SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
“Securing Your Journey to the Cloud”
Thought Leadership

Q1 2011
ANZ Marketing Team

                     Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   1
2010 A/NZ Focus – Linking Events setting
scene for Cloud Security Positioning
 ANZ VSS Series & US VM World
                Joint Channel Enablement
                of Channels




PR Product Releases
                                                                            ANZ VForum

               Bylined Articles
               on Cloud
               Security Issues                                                                                    Gartner IT Brief
                                                                          Harish Agastya                          Case Studies
                                                                          visiting TM Execs
                                                                          Informal round table
                                                                          Media briefings

                                                                                  Cloud Security Exec Briefing
                                                                                            Steve Quane
                                                                                            visiting TM Execs
                                                                                            Formal Luncheon, Media Roundtable
                      Go to View > Header and Footer... and change to     Copyright 2011 Trend Micro Inc.   2
                                                        slideshow title
2011 Q1 End User Engagement Flow
                                                                          Lead Generation Campaign
                                                                                                       LEADS


 Market Research



                                              Topic in Conference

  Executive Conference                                                              Press Engagement




                                                                     Presentations on demand


Live Streaming /On Demand Viewing
End of March




                                Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   3
Market Research Project
•   The key objective for the research survey is to
    better understand the requirements of the market
    Trend Micro wants to penetrate with an in-depth
    survey that drills down into pain points/issues,
    objectives and technology solutions being
    considered by our key market
     – The Research began as an independent
         Email Survey with an incentive to drive
         response i.e.
         http://www.cnetdirectintl.com/au/2010/trend_
         micro/security_survey/register.htm?
     – We can then build PR activity around the
         findings, giving us an expert voice in
         announcing survey results by way of press
         release.
     – Survey results are then developed into an
         analyst report/white paper.
     – white paper used to send to selected
         audience in Trend Micro database, and lead
         generation campaign run by CNET Direct
     – white paper shared with channel partners.
•   The benefit of the above strategy is, it delivers
    multi-platform visibility presenting Trend Micro on
    numerous levels as security solutions thought
    leader within our key market.




                                                  Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   4
Exec Security Conference
• This event will offer a unique format for leading
  security specialists and business leaders to
  exchange ideas, gain valuable knowledge, and
  share their real-world risk management
  experiences.
• Attendees will hear from industry experts and learn
  how others are using the latest technologies to
  thwart multi-pronged attacks, achieve compliance,
  and reduce risk. Learn how your organization can
  balance the business need to embrace Web 2.0,
  virtualization, cloud computing, and personal and
  mobile devices while protecting your critical assets
  and sensitive data.
• Featuring keynote presentation from Eva Chen,
  Global CEO of Trend Micro and Chris Morris
  Cloud Computing Research APAC Director from
  IDC, attendees will gain insights into the state of
  global security, explore the latest technology trends
  and learn strategies for protecting data assets and
  reducing risk, plus an update on security in the
  cloud and virtualised environments, network and
  content security and the game changing Threat
  Intelligence.

                                       Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   5
Executive Security Conference
• Trend Micro Enterprise Security Conference
• Event Date 22nd February 2011
• Audience attendees: Trend Micro Enterprise customers/prospects – CSO, IT
  Directors and Managers, Privacy Officers, Risk and Compliance Departments, IT
  Network and System Departments
• Keynote Presentation from Eva Chen CEO, APAC Research Director Cloud
  Computing Chris Morris from IDC and Graeme Phillipson Connections Research
• Theme: Securing the Cloud
• Event will include sit-down lunch and Afternoon Networking Opportunity
• The event will be held at the Sun Room, IVY Complex in Sydney
• The event starts at 12.00pm and we will be ready to go LIVE by 12.30pm
• The event runs for 4 hours, there will be an MC, 5 speakers and an Expert Panel &
  Q&A at the end.
• For Speaker BIOs and more information EVENT MICRO-SITE & REGISTATION:
  http://www.onlinerego.com/TrendMicro/2011/customer/microsite/


