SlideShare a Scribd company logo
1 of 61
SYMANTEC: PORTFOLIO
Symantec Sales Play
Iftikhar Ali Iqbal
Presales Consultant
SYMANTEC: Portfolio Sales Play
Valid till Jan 2017
Agenda
Company Overview1
Cyber Security Threat Landscape & Market2
Why Symantec?4
SYMANTEC: Portfolio Sales Play
What’s Next and Key Takeaways5
Portfolio & Competitive Analysis3
OVERVIEW: SYMANTEC
SYMANTEC: Portfolio Sales Play
OVERVIEW: SYMANTEC
• Founded in 1982
• Headquartered in Mountain View, California, United States
• Fortune 500 company
• Development centers in Pune, Chennai and Bengaluru (India)
• Provides Software and Services
• Focus is on Consumer Security and Enterprise Security
• Symantec = syntax, semantics and technology
• 11,000 employees (July 2016)
• Operations in Americas, EMEA and APJ
SYMANTEC: Portfolio Sales Play
OVERVIEW: SYMANTEC
• IPO on June 23, 1989
• Exchange: Ticker - NASDAQ: SYMC
• Fiscal Year Calendar: June to March
• Financial Data
SYMANTEC: Portfolio Sales Play
FY2015 FY2014
$6,538 $6,701
($ in millions)
FY2016 FY2015
$3,600 $3,956
During fiscal 2016, the Company began presenting the
financial results of Veritas within discontinued operations. This
presentation reflects the financial results of Veritas within
discontinued operations for both fiscal years.
KSA GULF, PK
$30 ~$20-25
($ in millions)
OVERVIEW: DEMERGER
• On 1st October 2015, Symantec’s Information Management
business now operates as a separate privately held company
Veritas Technologies Corporation
• The sale completed 30 January 2016 when Veritas became a
privately held company.
• Solutions:
– Backup and Recovery
– Archiving and eDiscovery
– Business Continuity and Disaster Recovery
• Separate operations, partner programs, support, etc.
SYMANTEC: Portfolio Sales Play
OVERVIEW: MAJOR MERGERS AND AQUISITIONS
SYMANTEC: Portfolio Sales Play
OVERVIEW: MERGERS AND AQUISITIONS
SYMANTEC: Portfolio Sales Play
• On June 13, 2016 it was announced that Symantec has acquired
Blue Coat for $4.65 billion.
• What is expected:
– Web and Cloud Security
– Encrypted Traffic Management
– Web Application Protection
• Blue Coat Threat Intelligence already integrated into Symantec
OVERVIEW: MANAGEMENT TEAM
Greg Clark
Chief Executive Officer
Michael Fey
President and Chief Operating
Officer
Nick Noviello
Executive Vice President and Chief
Financial Officer
SYMANTEC: Portfolio Sales Play
Brian Kenyon
Chief Strategy Officer
Hugh Thompson
Chief Technology Officer
Michael Williams
Chief Marketing Officer
MARKET: CYBERSECURITY LANDSCAPE & MARKET
SYMANTEC: Portfolio Sales Play
THREAT LANDSCAPE: THE NEWS
SYMANTEC: Portfolio Sales Play
THREAT LANDSCAPE: THE BIG NUMBERS
• 3x – A large business attacked once in was likely to be attacked
• ½ - Of all targeted attacks were against small businesses
• 55% - Increase in the number of spear-phishing campaigns attacks
• ¾ - legitimate websites found to have unpatched vulnerabilities
• 125% - Increase in the number of zero-day vulnerabilities discovered
• 35% - Increase in crypto-ransomware (end-users to businesses)
• 9 – Mega breaches, a record, occurred in 2015
• 430 Million - new pieces of unique malware discovered
SYMANTEC: Portfolio Sales Play
Internet Security Threat Report
THREAT LANDSCAPE: FUN FACT?
SYMANTEC: Portfolio Sales Play
In 2009 there were
2,361,414
new piece of malware created.
That’s
1 Million 179 Thousand
a day.
In 2015 that number was
430,555,582
$1T
2017-2021
~$200B/Y
THREAT LANDSCAPE: MARKET PROJECTIONS/FORECASTS
SYMANTEC: Portfolio Sales Play
By 2020
~170B/Y
$655B
2015-2020
~131B/Y
$500-700B
2017-2021
~$100-140B/Y
Various
Analysts
Corporations are
hesitant to
announce
breaches and
amounts of
security budgets
IT security services
are difficult to
fully size.
Tracking security
budget/cost
difficult they cut
across many
business areas
“Cybersecurity is the fastest growing tech sector. While all other sectors are
