SlideShare a Scribd company logo
TRANSFORMATION
The Next 18 Months
2Copyright © 2016 Symantec Corporation
USE OF GAAP AND
NON-GAAP FINANCIAL INFORMATION
Our results of operations have undergone significant change due to the impact of litigation accruals, stock-based compensation,
restructuring, transition and separation matters, charges related to the amortization of intangible assets, and certain other income
and expense items that management considers unrelated to the Company’s core operations. To help our readers understand our past
financial performance and our future results, we supplement the financial results that we provide in accordance with generally
accepted accounting principles, or GAAP, with non-GAAP financial measures. The method we use to produce non-GAAP results is not
computed according to GAAP and may differ from the methods used by other companies. Non-GAAP financial measures are
supplemental, should not be considered a substitute for financial information presented in accordance with GAAP and should be
read only in conjunction with our consolidated financial statements prepared in accordance with GAAP.
Our management team uses these non-GAAP financial measures in assessing the Company’s operating results, as well as when
planning, forecasting and analyzing future periods. Investors are encouraged to review the reconciliation of our non-GAAP financial
measures to the comparable GAAP results, which is attached to our quarterly earnings release and which can be found, along with
other financial information, on the investor relations page of our website at: www.symantec.com/invest.
3Copyright © 2016 Symantec Corporation
FORWARD LOOKING STATEMENTS
This presentation contains statements which may be considered forward-looking within the meaning of the U.S. federal securities
laws, including statements regarding the sale of our information management business to The Carlyle Group and the expected
benefits to be realized as a result of the sale; statements with respect to the use of proceeds from the sale, including statements
regarding the capital allocation program; statements regarding the growth prospects of our security business; and statements with
respect to our continuation of our current dividend. These statements are subject to known and unknown risks, uncertainties and
other factors that may cause our actual results, performance or achievements to differ materially from results expressed or implied
in this press release. Such risk factors include those related to: general economic conditions; fluctuations and volatility in Symantec’s
stock price; the ability of Symantec to successfully execute strategic plans, including acquisitions or strategic transactions;
maintaining customer and partner relationships; fluctuations in tax rates and currency exchange rates; the timing and market
acceptance of new product releases and upgrades; and the successful development of new products, and the degree to which these
products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking
statements in this press release. We assume no obligation, and do not intend, to update these forward-looking statements as a result
of future events or developments. Additional information concerning these and other risks factors is contained in the Risk Factors
section of our Form 10-K for the year ended April 3, 2015.
Any information regarding pre-release of Symantec offerings, future updates or other planned modifications is subject to ongoing
evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or
implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently
available.
We assume no obligation to update any forward‐looking information contained in this presentation.
4Copyright © 2016 Symantec Corporation
WHAT CUSTOMERS ARE FACED WITH TODAY
Not Ready For
Tomorrow’s Threats
Advanced attacks are
lost in a mass of less
important alerts
Average attack goes
undetected for
170 days
Just 31% of
breaches are found
by the victim
organization – the
rest are found by a
third party, law
enforcement, etc.
Data is Mobile and
Moving to the Cloud
With 65% of
workloads in the
cloud (Amazon Web
Services, Salesforce,
Box, Office 365),
more of your data is
at risk
Data is increasingly
accessed from
outside the firewall
Need to Reassure
Online Customers
Online customers
don’t know if they can
trust e-commerce
websites
Don’t have visibility
into attacks on brand
Never Have Enough Time
or Resources
Organizations don’t
know how they are
doing or where to
focus – 96% of alerts
never reviewed
Hard to hire the right
security talent
5Copyright © 2016 Symantec Corporation
Operating one of the world’s largest cyber intelligence networks, we see more
threats, and protect more customers from the next generation of attacks.
We help companies, governments and individuals secure their most important
data wherever it lives.
THE GLOBAL LEADER IN CYBERSECURITY
6Copyright © 2016 Symantec Corporation
1
New on-line acquisition grew
8% y/y
Ahead of
plan
56%
operating
margin
Norton Shopping Guarantee
offering increases customer
confidence
+3%
revenue
growth
3
Launched ATP: Endpoint,
Email, and Network
1%
revenue growth for
the 3rd consecutive
quarter
2
Q3 HIGHLIGHTS
7Copyright © 2016 Symantec Corporation
SYMANTEC AT A GLANCE
FY15
Non-GAAP
Revenue
FY16
Q3
Revenue
FY16 Q3 Non-
GAAP Operating
Margin
Consumer
Security
$1,917 414 56%
% Y/Y (CC) (5%) (6%)
Enterprise
Security
$2,069 495 5%
% Y/Y (CC) (1%) 1%
Total Revenue $3,986 909 28%
% Y/Y (CC) (3%) (2%)
Enterprise Security (FY16 YTD)
Threat Protection Information Protection
Website Security Cyber Security Services
8Copyright © 2016 Symantec Corporation
Q3 FY16 FINANCIAL SUMMARY
Revenue was above midpoint of guidance range
Operating margin and EPS exceeded guidance
Excluding TSAs, operating margin would have been 200 basis points higher
Q3 FY16 operating margin and EPS exceeded guidance
Non-GAAP in $M Guidance Actuals Yr/Yr (FX Neutral)
Total Revenue $890 - $920 $909 (2%)
Operating Margin 25.5% - 27.5% 27.9% N/A
EPS (¢/share) 22¢ - 25¢ 26¢ N/A
9Copyright © 2016 Symantec Corporation
FOCUSED ON FOUR PRIORITIES
Improving our
Cost Structure
3
Realizing our
Unified Security
Strategy
1
Efficiently
Allocate Capital
4
Building our
Enterprise Security
Sales Pipeline/GTM
2
10Copyright © 2016 Symantec Corporation
REALIZING OUR UNIFIED SECURITY STRATEGY
Users
Data
Apps
Cloud
Devices
Network
Data Center
CYBER SECURITY SERVICES
Monitoring Incident Response Simulation Adversary Threat Intelligence
