Page 38 - GBG Customer Engagement Book v1.06
P. 38
Infinity Script #2
Hi is this _____? Hey, my name is Roni, I’m calling from the Check Point headquarters in Tel Aviv, Israel. I saw that you recently attended ______.
- One of our lunch and learns seminars (SMR)
- Our booth at the ___ conference (CON)
- Our booth at the ___ Tradeshows (TS)
- One of our webinars (WB)
- One of our training events (TRN)
How did you like it? Had you heard of Check Point prior to this?
(Can’t Talk) Definitely understand! To quickly explain the reason for my call, we’re calling companies like yours and making sure that their mobile and cloud environments are fully secured. As you know, we are and
have been the leading provider of Cyber Security Solutions for over 25 years. Just a quick question, are you currently using any solutions to protect your mobile or cloud environments?
(I really can’t talk) Not a problem. Here is what I can recommend to do, so we don’t waste too much time during this call, I see that my security expert is actually in your town next week.
I can schedule a meeting for you two to go over the different security solutions. What is your availability like on ___?
In the meantime I can email you some great information regarding the different solutions that Check Point can offer, and we can see which area of interest is more relevant for you,
and we’ll focus on that in the meeting.
(No access to calendar) No problem. I see that he is available at ___ so I will send you an invite to save you a spot just in case, and if you see that this time is problematic,
feel free to propose a new time and we will find a convenient time for both of you. In the meantime I can email you some great information regarding the different solutions that Check Point can offer,
and we can see which area of interest is more relevant for you, and we’ll focus on that in the meeting.
(Yes) --> Good to hear :)
(No) --> Ok well, Check Point is a leading provider of Cyber Security Solutions for companies like yours all over the world.
At Check Point, we are merely focused on threat prevention at all levels and around all vectors, such as mobile, cloud, endpoint, and more..
The reason I’m calling is…. because I wanted to know: how are you currently handling cyber threats and vulnerabilities at ______?
(I’m using a couple different vendors)
Great! It’s important to take proactive precautions. How are you currently managing all of these vendors?
(Um, we have people who are constantly making sure that our organization is safe)
So as I’m sure you know, having separate point solutions – with difference prices and business models- can many times get complex and unpredictable.
Check Point has recently come out with an all-inclusive consumption model, that protects and prevents threats in your infrastructure, cloud, mobile, and endpoint platforms.
How it works is it’s basically one unified security platform that leverages Check Point’s threat intelligence across all vectors, so again, this includes cloud, network, mobile, and endpoint.
--> OPTIONAL: You know, by having different solutions from multiple vendors you are lacking real time visibility (like what happened in the famous Wannacry attack).
The amazing thing with have one consolidated system is that for example once a new threat has been detected in, let’s say mobile, it would be identified in any other part of the organization’s network.
So no need to wait for the different platforms to communicate and integrate, it’s all connected to the same brain.
(Sorry but it is a part of our security strategy to use different vendors, we would rather not concentrate all efforts and resources in one vendor)
I understand the concern, but were you aware that in 2017, Gartner actually came out with a report saying that all companies should go with ONE security vendor? Check Point has over 25 years of experience, focusing ONLY on
cyber security. We are very much invested in ensuring that our solutions protect all your security landscapes, constantly researching and developing new ways of threat-prevention.
(Sounds good, but I’m not sure we have the budget for something like that right now.)
Here is what I can recommend to do. I see that my security expert is in your area next week. Let’s set up a meeting to go over all the information that you need and set up a live-demo. What is your availability like on ___?
(No access to Calendar)
Ok sure, I see here that he has a few slots lefts at ____ so I will send you an invite and save you a spot just in case, and if you see that this time is problematic, feel free to propose a new time and we will find a convenient time
for both of you.
38
Hi is this _____? Hey, my name is Roni, I’m calling from the Check Point headquarters in Tel Aviv, Israel. I saw that you recently attended ______.
- One of our lunch and learns seminars (SMR)
- Our booth at the ___ conference (CON)
- Our booth at the ___ Tradeshows (TS)
- One of our webinars (WB)
- One of our training events (TRN)
How did you like it? Had you heard of Check Point prior to this?
(Can’t Talk) Definitely understand! To quickly explain the reason for my call, we’re calling companies like yours and making sure that their mobile and cloud environments are fully secured. As you know, we are and
have been the leading provider of Cyber Security Solutions for over 25 years. Just a quick question, are you currently using any solutions to protect your mobile or cloud environments?
(I really can’t talk) Not a problem. Here is what I can recommend to do, so we don’t waste too much time during this call, I see that my security expert is actually in your town next week.
I can schedule a meeting for you two to go over the different security solutions. What is your availability like on ___?
In the meantime I can email you some great information regarding the different solutions that Check Point can offer, and we can see which area of interest is more relevant for you,
and we’ll focus on that in the meeting.
(No access to calendar) No problem. I see that he is available at ___ so I will send you an invite to save you a spot just in case, and if you see that this time is problematic,
feel free to propose a new time and we will find a convenient time for both of you. In the meantime I can email you some great information regarding the different solutions that Check Point can offer,
and we can see which area of interest is more relevant for you, and we’ll focus on that in the meeting.
(Yes) --> Good to hear :)
(No) --> Ok well, Check Point is a leading provider of Cyber Security Solutions for companies like yours all over the world.
At Check Point, we are merely focused on threat prevention at all levels and around all vectors, such as mobile, cloud, endpoint, and more..
The reason I’m calling is…. because I wanted to know: how are you currently handling cyber threats and vulnerabilities at ______?
(I’m using a couple different vendors)
Great! It’s important to take proactive precautions. How are you currently managing all of these vendors?
(Um, we have people who are constantly making sure that our organization is safe)
So as I’m sure you know, having separate point solutions – with difference prices and business models- can many times get complex and unpredictable.
Check Point has recently come out with an all-inclusive consumption model, that protects and prevents threats in your infrastructure, cloud, mobile, and endpoint platforms.
How it works is it’s basically one unified security platform that leverages Check Point’s threat intelligence across all vectors, so again, this includes cloud, network, mobile, and endpoint.
--> OPTIONAL: You know, by having different solutions from multiple vendors you are lacking real time visibility (like what happened in the famous Wannacry attack).
The amazing thing with have one consolidated system is that for example once a new threat has been detected in, let’s say mobile, it would be identified in any other part of the organization’s network.
So no need to wait for the different platforms to communicate and integrate, it’s all connected to the same brain.
(Sorry but it is a part of our security strategy to use different vendors, we would rather not concentrate all efforts and resources in one vendor)
I understand the concern, but were you aware that in 2017, Gartner actually came out with a report saying that all companies should go with ONE security vendor? Check Point has over 25 years of experience, focusing ONLY on
cyber security. We are very much invested in ensuring that our solutions protect all your security landscapes, constantly researching and developing new ways of threat-prevention.
(Sounds good, but I’m not sure we have the budget for something like that right now.)
Here is what I can recommend to do. I see that my security expert is in your area next week. Let’s set up a meeting to go over all the information that you need and set up a live-demo. What is your availability like on ___?
(No access to Calendar)
Ok sure, I see here that he has a few slots lefts at ____ so I will send you an invite and save you a spot just in case, and if you see that this time is problematic, feel free to propose a new time and we will find a convenient time
for both of you.
38