Corporate Product Sales Presentation

Submit Audition/Proposal on this Project
Rate this Project

Project Main Details

Corporate Product Sales Presentation 
This is a product sales presentation for a large international technology company. This is a security product so the tone should be serious but casual and narrative.
2008-06-10 23:20:11 GMT
2008-06-11 14:41:43 (GMT -05:00) Eastern Time (US & Canada) 
Yes (click here to learn more about Voice123's SmartCast)
Closed - Note: This project was manually closed by the voice seeker before it reached its original deadline.
0 direct invitation(s) have been sent by the voice seeker resulting in 0 audition(s) and/or proposal(s) so far.
Voice123 SmartCast is seeking 50 auditions and/or proposals for this project (approx.) Invitations sent by SmartCast have resulted in 48 audition(s) and/or proposal(s) so far.

Project Parameters

The Voice Actor should be located in:
To be defined
Training, business presentations, sales, and web sites
Not defined
English - ANY OR English - Australian OR English - British
Middle Age Male OR Senior Male
• Audio files must be delivered via email OR
• Audio files must be delivered via FTP/Dropbox/Google Drive/cloud
There are no special pre-, post-, or production requirements for this project.
Not defined
The voice seeker is willing to hire either union or non-union talents for this project

Script Details

Script provided by the voice seeker:

Remember the days when you could arrive at an airport and walk directly up to your gate? The world has indeed changed over the last several years as airport security continues to grow with overlapping layers of security.
Your organization should be changing too. With the ever increasing complexity of potential threats, your network, just like an airport, needs to be protected at each layer of potential risk.
Think for a minute about your typical airport experience. When you first arrive at the airport you need to head straight to the ticket counter to identify yourself and request a boarding pass. Once your identity has been verified, you can then check your bags and proceed to your gate.
In the same way, when someone wants to enter your network, the first thing they need to do is authenticate at the network edge by logging in.
Now once you have received a boarding pass, you head straight to the security checkpoint where you and your belongings are scanned for potentially dangerous items.
In your network, once a user has been authenticated their device should be checked for possible security threats. It’s at this point that existing viruses, missing security patches, or other vulnerabilities on the user’s computer can be identified.
Once you pass the security checkpoint, you are granted access to your gate. However you are only allowed to enter areas designated for the public. Pilots, airline crew, and airport personnel may be granted access to areas of the airport that the travelling public is not allowed to see.
In a similar way, users inside your network should not be granted access to all resources. Instead approved users paired with approved devices should be granted privileges based on their access rights.
As you make your way to your gate, your luggage is being processed for transport. During this processing, each of your items is scanned for compliance with airport security guidelines.
And just as your luggage is scanned in the background, network “luggage”, or data, needs to be continually checked for dangerous anomalies. And if anomalies of any kind are detected during network usage, those anomalies need to be immediately removed and placed in quarantine.
Another important security measure that all airports employ is continuous video surveillance. The careful monitoring and recording of behavior and events inside the airport provide points of reference and review in the event of a security breach.
Same with your network. Monitoring and recording of user activity is needed to ensure compliance with security regulations and proper risk mitigation.
At each layer within your network security framework ************** offers solutions designed to fit your needs. Intended to deliver comprehensive end-to-end network security frameworks or point solutions inside a multi-vendor network, **************** security portfolio is…
comprehensive because it provides multiple solutions at each layer,
modular because it can be built in layers one at a time, and
open because it is designed to integrate within multi-vendor networks.
When it comes to network security, failure often leads to headlines. Don’t fail. 
Voice123 Note: Names, links, and contact information have been replaced by "*" symbols. If you have been invited to submit an audition or proposal for this project, you can sign in to see this information in full.
Please note that you should only use the script or your recording of it for auditioning purposes. The script is property, unless otherwise specified, of the voice seeker and it is protected by international copyright laws.

Voice-Seeker Details

Sign in to display the company name (if applicable)


Voice123 Team Comments

Voice123 consultations with this voice seeker regarding this project and/or other projects by this voice seeker, via phone, chat, and/or email.

checked This project - phone.

unchecked Previous projects - phone.

checked This project - email or chat.

unchecked Previous projects - email or chat.

checked Corporate web site for this voice-seeker confirmed by Voice123

Note: Voice123 strives to establish the legitimacy of all projects posted. However, Voice123 subscribers and users are responsible for confirming information stated by prospective voice seekers, agents and/or clients. Voice123 subscribers and users assume all liability for use of any information found through Voice123, or any of its publications.

This page contains the most important details of this project. If you find the information on this project inaccurate or inappropriate, please let us know by contacting us.

Submit Audition/Proposal on this Project