SlideShare a Scribd company logo
1 of 61
SYMANTEC: PORTFOLIO
Symantec Sales Play
Iftikhar Ali Iqbal
Presales Consultant
SYMANTEC: Portfolio Sales Play
Valid till Jan 2017
Agenda
Company Overview1
Cyber Security Threat Landscape & Market2
Why Symantec?4
SYMANTEC: Portfolio Sales Play
What’s Next and Key Takeaways5
Portfolio & Competitive Analysis3
OVERVIEW: SYMANTEC
SYMANTEC: Portfolio Sales Play
OVERVIEW: SYMANTEC
• Founded in 1982
• Headquartered in Mountain View, California, United States
• Fortune 500 company
• Development centers in Pune, Chennai and Bengaluru (India)
• Provides Software and Services
• Focus is on Consumer Security and Enterprise Security
• Symantec = syntax, semantics and technology
• 11,000 employees (July 2016)
• Operations in Americas, EMEA and APJ
SYMANTEC: Portfolio Sales Play
OVERVIEW: SYMANTEC
• IPO on June 23, 1989
• Exchange: Ticker - NASDAQ: SYMC
• Fiscal Year Calendar: June to March
• Financial Data
SYMANTEC: Portfolio Sales Play
FY2015 FY2014
$6,538 $6,701
($ in millions)
FY2016 FY2015
$3,600 $3,956
During fiscal 2016, the Company began presenting the
financial results of Veritas within discontinued operations. This
presentation reflects the financial results of Veritas within
discontinued operations for both fiscal years.
KSA GULF, PK
$30 ~$20-25
($ in millions)
OVERVIEW: DEMERGER
• On 1st October 2015, Symantec’s Information Management
business now operates as a separate privately held company
Veritas Technologies Corporation
• The sale completed 30 January 2016 when Veritas became a
privately held company.
• Solutions:
– Backup and Recovery
– Archiving and eDiscovery
– Business Continuity and Disaster Recovery
• Separate operations, partner programs, support, etc.
SYMANTEC: Portfolio Sales Play
OVERVIEW: MAJOR MERGERS AND AQUISITIONS
SYMANTEC: Portfolio Sales Play
OVERVIEW: MERGERS AND AQUISITIONS
SYMANTEC: Portfolio Sales Play
• On June 13, 2016 it was announced that Symantec has acquired
Blue Coat for $4.65 billion.
• What is expected:
– Web and Cloud Security
– Encrypted Traffic Management
– Web Application Protection
• Blue Coat Threat Intelligence already integrated into Symantec
OVERVIEW: MANAGEMENT TEAM
Greg Clark
Chief Executive Officer
Michael Fey
President and Chief Operating
Officer
Nick Noviello
Executive Vice President and Chief
Financial Officer
SYMANTEC: Portfolio Sales Play
Brian Kenyon
Chief Strategy Officer
Hugh Thompson
Chief Technology Officer
Michael Williams
Chief Marketing Officer
MARKET: CYBERSECURITY LANDSCAPE & MARKET
SYMANTEC: Portfolio Sales Play
THREAT LANDSCAPE: THE NEWS
SYMANTEC: Portfolio Sales Play
THREAT LANDSCAPE: THE BIG NUMBERS
• 3x – A large business attacked once in was likely to be attacked
• ½ - Of all targeted attacks were against small businesses
• 55% - Increase in the number of spear-phishing campaigns attacks
• ¾ - legitimate websites found to have unpatched vulnerabilities
• 125% - Increase in the number of zero-day vulnerabilities discovered
• 35% - Increase in crypto-ransomware (end-users to businesses)
• 9 – Mega breaches, a record, occurred in 2015
• 430 Million - new pieces of unique malware discovered
SYMANTEC: Portfolio Sales Play
Internet Security Threat Report
THREAT LANDSCAPE: FUN FACT?
SYMANTEC: Portfolio Sales Play
In 2009 there were
2,361,414
new piece of malware created.
That’s
1 Million 179 Thousand
a day.
In 2015 that number was
430,555,582
$1T
2017-2021
~$200B/Y
THREAT LANDSCAPE: MARKET PROJECTIONS/FORECASTS
SYMANTEC: Portfolio Sales Play
By 2020
~170B/Y
$655B
2015-2020
~131B/Y
$500-700B
2017-2021
~$100-140B/Y
Various
Analysts
Corporations are
hesitant to
announce
breaches and
amounts of
security budgets
IT security services
are difficult to
fully size.
Tracking security
budget/cost
difficult they cut
across many
business areas
“Cybersecurity is the fastest growing tech sector. While all other sectors are
