SlideShare a Scribd company logo
1 of 61
SYMANTEC: PORTFOLIO
Symantec Sales Play
Iftikhar Ali Iqbal
Presales Consultant
SYMANTEC: Portfolio Sales Play
Valid till Jan 2017
Agenda
Company Overview1
Cyber Security Threat Landscape & Market2
Why Symantec?4
SYMANTEC: Portfolio Sales Play
What’s Next and Key Takeaways5
Portfolio & Competitive Analysis3
OVERVIEW: SYMANTEC
SYMANTEC: Portfolio Sales Play
OVERVIEW: SYMANTEC
• Founded in 1982
• Headquartered in Mountain View, California, United States
• Fortune 500 company
• Development centers in Pune, Chennai and Bengaluru (India)
• Provides Software and Services
• Focus is on Consumer Security and Enterprise Security
• Symantec = syntax, semantics and technology
• 11,000 employees (July 2016)
• Operations in Americas, EMEA and APJ
SYMANTEC: Portfolio Sales Play
OVERVIEW: SYMANTEC
• IPO on June 23, 1989
• Exchange: Ticker - NASDAQ: SYMC
• Fiscal Year Calendar: June to March
• Financial Data
SYMANTEC: Portfolio Sales Play
FY2015 FY2014
$6,538 $6,701
($ in millions)
FY2016 FY2015
$3,600 $3,956
During fiscal 2016, the Company began presenting the
financial results of Veritas within discontinued operations. This
presentation reflects the financial results of Veritas within
discontinued operations for both fiscal years.
KSA GULF, PK
$30 ~$20-25
($ in millions)
OVERVIEW: DEMERGER
• On 1st October 2015, Symantec’s Information Management
business now operates as a separate privately held company
Veritas Technologies Corporation
• The sale completed 30 January 2016 when Veritas became a
privately held company.
• Solutions:
– Backup and Recovery
– Archiving and eDiscovery
– Business Continuity and Disaster Recovery
• Separate operations, partner programs, support, etc.
SYMANTEC: Portfolio Sales Play
OVERVIEW: MAJOR MERGERS AND AQUISITIONS
SYMANTEC: Portfolio Sales Play
OVERVIEW: MERGERS AND AQUISITIONS
SYMANTEC: Portfolio Sales Play
• On June 13, 2016 it was announced that Symantec has acquired
Blue Coat for $4.65 billion.
• What is expected:
– Web and Cloud Security
– Encrypted Traffic Management
– Web Application Protection
• Blue Coat Threat Intelligence already integrated into Symantec
OVERVIEW: MANAGEMENT TEAM
Greg Clark
Chief Executive Officer
Michael Fey
President and Chief Operating
Officer
Nick Noviello
Executive Vice President and Chief
Financial Officer
SYMANTEC: Portfolio Sales Play
Brian Kenyon
Chief Strategy Officer
Hugh Thompson
Chief Technology Officer
Michael Williams
Chief Marketing Officer
MARKET: CYBERSECURITY LANDSCAPE & MARKET
SYMANTEC: Portfolio Sales Play
THREAT LANDSCAPE: THE NEWS
SYMANTEC: Portfolio Sales Play
THREAT LANDSCAPE: THE BIG NUMBERS
• 3x – A large business attacked once in was likely to be attacked
• ½ - Of all targeted attacks were against small businesses
• 55% - Increase in the number of spear-phishing campaigns attacks
• ¾ - legitimate websites found to have unpatched vulnerabilities
• 125% - Increase in the number of zero-day vulnerabilities discovered
• 35% - Increase in crypto-ransomware (end-users to businesses)
• 9 – Mega breaches, a record, occurred in 2015
• 430 Million - new pieces of unique malware discovered
SYMANTEC: Portfolio Sales Play
Internet Security Threat Report
THREAT LANDSCAPE: FUN FACT?
SYMANTEC: Portfolio Sales Play
In 2009 there were
2,361,414
new piece of malware created.
That’s
1 Million 179 Thousand
a day.
In 2015 that number was
430,555,582
$1T
2017-2021
~$200B/Y
THREAT LANDSCAPE: MARKET PROJECTIONS/FORECASTS
SYMANTEC: Portfolio Sales Play
By 2020
~170B/Y
$655B
2015-2020
~131B/Y
$500-700B
2017-2021
~$100-140B/Y
Various
Analysts
Corporations are
hesitant to
announce
breaches and
amounts of
security budgets
IT security services
are difficult to
fully size.
