Qualifying questions for CrowdStrike.pptx

NitasMulmi 77 views 6 slides Sep 23, 2024
Slide 1
Slide 1 of 6
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6

About This Presentation

no


Slide Content

How to qualify Sales Playbook PERSONAS TO TARGET & MESSAGING Asst IT & IT managers, IT Infra Manager,VP of IT, Head of IT CTO/CTO/CISO App Developer Director/ VP/Cloud arch IT Architect/Release Mgmt /Director CUSTOMER CHALLENGES/ PAIN POINTS Lack of visibility across Endpoints/Clouds No confidence in current vendor Maintaining compliance and security posture No Consolidated approach No security skillset Access control/ unauthorized access Preventing cloud and endpoint level breaches Expanded attack surface: clouds, workloads & containers and Endpoints Identifying and remediating vulnerabilities across the CI/CD pipeline DISCOVERY QUESTIONS Under Endpoint Security what are you using today, which Vendor? How many total endpoints does it cover? Which vendor are you using? What is the renewal timeline for the current product? So, you take care of the entire IT Security there at “Company name” right? We have a complete consolidated approach towards CrowdStrike we would love to show you a complete demo and how it can help you get value at “company name” When does the Budgeting cycle start? [Ask this if current AV not expiring soon ] qualification questions for Cloud and Identity Do you have on prem or cloud servers? Which cloud provider? Estimated no of cloud workloads What do you currently do to identify misconfigurations in your cloud infrastructure? If they have cloud presence, apart from the cloud provider giving security on infra do you have any security specifically for workloads and containers? We can do a cloud risk review with you! How do you currently identify vulnerabilities across the CI/CD pipeline? Identity protection Do you have AD ( onprem or Azure) Are you using any identity solution (IAM) are you able to prevent and detect real time attacks? (Lateral movement/ Identity based credential attack) Do you have visibility of identities their behavior what users are doing ? Do you have visibility over compromised and stolen passwords? Are you retaining logs? According to Cert guidelines (qualify for logscale) Do you have unified visibility over clouds, Endpoints, Firewall, network and email (qualify for NGsiem )

CROWDSTRIKE SECURITY Sales Playbook Cheatsheet KEY BENEFITS for cloud Stops cloud breaches and minimizes business disruptions Secures cloud-native apps across the application lifecycle Prevent and remediate cloud misconfiguration, and eliminate compliance violations Continuously detect, prevent, and remediate cloud control plane and identity-based threats Enables DevOps to build safely in the cloud Ensures compliance for any workload KEY BENEFITS for Identity Complete visibility of Identities Visibility of user behavior (Real time prevention and detection of identity based attacks Full Visibility on stolen Credentials, Stale passwords, expired passwords Prevention of any behavioral based attack (80% of attack stem from identity) KEY BENEFITS for Endpoint Security, IT hygiene Completely signature less will prevent and detect any new or unknown signatures. 95% faster time to respond Backed by Threat intelligence low false positives Unified security telemetry across IT infra in a single dashboard Consolidated solution Full Visibility of each detection which gets easy for Threat Hunting and investigation Managed Threat hunting Detections will be automated with Falcon fusion Continuously detect, prevent, and remediate in real time Complete visibility of External surface and assets Vulnerability management and Asset management PITCH - With CrowdStrike you will gain… (Customize this according to what the customer is looking for) If you are looking for a security provider that will provide you better protection, detection and Visibility, better performance, and better value. CS is the only next-gen Endpoint Protection Solution which unifies IT hygiene, NGAV, EDR/XDR, SIEM, 24/7 managed threat hunting, Identity Security, Cloud Security and it does all of this while providing superior protection and detection.

Understanding Personas
Tags