driven by reducing Inefficiencies and increasing productivity, cybersecurity
spending is driven by cybercrime. The unprecedented cybercriminal activity
we are witnessing is initiating so much cyber spending, it’s become nearly
impossible for the analysts to accurately track.”
Steve Morgan
Founder and Editor-In-Chief at Cybersecurity Ventures
SYMANTEC: PORTFOLIO
SYMANTEC: Portfolio Sales Play
PORTFOLIO: SOLUTIONS/PRODUCTS
SYMANTEC: Portfolio Sales Play
PORTFOLIO: NUTSHELL
Cyber Security Services
• Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 1
PROTECT MY ORGANIZATION FROM TARGETED ATTACKS
AND ADVANCED THREATS
PLAY 1: MALWARE PROTECTION
• THE PLAY:
– More complex multidimensional threat outbreaks
– Protect the endpoint, secure web and email gateways and provide
advanced threat protection
– Traditional malware security to Advanced Threat Protection
• THE SOLUTIONS:
– Endpoint Protection
– Mail Security for Exchange, Messaging Gateway, Email Security.Cloud
– Web Security.Cloud
– Advanced Threat Protection
– Protection Engine
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 2
HELP ME SECURE MY BUSINESS-CRITICAL SYSTEMS FROM
CYBER THREATS
PLAY 2: DATA CENTER SECURITY
• THE PLAY:
– Mission critical servers require more than antimalware
– Protect physical, virtual and cloud servers in heterogeneous environments
– Protect IoT infrastructure/devices
– Be able to cover legacy Operating Systems
– Agent-less antimalware for VMware Infrastructure
• THE SOLUTIONS:
– Critical System Protection
– Data Center Security: Server
– Data Center Security: Server Advanced
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 3
HELP MITIGATE RISK OF IP LOSS FROM CYBER THREATS
PLAY 3: DATA LOSS PREVENTION
• THE PLAY:
– Protect information against loss and theft, comply with data privacy
regulations, and safeguard their reputation.
– Prevent leakage of information from Endpoint, Network, Storage, Mobile and
Cloud
– Encrypt data at rest or transit
– Ensure required data/resources are accessed by authorized employees with 2-
FA or multi-factor authentication
• THE SOLUTIONS:
– Data Loss Prevention
– Encryption
– Validation and ID Protection
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 4
I REQUIRE VISIBILITY AND SECURE MANAGEMENT
ACROSS DEVICES, PLATFORMS AND APPLICATIONS
PLAY 4: ENDPOINT MANAGEMENT
• THE PLAY:
– Provisioning and migration of endpoints
– Make sure that operating systems, Microsoft and non-Microsoft software
are up to date
– Software and license management
– Inventory and management of endpoint hardware and applications
• THE SOLUTIONS:
– Client Management Suite
• Deployment Solution
• Patch Management Solution
• Software Management Solution
• Inventory Management Solution
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 5
HOW CAN I BUILD TRUST WITH EACH CUSTOMER?
HOW CAN I SECURE USER ACCESS AND COMMUNICATIONS
IN MY ORGANIZATION?
PLAY 5: PUBLIC KEY CERTIFICATES
• THE PLAY:
– Businesses and organizations of all kinds rely on websites, intranets, and
extranets to exchange confidential information and enable eCommerce.
– SSL/TLS Certificates, Code Signing Certificates and Digital Certificates
– SSL/TLS - Encrypt transmission and establish identity
– Digital Certificates - Authenticate devices and users
• THE SOLUTIONS:
– SSL
– Managed Public-Key Infrastructure
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
93%
Lack of
Resources,
Support and/or
Time
<15%
Work in Security
Awareness, Full-
Time
60%
Level of Executive
Support
Security Awareness
practitioners have a
communication
background
4%
SYMANTEC: Portfolio Sales Play
46%
Shortage of
Cybersecurity
skills
9%
No cybersecurity
skill deficiencies
86%
Difficult to recruit
cybersecurity
professionals
Cybersecurity skills,
most beneficial to
employees and
organization
44%
SYMANTEC: Portfolio Sales Play
67%
Incident Repose