Tracking security
budget/cost
difficult they cut
across many
business areas
“Cybersecurity is the fastest growing tech sector. While all other sectors are
driven by reducing Inefficiencies and increasing productivity, cybersecurity
spending is driven by cybercrime. The unprecedented cybercriminal activity
we are witnessing is initiating so much cyber spending, it’s become nearly
impossible for the analysts to accurately track.”
Steve Morgan
Founder and Editor-In-Chief at Cybersecurity Ventures
SYMANTEC: PORTFOLIO
SYMANTEC: Portfolio Sales Play
PORTFOLIO: SOLUTIONS/PRODUCTS
SYMANTEC: Portfolio Sales Play
PORTFOLIO: NUTSHELL
Cyber Security Services
• Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 1
PROTECT MY ORGANIZATION FROM TARGETED ATTACKS
AND ADVANCED THREATS
PLAY 1: MALWARE PROTECTION
• THE PLAY:
– More complex multidimensional threat outbreaks
– Protect the endpoint, secure web and email gateways and provide
advanced threat protection
– Traditional malware security to Advanced Threat Protection
• THE SOLUTIONS:
– Endpoint Protection
– Mail Security for Exchange, Messaging Gateway, Email Security.Cloud
– Web Security.Cloud
– Advanced Threat Protection
– Protection Engine
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 2
HELP ME SECURE MY BUSINESS-CRITICAL SYSTEMS FROM
CYBER THREATS
PLAY 2: DATA CENTER SECURITY
• THE PLAY:
– Mission critical servers require more than antimalware
– Protect physical, virtual and cloud servers in heterogeneous environments
– Protect IoT infrastructure/devices
– Be able to cover legacy Operating Systems
– Agent-less antimalware for VMware Infrastructure
• THE SOLUTIONS:
– Critical System Protection
– Data Center Security: Server
– Data Center Security: Server Advanced
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 3
HELP MITIGATE RISK OF IP LOSS FROM CYBER THREATS
PLAY 3: DATA LOSS PREVENTION
• THE PLAY:
– Protect information against loss and theft, comply with data privacy
regulations, and safeguard their reputation.
– Prevent leakage of information from Endpoint, Network, Storage, Mobile and
Cloud
– Encrypt data at rest or transit
– Ensure required data/resources are accessed by authorized employees with 2-
FA or multi-factor authentication
• THE SOLUTIONS:
– Data Loss Prevention
– Encryption
– Validation and ID Protection
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 4
I REQUIRE VISIBILITY AND SECURE MANAGEMENT
ACROSS DEVICES, PLATFORMS AND APPLICATIONS
PLAY 4: ENDPOINT MANAGEMENT
• THE PLAY:
– Provisioning and migration of endpoints
– Make sure that operating systems, Microsoft and non-Microsoft software
are up to date
– Software and license management
– Inventory and management of endpoint hardware and applications
• THE SOLUTIONS:
– Client Management Suite
• Deployment Solution
• Patch Management Solution
• Software Management Solution
• Inventory Management Solution
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 5
HOW CAN I BUILD TRUST WITH EACH CUSTOMER?
HOW CAN I SECURE USER ACCESS AND COMMUNICATIONS
IN MY ORGANIZATION?
PLAY 5: PUBLIC KEY CERTIFICATES
• THE PLAY:
– Businesses and organizations of all kinds rely on websites, intranets, and
extranets to exchange confidential information and enable eCommerce.
