Then ultimately, our customers decide where they really want to set the actual bar for themselves through a simple configuration option in the GUI! • By using in-the-cloud reputation systems like TrustedSource, you can automatically drop huge volumes of known bad traffic right at the connection level. Your systems don’t really have to do any processing on that traffic! This stops tons of malicious junk from streaming into your network, clogging up your mail servers, things like that. And of course that reduces the load on your firewall, and on your mail servers, and on your overall network. • Keep in mind that over 90% of all email today is spam, and most of it is spewing out of botnets. And mail volume at many companies is doubling every three to four months. So it’s easy to see that IT departments have their hands full and their budgets are getting wacked pretty hard trying to constantly upgrade their infrastructure. TrustedSource helps a lot here. • TrustedSource services help you avoid having to clean up infected desktop and laptop machines because of a malware outbreak getting in. And we all know that desktop clean-up projects are costly and have a negative impact on your staff’s productivity. So TrustedSource helps stop hacker emails from getting to your staff. And it also protects your workers from clicking on Web sites that are known by TrustedSource to be infected! • Technically TrustedSource is not your only option. »» Cisco recently bought IronPort that is now trying to build out a more competitive reputation-based service they call SenderBase. SenderBase has been around for a while, but it is seriously lagging behind TrustedSource, particularly in the Web, message and image reputation areas. 39 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 TrustedSource – Net It Out (continued) »» TrendMicro is doing some work here as well, but they are an email-only approach. »» Microsoft is dabbling here, but it offers email-only scoring on a crude scale, and only if you use Exchange 2007 exclusively. »» Websense is just spinning a marketing story… using the reputation word in marketing …they aren’t really doing any serious work in this area at all. • The key difference when comparing TrustedSource to all other reputation services out there is the fact that we are way ahead of everyone in scoring the behavioral reputation—on a good-to-bad score—of multiple Internet objects; not just the IP address of suspected zombie machines sending out spam. TrustedSource has real-time reputation Web sites, Web URLs, embedded images, the actual contents of emails, and DNS servers too. And more is coming! • The TrustedSource team is far ahead in this revolutionary security service because they focus on nothing else! For almost every other company, outside of maybe Cisco, it’s a secondary project right now, or it’s just a marketing story. • Secure Firewall (Sidewinder) and Secure SnapGear: Our Secure Firewalls can apply TrustedSource scores on both inbound and outbound traffic on many protocols, not just Web and mail. This sets our firewall well apart from all other firewalls on the market today! • Secure Web (Webwasher) and Secure Web SmartFilter: In the Web Gateway area, we use TrustedSource scores on outbound Web traffic to help protect desktop and laptop machines when users are surfing the net with their browsers! • Secure Mail (IronMail) and Secure Mail Edge: In our Mail Gateways, we use TrustedSource scores on inbound email traffic to protect desktop and laptop machines from spam, and from getting hacker emails with dangerous attachments and malicious Web links in them. • Other companies who have joined the TrustedSource Alliance are: »» Brightfilter »» Cymtec Systems »» F5 Networks »» Foundry Networks »» InternetSafety.com »» MarkMonitor »» Riverbed Technologies »» Webroot • Invite your customers to see the power of TrustedSource for themselves at www.trustedsource.org. They can also request a Domain Health Check which provides them with the reputation of their own organization. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 40 How to Sell: Secure Support and Services What Are Secure Computing’s Support and Service Offerings? 3. Self-Help Tools – included with purchase price »» Web-based Virtual training – Available for Secure Firewall (Sidewinder) 7 and 6.1, Secure Web SmartFilter 4.1, and Secure SnapGear 3.1 Secure Computing offers the most comprehensive package of services and support to our customers. These services are designed to ensure that our customers succeed with their security goals, maximize the benefits achievable with our products, validate their decision to partner with Secure, provide strong references for Secure, and continue to renew their contracts year after year. Secure Computing offers 6 types of Support and Services to customers. Some are included with the product purchase, others provide Secure and our partners with additional revenue opportunities (please note that there are significant costs associated in delivering these services, so discounting should be discouraged). »» Knowledge Base – The Knowledge Base is a self-help option that contains thousands of hints, tips, and best practices for all Secure’s products. The KB should be the customer’s first stop when searching for technical solutions. The KB is updated daily – The KB also provides access to Web-based Ticketing and Web-based Training »» Web-based Ticketing and Reporting – An alternate option for customers to open support tickets Contact information, URLs, and phone numbers are listed at the end should you or your customers require