1
Selling Security to SMBs with 4th gen Intel® Core™ Processors
2
After this Sales Training, You Will Learn: § Where new opportunities lie in the small and medium business market
segment § Why IT security is important to small and medium businesses § How to recommend solutions to fit your customers’ needs § How to overcome common customer sales objections
3
Understanding Your Customer Needs SMBs buy when…
Windows* XP and Office* 2003 Support is Ending
On April 8, 2014, businesses will no longer receive updates, including security updates, for Windows XP from Microsoft.
Replacing obsolete, lost, or stolen devices
Impeded by older systems running business and security applications slowly
Older systems are unavailable due to repair issues
Employees need mobile devices to use in or outside of the office
Adding new employees
4
Business IT Security Risks Security threats continue to rise, increasing risk of data breaches, data loss and lost business
87% of SBs had a security breach in the last year
(up from 76% a year ago)1
39% of all targeted cyber attacks in 2012 were aimed at SMBs with <1,000 employees. 4 Focus of attacks: § Customer data § Bank account information § Intellectual property
83% of SMBs surveyed admitted they have no
formal cyber-security plan2
60% of SBs will close within 6 months of a cyber-attack3
5
Your Sales Opportunities § 2/3 of small businesses are planning to purchase a PC,
most small businesses plan to purchase a desktop followed by notebooks5
§ 60% of small business owners are planning to purchase tablets within the next year6
§ 47% of small businesses are not aware that Microsoft is ending support for Windows* XP5
Here is why NOW is the time to talk to your SMB customers:
Use your expertise to help customers make the best choice that meets their needs with devices based on Intel® Core™ processors
6
Advise Customers Show your customers how new technology can address critical IT security concerns
7
Identity Protection: § Ensures safe access to business network with a
hardware-generated one-time password9
Operating System Protection: § Stops malware at boot-up8
§ Protects the BIOS from malware and unauthorized updates8
And with Microsoft Windows* 8 Pro: § Keeps documents and emails more secure with
enhanced security features like built-in firewall, anti-virus, and rootkit malware protection
Security Built-in: Threat Mitigation 4th generation Intel® Core™ processor with built-in security features7,8
Security Benefits: Threat Mitigation
8
Security Built-in: Data Protection 4th generation Intel® Core™ processor with built-in security features7,8
Security Benefits: Data Protection
Data Security: § Keep business and customer data encrypted without
impacting system performance10
Protection On-the-Go: § Provides remote locking capabilities if a device is lost
or stolen8
And with McAfee* SaaS Endpoint Protection Suite : § Antivirus protection and centralized, online
management console to monitor all systems, regardless of location
9
New Intel® Core™ processors bring amazing innovations with built-in security protection
Ultra-thin Designs Enabling thinner, lighter & more beautiful designs; creating the
“WOW” factor that pulls people in
Protection On-The-Go Remote locking capabilities if a device is lost or stolen10
Business Performance For a computing experience like never before
Innovation Redefined
Identity Protection Hardware-protected one-
time password7
O/S Protection Stops malware at boot-up and
protects the BIOS from unauthorized updates8
Data Security Keep business and customer data encrypted9
High Quality Touchscreens Rich multi-touch displays provide a “WOW” experience to the user
10
Recommend the Best Solution Show customers how new devices built with Intel® Core™ processors will meet their needs now, and continue to grow with them in the future
11
An Intel Architecture-based Device for Every Small Business Need
4th gen Intel® Core™ processor-based form factors
Right Device for the Task
Integrate seamlessly into your business with more peripheral and driver support with compatibility for all x86 applications.
All-in-One PC Clamshell 2 in 1 Tablet
Space saving designs and multitouch screens.
A touch enabled business laptop that has the performance to keep up with your business.
Versatility for business —a tablet when you want it, a laptop when you need it.