THREAT PROTECTION
Endpoints Data Center Gateway
INFORMATION PROTECTION
Data Access
 Threat Prevention, Detection, Forensics & Resolution
 Device, Email, Server, Virtual & Cloud Workloads
 Available On-premise and in the Cloud
 Identity and Data Loss Protection
 Cloud-based Key Management
 Cloud Security Broker
UNIFIED SECURITY ANALYTICS PLATFORM
Telemetry Threat Analytics Global Intelligence Protection Engines Incident Management
 Big data security analytics; available to customers in self-service mode
11Copyright © 2016 Symantec Corporation
SYMANTEC NEXT GEN ENDPOINT PROTECTION (SEP)
The most robust platform of next generation engines that combine to deliver proactive protection from
advanced attacks
Vantage
Intrusion
Prevention
SAPE
Machine
Learning
Insight
SONAR
Behavioral
Detection
Exploit
Protection
SymClass MutantX
NETWORK FILE ATTRIBUTES RELATIONSHIP BEHAVIORS HARDENING AUTOMATION CLUSTERING
Blocks attacks by
scanning network
application layer
traffic in real time
Static Attribute
Protection Engine
(SAPE) blocks
malware using
advanced signature-
less technology
Uses the wisdom of
the crowd and
artificial intelligence
to block 99% of
advanced attacks
Advanced machine
learning watches
programs and
immediately blocks
abnormal behaviors
Blocks all zero day
exploits
Safely processes over
1M indicators of
compromise (IOCs)/
day
Identifies key
attributes, clusters
malware into families
12Copyright © 2016 Symantec Corporation
SYMANTEC ADVANCED THREAT PROTECTION
Uncover, Prioritize, and remediate today’s most advanced persistent threats
Uncover advanced threats across endpoints, networks, and email
gateways, all from a single console
Combines global telemetry with local customer context to uncover attacks that would
otherwise evade detection
Search for any attack artifact across your infrastructure, with the single click of a
button
Prioritize what matters most
Aggregates intelligence across control points to identify and prioritize systems that
remain compromised and require immediate attention
Powered by new Cynic cloud-based sandboxing service that finds and prioritizes the
most stealthy and persistent threats
Remediate fast
Provides all data a customer needs to know about an attack, in one place
Click once to remediate across endpoints, networks, and email
Leverage existing Symantec investments
Leverages Symantec Endpoint Security and Email Security.cloud investments, requires
no new endpoint agents
Monitor Symantec ATP with Symantec Managed Security Services
ADVANCED THREAT PROTECTION
Global Intelligence Exported Data
Detect Prioritize Investigate Remediate
Advanced Threat Protection
Endpoint
Security
Network
Security
Email
Security
3rd party
13Copyright © 2016 Symantec Corporation
Data Loss
Prevention
Encryption
Identity Access
Manager
Validation and ID
Protection (VIP)
INFORMATION PROTECTION
Our Information Protection portfolio keeps data protected while keeping employees productive
Track and secure confidential data
Discover, monitor, and protect confidential information wherever it’s
stored and however it’s used—on mobile devices, within data centers, or
in the cloud
Encrypt your data in case it falls into the wrong hands
Full-disk and removable media encryption for endpoints, email encryption
secures sensitive communications, and file share encryption protects files
on shared network drives and in the cloud
Give access only to users who need it
Single Sign-on (SSO) with strong authentication, access control, and user
management, to control who accesses internal and 3rd-party cloud-based
applications
Strong authentication made easy
Two-factor and risk-based tokenless authentication prevents unauthorized
access to sensitive networks and applications
14Copyright © 2016 Symantec Corporation
CYBERSECURITY SERVICES
Rely on our 1,000+ Cyber Warriors, around the clock, around the world
Actionable insights
Receive proactive notifications of evolving attack vectors and techniques
DeepSight Intelligence keeps customers informed of vulnerabilities and
threats to their organization
Extend customers security program with our experts
24/7 monitoring of customers’ entire security infrastructure
Monitors every major security product on the market
Respond with speed and precision
Readiness Services help assess, test, and refine response program
Incident Response Services provides remote and on-site investigation to
help contain attacks, understand their full scope, and ensure that all
components have been eradicated
Prepare for what’s next
Strengthen employee cyber-readiness through security education and
simulation exercises
Identify key risks employees are facing and build a comprehensive program
to assess and improve security awareness
Incident
Response
Managed Security
Services
Simulation
Services
Threat Intelligence
Services
Leader in Gartner Magic Quadrant for Managed Security Services
15Copyright © 2016 Symantec Corporation
Protect online business—always
Ensure that traffic to and from websites cannot be compromised by
attackers
Secure websites, data, and applications 24/7
Assure up-to-the-minute visibility into any potential security weaknesses
in your website
Deliver trust with every download
Protect the integrity of software, ensure that customers only run
untampered versions of software
Increase sales with the Norton Shopping Guarantee
Drive more online sales with increased customer confidence
WEBSITE SECURITY
Protect online business - always
SSL/TLS
Certificates
Website
Security
Code Signing
Norton Shopping
Guarantee
16Copyright © 2016 Symantec Corporation
CAPITAL ALLOCATION
On February 4th, increased capital return program to $5.5
billion – returning all the after-tax cash proceeds from the
Veritas transaction to shareholders
– Declared a $4/share special dividend equaling $2.7 billion and
payable to shareholders on March 22, 2016, to record holders as of
the close of business on March 8, 2016
– $2.3 billion in share repurchases by March 2017
– $500 million ASR completed in January 2016
Quarterly dividend of 7.5¢/share with a commitment to
increasing this dividend as free cash flow grows over time
Announced that Silver Lake Partners will make a $500
million strategic investment in Symantec through a
convertible senior note
17Copyright © 2016 Symantec Corporation
Q&A
18Copyright © 2016 Symantec Corporation
CONTACT INVESTOR RELATIONS
Jonathan Doros
(650) 527-5523
Jonathan_Doros@symantec.com
Nate Pollack
(650) 527-7906
Nate_Pollack@symantec.com

