Commtouch Software Ltd

Size: px
Start display at page:

Download "Commtouch Software Ltd"

Transcription

1 Commtouch Software Ltd (NASDAQ: CTCH) December 2013

2 Shlomi Yanai, President Brian Briggs, CFO Commtouch, Inc., Headquarters 7927 Jones Branch Drive, Suite 2250 McLean, VA 22102, USA Tel: Fax: Investor Overview: Company Confidential Real Security. In Real Time.

3 Safe Harbor and Forward Looking Statements This presentation contains forward-looking statements, including projections about our business, within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of For example, statements in the future tense, and statements including words such as "expect," "plan," "estimate," "anticipate," or "believe" are forward-looking statements. These statements are based on information available to us at the time of the presentation; we assume no obligation to update any of them. The statements in this presentation are not guarantees of future performance and actual results could differ materially from our current expectations as a result of numerous factors, including business conditions and growth or deterioration in the Internet market, commerce and the general economy, both domestic as well as international; fewer than expected new-partner relationships; competitive factors, including pricing pressures; technological developments, and products offered by competitors; the ability of our OEM partners to successfully penetrate markets with products integrated with Commtouch technology; a slower than expected acceptance rate for our newer product offerings; availability of qualified staff; and technological difficulties and resource constraints encountered in developing new products, as well as those risks described in the text of this presentation and the company's Annual Reports on Form 20-F and reports on Form 6-K, which are available through Commtouch Software Ltd. Recurrent Pattern Detection, RPD, Zero-Hour and GlobalView are trademarks, and Commtouch, Authentium, Command Antivirus and Command Anti-malware are registered trademarks, of Commtouch. U.S. Patent No. 6,330,590 is owned by Commtouch 2 Investor Overview: Company Confidential Real Security. In Real Time.

4 The leading security company you ve never heard of Leading market position ~30% of the mail security market runs on Commtouch software Market leading detection services see more than 12 billion transactions/day, over 80x more than any other vendor Leading edge technology Patented statistical algorithms (Recurrent Pattern Detection) are future proof, threat agnostic and enable real-time detection Pioneered behavior heuristics for anti-virus Blue chip, diversified customer base Over 180 OEM and service provider customers Antivirus solution powers Google s Gmail and Microsoft offerings Messaging security underlies HP s Unified Threat Management products Recurring revenue model Security as a Service business model 100% of revenue recurring, 90% under multi-year contracts Partner revenue share - share in customers success Unique go-tomarket strategy Offer a complete cloud based private label security solution to OEMs, service providers and distributors Own and operate cloud infrastructure with 12 data centers globally 3 Investor Overview: Company Confidential Real Security. In Real Time.

5 Commtouch powers 30% of the mail security market Vendors Service Web App Providers Security Hardware Antivirus Network Devices Client Software Hosting Saas ISP/Telco Partner focus drives Commtouch success * Our top 10 customers represent 37% of Annual Revenue (2012) 4 Investor Overview: Company Confidential Real Security. In Real Time.

6 Cloud-based detection a key competitive advantage Patented anti-spam technology Pioneered cloudassisted detection First to block image based spam Language agnostic New threats distribution unique diagnostics Commtouch Security Lab 24X7 real time detection 5 Investor Overview: Company Confidential Real Security. In Real Time.

7 Large, high growth market opportunity $2.6 B $1.8 B Web $1.0 B $1.6 B CAGR Web 18% 11% Security continues to be something organizations can't do without. This is especially true as organizations, of all sizes, turn to Security Software as a Service (SaaS) IDC, Worldwide Security Software as a Service Web $0.6 B $1.2 B Good opportunities are being made available in a number of security segments to technology and service providers with cloud delivery capabilities Gartner, Market Trends: Cloud-Based Security Services, September, Source: Gartner Market Trends: Cloud-based Security Services, September, Investor Overview: Company Confidential Real Security. In Real Time.

8 Transforming for growth Transforming from a technology service provider to a complete cloud-based Security-as-a-Service provider New management team located in US, closer to customers New global salesforce focused on lead generation New leading-edge product portfolio: Q1 2013: introduced Mail SaaS, Mobile security for Android, and a new on-premise solution for service providers Continued technology innovation: Web SaaS to be delivered in Q Investor Overview: Company Confidential Real Security. In Real Time.