driven by reducing Inefficiencies and increasing productivity, cybersecurity
spending is driven by cybercrime. The unprecedented cybercriminal activity
we are witnessing is initiating so much cyber spending, it’s become nearly
impossible for the analysts to accurately track.”
Steve Morgan
Founder and Editor-In-Chief at Cybersecurity Ventures
SYMANTEC: PORTFOLIO
SYMANTEC: Portfolio Sales Play
PORTFOLIO: SOLUTIONS/PRODUCTS
SYMANTEC: Portfolio Sales Play
PORTFOLIO: NUTSHELL
Cyber Security Services
• Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 1
PROTECT MY ORGANIZATION FROM TARGETED ATTACKS
AND ADVANCED THREATS
PLAY 1: MALWARE PROTECTION
• THE PLAY:
– More complex multidimensional threat outbreaks
– Protect the endpoint, secure web and email gateways and provide
advanced threat protection
– Traditional malware security to Advanced Threat Protection
• THE SOLUTIONS:
– Endpoint Protection
– Mail Security for Exchange, Messaging Gateway, Email Security.Cloud
– Web Security.Cloud
– Advanced Threat Protection
– Protection Engine
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 2
HELP ME SECURE MY BUSINESS-CRITICAL SYSTEMS FROM
CYBER THREATS
PLAY 2: DATA CENTER SECURITY
• THE PLAY:
– Mission critical servers require more than antimalware
– Protect physical, virtual and cloud servers in heterogeneous environments
– Protect IoT infrastructure/devices
– Be able to cover legacy Operating Systems
– Agent-less antimalware for VMware Infrastructure
• THE SOLUTIONS:
– Critical System Protection
– Data Center Security: Server
– Data Center Security: Server Advanced
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 3
HELP MITIGATE RISK OF IP LOSS FROM CYBER THREATS
PLAY 3: DATA LOSS PREVENTION
• THE PLAY:
– Protect information against loss and theft, comply with data privacy
regulations, and safeguard their reputation.
– Prevent leakage of information from Endpoint, Network, Storage, Mobile and
Cloud
– Encrypt data at rest or transit
– Ensure required data/resources are accessed by authorized employees with 2-
FA or multi-factor authentication
• THE SOLUTIONS:
– Data Loss Prevention
– Encryption
– Validation and ID Protection
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 4
I REQUIRE VISIBILITY AND SECURE MANAGEMENT
ACROSS DEVICES, PLATFORMS AND APPLICATIONS
PLAY 4: ENDPOINT MANAGEMENT
• THE PLAY:
– Provisioning and migration of endpoints
– Make sure that operating systems, Microsoft and non-Microsoft software
are up to date
– Software and license management
– Inventory and management of endpoint hardware and applications
• THE SOLUTIONS:
– Client Management Suite
• Deployment Solution
• Patch Management Solution
• Software Management Solution
• Inventory Management Solution
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 5
HOW CAN I BUILD TRUST WITH EACH CUSTOMER?
HOW CAN I SECURE USER ACCESS AND COMMUNICATIONS
IN MY ORGANIZATION?
PLAY 5: PUBLIC KEY CERTIFICATES
• THE PLAY:
– Businesses and organizations of all kinds rely on websites, intranets, and
extranets to exchange confidential information and enable eCommerce.
– SSL/TLS Certificates, Code Signing Certificates and Digital Certificates
– SSL/TLS - Encrypt transmission and establish identity
– Digital Certificates - Authenticate devices and users
• THE SOLUTIONS:
– SSL
– Managed Public-Key Infrastructure
SYMANTEC: Portfolio Sales Play
SYMANTEC: Portfolio Sales Play
93%
Lack of
Resources,
Support and/or
Time
<15%
Work in Security
Awareness, Full-
Time
60%
Level of Executive
Support
Security Awareness
practitioners have a
communication
background
4%
SYMANTEC: Portfolio Sales Play
46%
Shortage of
Cybersecurity
skills
9%
No cybersecurity
skill deficiencies
86%
Difficult to recruit
cybersecurity
professionals
Cybersecurity skills,
most beneficial to
employees and
organization
44%
SYMANTEC: Portfolio Sales Play
67%
Incident Repose
more difficult
than 2 years ago
74%