More Related Content

What's hot

Symantec’s Strategic Direction Presentation
Symantec’s Strategic Direction PresentationSymantec’s Strategic Direction Presentation
Symantec’s Strategic Direction PresentationInvestorSymantec
 
Financial Analyst Day 2012
Financial Analyst Day 2012Financial Analyst Day 2012
Financial Analyst Day 2012InvestorSymantec
 
Q1 fy16 earnings-slides
Q1 fy16 earnings-slidesQ1 fy16 earnings-slides
Q1 fy16 earnings-slides
ir_cisco
 
Investor Relations Overview - February
Investor Relations Overview - FebruaryInvestor Relations Overview - February
Investor Relations Overview - February
aoncorp
 
Symantec investor presentation november 2015 final
Symantec investor presentation november 2015 finalSymantec investor presentation november 2015 final
Symantec investor presentation november 2015 final
InvestorSymantec
 
Kelly kramer shareholder value draft final
Kelly kramer shareholder value draft finalKelly kramer shareholder value draft final
Kelly kramer shareholder value draft final
ir_cisco
 
Q2 fy16 earnings slides final
Q2 fy16 earnings slides finalQ2 fy16 earnings slides final
Q2 fy16 earnings slides final
ir_cisco
 
Symantec investor presentation may 2015 final
Symantec investor presentation may 2015 finalSymantec investor presentation may 2015 final
Symantec investor presentation may 2015 final
InvestorSymantec
 
Q2 fy15 atento earnings presentation final
Q2 fy15 atento earnings presentation   finalQ2 fy15 atento earnings presentation   final
Q2 fy15 atento earnings presentation final
investorsatento
 
01 ceo fad v40 final
01 ceo fad v40 final01 ceo fad v40 final
01 ceo fad v40 final
InvestorSymantec
 
Q1 earnings slides final (2)
Q1 earnings slides final (2)Q1 earnings slides final (2)
Q1 earnings slides final (2)
TEConnectivityltd
 
UBS Global Technology Conference
UBS Global Technology ConferenceUBS Global Technology Conference
UBS Global Technology ConferenceInvestorSymantec
 
Dvn august-investor-presentation
Dvn august-investor-presentationDvn august-investor-presentation
Dvn august-investor-presentation
Devon Energy Corporation
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
InvestorSymantec
 
CFO update
CFO updateCFO update
CFO update
ir_cisco
 
Featured Presentation
Featured PresentationFeatured Presentation
Featured Presentation
ircornerstone
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016
InvestorSymantec
 
TE Connectivity Q3 2016 Earnings Presentation
TE Connectivity Q3 2016 Earnings PresentationTE Connectivity Q3 2016 Earnings Presentation
TE Connectivity Q3 2016 Earnings Presentation
TEConnectivityltd
 
Q3 2015 3 m earnings presentation
Q3 2015 3 m earnings presentationQ3 2015 3 m earnings presentation
Q3 2015 3 m earnings presentation
Investors_3M
 
Ir presentation september
Ir presentation   septemberIr presentation   september
Ir presentation september
aoncorp
 

What's hot (20)

Symantec’s Strategic Direction Presentation
Symantec’s Strategic Direction PresentationSymantec’s Strategic Direction Presentation
Symantec’s Strategic Direction Presentation
 
Financial Analyst Day 2012
Financial Analyst Day 2012Financial Analyst Day 2012
Financial Analyst Day 2012
 
Q1 fy16 earnings-slides
Q1 fy16 earnings-slidesQ1 fy16 earnings-slides
Q1 fy16 earnings-slides
 
Investor Relations Overview - February
Investor Relations Overview - FebruaryInvestor Relations Overview - February
Investor Relations Overview - February
 