– SSL/TLS Certificates, Code Signing Certificates and Digital Certificates
– SSL/TLS - Encrypt transmission and establish identity
– Digital Certificates - Authenticate devices and users
• THE SOLUTIONS:
– SSL
– Managed Public-Key Infrastructure
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
93%
Lack of
Resources,
Support and/or
Time
<15%
Work in Security
Awareness, Full-
Time
60%
Level of Executive
Support
Security Awareness
practitioners have a
communication
background
4%
SYMANTEC: Portfolio Sales Play
46%
Shortage of
Cybersecurity
skills
9%
No cybersecurity
skill deficiencies
86%
Difficult to recruit
cybersecurity
professionals
Cybersecurity skills,
most beneficial to
employees and
organization
44%
SYMANTEC: Portfolio Sales Play
67%
Incident Repose
more difficult
than 2 years ago
74%
Regularly ignore
some security
alerts
80%
Increase spending
on IR over 2 years
Specific incident
response training
for IT operations
staff
35%
SYMANTEC: Portfolio Sales Play
77%
Threat
Intelligence is
valuable to
security mission
70%
Too
voluminous/com
plex for
actionable
intelligence
27%
Effective in utilizing
data to pinpoint
cyber threats
Paid fees provides
more more
actionable
intelligence
46%
SYMANTEC: Portfolio Sales Play
56%
Unlikely or highly
unlikely be able
to detect a
sophisticate
attack
53%
Lack of skilled
resources as a
barrier to value
creation
63%
Budget constraints
for IS to contribute
to organization
Have formal
process and
advanced detection
function
9%
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 6
HOW CAN MY ORGANIZATION BE CYBER INTELLIGENT,
VIGILANT, RESPONSIVE AND READY?
PLAY 6: CYBER SECURITY SERVICES
• THE PLAY:
– Security-as-a-Service
– To address the lack of security expertise
– Intelligence on threats and adversaries
– Timely response to security incidents
• THE SOLUTIONS:
– Managed Security Service
– DeepSight Intelligence
– Incident Response Services
– Security Simulation
SYMANTEC: Portfolio Sales Play
PORTFOLIO: SERVICES
Support
Services
Consulting
Services
Education
Services
Essential
(24x7)
Basic
(9x5)
Business Critical
Services
Help me
DESIGN it,
INSTALL it,
ENHANCE it
Help me LEARN
about it & USE it
Help me UNLOCK
VALUE &
OPTIMIZE it
Help me FIX it
SYMANTEC: Portfolio Sales Play
Advisory
Design
Implement
Optimize
On-site
Specialist
Classroom
Virtual
Academy
Remote
Specialist
Residency
SYMANTEC: COMPTETIVE ANALYSIS
SYMANTEC: Portfolio Sales Play
COMPTETIVE ANALYSIS: PORTFOLIO
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
COMPTETIVE ANALYSIS: COMPETION BY PORTFOLIO
SYMANTEC: Portfolio Sales Play
Information ProtectionThreat Protection
Cyber Security Services
SYMANTEC: WHY SYMANTEC?
SYMANTEC: Portfolio Sales Play
SYMANTEC: THE TEAM
- approx. 550 employees
- security engineers, virus hunters,
threat analysts, and researchers
- Monitoring 130 million systems
- Data from 240,000 network sensors
- 200+ countries
- Tracking vulnerabilities
- Affecting 55,000 technologies
- 8,000+ vendors
- 7.5 million signatures
- 200 different network protocols
- 400 different behaviors
- 2.5 billion good/bad files
- 175 million participating users
SYMANTEC: Portfolio Sales Play
• 15 Years Delivering Security Monitoring and
Log Management
• 248+ Years of Forensic Investigation
• Average Experience of 15 Years
In-Field Active Investigation
• Hand Picked Security Professionals from
Government Agencies and Organizations
Around the World
EXPERIENCE
• 500+ Certified Cyber Security Professionals,
SOC Analysts 100% GIAC-GCIA Certified
• Leading Experts in Incident Response, Security
Monitoring and Intelligence
• Worlds Largest Cyber War Games Program
• Skilled in Cyber Security, Forensic Investigation,
Analysis, Data Science and Research
EXPERTISE
SECURITY TECHNOLOGY AND RESPONSE TEAM (STAR) CYBER SECURITY TEAM
SYMANTEC: GLOBAL INTELLIGENCE NETWORK (GIN)
SYMANTEC: Portfolio Sales Play
One of the largest civilian cyber intelligence networks
3.7 Trillion rows of security-relevant data
175M
Consumer and
Enterprise
endpoints
protected
57M
attack sensor
in 157countries
182M
web attacks
blocked last year
Discovered
430 million
new unique pieces
of malware last year
2 Billion
of email traffic
scanned/day
1 Billion
web requests
scanned daily
12,000+
Cloud applications
protected
SYMANTEC: ANALYST RELATIONS
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
SYMANTEC: ANALYST RELATIONS
Threat Protection Information Protection
SYMANTEC: Portfolio Sales Play
SYMANTEC: ANALYST RELATIONS
SYMANTEC: Portfolio Sales Play
SYMANTEC: WHAT’S NEXT?
