1 / 16

Presenter Notes

This pitch presentation introduces Thycotic as a potential solution to a recently discovered problem. With Thycotic's privileged account management solutions, organizations can prevent cyberattacks by securing passwords, protecting endpoints, and controlling access. The presentation emphasizes the importance of privileged account management and the vulnerabilities it addresses in a growing organization. Thycotic's suite of security solutions provides secure password management, endpoint protection, and access control, offering affordable, fast, and easy-to-use solutions. The presentation aims to secure a demo by demonstrating Thycotic's value as a business partner and security consultant.

olivo
Download Presentation

Presenter Notes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presenter Notes • This is your introduction pitch presentation. By now, your prospect has likely gone through the Education stage already – they’ve: • Realized that there is a problem out there (loosening the status quo) • Began to decide that the problem is big enough to explore solutions (Committing to Change) • This pitch deck is a bridge between the Education and Solution phase – where you are introducing Thycotic as a potential solution to a recently discovered problem. • Spend 1/3 of your time on the pitch, and the other 2/3 of the time learning about your prospects business and their needs

  2. Presenter Notes Continued • You have 1 Goal For This Presentation: Secure a Demo • Thycotic wins most of our deals because of our relationship with the customer. • You are not a sales rep – you are a Business Partner and Security Consultant on all things Privileged Account and Access. • From the Feature Deck – take slides and add them after the Product Overview based on your early discovery calls that you think will be appropriate • Even though you may be going in with Secret Server, always sell it as a piece of a larger solution – and show them a roadmap and the path forward

  3. Presenter Notes Continued • Don’t Read the Slides! • Your audience is capable of reading – so let them. • Read the Speaker Notes • Regular font is example script you can build from • Italicized are notes to you to keep in mind as you go through that slide • Be Prepared! Do a bit of research on the company – show them that you took the time to care, 15 minutes of research can mean the world. Check their latest twitter/LinkedIn Posts, News page, about page, and if you want to be real fancy, read their 10-K/10-Q if they’re publicly traded. • If you need any help – reach out!

  4. Thycotic prevents cyberattacks by Securing Passwords, Protecting Endpoints, and Controlling Access. COMPANY NAME

  5. Just a Few Numbers • Up to 85% of Breaches involve compromised endpoints • The #1 Target of hackers are administrative like credentials. • Over 60% of breaches involve privileged accounts • Verizon DBIR 2016 • IANS 2015 • Attackers have access to your system, on average, for 200 daysbefore being detected

  6. Privileged Account Management What do I need to know? • Non-human accounts used by IT staff • Exist everywhere in nearly every connected device • Represent one of the most vulnerable aspects of an organization’s IT infrastructure.

  7. Pitfalls of a Growing Organization User / Admin User Admin Login for regular use, and separate login for elevated access Each has a regular use login, all share a single elevated access account Single Login with elevated access Each has a regular use login, all have one or more elevated accounts Evolution of an IT / Security Infrastructure

  8. Your organization today Domain Controller Web Server Databases Privilege Account Access Privilege Account IT Administrator User Account = IT REQUESTS and MANAGEMENT

  9. Breaches Will Happen Domain Controller Web Server Databases 5. Data Out 4. Compromised Privilege Account Access 1. Threats 3. Breached Privilege Account IT Administrator 2. Breached User Account = IT REQUESTS and MANAGEMENT

  10. Protect Yourself With Thycotic Domain Controller Web Server Databases Privilege Manager for Windows Secret Server Password Reset Server Privilege Account Access Group Management Server Privilege Account User Account User Account

  11. Thycotic SECURITY SOLUTIONS • We help prevent cyberattacks by Securing Passwords, Protecting Endpoints, and Controlling Access. • Endpoint and Privileged Access Security Suite • Thycotic offers an end to end Cyberattack Prevention Suite SECURING PASSWORDS SECRET SERVER Password Reset Server • PROTECTING ENDPOINTS and controlling access • PRIVILEGE MANAGER FOR WINDOWS • Privilege Manager for UNIX

  12. Secret Server Cloud - Professional Discover, Control, and Protect your Privileged Accounts • Secure Vault • AES 256 Encryption, Role Based Access Control • Automation • Active Directory Integration, Change Network Passwords, Session Launchers, Discover Local Admin Accounts, Hearbeat • Enhanced Security and Reporting • Full Auditing & Reports, RDP/SSH Proxying, Two Factor Authentication, Event Subscriptions • Built In Disaster Recovery • Automatic Backups, Unlimited Admins, Clustering / High Availability

  13. Secret Server Cloud Power of Secret Server and the Cloud Combined

  14. The Way Forward A Phased Transition Helps with Adoption Discover and Protect Privileged and Local Accounts Automate All Password Rotation Peace of Mind: Heartbeat and Accurate Audit Trails Proxy Through Secret Server

  15. Our customers choose Thycotic because we are: • Affordable • Fastest to Deploy • Easiest to Use Privileged Account Management solution

More Related