Symantec investor presentation november 2015 final
Symantec investor presentation november 2015 finalSymantec investor presentation november 2015 final
Symantec investor presentation november 2015 final
 
Kelly kramer shareholder value draft final
Kelly kramer shareholder value draft finalKelly kramer shareholder value draft final
Kelly kramer shareholder value draft final
 
Q2 fy16 earnings slides final
Q2 fy16 earnings slides finalQ2 fy16 earnings slides final
Q2 fy16 earnings slides final
 
Symantec investor presentation may 2015 final
Symantec investor presentation may 2015 finalSymantec investor presentation may 2015 final
Symantec investor presentation may 2015 final
 
Q2 fy15 atento earnings presentation final
Q2 fy15 atento earnings presentation   finalQ2 fy15 atento earnings presentation   final
Q2 fy15 atento earnings presentation final
 
01 ceo fad v40 final
01 ceo fad v40 final01 ceo fad v40 final
01 ceo fad v40 final
 
Q1 earnings slides final (2)
Q1 earnings slides final (2)Q1 earnings slides final (2)
Q1 earnings slides final (2)
 
UBS Global Technology Conference
UBS Global Technology ConferenceUBS Global Technology Conference
UBS Global Technology Conference
 
Dvn august-investor-presentation
Dvn august-investor-presentationDvn august-investor-presentation
Dvn august-investor-presentation
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
 
CFO update
CFO updateCFO update
CFO update
 
Featured Presentation
Featured PresentationFeatured Presentation
Featured Presentation
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
TE Connectivity Q3 2016 Earnings Presentation
TE Connectivity Q3 2016 Earnings PresentationTE Connectivity Q3 2016 Earnings Presentation
TE Connectivity Q3 2016 Earnings Presentation
 
Q3 2015 3 m earnings presentation
Q3 2015 3 m earnings presentationQ3 2015 3 m earnings presentation
Q3 2015 3 m earnings presentation
 
Ir presentation september
Ir presentation   septemberIr presentation   september
Ir presentation september
 

Viewers also liked

161115 arc investor overview v11
161115 arc investor overview v11161115 arc investor overview v11
161115 arc investor overview v11
ArcInvestors
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
InvestorSymantec
 
Box investor presentation
Box investor presentationBox investor presentation
Box investor presentation
box2016ir
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
xKinAnx
 
Atlantic Equities' Europerspective 21
Atlantic Equities' Europerspective 21Atlantic Equities' Europerspective 21
Atlantic Equities' Europerspective 21Steve Eschbach
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghIPPAI
 
Chico's Investor Presentation June 2016
Chico's Investor Presentation June 2016Chico's Investor Presentation June 2016
Chico's Investor Presentation June 2016
chicosfasinvestor
 
Chico's Investor Presentation April 2016
Chico's Investor Presentation April 2016Chico's Investor Presentation April 2016
Chico's Investor Presentation April 2016
chicosfasinvestor
 
Chico's fas investor presentation 6.21.16
Chico's fas investor presentation 6.21.16Chico's fas investor presentation 6.21.16
Chico's fas investor presentation 6.21.16
chicosfasinvestor
 
Chico's FAS Investor Presentation
Chico's FAS Investor Presentation Chico's FAS Investor Presentation
Chico's FAS Investor Presentation
chicosfasinvestor
 
Nemus Investor Presentation Feb 2017
Nemus Investor Presentation Feb 2017 Nemus Investor Presentation Feb 2017
Nemus Investor Presentation Feb 2017
nemusbio
 
Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015
Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015
Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015
Marcellus Drilling News
 
The Power Of The Influencer
The Power Of The InfluencerThe Power Of The Influencer
The Power Of The Influencer
Michael Kearnon, Docs Elite
 
Direct Insite Investor Presentation 2013
Direct Insite Investor Presentation 2013 Direct Insite Investor Presentation 2013
Direct Insite Investor Presentation 2013 Company Spotlight
 
MSLGROUP Global Institutional Investors Insight Report 2014
MSLGROUP Global Institutional Investors Insight Report 2014MSLGROUP Global Institutional Investors Insight Report 2014
MSLGROUP Global Institutional Investors Insight Report 2014
MSL
 
Venture Capital and Cleantech: The Wrong Model for Energy Innovation
Venture Capital and Cleantech: The Wrong Model for Energy InnovationVenture Capital and Cleantech: The Wrong Model for Energy Innovation
Venture Capital and Cleantech: The Wrong Model for Energy Innovation
TBJ Investments, LLC
 
Symantec investor presentation august 2014
Symantec investor presentation august 2014Symantec investor presentation august 2014
Symantec investor presentation august 2014
InvestorSymantec
 
Investor deck for website 5-16-14 v4
Investor deck for website 5-16-14 v4Investor deck for website 5-16-14 v4
Investor deck for website 5-16-14 v4InvestorSymantec
 
Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012ADVA
 

Viewers also liked (20)

161115 arc investor overview v11
161115 arc investor overview v11161115 arc investor overview v11
161115 arc investor overview v11
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
Box investor presentation
Box investor presentationBox investor presentation
Box investor presentation
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Atlantic Equities' Europerspective 21
Atlantic Equities' Europerspective 21Atlantic Equities' Europerspective 21
Atlantic Equities' Europerspective 21
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
 