9 Commtouch Detection services (OEM) offering Network Model Financial Impact Detection Services is this spam? Yes SMB Vendor device/ Service Provider Internet Low % revenue share Market user price - ~$50 For Commtouch: 3-5% from user sell price 8 Investor Overview: Company Confidential Real Security. In Real Time. 8

10 Commtouch Private label Security-as-a-Service offering Network Model Financial Impact Detection and full Services SMB/ Enterprise Internet High % revenue share (Resell) Market user price - ~$50 For Commtouch: 55-75% from user sell price 9 Investor Overview: Company Confidential Real Security. In Real Time.

11 Cloud offering enhances partners value proposition Partner benefits: Significantly expands market opportunity beyond large enterprises to SMBs Increases product and service capability Enterprise/SMB benefits: Reduces costs (opex vs. capex) Supports service level agreements (SLAs) Enables faster upgrades Solves security issues for out-of-office employees 10 Investor Overview: Company Confidential Real Security. In Real Time.

12 Low $ High $ Commtouch product suite $2.8B * $2.4B * $9.1B * WEB AV/AM Security SaaS Private Label Web Service On Premise Private Label Web Service On Premise Cloud-Assisted Detection Services Messaging Suite On-premise for SPs Web Filtering AV SDK Mobile Security Endpoint apps APT Detection Note: Roadmap Items in Blue * 2013 Market sizes: Source: IDC Investor Overview: Company Confidential Real Security. In Real Time.

13 Cloud-based detection at the core of product portfolio Spam and phishing URLs Malware URLs Threat data sharing between services: Sum is greater than the parts Zero-hour virus samples, Malware URLs Web Antivirus Recurrent Pattern Detection - Patented technology Over 99% detection accuracy Language agnostic Zero-hour detection of global threats Industry-leading performance Commtouch Owned & Operated 550M End Users 12B Transactions Daily GlobalView Cloud Internal Efficiencies High Margins 12 Global Data Centers Operational for 14 years 12 Investor Overview: Company Confidential Real Security. In Real Time.

14 security Industry-leading spam detection: Phishing message and virus outbreak detection Advanced heuristic malware defense Benefits: Instant protection from new outbreaks High catch rates with almost zero false positives Language and content agnostic Simple integration High performance, low maintenance Reduced capital expenditure 13 Investor Overview: Company Confidential Real Security. In Real Time.

15 Antivirus Anti-malware solution for service provider and web security gateways: Cloud-based pattern detection Multi-layer file scanning Benefits: High performance Superior detection Ease of integration and operation Reduced capital expenditure Lower total cost of ownership 14 Investor Overview: Company Confidential Real Security. In Real Time.

16 Web security URL Filtering (URLF) enables customers to provide new levels of service for: Web security Parental control Business productivity management and compliance Mobile devices Benefits: Cloud database provides broadest coverage Real-time, zero-hour security Highest categorization accuracy and quality of service 15 Investor Overview: Company Confidential Real Security. In Real Time.

17 Web Security The challenge Branch office 1 User apps FW Web GW Branch office 2 Applications GW FW Web GW GW Mobile Users Internet Cloud apps Infected site sends malware/ phishing to user 16 Commtouch Company Overview Web Security SaaS Real Security. In Real Time.

18 Commtouch Web SaaS Q Branch office 1 Applications Web SecaaS Phishing site blocked Internet Branch office 2 Mobile Users Malware blocked Infected site sends malware to user 17 Commtouch Company Overview Corporate Overview Real Security. In Real Time.

19 Customer case study: Netgear Product: ReadyNAS network attached storage (NAS) Target Market: Small and medium businesses as well as enterprises Commtouch Service: Antivirus Security is a key factor in offering efficient NAS solutions. With Commtouch Antivirus, we can provide our customers with stateof-the art protection from both known and new viruses, Trojans and other malware threats. Davin Oishi, senior product line manager for NETGEAR Storage 18 Investor Overview: Company Confidential Real Security. In Real Time.

20 Customer case study: Web.com Product: Web hosting, online marketing Target Market: Small businesses Commtouch Services: Inbound Anti-Spam, Outbound Spam Protection, Virus Outbreak Detection With the addition of Commtouch services, we can now better safeguard our customers from the nuisance of spam s, without the risk of having their critical communications erroneously blocked. Jane Landon, Chief Technology Officer, Web.com 19 Investor Overview: Company Confidential Real Security. In Real Time.

