PROJECTLINE B2B CONTENT MARKETING

Projectline Yesler is a B2B digital agency. This first team project was a 3-page introduction piece for a new enterprise partnership that helps Cisco solutions resellers serve their customers.



Screen Shot 2019-08-19 at 2.36.57 PM.png
Screen Shot 2019-08-20 at 10.46.28 AM.png

 

 

Screen Shot 2019-08-20 at 10.42.27 AM.png
Screen Shot 2019-08-20 at 10.42.36 AM.png

I was also contributed to a 15-page FAQ e-book for the new Comstor/SYNNEX service to Cisco resellers.

Screen Shot 2019-08-20 at 10.40.09 AM.png
Screen Shot 2019-08-19 at 2.48.55 PM.png
Screen Shot 2019-08-19 at 2.49.08 PM.png
Screen Shot 2019-08-19 at 2.49.17 PM.png
Screen Shot 2019-08-19 at 2.49.36 PM.png

Blog marketing copy kit for Gigamon Insight

Gigamon internet security experts wrote a blog on advanced threats served cold, and how to dish back. They asked Projectline to market the blog for them. It was fun to be the copywriter on this campaign because the voicing of security professionals is so edgy and distinct. I did my best to emulate it, and help them connect with their audience.

1. EMAIL

Subject line:  The truth about preventing advanced threats is that you can’t. Nobody can.

Preview text/eyebrow: New Blog: Advanced Threat Actors and Mitigating Their Impact

Headline: Know Your Adversaries and How Best to Respond

Subhead: Understand the power you have to clear their effects off your network.

[CTA] Read Now

The secret behind a well-constructed, well-socialized, well-practiced incident response strategy is being ahead of the headlines rather than being the headline. So how do you stay the former and avoid the latter? 

Read the Gigamon Insight team’s most recent blog post, “Flesh and Code: Advanced Threat Detection, Served Two Ways.” 

Read this blog post now to learn: 

* How and why well-organized threat actors go after your network 

* Why you do not want to miscalculate their size, skill and patience 

* How to gain top-tier advanced detection strategy chops 

* How to focus the hunt to defend against the whole spectrum of adversaries 

They’re getting in, no matter what, and breach is inevitable. You’re more valuable in stopping the bleeding than you might expect. So meet your attackers head on in real-time. 

[CTA] Begin Reading

Responders just like you have built a solution to make this whole mess better for your SOC team. Detect intrusion and respond swiftly as attacks unfold. And take satisfaction in frustrating assailants who are used to coming and going with impunity. 

Learn more about Gigamon Insight.

 [Insert standard footer]

2. LANDING PAGE

 Headline: Know Your Adversaries and Prepare to Respond

 Subhead option: You have the power to diffuse attacks on your network.

 [CTA] Read Now

Learn the secret to building and practicing strategic, proactive incident response. And rest assured that you’ll stay ahead of the headlines rather than become one. So how do you accomplish all this? 

Read the Gigamon Insight team’s most recent blog post, “Flesh and Code: Advanced Threat Detection, Served Two Ways.” 

Read this blog post now to learn: 

* How and why well-organized threat actors go after your network 

* Why you do not want to miscalculate their size, skill and patience 

* How to gain top-tier advanced detection strategy chops 

* How to focus the hunt to defend against the whole spectrum of adversaries 

They’re getting in. Breach is inevitable, no matter what. But you have more power to stop the bleeding than you may realize. So meet your attackers head on.

[CTA] Begin Reading

Pro responders like you have got your back. They’ve built a solution so you can detect intrusion and act fast as threats come in. And won’t it be nice to frustrate attackers who are used to coming and going like they own the place. They don’t. You do.

[Insert form] 

3. THANK YOU

Thank you for downloading the “Flesh and Code: Advanced Threat Detection, Served Two Ways” blog from GigamonYou’ll learn who your adversary is, why and how they attack, and what you need to do to clear them off your network. Find out for yourself how Gigamon Insight can support your security program: Speak to a Gigamon expert, or request a personalized demo today. 

4. BANNER AD OPTIONS

NEW BLOG: Do you know who’s really behind your network attacks? Find out how to quickly detect and respond to intruders. 

[CTA] Read Now 

BLOG: Meet your network threat adversaries. And get real data detection to diffuse their attacks fast. 

[CTA] Begin Reading

5. COPY BLOCKS 

25 Words 

Read the “Flesh and Code: Advanced Threat Detection, Served Two Ways” blog post from Gigamon to understand, detect and respond to attackers. 

 50 Words 

Read the “Flesh and Code: Advanced Threat Detection, Served Two Ways” blog post to know your attackers and learn how to quickly detect them and respond. Focus the hunt, reduce mean time to detection, and defend against the whole spectrum of adversary options. And never underestimate your opponent. 

 75 words 

Download the “Flesh and Code: Advanced Threat Detection, Served Two Ways” blog post to get to know your attackers and learn how to quickly detect them and respond. Focus the hunt, reduce mean time to detection, and defend against the whole spectrum of adversary options. And never underestimate your opponent. Find out how and why threat actors target your network. And what you need to do to gain top-tier detection and response strategy chops.