Commtouch Software Ltd
|
|
- Carmel Hart
- 8 years ago
- Views:
Transcription
1 Commtouch Software Ltd (NASDAQ: CTCH) December 2013
2 Shlomi Yanai, President Brian Briggs, CFO Commtouch, Inc., Headquarters 7927 Jones Branch Drive, Suite 2250 McLean, VA 22102, USA Tel: Fax: Investor Overview: Company Confidential Real Security. In Real Time.
3 Safe Harbor and Forward Looking Statements This presentation contains forward-looking statements, including projections about our business, within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of For example, statements in the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward-looking statements. These statements are based on information available to us at the time of the presentation; we assume no obligation to update any of them. The statements in this presentation are not guarantees of future performance and actual results could differ materially from our current expectations as a result of numerous factors, including business conditions and growth or deterioration in the Internet market, commerce and the general economy, both domestic as well as international; fewer than expected new-partner relationships; competitive factors, including pricing pressures; technological developments, and products offered by competitors; the ability of our OEM partners to successfully penetrate markets with products integrated with Commtouch technology; a slower than expected acceptance rate for our newer product offerings; availability of qualified staff; and technological difficulties and resource constraints encountered in developing new products, as well as those risks described in the text of this presentation and the company's Annual Reports on Form 20-F and reports on Form 6-K, which are available through Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch 2 Investor Overview: Company Confidential Real Security. In Real Time.
4 The leading security company you ve never heard of Leading market position ~30% of the mail security market runs on Commtouch software Market leading detection services see more than 12 billion transactions/day, over 80x more than any other vendor Leading edge technology Patented statistical algorithms (Recurrent Pattern Detection) are future proof, threat agnostic and enable real-time detection Pioneered behavior heuristics for anti-virus Blue chip, diversified customer base Over 180 OEM and service provider customers Antivirus solution powers Google s Gmail and Microsoft offerings Messaging security underlies HP s Unified Threat Management products Recurring revenue model Security as a Service business model 100% of revenue recurring, 90% under multi-year contracts Partner revenue share - share in customers success Unique go-tomarket strategy Offer a complete cloud based private label security solution to OEMs, service providers and distributors Own and operate cloud infrastructure with 12 data centers globally 3 Investor Overview: Company Confidential Real Security. In Real Time.
5 Commtouch powers 30% of the mail security market Vendors Service Web App Providers Security Hardware Antivirus Network Devices Client Software Hosting Saas ISP/Telco Partner focus drives Commtouch success * Our top 10 customers represent 37% of Annual Revenue (2012) 4 Investor Overview: Company Confidential Real Security. In Real Time.
6 Cloud-based detection a key competitive advantage Patented anti-spam technology Pioneered cloudassisted detection First to block image based spam Language agnostic New threats distribution unique diagnostics Commtouch Security Lab 24X7 real time detection 5 Investor Overview: Company Confidential Real Security. In Real Time.
7 Large, high growth market opportunity $2.6 B $1.8 B Web $1.0 B $1.6 B CAGR Web 18% 11% Security continues to be something organizations can't do without. This is especially true as organizations, of all sizes, turn to Security Software as a Service (SaaS) IDC, Worldwide Security Software as a Service Web $0.6 B $1.2 B Good opportunities are being made available in a number of security segments to technology and service providers with cloud delivery capabilities Gartner, Market Trends: Cloud-Based Security Services, September, Source: Gartner Market Trends: Cloud-based Security Services, September, Investor Overview: Company Confidential Real Security. In Real Time.
8 Transforming for growth Transforming from a technology service provider to a complete cloud-based Security-as-a-Service provider New management team located in US, closer to customers New global salesforce focused on lead generation New leading-edge product portfolio: Q1 2013: introduced Mail SaaS, Mobile security for Android, and a new on-premise solution for service providers Continued technology innovation: Web SaaS to be delivered in Q Investor Overview: Company Confidential Real Security. In Real Time.