Regularly ignore
some security
alerts
80%
Increase spending
on IR over 2 years
Specific incident
response training
for IT operations
staff
35%
SYMANTEC: Portfolio Sales Play
77%
Threat
Intelligence is
valuable to
security mission
70%
Too
voluminous/com
plex for
actionable
intelligence
27%
Effective in utilizing
data to pinpoint
cyber threats
Paid fees provides
more more
actionable
intelligence
46%
SYMANTEC: Portfolio Sales Play
56%
Unlikely or highly
unlikely be able
to detect a
sophisticate
attack
53%
Lack of skilled
resources as a
barrier to value
creation
63%
Budget constraints
for IS to contribute
to organization
Have formal
process and
advanced detection
function
9%
SYMANTEC: Portfolio Sales Play
OPPORTUNITY # 6
HOW CAN MY ORGANIZATION BE CYBER INTELLIGENT,
VIGILANT, RESPONSIVE AND READY?
PLAY 6: CYBER SECURITY SERVICES
• THE PLAY:
– Security-as-a-Service
– To address the lack of security expertise
– Intelligence on threats and adversaries
– Timely response to security incidents
• THE SOLUTIONS:
– Managed Security Service
– DeepSight Intelligence
– Incident Response Services
– Security Simulation
SYMANTEC: Portfolio Sales Play
PORTFOLIO: SERVICES
Support
Services
Consulting
Services
Education
Services
Essential
(24x7)
Basic
(9x5)
Business Critical
Services
Help me
DESIGN it,
INSTALL it,
ENHANCE it
Help me LEARN
about it & USE it
Help me UNLOCK
VALUE &
OPTIMIZE it
Help me FIX it
SYMANTEC: Portfolio Sales Play
Advisory
Design
Implement
Optimize
On-site
Specialist
Classroom
Virtual
Academy
Remote
Specialist
Residency
SYMANTEC: COMPTETIVE ANALYSIS
SYMANTEC: Portfolio Sales Play
COMPTETIVE ANALYSIS: PORTFOLIO
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
COMPTETIVE ANALYSIS: COMPETION BY PORTFOLIO
SYMANTEC: Portfolio Sales Play
Information ProtectionThreat Protection
Cyber Security Services
SYMANTEC: WHY SYMANTEC?
SYMANTEC: Portfolio Sales Play
SYMANTEC: THE TEAM
- approx. 550 employees
- security engineers, virus hunters,
threat analysts, and researchers
- Monitoring 130 million systems
- Data from 240,000 network sensors
- 200+ countries
- Tracking vulnerabilities
- Affecting 55,000 technologies
- 8,000+ vendors
- 7.5 million signatures
- 200 different network protocols
- 400 different behaviors
- 2.5 billion good/bad files
- 175 million participating users
SYMANTEC: Portfolio Sales Play
• 15 Years Delivering Security Monitoring and
Log Management
• 248+ Years of Forensic Investigation
• Average Experience of 15 Years
In-Field Active Investigation
• Hand Picked Security Professionals from
Government Agencies and Organizations
Around the World
EXPERIENCE
• 500+ Certified Cyber Security Professionals,
SOC Analysts 100% GIAC-GCIA Certified
• Leading Experts in Incident Response, Security
Monitoring and Intelligence
• Worlds Largest Cyber War Games Program
• Skilled in Cyber Security, Forensic Investigation,
Analysis, Data Science and Research
EXPERTISE
SECURITY TECHNOLOGY AND RESPONSE TEAM (STAR) CYBER SECURITY TEAM
SYMANTEC: GLOBAL INTELLIGENCE NETWORK (GIN)
SYMANTEC: Portfolio Sales Play
One of the largest civilian cyber intelligence networks
3.7 Trillion rows of security-relevant data
175M
Consumer and
Enterprise
endpoints
protected
57M
attack sensor
in 157countries
182M
web attacks
blocked last year
Discovered
430 million
new unique pieces
of malware last year
2 Billion
of email traffic
scanned/day
1 Billion
web requests
scanned daily
12,000+
Cloud applications
protected
SYMANTEC: ANALYST RELATIONS
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
SYMANTEC: ANALYST RELATIONS
Threat Protection Information Protection
SYMANTEC: Portfolio Sales Play
SYMANTEC: ANALYST RELATIONS
SYMANTEC: Portfolio Sales Play
SYMANTEC: WHAT’S NEXT?
SYMANTEC: Portfolio Sales Play
SYMANTEC: PORTFOLIO
Cyber Security Services
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Portfolio Sales Play
Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