Chico's Investor Presentation June 2016
Chico's Investor Presentation June 2016Chico's Investor Presentation June 2016
Chico's Investor Presentation June 2016
 
Chico's Investor Presentation April 2016
Chico's Investor Presentation April 2016Chico's Investor Presentation April 2016
Chico's Investor Presentation April 2016
 
Chico's fas investor presentation 6.21.16
Chico's fas investor presentation 6.21.16Chico's fas investor presentation 6.21.16
Chico's fas investor presentation 6.21.16
 
Chico's FAS Investor Presentation
Chico's FAS Investor Presentation Chico's FAS Investor Presentation
Chico's FAS Investor Presentation
 
Nemus Investor Presentation Feb 2017
Nemus Investor Presentation Feb 2017 Nemus Investor Presentation Feb 2017
Nemus Investor Presentation Feb 2017
 
Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015
Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015
Marathon Petroleum Corp. 2015 Analyst & Investor Day - Dec 3, 2015
 
The Power Of The Influencer
The Power Of The InfluencerThe Power Of The Influencer
The Power Of The Influencer
 
Direct Insite Investor Presentation 2013
Direct Insite Investor Presentation 2013 Direct Insite Investor Presentation 2013
Direct Insite Investor Presentation 2013
 
MSLGROUP Global Institutional Investors Insight Report 2014
MSLGROUP Global Institutional Investors Insight Report 2014MSLGROUP Global Institutional Investors Insight Report 2014
MSLGROUP Global Institutional Investors Insight Report 2014
 
Hancock investor meeting
Hancock investor meetingHancock investor meeting
Hancock investor meeting
 
Venture Capital and Cleantech: The Wrong Model for Energy Innovation
Venture Capital and Cleantech: The Wrong Model for Energy InnovationVenture Capital and Cleantech: The Wrong Model for Energy Innovation
Venture Capital and Cleantech: The Wrong Model for Energy Innovation
 
Symantec investor presentation august 2014
Symantec investor presentation august 2014Symantec investor presentation august 2014
Symantec investor presentation august 2014
 
Investor deck for website 5-16-14 v4
Investor deck for website 5-16-14 v4Investor deck for website 5-16-14 v4
Investor deck for website 5-16-14 v4
 
Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012
 

Similar to Symantec investor presentation february 2016 final

Symantec investor presentation november 2014 final
Symantec investor presentation november 2014 finalSymantec investor presentation november 2014 final
Symantec investor presentation november 2014 final
InvestorSymantec
 
Symantec at Morgan Stanley Technology, Media & Telecom Conference
Symantec at Morgan Stanley Technology, Media & Telecom ConferenceSymantec at Morgan Stanley Technology, Media & Telecom Conference
Symantec at Morgan Stanley Technology, Media & Telecom ConferenceInvestorSymantec
 
Symantec investor presentation february 2015
Symantec investor presentation february 2015Symantec investor presentation february 2015
Symantec investor presentation february 2015
InvestorSymantec
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013InvestorSymantec
 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14InvestorSymantec
 
01 ceo fad v40 final
01 ceo fad v40 final01 ceo fad v40 final
01 ceo fad v40 final
InvestorSymantec
 
Data strategies dreamforce_2010_michele_mc_mahon
Data strategies dreamforce_2010_michele_mc_mahonData strategies dreamforce_2010_michele_mc_mahon
Data strategies dreamforce_2010_michele_mc_mahon
Michele McMahon
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
InvestorSymantec
 
Separation strategy presentation
Separation  strategy presentationSeparation  strategy presentation
Separation strategy presentation
InvestorSymantec
 
Trailhead Live: Essential Habits & Core Admin Responsibilities
Trailhead Live: Essential Habits & Core Admin ResponsibilitiesTrailhead Live: Essential Habits & Core Admin Responsibilities
Trailhead Live: Essential Habits & Core Admin Responsibilities
Salesforce Admins
 
Essential Habits for New Admins
Essential Habits for New AdminsEssential Habits for New Admins
Essential Habits for New Admins
Salesforce Admins
 
EN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdf
EN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdfEN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdf
EN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdf
BenjaminLi62
 
Essential Habits for New Admins
Essential Habits for New AdminsEssential Habits for New Admins
Essential Habits for New Admins
Salesforce Admins
 
Investor deck for website 5-16-14 v3
Investor deck for website 5-16-14 v3Investor deck for website 5-16-14 v3
Investor deck for website 5-16-14 v3InvestorSymantec
 
Summer-22-FG-Mai-2022
Summer-22-FG-Mai-2022Summer-22-FG-Mai-2022
Summer-22-FG-Mai-2022
Thierry TROUIN ☁
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate PresentationInvestorSymantec
 
A10_Investor_Presentation
A10_Investor_PresentationA10_Investor_Presentation
A10_Investor_Presentation
A10_Networks_IR
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
InvestorSymantec
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
InvestorSymantec
 
Webinar: Best Practices for Rolling Out Einstein
Webinar: Best Practices for Rolling Out EinsteinWebinar: Best Practices for Rolling Out Einstein
Webinar: Best Practices for Rolling Out Einstein
Salesforce Admins
 

Similar to Symantec investor presentation february 2016 final (20)

