!"#$%&()*+$,-.#$)/-001(2)        !"#$%                                 &()*+%                             ,-"./01"+%
!"#$%&()*+$,-.#$)3($%$"&1.")        !"#$%                                     &()*+%                                 ,-"./...
!"#$%&()4$1()/5$$&)        !"#$%                           &()*+%                       ,-"./01"+%
61(7$."8)391"):)    23-43*$%                    ,54++)+*%                   670/1"+%
;(<(1&$)=(1">)?1-",5)    23-43*$%                           ,54++)+*%                          670/1"+%
6$%%18@"8)391A(0%)1">)B-@>$%)    !"#$%                                 &()*+%
!"#$%&"$(")"*&+,$
%-."+/$0,,12,3"4",$                                                                                                       ...
5-1)23$0,,12,3"4",$                                                                                                       ...
%-."+/$0,,12,3"4",$                                                                                                       ...
62*14"-$7"8*9":"-$                                                                                                        ...
5>0.)%?*2#6:(%   6.4<.&+,$                                                                                                ...
!"#$$%&()*+)#,-#.$/"                                                                                                      ...
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Portfolio
Upcoming SlideShare
Loading in …5
×

Portfolio

952 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
952
On SlideShare
0
From Embeds
0
Number of Embeds
47
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Portfolio

  1. 1. !"#$%&()*+$,-.#$)/-001(2) !"#$% &()*+% ,-"./01"+%
  2. 2. !"#$%&()*+$,-.#$)3($%$"&1.") !"#$% &()*+% ,-"./01"+%
  3. 3. !"#$%&()4$1()/5$$&) !"#$% &()*+% ,-"./01"+%
  4. 4. 61(7$."8)391"):) 23-43*$% ,54++)+*% 670/1"+%
  5. 5. ;(<(1&$)=(1">)?1-",5) 23-43*$% ,54++)+*% 670/1"+%
  6. 6. 6$%%18@"8)391A(0%)1">)B-@>$%) !"#$% &()*+%
  7. 7. !"#$%&"$(")"*&+,$
  8. 8. %-."+/$0,,12,3"4",$ !"#$% &()*+,-".% /012%3042-".(% ! !"#$%!&!!()*+!,-.%/01!2%345%!6785985#:%!)-;8<=!2:5#:%$>! ! ! #??/-$!@/0:%5/-$!#-?!/-:%00/$%-3%!#35811!#00!?%./3%1!#-?!183/#0!-%:A85B1C!(DE!35%#:%1!#!1#@%!%-./F 58-G%-:!@85!3800#;85#:/8-!#-?!/--8.#:/8-H!I/:J!#!1/G/0#5!:%3J-808$>!@88:95/-:!:8!:J%!K0#3BK%55>! D-:%595/1%!2%5.%5!#-?!:J%!*)(!L%:A85B!/-@5#1:543:45%C!(DE!/1!#99%#0/-$!:8!)M!9%518--%0!1/-3%!/:! ()*+,(+- @8008A1!:J%!:%3J-808$>!G8?%0!8@!:J%1%!@#G/0/#5!1>1:%G1!;>!/-:%$5#:/-$!A/:J!(/35818@:!D<3J#-$%! ,./$%01234 #-?!?%0/.%5/-$!G%11#$%1!:J584$J!:J%!()*+!1%345%!-%:A85BH!(DE!A/00!#018!958./?%!89%5#:/8-#0! 5#$".42 %@@/3/%-3/%1!#-?!/-35%#1%?!1%345/:>!;>!8@@%5/-$!@400!#4?/:/-$!8@!38GG4-/3#:/8-1H!! 67686798:;67 ! ! !"#$%&()*$"+(,-).. N85!#??/:/8-#0!/-@85G#:/8-!8-!()*+C!90%#1%!./1/:!!!!"#$%&"(#H!N85!95%11!/-O4/5/%1C!38-:#3:! P4?5%>!2#J0!#:!Q&R&S!&RT!!U+&RH! ! !"#$%&()"*+%+),&#)%-,.#/.#01)%"2.34%+1#01)56% "#$%&!()*! % ()*+C!)-3H!/1!:J%!0%#?/-$!?%.%089%5!8@!)-:%00/$%-:!L8:/@/3#:/8-!#-?!5%198-1%!18@:A#5%C!AJ/3J!J%091! /01&1-"012.34-#2$56.74"84(.91(!0.0.:20(8*-4.;(04-048.<"04="6.. 85$#-/V#:/8-1!%-J#-3%!38GG4-/3#:/8-!#;/0/:/%1C!958:%3:!#11%:1!#-?!/-35%#1%!89%5#:/8-#0!%@@/3/%-F &(.>"&4$6.?210125.0#4.@(+("04.:2AB.=10#.0#4.>-1"$.:2AB.. 3>H!()*+!:%3J-808$>!%-#;0%1!#?.#-3%?!5#9/?C!:A8FA#>!38GG4-/3#:/8-!@85!)MC!;41/-%11!38-:/-4/F . :>!#-?!%-:%595/1%!89%5#:/8-1!@85!G#->!8@!:J%!E08;#0!NW*M,LD!RUU!38G9#-/%1C!#1!A%00!#1!$8.F +0%7")5.%!<2$=367>6:77&?@AB3B3%AC=$%2DACED3AFB2G20F$#"%"2A4B#13#$B<%DD2E%1%$8 %5-G%-:!%-:/:/%1C!4-/.%51/:/%1C!#-?!38G9#-/%1!8@!#00!1/V%1!