Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are...

17
Symantec Confidence in a connected world

Transcript of Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are...

Page 1: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Symantec Confidence in a connected world

Page 2: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

2Symantec Confidential

Enterprises are interactingin new ways

Consumers are embracing a digital lifestyle

New Opportunities in a Connected World

Page 3: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

3Symantec Confidential

393 Million global users of Instant Messaging

IM threats grew by 1,693% in 2005

New Opportunities Introduce New Risks

75% of companies expect significant efficiencies from

e-business53% of consumers have stopped giving out personal information online

63% of organizations feel that they might be impacted by a regulatory breach and a major information loss every 5 yearsPotentially causing damage to reputation, loss of revenue, and loss of customer, partner, and even shareholder trust

Sources: IMlogic Threat Center Report, Jan 2006; The Radicati Group, Sept 2006; IDC, 2005.

Page 4: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

4Symantec Confidential

Symantec™ Global Intelligence Network

Hundreds of MSS customersMillions of security alerts per monthMillions of threat reports per month200,000 malware submissions per month

Twyford, England

Munich, Germany

Alexandria, VA

Sydney, Australia

Redwood City, CA

Santa Monica, CA

Calgary, Canada

San Francisco, CA

Dublin, Ireland

Pune, India

Taipei, Taiwan

Tokyo, Japan

>6,200 Managed Security Devices + + AdvancedHoneypot Network

120 Million Systems Worldwide 30% of World’s email Traffic +

74 Symantec Monitored Countries

74 Symantec Monitored Countries+4 Symantec SOCs4 Symantec SOCs 40,000+ Registered Sensors

in 180+ Countries40,000+ Registered Sensors

in 180+ Countries+ + 8 Symantec Security Response Centers

8 Symantec Security Response Centers

Page 5: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

5Symantec Confidential

Industry Recognition

Email Active-Archiving 5

Email Security Boundary 6

Enterprise Antivirus 7

Personal Firewall 8

#1 in Security Software (32% share) 1

#1 in Secure Content Mgt. (34% share) 2

#1 in Data Protection and Recovery (45% share) 3

#1 in Core Storage Management (30% share) 4

MARKET SHARE LEADERSHIP (WW, 2005)

GARTNER MAGIC QUADRANTS: LEADERS*

FORRESTER WAVES: A LEADER

Enterprise Antispyware 9

Application Mapping for Configuration 10 Management Database

Message Archiving Software Products 11

Enterprise Security Information Management 12

“Symantec helps us protect our IT environment within a landscape of constantly increasing threats. We needed a solution that would foster the progression of the organization—not encumber its development. We found the answer in Symantec.”

Robert Taylor, chief information officer, Fulton County

Page 6: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

6Symantec Confidential

Committed to Innovation

• Open Business Innovation Model

– Invests 15% of revenue into R&D

– R&D labs in 12 countries

– Advanced Concepts team acts as a “start-up” to bring cutting-edge technologies to market

– Recognised in IDC’s Marketing Performance Matrix as a leader(1)

– CIO Strategy Center recognised by Web Marketing Association

– 4th largest software company in the world

(1) IDC, IDC’s Marketing Performance Matrix: Identifying Innovation in Tech Marketing Leadership , #34839, 2/06 (2) Customer Respect Group

Page 7: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

7Symantec Confidential

Partnerships – integration, business

Page 8: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

8Symantec Confidential

Type of Interaction and Communication

Per

vasi

ven

ess

of

Co

nn

ecti

vity

Interactions

Information

Infrastructure

Consumers and Businesses Want Confidence

Page 9: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

9Symantec Confidential

A Blueprint for Business

Secure and protect data

Maximise system availability

Optimise application environments

Set and enforce consistent policies

Award-winning channel program with 60,000 partners globally

YOUR BUSINESS

Page 10: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

10Symantec Confidential

AvailabilityAvailabilityKeep Systems Up

Enable Rapid Recovery

Maximize PerformanceMaximize PerformanceOptimize ResourcesOptimize Resources

PerformancePerformance

A Unique Portfolio

IT Policy ManagementEnsure Adequate ControlsAutomate Evidence Collection

Keep Bad Things OutKeep Important Things In

Security

ITITInfrastructure

Information

Natural Disasters& System Outages

Internal Governance & External Regulations

IT Service LevelsInternal & External

Threats

Page 11: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

11Symantec Confidential

Diversified Enterprise Portfolio of Market Leading Solutions

Security

Data Center Management Services

Data ProtectionDeployed at multiple layers including server,

desktop – PCs, laptops – and handhelds Backup and recovery of data and systems

Simplify heterogeneous environments. Provide continuous availability of critical data.

Full range of services to help our customers manage and mitigate business risk

AssessManage

DesignImplement

Page 12: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

12Symantec Confidential

Breadth and Depth of Global Services

Global Reach: More than 3,000 people around the world

Symantec Global Services combines extensive IT Risk management knowledge, technical, and business expertise, and global insight to create confidence

•Unique proprietary insight into managing IT risk, cost, and complexity•Unrivalled knowledge of Symantec solutions•Exceptional real-world experience across complex, heterogeneous environments

Education Services

EnterpriseSupport Services

ManagedSecurity Services

EarlyWarning Services

Consulting Services

Page 13: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

13Symantec Confidential

The Trusted Environment Requirements

INTERACTIONS

INFORMATION

INFRASTRUCTURE

IT SKILLS AND PROCESSES

EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS

INTERACTIONS

INFORMATION

INFRASTRUCTURE

IT SKILLS AND PROCESSES

SECURE AVAILABLE COMPLIANT

EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS

A trusted environmentis secure

You recognize who youinteract with and thatyou can trust them.

