SlideShare une entreprise Scribd logo
1  sur  14
Accidental Entrepreneur

    June 13, 2012


The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   1
The Accidental
                                                                          Entrepreneur is
                                                                          NOT a Theory
                                                                          Anymore




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                     2
Business Creation Up during and after Great Recession
  • Great Recession caused unprecedented business death AND unprecedented
    business birth
  • 60,000 more new businesses were created per month in 2009 than in 2007
  • Trend Continues…70,000 more per month in 2010, and 50,000 more per
    month in 2011




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market    3

Source: Kauffman Index of Entrepreneurial Activity 1996-2011, March 2012
Research Methodology
• Survey performed by Forrester Consulting
• 305 U.S. SMBs (3 to 250 employees)
  – 50/50 split among companies founded pre- and post-2008
• Company executive or IT decision maker
• Cross industry




  Objective:
  Understand the differences – with respect to technology adoption/
  utilization /consumption models – between SMBs started since 2008
  as a result of the recession (accidental entrepreneurs) and those
  started prior to 2008.


The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   4
Who is the Accidental Entrepreneur?
• Laid off from white collar job
• Returning from war
• The “newly unretired”
• Stay-at-home spouses
• Not just “old economy”
• White collar, tech-savvy professionals at the peak of
  their career




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   5
How are Accidental Entrepreneurs different?
  Key Findings
  • Driven by profits not passion
  • Bullish about growth
  • Take dramatic and immediate advantage of the cloud
  • Better prepared to scale security
  • More self-sufficient in making software decisions




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          6

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Profits not passion drive post-2008 small businesses
  • 54% of SBs founded post-2008 have an exit strategy(15% higher)
  • 34% of founders of SBs since 2008 come from large enterprises (500+
    employee)
  • 35% left their large employers due to the recession




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          7

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Growing faster than traditional small businesses
  • Four times as many Accidental Entrepreneurs expect to double their number
    of employees in the next two years
  • 75% expect revenue to grow more than 10 percent in the next year




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          8

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Trust more applications to the cloud
  • 21% of Accidental Entrepreneurs have zero servers and 35% have 3+ servers
        – Sophisticated IT infrastructure; four times more likely to build in the cloud
  • 51% deploy cloud software
        – 26% have implemented cloud security vs. 16% of pre-2008
  • All SBs aggressively adopting cloud storage and backup
        – 32% post-2008 and 29% of pre-2008




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          9

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Better prepared to scale security for growth
  • Turn to the cloud more for endpoint, network firewall, email and web
    security
  • 27% more confident that their current security solution will scale




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          10

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
More self-sufficient in making software decisions
  • Base software decisions on what the
    founder used in their previous job or as a
    consumer (across all software types)
  • Strongly prefer known brands
  • Extremely less likely than pre-recession
    SBs to rely on VAR recommendation for
    collaboration and security software




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          11

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Accidental Entrepreneurs Are
Velociraptors Feasting On The Herd




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   12
Conclusions
• Accidental Entrepreneurs:
    – Are growing significantly faster and at the expense of less technically-
      confident, less agile, less ‘connected’ small business owner
    – Are mostly “Enterprise-like” or “Cutting Edge” companies
    – Are very likely to acquire “consumer technology” at retail and then seek
      to modify it as their needs become more complex
    – Need simple, easy-to-deploy and easy-to-manage solutions that can keep
      pace as they quickly scale their company




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market          13
Thank you!




    Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                                                                                                                     14

Contenu connexe

En vedette

Survey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSurvey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence ReportSymantec
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...Symantec
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...Symantec
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 

En vedette (7)

Survey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSurvey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspective
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 

Similaire à Accidental entrepreneur

Chapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-UpsChapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-UpsRayman Soe
 
Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)MidMarket Place
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessSameer Khan
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationIngram Micro Cloud
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15Tirrah Switzer
 
BUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small BusinessBUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small BusinessDeborah Oronzio
 
Capital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of GrowthCapital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of GrowthCIT Group
 
The essential elements of a digital transformation strategy
The essential elements of a digital transformation strategyThe essential elements of a digital transformation strategy
The essential elements of a digital transformation strategyMarcel Santilli
 
What does Digital Disruption look like?
What does Digital Disruption look like?What does Digital Disruption look like?
What does Digital Disruption look like?Mike Shaw
 
Tamm & kitt
Tamm & kittTamm & kitt
Tamm & kittJeff Roy
 
Small Business Trends 2009
Small Business Trends 2009Small Business Trends 2009
Small Business Trends 2009Michael Bowers
 
Understanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo MatarreseUnderstanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo MatarreseLeonardo Matarrese
 
Macro Business Environment in India
Macro Business Environment in IndiaMacro Business Environment in India
Macro Business Environment in IndiaAkshay Pratap Singh
 
SMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTapSMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTapChirantan Ghosh
 
Adobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceAdobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceDay Software
 
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead Windows 7 Professional
 
7 strategies of Best Managed companies
7 strategies of Best Managed companies7 strategies of Best Managed companies
7 strategies of Best Managed companiesDeloitte Canada
 
IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)
IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)
IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)SP Home Run Inc.
 
