SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
APAC VALUE MARKETING

End User Marketing Creative Review
(Updated)

Sept 2010
             Classification 9/15/2010   Copyright 2009 Trend Micro Inc.   1
Campaign Library for 2010
• END USER
                                         • CO MARKETING
• Virtual patching EoL/ DS                 RESELLER
• HES                                    • Joint Vmware TM
• TCO/Suites
                                           Virtualisation

• HES/IWSVA                              • CPVM Rethink endpoint

• Web Gateway IWSVA                      • Web Gateway IWSVA

• Collaboration Portal Protect           • Server Virtualisation DS
  Virtualisation CPVM DM
  Virtualisation CPVM                    • INDUSTRY
• Agentless Scanning 7.5                 • Education
• Gartner Virtualisation                 • Government
• Gartner Threat Management              • Manufacturing (india)
• Office Scan 10.5 VDI
                                           Healthcare (US)

• Compliance "Dummies"/DS

• Compliance Finance /DS         Copyright 2009 Trend Micro Inc.
Responsys Creative Campaign e-engine




                     Copyright 2009 Trend Micro Inc.
Virtual Patch/
W2000 EoL

                                                   NEW




                 Copyright 2009 Trend Micro Inc.
NEW
Agentless Scanning /DS7.5




                     Copyright 2009 Trend Micro Inc.
NEW
ANZ Hosted email / landing page




                 Classification 9/15/2010   Copyright 2009 Trend Micro Inc.   6
CNET TCO Enterprise
Suites Campaign




               Classification 9/15/2010   Copyright 2009 Trend Micro Inc.   7
NEW
HES/IWSVA Bundled offering




                     Copyright 2009 Trend Micro Inc.
Gateway Security (IXSVA)




                Classification 9/15/2010   Copyright 2009 Trend Micro Inc.   9
Collaboration Campaign




                     Copyright 2009 Trend Micro Inc.
Virtualisation Campaign – optional CTA




                      Copyright 2009 Trend Micro Inc.
CNET CPVM Virtualisation Campaign
 Process
                eDM                                       Registration
                Campaign                                  Microsite                                        Thank You edm




CNET
Database

List Washing



Client
Database




                                                                                                           QC & Data Transfer
                                                                                                           Email and Telemarketing
                                                                                                           registration data quality
                                                                                                           checked, leads graded
               Telemarketing                              Follow up Email                                  and data transferred
               To non email respondents                   To telemarketing                                 to client or partners
               to generate registrations                  respondents with dummies                         for follow up
               & qualified leads                          guide attached
                                           Classification 9/15/2010   Copyright 2009 Trend Micro Inc. 12
CNET Gartner Virtualisation Campaign
(Stand alone and/or back end to VSS)
                eDM                                       Registration                                     Resource
                Campaign                                  Microsite                                        Microsite




CNET
Database

List Washing



Client
Database




                                                                                                           QC & Data Transfer
                                                                                                           Email and Telemarketing
                                                                                                           registration data quality
                                                                                                           checked, leads graded
               Telemarketing                              Follow up Email                                  and data transferred
               To non email respondents                   To telemarketing                                 to client or partners
               to generate registrations                  respondents with dummies                         for follow up
               & qualified leads                          guide attached
                                           Classification 9/15/2010   Copyright 2009 Trend Micro Inc. 13
CNET Threat Management Gartner Endpoint
Campaign Process
                eDM                                       Registration                                     Resource
                Campaign                                  Microsite                                        Microsite




CNET
Database

List Washing



Client
Database




                                                                                                           QC & Data Transfer
                                                                                                           Email and Telemarketing
                                                                                                           registration data quality
                                                                                                           checked, leads graded
               Telemarketing                              Follow up Email                                  and data transferred
               To non email respondents                   To telemarketing                                 to client or partners
               to generate registrations                  respondents with dummies                         for follow up
               & qualified leads                          guide attached
                                           Classification 9/15/2010   Copyright 2009 Trend Micro Inc. 14
Campaign Office Scan 10.5
CNET Campaign Process (VDI version)
                eDM                                       Registration                                     Resource
                Campaign                                  Microsite                                        Microsite