more difficult
than 2 years ago
74%
Regularly ignore
some security
alerts
80%
Increase spending
on IR over 2 years
Specific incident
response training
for IT operations
staff
35%
SYMANTEC: Portfolio Sales Play
77%
Threat
Intelligence is
valuable to
security mission
70%
Too
voluminous/com
plex for
actionable
intelligence
27%
Effective in utilizing
data to pinpoint
cyber threats
Paid fees provides
more more
actionable
intelligence
46%
SYMANTEC: Portfolio Sales Play
56%
Unlikely or highly
unlikely be able
to detect a
sophisticate
attack
53%
Lack of skilled
resources as a
barrier to value
creation
63%
Budget constraints
for IS to contribute
to organization
Have formal
process and
advanced detection
function
9%
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 6
HOW CAN MY ORGANIZATION BE CYBER INTELLIGENT,
VIGILANT, RESPONSIVE AND READY?
PLAY 6: CYBER SECURITY SERVICES
• THE PLAY:
– Security-as-a-Service
– To address the lack of security expertise
– Intelligence on threats and adversaries
– Timely response to security incidents
• THE SOLUTIONS:
– Managed Security Service
– DeepSight Intelligence
– Incident Response Services
– Security Simulation
SYMANTEC: Portfolio Sales Play
PORTFOLIO: SERVICES
Support
Services
Consulting
Services
Education
Services
Essential
(24x7)
Basic
(9x5)
Business Critical
Services
Help me
DESIGN it,
INSTALL it,
ENHANCE it
Help me LEARN
about it & USE it
Help me UNLOCK
VALUE &
OPTIMIZE it
Help me FIX it
SYMANTEC: Portfolio Sales Play
Advisory
Design
Implement
Optimize
On-site
Specialist
Classroom
Virtual
Academy
Remote
Specialist
Residency
SYMANTEC: COMPTETIVE ANALYSIS
SYMANTEC: Portfolio Sales Play
COMPTETIVE ANALYSIS: PORTFOLIO
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
COMPTETIVE ANALYSIS: COMPETION BY PORTFOLIO
SYMANTEC: Portfolio Sales Play
Information ProtectionThreat Protection
Cyber Security Services
SYMANTEC: WHY SYMANTEC?
SYMANTEC: Portfolio Sales Play
SYMANTEC: THE TEAM
- approx. 550 employees
- security engineers, virus hunters,
threat analysts, and researchers
- Monitoring 130 million systems
- Data from 240,000 network sensors
- 200+ countries
- Tracking vulnerabilities
- Affecting 55,000 technologies
- 8,000+ vendors
- 7.5 million signatures
- 200 different network protocols
- 400 different behaviors
- 2.5 billion good/bad files
- 175 million participating users
SYMANTEC: Portfolio Sales Play
• 15 Years Delivering Security Monitoring and
Log Management
• 248+ Years of Forensic Investigation
• Average Experience of 15 Years
In-Field Active Investigation
• Hand Picked Security Professionals from
Government Agencies and Organizations
Around the World
EXPERIENCE
• 500+ Certified Cyber Security Professionals,
SOC Analysts 100% GIAC-GCIA Certified
• Leading Experts in Incident Response, Security
Monitoring and Intelligence
• Worlds Largest Cyber War Games Program
• Skilled in Cyber Security, Forensic Investigation,
Analysis, Data Science and Research
EXPERTISE
SECURITY TECHNOLOGY AND RESPONSE TEAM (STAR) CYBER SECURITY TEAM
SYMANTEC: GLOBAL INTELLIGENCE NETWORK (GIN)
SYMANTEC: Portfolio Sales Play
One of the largest civilian cyber intelligence networks
3.7 Trillion rows of security-relevant data
175M
Consumer and
Enterprise
endpoints
protected
57M
attack sensor
in 157countries
182M
web attacks
blocked last year
Discovered
430 million
new unique pieces
of malware last year
2 Billion
of email traffic
scanned/day
1 Billion
web requests
scanned daily
12,000+
Cloud applications
protected
SYMANTEC: ANALYST RELATIONS
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
SYMANTEC: ANALYST RELATIONS
Threat Protection Information Protection
SYMANTEC: Portfolio Sales Play
SYMANTEC: ANALYST RELATIONS
SYMANTEC: Portfolio Sales Play
SYMANTEC: WHAT’S NEXT?
SYMANTEC: Portfolio Sales Play
SYMANTEC: PORTFOLIO
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