assistance. Please use them to demonstrate our superior support and responsiveness. They’ll help you close more sales! Secure Computing Services Network Architecture Assessment Network Solutions Architect Training Product Install Assistance Enterprise Account Management Support (Phone, Web and KB) – Customers can see the status of their issues – Customers can submit, monitor, and edit support tickets online 24/7/365 Product Upgrade Assistance Product Audit and Configuration Sold with the products Sold with the products and renewed annually Services sold to customers with supported products Customer Service 1.Customer Service – included with purchase price »» Includes activities such as licensing and activation, product integration coordination, accounts for Web resources, and technical training coordination »» Staffed by Secure employees 24 hours a day 2.Technical Support – included with purchase price (unbundled in some product lines; refer to price list for details) »» Includes activities such as award-winning Live Answer, post sales support, inbound queue queries, technical resolutions, and the primary liaison between customers and Secure development team »» Staffed by Secure employees 24 hours a day »» Expanded support offered through local resellers in local languages in Japan, Singapore, UK, France, Germany, and Dubai 41 – Secure SnapGear (http://tech.groups.yahoo.com/ group/SnapGearGroup/) – Secure Firewall (Sidewinder) http://mail.adeptech. com/mailman/listinfo/sidewinder Product Tuning Does not Done as even require part of the that the sale for our customer use products our products »» Online Customer Forums/Communities. In addition to the officially sponsored Knowledge Base, there are online user forums/communities for some of our products, including: – Secure Mail (IronMail) https://supportcenter. ciphertrust.com (a username/password is required and can be obtained from customer service) »» Additional on-line services include: patches, upgrades, and SecureNews updates 4.Training - requires additional purchase »» Classes available on all enterprise Secure products offered either at our training centers in Concord, St. Paul, Reston, Alpharetta (Secure Mail only), Singapore, Bracknell (UK), Germany, France, and Sydney (Australia), or on the customer’s premise. http://www.securecomputing.com/index.cfm?skey=782 »» Authorized training centers through partners available in UK, Germany, Middle East, Australia, and multiple US cities. http://www.securecomputing.com/index. cfm?skey=783 5.Network Services – requires additional purchase »» Objective is to provide cost effective solutions for all Secure customers, to enhance their network security and reliability Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 – Network Assessment Secure Computing expert spends up to two days at the customer site performing a rapid onsite analysis of the current internet connection, architecture, and configuration yielding an inventory of systems, and the business and technical risks associated with each system, policy adherence, and whether their security architecture and policies are adequate. – Weekly proactive appliance health check, to prevent errors and performance problems before they occur – Product Installation or Upgrade Includes product installation, integration and testing by SCC personnel. Note: typically, one day of installation is required for each server purchased. – Weekly summary reports of all ticket activity – Secure will use our thousands of sensors around the Internet to report on how the customer’s email servers are being used and detect spoofing attacks – Four training classes with guaranteed priority seating – Caveats and Limitations: • Available to Secure Firewall (Sidewinder), Secure Web (Webwasher) and/or Secure Mail (IronMail) customers ONLY – Product Audit and Configuration Reviews the current product configuration of installed Secure Computing products, along with host systems. • Two tier yearly pricing based on number of appliances. Maximum of 15% discount. Note: this program has is labor intensive, and has high fixed costs so additional discounting is not permitted – Product Upgrade Assistance Includes upgrade assistance, policy review and testing by Secure personnel. – Product Tuning Reviews the current configuration of an installed Secure products and makes recommendations and changes for product optimization. – Network Solutions Architect A Secure Computing expert works remotely with a customer to review their existing network and assists in planning upgrades and product integrations that offer the best results for optimization and effective network security. 6.Enterprise Account Management (EAM) – requires additional purchase »» This is a package of services designed for larger customers who want more personal services. – A Technical Account Manager (TAM) will be assigned and is dedicated to answering questions and making sure support issues are processed efficiently – EAM customers are given the phone number of a special support line, staffed 24 hours a day, 7 days a week – Our ticket tracking system will tag EAM tickets separately, so that they will be given the highest attention – Any bugs or feature requests will be personally presented by the TAM to Engineering • Existing Secure Mail (IronMail) EAM customers MUST transfer to this new program upon their renewal date How Do Secure’s Support and Service Offerings Benefit Corporations? • Secure’s support has won numerous awards 1.Customer Service Leadership Award from Frost & Sullivan 2002 and 2004 2.Stevie Award for exceptional support 2004 • Live Answer responds to over 100,000 customer calls per year in less than 1 minute. Their role is to provide resolution on the 1st call and to maintain ownership of issues until they are resolved. 