Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are...
-
Upload
stephanie-lambert -
Category
Documents
-
view
216 -
download
1
Transcript of Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are...
Symantec Confidence in a connected world
Corporate Overview
2Symantec Confidential
Enterprises are interactingin new ways
Consumers are embracing a digital lifestyle
New Opportunities in a Connected World
Corporate Overview
3Symantec Confidential
393 Million global users of Instant Messaging
IM threats grew by 1,693% in 2005
New Opportunities Introduce New Risks
75% of companies expect significant efficiencies from
e-business53% of consumers have stopped giving out personal information online
63% of organizations feel that they might be impacted by a regulatory breach and a major information loss every 5 yearsPotentially causing damage to reputation, loss of revenue, and loss of customer, partner, and even shareholder trust
Sources: IMlogic Threat Center Report, Jan 2006; The Radicati Group, Sept 2006; IDC, 2005.
Corporate Overview
4Symantec Confidential
Symantec™ Global Intelligence Network
Hundreds of MSS customersMillions of security alerts per monthMillions of threat reports per month200,000 malware submissions per month
Twyford, England
Munich, Germany
Alexandria, VA
Sydney, Australia
Redwood City, CA
Santa Monica, CA
Calgary, Canada
San Francisco, CA
Dublin, Ireland
Pune, India
Taipei, Taiwan
Tokyo, Japan
>6,200 Managed Security Devices + + AdvancedHoneypot Network
120 Million Systems Worldwide 30% of World’s email Traffic +
74 Symantec Monitored Countries
74 Symantec Monitored Countries+4 Symantec SOCs4 Symantec SOCs 40,000+ Registered Sensors
in 180+ Countries40,000+ Registered Sensors
in 180+ Countries+ + 8 Symantec Security Response Centers
8 Symantec Security Response Centers
Corporate Overview
5Symantec Confidential
Industry Recognition
Email Active-Archiving 5
Email Security Boundary 6
Enterprise Antivirus 7
Personal Firewall 8
#1 in Security Software (32% share) 1
#1 in Secure Content Mgt. (34% share) 2
#1 in Data Protection and Recovery (45% share) 3
#1 in Core Storage Management (30% share) 4
MARKET SHARE LEADERSHIP (WW, 2005)
GARTNER MAGIC QUADRANTS: LEADERS*
FORRESTER WAVES: A LEADER
Enterprise Antispyware 9
Application Mapping for Configuration 10 Management Database
Message Archiving Software Products 11
Enterprise Security Information Management 12
“Symantec helps us protect our IT environment within a landscape of constantly increasing threats. We needed a solution that would foster the progression of the organization—not encumber its development. We found the answer in Symantec.”
Robert Taylor, chief information officer, Fulton County
Corporate Overview
6Symantec Confidential
Committed to Innovation
• Open Business Innovation Model
– Invests 15% of revenue into R&D
– R&D labs in 12 countries
– Advanced Concepts team acts as a “start-up” to bring cutting-edge technologies to market
– Recognised in IDC’s Marketing Performance Matrix as a leader(1)
– CIO Strategy Center recognised by Web Marketing Association
– 4th largest software company in the world
(1) IDC, IDC’s Marketing Performance Matrix: Identifying Innovation in Tech Marketing Leadership , #34839, 2/06 (2) Customer Respect Group
Corporate Overview
7Symantec Confidential
Partnerships – integration, business
Corporate Overview
8Symantec Confidential
Type of Interaction and Communication
Per
vasi
ven
ess
of
Co
nn
ecti
vity
Interactions
Information
Infrastructure
Consumers and Businesses Want Confidence
Corporate Overview
9Symantec Confidential
A Blueprint for Business
Secure and protect data
Maximise system availability
Optimise application environments
Set and enforce consistent policies
Award-winning channel program with 60,000 partners globally
YOUR BUSINESS
Corporate Overview
10Symantec Confidential
AvailabilityAvailabilityKeep Systems Up
Enable Rapid Recovery
Maximize PerformanceMaximize PerformanceOptimize ResourcesOptimize Resources
PerformancePerformance
A Unique Portfolio
IT Policy ManagementEnsure Adequate ControlsAutomate Evidence Collection
Keep Bad Things OutKeep Important Things In
Security
ITITInfrastructure
Information
Natural Disasters& System Outages
Internal Governance & External Regulations
IT Service LevelsInternal & External
Threats
Corporate Overview
11Symantec Confidential
Diversified Enterprise Portfolio of Market Leading Solutions
Security
Data Center Management Services
Data ProtectionDeployed at multiple layers including server,
desktop – PCs, laptops – and handhelds Backup and recovery of data and systems
Simplify heterogeneous environments. Provide continuous availability of critical data.
Full range of services to help our customers manage and mitigate business risk
AssessManage
DesignImplement
Corporate Overview
12Symantec Confidential
Breadth and Depth of Global Services
Global Reach: More than 3,000 people around the world
Symantec Global Services combines extensive IT Risk management knowledge, technical, and business expertise, and global insight to create confidence
•Unique proprietary insight into managing IT risk, cost, and complexity•Unrivalled knowledge of Symantec solutions•Exceptional real-world experience across complex, heterogeneous environments
Education Services
EnterpriseSupport Services
ManagedSecurity Services
EarlyWarning Services
Consulting Services
Corporate Overview
13Symantec Confidential
The Trusted Environment Requirements
INTERACTIONS
INFORMATION
INFRASTRUCTURE
IT SKILLS AND PROCESSES
EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS
INTERACTIONS
INFORMATION
INFRASTRUCTURE
IT SKILLS AND PROCESSES
SECURE AVAILABLE COMPLIANT
EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS
A trusted environmentis secure
You recognize who youinteract with and thatyou can trust them.