/-!G85%!:J#-!R+U!384-:5/%1H!N85!G85%! HA=%!1<1&B%IBD2C/ACDB2CB"%DD2EACE!J<&>2C/B3%AC=$%2DACE$%4A2C=%#CD#=A24C%BG#$KD> /-@85G#:/8-C!./1/:!AAAHG/5+H38GH! <JL;>JC=M>B3%ACC#H2B#$#F$%248BA"%JCB%44AE%CB*#BAFA=2BA#CN2C/$%DO#CD%B%=3C#4#E0>2C8 ! C#.C=%/B#/20ABDO42CDB#.CAB%P.DAC%DD=#"".CA=2BA#CP0P$A/EACEP#B3B3%%CB%$O$AD%2C/ )*(+%,-./0,.123$24$.5%(+67.89+:$;,::.<:,%.*+%=,>7.?@@AB.*4+3>.. D#=A24ACP#I%DB#=$%2B%#C%=%CB$242C/D%=.$%Q=#$O#$2B%ACP#IMR+3%=#"O2C0SDHADA#CGA44P% XXX! D.OO#$B%/P0ABDC%G<JL;TCB%$O$AD%U2B%G20N!<TUN&B%=3C#4#E0M<TUP$ACEDB3%O#G%$ 2C/F4%IAPA4AB0#FD#=A24C%BG#$KACEB#=#$O#$2B%.D%$DB3$#.E32O$#B%=B%/O42BF#$"B32BD%$H%D 2D2=%CB$24AV%/$%O#DAB#$0B32BGA44=#CD#4A/2B%>%D=242B%>FA4B%$2C/O$A#$ABAV%2.D%$SD=#"".CA8 =2BA#C2=$#DD244/%HA=%DACB##C%=%CB$24ACP#IM Q,F%G"#CB3D2E#>52=%P##K2CC#.C=%/ABDO42CDB#=#CD#4A/2B%244=#"".CA=2BA#CACB#2DAC8 E4%D#=A24ACP#I>%DD%CBA2440P%=#"ACEB3%.4BA"2B%DGAB=3P#2$/>RD2A/,"A$<#.DD2HA2C>O$%DA8 /%CB2C/(T)#F<JL;MQ).$DB$2B%E0ADB#%IB%C/B32B=#C=%OBB#B3%%CB%$O$AD%>DB2$BACEGAB3 #.$DB$#CE=.DB#"%$P2D%>P0P.A4/ACE#C#.$%IADBACE2$=3AB%=B.$%M@%GA44P%2P4%B#EAH%#.$ =#$O#$2B%.D%$DF.44=#CB$#4#FB3%A$=#"".CA=2BA#CD2=$#DD2C0/%HA=%#$D#=A24C%BG#$K>=$%2B8 ACE2DACE4%>=#CBAC.#.D2C/D%=.$%=#CH%$D2BA#CB32BADO42BF#$"AC/%O%C/%CBMR +3%<TU=#$O#$2B%ACP#I%FF%=BAH%402//$%DD%D2=#""#CO$#P4%"#F=#"O2CA%D-G#$K%$D2$% AC.C/2B%/GAB3=#"".CA=2BA#CGAB3C#D%=.$%G20B#4ACK2C/O$A#$ABAV%/ADO2$2B%=#"".CA=28 BA#CO42BF#$"D>=$%2BACEAC%FFA=A%C=A%D>G2DB%/BA"%2C/"ADD%/#OO#$B.CABA%DM,==#$/ACEB#2 DB./0P0+3%L2/A=2BAU$#.O>JC=M>P.DAC%DD.D%$DDO%C/2C2H%$2E%#F79O%$=%CB#FB3%A$G#$K8 /20D%C/ACE2C/$%=%AHACE%"2A4D2C/D%H%CO%$=%CB#FB3%A$/20ACDB2CB"%DD2EACEMW,//ABA#C248 40>%CB%$O$AD%.D%$DD%C/2C/$%=%AH%#C2H%$2E%7:XP.DAC%DD%"2A4D2/20>C#BB#"%CBA#CBA"% DO%CB#CB%4%O3#C%2C/=#CF%$%C=%=244DM@AB3<TU><JL;GA444%2/B3%O2$2/AE"D3AFBGAB3AC B3%%CB%$O$AD%P0.DACEABD%IADBACEB%=3C#4#E02C/=#$O#$2B%F##BO$ACBB#DA"O4AF0=#"".CA=28 BA#CD#B32BG#$K%$D=.BB3$#.E3B3%=4.BB%$2C/A"O$#H%B3%A$O$#/.=BAHAB0M @AB3"#$%B32CD%H%C"A44A#C.D%$D>%C=#"O2DDACEO.P4A=2C/O$AH2B%=#"O2CA%D>%/.=2BA#C24 ACDBAB.BA#CD2C/E#H%$C"%CB2E%C=A%DAC=4./ACEY23##Z!*,1[,-Y,]))&>U##/0%2$!*Y1T- U+&>^T+()>+3%_M1M(%CB%$DF#$[AD%2D%(#CB$#42C/B3%_CAH%$DAB0#F^%CCD04H2CA2>B3%<JL; F42ED3AOC#BAFA=2BA#CO42BF#$"ACTCB%$O$AD%NADB$.DB%/F#$A"O#$B2CB"%DD2E%/%4AH%$0F#$P.DA8 C%DD=#CBAC.AB0>/AD2DB%$$%=#H%$0>%"%$E%C=0C#BAFA=2BA#C2C/J+24%$BACEM % `.A4B#CB3ADAC/.DB$084%2/ACE2C/O$#H%CC#BAFA=2BA#CB%=3C#4#E0><TU%C32C=%D2C/DB$%2"8 4AC%D=#$O#$2BA#CDS=#"".CA=2BA#CM`0=#"PACACE244O42BF#$"DACB##C%=%CB$24ACP#I2C/ !"#$%&
  9. 9. 5-1)23$0,,12,3"4",$ !"#$% /012%3042-".(% !"#$%&%%()*+%*$,-.$-/0%)-/$11,#$-/%23/,4,5"/,3-%6,/7%2$6%8$"/9:$0%"-;%!:3;95/%<3-4,#9:"/,3-0%43:%=->%?90,-$00% !"#$%!$& @A$%7".$%0B$-/%>$":0%;$.$13B,-#C%";"B/,-#%"-;%B$:4$5/,-#%)-/$11,#$-/%23/,4,5"/,3-C%63:D,-#% !"#$%&()#*"*& 7"-;E,-E7"-;%6,/7%590/3F$:0%673%:$1>%3-%39:%B:3;95/0%$.$:>%;">CG%";;$;%(3900".,"-H%@I7$,:% +,-./&,*01& B":/,5,B"/,3-%"-;%6,11,-#-$00%/3%07":$%/7$,:%4,:0/E7"-;%$JB$:,$-5$C%34/$-%9-;$:%B:$009:$%"-;%,-% 232456748629& 5:,/,5"1%0,/9"/,3-0C%":$%67"/%F"D$%)-/$11,#$-/%23/,4,5"/,3-%.+HK%03%,-/9,/,.$%"-;%90$:E4:,$-;1>H% !"#$%&()#*"*+,(#-&!$,.. A$L:$%B:39;%/3%M$%-3/%3-1>%$":1>C%M9/%3-#3,-#%,--3."/3:0%,-%-3/,4,5"/,3-%0319/,3-%M90,-$00HG% % & ()*+*,)#-,#$.)#$,//)0,#$#"$)1)!%$)"#2)$3#,21,%$4*,. )-/$11,#$-/%23/,4,5"/,3-%.+HK%-36%53F$0%,-%/7:$$%$;,/,3-0C%/",13:$;%/3%F$$/%/7$%-$$;0%34% %#56*"54!$!"#1)04*%$)"#.1"*%#784.)#,.. ,-;,.,;9"1%M90,-$00$0H%I7$%$;,/,3-0%":$%"0%4311360% ! • !"#$%&$#(%)%*+%/7$%B:$F,$:%0319/,3-%43:%$-/$:B:,0$0%34%"->%0,N$%6,/7%"%#13M"1%:$"57% /)0.1)*)#"($*.2#$34!.5"6.6%))7.*)8.9:;."*3.)"6<=$=46).>4*!($*"%(<. "-;%"%6,;$%.":,$/>%34%53FF9-,5"/,3-%-$$;0H% • ,)-+(-"(#(%)%*+%/",13:$;%43:%F$;,9F%/3%1":#$%53FB"-,$0%/7"/%-$$;%"%4911E4$"/9:$;%>$/% .%#5),0"9%:;<=>?@AB>ACD+,-./&,*01/:;)&(**$<":$#&$=&#)"%4:(>)&(*:)%%(?)