SYMANTEC: Portfolio Sales Play
File
URL
Whitelist
Blacklist
Certificat
e
Machine
Learning
Cyber Security Services
DLPSecure Web
Gateway
Risk
Insight
Secure Mail
Gateway
Web Application
Firewall
Advanced Threat
Protection
Malware
Analysis
Cyber Security
Services
IT System
Management
Endpoint
Protection
EDR
Endpoint
Cloud
VIP
Identity
Local
Intelligence
File
URL
Whitelist
Blacklist
Certificate
Machine
Learning
SIEM Integration
Data Center
Security
EncryptionContent
Analysis
Performance
Optimization
Cloud
Secure Web
Gateway
Cloud
DLP CASB
Managed
PKI
Email
Security
Data
Center
Security
Cloud
Sandbox
Website
Security
Encryption
Compliance
Management
Encrypted
Traffic
Management
Security
Analytics
SOC Workbench
Third Party Ecosystem
ONPREMISESCLOUD
Cloud Data
Protection
SYMANTEC: RESOURCES
SYMANTEC: Portfolio Sales Play
RESOURCES: SALES
• Websites:
– Licensing Programs - https://www.symantec.com/support-center/buying-programs
– Partner Portal - https://www.symantec.com/partners
– Industry Analyst Reports - http://www.symantec.com/about/industryanalysts/analystreports.jsp
– Third-Party Tests Reports - https://www.symantec.com/products/performance-center
– Sales Support Cases – https://support.symantec.com/en_US/mysymantec.html
• Starting Point:
– Licensing Program (Express, Government, Rewards, etc)
– Opportunity Registrations (Opportunity Registration Rebate and Margin Builder)
– Support Types (Essential and Basic)
– Renewals
– Software Activation
– Price List
– Know What You Can Sell and Earn (Partner Program - Secure One)
– Independent Reports
– After-Sales Licensing Support
SYMANTEC: Portfolio Sales Play
RESOURCES : PRODUCT EDUCATION - SALES
• Websites:
– Partner Portal - https://www.symantec.com/partners
– Online Technical Training - https://education.symantec.com/Saba/Web/sena
– Symantec Community - http://www.symantec.com/connect/
• Product Material:
– Data Sheets/Brochures
– Licensing Guides
– Cheat Sheets/Sales Guides/ Sales Presentations
• Training and Certification:
• Symantec Sales Expert (SSE) – Overview and Positioning
• Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset)
SYMANTEC: Portfolio Sales Play
RESOURCES : PRODUCT EDUCATION - TECHNICAL
• Websites:
– Partner Portal - https://www.symantec.com/partners
– Online Technical Training - https://education.symantec.com/Saba/Web/sena
– Documentation and Support - https://support.symantec.com/en_US.html
– Symantec Community - http://www.symantec.com/connect/
– Technical Support Cases – https://support.symantec.com/en_US.html
• Product Material:
– Data Sheets/Whitepapers
– Licensing Guides
– Symantec eLibrary (Online Technical Training)
– Product Guides and Articles (Documentation and Support)
• Training and Certification:
• Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset)
• Symantec Certified Specialist (SCS) – Design, Deploy and Administer
SYMANTEC: Portfolio Sales Play
SYMANTEC: AREA OF FOCUS
• Portfolio covers a broad range of technologies/services:
– Endpoint, Mail and Web Security with Content Analysis
– Network Forensics and Web Application Firewall
– Advanced Threat Protection and Malware Analysis
– Data Loss Prevention, Encryption and Encrypted Traffic Management
– SSL, 2 FA, Single-Sign On and Managed PKI
– Cloud Access Security Broker (CASB)
– Network Performance Optimization
– Advanced Security for Virtual and Physical Servers/Environments
– Client, Server, Asset Management and Help Desk
– Malware Protection for NAS and Web Applications
– IT Risk and Compliance
– Technical and Adversary Intelligence
– Managed Security Services
– Incident Response
– Security Simulation
SYMANTEC: Portfolio Sales Play
SYMANTEC: ENDING NOTE
SYMANTEC: Portfolio Sales Play
Thank you!
Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
Iftikhar Ali Iqbal
Pre-sales Consultant
iftikhar_iqbal@mindware.ae
SYMANTEC: Portfolio Sales Play

