SlideShare a Scribd company logo
1 of 13
Download to read offline
Symantec To Acquire VeriSign’s
Identity and Authentication Business

May 19, 2010
Forward-Looking Statements
• This presentation contains forward-looking statements within the
  meaning of U.S. federal securities laws, including expectations
  regarding the closing of Symantec’s acquisition of VeriSign’s identity
  and authentication business and the integration of their products and
  technologies into Symantec’s products and solutions, that involve
  known and unknown risks and uncertainties that may cause actual
  results to differ materially from those expressed or implied in this
  presentation. Such risks include, among others, satisfaction of closing
  conditions to the transaction, our ability to successfully integrate the
  acquired businesses and technologies, and customer demand for the
  technologies and integrated product offerings. Actual results may
  differ materially from those contained in the forward-looking
  statements contained in this presentation. Additional information
  concerning these and other risk factors is contained in the Risk
  Factors section of Symantec’s Form 10-K for the year ended April 3,
  2009. Symantec assumes no obligation to update any forward-looking
  statement contained in this presentation.

                                                                         2
What Are We Announcing Today?
• Symantec to acquire VeriSign’s identity and authentication business
    – Server authentication services composed of secure sockets layer (SSL) & trust services
    – User authentication services composed of hosted public key infrastructure (PKI), and VeriSign
      identity protection (VIP).
    – Purchase price includes majority equity stake (54%) of publicly-traded Japanese subsidiary
    – Revenue of $408 million for LTM ending March 31, 2010 (1)
• Aggregate purchase price of $1.28 billion
    – Funded with cash from Symantec’s balance sheet to utilize approx. $300-$400m of offshore cash
• Operations
    – Acquired business with approx. 900 employees to join Enterprise Security Group led by Francis
      deSouza
    – Products and services to be sold through both Symantec and VeriSign channels
    – Shared services provided by VeriSign under transition services agreement (TSA)
• Transaction expected to be 9 cents dilutive to non-GAAP EPS during FY11 due to
  purchase price write down of deferred revenue. Will become accretive in Q2FY12.
• Expected to close by end of September quarter pending regulatory approval
(1) Japanese subsidiary (TSE: 3722) generated $81Mof revenue. Revenue ex-Japanese subsidiary is $327M.
                                                                                                         3
    Including the 54% of revenue from Japanese subsidiary results in $371M of revenue.
Why VeriSign’s Identity and Authentication business?
1. Trust and identity are key to the future of securing and managing information
   – VeriSign is the leading provider of digital authentication services, enabling trusted interactions within
     and across businesses, consumers, applications and processes
   – With identity security, Symantec solutions can enable information access control, enhanced data security
     and better enforcement of compliance policies
2. Strengthens Symantec’s cloud initiatives
   – Benefit from strong VeriSign brand which is highly-relevant to enterprises and consumers
   – Infrastructure can securely process more than 2 billion certificate checks per day
   – VeriSign’s strong brand, emerging trust services business and Symantec’s leading high-capacity web
     scanning capabilities combine to drive growth
   – Hosted PKI offerings complement the capabilities of our recent PGP acquisition
   – VIP user authentication service complements our Norton Identity Safe capabilities
   – Combine with Data Loss Prevention and Data Insight technology to ensure only authorized users have
     access to specific information
3. New cross-sell opportunities and go-to-market advantages to increase average deal value
   – Sell products to protect the server (e.g., Critical System Protection) to customers who purchase SSL to
     secure transactions
   – Add SSL to suites, such as Symantec Protection Suite for Servers managed by Symantec Protection Center
   – Sell VeriSign user authentication into Symantec install base utilizing reach of Symantec sales force
   – Utilize VeriSign’s high volume web store to expand reach into small business segment
                                                                                                                 4
Market Leading Position

      Technology Leadership                Market Leadership
    • Offers the highest and          • 4 million SSL certificates issued
      broadest standards of             to date
      authentication
                                      • Secures more than 1 million
    • Robust management console,        web servers
      creating highly sticky
      relationship with enterprises


                                             Brand Strength
     Attractive Customer Base
                                      • As high as 250 million
    • Displayed on over 90,000 Web      impressions in one day of the
      sites                             VeriSign checkmark
    • 2+ billion certificate status   • VeriSign seal has driven as
      checks per day                    much as 36% sales uplift for
                                        online retailers