You trust the informationyou create, use and share.

You are confident thatthe IT infrastructure is

protected and safe.

Your IT staff has the skills andprocesses to manage today’s complex security landscape.

A trusted environmentis secure

You recognize who youinteract with and thatyou can trust them.

You trust the informationyou create, use and share.

You are confident thatthe IT infrastructure is

protected and safe.

Your IT staff has the skills and processes to manage today’s complex security landscape

SECURE AVAILABLE COMPLIANT

EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS

INTERACTIONS

INFORMATION

INFRASTRUCTURE

IT SKILLS AND PROCESSES

A trusted environmentis available

You can interact whenever,wherever and however

you want.

The information you wantis there for you

when you need it.

Your IT infrastructure is highly available and

resilient.

Your IT staff has the skills to maintain high availability in a

changing environment.

A trusted environmentis secure

You recognize who youinteract with and thatyou can trust them.

You trust the informationyou create, use and share.

You are confident thatthe IT infrastructure is

protected and safe.

Your IT staff has the skills and processes to manage today’s complex security landscape.

SECURE AVAILABLE HIGH PERFORMANCE COMPLIANT

EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS

A trusted environmentis available

You can interact whenever,wherever and however

you want.

The information you wantis there for you

when you need it.

Your IT infrastructure is highly available and

resilient.

Your IT staff has the skills to maintain high availability in

a changing environment.

INTERACTIONS

INFORMATION

INFRASTRUCTURE

IT SKILLS AND PROCESSES

A trusted environmentis high performance

Your interactions areeasy, efficient and fast.

Your information flowsfreely without interruption

or loss.

Your IT infrastructure isscalable, flexible, efficient—IT investments optimized.

Your IT staff can optimize a changing environment for cost and performance

A trusted environmentis secure

You recognize who youinteract with and thatyou can trust them.

You trust the informationyou create, use and share.

You are confident thatthe IT infrastructure is

protected and safe.

Your IT staff has the skills and processes to manage today’s complex security landscape.

SECURE AVAILABLE HIGH PERFORMANCE COMPLIANT

EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS

A trusted environmentis available

You can interact whenever,wherever and however

you want.

The information you wantis there for you

when you need it.

Your IT infrastructure is highly available and

resilient.

Your IT staff has the skills to maintain high availability in

a changing environment.

INTERACTIONS

INFORMATION

INFRASTRUCTURE

IT SKILLS AND PROCESSES

A trusted environmentis high performance

Your interactions areeasy, efficient and fast.

Your information flowsfreely without interruption

or loss.

Your IT infrastructure isscalable, flexible, efficient—IT investments optimized.

Your IT staff can optimize a changing environment for cost and performance

A trusted environmentis compliant

Your interactions arecompliant and policies alignwith business requirements.

Your informationmanagement is compliant and

information can be discovered.

Your infrastructure is compliant with IT policies and external regulations.

Your IT staff has the skills to automate IT policy compliance.

Page 14: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

14Symantec Confidential

Confidence in a connected world.

Page 15: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Thank You!

Sven Schuldt

Symantec Eastern Europe director

Copyright © 2007 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.

Page 16: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Appendix

Copyright © 2007 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.

Page 17: Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.

Corporate Overview

17Symantec Confidential

Source: Industry Recognition

1 Based on new license revenue, Gartner Dataquest, “Market Share: Security Software, Worldwide, 2005”,Latimer-Livingston, 08/2006

2 IDC, “Worldwide Secure Content Management 2006-2010 Forecast Update and 2005 Vendor Shares”, #203550, 09/2006

3 IDC, Worldwide Data Protection and Recovery Software 2006–2010 Forecast Update and 2005 Vendor Shares, Doc #203070, Aug 2006

4 Based on new license revenue - Gartner Dataquest “Market Share: Storage Management Software, Worldwide, 2005” Munglani and Pant, 06/ 2006

5 Gartner, Magic Quadrant for E-Mail Active Archiving, 2006; Carolyn DiCenzo & Kenneth Chin; May 12, 2006

6 Gartner, Magic Quadrant for E-mail Security Boundary, 2006; Peter Firstbrook, Arabella Hallawell Sept 25, 2006

7 Gartner, Magic Quadrant for Enterprise Antivirus, Arabella Hallawell, Peter Firstbrook, 31 Aug 2006

8 Gartner, Magic Quadrant for Personal Firewalls 1Q06, John Girald, 06/2006

9 Forrester, The Forrester Wave: Enterprise Antispyware, Jan 2006

10 Forrester, The Forrester Wave™: Application Mapping For The CMDB, Feb, 2006

11 Forrester, The Forrester Wave: Message Archiving Software, Dec, 2005

12 Forrester, The Forrester Wave ™ : Enterprise Security Information Management Dec, 2006

*The Magic Quadrant is copyrighted 2005 – 2006 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.