ITSM work

ITSM work

Titles:
CIO, CISO
VP, Director
Infrastructure
Application Management
Enterprise Services
Enterprise Architect

Script:
Hi XXX, this is Justin calling with Unisys. How are you doing today?

I was referred over by (CIOs) office and I understand that you oversee the IT Security/Legacy Applications/Service Desk for your organization.
we are hoping to get some time on your calendar in the next couple of weeks to speak further about our Stealth Security Solutions and our approach utilizing micro-segmentation to secure data in motion – Stealth
Reduce cost of management (TCO)
Try to speak to someone who reports to them – this is potentially beneficial to their organization as it
If resistance:
This software is very new and innovative. I can give you a very brief description right now and sees if that sparks your interest (and then you can go report to whoever oversees IT Security).

Unisys Stealth Security Services
The main differentiator between Unisys’ Stealth Security Suite and firewall is that Stealth security suite utilizes micro-segmentation. With micro-segmentation, we secure data-in-motion across any public or private network with endpoint-to-endpoint encryption. AND we incorporate communities of interest (segment separate departments of a organization) so confidential information is only visible to those who with a true business need to access it. Whereas, once firewall is breached, the adversaries have access to company wide information and nothing is secure. Micro-segmentation can also be utilized for PCI audit scope reduction.

Service Desk
Hi XXX this is Justin calling with Unisys. I was referred over to you from (XXX) office and I understand that you oversee the Service Desk for your organization. I was hoping to get some time on your calendar in the next couple of weeks to discuss further about Unisys’ Service Management capabilities which incudes Service Desk as one of its main interactions.

Our service desk capabilities are...

Similar Essays