                                                                            5
Identity & Authentication Business At A Glance
                                                                                  CY09 Authentication
• Strong renewal rates drive cash flow                                             Revenue Segments
  generation and operating margins
• Approximately 60% of authentication
                                                                                      85% Server             15% User
  business generated in the US
                                                                                      Auth.(SSL)          Auth. (PKI & VIP)
   Historical Authentication Revenue
          CY07 to CY09: 8.5% CAGR                                Product                Description
                                                                                        Encrypts and authenticates information
                                           $410M                 SSL Authentication
                      $399M                                      (VeriSign, Thawte,
                                                                                        for secure online transactions. Leader in
 $349M                                                           GeoTrust brands)
                                                                                        secure sockets layer authentication
                                                                                        market.
                                                                                        Scans site and identifies as safe to browse.
                                                                 Trust Services         Target beyond eCommerce sites.
                                                                                        Launched in Feb 2010.
                                                                                        Issues certificates to create a trusted
                                                                 PKI                    ecosystem across users and networks.
                                                                                        Hosted service.
                                                                                        Verifies identity via two-factor
                                                                 VIP                    authentication to permit secure online
  2007                  2008                 2009                                       transactions. Multiple credential choices.


Note: Revenue segment percentages do not include majority-owned Japan entity                                                      6
Sales and Go-To-Market Capabilities
                                                                         CY09 Identity & Authentication
 • Global, multi-tiered channel strategy                                       Go-To-Market Mix
   addresses SSL needs of large
   enterprises to small businesses
                                                                                Indirect

     – Enterprise sales force composed of                                         21%
                                                                                            Direct &
       strategic account managers as well as                                               Telesales
                                                                                              44%
       telesales                                                              Web Store
                                                                                35%
     – Direct sales to end-users on the web
     – 10,000 partners
 • SSL business has multi-brand strategy
     – Target distinct customer segments
       through premium VeriSign, and value
       Thawte and Geotrust brands
 • Hosted PKI and VIP web offerings
   primarily utilize a direct model
Note: Go-to-market data does not consider majority-owned Japan entity.                                    7
Bringing Premium Brands Together
• The acquisition creates a unique opportunity to redefine and
  strengthen our brand
  – Symantec to begin transition of brand post close
  – Shared use of VeriSign name during transition period
  – Symantec will retain exclusive rights to graphic identity (the “check mark”)




                                                                               8
VeriSign & Symantec:
Providing Trust For People And Information




                              Identity
                   Verify Who Is Accessing Information


                            Protection
                          Keep Information Safe


                              Context
                   Understand How Information Is Used



                  Trusted Transaction



                                                         9
VeriSign & Symantec:
Creating A Convenient And Secure Experience

 Information at Rest                                                                             Information in Use


                                               Information in Motion
                                                Security & Hosted Services

                                    •   SSL Certificates     •   Hosted Messaging Security
                                    •   Hosted PKI           •   Hosted Web Security
                                    •   VIP                  •   Hosted Endpoint Protection
                                    •   Trust Services       •   Web Gateway
• Critical System Protection        •   Data Loss Prevention •   Network Access Control       • Symantec Endpoint Protection
• Endpoint Protection for Servers   •   Encryption           •   FileStore                    • Control Compliance Suite
• NetBackup & Backup Exec                                    •   Norton Online Backup         • Norton Security Suites
• Enterprise Vault                                                                            • Mobile Antivirus
• Storage Foundation                                                                          • Mobile Management
• Workflow                                                                                    • Altiris IT Mgmt Suite




        Symantec provides trust across endpoints, data centers and the cloud.
 Authentication technology protects information in motion across these environments.

                                                                                                                        10
Market Expansion: Addressable Market Opportunity
   • Symantec gains entry into identity market
                                                                                                            Total 2013 Market = $1.6B
                                                                                                            10-13 CAGR = 7.5%
      ($ Millions)                                                                            1,576
                                                                  1,464
            1,268                     1,293
                                                                                                               Adv Authentication = $737M
                                                                                                737            10-13 CAGR = 7.4%
                                                                    669
               595                       620



                                                                                                                Credentials = $839M
                                                                    795                         839             10-13 CAGR = 7.6%
               673                       673




             2010                       2011                       2012                       2013
                          Credentials                       Advanced Authentication
Note: “Advanced Authentication (or server authentication) includes SSL. “Credentials” (or user authentication) includes personal
portable security device (PPSD) and software licensing and authentication tokens (SLAT).
  Source: IDC, Worldwide Identity and Access Management 2009-2013 Forecast and 2008 Vendor Shares.                                    11
  Doc # 219008, July 2009.
Summary:
Everything Revolves Around People and Information
• Creates the most trusted brand for protecting information and
  identities online.
• Adds market leading identity security services that are critical
  for providing individuals and businesses with secure access to
  their information from any device, across any application, at
  any time.
• Complementary technologies provide the most comprehensive
  security for information when it is at rest, in motion, or in use.
• Offers compelling cross-selling opportunities into combined
  customer base.
• Expands Symantec’s addressable security market opportunity.