CNET
Database

List Washing



Client
Database




                                                                                                           QC & Data Transfer
                                                                                                           Email and Telemarketing
                                                                                                           registration data quality
                                                                                                           checked, leads graded
               Telemarketing                              Follow up Email                                  and data transferred
               To non email respondents                   To telemarketing                                 to client or partners
               to generate registrations                  respondents with dummies                         for follow up
               & qualified leads                          guide attached
                                           Classification 9/15/2010   Copyright 2009 Trend Micro Inc. 15
Compliance
                                                                                       NEW
                                      Campaign




Compliance Web Links
http://us.trendmicro.com/us
/home/enterprise/




                       Classification 9/15/2010   Copyright 2009 Trend Micro Inc. 16
FST Compliance Web
Site
http://us.trendmicro.com/us/soluti
ons/enterprise/security-
solutions/compliance/




                           Classification 9/15/2010   Copyright 2009 Trend Micro Inc. 17
Co marketing Reseller Campaign
examples


                  Copyright 2009 Trend Micro Inc.
CIAB - TM and Vmware joint campaign




                      Copyright 2009 Trend Micro Inc.
CIAB – Virtualisation – NEW CPVM
Consists of eDM, DM, landing page, white paper & telemarketing.

                                                                                    Landing Page




                                   9/15/2010   Copyright 2009 Trend Micro Inc. 20

Classification
CIAB – Rethink Endpoint Security
  Consists of eDM, DM, landing page, white paper & telemarketing




                                  9/15/2010   Copyright 2009 Trend Micro Inc. 21
CIAB – Web Gateway Security
Consists of eDM, DM, landing page, white paper & telemarketing.




Front of Direct Mailer

InterScan Web Security Virtual Appliances
  + Advance Reporting & Management
Offers include:
1. 20% competitor cross grade discount
2. Advance Reporting Management Module
    complimentary offer
3. White paper.
                                    Classification   Copyright 2009 Trend Micro Inc. 22
CIAB – Virtualisation –
  Deep Security
  Consists of eDM, DM, landing page, white paper &
  telemarketing.




                                                                           eDM
Front of Direct Mailer                   Copyright 2009 Trend Micro Inc.
CIAB – K-12 Education Segment
Consists of eDM, DM, landing page, white paper & telemarketing.




Offers:
1. NSS Labs report
2. Up to 60% Discount including the following
    solutions:
NeatSuite Premium, OfficeScan Adv, Worry Free
Business Security, Data Loss Prevention &
InterScan Web Security Virtual Appliance.
Promo Code SPA-019-09             Classification   Copyright 2009 Trend Micro Inc. 24
Local Government
Umbrella Campaign
• Target Audience
   – New Business/Customers
   – Primary- Local Councils 1,553
     Prospect database base
• Solution Focus
   – Hosted Email Security:
     Message Labs why they were
     interested in hosted email
     security was to reduce the
     workload on their email servers.
   – Virtual Security (IWSVA/CPVM
     & Deep Security): Councils are
     now using benefits of utilizing
     this infrastructure for gateway
     security.




                                        Copyright 2009 Trend Micro Inc.
Indian Vertical Segments




                       Copyright 2009 Trend Micro Inc.
Joint Indian TM Vmware




                     Copyright 2009 Trend Micro Inc.

Mais conteúdo relacionado

Mais procurados

Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
backfire_88
 
Supply chain presentation 11 2006
Supply chain presentation 11 2006Supply chain presentation 11 2006
Supply chain presentation 11 2006
Girard Brewer
 
Microsoft power point 080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]
Microsoft power point   080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]Microsoft power point   080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]
Microsoft power point 080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]
Erika Rachma
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
Rafael Junquera
 

Mais procurados (19)

Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
 
Scalability problems and E-business
Scalability problems and E-businessScalability problems and E-business
Scalability problems and E-business
 
B2B eCommerce
B2B eCommerceB2B eCommerce
B2B eCommerce
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
TelBill Overview
TelBill OverviewTelBill Overview
TelBill Overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Speed to Deployment: Implement Instant and Pop-up Networks Using Flexible 3G/...
Speed to Deployment: Implement Instant and Pop-up Networks Using Flexible 3G/...Speed to Deployment: Implement Instant and Pop-up Networks Using Flexible 3G/...
Speed to Deployment: Implement Instant and Pop-up Networks Using Flexible 3G/...
 