                                Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   6
Security Conference
•    Trend Micro Security Conference | 22 February,
    2011
• Target audience: 80 attendees consisting of Trend
  Micro Enterprise customers and prospects
• Keynote Presentation from Eva Chen CEO,
  Research Director Cloud Computing Chris Morris
  from IDC.
• Event will include lunch and Afternoon Networking
  Opportunity
• The event will be held at the Sun Room, IVY
  Complex in Sydney from 12.00-5.30pm
• Event Invitation:
  http://www.onlinerego.com/TrendMicro/2011/custom
  er/edm/esc_2011_invite.html
• Event Website & Registration:
  http://www.onlinerego.com/TrendMicro/2011/custom
    er/microsite/




                                     Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   7
Webcast Inviter
•   ZDNET Trend Micro LIVE Stream of
    Cloud Security Event
•   Online Event
    Details: http://www.zdnet.com.au/cloud-
    security-conference-watch-339309141.htm
•   Copy of ad:
    http://www.zdnet.com.au/manual/ads/paid/tr
    end_micro/trend-micro-mpu.swf
•   Pre-Event awareness: The Trend Micro
    Conference was the top story on the Tech
    Lines page today
    http://www.zdnet.com.au/topic/techlines/
    Goal is to host the largest Virtual Cloud
    Security Event in ANZ with an interactive
    audience participation
•   During the conference, we will also be
    displaying a Twitter feed of comments
    containing the hashtag #tmcloudsec.
•   The Keyword targeting will come into effect
    as of 22nd Feb to direct people to the On
    Demand Webcasts.
•   We will also have a post event campaign in
    effective



                                             Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   8
Thank you /Fulfilment
http://www.onlinerego.com/TrendMicro/2011/
customer/followup/




                   http://ishare.trendmicro.com/globalmar
                   keting/APACMarketing/Campaign%20M
                   kt/Forms/AllItems.aspx?RootFolder=%2
                   fglobalmarketing%2fAPACMarketing%2
                   fCampaign%20Mkt%2fANZ%20CLOUD
                   %20COMPUTING%20SECURTY%20SU
                   MMITS%20Feb%202011&FolderCTID=&
                   View=%7b0B615E04%2d00EE%2d4E7F
                   %2d945F%2d26F9B74E7D06%7d




                                       Classification 3/17/2011   Copyright 2011 Trend Micro Inc.   9
ZDNET Live Streaming of
Conference Speakers                                                                             Comprehensive Content
                                                                                                – White papers, Trend
                                                                                                Micro Facebook and
                                                                                                Tritter Streaming




http://www.zdnet.com.au/cloud-security-conference-
watch-339309141.htm




                                Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 10
Ongoing ZDNET
On Demand, Editorial
and Spin Offs




http://www.zdnet.com.au/security-q-a-
trend-micro-boss-eva-chen-
339310322.htm


                           http://www.zdnet.
                           com.au/cloud-
                           security-
                           conference-
                           watch-
                           339309141.htm

                                 Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 11
Executive Dinner
•    Rego page:
•   http://www.onlinerego.com/TrendMicr
    o/2011/tetsuyas/
•   Download Excel of signups:
•   http://www.onlinerego.com/TrendMicr
    o/2011/tetsuyas/assets/db/download.
    php?pass=trend2011
•    Thank you page (the same content is
    in the thank you email)
•   http://www.onlinerego.com/TrendMicr
    o/2011/tetsuyas/?r=thankyou
•   EDM:
•   http://www.onlinerego.com/TrendMicr
    o/2011/tetsuyas/edm/




                                           Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 12
CNET Market Research
CTA Campaign




               Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 13
2011 Q1 AO Channel Engagement Flow
                                                                                      Channel Enablement
Market Research
                                                                                      LEADS