*:&*$:(=(0":($*&"*@& 0/:$"F1,-$;%-3/,4,5"/,3-%0>0/$F%6,/7%03B7,0/,5"/$;%;"/"%F"-"#$F$-/H% #)AB$*A)&:)0;*$%$?C/&:$@"C&"**$D*0)@&:;)&#)%)"A)&$=&(:A&=%"?A;(B&B#$@D0:/&,*:)%%(?)*:& •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• !$>B%):)&*"<(?":($*"%&#)$#?"*(J":($*&:$&#)=%)0:&:;)&F"C&0DA:$>)#A&DA)&:;)&B#$@D0:1& #3.$:-F$-/%$-/,/,$0C%9-,.$:0,/,$0C%"-;%53FB"-,$0%34%"11%0,N$0%,-%F3:$%/7"-%Q+K%539-/:,$0H%P":/-$:% • P@<"*0)@&N#"*@(*?&$BB$#:D*(:()A&=$#&0$>B"*()A&:;":&F(A;&:$&N#"*@&,*:)%%(?)*:& )-5H%7"0%-"F$;%()*+%"%1$";$:%,-%,/0%&KQ&%("#,5%R9";:"-/%43:%ST%UF$:#$-5>O("00%23/,4,5"/,3-% E$:(=(0":($*&F(:;&:;)(#&0$#B$#":)&%$$H&"*@&=))%1& T$:.,5$0%VU(2TWH%83:%F3:$%,-43:F"/,3-C%.,0,/%666HF,:+H53FH%831136%()*+%3-%I6,//$:%X()*+H% • E$:(=(0":($*&(*N$U&N"@?)&A$&DA)#A&A))&":&"&?%"*0)&;$F&>"*C&*$:(=(0":($*A&:;)C&;"<)& Y,0,/%/7$%()*+%M13#%666HF,:+H53FOM13#H% B)*@(*?1& % • E)F&#)B$#:A&:;":&"#)&(*0%D@)@&(*&)<)#C&)@(:($*&$=&:;)&B#$@D0:&(*0%D@)&:;)&!DA:$>& ZZZ% V)#N("?)&#)B$#:&F;(0;&@(AB%"CA&<)#N("?)&D*(WD)&:$&)"0;&0$>B"*CX&I"A:&I$?(*&#)B$#:/& P0:(<(:C&#)B$#:&A;$F(*?&"0:(<(:C&F(:;(*&AB)0(=(0&B"#">):)#A&"*@&"*&Q*;"*0)@&Y#$DB& +)>N)#&#)B$#:1& • Z(>B%(=(0":($*&$=&:)#>(*$%$?C/&"&@)@(0":)@&B#$=(%)&:"N/&)"A()#&"00)AA&:$&ADBB$#:& @$0D>)*:":($*&"*@&(>B#$<)@&"D@(:(*?1&& & [&>$#)&[&
  10. 10. %-."+/$0,,12,3"4",$ !"#$% &()*+,-".% /012%3042-".(% ! !"#$%!&!!()*+!,-.%/01!2%345%!6785985#:%!)-;8<=!2:5#:%$>! ! ! #??/-$!@/0:%5/-$!#-?!/-:%00/$%-3%!#35811!#00!?%./3%1!#-?!183/#0!-%:A85B1C!(DE!35%#:%1!#!1#@%!%-./F 58-G%-:!@85!3800#;85#:/8-!#-?!/--8.#:/8-H!I/:J!#!1/G/0#5!:%3J-808$>!@88:95/-:!:8!:J%!K0#3BK%55>! D-:%595/1%!2%5.%5!#-?!:J%!*)(!L%:A85B!/-@5#1:543:45%C!(DE!/1!#99%#0/-$!:8!)M!9%518--%0!1/-3%!/:! ()*+,(+- @8008A1!:J%!:%3J-808$>!G8?%0!8@!:J%1%!@#G/0/#5!1>1:%G1!;>!/-:%$5#:/-$!A/:J!(/35818@:!D<3J#-$%! ,./$%01234 #-?!?%0/.%5/-$!G%11#$%1!:J584$J!:J%!()*+!1%345%!-%:A85BH!(DE!A/00!#018!958./?%!89%5#:/8-#0! 5#$".42 %@@/3/%-3/%1!#-?!/-35%#1%?!1%345/:>!;>!8@@%5/-$!@400!#4?/:/-$!8@!38GG4-/3#:/8-1H!! 67686798:;67 ! ! !"#$%&()*$"+(,-).. N85!#??/:/8-#0!/-@85G#:/8-!8-!()*+C!90%#1%!./1/:!!!!"#$%&"(#H!N85!95%11!/-O4/5/%1C!38-:#3:! P4?5%>!2#J0!#:!Q&R&S!&RT!!U+&RH! ! !"#$%&()"*+%+),&#)%-,.#/.#01)%"2.34%+1#01)56% "#$%&!()*! % ()*+C!)-3H!/1!:J%!0%#?/-$!?%.%089%5!8@!)-:%00/$%-:!L8:/@/3#:/8-!#-?!5%198-1%!18@:A#5%C!AJ/3J!J%091! /01&1-"012.34-#2$56.74"84(.91(!0.0.:20(8*-4.;(04-048.<"04="6.. 85$#-/V#:/8-1!%-J#-3%!38GG4-/3#:/8-!#;/0/:/%1C!958:%3:!#11%:1!#-?!/-35%#1%!89%5#:/8-#0!%@@/3/%-F &(.>"&4$6.?210125.0#4.@(+("04.:2AB.=10#.0#4.>-1"$.:2AB.. 3>H!()*+!:%3J-808$>!%-#;0%1!#?.#-3%?!5#9/?C!:A8FA#>!38GG4-/3#:/8-!@85!)MC!;41/-%11!38-:/-4/F . :>!#-?!%-:%595/1%!89%5#:/8-1!@85!G#->!8@!:J%!E08;#0!NW*M,LD!RUU!38G9#-/%1C!#1!A%00!#1!$8.F +0%7")5.%!<2$=367>6:77&?@AB3B3%AC=$%2DACED3AFB2G20F$#"%"2A4B#13#$B<%DD2E%1%$8 %5-G%-:!%-:/:/%1C!4-/.%51/:/%1C!#-?!38G9#-/%1!8@!#00!1/V%1!/-!G85%!:J#-!R+U!384-:5/%1H!N85!G85%! HA=%!1<1&B%IBD2C/ACDB2CB"%DD2EACE!J<&>2C/B3%AC=$%2DACE$%4A2C=%#CD#=A24C%BG#$KD> /-@85G#:/8-C!./1/:!AAAHG/5+H38GH! <JL;>JC=M>B3%ACC#H2B#$#F$%248BA"%JCB%44AE%CB*#BAFA=2BA#CN2C/$%DO#CD%B%=3C#4#E0>2C8 ! C#.C=%/B#/20ABDO42CDB#.CAB%P.DAC%DD=#"".CA=2BA#CP0P$A/EACEP#B3B3%%CB%$O$AD%2C/ )*(+%,-./0,.123$24$.5%(+67.89+:$;,::.<:,%.*+%=,>7.?@@AB.*4+3>.. D#=A24ACP#I%DB#=$%2B%#C%=%CB$242C/D%=.$%Q=#$O#$2B%ACP#IMR+3%=#"O2C0SDHADA#CGA44P% XXX! D.OO#$B%/P0ABDC%G<JL;TCB%$O$AD%U2B%G20N!<TUN&B%=3C#4#E0M<TUP$ACEDB3%O#G%$ 2C/F4%IAPA4AB0#FD#=A24C%BG#$KACEB#=#$O#$2B%.D%$DB3$#.E32O$#B%=B%/O42BF#$"B32BD%$H%D 2D2=%CB$24AV%/$%O#DAB#$0B32BGA44=#CD#4A/2B%>%D=242B%>FA4B%$2C/O$A#$ABAV%2.D%$SD=#"".CA8 =2BA#C2=$#DD244/%HA=%DACB##C%=%CB$24ACP#IM Q,F%G"#CB3D2E#>52=%P##K2CC#.C=%/ABDO42CDB#=#CD#4A/2B%244=#"".CA=2BA#CACB#2DAC8 E4%D#=A24ACP#I>%DD%CBA2440P%=#"ACEB3%.4BA"2B%DGAB=3P#2$/>RD2A/,"A$<#.DD2HA2C>O$%DA8 /%CB2C/(T)#F<JL;MQ).