SYMANTEC: Portfolio Sales Play
File
URL
Whitelist
Blacklist
Certificat
e
Machine
Learning
Cyber Security Services
DLPSecure Web
Gateway
Risk
Insight
Secure Mail
Gateway
Web Application
Firewall
Advanced Threat
Protection
Malware
Analysis
Cyber Security
Services
IT System
Management
Endpoint
Protection
EDR
Endpoint
Cloud
VIP
Identity
Local
Intelligence
File
URL
Whitelist
Blacklist
Certificate
Machine
Learning
SIEM Integration
Data Center
Security
EncryptionContent
Analysis
Performance
Optimization
Cloud
Secure Web
Gateway
Cloud
DLP CASB
Managed
PKI
Email
Security
Data
Center
Security
Cloud
Sandbox
Website
Security
Encryption
Compliance
Management
Encrypted
Traffic
Management
Security
Analytics
SOC Workbench
Third Party Ecosystem
ONPREMISESCLOUD
Cloud Data
Protection
SYMANTEC: RESOURCES
SYMANTEC: Portfolio Sales Play
RESOURCES: SALES
• Websites:
– Licensing Programs - https://www.symantec.com/support-center/buying-programs
– Partner Portal - https://www.symantec.com/partners
– Industry Analyst Reports - http://www.symantec.com/about/industryanalysts/analystreports.jsp
– Third-Party Tests Reports - https://www.symantec.com/products/performance-center
– Sales Support Cases – https://support.symantec.com/en_US/mysymantec.html
• Starting Point:
– Licensing Program (Express, Government, Rewards, etc)
– Opportunity Registrations (Opportunity Registration Rebate and Margin Builder)
– Support Types (Essential and Basic)
– Renewals
– Software Activation
– Price List
– Know What You Can Sell and Earn (Partner Program - Secure One)
– Independent Reports
– After-Sales Licensing Support
SYMANTEC: Portfolio Sales Play
RESOURCES : PRODUCT EDUCATION - SALES
• Websites:
– Partner Portal - https://www.symantec.com/partners
– Online Technical Training - https://education.symantec.com/Saba/Web/sena
– Symantec Community - http://www.symantec.com/connect/
• Product Material:
– Data Sheets/Brochures
– Licensing Guides
– Cheat Sheets/Sales Guides/ Sales Presentations
• Training and Certification:
• Symantec Sales Expert (SSE) – Overview and Positioning
• Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset)
SYMANTEC: Portfolio Sales Play
RESOURCES : PRODUCT EDUCATION - TECHNICAL
• Websites:
– Partner Portal - https://www.symantec.com/partners
– Online Technical Training - https://education.symantec.com/Saba/Web/sena
– Documentation and Support - https://support.symantec.com/en_US.html
– Symantec Community - http://www.symantec.com/connect/
– Technical Support Cases – https://support.symantec.com/en_US.html
• Product Material:
– Data Sheets/Whitepapers
– Licensing Guides
– Symantec eLibrary (Online Technical Training)
– Product Guides and Articles (Documentation and Support)
• Training and Certification:
• Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset)
• Symantec Certified Specialist (SCS) – Design, Deploy and Administer
SYMANTEC: Portfolio Sales Play
SYMANTEC: AREA OF FOCUS
• Portfolio covers a broad range of technologies/services:
– Endpoint, Mail and Web Security with Content Analysis
– Network Forensics and Web Application Firewall
– Advanced Threat Protection and Malware Analysis
– Data Loss Prevention, Encryption and Encrypted Traffic Management
– SSL, 2 FA, Single-Sign On and Managed PKI
– Cloud Access Security Broker (CASB)
– Network Performance Optimization
– Advanced Security for Virtual and Physical Servers/Environments
– Client, Server, Asset Management and Help Desk
– Malware Protection for NAS and Web Applications
– IT Risk and Compliance
– Technical and Adversary Intelligence
– Managed Security Services
– Incident Response
– Security Simulation
SYMANTEC: Portfolio Sales Play
SYMANTEC: ENDING NOTE
SYMANTEC: Portfolio Sales Play
Thank you!
Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
Iftikhar Ali Iqbal
Pre-sales Consultant
iftikhar_iqbal@mindware.ae
SYMANTEC: Portfolio Sales Play