1.Current metrics (March ‘08): • Calls Answered Live: 96.33% (goal = 92%) • Average Hold Time: 32 seconds (goal = < 60 seconds) 2. Average metrics (Jan. ‘07 - March ‘08) http://www.securecomputing.com/index.cfm?skey=832 • Calls answered live: 96.1% (goal = 92%) • Average hold time: 34.3 seconds (goal = < 60 seconds) – TAM will visit customer’s site at least once a year – EAM customers will have access to information on future releases and schedules before they are announced to the public – Customers can request a Root Cause Analysis on tickets Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 42 How Do Secure’s Support and Service Offerings Benefit Partners? • Partners have the opportunity to gain additional revenue by selling Secure Support and Services, and even more by delivering the services themselves. • Secure offers partners the ability to provide training directly. Secure provides the following to interested partners: Support and Services Web: • Login to Web Ticketing https://support.securecomputing.com/arsys/shared/login.jsp • General Support information: Call Stats, Warranty and Agreements, Life Cycle, Product Certifications http://www.securecomputing.com/index.cfm?skey=4 Support and Services Phone: »» Instructor certifications • 1-800-700-8328 (toll free) »» Student handouts • 1-651-628-1500 (International) »» Links from www.securecomputing.com to partner’s training page(s) • +49-525-50054-460 (Germany) »» Guaranteed non-competition • VAR Assistance Program for accredited Platinum Partners: »» Secure personnel will accompany partner’s technical staff for one on-site installation including a site survey »» Additional 2 installation assistance will be provided via phone for up to 6 hours each (must be scheduled in advance) »» Partner’s technical staff will have 2 slots in any training class • +61-1300-559-109 (Australia) Support and Services Email: • service@securecomputing.com Support and Services Knowledge Bases: • http://kb.securecomputing.com/ Network Services Email • Network_Services@securecomputing.com »» Special knowledge base on PartnersFirst Web site • Training@securecomputing.com »» Partner will have access to Secure’s web-based ticketing system for their customers’ tickets and resolution Network Services and Product Technical Training Phone • Two levels of technical support that a partner can choose to sell: »» Direct support: partner sells and Secure delivers the service »» Channel support: partner sells and partner delivers the support. Secure will provide a senior engineer for 2 weeks at no charge 43 Resources • 1-888-740-8040 (toll free) • 1-651-628-1500 (international) Network Services Web • http://www.securecomputing.com/index.cfm?skey=782 (Product Technical Training) n Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure Computing is involved in a number of solution selling programs. The following contains information about some of these programs. How to Sell: Payment Card Industry Data Security Standards (PCI DSS) What is PCI? • PCI stands for Payment Card Industry Data Security Standard. It is also sometimes called PCI-DSS • Supported by all major credit card issuers: Visa, MasterCard, Discover, American Express, and JCB. European-branded credit cards Maestro and Visa Electron are included by the PCI standards • Current version is 1.1 issued September 2006. Current version can be downloaded at: https://www.pcisecuritystandards.org/tech/download_ the_pci_dss.htm The PCI Data Security Standard is comprised of 12 general requirements designed to: • Build and Maintain a Secure Network »» Requirement 1: Install and maintain a firewall configuration to protect cardholder data »» Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters • Protect Cardholder Data »» Requirement 3: Protect stored cardholder data »» Requirement 4: Encrypt transmission of cardholder data across open, public networks • Maintain a Vulnerability Management Program »» Requirement 5: Use and regularly update anti-virus software »» Requirement 6: Develop and maintain secure systems and applications • Implement Strong Access Control Measures »» Requirement 7: Restrict access to cardholder data by business need-to-know »» Requirement 8: Assign a unique ID to each person with computer access »» Requirement 9: Restrict physical access to cardholder data • Regularly Monitor and Test Networks »» Requirement 10: Track and monitor all access to network resources and cardholder data »» Requirement 11: Regularly test security systems and processes • Maintain an Information Security Policy • Governing body is the PCI Security Standards Council (Secure Computing is a member) https://www.pcisecuritystandards.org/ • PCI applies globally; there are no geographic limitations • PCI applies to every entity (including non-profits, charities, government agencies, and educational institutions) that stores, processes and/or transmit credit card data regardless of the source (Web, point-of-sale, mail order, telephone order, etc.) • Some companies outsource credit card processing. If 100% of the transaction is outsourced (e.g., only accept PayPal), the company only needs to confirm that their outsourced vendor complies. However, if the entity receives any cardholder data (charge backs, refunds, etc.), the entity itself must comply • Companies are categorized into Tiers with different compliance dates (note: dates below are VISA specific): »» Tier 1: process over 