9 Commtouch Detection services (OEM) offering Network Model Financial Impact Detection Services is this spam? Yes SMB Vendor device/ Service Provider Internet Low % revenue share Market user price - ~$50 For Commtouch: 3-5% from user sell price 8 Investor Overview: Company Confidential Real Security. In Real Time. 8
10 Commtouch Private label Security-as-a-Service offering Network Model Financial Impact Detection and full Services SMB/ Enterprise Internet High % revenue share (Resell) Market user price - ~$50 For Commtouch: 55-75% from user sell price 9 Investor Overview: Company Confidential Real Security. In Real Time.
11 Cloud offering enhances partners value proposition Partner benefits: Significantly expands market opportunity beyond large enterprises to SMBs Increases product and service capability Enterprise/SMB benefits: Reduces costs (opex vs. capex) Supports service level agreements (SLAs) Enables faster upgrades Solves security issues for out-of-office employees 10 Investor Overview: Company Confidential Real Security. In Real Time.
12 Low $ High $ Commtouch product suite $2.8B * $2.4B * $9.1B * WEB AV/AM Security SaaS Private Label Web Service On Premise Private Label Web Service On Premise Cloud-Assisted Detection Services Messaging Suite On-premise for SPs Web Filtering AV SDK Mobile Security Endpoint apps APT Detection Note: Roadmap Items in Blue * 2013 Market sizes: Source: IDC Investor Overview: Company Confidential Real Security. In Real Time.
13 Cloud-based detection at the core of product portfolio Spam and phishing URLs Malware URLs Threat data sharing between services: Sum is greater than the parts Zero-hour virus samples, Malware URLs Web Antivirus Recurrent Pattern Detection - Patented technology Over 99% detection accuracy Language agnostic Zero-hour detection of global threats Industry-leading performance Commtouch Owned & Operated 550M End Users 12B Transactions Daily GlobalView Cloud Internal Efficiencies High Margins 12 Global Data Centers Operational for 14 years 12 Investor Overview: Company Confidential Real Security. In Real Time.
14 security Industry-leading spam detection: Phishing message and virus outbreak detection Advanced heuristic malware defense Benefits: Instant protection from new outbreaks High catch rates with almost zero false positives Language and content agnostic Simple integration High performance, low maintenance Reduced capital expenditure 13 Investor Overview: Company Confidential Real Security. In Real Time.
15 Antivirus Anti-malware solution for service provider and web security gateways: Cloud-based pattern detection Multi-layer file scanning Benefits: High performance Superior detection Ease of integration and operation Reduced capital expenditure Lower total cost of ownership 14 Investor Overview: Company Confidential Real Security. In Real Time.
16 Web security URL Filtering (URLF) enables customers to provide new levels of service for: Web security Parental control Business productivity management and compliance Mobile devices Benefits: Cloud database provides broadest coverage Real-time, zero-hour security Highest categorization accuracy and quality of service 15 Investor Overview: Company Confidential Real Security. In Real Time.
17 Web Security The challenge Branch office 1 User apps FW Web GW Branch office 2 Applications GW FW Web GW GW Mobile Users Internet Cloud apps Infected site sends malware/ phishing to user 16 Commtouch Company Overview Web Security SaaS Real Security. In Real Time.
18 Commtouch Web SaaS Q Branch office 1 Applications Web SecaaS Phishing site blocked Internet Branch office 2 Mobile Users Malware blocked Infected site sends malware to user 17 Commtouch Company Overview Corporate Overview Real Security. In Real Time.
19 Customer case study: Netgear Product: ReadyNAS network attached storage (NAS) Target Market: Small and medium businesses as well as enterprises Commtouch Service: Antivirus Security is a key factor in offering efficient NAS solutions. With Commtouch Antivirus, we can provide our customers with stateof-the art protection from both known and new viruses, Trojans and other malware threats. Davin Oishi, senior product line manager for NETGEAR Storage 18 Investor Overview: Company Confidential Real Security. In Real Time.
20 Customer case study: Web.com Product: Web hosting, online marketing Target Market: Small businesses Commtouch Services: Inbound Anti-Spam, Outbound Spam Protection, Virus Outbreak Detection With the addition of Commtouch services, we can now better safeguard our customers from the nuisance of spam s, without the risk of having their critical communications erroneously blocked. Jane Landon, Chief Technology Officer, Web.com 19 Investor Overview: Company Confidential Real Security. In Real Time.
