You are on page 1of 3

Company: Akamai

IDG E Brand: CIO


Campaign: Akamai Q1 US IDG Security Perimeter On Demand Webcast June 16300

Campaign end date: 13/09/2018


Asset: 1
Asset Type: WhitepaperAkamai
Total leads: 100

Campaign Criteria
Country US
Company Size 2,000+
Job Title IT Director, IT Vice President only
Function: Security/Networking
Industry
Tech: Communication Carriers (ISP, Telecomm, Data Comm, Cable)
Tech: Computer/Network Consultant
Tech: E-commerce/Internet
Tech: Manufacturing - Hardware/Software
Tech: Retailer/Distributor/Wholesaler (computer-related)
Tech: Service Provider (MSP, BSP, ASP, ESP, Web Hosting)
Tech: VAR/VAD/OEM
Tech: Other
Non-Tech: Advertising/Marketing/PR/Media (Publishing,
Broadcast, Online)
Non-Tech: Agriculture/Forestry/Fisheries
Non-Tech: Business Services/Consultant
Non-Tech: Construction/Architecture/Engineering
Non-Tech: Aerospace/Defense Contractor
Non-Tech: Education
Non-Tech: Finance/Banking/Accounting
Non-Tech: Government - Federal (including Military)
Non-Tech: Government - State/Local
Non-Tech: Healthcare/Medical/Pharmaceutical/Bio-Tech
Non-Tech: Insurance/Real Estate/Legal
Non-Tech: Manufacturing & Process Industries
Non-Tech: Mining/Oil/Gas
Non-Tech: Retailer/Wholesaler/Distributor (non-computer)
Non-Tech: Travel/Hospitality/Entertainment/Recreation
Non-Tech: Transportation/Utilities (Energy, Water, etc.)
Non-Tech: Venture Capital/Private Equity/M&A
Non-Tech: Venture Service Provider (Inv.
Banker/Legal/Accounting/Etc.)
Non-Tech: Other

• Company Size: 2,000+ (AKA 5,000+)


• Industry: EXCLUDE: government, education industries and Students, Interns, Consultants,
VARs, Systems Integrators and partners
• Competitors: Competitors and customers(supression list to be provided)
• Other: Dedupe back 90 days, Business Email Only, no more than 4-5 leads per company

Asset Overview
Asset Whitepaper
Type
Asset(s): Asset Name: Moving Beyond the Traditional Security Perimeter
Asset Description: The number one cause of corporate breaches is the failure to adapt to the
security needs of today’s cloud and mobile world. Continuing to embrace either the traditional hub
and spoke network architectures or the moat and castle security perimeter approach leaves enterprises
vulnerable to attack.
Adopting a zero-trust security model is key to combating cybercriminals who are probing security
perimeters and enterprise resources for vulnerabilities with a distinct purpose.

Telemarketing Script

Good afternoon Sir/Ma’am, [Name of Contact]. My name is … and I’m calling from ___ in Dublin, Ireland,
on behalf of __ how are you doing today?

Great to hear. [Name of Contact], my call today is in relation to a new and exclusive Whitepaper and it
deals with the topic of __Moving Beyond the Traditional Security Perimeter __ I would like to send this
over to you (confirm details).

Required Data: Email, First Name, Last Name, Company Name, Company Size, Street Address, City,
State, Country, Zip Code, Job Title, Industry, applicable custom questions – if noted below

Thank you [first name] for your time today. You are now officially registered for the exclusive
whitepaper. A representative from ___ will be in touch to answer any questions you may have, what
would be the best time for a representative to get in contact? (Mornings, afternoons any specific day).
On behalf of ___, ___ and myself thank you for taking my call.
Custom Required Qualifying Question:

You might also like