                                                                                   On-demand Content

Affinity Summit




Affinity
Summit SB




                                                                                  Security Roadshow


                  Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 14
Affinity Partner Summit




                    Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 15
ANZ Affinity Summit 2011


• Partner Conference Objectives & Details:
• 5 key partner objectives:
  1. To inform partners of the Trend Micro Strategy and Direction 2. How Trend Micro is making
  partners profitable in 2011 and beyond 3. Share the process on how Trend Micro is making it
  easier to partner with 4. Demonstrate the latest innovation and how they address customers
  business issues/ drivers 5. Provide an interactive Workshop sessions – gaining reseller
  feedback.
• Target audience: 90 attendees consisting of; 45 Enterprise value channel partners
  (AffinityONE & PLUS) + 20 Small Business (AffinityPLUS) partners + 10 Disti’s + 15
  TM/Presenters
• Keynote Presentation from Eva Chen CEO around the topic of ‘Security that Fits’. Agenda
  preview is attached.
• Afternoon Networking Opportunity –Racing 8 Yachts on Sydney Harbour – what a great
  opportunity for Trend Micro to bond with our resellers.
• Dinner Networking Opportunity – held at Aqua restaurant near Luna Park – stunning view
  looking over Sydney Harbour


                                    Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 16
Affinity Partner Summit Agenda




                Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 17
Post Event




http://onlinerego.com/trendmicro/2011/
affinitysummit/partner/microsite/follow
up/
                                                   Copyright 2011 Trend Micro Inc. 18

                                Classification 3/17/2011
Affinity Summit for
  Small Business
• Objective
  – Share SB segment plans and SB
    product roadmap
  – Focus Group lunch for reseller
    feedback




                       Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 19
Security Roadshow for Channels




                                                                          Melbourne       Brisbane         Sydney       Adelaide          Perth


                                                    Date                 Tues, 5th of   Thurs, 7th of   Fri, 8th of   Tues, 12th of   Thurs, 14th
                                                                         April 2011     April 2011      April 2011    April 2011      of April 2011

                                                    Venue                The Sebel &    The Sebel &     L’aqua        InterContinen   Duxton Perth
                                                                         Citigate       Citigate King   Cockle Bay    tal Adelaide
                                                                         Albert Park    George          Wharf
                                                                                        Square




                 Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 20
Post
  Conference
  Adverts

• Insert for following
  publications
  – ARN Cloud Computing
    Supplement
  – Vmware Partner Exchange
    Catalogue
  – AUSCert Conference Event
    Catalogue
  – Security Computing
    Supplement


                         Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 21
Press Examples




                 Classification 3/17/2011   Copyright 2011 Trend Micro Inc. 22

Mais conteúdo relacionado

Mais procurados

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
 
What is an information professional?
What is an information professional?What is an information professional?
What is an information professional?John Mancini
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Security and Governance Strategies for the Consumerization of IT
Security and Governance Strategies for the Consumerization of ITSecurity and Governance Strategies for the Consumerization of IT
Security and Governance Strategies for the Consumerization of ITMicrosoft
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 

Mais procurados (18)

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
 
What is an information professional?
What is an information professional?What is an information professional?
What is an information professional?
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Security and Governance Strategies for the Consumerization of IT
Security and Governance Strategies for the Consumerization of ITSecurity and Governance Strategies for the Consumerization of IT
Security and Governance Strategies for the Consumerization of IT
 
Portals_McCann
Portals_McCannPortals_McCann
Portals_McCann
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 

Destaque

ANZ Adviser Conference Melbourne - GAP Analysis
ANZ Adviser Conference Melbourne - GAP AnalysisANZ Adviser Conference Melbourne - GAP Analysis
ANZ Adviser Conference Melbourne - GAP AnalysisWarrick Pleash
 
ANZStateofMarketingTechnology2016
ANZStateofMarketingTechnology2016ANZStateofMarketingTechnology2016
ANZStateofMarketingTechnology2016Caroline Maillols
 