More Related Content

What's hot

Container Security Using Microsoft Defender
Container Security Using Microsoft DefenderContainer Security Using Microsoft Defender
Container Security Using Microsoft DefenderRahul Khengare
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
ECMS2 Training Slides.pdf
ECMS2 Training Slides.pdfECMS2 Training Slides.pdf
ECMS2 Training Slides.pdfaplic1
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdfJoniGarcia9
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1Shobhit Sharma
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know➲ Stella Bridges
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKappa Data
 

What's hot (20)

Container Security Using Microsoft Defender
Container Security Using Microsoft DefenderContainer Security Using Microsoft Defender
Container Security Using Microsoft Defender
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
ECMS2 Training Slides.pdf
ECMS2 Training Slides.pdfECMS2 Training Slides.pdf
ECMS2 Training Slides.pdf
 
Ready
ReadyReady
Ready
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 

Similar to Symantec Portfolio - Sales Play

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & ResponseHarry McLaren
 

Similar to Symantec Portfolio - Sales Play (20)

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Big Data For Threat Detection & Response
Big Data For Threat Detection & ResponseBig Data For Threat Detection & Response
Big Data For Threat Detection & Response
 

More from Iftikhar Ali Iqbal

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalIftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingIftikhar Ali Iqbal
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)Iftikhar Ali Iqbal
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Iftikhar Ali Iqbal
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Iftikhar Ali Iqbal
 

More from Iftikhar Ali Iqbal (17)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 

Recently uploaded

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Symantec Portfolio - Sales Play