SYMANTEC: Portfolio Sales Play
SYMANTEC: PORTFOLIO
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
SYMANTEC: Portfolio Sales Play
File
URL
Whitelist
Blacklist
Certificat
e
Machine
Learning
Cyber Security Services
DLPSecure Web
Gateway
Risk
Insight
Secure Mail
Gateway
Web Application
Firewall
Advanced Threat
Protection
Malware
Analysis
Cyber Security
Services
IT System
Management
Endpoint
Protection
EDR
Endpoint
Cloud
VIP
Identity
Local
Intelligence
File
URL
Whitelist
Blacklist
Certificate
Machine
Learning
SIEM Integration
Data Center
Security
EncryptionContent
Analysis
Performance
Optimization
Cloud
Secure Web
Gateway
Cloud
DLP CASB
Managed
PKI
Email
Security
Data
Center
Security
Cloud
Sandbox
Website
Security
Encryption
Compliance
Management
Encrypted
Traffic
Management
Security
Analytics
SOC Workbench
Third Party Ecosystem
ONPREMISESCLOUD
Cloud Data
Protection
SYMANTEC: RESOURCES
SYMANTEC: Portfolio Sales Play
RESOURCES: SALES
• Websites:
– Licensing Programs - https://www.symantec.com/support-center/buying-programs
– Partner Portal - https://www.symantec.com/partners
– Industry Analyst Reports - http://www.symantec.com/about/industryanalysts/analystreports.jsp
– Third-Party Tests Reports - https://www.symantec.com/products/performance-center
– Sales Support Cases – https://support.symantec.com/en_US/mysymantec.html
• Starting Point:
– Licensing Program (Express, Government, Rewards, etc)
– Opportunity Registrations (Opportunity Registration Rebate and Margin Builder)
– Support Types (Essential and Basic)
– Renewals
– Software Activation
– Price List
– Know What You Can Sell and Earn (Partner Program - Secure One)
– Independent Reports
– After-Sales Licensing Support
SYMANTEC: Portfolio Sales Play
RESOURCES : PRODUCT EDUCATION - SALES
• Websites:
– Partner Portal - https://www.symantec.com/partners
– Online Technical Training - https://education.symantec.com/Saba/Web/sena
– Symantec Community - http://www.symantec.com/connect/
• Product Material:
– Data Sheets/Brochures
– Licensing Guides
– Cheat Sheets/Sales Guides/ Sales Presentations
• Training and Certification:
• Symantec Sales Expert (SSE) – Overview and Positioning
• Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset)
SYMANTEC: Portfolio Sales Play
RESOURCES : PRODUCT EDUCATION - TECHNICAL
• Websites:
– Partner Portal - https://www.symantec.com/partners
– Online Technical Training - https://education.symantec.com/Saba/Web/sena
– Documentation and Support - https://support.symantec.com/en_US.html
– Symantec Community - http://www.symantec.com/connect/
– Technical Support Cases – https://support.symantec.com/en_US.html
• Product Material:
– Data Sheets/Whitepapers
– Licensing Guides
– Symantec eLibrary (Online Technical Training)
– Product Guides and Articles (Documentation and Support)
• Training and Certification:
• Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset)
• Symantec Certified Specialist (SCS) – Design, Deploy and Administer
SYMANTEC: Portfolio Sales Play
SYMANTEC: AREA OF FOCUS
• Portfolio covers a broad range of technologies/services:
– Endpoint, Mail and Web Security with Content Analysis
– Network Forensics and Web Application Firewall
– Advanced Threat Protection and Malware Analysis
– Data Loss Prevention, Encryption and Encrypted Traffic Management
– SSL, 2 FA, Single-Sign On and Managed PKI
– Cloud Access Security Broker (CASB)
– Network Performance Optimization
– Advanced Security for Virtual and Physical Servers/Environments
– Client, Server, Asset Management and Help Desk
– Malware Protection for NAS and Web Applications
– IT Risk and Compliance
– Technical and Adversary Intelligence
– Managed Security Services
– Incident Response
– Security Simulation
SYMANTEC: Portfolio Sales Play
SYMANTEC: ENDING NOTE
SYMANTEC: Portfolio Sales Play
Thank you!
Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
Iftikhar Ali Iqbal
Pre-sales Consultant
iftikhar_iqbal@mindware.ae
SYMANTEC: Portfolio Sales Play

More Related Content

What's hot

Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber securitymahendra_chauhan
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SHRIYARAI4
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSPriyanka Aash
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfslametarrokhim1
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Mukesh Chinta
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 

What's hot (20)

Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 

Similar to Symantec Portfolio - Sales Play

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & ResponseHarry McLaren
 

Similar to Symantec Portfolio - Sales Play (20)

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 

More from Iftikhar Ali Iqbal

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingIftikhar Ali Iqbal
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Iftikhar Ali Iqbal
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Iftikhar Ali Iqbal
 

More from Iftikhar Ali Iqbal (17)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Symantec Portfolio - Sales Play

  • 1. SYMANTEC: PORTFOLIO Symantec Sales Play Iftikhar Ali Iqbal Presales Consultant SYMANTEC: Portfolio Sales Play Valid till Jan 2017
  • 2. Agenda Company Overview1 Cyber Security Threat Landscape & Market2 Why Symantec?4 SYMANTEC: Portfolio Sales Play What’s Next and Key Takeaways5 Portfolio & Competitive Analysis3
  • 4. OVERVIEW: SYMANTEC • Founded in 1982 • Headquartered in Mountain View, California, United States • Fortune 500 company • Development centers in Pune, Chennai and Bengaluru (India) • Provides Software and Services • Focus is on Consumer Security and Enterprise Security • Symantec = syntax, semantics and technology • 11,000 employees (July 2016) • Operations in Americas, EMEA and APJ SYMANTEC: Portfolio Sales Play
  • 5. OVERVIEW: SYMANTEC • IPO on June 23, 1989 • Exchange: Ticker - NASDAQ: SYMC • Fiscal Year Calendar: June to March • Financial Data SYMANTEC: Portfolio Sales Play FY2015 FY2014 $6,538 $6,701 ($ in millions) FY2016 FY2015 $3,600 $3,956 During fiscal 2016, the Company began presenting the financial results of Veritas within discontinued operations. This presentation reflects the financial results of Veritas within discontinued operations for both fiscal years. KSA GULF, PK $30 ~$20-25 ($ in millions)
  • 6. OVERVIEW: DEMERGER • On 1st October 2015, Symantec’s Information Management business now operates as a separate privately held company Veritas Technologies Corporation • The sale completed 30 January 2016 when Veritas became a privately held company. • Solutions: – Backup and Recovery – Archiving and eDiscovery – Business Continuity and Disaster Recovery • Separate operations, partner programs, support, etc. SYMANTEC: Portfolio Sales Play
  • 7. OVERVIEW: MAJOR MERGERS AND AQUISITIONS SYMANTEC: Portfolio Sales Play
  • 8. OVERVIEW: MERGERS AND AQUISITIONS SYMANTEC: Portfolio Sales Play • On June 13, 2016 it was announced that Symantec has acquired Blue Coat for $4.65 billion. • What is expected: – Web and Cloud Security – Encrypted Traffic Management – Web Application Protection • Blue Coat Threat Intelligence already integrated into Symantec
  • 9. OVERVIEW: MANAGEMENT TEAM Greg Clark Chief Executive Officer Michael Fey President and Chief Operating Officer Nick Noviello Executive Vice President and Chief Financial Officer SYMANTEC: Portfolio Sales Play Brian Kenyon Chief Strategy Officer Hugh Thompson Chief Technology Officer Michael Williams Chief Marketing Officer
  • 10. MARKET: CYBERSECURITY LANDSCAPE & MARKET SYMANTEC: Portfolio Sales Play
  • 11. THREAT LANDSCAPE: THE NEWS SYMANTEC: Portfolio Sales Play