More Related Content

What's hot

Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...MITRE ATT&CK
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookMITRE ATT&CK
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceMITRE ATT&CK
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CKMITRE ATT&CK
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKKatie Nickels
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You AreKatie Nickels
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMITRE ATT&CK
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingNikhil Mittal
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesParsons Behle & Latimer
 
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...MITRE ATT&CK
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 

What's hot (20)

Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
 
Cyber security
Cyber securityCyber security
Cyber security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE Activities
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 

Similar to Symantec Portfolio - Sales Play

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & ResponseHarry McLaren
 

Similar to Symantec Portfolio - Sales Play (20)

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 

More from Iftikhar Ali Iqbal

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingIftikhar Ali Iqbal
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Iftikhar Ali Iqbal
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Iftikhar Ali Iqbal
 

More from Iftikhar Ali Iqbal (16)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Symantec Portfolio - Sales Play

  • 1. SYMANTEC: PORTFOLIO Symantec Sales Play Iftikhar Ali Iqbal Presales Consultant SYMANTEC: Portfolio Sales Play Valid till Jan 2017
  • 2. Agenda Company Overview1 Cyber Security Threat Landscape & Market2 Why Symantec?4 SYMANTEC: Portfolio Sales Play What’s Next and Key Takeaways5 Portfolio & Competitive Analysis3
  • 4. OVERVIEW: SYMANTEC • Founded in 1982 • Headquartered in Mountain View, California, United States • Fortune 500 company • Development centers in Pune, Chennai and Bengaluru (India) • Provides Software and Services • Focus is on Consumer Security and Enterprise Security • Symantec = syntax, semantics and technology • 11,000 employees (July 2016) • Operations in Americas, EMEA and APJ SYMANTEC: Portfolio Sales Play
  • 5. OVERVIEW: SYMANTEC • IPO on June 23, 1989 • Exchange: Ticker - NASDAQ: SYMC • Fiscal Year Calendar: June to March • Financial Data SYMANTEC: Portfolio Sales Play FY2015 FY2014 $6,538 $6,701 ($ in millions) FY2016 FY2015 $3,600 $3,956 During fiscal 2016, the Company began presenting the financial results of Veritas within discontinued operations. This presentation reflects the financial results of Veritas within discontinued operations for both fiscal years. KSA GULF, PK $30 ~$20-25 ($ in millions)
  • 6. OVERVIEW: DEMERGER • On 1st October 2015, Symantec’s Information Management business now operates as a separate privately held company Veritas Technologies Corporation • The sale completed 30 January 2016 when Veritas became a privately held company. • Solutions: – Backup and Recovery – Archiving and eDiscovery – Business Continuity and Disaster Recovery • Separate operations, partner programs, support, etc. SYMANTEC: Portfolio Sales Play
  • 7. OVERVIEW: MAJOR MERGERS AND AQUISITIONS SYMANTEC: Portfolio Sales Play
  • 8. OVERVIEW: MERGERS AND AQUISITIONS SYMANTEC: Portfolio Sales Play • On June 13, 2016 it was announced that Symantec has acquired Blue Coat for $4.65 billion. • What is expected: – Web and Cloud Security – Encrypted Traffic Management – Web Application Protection • Blue Coat Threat Intelligence already integrated into Symantec
  • 9. OVERVIEW: MANAGEMENT TEAM Greg Clark Chief Executive Officer Michael Fey President and Chief Operating Officer Nick Noviello Executive Vice President and Chief Financial Officer SYMANTEC: Portfolio Sales Play Brian Kenyon Chief Strategy Officer Hugh Thompson Chief Technology Officer Michael Williams Chief Marketing Officer
  • 10. MARKET: CYBERSECURITY LANDSCAPE & MARKET SYMANTEC: Portfolio Sales Play
  • 11. THREAT LANDSCAPE: THE NEWS SYMANTEC: Portfolio Sales Play