  • 1. SYMANTEC: PORTFOLIO Symantec Sales Play Iftikhar Ali Iqbal Presales Consultant SYMANTEC: Portfolio Sales Play Valid till Jan 2017
  • 2. Agenda Company Overview1 Cyber Security Threat Landscape & Market2 Why Symantec?4 SYMANTEC: Portfolio Sales Play What’s Next and Key Takeaways5 Portfolio & Competitive Analysis3
  • 4. OVERVIEW: SYMANTEC • Founded in 1982 • Headquartered in Mountain View, California, United States • Fortune 500 company • Development centers in Pune, Chennai and Bengaluru (India) • Provides Software and Services • Focus is on Consumer Security and Enterprise Security • Symantec = syntax, semantics and technology • 11,000 employees (July 2016) • Operations in Americas, EMEA and APJ SYMANTEC: Portfolio Sales Play
  • 5. OVERVIEW: SYMANTEC • IPO on June 23, 1989 • Exchange: Ticker - NASDAQ: SYMC • Fiscal Year Calendar: June to March • Financial Data SYMANTEC: Portfolio Sales Play FY2015 FY2014 $6,538 $6,701 ($ in millions) FY2016 FY2015 $3,600 $3,956 During fiscal 2016, the Company began presenting the financial results of Veritas within discontinued operations. This presentation reflects the financial results of Veritas within discontinued operations for both fiscal years. KSA GULF, PK $30 ~$20-25 ($ in millions)
  • 6. OVERVIEW: DEMERGER • On 1st October 2015, Symantec’s Information Management business now operates as a separate privately held company Veritas Technologies Corporation • The sale completed 30 January 2016 when Veritas became a privately held company. • Solutions: – Backup and Recovery – Archiving and eDiscovery – Business Continuity and Disaster Recovery • Separate operations, partner programs, support, etc. SYMANTEC: Portfolio Sales Play
  • 7. OVERVIEW: MAJOR MERGERS AND AQUISITIONS SYMANTEC: Portfolio Sales Play
  • 8. OVERVIEW: MERGERS AND AQUISITIONS SYMANTEC: Portfolio Sales Play • On June 13, 2016 it was announced that Symantec has acquired Blue Coat for $4.65 billion. • What is expected: – Web and Cloud Security – Encrypted Traffic Management – Web Application Protection • Blue Coat Threat Intelligence already integrated into Symantec
  • 9. OVERVIEW: MANAGEMENT TEAM Greg Clark Chief Executive Officer Michael Fey President and Chief Operating Officer Nick Noviello Executive Vice President and Chief Financial Officer SYMANTEC: Portfolio Sales Play Brian Kenyon Chief Strategy Officer Hugh Thompson Chief Technology Officer Michael Williams Chief Marketing Officer
  • 10. MARKET: CYBERSECURITY LANDSCAPE & MARKET SYMANTEC: Portfolio Sales Play
  • 11. THREAT LANDSCAPE: THE NEWS SYMANTEC: Portfolio Sales Play
  • 12. THREAT LANDSCAPE: THE BIG NUMBERS • 3x – A large business attacked once in was likely to be attacked • ½ - Of all targeted attacks were against small businesses • 55% - Increase in the number of spear-phishing campaigns attacks • ¾ - legitimate websites found to have unpatched vulnerabilities • 125% - Increase in the number of zero-day vulnerabilities discovered • 35% - Increase in crypto-ransomware (end-users to businesses) • 9 – Mega breaches, a record, occurred in 2015 • 430 Million - new pieces of unique malware discovered SYMANTEC: Portfolio Sales Play Internet Security Threat Report
  • 13. THREAT LANDSCAPE: FUN FACT? SYMANTEC: Portfolio Sales Play In 2009 there were 2,361,414 new piece of malware created. That’s 1 Million 179 Thousand a day. In 2015 that number was 430,555,582
  • 14. $1T 2017-2021 ~$200B/Y THREAT LANDSCAPE: MARKET PROJECTIONS/FORECASTS SYMANTEC: Portfolio Sales Play By 2020 ~170B/Y $655B 2015-2020 ~131B/Y $500-700B 2017-2021 ~$100-140B/Y Various Analysts Corporations are hesitant to announce breaches and amounts of security budgets IT security services are difficult to fully size. Tracking security budget/cost difficult they cut across many business areas “Cybersecurity is the fastest growing tech sector. While all other sectors are driven by reducing Inefficiencies and increasing productivity, cybersecurity spending is driven by cybercrime. The unprecedented cybercriminal activity we are witnessing is initiating so much cyber spending, it’s become nearly impossible for the analysts to accurately track.” Steve Morgan Founder and Editor-In-Chief at Cybersecurity Ventures
  • 17. PORTFOLIO: NUTSHELL Cyber Security Services • Monitoring , Incident Response, Simulation, Adversary Threat Intelligence Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play
  • 19. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 1 PROTECT MY ORGANIZATION FROM TARGETED ATTACKS AND ADVANCED THREATS
  • 20. PLAY 1: MALWARE PROTECTION • THE PLAY: – More complex multidimensional threat outbreaks – Protect the endpoint, secure web and email gateways and provide advanced threat protection – Traditional malware security to Advanced Threat Protection • THE SOLUTIONS: – Endpoint Protection – Mail Security for Exchange, Messaging Gateway, Email Security.Cloud – Web Security.Cloud – Advanced Threat Protection – Protection Engine SYMANTEC: Portfolio Sales Play
  • 22. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 2 HELP ME SECURE MY BUSINESS-CRITICAL SYSTEMS FROM CYBER THREATS