6 million transactions per year • Compliance target date: 9/30/2007 or 9/30/2008 depending upon notification date • Estimated US population: 327 »» Tier 2: process 1-6 million transactions per year • Compliance target date: 12/31/2007 or 12/31/2008 depending upon notification date • Estimated US population: 720 »» Tier 3: process 20,000-1 million transactions per year • Estimated US population: 2503 »» Tier 4: process <20,000 transaction per year • Estimated population: everyone else How Does PCI Compliance Benefit Corporations? • Ability to continue to accept credit card payments • The work needed to comply with PCI is virtually identical to what’s required to comply with other regulations such as SOX, HIPAA, GLBA, etc. (killing multiple birds with one proverbial stone!) • Reduces risk of data breaches and associated fines, bad press and law suits • Helps restore consumer confidence »» Requirement 12: Maintain a policy that addresses information security Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 44 What Are the Risks of Non-Compliance? • Do they have point-of-sale systems that accept credit cards? • Merchants who don’t comply with PCI risk fines from credit card issuers, up to $25,000 per month from each applicable credit card issuer for every month they fail to comply (e.g., if they accept Visa, MC and AmEx, they can be fined up to $75,000 per month) • Elevation to higher tier with resulting more stringent requirements and audits • Loss of ability to accept credit cards in the future, potentially translating into a significant negative change to their overall business model What Are PCI’s Key Features and Benefits to Secure Computing’s Partners? • Sell more Secure products to the same customer • Add consulting and other supporting services • Go beyond “feeds and speeds” and into solution-based selling • Elevate value-add to their customers • Have they been subject to Visa’s Cardholder Information Security Program (CISP) in the past? • Do they provide credit card payment options to their customers? Qualification Questions • What current initiatives or needs to you have to meet PCI compliance? • Are you currently working on multiple compliance projects? • What are you plans to meet application level firewall requirement for your Web applications? Secure Firewall (Sidewinder) • Given that you have a distribute environment, what are your plans to secure each remote location? (Retail stores, employee VPN, etc…) • In addition to your primary firewall, what are your access control plans to restrict/segment access to cardholder data? (in addition to DMZ requirements, probe into internal/server access) • What are your encryption plans for external and internal access? Target Customers/Markets • Primarily a retail focus • Any global company that accepts credit cards for payments • Any global company that processes credit card payments • Titles to target: • In addition to your application level anti-virus, what are your plans to address malware/virus at the gateway? How Secure Computing’s Products Address PCI Firewalls: »» Chief Information Security Officer »» Chief Compliance Officer (or anyone else with “compliance” in their title) »» Chief Information Officer • Stateful inspection firewalls are “ok” until June 30, 2008. After that date application proxy firewalls are REQUIRED for Web-facing applications (they are only considered as “best practices” until then) • This provides the perfect opportunity to sell Secure Firewall as the leading provider of the strongest application proxy firewall on the market »» Chief Technology Officer »» VP or Director of IT • Retail, Media and entertainment, Financial services, and Healthcare are adopting PCI the fastest How to Recognize a Prospect Secure Firewall (Sidewinder) Key Points: • 1.x – Secure Firewall satisfies the comprehensive needs of both of these firewall requirements • Do they accept, store, process or transmit credit cardholder data? • 4.1 – Secure Firewall provides complete IPSec VPN gateway for encrypting cardholder data across networks • How many credit card transactions per year do they process? (this will tell you what Tier they are in) • 5.x – Anti-virus protection at the gateway is an available option on Secure Firewall • Do they have an ecommerce store front that accepts credit cards? • 6.1 – SecureOS for Secure Firewall has an unprecedented history of zero emergency security patches (i.e. less to maintain with Secure Firewall) 45 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 • 6.6 – Secure Firewall provides the most comprehensive application layer firewall protections, including for your Web-facing applications • 10.x – Secure Firewall Reporter (bundled with Secure Firewall) provides intuitive reports and detailed forensic analysis capabilities • 11.x – This doesn’t have to be a stand-alone IPS system, Secure Firewall has IPS built-into the Firewall Secure SnapGear Key Points: • Cost Effectiveness (Huge issue!) • High Availability (Failover is KEY to retail locations) • VPN Capabilities/Firewall • Target Markets: Point-of-sale (POS) locations, retail locations or chain/franchise…, anywhere credit card transactions take place at the consumer level Encryption: • Both Secure Web (Webwasher) and Secure Mail (IronMail) fit the bill for encryption requirements since both Web and email traffic that contain credit card information must be encrypted Secure Mail Key Points: • Multiple, flexible encryption technologies eliminate end user mistakes Secure Web Key Points: • SSL decryption ensures that no information going in or out of the company is unexamined