  • 12. THREAT LANDSCAPE: THE BIG NUMBERS • 3x – A large business attacked once in was likely to be attacked • ½ - Of all targeted attacks were against small businesses • 55% - Increase in the number of spear-phishing campaigns attacks • ¾ - legitimate websites found to have unpatched vulnerabilities • 125% - Increase in the number of zero-day vulnerabilities discovered • 35% - Increase in crypto-ransomware (end-users to businesses) • 9 – Mega breaches, a record, occurred in 2015 • 430 Million - new pieces of unique malware discovered SYMANTEC: Portfolio Sales Play Internet Security Threat Report
  • 13. THREAT LANDSCAPE: FUN FACT? SYMANTEC: Portfolio Sales Play In 2009 there were 2,361,414 new piece of malware created. That’s 1 Million 179 Thousand a day. In 2015 that number was 430,555,582
  • 14. $1T 2017-2021 ~$200B/Y THREAT LANDSCAPE: MARKET PROJECTIONS/FORECASTS SYMANTEC: Portfolio Sales Play By 2020 ~170B/Y $655B 2015-2020 ~131B/Y $500-700B 2017-2021 ~$100-140B/Y Various Analysts Corporations are hesitant to announce breaches and amounts of security budgets IT security services are difficult to fully size. Tracking security budget/cost difficult they cut across many business areas “Cybersecurity is the fastest growing tech sector. While all other sectors are driven by reducing Inefficiencies and increasing productivity, cybersecurity spending is driven by cybercrime. The unprecedented cybercriminal activity we are witnessing is initiating so much cyber spending, it’s become nearly impossible for the analysts to accurately track.” Steve Morgan Founder and Editor-In-Chief at Cybersecurity Ventures
  • 17. PORTFOLIO: NUTSHELL Cyber Security Services • Monitoring , Incident Response, Simulation, Adversary Threat Intelligence Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play
  • 19. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 1 PROTECT MY ORGANIZATION FROM TARGETED ATTACKS AND ADVANCED THREATS
  • 20. PLAY 1: MALWARE PROTECTION • THE PLAY: – More complex multidimensional threat outbreaks – Protect the endpoint, secure web and email gateways and provide advanced threat protection – Traditional malware security to Advanced Threat Protection • THE SOLUTIONS: – Endpoint Protection – Mail Security for Exchange, Messaging Gateway, Email Security.Cloud – Web Security.Cloud – Advanced Threat Protection – Protection Engine SYMANTEC: Portfolio Sales Play
  • 22. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 2 HELP ME SECURE MY BUSINESS-CRITICAL SYSTEMS FROM CYBER THREATS
  • 23. PLAY 2: DATA CENTER SECURITY • THE PLAY: – Mission critical servers require more than antimalware – Protect physical, virtual and cloud servers in heterogeneous environments – Protect IoT infrastructure/devices – Be able to cover legacy Operating Systems – Agent-less antimalware for VMware Infrastructure • THE SOLUTIONS: – Critical System Protection – Data Center Security: Server – Data Center Security: Server Advanced SYMANTEC: Portfolio Sales Play
  • 25. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 3 HELP MITIGATE RISK OF IP LOSS FROM CYBER THREATS
  • 26. PLAY 3: DATA LOSS PREVENTION • THE PLAY: – Protect information against loss and theft, comply with data privacy regulations, and safeguard their reputation. – Prevent leakage of information from Endpoint, Network, Storage, Mobile and Cloud – Encrypt data at rest or transit – Ensure required data/resources are accessed by authorized employees with 2- FA or multi-factor authentication • THE SOLUTIONS: – Data Loss Prevention – Encryption – Validation and ID Protection SYMANTEC: Portfolio Sales Play
  • 28. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 4 I REQUIRE VISIBILITY AND SECURE MANAGEMENT ACROSS DEVICES, PLATFORMS AND APPLICATIONS
  • 29. PLAY 4: ENDPOINT MANAGEMENT • THE PLAY: – Provisioning and migration of endpoints – Make sure that operating systems, Microsoft and non-Microsoft software are up to date – Software and license management – Inventory and management of endpoint hardware and applications • THE SOLUTIONS: – Client Management Suite • Deployment Solution • Patch Management Solution • Software Management Solution • Inventory Management Solution SYMANTEC: Portfolio Sales Play
  • 31. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 5 HOW CAN I BUILD TRUST WITH EACH CUSTOMER? HOW CAN I SECURE USER ACCESS AND COMMUNICATIONS IN MY ORGANIZATION?