21 World class, experienced management team Lior Samuelson Chairman and Chief Executive Officer Joined in 2010 as Chairman and became CEO in Shlomi Yanai - President Joined in 2011, bringing over two decades of experience in the information security industry. Brian Briggs - Chief Financial Officer Joined in 2013, bringing more than 22 years of finance and operations experience building and growing profitable companies. Lior Kohavi - Chief Technology Officer Has more than 20 years of experience as a senior technology executive.. Joy Nemitz - Chief Marketing Officer Has over 20 years of technology and communications experience in the field of Cloud, SaaS and Hosted Services marketing. Pete Shah - Senior Vice President, Worldwide Sales Joined in 2012, bringing over 20 years of experience with international software organizations. Haniel Ilouz - Vice President, Global Engineering Has over 14 years of software development experience including extensive management of large global engineering teams. Mickey Avram - Vice President, Technology Services Joined in 2012, bringing over 20 years of experience in the support and operations management field, many of these in the security industry. Brett Wilson - Vice President, Products Has over 20 years of technology and communications experience, including more than 10 years of experience in the information security industry. Sue Perng Lee - Vice President, General Counsel & Corporate Secretary Joined in 2013, bringing over 10 years of legal experience in both the private law firm and corporate settings. Eva Edwards Markowitz - Vice President, Human Resources Joined in 2013, bringing over 14 years of human resource experience. 20 Investor Overview: Company Confidential Real Security. In Real Time.

22 $ in millions Strong business model Recurring revenue and long term contracts provide stability and visibility Highly profitable core business supports investments in new growth initiatives Solid balance sheet - $4 million in cash and no debt as of September 30, 2013 NOLs no tax payments expected over coming years Revenue Operating Profit Operating Cost CoGs Recurring revenue model 100% Assured backlog 1.5 Years Increased sales 3 Years Higher rate renewal 0 Months Deal signed 3 year revenue commitment 21 Investor Overview: Company Confidential Real Security. In Real Time.

23 Why Commtouch? SAAS EXCELLENCE PARTNER FOCUSED PATENTED TECHNOLOGY FINANCIALS 22 Investor Overview: Company Confidential Real Security. In Real Time.

24 Thank You.

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

Powerful and reliable virus and spam protection for your GMS installation

Powerful and reliable virus and spam protection for your GMS installation Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise

More information

For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.

For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com. TM TREND MICRO, Incorporated is a pioneer in secure content and threat management. Founded in 1988, provides individuals and organizations of all sizes with award-winning security software, hardware, and

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management SAAS VS. ON-PREMISE SECURITY Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management How SaaS Solves the Problems of On-Premise Security Businesses traditionally invest in security

More information

Worry-Free Business Security 6.0. External FAQ

Worry-Free Business Security 6.0. External FAQ Worry-Free Business Security 6.0 External FAQ May 2009 Page 1 Contents Introducing Worry-Free Business Security...3 What is Worry-Free Business Security?... 3 When is Worry-Free Business Security available?...

More information

Anti Spam Best Practices

Anti Spam Best Practices 53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:

More information

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure. McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

Introducing CloudControl Mail April 2013

Introducing CloudControl Mail April 2013 Introducing CloudControl Mail April 2013 Agenda u What is CloudControl Mail? u How Does it Work? u Key CloudControl Mail Features u Pricing u Your Questions Just Announced! Netbox Blue is delighted to

More information

SURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September 2015. An Osterman Research Survey Report

SURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September 2015. An Osterman Research Survey Report SURVEY REPORT N sponsored by An Osterman Research Survey Report Published September 2015 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630

More information

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic

More information

Tough Times. Tough Choices.

Tough Times. Tough Choices. Security-as-a-Service is the right choice, right now. Table of Contents A New Choice for Every Business: Security-as-a-Service 3 Security-as-a-Service: One Service, Countless Protections 4 Outsource Your

More information

We are Globalscape A Leader in Secure Information Exchange. 2016 Globalscape

We are Globalscape A Leader in Secure Information Exchange. 2016 Globalscape We are Globalscape A Leader in Secure Information Exchange 2016 Globalscape Safe Harbor Statement This presentation contains forward-looking statements within the meaning of Section 27A of the Securities

More information

TRENDS IN THE THREAT LANDSCAPE

TRENDS IN THE THREAT LANDSCAPE TRENDS IN THE THREAT LANDSCAPE Guy Eilon, SEE Regional Manager April 2013 geilon@websense.com TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 CHANGING CUSTOMERS NEEDS 90% of companies

More information

Stallioni Sügisseminar

Stallioni Sügisseminar Stallioni Sügisseminar Juha Poutanen, Territory Manager Websense How to open Internet to your employees safely - managing risks of modern Internet web security data security web security email security

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Email security Cloud vs. On-premise solutions

Email security Cloud vs. On-premise solutions GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents

More information

Securing the Borderless Enterprise

Securing the Borderless Enterprise Securing the Borderless Enterprise Websense TRITON Solution The Web 2.0 Workplace: New Opportunities, New Risks Web-enabled technologies are reshaping the modern enterprise. Powerful, cloud-based business

More information

High Performance NGFW Extended

High Performance NGFW Extended High Performance NGFW Extended Enrique Millán Country Manager Colombia emillan@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material

More information

Secure Computing s TrustedSource

Secure Computing s TrustedSource The industry s most acclaimed reputation system Proactive security based on global intelligence. Secure Computing s TrustedSource One of the most important characteristics of enterprise security is proactive

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

RazorGate Mail Security Appliances

RazorGate Mail Security Appliances RazorGate Mail Security Appliances Product Overview Oct 2012 INTRODUCING RAZORGATE Copyright (C) 2012 2 RAZORGATE Overview Our fastest, most scalable and HIGHEST CAPACITY messaging security appliances

More information

ON-PREMISE VS. CLOUD-BASED SOLUTIONS

ON-PREMISE VS. CLOUD-BASED SOLUTIONS ON-PREMISE VS. CLOUD-BASED SOLUTIONS Which is Best? A Dilemma for SMBs As the price of storage and bandwidth continues to drop fast, Cloudbased services are becoming more and more attractive to small and

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Forefront Protection 2010 for Exchange Server Overview

Forefront Protection 2010 for Exchange Server Overview Forefront Protection 2010 for Exchange Server Overview Fast and effective protection against malware and spam Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses,

More information

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

How To Get A Cloud Service For A Small Business

How To Get A Cloud Service For A Small Business Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business

More information

Next Generation Email Security. Jamie de Guerre Chief Technology Officer, Cloudmark Inc.

Next Generation Email Security. Jamie de Guerre Chief Technology Officer, Cloudmark Inc. Next Generation Email Security Jamie de Guerre Chief Technology Officer, Cloudmark Inc. Effective Carrier Grade Messaging Security Leadership: Key Markets: Market Strength: Market Share: Anti-Spam, Anti-Phishing,

More information

Pattern-based Messaging Security for Hosting Providers

Pattern-based Messaging Security for Hosting Providers Pattern-based Messaging Security for Hosting Providers Email hosting is a key offering for Web hosting providers, and many deployments seem straightforward at first glance. Yet any email hosting offering

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

The Next Level of Secure Channel Partnership

The Next Level of Secure Channel Partnership The Next Level of Secure Channel Partnership Copyright 2015 ADVANCED NETWORK SECURITY WatchGuard s Channel Ecosystem Is Focused, and the Opportunity for Engaged WatchGuardONE Partners Is Better Than Ever

More information

Tech Data 2011 Security Partners Sales Playbook:

Tech Data 2011 Security Partners Sales Playbook: Tech Data 2011 Security Partners Sales Playbook: How to build security offerings into your practice Page 1 Check Point Software Technologies Check Point Software Technologies is a worldwide leader in securing

More information

How To Make A Profit From Cloud Software

How To Make A Profit From Cloud Software Progress Software Presentation to Investors Jay Bhatt President & Chief Executive Officer April 25, 2012 Forward Looking Statements This presentation contains statements that are forward-looking statements

More information

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER

More information

Security as a Service: Business Decision Factors

Security as a Service: Business Decision Factors publication date 11 February 2011 Service: Business Industry Research Table of Contents Introduction 3 Security concerns are business issues 3 Business experience 3 Business priorities 3 Comparing on-premise

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Investor Presentation

Investor Presentation Investor Presentation June 2015 Safe Harbor Statement Statements in this presentation, which are not historical facts, may be deemed to be "forward looking statements. Actual and anticipated future results

More information

Cloud-based Web Security Isn t Hype: It s Here and It Works

Cloud-based Web Security Isn t Hype: It s Here and It Works Cloud-based Web Security Isn t Hype: It s Here and It Works June 2010 INTRODUCTION It s not news that the web is dangerous and getting more dangerous by the day. Cyber criminals have ample economic motive

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

Palo Alto Networks. September 2014

Palo Alto Networks. September 2014 Palo Alto Networks September 2014 Safe harbor This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

How To Choose Between Onpremises Or Cloud Based Email

How To Choose Between Onpremises Or Cloud Based Email WHITE PAPER Why the Cloud is Not Killing Off the On-Premises Email Market An Osterman Research White Paper Published April 2011 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O.