  • 12. THREAT LANDSCAPE: THE BIG NUMBERS • 3x – A large business attacked once in was likely to be attacked • ½ - Of all targeted attacks were against small businesses • 55% - Increase in the number of spear-phishing campaigns attacks • ¾ - legitimate websites found to have unpatched vulnerabilities • 125% - Increase in the number of zero-day vulnerabilities discovered • 35% - Increase in crypto-ransomware (end-users to businesses) • 9 – Mega breaches, a record, occurred in 2015 • 430 Million - new pieces of unique malware discovered SYMANTEC: Portfolio Sales Play Internet Security Threat Report
  • 13. THREAT LANDSCAPE: FUN FACT? SYMANTEC: Portfolio Sales Play In 2009 there were 2,361,414 new piece of malware created. That’s 1 Million 179 Thousand a day. In 2015 that number was 430,555,582
  • 14. $1T 2017-2021 ~$200B/Y THREAT LANDSCAPE: MARKET PROJECTIONS/FORECASTS SYMANTEC: Portfolio Sales Play By 2020 ~170B/Y $655B 2015-2020 ~131B/Y $500-700B 2017-2021 ~$100-140B/Y Various Analysts Corporations are hesitant to announce breaches and amounts of security budgets IT security services are difficult to fully size. Tracking security budget/cost difficult they cut across many business areas “Cybersecurity is the fastest growing tech sector. While all other sectors are driven by reducing Inefficiencies and increasing productivity, cybersecurity spending is driven by cybercrime. The unprecedented cybercriminal activity we are witnessing is initiating so much cyber spending, it’s become nearly impossible for the analysts to accurately track.” Steve Morgan Founder and Editor-In-Chief at Cybersecurity Ventures
  • 17. PORTFOLIO: NUTSHELL Cyber Security Services • Monitoring , Incident Response, Simulation, Adversary Threat Intelligence Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play
  • 19. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 1 PROTECT MY ORGANIZATION FROM TARGETED ATTACKS AND ADVANCED THREATS
  • 20. PLAY 1: MALWARE PROTECTION • THE PLAY: – More complex multidimensional threat outbreaks – Protect the endpoint, secure web and email gateways and provide advanced threat protection – Traditional malware security to Advanced Threat Protection • THE SOLUTIONS: – Endpoint Protection – Mail Security for Exchange, Messaging Gateway, Email Security.Cloud – Web Security.Cloud – Advanced Threat Protection – Protection Engine SYMANTEC: Portfolio Sales Play
  • 22. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 2 HELP ME SECURE MY BUSINESS-CRITICAL SYSTEMS FROM CYBER THREATS
  • 23. PLAY 2: DATA CENTER SECURITY • THE PLAY: – Mission critical servers require more than antimalware – Protect physical, virtual and cloud servers in heterogeneous environments – Protect IoT infrastructure/devices – Be able to cover legacy Operating Systems – Agent-less antimalware for VMware Infrastructure • THE SOLUTIONS: – Critical System Protection – Data Center Security: Server – Data Center Security: Server Advanced SYMANTEC: Portfolio Sales Play
  • 25. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 3 HELP MITIGATE RISK OF IP LOSS FROM CYBER THREATS
  • 26. PLAY 3: DATA LOSS PREVENTION • THE PLAY: – Protect information against loss and theft, comply with data privacy regulations, and safeguard their reputation. – Prevent leakage of information from Endpoint, Network, Storage, Mobile and Cloud – Encrypt data at rest or transit – Ensure required data/resources are accessed by authorized employees with 2- FA or multi-factor authentication • THE SOLUTIONS: – Data Loss Prevention – Encryption – Validation and ID Protection SYMANTEC: Portfolio Sales Play
  • 28. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 4 I REQUIRE VISIBILITY AND SECURE MANAGEMENT ACROSS DEVICES, PLATFORMS AND APPLICATIONS
  • 29. PLAY 4: ENDPOINT MANAGEMENT • THE PLAY: – Provisioning and migration of endpoints – Make sure that operating systems, Microsoft and non-Microsoft software are up to date – Software and license management – Inventory and management of endpoint hardware and applications • THE SOLUTIONS: – Client Management Suite • Deployment Solution • Patch Management Solution • Software Management Solution • Inventory Management Solution SYMANTEC: Portfolio Sales Play
  • 31. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 5 HOW CAN I BUILD TRUST WITH EACH CUSTOMER? HOW CAN I SECURE USER ACCESS AND COMMUNICATIONS IN MY ORGANIZATION?