  • 32. PLAY 5: PUBLIC KEY CERTIFICATES • THE PLAY: – Businesses and organizations of all kinds rely on websites, intranets, and extranets to exchange confidential information and enable eCommerce. – SSL/TLS Certificates, Code Signing Certificates and Digital Certificates – SSL/TLS - Encrypt transmission and establish identity – Digital Certificates - Authenticate devices and users • THE SOLUTIONS: – SSL – Managed Public-Key Infrastructure SYMANTEC: Portfolio Sales Play
  • 33. SYMANTEC: Portfolio Sales Play 93% Lack of Resources, Support and/or Time <15% Work in Security Awareness, Full- Time 60% Level of Executive Support Security Awareness practitioners have a communication background 4%
  • 34. SYMANTEC: Portfolio Sales Play 46% Shortage of Cybersecurity skills 9% No cybersecurity skill deficiencies 86% Difficult to recruit cybersecurity professionals Cybersecurity skills, most beneficial to employees and organization 44%
  • 35. SYMANTEC: Portfolio Sales Play 67% Incident Repose more difficult than 2 years ago 74% Regularly ignore some security alerts 80% Increase spending on IR over 2 years Specific incident response training for IT operations staff 35%
  • 36. SYMANTEC: Portfolio Sales Play 77% Threat Intelligence is valuable to security mission 70% Too voluminous/com plex for actionable intelligence 27% Effective in utilizing data to pinpoint cyber threats Paid fees provides more more actionable intelligence 46%
  • 37. SYMANTEC: Portfolio Sales Play 56% Unlikely or highly unlikely be able to detect a sophisticate attack 53% Lack of skilled resources as a barrier to value creation 63% Budget constraints for IS to contribute to organization Have formal process and advanced detection function 9%
  • 38. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 6 HOW CAN MY ORGANIZATION BE CYBER INTELLIGENT, VIGILANT, RESPONSIVE AND READY?
  • 39. PLAY 6: CYBER SECURITY SERVICES • THE PLAY: – Security-as-a-Service – To address the lack of security expertise – Intelligence on threats and adversaries – Timely response to security incidents • THE SOLUTIONS: – Managed Security Service – DeepSight Intelligence – Incident Response Services – Security Simulation SYMANTEC: Portfolio Sales Play
  • 40. PORTFOLIO: SERVICES Support Services Consulting Services Education Services Essential (24x7) Basic (9x5) Business Critical Services Help me DESIGN it, INSTALL it, ENHANCE it Help me LEARN about it & USE it Help me UNLOCK VALUE & OPTIMIZE it Help me FIX it SYMANTEC: Portfolio Sales Play Advisory Design Implement Optimize On-site Specialist Classroom Virtual Academy Remote Specialist Residency
  • 42. COMPTETIVE ANALYSIS: PORTFOLIO Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 43. COMPTETIVE ANALYSIS: COMPETION BY PORTFOLIO SYMANTEC: Portfolio Sales Play Information ProtectionThreat Protection Cyber Security Services
  • 44. SYMANTEC: WHY SYMANTEC? SYMANTEC: Portfolio Sales Play
  • 45. SYMANTEC: THE TEAM - approx. 550 employees - security engineers, virus hunters, threat analysts, and researchers - Monitoring 130 million systems - Data from 240,000 network sensors - 200+ countries - Tracking vulnerabilities - Affecting 55,000 technologies - 8,000+ vendors - 7.5 million signatures - 200 different network protocols - 400 different behaviors - 2.5 billion good/bad files - 175 million participating users SYMANTEC: Portfolio Sales Play • 15 Years Delivering Security Monitoring and Log Management • 248+ Years of Forensic Investigation • Average Experience of 15 Years In-Field Active Investigation • Hand Picked Security Professionals from Government Agencies and Organizations Around the World EXPERIENCE • 500+ Certified Cyber Security Professionals, SOC Analysts 100% GIAC-GCIA Certified • Leading Experts in Incident Response, Security Monitoring and Intelligence • Worlds Largest Cyber War Games Program • Skilled in Cyber Security, Forensic Investigation, Analysis, Data Science and Research EXPERTISE SECURITY TECHNOLOGY AND RESPONSE TEAM (STAR) CYBER SECURITY TEAM
  • 46. SYMANTEC: GLOBAL INTELLIGENCE NETWORK (GIN) SYMANTEC: Portfolio Sales Play One of the largest civilian cyber intelligence networks 3.7 Trillion rows of security-relevant data 175M Consumer and Enterprise endpoints protected 57M attack sensor in 157countries 182M web attacks blocked last year Discovered 430 million new unique pieces of malware last year 2 Billion of email traffic scanned/day 1 Billion web requests scanned daily 12,000+ Cloud applications protected