Using analytics data for real-time personalization and crm profiling
Using analytics data for real-time personalization and crm profilingUsing analytics data for real-time personalization and crm profiling
Using analytics data for real-time personalization and crm profilingmore onion
 
Advanced Remarketing in Google Analytics Using CRM Data
Advanced Remarketing in Google Analytics Using CRM DataAdvanced Remarketing in Google Analytics Using CRM Data
Advanced Remarketing in Google Analytics Using CRM Datametricmogul
 
Anz powerpoint.key
Anz powerpoint.keyAnz powerpoint.key
Anz powerpoint.keyAbramston
 
Getting buy-in for your intranet project
Getting buy-in for your intranet projectGetting buy-in for your intranet project
Getting buy-in for your intranet projectTamsin Stanford
 

Destaque (7)

ANZ Adviser Conference Melbourne - GAP Analysis
ANZ Adviser Conference Melbourne - GAP AnalysisANZ Adviser Conference Melbourne - GAP Analysis
ANZ Adviser Conference Melbourne - GAP Analysis
 
ANZStateofMarketingTechnology2016
ANZStateofMarketingTechnology2016ANZStateofMarketingTechnology2016
ANZStateofMarketingTechnology2016
 
Using analytics data for real-time personalization and crm profiling
Using analytics data for real-time personalization and crm profilingUsing analytics data for real-time personalization and crm profiling
Using analytics data for real-time personalization and crm profiling
 
Data Flux
Data FluxData Flux
Data Flux
 
Advanced Remarketing in Google Analytics Using CRM Data
Advanced Remarketing in Google Analytics Using CRM DataAdvanced Remarketing in Google Analytics Using CRM Data
Advanced Remarketing in Google Analytics Using CRM Data
 
Anz powerpoint.key
Anz powerpoint.keyAnz powerpoint.key
Anz powerpoint.key
 
Getting buy-in for your intranet project
Getting buy-in for your intranet projectGetting buy-in for your intranet project
Getting buy-in for your intranet project
 

Semelhante a Anz Cloud Thought Leadership 16 Mar

Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesJohn Mancini
 
Driving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital ArchitectureDriving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital ArchitectureSanjeewaRavi
 
Box for NetSuite - Memjet Use Cases
Box for NetSuite - Memjet Use CasesBox for NetSuite - Memjet Use Cases
Box for NetSuite - Memjet Use Casesbdirking
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information GovernanceJohn Newton
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
20111206 AIIM Cornhusker Social Media Governance
20111206 AIIM Cornhusker Social Media Governance20111206 AIIM Cornhusker Social Media Governance
20111206 AIIM Cornhusker Social Media GovernanceJesse Wilkins
 
ING Cloud Case Study
ING Cloud Case StudyING Cloud Case Study
ING Cloud Case Studymhalcrow
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Tekriti software - Company Presentation & Portfolio
Tekriti software - Company Presentation & PortfolioTekriti software - Company Presentation & Portfolio
Tekriti software - Company Presentation & PortfolioMahesh Kumar Bukka
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?John Mancini
 
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...Data Con LA
 
Information Management on Mobile Steroids
Information Management on Mobile SteroidsInformation Management on Mobile Steroids
Information Management on Mobile SteroidsJohn Mancini
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology SummitCarahsoft
 
Successful Technology Implementations Transcript
Successful Technology Implementations TranscriptSuccessful Technology Implementations Transcript
Successful Technology Implementations TranscriptTom Floyd
 
Cloud Data Center World2010 Eng 0217
Cloud Data Center World2010 Eng 0217Cloud Data Center World2010 Eng 0217
Cloud Data Center World2010 Eng 0217Amy Kim
 