  • 23. PLAY 2: DATA CENTER SECURITY • THE PLAY: – Mission critical servers require more than antimalware – Protect physical, virtual and cloud servers in heterogeneous environments – Protect IoT infrastructure/devices – Be able to cover legacy Operating Systems – Agent-less antimalware for VMware Infrastructure • THE SOLUTIONS: – Critical System Protection – Data Center Security: Server – Data Center Security: Server Advanced SYMANTEC: Portfolio Sales Play
  • 25. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 3 HELP MITIGATE RISK OF IP LOSS FROM CYBER THREATS
  • 26. PLAY 3: DATA LOSS PREVENTION • THE PLAY: – Protect information against loss and theft, comply with data privacy regulations, and safeguard their reputation. – Prevent leakage of information from Endpoint, Network, Storage, Mobile and Cloud – Encrypt data at rest or transit – Ensure required data/resources are accessed by authorized employees with 2- FA or multi-factor authentication • THE SOLUTIONS: – Data Loss Prevention – Encryption – Validation and ID Protection SYMANTEC: Portfolio Sales Play
  • 28. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 4 I REQUIRE VISIBILITY AND SECURE MANAGEMENT ACROSS DEVICES, PLATFORMS AND APPLICATIONS
  • 29. PLAY 4: ENDPOINT MANAGEMENT • THE PLAY: – Provisioning and migration of endpoints – Make sure that operating systems, Microsoft and non-Microsoft software are up to date – Software and license management – Inventory and management of endpoint hardware and applications • THE SOLUTIONS: – Client Management Suite • Deployment Solution • Patch Management Solution • Software Management Solution • Inventory Management Solution SYMANTEC: Portfolio Sales Play
  • 31. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 5 HOW CAN I BUILD TRUST WITH EACH CUSTOMER? HOW CAN I SECURE USER ACCESS AND COMMUNICATIONS IN MY ORGANIZATION?
  • 32. PLAY 5: PUBLIC KEY CERTIFICATES • THE PLAY: – Businesses and organizations of all kinds rely on websites, intranets, and extranets to exchange confidential information and enable eCommerce. – SSL/TLS Certificates, Code Signing Certificates and Digital Certificates – SSL/TLS - Encrypt transmission and establish identity – Digital Certificates - Authenticate devices and users • THE SOLUTIONS: – SSL – Managed Public-Key Infrastructure SYMANTEC: Portfolio Sales Play
  • 33. SYMANTEC: Portfolio Sales Play 93% Lack of Resources, Support and/or Time <15% Work in Security Awareness, Full- Time 60% Level of Executive Support Security Awareness practitioners have a communication background 4%
  • 34. SYMANTEC: Portfolio Sales Play 46% Shortage of Cybersecurity skills 9% No cybersecurity skill deficiencies 86% Difficult to recruit cybersecurity professionals Cybersecurity skills, most beneficial to employees and organization 44%
  • 35. SYMANTEC: Portfolio Sales Play 67% Incident Repose more difficult than 2 years ago 74% Regularly ignore some security alerts 80% Increase spending on IR over 2 years Specific incident response training for IT operations staff 35%
  • 36. SYMANTEC: Portfolio Sales Play 77% Threat Intelligence is valuable to security mission 70% Too voluminous/com plex for actionable intelligence 27% Effective in utilizing data to pinpoint cyber threats Paid fees provides more more actionable intelligence 46%
  • 37. SYMANTEC: Portfolio Sales Play 56% Unlikely or highly unlikely be able to detect a sophisticate attack 53% Lack of skilled resources as a barrier to value creation 63% Budget constraints for IS to contribute to organization Have formal process and advanced detection function 9%
  • 38. SYMANTEC: Portfolio Sales Play OPPORTUNITY # 6 HOW CAN MY ORGANIZATION BE CYBER INTELLIGENT, VIGILANT, RESPONSIVE AND READY?
  • 39. PLAY 6: CYBER SECURITY SERVICES • THE PLAY: – Security-as-a-Service – To address the lack of security expertise – Intelligence on threats and adversaries – Timely response to security incidents • THE SOLUTIONS: – Managed Security Service – DeepSight Intelligence – Incident Response Services – Security Simulation SYMANTEC: Portfolio Sales Play
  • 40. PORTFOLIO: SERVICES Support Services Consulting Services Education Services Essential (24x7) Basic (9x5) Business Critical Services Help me DESIGN it, INSTALL it, ENHANCE it Help me LEARN about it & USE it Help me UNLOCK VALUE & OPTIMIZE it Help me FIX it SYMANTEC: Portfolio Sales Play Advisory Design Implement Optimize On-site Specialist Classroom Virtual Academy Remote Specialist Residency
  • 42. COMPTETIVE ANALYSIS: PORTFOLIO Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 43. COMPTETIVE ANALYSIS: COMPETION BY PORTFOLIO SYMANTEC: Portfolio Sales Play Information ProtectionThreat Protection Cyber Security Services
  • 44. SYMANTEC: WHY SYMANTEC? SYMANTEC: Portfolio Sales Play
  • 45. SYMANTEC: THE TEAM - approx. 550 employees - security engineers, virus hunters, threat analysts, and researchers - Monitoring 130 million systems - Data from 240,000 network sensors - 200+ countries - Tracking vulnerabilities - Affecting 55,000 technologies - 8,000+ vendors - 7.5 million signatures - 200 different network protocols - 400 different behaviors - 2.5 billion good/bad files - 175 million participating users SYMANTEC: Portfolio Sales Play • 15 Years Delivering Security Monitoring and Log Management • 248+ Years of Forensic Investigation • Average Experience of 15 Years In-Field Active Investigation • Hand Picked Security Professionals from Government Agencies and Organizations Around the World EXPERIENCE • 500+ Certified Cyber Security Professionals, SOC Analysts 100% GIAC-GCIA Certified • Leading Experts in Incident Response, Security Monitoring and Intelligence • Worlds Largest Cyber War Games Program • Skilled in Cyber Security, Forensic Investigation, Analysis, Data Science and Research EXPERTISE SECURITY TECHNOLOGY AND RESPONSE TEAM (STAR) CYBER SECURITY TEAM
