{"id":5604,"date":"2019-09-10T22:53:59","date_gmt":"2019-09-10T21:53:59","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5604"},"modified":"2021-06-02T17:55:39","modified_gmt":"2021-06-02T16:55:39","slug":"role-security-sales-process","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process","title":{"rendered":"The Role of Security in the Sales Process"},"content":{"rendered":"<p>It is no secret anymore that the number one reason customers leave their current IT provider is due to a security issue. Therefore, as we are prospecting for new customers a good percentage of them will be looking for a more security conscious managed services provider (MSP). For this reason, our approach to selling IT services needs to be more security focused than ever.<\/p>\n<p>Here are some key tips on how to structure your sales approach to give it a security angle.<\/p>\n<h3><b>Scenario #1: Prospect has not had a bad security experience yet<\/b><\/h3>\n<p>In this scenario, getting the prospect to be aware of the threat is paramount. Statistics and stories that showcase similar businesses in peril do well to set the stage. The bottom line is that you need to make sure they understand the threat is real and how much it could cost them. At this point some of you are probably wanting to comment about the ethics of fear-based selling.\u00a0While I am not a proponent of fear as a selling tactic, there are legitimate risks that every small business must be aware of or it could quite easily cost them their livelihood.\u00a0Presented in a factual way, it becomes less about using fear as a tactic and more about providing a consultative approach.\u00a0Make sure you let them speak along the way so that you can hopefully pick up on their largest concerns.\u00a0Doing this allows you to address those items in detail in your presentation.<\/p>\n<h3><b>Scenario #2: The prospect has already had a bad security experience<\/b><\/h3>\n<p>This one is a bit easier because if they already understand the threat and the risk they do not need to be convinced. The key here is to listen first. Do not assume that you know what they have been through. By listening to their story, you will assuredly pick up which pain points were their biggest concerns so you can address them specifically when you begin your pitch.<\/p>\n<h3><b>The presentation: How to present a security-forward sales pitch<\/b><\/h3>\n<p>As usual, remember to present benefits rather than features. Only a handful of prospects will actually understand your features. When explained in the context of how they prevent the risks mentioned above, they can apply those features to their needs. You can frame a presentation around the three key ideas of prevention, remediation, and recovery.<\/p>\n<ul>\n<li><b>Prevention<\/b>\u00a0is all of the proactive services you put in place to prevent threats from breaking in. This includes user education, firewalls, web filtering,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-filtering\">email filtering<\/a>, and patch management to name a few.<\/li>\n<li><b>Remediation<\/b>\u00a0is what happens when something gets in.\u00a0Managed antivirus and endpoint detection and response (EDR) are the prime components of this more reactive component.<\/li>\n<li><b>Recovery\u00a0<\/b>is the final layer of security.\u00a0When all else fails, how are you going to restore a customer from a devastating breach, hardware failure, or catastrophic event such as fire or water damage.<\/li>\n<\/ul>\n<p>Presenting within this framework shows prospects what you are prepared to do\u2014not only to prevent a threat from affecting their business but also in the event that it does.\u00a0Most security experts agree that it is not a matter of if, but when a business will have some type of security breach. Because of this, it is extremely important that remediation and recovery be part of your security offering.<\/p>\n<h3><b>The close: Never forget to ask for the sale<\/b><\/h3>\n<p>Yes, I know it sounds cheesy, but so many of us have done a great presentation and then simply asked the prospect what they want to do. As an expert, it is up to you to tell them what they should do.\u00a0Once you finish with the presentation, ask a few probing questions, like:<\/p>\n<ul>\n<li>How much would it cost them to be down for a day? A week? A month?<\/li>\n<li>Do they have access to customer data like credit cards, health information, etc. that could be stolen and used against their customers? What do they think the liability is if they are breached?<\/li>\n<li>Are they a vendor with access to the systems of other businesses? What do they think the liability is if those businesses are breached by way of their business?<\/li>\n<li>What is their tolerance for risk?<\/li>\n<\/ul>\n<p>Once you have had a conversation around these, present your plan of action. Most likely you are not prepared on the spot to present them with a quote so you must determine the call to action appropriate for this point. If you have enough information to start preparing a quote, schedule the next meeting to present a quote. If you need to do some basic reconnaissance of their systems first, schedule that. Whatever you do, always ensure you have a concrete next action that will move the process forward.<\/p>\n<p>Security is no longer the luxury add-on as it was previously. The most likely threat to a business is no longer hardware failure, fire, or storm. The threat will most likely come from an outside actor, an internal employee, or vendor with access to their systems. It is for this reason that security must be a primary concern and is absolutely vital to business continuity. It is your job as IT service providers to educate the owners and decision makers of these threats and more importantly how you can mitigate those risks.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Eric Anthony is principal of customer experience at SolarWinds MSP. Before joining SolarWinds, Eric ran his own managed services provider business for over six years.