Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Dell Technologies Cyber Recovery Consulting Services

Partner sales card


At a Glance Kick off a Cyber Recovery opportunity
Increase your customer’s confidence in their ability with these questions:
to recover from a destructive cyber attack with the
Dell Technologies Cyber Recovery Solution and
Services. If you talk to the: Ask. . .

Cyber Recovery Advisory & Implementation CSO, CISO, 1. What are your responsibilities in recovering from a cyber attack?
services expand upon the technology foundation CFO, CRO 2. Are your cyber security practices aligned with NIST Cybersecurity
of the solution by tying the technology to Framework? If yes, What approaches are you taking to align with the Recover
processes and procedures which ensure that your function?
customer’s applications and data are protected 3. If we could show you how to improve recoverability in a cyber attack would
and ready for recovery. you sponsor a technology solution?
Virtually eliminate integration, logistics and
operational challenges for every customer by CIO, CTO 1. Has security or your board asked you how you would recover from a
working with our expert cyber recovery consultants VP in Technology destructive cyber event?
to determine every customer’s most critical needs, 2. Are you comfortable with your organizations ability to respond to a data
processes, and define their recovery runbook destruction event that impacted backups as well as production data?
which is a step-by-step guide for recovery.
3. If we were able to show you a method to protect critical data, would you
sponsor a meeting with security to get their support too?
Expand your portfolio with a proven solution
that scales to a deliver right-sized recovery Mid-level Tech or 1. How have cyber attacks affected your business, your team?
solutions for every business type and size Resiliency / Disaster 2. What do you think that your role is in the event of a destructive cyber event?
Recovery (DR)
3. Many protection schemes start with an additional layer of protection on
Resell and earn rebates, plus earn more with Manager or Director
backups, and utilize procedures similar to disaster recovery. How confident
the same customer as opportunities are are you in your current backups and DR processes?
uncovered throughout the work process

Dell Confidential – for partner’s internal use only


1 of 5 © Copyright 2020 Dell Inc.
How to position Cyber Recovery Consulting Services
Adding services ensures their ability to recover successfully from cyber attack
If your customer: For a Small or Medium-Sized Business, For a Commercial or Enterprise Business,
add/recommend: add/recommend

Cyber Recovery Advisory Service


Needs to define & plan their cyber recovery solution Cyber Recovery Advisory Service
Cyber Recovery Advanced Advisory Service

Needs help identifying business processes (applications,


Cyber Recovery Advisory Service Cyber Recovery Advanced Advisory Service
data…etc.) to protect and enable recovery.
Cyber Recovery Advanced Advisory Service
Needs to enable recovery of storage or mainframe-based
and/or contact your Services Account Executive
workloads, customized vault
(SAE) for more information.

Has purchased CyberSense Analytics CyberSense Deployment CyberSense Deployment

Please contact your Services Account Executive


Is a high-end customer
(SAE) for more information

Dell Confidential – for partner’s internal use only


2 of 5 © Copyright 2020 Dell Inc.
Cyber Recovery services roadmap
Advisory Services Implementation Services Custom Services

Advisory Cyber Recovery & CyberSense Deployment Process & Program


• Technical and Business • Protect Data with vault • Create a CR Program
workshops • Air-gap, Immutability, CR Vault Hardening • Cyber Incident Response Integration
• Solution Consensus • CyberSense deployment and configuration • CR Metrics
Why • Critical App & Data Identification • CR Governance Design
• Implementation readiness
Cyber Recovery • Skills enablement

Services? • Cross functional recovery testing

• Advisory Services
create consensus and Advanced Advisory Cyber Recovery Advanced Implementation Technology
speed design • Business Recovery Metrics • Protect and Recover Data • Multi site, mainframe and storage
• Cyber Vault Solution Design • Vault Architecture (Air-gap, Management, Alert..) based technology implementation
• Implementation
• Solution Cost Estimates • Cyber Recovery Runbooks • Recovery automation
focuses on technology
and processes • Application Dependencies
• Restore Testing and validation • Performance tuning
• Implementation & Operationalization • Manage/Monitor
Roadmap • Includes advisory service
• Custom Services • Advanced Vault Analytics or
• Business Case
based on specific Validation Processes
• Executive Presentation
customer requirements

Dell Confidential – for partner’s internal use only


4 of 5 © Copyright 2020 Dell Inc.
Partner fast find for Cyber Recovery Advisory
More resources
Bookmark these knowledge centers Consulting Service Resources
Business Resiliency Consulting customer pitch deck

Cyber Recovery Advisory and Advanced Advisory Related Services


Service Overview Partner training on PowerProtect and Cyber Recovery
Customer Deck: Cyber Recovery Services Building Business Resilience Against Destructive Cyber Attacks with PowerProtect Cyber
Recovery
Brochure: Take a Personalized Approach to the Human Side of Technology
PowerProtect Cyber Recovery with CyberSense
Cyber Recovery customer videos/webinars Cyber Recovery Channel Playbook
Cyber Recovery Solution video
Surviving a Cyber Attack
Enabling Recovery from Destructive Cyber Attacks in the Healthcare Industry
Survive a Cyber Attack with Security Transformation
Now More Than Ever, Business Resiliency is Key

White paper
“Three Keys to Increase Confidence in Recovering from a Cyber Attack.” Forrester report on
Cyber Recovery, October 2019

Service Briefs
Cyber Recovery Advisory (Service Brief)
Cyber Recovery Workshop (Service Brief)
Cyber Recovery Advisory & Roadmap (Service Brief)

Dell Confidential – for partner’s internal use only


5 of 5 © Copyright 2020 Dell Inc.

You might also like