Authentication: • Strong 2 factor authentication is a requirement for any remote access. This is a perfect positioning for Secure SafeWord 2008 Anti-Virus: • All of Secure Computing’s products can include one or more anti-virus (AV) which are automatically updated for the customer Secure Web Key Points: • This is the perfect opportunity to position Secure Web’s Anti-Malware as “AV on Steroids” for the ultimate in inbound threat protection TrustedSource Key Points: • This is the perfect opportunity to talk about TrustedSource and using reputation-based security to protect against zero-minute, unknown, and targeted attacks that AV will never be able to secure Secure Mail Key Points: • Secure Mail Anti-Virus solutions automatically update; TrustedSource and Secure Mail OutbreakDefender provide first line defense against malware and viruses • Secure Mail is a hardened appliance and has never been compromised or required emergency patches Resources • Secure Web site »» www.securecomputing.com/pci • Secure white papers »» Meeting and Exceeding PCI 1.1 Compliance »» Embracing PCI – Making it Work for You • Secure Presentation »» PCI Internal Only Sales Training.PPT n Secure SafeWord Key Points: • Support for a wide variety of applications • Seamless integration with Microsoft Active Directory • Easy to deploy and manage • Low cost of ownership Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 46 How to Sell: Secure Web 2.0 Anti-Threat Initiative (SWAT) What Is SWAT? • SWAT stands for “Secure Web 2.0 Anti-Threat Initiative” • SWAT was launched in Q3 of 2007 • SWAT’s purpose is to show how Secure Computing solutions protect against Web 2.0 threats and technologies that aren’t addressed by Web 1.0 security measures »» Web 2.0 differences from Web 1.0 »» Two way communications with blogs, chats, videos, wikis, RSS feeds, etc. »» More dynamic content »» Higher reliance on active code to push an interactive experience to users »» Immature programming languages that haven’t been fully secured »» Blended threats that combine malware, phishing, mutating viruses »» Strong emphasis on social networks like You Tube What Are the Risks? • Infected Web sites and/or Web applications can provide a path for hackers to steal corporate and private information, and to gain access to internal networks • Spyware installed on users machines can install key loggers and capture personal and/or sensitive corporate information How Does SWAT Benefit A Corporation? • Allows enterprise users to access rich Web 2.0 applications without having security risks • Protects corporate Web applications from attacks • Protects the company’s reputation by eliminating risk of zombies and Trojans which could generate spam from the corporate domain • Eliminates needs for cleanup costs from Web 2.0 infections • Ensures security at the gateway means not having to educate users or change their behavior • Saves money by managing bandwidth better (prevents access to malicious sites, preventing spam, phishing, malware, etc. attacks into the enterprise infrastructure) • Enforces corporate policy at the gateway to eliminate compliance risks 47 • Infected laptops/desktops can become zombies under the control of criminals and be used as spam and/or virus cannons What Are SWAT’s Key Features and Benefits to Secure Computing Partners? • Ability to sell more Secure products to the same customer • Ability to add consulting and other supporting services • Ability to go beyond “feeds and speeds” and into solution-based selling • Elevate their value-add to their customers Target Customers/Titles • Any global company that has Web facing applications, especially those that allow user-contributed content • Any global company with legacy caching and/or Web filtering solutions that need to be replaced or is due for renewal • Titles to target: »» Chief Information Security Officer »» Chief Information Officer »» Chief Technology Officer »» VP or Director of IT How to Recognize A Prospect – Qualification Questions • What malware or virus protection solution have you deployed at the Web gateway? • Has your current anti-virus protection stopped malware infections? • Do you know how many IP addresses under your control are sending emails (have them ask for a Domain Health Check for a reality check)? • Do you allow your users to surf to any Web site? • Does your Web filtering solution stop malware downloads? • Do you have any Web-based applications that are not protected by application proxy firewalls? Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 • Is your Web cache secure from malware and viruses? »» Blue Coat doesn’t have any reputation capabilities • If your current Web cache solution up for replacement? »» Blue Coat doesn’t do anything with email, so they can’t correlate blended threats like the Storm worm • Have you implemented reputation based defenses across your Web and email platforms? How Secure Computing Products Address SWAT • Secure Web (Webwasher) »» Secure Web’s intent-based anti-malware is the best in the business as proven by multiple independent tests »» SSL scanning ensures that even encrypted traffic gets scanned for malware and/or data leakage »» TrustedSource provides Web reputation for identification of malicious sites »» Web reputation filtering ensures that employees can only go to non-malicious sites »» Secure Web is the only appliance on the market the does security-based caching • Secure Mail (IronMail) »» Secure Mail together with TrustedSource ensures that spam and phishing attacks are blocked before they get to inboxes, eliminating a major attack vector »» Secure Mail