$DB$2B%E0ADB#%IB%C/B32B=#C=%OBB#B3%%CB%$O$AD%>DB2$BACEGAB3 #.$DB$#CE=.DB#"%$P2D%>P0P.A4/ACE#C#.$%IADBACE2$=3AB%=B.$%M@%GA44P%2P4%B#EAH%#.$ =#$O#$2B%.D%$DF.44=#CB$#4#FB3%A$=#"".CA=2BA#CD2=$#DD2C0/%HA=%#$D#=A24C%BG#$K>=$%2B8 ACE2DACE4%>=#CBAC.#.D2C/D%=.$%=#CH%$D2BA#CB32BADO42BF#$"AC/%O%C/%CBMR +3%<TU=#$O#$2B%ACP#I%FF%=BAH%402//$%DD%D2=#""#CO$#P4%"#F=#"O2CA%D-G#$K%$D2$% AC.C/2B%/GAB3=#"".CA=2BA#CGAB3C#D%=.$%G20B#4ACK2C/O$A#$ABAV%/ADO2$2B%=#"".CA=28 BA#CO42BF#$"D>=$%2BACEAC%FFA=A%C=A%D>G2DB%/BA"%2C/"ADD%/#OO#$B.CABA%DM,==#$/ACEB#2 DB./0P0+3%L2/A=2BAU$#.O>JC=M>P.DAC%DD.D%$DDO%C/2C2H%$2E%#F79O%$=%CB#FB3%A$G#$K8 /20D%C/ACE2C/$%=%AHACE%"2A4D2C/D%H%CO%$=%CB#FB3%A$/20ACDB2CB"%DD2EACEMW,//ABA#C248 40>%CB%$O$AD%.D%$DD%C/2C/$%=%AH%#C2H%$2E%7:XP.DAC%DD%"2A4D2/20>C#BB#"%CBA#CBA"% DO%CB#CB%4%O3#C%2C/=#CF%$%C=%=244DM@AB3<TU><JL;GA444%2/B3%O2$2/AE"D3AFBGAB3AC B3%%CB%$O$AD%P0.DACEABD%IADBACEB%=3C#4#E02C/=#$O#$2B%F##BO$ACBB#DA"O4AF0=#"".CA=28 BA#CD#B32BG#$K%$D=.BB3$#.E3B3%=4.BB%$2C/A"O$#H%B3%A$O$#/.=BAHAB0M @AB3"#$%B32CD%H%C"A44A#C.D%$D>%C=#"O2DDACEO.P4A=2C/O$AH2B%=#"O2CA%D>%/.=2BA#C24 ACDBAB.BA#CD2C/E#H%$C"%CB2E%C=A%DAC=4./ACEY23##Z!*,1[,-Y,]))&>U##/0%2$!*Y1T- U+&>^T+()>+3%_M1M(%CB%$DF#$[AD%2D%(#CB$#42C/B3%_CAH%$DAB0#F^%CCD04H2CA2>B3%<JL; F42ED3AOC#BAFA=2BA#CO42BF#$"ACTCB%$O$AD%NADB$.DB%/F#$A"O#$B2CB"%DD2E%/%4AH%$0F#$P.DA8 C%DD=#CBAC.AB0>/AD2DB%$$%=#H%$0>%"%$E%C=0C#BAFA=2BA#C2C/J+24%$BACEM % `.A4B#CB3ADAC/.DB$084%2/ACE2C/O$#H%CC#BAFA=2BA#CB%=3C#4#E0><TU%C32C=%D2C/DB$%2"8 4AC%D=#$O#$2BA#CDS=#"".CA=2BA#CM`0=#"PACACE244O42BF#$"DACB##C%=%CB$24ACP#I2C/ !"#$%&
  11. 11. 62*14"-$7"8*9":"-$ 51)"*%.%!607% 8*"90:)%/2.2;0<0.)% 5<24%/2.2;0<0.)% g APRIL 2009 November 2008 January 2009 ADAPTATION ISSUE EDITORS CORNER IT BUDGETING ISSUE EDITORS CORNERTHE WEBSENSE V10000 EDITORS CORNERWorms, Threats, & the Economy— Fools Rush In Toxic Toad, Crafty Crow and Cant Always Get New Years Tips to Squeeze Look on the BrightHow to Secure an Insecure World? April Fools Day has come and gone, The Wild World of Web 2.0 What You Want? More from Tight IT Budgets Side of Life and the dreaded Conficker worm has Management of IT security is ever-The Internet is arguably todays most crucial enterprise productivity tool. At the The law of unintended consequences is a powerful one, and in our modern world The global economy is in a downturn, and its no secret that companies are yet to deliver its payload. Or has it? changing, with new challenges every Its a new year, but many of thesame time, with new technologies introduced with Web 2.0, unfettered use of the of rapid communication, consequences can spread faster than ever imagined looking for ways to cut costs. According to some reports, U.S. corporate IT Security specialists around the world day. If youre having trouble keeping problems of 2008 have followed us intoInternet at work can endanger your most critical business assets—your essential before. The impact of one careless action can be swift and difficult to contain. spending will plummet as much as 20 percent in 2009. With massive layoffs in have taken up arms against the up, maybe its your approach. Try 2009. All indications are that this yearinformation. Along with that, the economy is in a shambles, leaving companies at The story of the cane toad and its introduction to Australia is a classic tale of the works and disgruntled employees on the loose, security is more important terrorizing Conficker worm. Experts something new, adapt to your will be a tough one for manyrisk from the misbehavior of disgruntled employees as well as the unintended solving