21 World class, experienced management team Lior Samuelson Chairman and Chief Executive Officer Joined in 2010 as Chairman and became CEO in Shlomi Yanai - President Joined in 2011, bringing over two decades of experience in the information security industry. Brian Briggs - Chief Financial Officer Joined in 2013, bringing more than 22 years of finance and operations experience building and growing profitable companies. Lior Kohavi - Chief Technology Officer Has more than 20 years of experience as a senior technology executive.. Joy Nemitz - Chief Marketing Officer Has over 20 years of technology and communications experience in the field of Cloud, SaaS and Hosted Services marketing. Pete Shah - Senior Vice President, Worldwide Sales Joined in 2012, bringing over 20 years of experience with international software organizations. Haniel Ilouz - Vice President, Global Engineering Has over 14 years of software development experience including extensive management of large global engineering teams. Mickey Avram - Vice President, Technology Services Joined in 2012, bringing over 20 years of experience in the support and operations management field, many of these in the security industry. Brett Wilson - Vice President, Products Has over 20 years of technology and communications experience, including more than 10 years of experience in the information security industry. Sue Perng Lee - Vice President, General Counsel & Corporate Secretary Joined in 2013, bringing over 10 years of legal experience in both the private law firm and corporate settings. Eva Edwards Markowitz - Vice President, Human Resources Joined in 2013, bringing over 14 years of human resource experience. 20 Investor Overview: Company Confidential Real Security. In Real Time.
22 $ in millions Strong business model Recurring revenue and long term contracts provide stability and visibility Highly profitable core business supports investments in new growth initiatives Solid balance sheet - $4 million in cash and no debt as of September 30, 2013 NOLs no tax payments expected over coming years Revenue Operating Profit Operating Cost CoGs Recurring revenue model 100% Assured backlog 1.5 Years Increased sales 3 Years Higher rate renewal 0 Months Deal signed 3 year revenue commitment 21 Investor Overview: Company Confidential Real Security. In Real Time.
23 Why Commtouch? SAAS EXCELLENCE PARTNER FOCUSED PATENTED TECHNOLOGY FINANCIALS 22 Investor Overview: Company Confidential Real Security. In Real Time.
24 Thank You.
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
More informationPowerful and reliable virus and spam protection for your GMS installation
Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise
More informationFor additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.
TM TREND MICRO, Incorporated is a pioneer in secure content and threat management. Founded in 1988, provides individuals and organizations of all sizes with award-winning security software, hardware, and
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationWEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationSAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management
SAAS VS. ON-PREMISE SECURITY Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management How SaaS Solves the Problems of On-Premise Security Businesses traditionally invest in security
More informationWorry-Free Business Security 6.0. External FAQ
Worry-Free Business Security 6.0 External FAQ May 2009 Page 1 Contents Introducing Worry-Free Business Security...3 What is Worry-Free Business Security?... 3 When is Worry-Free Business Security available?...
More informationAnti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
More informationMcAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationIntroducing CloudControl Mail April 2013
Introducing CloudControl Mail April 2013 Agenda u What is CloudControl Mail? u How Does it Work? u Key CloudControl Mail Features u Pricing u Your Questions Just Announced! Netbox Blue is delighted to
More informationSURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September 2015. An Osterman Research Survey Report
SURVEY REPORT N sponsored by An Osterman Research Survey Report Published September 2015 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630
More informationISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones
ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic
More informationTough Times. Tough Choices.