performs outbound scanning looking for sensitive data »» Secure Mail provides extensive and flexible encryption options to protect sensitive data »» Secure Mail is a hardened appliance and has never been compromised or required emergency patches • Secure Firewall (Sidewinder) »» Protects Web-facing applications from cross-site scripting (the most common type of attack), injection flaws and malicious file execution »» Terminates SSL and encrypted protocols »» Prevents application attacks on databases with IPS and granular application filtering (proxies) »» Reputation-based security from TrustedSource Competition • Blue Coat is the only competitor really talking about Web 2.0 threats. They are doing Webinars and producing white papers. »» Blue Coat does not protect Web-facing applications What Is Anti-Malware? • Signature-based anti-virus plus: »» Intent analysis for authenticode and correct digital signatures plus »» Intent analysis for media type verification plus »» Intent analysis for behavioral malware detection plus »» Intent analysis for behavioral exploit detection »» EQUALS: Anti-malware • Prevents OS, browser and application exploits • Protects from known malicious code • Protects from unknown malicious mobile code for which no signature exists • Currently only available on Secure Web (Webwasher); other Secure appliances will have this technology before the end of 2008 Results of Forrester Research • 62% of companies use Webmail (Yahoo, Hotmail, etc.) • 52% use content sharing (blogs, wikis, etc.) • 49% use interactive applications (Google Maps, etc.) • 49% use instant messaging • 79% are concerned about viruses and data leaks • 77% are concerned about Trojans • 78% are concerned about spyware • 74% are concerned about spam • 73% have been infected by viruses • 57% have been infected by spyware • 46% have been infected by Trojans • 12% know they have zombies in their network • Forrester recommendations: »» Blue Coat doesn’t have security-based caching »» Re-examine the adequacy of security policies and protection capabilities »» Blue Coat’s third party anti-virus solutions can’t compare to Secure Web’s anti-malware technology »» Improve user awareness and training on Web 2.0 and Web-borne threats »» Blue Coat has NO proactive scanning capabilities »» Deploy next generation proactive protection »» Blue Coat’s script mitigation tools are removing the script. This “breaks” Web sites »» Solutions must deliver enterprise level performance, manageability and reporting Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 48 Resources 7 Solution Design Requirements for Web 2.0 Protection • Secure Computing white papers: »» “7 Design Requirements for Web 2.0 Threat Prevention” 1.Real time reputation-based filtering 2.Intent-based malware protection 3.Bidirectional filtering and application control including encrypted traffic 4.Robust data leak prevention capabilities »» “Internet Risk Management In The Web 2.0 World” September, 2007 by Forrester Research • Secure Computing presentation »» SWAT presentation (see marketing document stores for current version) 5.Security-aware caches and proxies 6.Design for layering of defenses with minimal number of devices 7.Use comprehensive access, management, and reporting tools Reputation Enhanced URL Filtering • Other resources »» SWAT pod: www.securecomputing.com/swat »» SWAT blogs: http://www.securecomputing.com/ SWAT/secureblog.cfm »» Forrester Web cast replay https://event.on24.com/ eventRegistration/EventLobbyServlet?target=registrati on.jsp&eventid=96655&sessionid=1&key=13A8AE16 73F4549165E6C20F497B5F25&sourcepage=register n “Online Shopping” Reputation-based filtering adds a second dimension of scoring: The Trustworthiness of a Web site. 49 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Cyber Security for Critical Infrastructure Critical infrastructure are the systems that everyone relies on to keep civilization moving, such as: • Power: »» Electrical utility transmission & distribution, oil and gas pipelines, water distribution and suppliers, nuclear materials and power • Transportation: »» Road, rail, air, local public transportation, shipping, hazardous materials • Federal and municipal services: »» Safe water systems, waste disposal • Process manufacturing: »» Chemical, petroleum, hazardous waste • Information and communications: »» Telecommunications, broadcast television and radio • Emergency services: »» Emergency health services, public health, fire and police departments • Banking and finance: Category Performance Requirements Availability Requirements IT Systems Critical Systems • Non-real-time • Real-time • Response must be consistent • Response is time-critical • High throughput is demanded • Modest throughput is acceptable • High delay and jitter maybe acceptable • High delay and/or jitter is a serious concern • Responses such as rebooting are acceptable • Outages such as rebooting are unacceptable • Availability deficiencies can often be tolerated, depending on the system’s operational requirement • Outages must be planned and scheduled days/weeks in advance • High availability requires exhaustive pre-deployment testing Integrity Requirements • Low to moderate • Very high Access to Components • Components are usually local and easy to access • Components can be isolated, remote, and require extensive physical effort to gain access to them Component Lifetime • Lifetime on the order of 3-5 years • Lifetime on the order of 15-20 years Operating Systems • Systems are designed for use with typical operating systems • Differing and custom operating systems often