one problem while unknowingly creating a passel of new ones. than ever. How can IT managers make the most out of shrinking budgets? have been skeptical but cautious surroundings. Thats the lesson companies, and tough times can bringerrors of overworked staff. Hackers are getting better and better at what they do, MORE MORE about the date of destruction offered of this months newsletter. out the worst in people. We canrelentlessly nipping at the heels of security professionals. Whats a security EMPLOYEE TRENDS BUSINESS TRENDS ECONOMIC TRENDS SECURITY TRENDS up by the Conficker worm and, as is MORE anticipate that cybercrime will increaseprofessional to do? MORE often the case, the worm did not Real Employees, Social Networking QUICK LINKS Big Get Bigger, Lousy Economy as desperate people become more activate its mighty botnet on theSECURITY TRENDS THREAT TRENDS promised trigger date of April first. Virtual Problems Around the Office PRODUCT TIP OF THE MONTH Others Go Away Increases Risk vulnerable to scams and other "too good to be true" offers. But history has Young workers entering the market Businesses are discovering ways toRelentless Botnets Crazy Economy CUSTOMER TRAINING The business world is in the midst of Did you know that significant plans to Although that date is behind us, shown that times of great challenge are are bringing social networking at boost productivity with social SUPPORT great change, with many predicting secure private information have been vigilance must be maintained as theWork While We Creating Criminals worm now resides on millions of work to a unimagined new level. networking, often beginning WEBSENSE NEWS that in the upcoming year well see an waylaid, with the culprit being the also times a great opportunity. Are you an optimist or a pessimist?Sleep A recent survey shows that e-crime computers around the world and there While some CIOs worry about internally. USA Today tells how one SUCCESS STORY increase in mergers and acquisitions lousy state of the economy? With MORE has tripled this last year, and points security, others find that educating tactic has companies clearing the like never before. But when the dust costs of cybercrime running as highResearchers recently discovered a is likely a new date already scheduled QUICK LINKSWeb site operating from a server in the finger at the recession and the for the attack. workers and changing the way they clutter of long email strings by School District settles and a new business steps in, as $4.7 billion per year, this may not Learns a Lesson resultant loss of jobs, bonuses, and secure and share data may provide creating a common forum for sharing just how secure is your sensitive be the time to cancel or delay IT PRODUCT TIP OF THE MONTHthe Ukraine, using botnets to MORE stock value. Beware that employees the secret to protecting data in the information and ideas among financial data? security projects. CUSTOMER TRAININGruthlessly suck up data from 5,000 QUICK LINKS Bellevue School District is located near who know of companys security Web 2.0 world. employees. MORE MORE SUPPORTinfected computers each day. With a PRODUCT TIP OF THE MONTH the Microsoft offices in Redmond, weaknesses may be tempted for MORE MORE LATEST NEWS WEBSENSE NEWSlousy economy and powerful Trojans CUSTOMER TRAINING Washington, and has a student reasons of retaliation or gain to take LATEST NEWSgoing for under $1000, its easy to SUPPORT population that tends to be very TOUGH TIMES BOOST INTERNET CRIME SUCCESS STORY the low road.enter the information-stealing WEBSENSE NEWS US PRESIDENTIAL MALWARE—BARACK OBAMA INTERVIEW LURE technologically savvy. The IT SECURITY PREDICTIONS FOR 