                                                                       12
Thank you
        Helyn Corcos
        hcorcos@symantec.com
        (650) 527-5523


Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. All rights reserved. VeriSign and the Checkmark Circle Design are registered trademarks of VeriSign, Inc. Symantec will acquire the
Checkmark Circle Design mark from VeriSign as a part of the acquisition. Symantec plans to use the Checkmark Circle Design mark in connection with the business after
completion of the acquisition. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                   13

More Related Content

More from Symantec

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 

More from Symantec (20)

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Symantec Acquires VeriSign Security Business

  • 1. Symantec To Acquire VeriSign’s Identity and Authentication Business May 19, 2010
  • 2. Forward-Looking Statements • This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including expectations regarding the closing of Symantec’s acquisition of VeriSign’s identity and authentication business and the integration of their products and technologies into Symantec’s products and solutions, that involve known and unknown risks and uncertainties that may cause actual results to differ materially from those expressed or implied in this presentation. Such risks include, among others, satisfaction of closing conditions to the transaction, our ability to successfully integrate the acquired businesses and technologies, and customer demand for the technologies and integrated product offerings. Actual results may differ materially from those contained in the forward-looking statements contained in this presentation. Additional information concerning these and other risk factors is contained in the Risk Factors section of Symantec’s Form 10-K for the year ended April 3, 2009. Symantec assumes no obligation to update any forward-looking statement contained in this presentation. 2
  • 3. What Are We Announcing Today? • Symantec to acquire VeriSign’s identity and authentication business – Server authentication services composed of secure sockets layer (SSL) & trust services – User authentication services composed of hosted public key infrastructure (PKI), and VeriSign identity protection (VIP). – Purchase price includes majority equity stake (54%) of publicly-traded Japanese subsidiary – Revenue of $408 million for LTM ending March 31, 2010 (1) • Aggregate purchase price of $1.28 billion – Funded with cash from Symantec’s balance sheet to utilize approx. $300-$400m of offshore cash • Operations – Acquired business with approx. 900 employees to join Enterprise Security Group led by Francis deSouza – Products and services to be sold through both Symantec and VeriSign channels – Shared services provided by VeriSign under transition services agreement (TSA) • Transaction expected to be 9 cents dilutive to non-GAAP EPS during FY11 due to purchase price write down of deferred revenue. Will become accretive in Q2FY12. • Expected to close by end of September quarter pending regulatory approval (1) Japanese subsidiary (TSE: 3722) generated $81Mof revenue. Revenue ex-Japanese subsidiary is $327M. 3 Including the 54% of revenue from Japanese subsidiary results in $371M of revenue.
  • 4. Why VeriSign’s Identity and Authentication business? 1. Trust and identity are key to the future of securing and managing information – VeriSign is the leading provider of digital authentication services, enabling trusted interactions within and across businesses, consumers, applications and processes – With identity security, Symantec solutions can enable information access control, enhanced data security and better enforcement of compliance policies 2. Strengthens Symantec’s cloud initiatives – Benefit from strong VeriSign brand which is highly-relevant to enterprises and consumers – Infrastructure can securely process more than 2 billion certificate checks per day – VeriSign’s strong brand, emerging trust services business and Symantec’s leading high-capacity web scanning capabilities combine to drive growth – Hosted PKI offerings complement the capabilities of our recent PGP acquisition – VIP user authentication service complements our Norton Identity Safe capabilities – Combine with Data Loss Prevention and Data Insight technology to ensure only authorized users have access to specific information 3. New cross-sell opportunities and go-to-market advantages to increase average deal value – Sell products to protect the server (e.g., Critical System Protection) to customers who purchase SSL to secure transactions – Add SSL to suites, such as Symantec Protection Suite for Servers managed by Symantec Protection Center – Sell VeriSign user authentication into Symantec install base utilizing reach of Symantec sales force – Utilize VeriSign’s high volume web store to expand reach into small business segment 4