The Virtualization of Clouds - The New Enterprise Data Architecture Opportunity
The Virtualization of Clouds - The New Enterprise Data Architecture OpportunityThe Virtualization of Clouds - The New Enterprise Data Architecture Opportunity
The Virtualization of Clouds - The New Enterprise Data Architecture OpportunityDenodo
 
Digital Transformation with 2 Speed IT & Agile Scrum
Digital Transformation with 2 Speed IT & Agile ScrumDigital Transformation with 2 Speed IT & Agile Scrum
Digital Transformation with 2 Speed IT & Agile Scrumtoamitkumar
 
Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...John Mancini
 

Semelhante a Anz Cloud Thought Leadership 16 Mar (20)

Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologies
 
Driving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital ArchitectureDriving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital Architecture
 
Box for NetSuite - Memjet Use Cases
Box for NetSuite - Memjet Use CasesBox for NetSuite - Memjet Use Cases
Box for NetSuite - Memjet Use Cases
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
20111206 AIIM Cornhusker Social Media Governance
20111206 AIIM Cornhusker Social Media Governance20111206 AIIM Cornhusker Social Media Governance
20111206 AIIM Cornhusker Social Media Governance
 
P1a spa dec.16.10
P1a spa   dec.16.10P1a spa   dec.16.10
P1a spa dec.16.10
 
ING Cloud Case Study
ING Cloud Case StudyING Cloud Case Study
ING Cloud Case Study
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Tekriti software - Company Presentation & Portfolio
Tekriti software - Company Presentation & PortfolioTekriti software - Company Presentation & Portfolio
Tekriti software - Company Presentation & Portfolio
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
 
Information Management on Mobile Steroids
Information Management on Mobile SteroidsInformation Management on Mobile Steroids
Information Management on Mobile Steroids
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Successful Technology Implementations Transcript
Successful Technology Implementations TranscriptSuccessful Technology Implementations Transcript
Successful Technology Implementations Transcript
 
Cloud Data Center World2010 Eng 0217
Cloud Data Center World2010 Eng 0217Cloud Data Center World2010 Eng 0217
Cloud Data Center World2010 Eng 0217
 
The Virtualization of Clouds - The New Enterprise Data Architecture Opportunity
The Virtualization of Clouds - The New Enterprise Data Architecture OpportunityThe Virtualization of Clouds - The New Enterprise Data Architecture Opportunity
The Virtualization of Clouds - The New Enterprise Data Architecture Opportunity
 
Digital Transformation with 2 Speed IT & Agile Scrum
Digital Transformation with 2 Speed IT & Agile ScrumDigital Transformation with 2 Speed IT & Agile Scrum
Digital Transformation with 2 Speed IT & Agile Scrum
 
Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...
 