Ultrabook™
12
Ultrabook™ 2 in 1
Recommend the Right Device
§ Customer database management
§ Complex financial spreadsheets
§ Need for more GB storage
SMB uses Recommendation
Ultrabook™ Clamshell
All-In-One PC
For business security protection
With Intel Inside® and Windows* 8 Pro – Get better protection of business data and devices
Built-in Security
Identity Protection
O/S Protection Encryption On-the-Go
§ Presenting to customers and suppliers
§ Requires access to business and customer information on the go
§ Collaborative tools and video conferencing
§ Requires access to business and customer information on the go
§ Collaborative tools and video conferencing
§ Multiple demanding applications open at same time
13
Overcome Buyer Objections Have an open conversation with your customers and address their needs with proof points
14
Running your company on outdated technology puts your business at risk: Support for Windows* XP and Office* 2003 is ending on April 8, 2014. You will no longer receive updates, including Security updates, for Windows XP from Microsoft. When no longer receiving security updates, PCs will be vulnerable to harmful viruses, spyware, and other malicious software, which can steal or damage your business data and information.
The Sales Conversation Why would the end of life of Microsoft XP affect my business security?
15
With the latest mobile devices, such as an Ultrabook™, data is safer and more secure than ever before with built-in security features that:
§ Guard systems and data from malware attacks8 § Provide secure access to the company network9 § Help protect against identity theft8
The Sales Conversation The safety of our business and customer data is a top concern. How can we make sure our employees can take devices out of the office safely?
16
Security threats continue to rise, and older PCs do not have the latest security features. This increases the risk to your business for data loss. Did you know that 87% of small businesses had a security breach in the last year1?
The Sales Conversation My old PC is fine - why should I buy a new one?
Intel® Core™ processor-based devices provide you the latest security protection built-in to: § Stop malware attacks at boot-up8 § Ensure secure access to your network9 § Keep documents and email more secure with the
added security features of Windows* 8 Pro
And with the McAfee* SaaS Endpoint Protection Suite, all systems can be monitored, regardless of location, with the online management console.
17
1. Understand the needs of your customer: § Older PCs are more vulnerable to attacks and less reliable § Need for new ways to work in and out of the office § Windows* XP and Office* 2003 support is ending
2. Advise them on how new technology can support the way they want to do business: § Security protection built-in § New computing experience and form factors § Intel Inside® and Windows* 8 Pro - better protection of business data and devices § McAfee* SaaS Endpoint Protection Suite - monitor all systems, regardless of
location
3. Recommend the best solution for their needs with devices built with Intel technology.
Give Your Small Business Customers Security Protection
Meeting the Emerging Needs of the Business User
18
1. Information Security Breaches Survey 2013. UK https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/200455/bis-13-p184-2013-information-security-breaches-survey-technical-report.pdf
2. Forbes, Why Investing In Online Security Makes Sense For Small To Medium-Size Businesses, Dec,18, 2012 http://www.forbes.com/sites/capitalonespark/2012/12/18/the-best-offense-is-a-good-defense-why-investing-in-online-security-makes-sense-for-smbs/
3. Fox Small Business Center: “Most Small Businesses Don’t Recover from a Cyber-Attack”. http://smallbusiness.foxbusiness.com/technology-web/2013/03/21/most-small-businesses-dont-recover-from-cybercrime
4. 2013 Internet Security Threat Report, Volume 18, Symantec http://www.symantec.com/security_response/publications/threatreport.jsp
5. Techaisle Whitepaper Small Business PC Refresh Study May 2013 www.techaisle.com 6. “ A Look at Mobility for Small Businesses”, Aug 24, 2011, US based. http://www.att.com/gen/press-room?pid=17789
7. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details. For more information, see http://security-center.intel.com/
8. (Intel PPT) No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, firmware, software and may require a subscription with a capable service provider (may not be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more information, visit http://www.intel.com/go/anti-theft. . Consult your system manufacturer and/or software vendor for more information.
9. (Intel® IPT) No computer system can provide absolute security. Requires an Intel® Identity Protection Technology-enabled system, including an enabled Intel® processor, enabled chipset, firmware, software, and Intel integrated graphics (in some cases) and participating website/service. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com/. Consult your system manufacturer and/or software vendor for more information.
10. (Intel® AES-NI) Intel® AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.
Legal Content
19
© 2013 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Core, Intel Inside, and Ultrabook are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others.