2009 PODCASTbusiness these days. MORE ROLLING REVIEW: WEB 2.0 TOOLS DEMAND A CAUTIOUS APPROACH department knew they needed SCRIPT FRAGMENTATION ATTACK MAY ASSIST HACKERS Accountants Act MORE SUCCESS STORY OTTAWA BUILDS ONLINE COMMUNITY OUT OF IGLOO powerful network control to protect FINANCIAL "FIRE SALE" ECONOMY: PROTECTING DATA DURING M & A to Eradicate SpamLATEST NEWS Aussies Throw the SPAMMERS ABUSING GOOGLES WEB 2.0 SERVICES students from inappropriate material WHITE PAPERS, WEBCASTS, AND MORE Accounting firm Smith Marion & Co. and to guard against security risks. discovered employees were spending WEBSENSE LAUNCHES NEW, STATE-OF-THE-ART SECURITY APPLIANCE Wrench at Threats WHITE PAPERS, WEBCASTS, AND MORE They did their homework and Websense Security Labs Second Half 2008 Threat Report countless hours wading through risky JOIN US AT RSA WITH FREE TICKETS FROM WEBSENSE Salmat, an Australian sales tool Enabling Enterprise 2.0 Is your 2009 security plan ready for the New Year? Review the threats that and inappropriate spam —hours that discovered a Websense solution to do GLOBE AND MAIL—STEALING FROM THE HAND THAT FEEDS company, wanted to allow staff to use Learn from Charles Renert, principal researcher for Websense Security Labs, emerged in 2008, take a look forward to 2009, and receive a research report would be better spent providing the job. BBC NEWS: CRIME TO BOOM AS DOWNTURN BLOOMS Web 2.0 tools to drive business how Websense discovers, identifies, classifies and adapts to content trends on a highlighting the latest threat trends. Jan 21, 9:00 am PT. services to customers They needed a MORE DLP: AN IMPORTANT TOOL IN PROTECTING DATA DURING M & A growth without having to worry about global scale with the Websense Content Research Cortex white paper. REGISTER FOR THE WEBCAST proven security solution to stop spam increasingly dynamic and virulent READ THE WHITE PAPER and bolster security. In less than anWHITE PAPERS, WEBCASTS, AND MORE Secure Essential Data against Loss Web-based security threats. The hours time they deployed WebsenseThe Executive Guide to DLP White Paper The 2008 Email Security Report by the Aberdeen Group Can sensitive and regulated data be identified and loss prevented? Data within solution needed to provide controlled Hosted Email Security and immediately Research by the Aberdeen Group reveals that email security issues are causing companies is often stored, used and exchanged inappropriately. Find out how toRich Mogull of Securosis.com explores the business value of data loss access to Web 2.0 content to ensure reduced spam, saved time, and lost productivity for many and discusses steps for successful remediation. discover, monitor and protect your essential information.prevention, who needs it, how it works, and what are best practices for enterprise productivity at the same time. They protected employees from unsuitable REGISTER FOR THE REPORT WATCH THE VIDEOimplementation. found the solution in Websense Web images and content. READ THE WHITE PAPER Security Gateway with real-time Introduction to Websense Web Filter v7 Interface and Utilities scanning capabilities, unmatched