Symantec investor presentation november 2014 final
Symantec investor presentation november 2014 finalSymantec investor presentation november 2014 final
Symantec investor presentation november 2014 final
 
Symantec at Morgan Stanley Technology, Media & Telecom Conference
Symantec at Morgan Stanley Technology, Media & Telecom ConferenceSymantec at Morgan Stanley Technology, Media & Telecom Conference
Symantec at Morgan Stanley Technology, Media & Telecom Conference
 
Symantec investor presentation february 2015
Symantec investor presentation february 2015Symantec investor presentation february 2015
Symantec investor presentation february 2015
 
Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013Symantec Corporate Presentation May 31, 2013
Symantec Corporate Presentation May 31, 2013
 
Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14Symantec corporate presentation 3 28-14
Symantec corporate presentation 3 28-14
 
01 ceo fad v40 final
01 ceo fad v40 final01 ceo fad v40 final
01 ceo fad v40 final
 
Data strategies dreamforce_2010_michele_mc_mahon
Data strategies dreamforce_2010_michele_mc_mahonData strategies dreamforce_2010_michele_mc_mahon
Data strategies dreamforce_2010_michele_mc_mahon
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Separation strategy presentation
Separation  strategy presentationSeparation  strategy presentation
Separation strategy presentation
 
Trailhead Live: Essential Habits & Core Admin Responsibilities
Trailhead Live: Essential Habits & Core Admin ResponsibilitiesTrailhead Live: Essential Habits & Core Admin Responsibilities
Trailhead Live: Essential Habits & Core Admin Responsibilities
 
Essential Habits for New Admins
Essential Habits for New AdminsEssential Habits for New Admins
Essential Habits for New Admins
 
EN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdf
EN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdfEN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdf
EN-CT-EXT-Getting Started- Sales Cloud- Einstein 240321.pdf
 
Essential Habits for New Admins
Essential Habits for New AdminsEssential Habits for New Admins
Essential Habits for New Admins
 
Investor deck for website 5-16-14 v3
Investor deck for website 5-16-14 v3Investor deck for website 5-16-14 v3
Investor deck for website 5-16-14 v3
 
Summer-22-FG-Mai-2022
Summer-22-FG-Mai-2022Summer-22-FG-Mai-2022
Summer-22-FG-Mai-2022
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
 
A10_Investor_Presentation
A10_Investor_PresentationA10_Investor_Presentation
A10_Investor_Presentation
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
Webinar: Best Practices for Rolling Out Einstein
Webinar: Best Practices for Rolling Out EinsteinWebinar: Best Practices for Rolling Out Einstein
Webinar: Best Practices for Rolling Out Einstein
 

More from InvestorSymantec

Symantec CEO Presentation
Symantec CEO PresentationSymantec CEO Presentation
Symantec CEO Presentation
InvestorSymantec
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
InvestorSymantec
 
Symantec investor presentation august 2015 v_final
Symantec investor presentation august 2015 v_finalSymantec investor presentation august 2015 v_final
Symantec investor presentation august 2015 v_final
InvestorSymantec
 
Nasdaq OMX International Investor Program
Nasdaq OMX International Investor ProgramNasdaq OMX International Investor Program
Nasdaq OMX International Investor ProgramInvestorSymantec
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate PresentationInvestorSymantec
 
Symantec 2013 Annual Stockholder Meeting
Symantec 2013 Annual Stockholder MeetingSymantec 2013 Annual Stockholder Meeting
Symantec 2013 Annual Stockholder MeetingInvestorSymantec
 
Annual Stockholder Meeting Presentation
 Annual Stockholder Meeting Presentation Annual Stockholder Meeting Presentation
Annual Stockholder Meeting PresentationInvestorSymantec
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
InvestorSymantec
 

More from InvestorSymantec (8)

Symantec CEO Presentation
Symantec CEO PresentationSymantec CEO Presentation
Symantec CEO Presentation
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 
Symantec investor presentation august 2015 v_final
Symantec investor presentation august 2015 v_finalSymantec investor presentation august 2015 v_final
Symantec investor presentation august 2015 v_final
 
Nasdaq OMX International Investor Program
Nasdaq OMX International Investor ProgramNasdaq OMX International Investor Program
Nasdaq OMX International Investor Program
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
 
Symantec 2013 Annual Stockholder Meeting
Symantec 2013 Annual Stockholder MeetingSymantec 2013 Annual Stockholder Meeting
Symantec 2013 Annual Stockholder Meeting
 
Annual Stockholder Meeting Presentation
 Annual Stockholder Meeting Presentation Annual Stockholder Meeting Presentation
Annual Stockholder Meeting Presentation
 
Symantec Corporate Presentation
Symantec Corporate PresentationSymantec Corporate Presentation
Symantec Corporate Presentation
 