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
 
Mindtree's expertise in machine to machine (M2M).
Mindtree's expertise in machine to machine (M2M).Mindtree's expertise in machine to machine (M2M).
Mindtree's expertise in machine to machine (M2M).
 
3 Pd Last Mile Delivery, Kreig Rugh
3 Pd Last Mile Delivery, Kreig Rugh3 Pd Last Mile Delivery, Kreig Rugh
3 Pd Last Mile Delivery, Kreig Rugh
 
Supply chain presentation 11 2006
Supply chain presentation 11 2006Supply chain presentation 11 2006
Supply chain presentation 11 2006
 
att
attatt
att
 
ATLaaS - Your Cloud Delivery platform - overview - gen 2012
ATLaaS  - Your Cloud Delivery platform - overview - gen 2012ATLaaS  - Your Cloud Delivery platform - overview - gen 2012
ATLaaS - Your Cloud Delivery platform - overview - gen 2012
 
1. Shipit Smarter Concept & Functionalities (English)
1. Shipit Smarter Concept & Functionalities (English)1. Shipit Smarter Concept & Functionalities (English)
1. Shipit Smarter Concept & Functionalities (English)
 
SyntecX Blazon
SyntecX BlazonSyntecX Blazon
SyntecX Blazon
 
Verax OSS/BSS Suite - product presentation
Verax OSS/BSS Suite - product presentationVerax OSS/BSS Suite - product presentation
Verax OSS/BSS Suite - product presentation
 
Microsoft power point 080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]
Microsoft power point   080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]Microsoft power point   080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]
Microsoft power point 080102 fl-bp_3rdpartylogs_g0108 [compatibility mode]
 
Delivering Customer Requirements for the Cloud
Delivering Customer Requirements for the CloudDelivering Customer Requirements for the Cloud
Delivering Customer Requirements for the Cloud
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 

Semelhante a Anz campaign creative 11 sept 2010

Striving for an Outstanding IT Organization
Striving for an Outstanding IT OrganizationStriving for an Outstanding IT Organization
Striving for an Outstanding IT Organization
Huberto Garza
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Ontario Cloud SIG
 
Internet on business_print
Internet on business_printInternet on business_print
Internet on business_print
Francis George
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpoint
voliverio
 
Skellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochureSkellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochure
vermasunil
 

Semelhante a Anz campaign creative 11 sept 2010 (20)

Insurance Lead Optimization Webinar
Insurance Lead Optimization WebinarInsurance Lead Optimization Webinar
Insurance Lead Optimization Webinar
 
Partena 2010.02.10
Partena 2010.02.10Partena 2010.02.10
Partena 2010.02.10
 
Partena 2010.02.10
Partena 2010.02.10Partena 2010.02.10
Partena 2010.02.10
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
How Hansa Cequity can help you enrich your Customer Equity?
How Hansa Cequity can help you enrich your Customer Equity?How Hansa Cequity can help you enrich your Customer Equity?
How Hansa Cequity can help you enrich your Customer Equity?
 
Scaling MySQL: Benefits of Automatic Data Distribution
Scaling MySQL: Benefits of Automatic Data DistributionScaling MySQL: Benefits of Automatic Data Distribution
Scaling MySQL: Benefits of Automatic Data Distribution
 
Informatica Cloud Address Validation as a Service
Informatica Cloud Address Validation as a ServiceInformatica Cloud Address Validation as a Service
Informatica Cloud Address Validation as a Service
 
Computaris – The Data Dividend
Computaris – The Data DividendComputaris – The Data Dividend
Computaris – The Data Dividend
 
Striving for an Outstanding IT Organization
Striving for an Outstanding IT OrganizationStriving for an Outstanding IT Organization
Striving for an Outstanding IT Organization
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloud
 
Search2012 ibm vf
Search2012 ibm vfSearch2012 ibm vf
Search2012 ibm vf
 
Internet on business_print
Internet on business_printInternet on business_print
Internet on business_print
 
