Mix it Up
Consulting and More
Checkpoint
Endpoint Protection
Cyber Hygiene
100

These industries are referred to as 'highly compliant' and typically are associated with cybersecurity buying activity. (Pick 3)

What are Medical, Manufacturing, Financial, Retail, Transportation, Technology, Government or Government Adjacent? 

----------------------------------------

Remember: Nearly all industries have some type of compliance requirement. 

100

AT&T Cyber security consultants have on average how many years of experience? 

What is 15 years?

--------------------------------------------

We have over 30+ years as a market leader in Cybersecurity consulting expertise. 

100

These are benefits of the "Security Your Way" Checkpoint offer from AT&T. (Provide 2)

Examples: All-in-one protection, managed by AT&T, enterprise-level security at SMB price, flexible options, low-touch deployment

-------------------------------


100

AT&T Endpoint Protection with SentinelOne defends against these critical threats to SMB's.

What is malware, especially Ransomware? 

---------------------------

Malware is malicious software. Ransomware is the most dangerous kind. 

100

This cybersecurity essential helps organizations educate their team on best practice guidance to stay ahead of threats and improve outcomes. 

What is cybersecurity awareness training? 

------------------------------------------------

We offer awareness training as part of our consulting portfolio. 

200

Engage this individual anytime you encounter a High-Value client conversation/opportunity. 

Who is Ed Escobar?

-----------------------------------

Remember the High-Value characteristics.

1) Dedicated connectivity 2) Employee count 3) Multi Site 4) Industry of need

200

AT&T Cybersecurity's award-winning threat intelligence team is 'out of this world'. 

What is AT&T Alien Labs?

-------------------------------------------

Our Alien Labs team uses propriety threat intel combined with our first of its kind Open Threat Exchange to deliver best in class threat intelligence. 

200

These are the prices for the Express and Express Pro models. 

What are $100 and $150?

-------------------------------------

Remember: Secure Workforce add-ons are extra and priced per user. These valuable add-ons are key to turning a $100 VAS sale, into a $500 VAS win!

200

AT&T Endpoint Protection w/ SentinelOne provides protection to these types of endpoints. 

What are laptops, VM's, desktops, and servers? 

-------------------------------------------

If customer needs other endpoints protected such as Mobile phones engage Ed to get the right offering!

200

This cybersecurity essential protects the hosts on a network from malware, viruses, and more. 

What is endpoint protection?

----------------------------------------------------

SentinelOne is endpoint protection on steroids. 

300

This system is you primary ordering system for AT&T Endpoint Security with SentinelOne. 

What is BOOST?

300

This critical cybersecurity tool minimizes the likelihood of employees being socially engineered. 

What is Security Awareness Training?

-------------------------------------------

Awareness Training is one of the highest returns on the dollar that an organization can spend as it relates to reducing risk. 

300

This Checkpoint offer combines Next Generation Firewall capabilities with critical web and security functions like URL filtering and inline anti-virus protection.

What is the Checkpoint Express Pro?

--------------------------------------

You can add Secure Workforce for even more layers of needed protection. 

300

This is the % of cyber breaches that originate at the endpoint.

What is 70%+?

------------------------------------

Endpoints make easier entry points into a network because users make mistakes. 

300

This cybersecurity is essential is critical to defending against Phishing and Business Email Compromise (BEC).

What is Email and Web Security?

--------------------------------------

We can help with our AT&T Secure Workforce (Email) and Checkpoint Express Pro offerings. 

400

This important process of risk transference usually requires the business fill out a questionnaire and attest to their cyber program. It demands meeting certain cyber hygiene essentials including Firewall, Endpoint Protection, and Security Awareness Training and much more. How they answer will impact the 'premium' and coverage amounts. 

What are cybersecurity insurance requirements? 

-------------------------------------------------

Remember: Organizations buy cybersecurity insurance which requires they attest under penalty that they are meeting cybersecurity expectations. 

400

Penetration Testing, Vulnerability Scanning, and ongoing 'management' provided by our domain experts are the hallmarks of this 'program'.

What is the Managed Vulnerability Program (MVP)?

--------------------------------

Customers that buy MVP typically buy again in subsequent years, enabling better relationships and more opportunity to upsell and cross sell. 

400

AT&T Secure Workforce can layer on to Checkpoint Express and Express Pro deployments and provides what powerful solutions? (Pick 2)

What are Secure Email protections, Secure Browser Protection, Secure Web Gateway, and Secure Remote Access for mobile users. 

---------------------------------------------

Secure Workforce EXTENDS the firewall capabilities to user outside the protection of the firewall. Critical for email and mobile user protections. 

400

This is the name of SentinelOne's patented Ransomware recovery feature. 

What is Rollback?

--------------------------------------

Rollback returns and endpoint to the last previous good state without a lengthy restoral form a backup. 

400

This method of discovering 'vulnerabilities' on a network is a necessary step in understanding the exposure an organization has within its infrastructure. 

What is vulnerability scanning?

-----------------------------------------

We provide vulnerability scanning though our consulting portfolio via the Managed Vulnerability Program (MVP).

500

This 'requirement' compels an organization to acquire a minimum set of cybersecurity controls. 

What is compliance?

PCI, ISO, HIPAA or others will work. 

------------------------------------

Remember, Compliance Compels Cybersecurity purchasing. 

500

This critical assessment takes a quantitative approach to risk and provides the client with a report which maps their "posture" to industry best practice guidance.

What is a Cyber Risk Posture Assessment?

Will also accept Gap Assessment.

---------------------------------------------

Organizations under compliance mandates are required to perform these at different intervals. Most commonly once a year. 

500

The Checkpoint Express and Express Pro are compatible with what primary connectivity types?

What are ADI, ABF, and ASEoD with Internet Offload (with set up)

--------------------------------------------------

Cellular is available as a back up (with set up) but not current available as a primary. 

500

This is the price per endpoint for AT&T Endpoint Security with SentinelOne.

Starts at $2.90 per seat.

-------------------------------

We can get as low are $2.65 on 26 to 50 seats.

Above 50 seats, you will want to engage a Ed. 

500

This cybersecurity essential prepares an organization's 'response' in the event of a cybersecurity breach. 

What is an incident response plan?

------------------------------------------------

We help organization create incident response plans though our consulting portfolio. 

M
e
n
u