Security-as-a-Service is the right choice, right now. Table of Contents A New Choice for Every Business: Security-as-a-Service 3 Security-as-a-Service: One Service, Countless Protections 4 Outsource Your
More informationWe are Globalscape A Leader in Secure Information Exchange. 2016 Globalscape
We are Globalscape A Leader in Secure Information Exchange 2016 Globalscape Safe Harbor Statement This presentation contains forward-looking statements within the meaning of Section 27A of the Securities
More informationTRENDS IN THE THREAT LANDSCAPE
TRENDS IN THE THREAT LANDSCAPE Guy Eilon, SEE Regional Manager April 2013 geilon@websense.com TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 CHANGING CUSTOMERS NEEDS 90% of companies
More informationStallioni Sügisseminar
Stallioni Sügisseminar Juha Poutanen, Territory Manager Websense How to open Internet to your employees safely - managing risks of modern Internet web security data security web security email security
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationIpswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
More informationThe Advantages of Security as a Service versus On-Premise Security
The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred
More informationEmail security Cloud vs. On-premise solutions
GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents
More informationSecuring the Borderless Enterprise
Securing the Borderless Enterprise Websense TRITON Solution The Web 2.0 Workplace: New Opportunities, New Risks Web-enabled technologies are reshaping the modern enterprise. Powerful, cloud-based business
More informationHigh Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia emillan@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
More informationSecure Computing s TrustedSource
The industry s most acclaimed reputation system Proactive security based on global intelligence. Secure Computing s TrustedSource One of the most important characteristics of enterprise security is proactive
More informationWhite Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
More informationQuick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
More informationRazorGate Mail Security Appliances
RazorGate Mail Security Appliances Product Overview Oct 2012 INTRODUCING RAZORGATE Copyright (C) 2012 2 RAZORGATE Overview Our fastest, most scalable and HIGHEST CAPACITY messaging security appliances
More informationON-PREMISE VS. CLOUD-BASED SOLUTIONS
ON-PREMISE VS. CLOUD-BASED SOLUTIONS Which is Best? A Dilemma for SMBs As the price of storage and bandwidth continues to drop fast, Cloudbased services are becoming more and more attractive to small and
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationForefront Protection 2010 for Exchange Server Overview
Forefront Protection 2010 for Exchange Server Overview Fast and effective protection against malware and spam Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses,
More informationCYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationHow To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
More informationNext Generation Email Security. Jamie de Guerre Chief Technology Officer, Cloudmark Inc.
Next Generation Email Security Jamie de Guerre Chief Technology Officer, Cloudmark Inc. Effective Carrier Grade Messaging Security Leadership: Key Markets: Market Strength: Market Share: Anti-Spam, Anti-Phishing,
More informationPattern-based Messaging Security for Hosting Providers
Pattern-based Messaging Security for Hosting Providers Email hosting is a key offering for Web hosting providers, and many deployments seem straightforward at first glance. Yet any email hosting offering
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationThe Next Level of Secure Channel Partnership
The Next Level of Secure Channel Partnership Copyright 2015 ADVANCED NETWORK SECURITY WatchGuard s Channel Ecosystem Is Focused, and the Opportunity for Engaged WatchGuardONE Partners Is Better Than Ever
More informationTech Data 2011 Security Partners Sales Playbook:
Tech Data 2011 Security Partners Sales Playbook: How to build security offerings into your practice Page 1 Check Point Software Technologies Check Point Software Technologies is a worldwide leader in securing
More informationHow To Make A Profit From Cloud Software
Progress Software Presentation to Investors Jay Bhatt President & Chief Executive Officer April 25, 2012 Forward Looking Statements This presentation contains statements that are forward-looking statements
More informationBUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
More informationSecurity as a Service: Business Decision Factors
publication date 11 February 2011 Service: Business Industry Research Table of Contents Introduction 3 Security concerns are business issues 3 Business experience 3 Business priorities 3 Comparing on-premise
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationProtect Your Enterprise With the Leader in Secure Email Boundary Services
Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationInvestor Presentation
Investor Presentation June 2015 Safe Harbor Statement Statements in this presentation, which are not historical facts, may be deemed to be "forward looking statements. Actual and anticipated future results
More informationCloud-based Web Security Isn t Hype: It s Here and It Works
Cloud-based Web Security Isn t Hype: It s Here and It Works June 2010 INTRODUCTION It s not news that the web is dangerous and getting more dangerous by the day. Cyber criminals have ample economic motive
More informationSimplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%
Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity
More informationPalo Alto Networks. September 2014
Palo Alto Networks September 2014 Safe harbor This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are
More informationYour Security Partner of Choice
Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide
More informationHow To Choose Between Onpremises Or Cloud Based Email
WHITE PAPER Why the Cloud is Not Killing Off the On-Premises Email Market An Osterman Research White Paper Published April 2011 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O.