  • 47. SYMANTEC: ANALYST RELATIONS Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 48. SYMANTEC: ANALYST RELATIONS Threat Protection Information Protection SYMANTEC: Portfolio Sales Play
  • 50. SYMANTEC: WHAT’S NEXT? SYMANTEC: Portfolio Sales Play
  • 51. SYMANTEC: PORTFOLIO Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 54. DLPSecure Web Gateway Risk Insight Secure Mail Gateway Web Application Firewall Advanced Threat Protection Malware Analysis Cyber Security Services IT System Management Endpoint Protection EDR Endpoint Cloud VIP Identity Local Intelligence File URL Whitelist Blacklist Certificate Machine Learning SIEM Integration Data Center Security EncryptionContent Analysis Performance Optimization Cloud Secure Web Gateway Cloud DLP CASB Managed PKI Email Security Data Center Security Cloud Sandbox Website Security Encryption Compliance Management Encrypted Traffic Management Security Analytics SOC Workbench Third Party Ecosystem ONPREMISESCLOUD Cloud Data Protection
  • 56. RESOURCES: SALES • Websites: – Licensing Programs - https://www.symantec.com/support-center/buying-programs – Partner Portal - https://www.symantec.com/partners – Industry Analyst Reports - http://www.symantec.com/about/industryanalysts/analystreports.jsp – Third-Party Tests Reports - https://www.symantec.com/products/performance-center – Sales Support Cases – https://support.symantec.com/en_US/mysymantec.html • Starting Point: – Licensing Program (Express, Government, Rewards, etc) – Opportunity Registrations (Opportunity Registration Rebate and Margin Builder) – Support Types (Essential and Basic) – Renewals – Software Activation – Price List – Know What You Can Sell and Earn (Partner Program - Secure One) – Independent Reports – After-Sales Licensing Support SYMANTEC: Portfolio Sales Play
  • 57. RESOURCES : PRODUCT EDUCATION - SALES • Websites: – Partner Portal - https://www.symantec.com/partners – Online Technical Training - https://education.symantec.com/Saba/Web/sena – Symantec Community - http://www.symantec.com/connect/ • Product Material: – Data Sheets/Brochures – Licensing Guides – Cheat Sheets/Sales Guides/ Sales Presentations • Training and Certification: • Symantec Sales Expert (SSE) – Overview and Positioning • Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset) SYMANTEC: Portfolio Sales Play
  • 58. RESOURCES : PRODUCT EDUCATION - TECHNICAL • Websites: – Partner Portal - https://www.symantec.com/partners – Online Technical Training - https://education.symantec.com/Saba/Web/sena – Documentation and Support - https://support.symantec.com/en_US.html – Symantec Community - http://www.symantec.com/connect/ – Technical Support Cases – https://support.symantec.com/en_US.html • Product Material: – Data Sheets/Whitepapers – Licensing Guides – Symantec eLibrary (Online Technical Training) – Product Guides and Articles (Documentation and Support) • Training and Certification: • Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset) • Symantec Certified Specialist (SCS) – Design, Deploy and Administer SYMANTEC: Portfolio Sales Play
  • 59. SYMANTEC: AREA OF FOCUS • Portfolio covers a broad range of technologies/services: – Endpoint, Mail and Web Security with Content Analysis – Network Forensics and Web Application Firewall – Advanced Threat Protection and Malware Analysis – Data Loss Prevention, Encryption and Encrypted Traffic Management – SSL, 2 FA, Single-Sign On and Managed PKI – Cloud Access Security Broker (CASB) – Network Performance Optimization – Advanced Security for Virtual and Physical Servers/Environments – Client, Server, Asset Management and Help Desk – Malware Protection for NAS and Web Applications – IT Risk and Compliance – Technical and Adversary Intelligence – Managed Security Services – Incident Response – Security Simulation SYMANTEC: Portfolio Sales Play
  • 60. SYMANTEC: ENDING NOTE SYMANTEC: Portfolio Sales Play
  • 61. Thank you! Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! Iftikhar Ali Iqbal Pre-sales Consultant iftikhar_iqbal@mindware.ae SYMANTEC: Portfolio Sales Play