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option

More information

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud. W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs

More information

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these

More information

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,

More information

WHITE PAPER SPON. Why the Cloud is Not Killing Off the On-Premises Email Market. Published April 2011 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Why the Cloud is Not Killing Off the On-Premises Email Market. Published April 2011 SPONSORED BY. An Osterman Research White Paper WHITE PAPER Why the Cloud is Not Killing Off the On-Premises Email Market An Osterman Research White Paper Published April 2011 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O.

More information

WEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS

WEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS WEBSENSE GLOBAL PARTNER PROGRAM OVERVIEW EMPOWERING PARTNERS WITH THE BEST SECURITY FOR TODAY S THREATS Team with Websense for success in the security market Providing your customers with the best web,

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

Email security Cloud vs. On-premise solutions

Email security Cloud vs. On-premise solutions GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

TTAsia Secure Email Over the Cloud

TTAsia Secure Email Over the Cloud TTAsia Secure Email Over the Cloud Telecommunications & Technology Asia Ltd A leading managed services and cloud computing solutions provider in HK and China We filter millions of emails every month and

More information

Server Virtualization A Game-Changer For SMB Customers

Server Virtualization A Game-Changer For SMB Customers Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers

More information

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard: Your Security Partner of Choice. Carlos Vieira WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices

More information

NetSuite: Global Leader in Cloud ERP

NetSuite: Global Leader in Cloud ERP NetSuite: Global Leader in Cloud ERP NYSE : N As of April 28, 2015 Safe Harbor Statement This presentation contains forward-looking statements that involve risks, uncertainties and assumptions relating

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

The Cost Effective Migration to Integrated Hybrid SaaS Email Security

The Cost Effective Migration to Integrated Hybrid SaaS Email Security y The Cost Effective Migration to Integrated SaaS Email Security An Osterman Research White Paper Published July 2010 SPONSORED BY #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black

More information

WEBSENSE TRITON SOLUTIONS

WEBSENSE TRITON SOLUTIONS WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

Cisco Web Security: Protection, Control, and Value

Cisco Web Security: Protection, Control, and Value Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security

More information

Separating Security and Information Management into Two Industry-Leading Technology Companies

Separating Security and Information Management into Two Industry-Leading Technology Companies Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security

More information

Keith Keeler Microsoft Corporation Partner Account Manager Online services kkeeler@microsoft.com

Keith Keeler Microsoft Corporation Partner Account Manager Online services kkeeler@microsoft.com Keith Keeler Microsoft Corporation Partner Account Manager Online services kkeeler@microsoft.com Welcome! Online Services Overview Software + Services Exchange Hosted Services (Service) BPOS Business Productivity

More information

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE Global threat intelligence for local implementation www.kaspersky.com 2 A CLOUD-BASED THREAT LABORATORY

More information

Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Page 1 of 9 Overview Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Security risks for email, web, and data are no secret. Most people

More information

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

How to sell Hosted Exchange to SMB s

How to sell Hosted Exchange to SMB s How to sell Hosted Exchange to SMB s July 2013. The Trusted Channel Centric Marketplace AGENDA The background Partner opportunity Target audience The solution: Microsoft Hosted Exchange 2013 How to capitalize

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research

More information

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Building a Web Security Ecosystem to Combat Emerging Internet Threats I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and

More information

A LOOK AT U.S. & EUROPEAN CLOUD ADOPTION TRENDS & FORMING LASTING PARTNERSHIPS. Pete Lamson Senior Vice President of Sales & Marketing Carbonite

A LOOK AT U.S. & EUROPEAN CLOUD ADOPTION TRENDS & FORMING LASTING PARTNERSHIPS. Pete Lamson Senior Vice President of Sales & Marketing Carbonite A LOOK AT U.S. & EUROPEAN CLOUD ADOPTION TRENDS & FORMING LASTING PARTNERSHIPS PRESENTED BY: Pete Lamson Senior Vice President of Sales & Marketing Carbonite 1 The End of the Story First: Distributors

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE

THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit. Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business

More information

Using SaaS to Reduce the Costs of Email Security

Using SaaS to Reduce the Costs of Email Security Using SaaS to Reduce the Costs of Email Security y An Osterman Research White Paper Published February 2009 SPONSORED BY onsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Unified Communications and the Cloud

Unified Communications and the Cloud Unified Communications and the Cloud Abstract Much has been said of the term cloud computing and the role it will play in the communications ecosystem today. Undoubtedly it is one of the most overused

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

Investor Presentation

Investor Presentation Investor Presentation June 2016 SharpSpring, Inc. investors.sharpspring.com NASDAQ: SHSP Safe Harbor Statement The information provided in this presentation may contain forward-looking statements within

More information