{"id":1410,"date":"2021-06-08T21:20:00","date_gmt":"2021-06-08T21:20:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/agents-security-solutions\/"},"modified":"2023-05-17T00:33:24","modified_gmt":"2023-05-17T00:33:24","slug":"agents-security-solutions","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/","title":{"rendered":"Tips for agents to sell security solutions"},"content":{"rendered":"<p>Learn how to stack and sell SaaS security solutions.<\/p>\n<p>When it comes to the threat of cyberattacks on a business, it\u2019s no longer &#8220;if&#8221; but &#8220;when.&#8221; In fact, <a href=\"https:\/\/techjury.net\/blog\/how-many-cyber-attacks-per-day\/#gref\" target=\"_blank\" rel=\"noopener\">64%<\/a> of companies worldwide experienced at least one attack in the past year and the costs are adding up \u2013 cybercrime is predicted to cause <a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noopener\">$6 trillion USD<\/a>\u00a0in damages globally in 2021.<\/p>\n<p>As the threats continue to grow, cybersecurity has become an essential cost of doing business, and the tech industry is racing to keep up. Spending on cybersecurity products and services is projected to exceed\u00a0<a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noopener\">$1 trillion USD<\/a>\u00a0by the end of 2021.<\/p>\n<p>This creates a massive opportunity for agents to enlarge their role as a trusted tech advisor and help clients identify and deploy the right SaaS security solutions to defend themselves. So, what\u2019s the right approach?<\/p>\n<h2>The Layered Security Stack<\/h2>\n<p>No single cybersecurity solution can protect everything. That\u2019s why layering solutions to provide full coverage across a range of attack vectors is an industry-recommended approach. However, with hundreds of security solutions out there, it can be overwhelming to know where to start.<\/p>\n<p>Agents should standardize on a foundational security stack with leading SaaS solutions that provide a solid base of protection for clients. A security stack that the Pax8 team has found to be successful for agents includes:<\/p>\n<h3>Endpoint security<\/h3>\n<p><strong>70% of breaches<\/strong><strong> originate at the endpoint, but 42% of all endpoints are unprotected at any given time!<\/strong><\/p>\n<p>The number of endpoints within organizations has exploded \u2013 from servers and desktops, to laptops, smartphones, and tablets. Each one is a potential vulnerability that can be exploited to give incoming malware access to the corporate network.<\/p>\n<p>Simply installing antivirus software is no longer enough. Instead, modern Endpoint Detection and Response (EDR) solutions such as <a href=\"https:\/\/www.pax8.com\/vendors\/sentinelone\/\" target=\"_blank\" rel=\"noopener\">SentinelOne<\/a> go beyond prevention to actively detect threats across endpoints.<\/p>\n<h3>Email security<\/h3>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3153707\/top-cybersecurity-facts-figures-and-statistics.html\" target=\"_blank\" rel=\"noopener\"><strong>94% of malware<\/strong><\/a><strong> is delivered via email.<\/strong><\/p>\n<p>Email is the #1 vulnerability for phishing, ransomware, spam, and malware. However, the native security features of email solutions such as Office 365 don\u2019t provide enough built-in protection to defend your clients\u2019 inboxes.<\/p>\n<p>To defend against today\u2019s advanced threats, you should leverage an advanced email security solution such as <a href=\"https:\/\/www.pax8.com\/vendors\/proofpoint\/\" target=\"_blank\" rel=\"noopener\">Proofpoint<\/a> that can provide email encryption, attachment defense, outbound filtering, virus protection, email archiving, advanced reporting, and more.<\/p>\n<h3>Anti-phishing security and end user training<\/h3>\n<p><a href=\"https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/\" target=\"_blank\" rel=\"noopener\"><strong>95% of cybersecurity breaches<\/strong><\/a><strong> are due to human error.<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>An organization\u2019s security defense is only as strong as their weakest link \u2013 in most cases, an end user. And with today\u2019s sophisticated phishing emails and spoofed URLs, even a savvy user might accidentally open a malicious attachment.<\/p>\n<p>Anti-phishing solutions such as <a href=\"https:\/\/www.pax8.com\/vendors\/ironscales\/\" target=\"_blank\" rel=\"noopener\">IRONSCALES<\/a> combine powerful anti-phishing features \u2014 such as URL and attachment scanning \u2014 with phishing simulation training. This helps users identify and report suspected phishing attempts, while also preventing most phishing attempts from ever reaching their inbox.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2>Sales Advice<\/h2>\n<p>Once you\u2019ve standardized on a security stack offering, what\u2019s the best way to position it to clients? Below are four tips from our solution consultants.<\/p>\n<h3>Sales tip #1: Be proactive.<\/h3>\n<p>Unfortunately, most cybersecurity conversations tend to happen after a breach or cyberattack has occurred \u2014 when tensions and emotions are high, and the damage has already been done.<\/p>\n<p>Instead, agents should proactively bring up security to clients to make them aware of gaps in their defense before any vulnerabilities can be exploited. Not only does this lend itself to a more measured discussion, it also solidifies your role as their trusted tech advisor.<\/p>\n<h3>Sales tip #2: Ask questions.<\/h3>\n<p>Many clients might think they already &#8220;have it covered&#8221; when it comes to their security posture. They might assume that anti-virus software is all they need to protect their email or that the built-in security features of their Microsoft solutions are enough to keep their employees safe.<\/p>\n<p>Open-ended questions are the best way to get your clients to think critically about the protections and processes they have in place and identify gaps. Ask them things like:<\/p>\n<p>&#8211; When a phishing email lands in a user\u2019s inbox, what\u2019s your remediation process?<\/p>\n<p>&#8211; How do you identify users affected by a phishing attack?<\/p>\n<p>&#8211; How are you currently protecting your endpoints?<\/p>\n<p>&#8211; What\u2019s the internal process around handling security breaches?<\/p>\n<p>&#8211; What ransomware or threats are your users getting hit by that your antivirus isn\u2019t stopping?<\/p>\n<h3>Sales tip #3: Show empathy.