<\/em><\/p>\n<p><em>You can follow Eric on Twitter\u00a0at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/ericanthonymsp%22%20%5Ct%20%22_blank\" target=\"_blank\" rel=\"noopener noreferrer\">@EricAnthonyMSP<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is no secret anymore that the number one reason customers leave their current IT provider is due to a security issue. Therefore, as we are prospecting for new customers&#8230;<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5604","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Role of Security in the Sales Process - N-able<\/title>\n<meta name=\"description\" content=\"With security such a critical issue for companies, it\u2019s crucial that MSPs include it as a key part of their sales process. Eric Anthony looks at how to present your security pitch.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Role of Security in the Sales Process - N-able\" \/>\n<meta property=\"og:description\" content=\"With security such a critical issue for companies, it\u2019s crucial that MSPs include it as a key part of their sales process. Eric Anthony looks at how to present your security pitch.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T21:53:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-02T16:55:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eric Anthony\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Anthony\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\"},\"author\":{\"name\":\"Eric Anthony\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/6eeaa8e423eae02193706ca1664d555a\"},\"headline\":\"The Role of Security in the Sales Process\",\"datePublished\":\"2019-09-10T22:53:59+01:00\",\"dateModified\":\"2021-06-02T16:55:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\"},\"wordCount\":923,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Business Growth\",\"Head Nerds\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\",\"name\":\"The Role of Security in the Sales Process - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2019-09-10T22:53:59+01:00\",\"dateModified\":\"2021-06-02T16:55:39+00:00\",\"description\":\"With security such a critical issue for companies, it\u2019s crucial that MSPs include it as a key part of their sales process. Eric Anthony looks at how to present your security pitch.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Business Growth\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/business-growth-pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Role of Security in the Sales Process\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/6eeaa8e423eae02193706ca1664d555a\",\"name\":\"Eric Anthony\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/bf3d960c9370ce26759f1392f239aa0c2484b76a5d03cbf9130f8d90ff185625?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf3d960c9370ce26759f1392f239aa0c2484b76a5d03cbf9130f8d90ff185625?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf3d960c9370ce26759f1392f239aa0c2484b76a5d03cbf9130f8d90ff185625?s=96&d=mm&r=g\",\"caption\":\"Eric Anthony\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Role of Security in the Sales Process - N-able","description":"With security such a critical issue for companies, it\u2019s crucial that MSPs include it as a key part of their sales process. Eric Anthony looks at how to present your security pitch.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process","og_locale":"pt_BR","og_type":"article","og_title":"The Role of Security in the Sales Process - N-able","og_description":"With security such a critical issue for companies, it\u2019s crucial that MSPs include it as a key part of their sales process. Eric Anthony looks at how to present your security pitch.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-09-10T21:53:59+00:00","article_modified_time":"2021-06-02T16:55:39+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Eric Anthony","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Eric Anthony","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process"},"author":{"name":"Eric Anthony","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/6eeaa8e423eae02193706ca1664d555a"},"headline":"The Role of Security in the Sales Process","datePublished":"2019-09-10T22:53:59+01:00","dateModified":"2021-06-02T16:55:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process"},"wordCount":923,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Business Growth","Head Nerds"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process","url":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process","name":"The Role of Security in the Sales Process - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2019-09-10T22:53:59+01:00","dateModified":"2021-06-02T16:55:39+00:00","description":"With security such a critical issue for companies, it\u2019s crucial that MSPs include it as a key part of their sales process. Eric Anthony looks at how to present your security pitch.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/role-security-sales-process#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Business Growth","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/business-growth-pt-br"},{"@type":"ListItem","position":2,"name":"The Role of Security in the Sales Process"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/6eeaa8e423eae02193706ca1664d555a","name":"Eric Anthony","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/bf3d960c9370ce26759f1392f239aa0c2484b76a5d03cbf9130f8d90ff185625?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bf3d960c9370ce26759f1392f239aa0c2484b76a5d03cbf9130f8d90ff185625?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf3d960c9370ce26759f1392f239aa0c2484b76a5d03cbf9130f8d90ff185625?s=96&d=mm&r=g","caption":"Eric Anthony"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5604"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5604\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}