without security capabilities • Upgrades are straightforward with the availability to automated deployment tools Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 • Software changes must be carefully made, usually by software vendors, because of the specialized control algorithms and perhaps modified hardware and software involved 50 »» Trading systems, automated clearinghouse network, ATM networks Critical infrastructure networks differ greatly from IT networks. This is just some examples of the differences: Security on these systems has become an issue in recent years for several reasons: • Reduction or loss of production at one or multiple sites simultaneously • Damage to equipment that can take months to replace • Release, diversion, or theft of hazardous materials • Violation of regulatory requirements • Product contamination • Connections to IT networks are now required: »» Remote access for vendors, consultants and engineers • Criminal or civil legal liabilities »» Data mining • Loss of proprietary or confidential information »» Regulatory controls • Loss of brand image or customer confidence • Without security, infections from IT networks can pass to critical systems untouched • Normal security maintenance activities like applying patches or signature updates can cause denial of service disruptions and outages • Security forensics are almost non-existent making even identification of cyber attacks difficult • Workforce is aging faster than norm Critical Infrastructure Protection (CIP) Standards encompass Secure Computing’s portfolio: CIP-003. Security management controls – R.4: Information protection—identify, classify and protect critical cyber assets info – R.5.: Access control—manage access to critical cyber asset information CIP-005. Electronic security perimeters (ESP) • Within 5 years there will be 40-60 retiring at each utility company every month – R.1.: Identify and document all ESP and all access points to the perimeters • More than 80 percent of the nation’s critical infrastructure is owned or managed by private organizations, which raises questions on how involved and responsible should the government be in the security of the systems – R.2.: Implement and document controls of electronic access to ESP Attacks can come from outsiders or insiders: – R.2.2: Enable only ports and services required for operations and monitoring »» Attacks from thrill seekers – R.2.1: Use an access control model that denies access by default – R.2.4: Ensure authenticity of accessing party through external interactive access »» Botnet attackers trying to create zombies »» Cyber criminals CIP-007. Systems security management »» Foreign intelligence services – R.2.: Enable only required ports and services »» Phishers, spammers and spyware authors – R.4.: Use anti-virus software and other malware prevention tools »» Terrorists »» Industrial spies »» Disgruntled insiders – R.5.: Enforce access authentication consistent with the concept of “need to know” »» Prohibited software – R.5.3: Use strong passwords »» Vendor updates – R.6.: Monitor and log of all system events related to cyber security »» Software malfunctions »» Contractors and other temporary workers »» Inappropriate and/or out-of-date policies »» Backup or auxiliary systems don’t have same protections as the primary systems Security breaches on critical infrastructure networks can be devastating, including: • Jeopardizing the safety of site personnel, the public, and the environment • Impact on national security 51 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Secure has had a lot of success selling security solutions into critical infrastructure companies and government agencies. The following list of logos represents companies in 28 US states, 5 provinces of Canada, the UK, Virgin Islands, Italy, Germany, Hong Kong, Japan, Australia, Poland, Austria, Thailand, New Zealand, Oman, Brunei, Saudi Arabia, Ireland, Kuwait, Brazil, Malaysia, Qatar, Pakistan, South Africa, Taiwan, Philippines, Finland, and Denmark, and in the following industries: power, government, transportation, water, energy, gas, petroleum, and chemical manufacturing. Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 52 Product Promotions Every quarter, Secure Computing offers some promotional programs to assist in closing sales. Click here for a list of current promotions (https://partner.securecomputing.com/promos.cfm). Using Domain Health Check for Lead Generation Domain Health Check (DHC) is a free Web service that allows businesses (and consumers) to run a health check on their domain. The request process verifies the identity of the report requestor (double opt-in email), generates a report for the domain identified within the verified email address, and then sends the requestor the DHC report (English only) as an email attachment (pdf). The information within the report provides the domain’s Web and email reputations as determined by TrustedSource. DHC will only provide information about their domain GET YOUR FREE and IP net blocks that is publicly available based on messaging and Web behavior observed on that domain. Domain Health Check™ The goal of DHC is to provide customers and prospects with SECURE COMP UTING ® immediately useful web and messaging reputation data; demonstrate the value of TrustedSource; establish Secure Computing and participating partners as technology thought leaders; and to generate pre-qualified, high quality leads. If you are interested in offering DHC reporting linked from your own Web site, contact your Secure Computing account manager. Product Evaluations and