  • 5. Market Leading Position Technology Leadership Market Leadership • Offers the highest and • 4 million SSL certificates issued broadest standards of to date authentication • Secures more than 1 million • Robust management console, web servers creating highly sticky relationship with enterprises Brand Strength Attractive Customer Base • As high as 250 million • Displayed on over 90,000 Web impressions in one day of the sites VeriSign checkmark • 2+ billion certificate status • VeriSign seal has driven as checks per day much as 36% sales uplift for online retailers 5
  • 6. Identity & Authentication Business At A Glance CY09 Authentication • Strong renewal rates drive cash flow Revenue Segments generation and operating margins • Approximately 60% of authentication 85% Server 15% User business generated in the US Auth.(SSL) Auth. (PKI & VIP) Historical Authentication Revenue CY07 to CY09: 8.5% CAGR Product Description Encrypts and authenticates information $410M SSL Authentication $399M (VeriSign, Thawte, for secure online transactions. Leader in $349M GeoTrust brands) secure sockets layer authentication market. Scans site and identifies as safe to browse. Trust Services Target beyond eCommerce sites. Launched in Feb 2010. Issues certificates to create a trusted PKI ecosystem across users and networks. Hosted service. Verifies identity via two-factor VIP authentication to permit secure online 2007 2008 2009 transactions. Multiple credential choices. Note: Revenue segment percentages do not include majority-owned Japan entity 6
  • 7. Sales and Go-To-Market Capabilities CY09 Identity & Authentication • Global, multi-tiered channel strategy Go-To-Market Mix addresses SSL needs of large enterprises to small businesses Indirect – Enterprise sales force composed of 21% Direct & strategic account managers as well as Telesales 44% telesales Web Store 35% – Direct sales to end-users on the web – 10,000 partners • SSL business has multi-brand strategy – Target distinct customer segments through premium VeriSign, and value Thawte and Geotrust brands • Hosted PKI and VIP web offerings primarily utilize a direct model Note: Go-to-market data does not consider majority-owned Japan entity. 7
  • 8. Bringing Premium Brands Together • The acquisition creates a unique opportunity to redefine and strengthen our brand – Symantec to begin transition of brand post close – Shared use of VeriSign name during transition period – Symantec will retain exclusive rights to graphic identity (the “check mark”) 8
  • 9. VeriSign & Symantec: Providing Trust For People And Information Identity Verify Who Is Accessing Information Protection Keep Information Safe Context Understand How Information Is Used Trusted Transaction 9
  • 10. VeriSign & Symantec: Creating A Convenient And Secure Experience Information at Rest Information in Use Information in Motion Security & Hosted Services • SSL Certificates • Hosted Messaging Security • Hosted PKI • Hosted Web Security • VIP • Hosted Endpoint Protection • Trust Services • Web Gateway • Critical System Protection • Data Loss Prevention • Network Access Control • Symantec Endpoint Protection • Endpoint Protection for Servers • Encryption • FileStore • Control Compliance Suite • NetBackup & Backup Exec • Norton Online Backup • Norton Security Suites • Enterprise Vault • Mobile Antivirus • Storage Foundation • Mobile Management • Workflow • Altiris IT Mgmt Suite Symantec provides trust across endpoints, data centers and the cloud. Authentication technology protects information in motion across these environments. 10
  • 11. Market Expansion: Addressable Market Opportunity • Symantec gains entry into identity market Total 2013 Market = $1.6B 10-13 CAGR = 7.5% ($ Millions) 1,576 1,464 1,268 1,293 Adv Authentication = $737M 737 10-13 CAGR = 7.4% 669 595 620 Credentials = $839M 795 839 10-13 CAGR = 7.6% 673 673 2010 2011 2012 2013 Credentials Advanced Authentication Note: “Advanced Authentication (or server authentication) includes SSL. “Credentials” (or user authentication) includes personal portable security device (PPSD) and software licensing and authentication tokens (SLAT). Source: IDC, Worldwide Identity and Access Management 2009-2013 Forecast and 2008 Vendor Shares. 11 Doc # 219008, July 2009.
  • 12. Summary: Everything Revolves Around People and Information • Creates the most trusted brand for protecting information and identities online. • Adds market leading identity security services that are critical for providing individuals and businesses with secure access to their information from any device, across any application, at any time. • Complementary technologies provide the most comprehensive security for information when it is at rest, in motion, or in use. • Offers compelling cross-selling opportunities into combined customer base. • Expands Symantec’s addressable security market opportunity. 12
  • 13. Thank you Helyn Corcos hcorcos@symantec.com (650) 527-5523 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. All rights reserved. VeriSign and the Checkmark Circle Design are registered trademarks of VeriSign, Inc. Symantec will acquire the Checkmark Circle Design mark from VeriSign as a part of the acquisition. Symantec plans to use the Checkmark Circle Design mark in connection with the business after completion of the acquisition. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 13