Lead share alternative_financing_presentation
Lead share alternative_financing_presentationLead share alternative_financing_presentation
Lead share alternative_financing_presentationmehtanuj
 

Similaire à Accidental entrepreneur (20)

Chapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-UpsChapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-Ups
 
Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data Success
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial Transformation
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
BUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small BusinessBUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small Business
 
Capital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of GrowthCapital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of Growth
 
The essential elements of a digital transformation strategy
The essential elements of a digital transformation strategyThe essential elements of a digital transformation strategy
The essential elements of a digital transformation strategy
 
What does Digital Disruption look like?
What does Digital Disruption look like?What does Digital Disruption look like?
What does Digital Disruption look like?
 
Tamm & kitt
Tamm & kittTamm & kitt
Tamm & kitt
 
Small Business Trends 2009
Small Business Trends 2009Small Business Trends 2009
Small Business Trends 2009
 
Understanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo MatarreseUnderstanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo Matarrese
 
Macro Business Environment in India
Macro Business Environment in IndiaMacro Business Environment in India
Macro Business Environment in India
 
SMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTapSMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTap
 
CHAPTER 1
CHAPTER 1CHAPTER 1
CHAPTER 1
 
Adobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceAdobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer Experience
 
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
 
7 strategies of Best Managed companies
7 strategies of Best Managed companies7 strategies of Best Managed companies
7 strategies of Best Managed companies
 
IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)
IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)
IT Support Companies: Here’s What Your SMB Clients REALLY Want (Slides)
 
Lead share alternative_financing_presentation
Lead share alternative_financing_presentationLead share alternative_financing_presentation
Lead share alternative_financing_presentation
 

Plus de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Accidental entrepreneur

  • 1. Accidental Entrepreneur June 13, 2012 The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 1
  • 2. The Accidental Entrepreneur is NOT a Theory Anymore The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 2
  • 3. Business Creation Up during and after Great Recession • Great Recession caused unprecedented business death AND unprecedented business birth • 60,000 more new businesses were created per month in 2009 than in 2007 • Trend Continues…70,000 more per month in 2010, and 50,000 more per month in 2011 The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 3 Source: Kauffman Index of Entrepreneurial Activity 1996-2011, March 2012
  • 4. Research Methodology • Survey performed by Forrester Consulting • 305 U.S. SMBs (3 to 250 employees) – 50/50 split among companies founded pre- and post-2008 • Company executive or IT decision maker • Cross industry Objective: Understand the differences – with respect to technology adoption/ utilization /consumption models – between SMBs started since 2008 as a result of the recession (accidental entrepreneurs) and those started prior to 2008. The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 4
  • 5. Who is the Accidental Entrepreneur? • Laid off from white collar job • Returning from war • The “newly unretired” • Stay-at-home spouses • Not just “old economy” • White collar, tech-savvy professionals at the peak of their career The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 5
  • 6. How are Accidental Entrepreneurs different? Key Findings • Driven by profits not passion • Bullish about growth • Take dramatic and immediate advantage of the cloud • Better prepared to scale security • More self-sufficient in making software decisions The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 6 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 7. Profits not passion drive post-2008 small businesses • 54% of SBs founded post-2008 have an exit strategy(15% higher) • 34% of founders of SBs since 2008 come from large enterprises (500+ employee) • 35% left their large employers due to the recession The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 7 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 8. Growing faster than traditional small businesses • Four times as many Accidental Entrepreneurs expect to double their number of employees in the next two years • 75% expect revenue to grow more than 10 percent in the next year The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 8 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 9. Trust more applications to the cloud • 21% of Accidental Entrepreneurs have zero servers and 35% have 3+ servers – Sophisticated IT infrastructure; four times more likely to build in the cloud • 51% deploy cloud software – 26% have implemented cloud security vs. 16% of pre-2008 • All SBs aggressively adopting cloud storage and backup – 32% post-2008 and 29% of pre-2008 The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 9 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 10. Better prepared to scale security for growth • Turn to the cloud more for endpoint, network firewall, email and web security • 27% more confident that their current security solution will scale The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 10 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 11. More self-sufficient in making software decisions • Base software decisions on what the founder used in their previous job or as a consumer (across all software types) • Strongly prefer known brands • Extremely less likely than pre-recession SBs to rely on VAR recommendation for collaboration and security software The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 11 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 12. Accidental Entrepreneurs Are Velociraptors Feasting On The Herd The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 12
  • 13. Conclusions • Accidental Entrepreneurs: – Are growing significantly faster and at the expense of less technically- confident, less agile, less ‘connected’ small business owner – Are mostly “Enterprise-like” or “Cutting Edge” companies – Are very likely to acquire “consumer technology” at retail and then seek to modify it as their needs become more complex – Need simple, easy-to-deploy and easy-to-manage solutions that can keep pace as they quickly scale their company The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 13
  • 14. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 14