Emedia 2009 Media Kit Digital
Emedia 2009 Media Kit DigitalEmedia 2009 Media Kit Digital
Emedia 2009 Media Kit Digital
 
StrikeIron IronCloud API Web Service Publishing Platform SAAS
StrikeIron IronCloud API Web Service Publishing Platform SAASStrikeIron IronCloud API Web Service Publishing Platform SAAS
StrikeIron IronCloud API Web Service Publishing Platform SAAS
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpoint
 
Banking Innovations Forum 2009 - Bartłomiej Kozakowski, Comarch
Banking Innovations Forum 2009 - Bartłomiej Kozakowski, ComarchBanking Innovations Forum 2009 - Bartłomiej Kozakowski, Comarch
Banking Innovations Forum 2009 - Bartłomiej Kozakowski, Comarch
 
Crm Today Dinesh Chandrasekar
Crm Today Dinesh ChandrasekarCrm Today Dinesh Chandrasekar
Crm Today Dinesh Chandrasekar
 
Oracle Ucm General Presentation Linked In
Oracle Ucm General Presentation Linked InOracle Ucm General Presentation Linked In
Oracle Ucm General Presentation Linked In
 
Take 10 Kickoff Presentation
Take 10 Kickoff PresentationTake 10 Kickoff Presentation
Take 10 Kickoff Presentation
 
Skellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochureSkellig gpn-service-seeker-brochure
Skellig gpn-service-seeker-brochure
 

Mais de Graeme Wood

AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721
Graeme Wood
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Graeme Wood
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
Graeme Wood
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 

Mais de Graeme Wood (15)

TechCatalyst free assessment
TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment
 
TechCatalyst Corporate Overview
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview
 
How does semantic technology work?
How does semantic technology work? How does semantic technology work?
How does semantic technology work?
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service Segment
 
Ai and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive Overview
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
 
Introduction to Semantic Computing
Introduction to Semantic ComputingIntroduction to Semantic Computing
Introduction to Semantic Computing
 
AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721AIIA_DataAnalytics_Project_External_20160721
AIIA_DataAnalytics_Project_External_20160721
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Raimund genes from traditional malware to targeted attacks
Raimund genes    from traditional malware to targeted attacksRaimund genes    from traditional malware to targeted attacks
Raimund genes from traditional malware to targeted attacks
 
andrew milroy - top security trends and takeaways for 2013
andrew milroy - top security trends and takeaways for 2013andrew milroy - top security trends and takeaways for 2013
andrew milroy - top security trends and takeaways for 2013
 
Anz cloud thought leadership 16 mar
Anz cloud thought leadership 16 marAnz cloud thought leadership 16 mar
Anz cloud thought leadership 16 mar
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Anz campaign creative 11 sept 2010