Recently uploaded

amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 

Recently uploaded (20)

amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 

Symantec investor presentation february 2016 final

  • 2. 2Copyright © 2016 Symantec Corporation USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION Our results of operations have undergone significant change due to the impact of litigation accruals, stock-based compensation, restructuring, transition and separation matters, charges related to the amortization of intangible assets, and certain other income and expense items that management considers unrelated to the Company’s core operations. To help our readers understand our past financial performance and our future results, we supplement the financial results that we provide in accordance with generally accepted accounting principles, or GAAP, with non-GAAP financial measures. The method we use to produce non-GAAP results is not computed according to GAAP and may differ from the methods used by other companies. Non-GAAP financial measures are supplemental, should not be considered a substitute for financial information presented in accordance with GAAP and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. Our management team uses these non-GAAP financial measures in assessing the Company’s operating results, as well as when planning, forecasting and analyzing future periods. Investors are encouraged to review the reconciliation of our non-GAAP financial measures to the comparable GAAP results, which is attached to our quarterly earnings release and which can be found, along with other financial information, on the investor relations page of our website at: www.symantec.com/invest.
  • 3. 3Copyright © 2016 Symantec Corporation FORWARD LOOKING STATEMENTS This presentation contains statements which may be considered forward-looking within the meaning of the U.S. federal securities laws, including statements regarding the sale of our information management business to The Carlyle Group and the expected benefits to be realized as a result of the sale; statements with respect to the use of proceeds from the sale, including statements regarding the capital allocation program; statements regarding the growth prospects of our security business; and statements with respect to our continuation of our current dividend. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, performance or achievements to differ materially from results expressed or implied in this press release. Such risk factors include those related to: general economic conditions; fluctuations and volatility in Symantec’s stock price; the ability of Symantec to successfully execute strategic plans, including acquisitions or strategic transactions; maintaining customer and partner relationships; fluctuations in tax rates and currency exchange rates; the timing and market acceptance of new product releases and upgrades; and the successful development of new products, and the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking statements in this press release. We assume no obligation, and do not intend, to update these forward-looking statements as a result of future events or developments. Additional information concerning these and other risks factors is contained in the Risk Factors section of our Form 10-K for the year ended April 3, 2015. Any information regarding pre-release of Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. We assume no obligation to update any forward‐looking information contained in this presentation.
  • 4. 4Copyright © 2016 Symantec Corporation WHAT CUSTOMERS ARE FACED WITH TODAY Not Ready For Tomorrow’s Threats Advanced attacks are lost in a mass of less important alerts Average attack goes undetected for 170 days Just 31% of breaches are found by the victim organization – the rest are found by a third party, law enforcement, etc. Data is Mobile and Moving to the Cloud With 65% of workloads in the cloud (Amazon Web Services, Salesforce, Box, Office 365), more of your data is at risk Data is increasingly accessed from outside the firewall Need to Reassure Online Customers Online customers don’t know if they can trust e-commerce websites Don’t have visibility into attacks on brand Never Have Enough Time or Resources Organizations don’t know how they are doing or where to focus – 96% of alerts never reviewed Hard to hire the right security talent
  • 5. 5Copyright © 2016 Symantec Corporation Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives. THE GLOBAL LEADER IN CYBERSECURITY
  • 6. 6Copyright © 2016 Symantec Corporation 1 New on-line acquisition grew 8% y/y Ahead of plan 56% operating margin Norton Shopping Guarantee offering increases customer confidence +3% revenue growth 3 Launched ATP: Endpoint, Email, and Network 1% revenue growth for the 3rd consecutive quarter 2 Q3 HIGHLIGHTS
  • 7. 7Copyright © 2016 Symantec Corporation SYMANTEC AT A GLANCE FY15 Non-GAAP Revenue FY16 Q3 Revenue FY16 Q3 Non- GAAP Operating Margin Consumer Security $1,917 414 56% % Y/Y (CC) (5%) (6%) Enterprise Security $2,069 495 5% % Y/Y (CC) (1%) 1% Total Revenue $3,986 909 28% % Y/Y (CC) (3%) (2%) Enterprise Security (FY16 YTD) Threat Protection Information Protection Website Security Cyber Security Services
  • 8. 8Copyright © 2016 Symantec Corporation Q3 FY16 FINANCIAL SUMMARY Revenue was above midpoint of guidance range Operating margin and EPS exceeded guidance Excluding TSAs, operating margin would have been 200 basis points higher Q3 FY16 operating margin and EPS exceeded guidance Non-GAAP in $M Guidance Actuals Yr/Yr (FX Neutral) Total Revenue $890 - $920 $909 (2%) Operating Margin 25.5% - 27.5% 27.9% N/A EPS (¢/share) 22¢ - 25¢ 26¢ N/A
  • 9. 9Copyright © 2016 Symantec Corporation FOCUSED ON FOUR PRIORITIES Improving our Cost Structure 3 Realizing our Unified Security Strategy 1 Efficiently Allocate Capital 4 Building our Enterprise Security Sales Pipeline/GTM 2
  • 10. 10Copyright © 2016 Symantec Corporation REALIZING OUR UNIFIED SECURITY STRATEGY Users Data Apps Cloud Devices Network Data Center CYBER SECURITY SERVICES Monitoring Incident Response Simulation Adversary Threat Intelligence THREAT PROTECTION Endpoints Data Center Gateway INFORMATION PROTECTION Data Access  Threat Prevention, Detection, Forensics & Resolution  Device, Email, Server, Virtual & Cloud Workloads  Available On-premise and in the Cloud  Identity and Data Loss Protection  Cloud-based Key Management  Cloud Security Broker UNIFIED SECURITY ANALYTICS PLATFORM Telemetry Threat Analytics Global Intelligence Protection Engines Incident Management  Big data security analytics; available to customers in self-service mode