You trust the informationyou create, use and share.
You are confident thatthe IT infrastructure is
protected and safe.
Your IT staff has the skills andprocesses to manage today’s complex security landscape.
A trusted environmentis secure
You recognize who youinteract with and thatyou can trust them.
You trust the informationyou create, use and share.
You are confident thatthe IT infrastructure is
protected and safe.
Your IT staff has the skills and processes to manage today’s complex security landscape
SECURE AVAILABLE COMPLIANT
EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS
INTERACTIONS
INFORMATION
INFRASTRUCTURE
IT SKILLS AND PROCESSES
A trusted environmentis available
You can interact whenever,wherever and however
you want.
The information you wantis there for you
when you need it.
Your IT infrastructure is highly available and
resilient.
Your IT staff has the skills to maintain high availability in a
changing environment.
A trusted environmentis secure
You recognize who youinteract with and thatyou can trust them.
You trust the informationyou create, use and share.
You are confident thatthe IT infrastructure is
protected and safe.
Your IT staff has the skills and processes to manage today’s complex security landscape.
SECURE AVAILABLE HIGH PERFORMANCE COMPLIANT
EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS
A trusted environmentis available
You can interact whenever,wherever and however
you want.
The information you wantis there for you
when you need it.
Your IT infrastructure is highly available and
resilient.
Your IT staff has the skills to maintain high availability in
a changing environment.
INTERACTIONS
INFORMATION
INFRASTRUCTURE
IT SKILLS AND PROCESSES
A trusted environmentis high performance
Your interactions areeasy, efficient and fast.
Your information flowsfreely without interruption
or loss.
Your IT infrastructure isscalable, flexible, efficient—IT investments optimized.
Your IT staff can optimize a changing environment for cost and performance
A trusted environmentis secure
You recognize who youinteract with and thatyou can trust them.
You trust the informationyou create, use and share.
You are confident thatthe IT infrastructure is
protected and safe.
Your IT staff has the skills and processes to manage today’s complex security landscape.
SECURE AVAILABLE HIGH PERFORMANCE COMPLIANT
EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS
A trusted environmentis available
You can interact whenever,wherever and however
you want.
The information you wantis there for you
when you need it.
Your IT infrastructure is highly available and
resilient.
Your IT staff has the skills to maintain high availability in
a changing environment.
INTERACTIONS
INFORMATION
INFRASTRUCTURE
IT SKILLS AND PROCESSES
A trusted environmentis high performance
Your interactions areeasy, efficient and fast.
Your information flowsfreely without interruption
or loss.
Your IT infrastructure isscalable, flexible, efficient—IT investments optimized.
Your IT staff can optimize a changing environment for cost and performance
A trusted environmentis compliant
Your interactions arecompliant and policies alignwith business requirements.
Your informationmanagement is compliant and
information can be discovered.
Your infrastructure is compliant with IT policies and external regulations.
Your IT staff has the skills to automate IT policy compliance.
Corporate Overview
14Symantec Confidential
Confidence in a connected world.
Thank You!
Sven Schuldt
Symantec Eastern Europe director
Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Appendix
Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Corporate Overview
17Symantec Confidential
Source: Industry Recognition
1 Based on new license revenue, Gartner Dataquest, “Market Share: Security Software, Worldwide, 2005”,Latimer-Livingston, 08/2006
2 IDC, “Worldwide Secure Content Management 2006-2010 Forecast Update and 2005 Vendor Shares”, #203550, 09/2006
3 IDC, Worldwide Data Protection and Recovery Software 2006–2010 Forecast Update and 2005 Vendor Shares, Doc #203070, Aug 2006
4 Based on new license revenue - Gartner Dataquest “Market Share: Storage Management Software, Worldwide, 2005” Munglani and Pant, 06/ 2006
5 Gartner, Magic Quadrant for E-Mail Active Archiving, 2006; Carolyn DiCenzo & Kenneth Chin; May 12, 2006
6 Gartner, Magic Quadrant for E-mail Security Boundary, 2006; Peter Firstbrook, Arabella Hallawell Sept 25, 2006
7 Gartner, Magic Quadrant for Enterprise Antivirus, Arabella Hallawell, Peter Firstbrook, 31 Aug 2006
8 Gartner, Magic Quadrant for Personal Firewalls 1Q06, John Girald, 06/2006
9 Forrester, The Forrester Wave: Enterprise Antispyware, Jan 2006
10 Forrester, The Forrester Wave™: Application Mapping For The CMDB, Feb, 2006
11 Forrester, The Forrester Wave: Message Archiving Software, Dec, 2005
12 Forrester, The Forrester Wave ™ : Enterprise Security Information Management Dec, 2006
*The Magic Quadrant is copyrighted 2005 – 2006 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.