  • 1. APAC VALUE MARKETING End User Marketing Creative Review (Updated) Sept 2010 Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 1
  • 2. Campaign Library for 2010 • END USER • CO MARKETING • Virtual patching EoL/ DS RESELLER • HES • Joint Vmware TM • TCO/Suites Virtualisation • HES/IWSVA • CPVM Rethink endpoint • Web Gateway IWSVA • Web Gateway IWSVA • Collaboration Portal Protect • Server Virtualisation DS Virtualisation CPVM DM Virtualisation CPVM • INDUSTRY • Agentless Scanning 7.5 • Education • Gartner Virtualisation • Government • Gartner Threat Management • Manufacturing (india) • Office Scan 10.5 VDI Healthcare (US) • Compliance "Dummies"/DS • Compliance Finance /DS Copyright 2009 Trend Micro Inc.
  • 3. Responsys Creative Campaign e-engine Copyright 2009 Trend Micro Inc.
  • 4. Virtual Patch/ W2000 EoL NEW Copyright 2009 Trend Micro Inc.
  • 5. NEW Agentless Scanning /DS7.5 Copyright 2009 Trend Micro Inc.
  • 6. NEW ANZ Hosted email / landing page Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 6
  • 7. CNET TCO Enterprise Suites Campaign Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 7
  • 8. NEW HES/IWSVA Bundled offering Copyright 2009 Trend Micro Inc.
  • 9. Gateway Security (IXSVA) Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 9
  • 10. Collaboration Campaign Copyright 2009 Trend Micro Inc.
  • 11. Virtualisation Campaign – optional CTA Copyright 2009 Trend Micro Inc.
  • 12. CNET CPVM Virtualisation Campaign Process eDM Registration Campaign Microsite Thank You edm CNET Database List Washing Client Database QC & Data Transfer Email and Telemarketing registration data quality checked, leads graded Telemarketing Follow up Email and data transferred To non email respondents To telemarketing to client or partners to generate registrations respondents with dummies for follow up & qualified leads guide attached Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 12
  • 13. CNET Gartner Virtualisation Campaign (Stand alone and/or back end to VSS) eDM Registration Resource Campaign Microsite Microsite CNET Database List Washing Client Database QC & Data Transfer Email and Telemarketing registration data quality checked, leads graded Telemarketing Follow up Email and data transferred To non email respondents To telemarketing to client or partners to generate registrations respondents with dummies for follow up & qualified leads guide attached Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 13
  • 14. CNET Threat Management Gartner Endpoint Campaign Process eDM Registration Resource Campaign Microsite Microsite CNET Database List Washing Client Database QC & Data Transfer Email and Telemarketing registration data quality checked, leads graded Telemarketing Follow up Email and data transferred To non email respondents To telemarketing to client or partners to generate registrations respondents with dummies for follow up & qualified leads guide attached Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 14
  • 15. Campaign Office Scan 10.5 CNET Campaign Process (VDI version) eDM Registration Resource Campaign Microsite Microsite CNET Database List Washing Client Database QC & Data Transfer Email and Telemarketing registration data quality checked, leads graded Telemarketing Follow up Email and data transferred To non email respondents To telemarketing to client or partners to generate registrations respondents with dummies for follow up & qualified leads guide attached Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 15
  • 16. Compliance NEW Campaign Compliance Web Links http://us.trendmicro.com/us /home/enterprise/ Classification 9/15/2010 Copyright 2009 Trend Micro Inc. 16
  • 18. Co marketing Reseller Campaign examples Copyright 2009 Trend Micro Inc.
  • 19. CIAB - TM and Vmware joint campaign Copyright 2009 Trend Micro Inc.
  • 20. CIAB – Virtualisation – NEW CPVM Consists of eDM, DM, landing page, white paper & telemarketing. Landing Page 9/15/2010 Copyright 2009 Trend Micro Inc. 20 Classification
  • 21. CIAB – Rethink Endpoint Security Consists of eDM, DM, landing page, white paper & telemarketing 9/15/2010 Copyright 2009 Trend Micro Inc. 21
  • 22. CIAB – Web Gateway Security Consists of eDM, DM, landing page, white paper & telemarketing. Front of Direct Mailer InterScan Web Security Virtual Appliances + Advance Reporting & Management Offers include: 1. 20% competitor cross grade discount 2. Advance Reporting Management Module complimentary offer 3. White paper. Classification Copyright 2009 Trend Micro Inc. 22
  • 23. CIAB – Virtualisation – Deep Security Consists of eDM, DM, landing page, white paper & telemarketing. eDM Front of Direct Mailer Copyright 2009 Trend Micro Inc.
  • 24. CIAB – K-12 Education Segment Consists of eDM, DM, landing page, white paper & telemarketing. Offers: 1. NSS Labs report 2. Up to 60% Discount including the following solutions: NeatSuite Premium, OfficeScan Adv, Worry Free Business Security, Data Loss Prevention & InterScan Web Security Virtual Appliance. Promo Code SPA-019-09 Classification Copyright 2009 Trend Micro Inc. 24
  • 25. Local Government Umbrella Campaign • Target Audience – New Business/Customers – Primary- Local Councils 1,553 Prospect database base • Solution Focus – Hosted Email Security: Message Labs why they were interested in hosted email security was to reduce the workload on their email servers. – Virtual Security (IWSVA/CPVM & Deep Security): Councils are now using benefits of utilizing this infrastructure for gateway security. Copyright 2009 Trend Micro Inc.
  • 26. Indian Vertical Segments Copyright 2009 Trend Micro Inc.
  • 27. Joint Indian TM Vmware Copyright 2009 Trend Micro Inc.