Anz Cloud Thought Leadership 16 Mar

  • 1. “Securing Your Journey to the Cloud” Thought Leadership Q1 2011 ANZ Marketing Team Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 1
  • 2. 2010 A/NZ Focus – Linking Events setting scene for Cloud Security Positioning ANZ VSS Series & US VM World Joint Channel Enablement of Channels PR Product Releases ANZ VForum Bylined Articles on Cloud Security Issues Gartner IT Brief Harish Agastya Case Studies visiting TM Execs Informal round table Media briefings Cloud Security Exec Briefing Steve Quane visiting TM Execs Formal Luncheon, Media Roundtable Go to View > Header and Footer... and change to Copyright 2011 Trend Micro Inc. 2 slideshow title
  • 3. 2011 Q1 End User Engagement Flow Lead Generation Campaign LEADS Market Research Topic in Conference Executive Conference Press Engagement Presentations on demand Live Streaming /On Demand Viewing End of March Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 3
  • 4. Market Research Project • The key objective for the research survey is to better understand the requirements of the market Trend Micro wants to penetrate with an in-depth survey that drills down into pain points/issues, objectives and technology solutions being considered by our key market – The Research began as an independent Email Survey with an incentive to drive response i.e. http://www.cnetdirectintl.com/au/2010/trend_ micro/security_survey/register.htm? – We can then build PR activity around the findings, giving us an expert voice in announcing survey results by way of press release. – Survey results are then developed into an analyst report/white paper. – white paper used to send to selected audience in Trend Micro database, and lead generation campaign run by CNET Direct – white paper shared with channel partners. • The benefit of the above strategy is, it delivers multi-platform visibility presenting Trend Micro on numerous levels as security solutions thought leader within our key market. Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 4
  • 5. Exec Security Conference • This event will offer a unique format for leading security specialists and business leaders to exchange ideas, gain valuable knowledge, and share their real-world risk management experiences. • Attendees will hear from industry experts and learn how others are using the latest technologies to thwart multi-pronged attacks, achieve compliance, and reduce risk. Learn how your organization can balance the business need to embrace Web 2.0, virtualization, cloud computing, and personal and mobile devices while protecting your critical assets and sensitive data. • Featuring keynote presentation from Eva Chen, Global CEO of Trend Micro and Chris Morris Cloud Computing Research APAC Director from IDC, attendees will gain insights into the state of global security, explore the latest technology trends and learn strategies for protecting data assets and reducing risk, plus an update on security in the cloud and virtualised environments, network and content security and the game changing Threat Intelligence. Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 5
  • 6. Executive Security Conference • Trend Micro Enterprise Security Conference • Event Date 22nd February 2011 • Audience attendees: Trend Micro Enterprise customers/prospects – CSO, IT Directors and Managers, Privacy Officers, Risk and Compliance Departments, IT Network and System Departments • Keynote Presentation from Eva Chen CEO, APAC Research Director Cloud Computing Chris Morris from IDC and Graeme Phillipson Connections Research • Theme: Securing the Cloud • Event will include sit-down lunch and Afternoon Networking Opportunity • The event will be held at the Sun Room, IVY Complex in Sydney • The event starts at 12.00pm and we will be ready to go LIVE by 12.30pm • The event runs for 4 hours, there will be an MC, 5 speakers and an Expert Panel & Q&A at the end. • For Speaker BIOs and more information EVENT MICRO-SITE & REGISTATION: http://www.onlinerego.com/TrendMicro/2011/customer/microsite/ Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 6
  • 7. Security Conference • Trend Micro Security Conference | 22 February, 2011 • Target audience: 80 attendees consisting of Trend Micro Enterprise customers and prospects • Keynote Presentation from Eva Chen CEO, Research Director Cloud Computing Chris Morris from IDC. • Event will include lunch and Afternoon Networking Opportunity • The event will be held at the Sun Room, IVY Complex in Sydney from 12.00-5.30pm • Event Invitation: http://www.onlinerego.com/TrendMicro/2011/custom er/edm/esc_2011_invite.html • Event Website & Registration: http://www.onlinerego.com/TrendMicro/2011/custom er/microsite/ Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 7