  • 46. SYMANTEC: GLOBAL INTELLIGENCE NETWORK (GIN) SYMANTEC: Portfolio Sales Play One of the largest civilian cyber intelligence networks 3.7 Trillion rows of security-relevant data 175M Consumer and Enterprise endpoints protected 57M attack sensor in 157countries 182M web attacks blocked last year Discovered 430 million new unique pieces of malware last year 2 Billion of email traffic scanned/day 1 Billion web requests scanned daily 12,000+ Cloud applications protected
  • 47. SYMANTEC: ANALYST RELATIONS Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 48. SYMANTEC: ANALYST RELATIONS Threat Protection Information Protection SYMANTEC: Portfolio Sales Play
  • 50. SYMANTEC: WHAT’S NEXT? SYMANTEC: Portfolio Sales Play
  • 51. SYMANTEC: PORTFOLIO Cyber Security Services Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Portfolio Sales Play Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
  • 54. DLPSecure Web Gateway Risk Insight Secure Mail Gateway Web Application Firewall Advanced Threat Protection Malware Analysis Cyber Security Services IT System Management Endpoint Protection EDR Endpoint Cloud VIP Identity Local Intelligence File URL Whitelist Blacklist Certificate Machine Learning SIEM Integration Data Center Security EncryptionContent Analysis Performance Optimization Cloud Secure Web Gateway Cloud DLP CASB Managed PKI Email Security Data Center Security Cloud Sandbox Website Security Encryption Compliance Management Encrypted Traffic Management Security Analytics SOC Workbench Third Party Ecosystem ONPREMISESCLOUD Cloud Data Protection
  • 56. RESOURCES: SALES • Websites: – Licensing Programs - https://www.symantec.com/support-center/buying-programs – Partner Portal - https://www.symantec.com/partners – Industry Analyst Reports - http://www.symantec.com/about/industryanalysts/analystreports.jsp – Third-Party Tests Reports - https://www.symantec.com/products/performance-center – Sales Support Cases – https://support.symantec.com/en_US/mysymantec.html • Starting Point: – Licensing Program (Express, Government, Rewards, etc) – Opportunity Registrations (Opportunity Registration Rebate and Margin Builder) – Support Types (Essential and Basic) – Renewals – Software Activation – Price List – Know What You Can Sell and Earn (Partner Program - Secure One) – Independent Reports – After-Sales Licensing Support SYMANTEC: Portfolio Sales Play
  • 57. RESOURCES : PRODUCT EDUCATION - SALES • Websites: – Partner Portal - https://www.symantec.com/partners – Online Technical Training - https://education.symantec.com/Saba/Web/sena – Symantec Community - http://www.symantec.com/connect/ • Product Material: – Data Sheets/Brochures – Licensing Guides – Cheat Sheets/Sales Guides/ Sales Presentations • Training and Certification: • Symantec Sales Expert (SSE) – Overview and Positioning • Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset) SYMANTEC: Portfolio Sales Play
  • 58. RESOURCES : PRODUCT EDUCATION - TECHNICAL • Websites: – Partner Portal - https://www.symantec.com/partners – Online Technical Training - https://education.symantec.com/Saba/Web/sena – Documentation and Support - https://support.symantec.com/en_US.html – Symantec Community - http://www.symantec.com/connect/ – Technical Support Cases – https://support.symantec.com/en_US.html • Product Material: – Data Sheets/Whitepapers – Licensing Guides – Symantec eLibrary (Online Technical Training) – Product Guides and Articles (Documentation and Support) • Training and Certification: • Symantec Sales Expert Plus (SSE+) – Simple Design and Demo (presales mindset) • Symantec Certified Specialist (SCS) – Design, Deploy and Administer SYMANTEC: Portfolio Sales Play
  • 59. SYMANTEC: AREA OF FOCUS • Portfolio covers a broad range of technologies/services: – Endpoint, Mail and Web Security with Content Analysis – Network Forensics and Web Application Firewall – Advanced Threat Protection and Malware Analysis – Data Loss Prevention, Encryption and Encrypted Traffic Management – SSL, 2 FA, Single-Sign On and Managed PKI – Cloud Access Security Broker (CASB) – Network Performance Optimization – Advanced Security for Virtual and Physical Servers/Environments – Client, Server, Asset Management and Help Desk – Malware Protection for NAS and Web Applications – IT Risk and Compliance – Technical and Adversary Intelligence – Managed Security Services – Incident Response – Security Simulation SYMANTEC: Portfolio Sales Play
  • 60. SYMANTEC: ENDING NOTE SYMANTEC: Portfolio Sales Play
  • 61. Thank you! Copyright © 2017 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! Iftikhar Ali Iqbal Pre-sales Consultant iftikhar_iqbal@mindware.ae SYMANTEC: Portfolio Sales Play