  • 32. PLAY 5: PUBLIC KEY CERTIFICATES • THE PLAY: – Businesses and organizations of all kinds rely on websites, intranets, and extranets to exchange confidential information and enable eCommerce. – SSL/TLS Certificates, Code Signing Certificates and Digital Certificates – SSL/TLS - Encrypt transmission and establish identity – Digital Certificates - Authenticate devices and users • THE SOLUTIONS: – SSL – Managed Public-Key Infrastructure SYMANTEC: Portfolio Sales Play
  • 33. SYMANTEC: Portfolio Sales Play 93% Lack of Resources, Support and/or Time <15% Work in Security Awareness, Full- Time 60% Level of Executive Support Security Awareness practitioners have a communication background 4%
  • 34. SYMANTEC: Portfolio Sales Play 46% Shortage of Cybersecurity skills 9% No cybersecurity skill deficiencies 86% Difficult to recruit cybersecurity professionals Cybersecurity skills, most beneficial to employees and organization 44%
  • 35. SYMANTEC: Portfolio Sales Play 67% Incident Repose more difficult than 2 years ago 74% Regularly ignore some security alerts 80% Increase spending on IR over 2 years Specific incident response training for IT operations staff 35%
  • 36. SYMANTEC: Portfolio Sales Play 77% Threat Intelligence is valuable to security mission 70% Too voluminous/com plex for actionable intelligence 27% Effective in utilizing data to pinpoint cyber threats Paid fees provides more more actionable intelligence 46%
  • 37. SYMANTEC: Portfolio Sales Play 56% Unlikely or highly unlikely be able to detect a sophisticate attack 53% Lack of skilled resources as a barrier to value creation 63% Budget constraints for IS to contribute to organization Have formal process and advanced detection function 9%
  • 38. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 6 HOW CAN MY ORGANIZATION BE CYBER INTELLIGENT, VIGILANT, RESPONSIVE AND READY?
  • 39. PLAY 6: CYBER SECURITY SERVICES • THE PLAY: – Security-as-a-Service – To address the lack of security expertise – Intelligence on threats and adversaries – Timely response to security incidents • THE SOLUTIONS: – Managed Security Service – DeepSight Intelligence – Incident Response Services – Security Simulation SYMANTEC: Portfolio Sales Play
  • 40. PORTFOLIO: SERVICES Support Services Consulting Services Education Services Essential (24x7) Basic (9x5) Business Critical Services Help me DESIGN it, INSTALL it, ENHANCE it Help me LEARN about it & USE it Help me UNLOCK VALUE & OPTIMIZE it Help me FIX it SYMANTEC: Portfolio Sales Play Advisory Design Implement Optimize On-site Specialist Classroom Virtual Academy Remote Specialist Residency
  • 42. COMPTETIVE ANALYSIS: PORTFOLIO Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 43. COMPTETIVE ANALYSIS: COMPETION BY PORTFOLIO SYMANTEC: Portfolio Sales Play Information ProtectionThreat Protection Cyber Security Services
  • 44. SYMANTEC: WHY SYMANTEC? SYMANTEC: Portfolio Sales Play
  • 45. SYMANTEC: THE TEAM - approx. 550 employees - security engineers, virus hunters, threat analysts, and researchers - Monitoring 130 million systems - Data from 240,000 network sensors - 200+ countries - Tracking vulnerabilities - Affecting 55,000 technologies - 8,000+ vendors - 7.5 million signatures - 200 different network protocols - 400 different behaviors - 2.5 billion good/bad files - 175 million participating users SYMANTEC: Portfolio Sales Play • 15 Years Delivering Security Monitoring and Log Management • 248+ Years of Forensic Investigation • Average Experience of 15 Years In-Field Active Investigation • Hand Picked Security Professionals from Government Agencies and Organizations Around the World EXPERIENCE • 500+ Certified Cyber Security Professionals, SOC Analysts 100% GIAC-GCIA Certified • Leading Experts in Incident Response, Security Monitoring and Intelligence • Worlds Largest Cyber War Games Program • Skilled in Cyber Security, Forensic Investigation, Analysis, Data Science and Research EXPERTISE SECURITY TECHNOLOGY AND RESPONSE TEAM (STAR) CYBER SECURITY TEAM
  • 46. SYMANTEC: GLOBAL INTELLIGENCE NETWORK (GIN) SYMANTEC: Portfolio Sales Play One of the largest civilian cyber intelligence networks 3.7 Trillion rows of security-relevant data 175M Consumer and Enterprise endpoints protected 57M attack sensor in 157countries 182M web attacks blocked last year Discovered 430 million new unique pieces of malware last year 2 Billion of email traffic scanned/day 1 Billion web requests scanned daily 12,000+ Cloud applications protected