  • 8. Webcast Inviter • ZDNET Trend Micro LIVE Stream of Cloud Security Event • Online Event Details: http://www.zdnet.com.au/cloud- security-conference-watch-339309141.htm • Copy of ad: http://www.zdnet.com.au/manual/ads/paid/tr end_micro/trend-micro-mpu.swf • Pre-Event awareness: The Trend Micro Conference was the top story on the Tech Lines page today http://www.zdnet.com.au/topic/techlines/ Goal is to host the largest Virtual Cloud Security Event in ANZ with an interactive audience participation • During the conference, we will also be displaying a Twitter feed of comments containing the hashtag #tmcloudsec. • The Keyword targeting will come into effect as of 22nd Feb to direct people to the On Demand Webcasts. • We will also have a post event campaign in effective Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 8
  • 9. Thank you /Fulfilment http://www.onlinerego.com/TrendMicro/2011/ customer/followup/ http://ishare.trendmicro.com/globalmar keting/APACMarketing/Campaign%20M kt/Forms/AllItems.aspx?RootFolder=%2 fglobalmarketing%2fAPACMarketing%2 fCampaign%20Mkt%2fANZ%20CLOUD %20COMPUTING%20SECURTY%20SU MMITS%20Feb%202011&FolderCTID=& View=%7b0B615E04%2d00EE%2d4E7F %2d945F%2d26F9B74E7D06%7d Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 9
  • 10. ZDNET Live Streaming of Conference Speakers Comprehensive Content – White papers, Trend Micro Facebook and Tritter Streaming http://www.zdnet.com.au/cloud-security-conference- watch-339309141.htm Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 10
  • 11. Ongoing ZDNET On Demand, Editorial and Spin Offs http://www.zdnet.com.au/security-q-a- trend-micro-boss-eva-chen- 339310322.htm http://www.zdnet. com.au/cloud- security- conference- watch- 339309141.htm Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 11
  • 12. Executive Dinner • Rego page: • http://www.onlinerego.com/TrendMicr o/2011/tetsuyas/ • Download Excel of signups: • http://www.onlinerego.com/TrendMicr o/2011/tetsuyas/assets/db/download. php?pass=trend2011 • Thank you page (the same content is in the thank you email) • http://www.onlinerego.com/TrendMicr o/2011/tetsuyas/?r=thankyou • EDM: • http://www.onlinerego.com/TrendMicr o/2011/tetsuyas/edm/ Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 12
  • 13. CNET Market Research CTA Campaign Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 13
  • 14. 2011 Q1 AO Channel Engagement Flow Channel Enablement Market Research LEADS On-demand Content Affinity Summit Affinity Summit SB Security Roadshow Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 14
  • 15. Affinity Partner Summit Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 15
  • 16. ANZ Affinity Summit 2011 • Partner Conference Objectives & Details: • 5 key partner objectives: 1. To inform partners of the Trend Micro Strategy and Direction 2. How Trend Micro is making partners profitable in 2011 and beyond 3. Share the process on how Trend Micro is making it easier to partner with 4. Demonstrate the latest innovation and how they address customers business issues/ drivers 5. Provide an interactive Workshop sessions – gaining reseller feedback. • Target audience: 90 attendees consisting of; 45 Enterprise value channel partners (AffinityONE & PLUS) + 20 Small Business (AffinityPLUS) partners + 10 Disti’s + 15 TM/Presenters • Keynote Presentation from Eva Chen CEO around the topic of ‘Security that Fits’. Agenda preview is attached. • Afternoon Networking Opportunity –Racing 8 Yachts on Sydney Harbour – what a great opportunity for Trend Micro to bond with our resellers. • Dinner Networking Opportunity – held at Aqua restaurant near Luna Park – stunning view looking over Sydney Harbour Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 16
  • 17. Affinity Partner Summit Agenda Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 17
  • 18. Post Event http://onlinerego.com/trendmicro/2011/ affinitysummit/partner/microsite/follow up/ Copyright 2011 Trend Micro Inc. 18 Classification 3/17/2011
  • 19. Affinity Summit for Small Business • Objective – Share SB segment plans and SB product roadmap – Focus Group lunch for reseller feedback Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 19
  • 20. Security Roadshow for Channels Melbourne Brisbane Sydney Adelaide Perth Date Tues, 5th of Thurs, 7th of Fri, 8th of Tues, 12th of Thurs, 14th April 2011 April 2011 April 2011 April 2011 of April 2011 Venue The Sebel & The Sebel & L’aqua InterContinen Duxton Perth Citigate Citigate King Cockle Bay tal Adelaide Albert Park George Wharf Square Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 20
  • 21. Post Conference Adverts • Insert for following publications – ARN Cloud Computing Supplement – Vmware Partner Exchange Catalogue – AUSCert Conference Event Catalogue – Security Computing Supplement Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 21
  • 22. Press Examples Classification 3/17/2011 Copyright 2011 Trend Micro Inc. 22