  • 11. 11Copyright © 2016 Symantec Corporation SYMANTEC NEXT GEN ENDPOINT PROTECTION (SEP) The most robust platform of next generation engines that combine to deliver proactive protection from advanced attacks Vantage Intrusion Prevention SAPE Machine Learning Insight SONAR Behavioral Detection Exploit Protection SymClass MutantX NETWORK FILE ATTRIBUTES RELATIONSHIP BEHAVIORS HARDENING AUTOMATION CLUSTERING Blocks attacks by scanning network application layer traffic in real time Static Attribute Protection Engine (SAPE) blocks malware using advanced signature- less technology Uses the wisdom of the crowd and artificial intelligence to block 99% of advanced attacks Advanced machine learning watches programs and immediately blocks abnormal behaviors Blocks all zero day exploits Safely processes over 1M indicators of compromise (IOCs)/ day Identifies key attributes, clusters malware into families
  • 12. 12Copyright © 2016 Symantec Corporation SYMANTEC ADVANCED THREAT PROTECTION Uncover, Prioritize, and remediate today’s most advanced persistent threats Uncover advanced threats across endpoints, networks, and email gateways, all from a single console Combines global telemetry with local customer context to uncover attacks that would otherwise evade detection Search for any attack artifact across your infrastructure, with the single click of a button Prioritize what matters most Aggregates intelligence across control points to identify and prioritize systems that remain compromised and require immediate attention Powered by new Cynic cloud-based sandboxing service that finds and prioritizes the most stealthy and persistent threats Remediate fast Provides all data a customer needs to know about an attack, in one place Click once to remediate across endpoints, networks, and email Leverage existing Symantec investments Leverages Symantec Endpoint Security and Email Security.cloud investments, requires no new endpoint agents Monitor Symantec ATP with Symantec Managed Security Services ADVANCED THREAT PROTECTION Global Intelligence Exported Data Detect Prioritize Investigate Remediate Advanced Threat Protection Endpoint Security Network Security Email Security 3rd party
  • 13. 13Copyright © 2016 Symantec Corporation Data Loss Prevention Encryption Identity Access Manager Validation and ID Protection (VIP) INFORMATION PROTECTION Our Information Protection portfolio keeps data protected while keeping employees productive Track and secure confidential data Discover, monitor, and protect confidential information wherever it’s stored and however it’s used—on mobile devices, within data centers, or in the cloud Encrypt your data in case it falls into the wrong hands Full-disk and removable media encryption for endpoints, email encryption secures sensitive communications, and file share encryption protects files on shared network drives and in the cloud Give access only to users who need it Single Sign-on (SSO) with strong authentication, access control, and user management, to control who accesses internal and 3rd-party cloud-based applications Strong authentication made easy Two-factor and risk-based tokenless authentication prevents unauthorized access to sensitive networks and applications
  • 14. 14Copyright © 2016 Symantec Corporation CYBERSECURITY SERVICES Rely on our 1,000+ Cyber Warriors, around the clock, around the world Actionable insights Receive proactive notifications of evolving attack vectors and techniques DeepSight Intelligence keeps customers informed of vulnerabilities and threats to their organization Extend customers security program with our experts 24/7 monitoring of customers’ entire security infrastructure Monitors every major security product on the market Respond with speed and precision Readiness Services help assess, test, and refine response program Incident Response Services provides remote and on-site investigation to help contain attacks, understand their full scope, and ensure that all components have been eradicated Prepare for what’s next Strengthen employee cyber-readiness through security education and simulation exercises Identify key risks employees are facing and build a comprehensive program to assess and improve security awareness Incident Response Managed Security Services Simulation Services Threat Intelligence Services Leader in Gartner Magic Quadrant for Managed Security Services
  • 15. 15Copyright © 2016 Symantec Corporation Protect online business—always Ensure that traffic to and from websites cannot be compromised by attackers Secure websites, data, and applications 24/7 Assure up-to-the-minute visibility into any potential security weaknesses in your website Deliver trust with every download Protect the integrity of software, ensure that customers only run untampered versions of software Increase sales with the Norton Shopping Guarantee Drive more online sales with increased customer confidence WEBSITE SECURITY Protect online business - always SSL/TLS Certificates Website Security Code Signing Norton Shopping Guarantee
  • 16. 16Copyright © 2016 Symantec Corporation CAPITAL ALLOCATION On February 4th, increased capital return program to $5.5 billion – returning all the after-tax cash proceeds from the Veritas transaction to shareholders – Declared a $4/share special dividend equaling $2.7 billion and payable to shareholders on March 22, 2016, to record holders as of the close of business on March 8, 2016 – $2.3 billion in share repurchases by March 2017 – $500 million ASR completed in January 2016 Quarterly dividend of 7.5¢/share with a commitment to increasing this dividend as free cash flow grows over time Announced that Silver Lake Partners will make a $500 million strategic investment in Symantec through a convertible senior note
  • 17. 17Copyright © 2016 Symantec Corporation Q&A
  • 18. 18Copyright © 2016 Symantec Corporation CONTACT INVESTOR RELATIONS Jonathan Doros (650) 527-5523 Jonathan_Doros@symantec.com Nate Pollack (650) 527-7906 Nate_Pollack@symantec.com