  • 47. SYMANTEC: ANALYST RELATIONS Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 48. SYMANTEC: ANALYST RELATIONS Threat Protection Information Protection SYMANTEC: Portfolio Sales Play
  • 50. SYMANTEC: WHAT’S NEXT? SYMANTEC: Portfolio Sales Play
  • 51. SYMANTEC: PORTFOLIO Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 54. DLPSecure Web Gateway Risk Insight Secure Mail Gateway Web Application Firewall Advanced Threat Protection Malware Analysis Cyber Security Services IT System Management Endpoint Protection EDR Endpoint Cloud VIP Identity Local Intelligence File URL Whitelist Blacklist Certificate Machine Learning SIEM Integration Data Center Security EncryptionContent Analysis Performance Optimization Cloud Secure Web Gateway Cloud DLP CASB Managed PKI Email Security Data Center Security Cloud Sandbox Website Security Encryption Compliance Management Encrypted Traffic Management Security Analytics SOC Workbench Third Party Ecosystem ONPREMISESCLOUD Cloud Data Protection
  • 56. RESOURCES: SALES • Websites: – Licensing Programs - https://www.symantec.com/support-center/buying-programs – Partner Portal - https://www.symantec.com/partners – Industry Analyst Reports - http://www.symantec.com/about/industryanalysts/analystreports.jsp – Third-Party Tests Reports - https://www.symantec.com/products/performance-center – Sales Support Cases – https://support.symantec.com/en_US/mysymantec.html • Starting Point: – Licensing Program (Express, Government, Rewards, etc) – Opportunity Registrations (Opportunity Registration Rebate and Margin Builder) – Support Types (Essential and Basic) – Renewals – Software Activation – Price List – Know What You Can Sell and Earn (Partner Program - Secure One) – Independent Reports – After-Sales Licensing Support SYMANTEC: Portfolio Sales Play
  • 57. RESOURCES : PRODUCT EDUCATION - SALES • Websites: – Partner Portal - https://www.symantec.com/partners – Online Technical Training - https://education.symantec.com/Saba/Web/sena – Symantec Community - http://www.symantec.com/connect/ • Product Material: – Data Sheets/Brochures – Licensing Guides – Cheat Sheets/Sales Guides/ Sales Presentations • Training and Certification: • Symantec Sales Expert (SSE) – Overview and Positioning • Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset) SYMANTEC: Portfolio Sales Play
  • 58. RESOURCES : PRODUCT EDUCATION - TECHNICAL • Websites: – Partner Portal - https://www.symantec.com/partners – Online Technical Training - https://education.symantec.com/Saba/Web/sena – Documentation and Support - https://support.symantec.com/en_US.html – Symantec Community - http://www.symantec.com/connect/ – Technical Support Cases – https://support.symantec.com/en_US.html • Product Material: – Data Sheets/Whitepapers – Licensing Guides – Symantec eLibrary (Online Technical Training) – Product Guides and Articles (Documentation and Support) • Training and Certification: • Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset) • Symantec Certified Specialist (SCS) – Design, Deploy and Administer SYMANTEC: Portfolio Sales Play
  • 59. SYMANTEC: AREA OF FOCUS • Portfolio covers a broad range of technologies/services: – Endpoint, Mail and Web Security with Content Analysis – Network Forensics and Web Application Firewall – Advanced Threat Protection and Malware Analysis – Data Loss Prevention, Encryption and Encrypted Traffic Management – SSL, 2 FA, Single-Sign On and Managed PKI – Cloud Access Security Broker (CASB) – Network Performance Optimization – Advanced Security for Virtual and Physical Servers/Environments – Client, Server, Asset Management and Help Desk – Malware Protection for NAS and Web Applications – IT Risk and Compliance – Technical and Adversary Intelligence – Managed Security Services – Incident Response – Security Simulation SYMANTEC: Portfolio Sales Play
  • 60. SYMANTEC: ENDING NOTE SYMANTEC: Portfolio Sales Play
  • 61. Thank you! Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! Iftikhar Ali Iqbal Pre-sales Consultant iftikhar_iqbal@mindware.ae SYMANTEC: Portfolio Sales Play