Demonstration Units Secure Computing offer product evaluations for end user customers and product demo / NFR (Not For Resale) units for channel partners. Product Demo / NFR units are licensed for up to 250 users and include the most popular subscription services and support (including warranty) for three years. Demo / NFR appliances can be used by the partner as internal appliances (protecting their own network) and/or as demonstration equipment to show the power of Secure’s products to prospects. These units are NEVER to be deployed in live end-user customer environments in production or for customer evaluations. Secure Computing offers an evaluation program that allows channel partners to deploy solutions on the customer’s own premises. We strongly recommend that customers who qualify evaluate Secure products before purchasing them. The graphic below describes the evaluation ordering process. Please contact your Secure Computing sales representative for further information regarding either program. 53 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 Hardware Appliance Evaluations (Secure Firewall CommandCenter, Secure Web, Secure Mail, and Secure Firewall) Software/Token Evaluations (Secure SafeWord, Secure Web, Secure Web SmartFilter) Customer or channel partner Customer or channel partner 1-800 # SCUR Web site 1-800 # SCUR Web site Secure Computing Customer Services qualify the evaluation request and enter details into sales management system Request is processed Sales person is assigned the request, contacts, customer and sends an Appliance Evaluation Agreement For shipped software (Secure SafeWord 2008) For downloaded software (Secure Web/Secure Web SmartFilter) Evaluation Agreement is processed by the Customer Service Media/guides/serial #’s/Tokens are packaged and shipped 30 day serial # is emailed to customer Once installed and activated, the customer has 30 days to evaluate Customer downloads and installs their software eval from the SCUR Web site Appliance is packed and shipped Note: Secure SnapGear has an online demo available Customer receives appliance and has 30 days to evaluate Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008 54 Cross Selling Secure Computing Solutions There are a number of reasons to sell multiple Secure Computing products into the same account. There are strong reasons from a management perspective, from a security perspective, and from a TCO investment perspective. Management • Many companies are looking for fewer vendors to manage • It’s easier to have one support phone number to call and one point of contact that intimately knows your security environment, your history, and your requirements Security • Secure provides the strongest and most respected security products on the market • Secure is 100% dedicated to security and employs over 400 engineers who do nothing but worry about keeping our customers’ environment as secure as possible TCO and Investment • Special promotions incent customers to purchase multiple products, so there is a good financial incentive to buy more and more from Secure. The following are some natural pairings to consider when discussing Secure products with a prospect or existing customer. Complete Inbound and Outbound Communications Security: Secure Web and Secure Mail Complete Mail and Access Security: Secure Mail and Secure SafeWord For any company that provides remote access to their email system (via a Web-based interface or over a VPN), Secure SafeWord is a natural partner with Secure Mail. Secure SafeWord provides strong two-factor authentication to ensure that only authorized users of the email system can access mail servers. Complete Data Center and Remote Location Security: Secure Firewall and Secure SnapGear This is a natural pairing for any company with remote offices, branch offices, retail stores, or remote data centers. Since Secure Firewall and Secure SnapGear share a common monitoring and reporting tool (Secure Firewall Reporter), it is easy to monitor and drill down on security events for all firewalls and have them work together to provide a complete blanket of security. Complete Remote Access Security: Secure SnapGear and Secure SafeWord For any company that allows remote access into data centers, pairing Secure SafeWord and Secure SnapGear provides the highest level of security. Secure SafeWord is used to authenticate the user trying to access the data center, and Secure SnapGear authenticates the remote assets being used. This eliminates the problem of roving hackers exploiting vulnerabilities in VoIP or wireless networks from breaking into computing hubs. n Email security alone won’t protect companies from emails containing links to infected Web site and Web security alone won’t protect companies from spam or phishing attacks. Deploying Secure Web and Secure Mail together virtually eliminates the most common type of attack being used today: blended threats. Complete Web Surfing and Web Application Security: Secure Web and Secure Firewall Deploying both Secure Web and Secure Firewall will protect both a company’s users and the corporate Internet-facing and Web applications from threats. Secure Web protects corporate desktops and users as they surf the Internet and access Web 2.0 sites. Secure Firewall ensures that Internetfacing and Web applications are secured and prevented from turning into a malware-serving or hacked site. The combination of Secure Web plus Secure Firewall ensures that both the desktop and the applications are secured. 55 Secure Computing Partner Survival Guide – Company Confidential, Version 1.0 – Q2, 2008