<\/h3>\n<p>IT decision makers often feel a lot of pressure when it comes to cybersecurity. There\u2019s a lot at stake! A single click by an end user on a malicious email can unleash a ransomware attack that shuts down the entire organization and costs the business thousands (or even hundreds of thousands) of dollars in recovery costs, lost productivity, and lost revenue.<\/p>\n<p>Approach this conversation with tact. You never want to make someone feel like they are failing or unprepared. Instead, present your pitch as recommendations to complement and strengthen their existing cybersecurity approach.<\/p>\n<h3>Sales tip #4: Be armed with stats, stories, and case studies.<\/h3>\n<p>There\u2019s a fine balance to be had when it comes to selling security. While you should never lean into scare tactics and hyperbole, providing real-world examples and statistics about the risks and potential damage of cyber threats can be eye-opening for clients.<\/p>\n<h2>Let Us Do the Heavy Lifting<\/h2>\n<p>You don\u2019t have to sell SaaS security solutions alone. We offer in-demand security products to agents as a co-managed solution that provides the ease of ordering, provisioning, billing, and support through Pax8. We bring our partner experience directly to your clients\u2019 internal IT teams with 24\/7 US and UK-based support, a self-service platform, automated provisioning, and consolidated billing, while you collect commission.<\/p>\n<p>Want to learn more about our co-managed security offerings for agents?<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8nebula.com\/m\/2ae4535e0ae44d35\/original\/Agent_Playbook_Jan2021_Updated.pdf\" target=\"_blank\" rel=\"noopener\">Get the playbook<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to stack and sell SaaS security solutions. When it comes to the threat of cyberattacks on a business, it\u2019s no longer &#8220;if&#8221; but &#8220;when.&#8221; In fact, 64% of companies worldwide experienced at least one attack in the past year and the costs are adding up \u2013 cybercrime is predicted to cause $6 trillion [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":201,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5,9],"tags":[30],"class_list":["post-1410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-telco-agents","tag-agents"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tips for agents to sell security solutions - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Learn how agents can create a layered, co-managed SaaS security stack and position it to your clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips for agents to sell security solutions - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how agents can create a layered, co-managed SaaS security stack and position it to your clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-08T21:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T00:33:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Agents-selling-security-solutions.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Tips for agents to sell security solutions\",\"datePublished\":\"2021-06-08T21:20:00+00:00\",\"dateModified\":\"2023-05-17T00:33:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/\"},\"wordCount\":956,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Agents-selling-security-solutions.jpeg\",\"keywords\":[\"agents\"],\"articleSection\":[\"Security\",\"Telco agents\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/\",\"name\":\"Tips for agents to sell security solutions - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Agents-selling-security-solutions.jpeg\",\"datePublished\":\"2021-06-08T21:20:00+00:00\",\"dateModified\":\"2023-05-17T00:33:24+00:00\",\"description\":\"Learn how agents can create a layered, co-managed SaaS security stack and position it to your clients.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Agents-selling-security-solutions.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Agents-selling-security-solutions.jpeg\",\"width\":2000,\"height\":1333,\"caption\":\"Agents selling SaaS security solutions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/agents-security-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips for agents to sell security solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips for agents to sell security solutions - Pax8 Blog","description":"Learn how agents can create a layered, co-managed SaaS security stack and position it to your clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Tips for agents to sell security solutions - Pax8 Blog","og_description":"Learn how agents can create a layered, co-managed SaaS security stack and position it to your clients.","og_url":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/","og_site_name":"Pax8 Blog","article_published_time":"2021-06-08T21:20:00+00:00","article_modified_time":"2023-05-17T00:33:24+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Agents-selling-security-solutions.jpeg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Tips for agents to sell security solutions","datePublished":"2021-06-08T21:20:00+00:00","dateModified":"2023-05-17T00:33:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/"},"wordCount":956,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Agents-selling-security-solutions.jpeg","keywords":["agents"],"articleSection":["Security","Telco agents"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/","url":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/","name":"Tips for agents to sell security solutions - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Agents-selling-security-solutions.jpeg","datePublished":"2021-06-08T21:20:00+00:00","dateModified":"2023-05-17T00:33:24+00:00","description":"Learn how agents can create a layered, co-managed SaaS security stack and position it to your clients.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/agents-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Agents-selling-security-solutions.jpeg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Agents-selling-security-solutions.jpeg","width":2000,"height":1333,"caption":"Agents selling SaaS security solutions"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/agents-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tips for agents to sell security solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1410"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1410\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/201"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}