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationModular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationGFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option
More informationare some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.
W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs
More informationImproving Business Outcomes: Plug in to Security As A Service Adrian Covich
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,
More informationWEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
More informationStop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
More informationMcAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)
McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,
More informationWHITE PAPER SPON. Why the Cloud is Not Killing Off the On-Premises Email Market. Published April 2011 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER Why the Cloud is Not Killing Off the On-Premises Email Market An Osterman Research White Paper Published April 2011 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O.
More informationWEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS
WEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS Team with Websense for success in the security market Providing your customers with the best web,
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationEmail security Cloud vs. On-premise solutions
GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationTTAsia Secure Email Over the Cloud
TTAsia Secure Email Over the Cloud Telecommunications & Technology Asia Ltd A leading managed services and cloud computing solutions provider in HK and China We filter millions of emails every month and
More informationServer Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
More informationWatchGuard: Your Security Partner of Choice. Carlos Vieira
WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices
More informationNetSuite: Global Leader in Cloud ERP
NetSuite: Global Leader in Cloud ERP NYSE : N As of April 28, 2015 Safe Harbor Statement This presentation contains forward-looking statements that involve risks, uncertainties and assumptions relating
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationThe Cost Effective Migration to Integrated Hybrid SaaS Email Security
y The Cost Effective Migration to Integrated SaaS Email Security An Osterman Research White Paper Published July 2010 SPONSORED BY #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black
More informationWEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
More informationSmall and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
More informationCisco Web Security: Protection, Control, and Value
Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security
More informationSeparating Security and Information Management into Two Industry-Leading Technology Companies
Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationKaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
More informationKeith Keeler Microsoft Corporation Partner Account Manager Online services kkeeler@microsoft.com
Keith Keeler Microsoft Corporation Partner Account Manager Online services kkeeler@microsoft.com Welcome! Online Services Overview Software + Services Exchange Hosted Services (Service) BPOS Business Productivity
More informationKASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE Global threat intelligence for local implementation www.kaspersky.com 2 A CLOUD-BASED THREAT LABORATORY
More informationEmail + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.
Page 1 of 9 Overview Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Security risks for email, web, and data are no secret. Most people
More informationOffice 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
More informationCisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
More informationHow to sell Hosted Exchange to SMB s
How to sell Hosted Exchange to SMB s July 2013. The Trusted Channel Centric Marketplace AGENDA The background Partner opportunity Target audience The solution: Microsoft Hosted Exchange 2013 How to capitalize
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationTrend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
More informationBuilding a Web Security Ecosystem to Combat Emerging Internet Threats
I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and
More informationA LOOK AT U.S. & EUROPEAN CLOUD ADOPTION TRENDS & FORMING LASTING PARTNERSHIPS. Pete Lamson Senior Vice President of Sales & Marketing Carbonite
A LOOK AT U.S. & EUROPEAN CLOUD ADOPTION TRENDS & FORMING LASTING PARTNERSHIPS PRESENTED BY: Pete Lamson Senior Vice President of Sales & Marketing Carbonite 1 The End of the Story First: Distributors
More informationanomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationTHE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that
More informationCisco Email Security Appliances
Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate
More informationScott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.
Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business
More informationUsing SaaS to Reduce the Costs of Email Security
Using SaaS to Reduce the Costs of Email Security y An Osterman Research White Paper Published February 2009 SPONSORED BY onsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
More informationUnified Communications and the Cloud
Unified Communications and the Cloud Abstract Much has been said of the term cloud computing and the role it will play in the communications ecosystem today. Undoubtedly it is one of the most overused
More informationKASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security
KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.
More informationInvestor Presentation
Investor Presentation June 2016 SharpSpring, Inc. investors.sharpspring.com NASDAQ: SHSP Safe Harbor Statement The information provided in this presentation may contain forward-looking statements within
More information