  12. 12. 5>0.)%?*2#6:(% 6.4<.&+,$ !".:0#)% !"#$% =;0.:$%/2.2;0<0.)% When your essential information is protected, you get to say Yes! to a whole new business environment. Say Yes! to Websense Web 2.0 Business Protection DLP atworry? InfoSec Yes! World without boundaries? # Yes! Booth 502 without without without paralysis? Yes! drama? Yes! This copy is for placement This copy is for placement This copy is for placement This copy is for placement only, it is not meant to be only, it is not meant to be only, it is not meant to be only, it is not meant to be read. This copy is for read. This copy is for read. This copy is for read. This copy is for 8*.)%=1% placement only, it is not placement only, it is not placement only, it is not placement only, it is not meant to be read. This meant to be read. This meant to be read. This meant to be read. This copy is for placement only, copy is for placement only, copy is for placement only, copy is for placement only, it is not meant. it is not meant. it is not meant. it is not meant. Get the Essential Information Protection White Paper Find out how to stop inadvertent data loss and other threats to your business while harnessing the full potential of your employees and the Web. @.4.0%
  13. 13. !"#$$%&()*+)#,-#.$/" A D V E R T I S E M E N T !"#$% &(%)*+,-".% /+0*1%231.% Channel View A DEEPER CHCOMMITMENT ANNEL Websense Revamps FOR MORE SUCCESSFUL PARTNERSHIPS Channel Strategy David Roberts Vice President of Sales and Websense Websense has enjoyed great success over the last 10 years, The security company fine tunes its partner Channel, North America initiatives to help solution providers build revenues Roberts joined Websense in April becoming the global leader in web filtering and a strong presence in the 2006 with the charter to deepen the growing web security market. We owe much of our success to the excellent Q What will be the philosophy of your partner program going forward? route-to-market planning to ensure that the Websense process around the product sale addresses the business companys relationship and commitment to the channel. In this role, Roberts oversees both the sales and channel support and effort of our valued channel partners. A We believe that a key to our success will be the development of a new Websense® channel program based on the following: model of the channel partner. Systems teams to develop a cohesive channel- centric organization. I have joined Websense to help build the next great security company. To get Websense is investing heavily on the there, we will have to become the next great channel company. • Greater Focus on Partner Profitability: systems side of our business to automate Offer higher margins through use of manual processes so resellers can easily margin enhancement programs. Build manage items such as lead distribution, We are making a renewed investment in the channel to achieve this goal. We and maintain partner profitability. rebates, deal registration, and marketing Provide profitable up-sell / cross-sell development funds (MDF) management. are hard at work to develop the right strategy, the right systems, and the right DEEPER COMMITMENT opportunities. Training TO STRONGER CHANNEL programs to increase your margins, to win your trust, and to make it easier • Enhanced Service Opportunities: We are making an immediate investment Provide recurring service revenue in online training to effectively deliver PARTNERSHIPS for you to do business with Websense. streams. both sales and technical content and • Shorter Time to Market: Offer low Websense has enjoyed great reduce our partner’s cost. Training and barrier of entry to quickly scale partner certification has been proven to increase success over the last 10 Websense is committed to the success of its channel partners. We are years, becoming the global revenue. customer satisfaction and accelerate embracing a 100% channel model and launching new initiatives that will help • Decreased Cost of Sales: Ensure customer adoption of technology. leader in web filtering higher account retention rates and and a strong presence in build stronger, more profitable partnerships with our resellers, including: Partner Program lower cost of sales. the growing web security We are excited to launch our Websense • Increased Operational Efficiency: market. We owe much of Make it easier to do business with Partner Program in Q3 2006 and deliver our success to the excellent • Deal registration for new business strong value to the channel community. Websense. support and effort of our • New lead generation programs to increase business for both of us Q Can you describe the immediate changes you are making to help Q What else is important for solution providers to know about Websense? valued channel partners. We are making a renewed • A new channel program that enhances margins through performance and solution providers in 2006? A Websense is committed to delivering value to our partners though our investment in the channel so rebates A Websense is becoming a channel-centric company, and we are acting quickly to alter our business processes, systems, comprehensive web filtering and web security products, our strong, recogniz- that together, we can build stronger, more profitable partnerships. We are hard • Tools that will make it easier for you to sell and quote Websense solutions able brand, and comprehensive programs training and programs to fully support a to support our channel partners. By at work to develop the right • Clearly defined rules of engagement for our channel sales organization channel model. developing and maintaining strong part- strategy, the right systems, nerships, together we can address the and the right programs to • Improved sales and technical training Business Process Improvement challenges and needs of our customers increase your margins, to Websense is changing sales processes with industry-leading solutions. win your trust, and to make to ensure that our sales playbook and Websense’s proven web filtering and it easier for you to do I invite you to be a part of the Websense success story. I am looking forward instructions to our sales force are channel- web security offerings give you the centric. We are channelizing our quote right solutions to meet your customers business with Websense. to working with you to build profitable, long-lasting partnerships for all of us. processes to create no-touch transaction business needs today, secure customer capability for our channel partners. loyalty in the future, and help you, our Sincerely, Furthermore, we are focusing on partner, enhance your profitability. David Roberts Vice President, Americas Sales For more information on the Websense channel partner program, visit www.websense.com/channel or email partner@websense.com. Websense, Inc. For more information partner@websense.com © 2006 Websense, Inc. All rights reserved.YOU HAVE OUR ATTENTIONANNOUNCING A NEW PARTNER PROGRAMDESIGNED WITH YOU IN MINDWebsense® devotes as much attention to the success of our When you offer your customers Websense security solutions,partners as we do our industry leading products. The new you’re offering much more than just software. You’re providingWebsense Partner Program gives you the tools and services a team of security analysts who scrutinize more than 75 millionyou need to make the most of every opportunity. With websites every day to find the emerging threats othercomprehensive product training, incentives, and dedicated solutions miss. And because it’s based on a subscriptionsales, marketing, and technical support teams, we can help model, Websense software creates a revenue stream that’syou offer your customers best-in-class security solutions. every bit as reliable as the protection it provides.Become a Websense partner today at www.websense.com/partner © 2006 Websense, Inc. All rights reserved.

×