Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder
|
|
|
- Maud Simpson
- 10 years ago
- Views:
Transcription
1 Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder
2 OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying one step ahead of evolving threats while keeping pace with the changing IT ecosystem
3 MISSION: Enable Customers in Each Segment Consumer 35% Small Business 65% Midsize & Enterprise Business Totaling over 500k commercial customers worldwide
4 CENTRALIZED VISIBILITY & CONTROL
5 How Well Did We Execute Upon Our Vision in 2014?
6 SMART PROTECTION SUITES for better protection, more flexible management, simplified licensing Cloud-based security for OFFICE % Customer growth for Smart Protection Suites (QoQ, Q4 2014)
7 #1 in protection and performance 13 consecutive years as Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, John Girard, Neil MacDonald, December 22, 2014 Info-Tech Research Group Vendor Landscape: Endpoint Protection, July (Sept 2013 Feb 2014 test results, Corporate Solutions on Win XP,7, 8 Systems)
8 Optimized server security for VMWARE NSX and MS AZURE APPROVED SCANNER for web apps on AWS 50% Customer growth for Deep Security (YoY 2014)
9 3 2 The market leader in server security each year also has increased its share of the market 1. IDC Tech Spotlight: Server Security: Not What it Used to Be!, December experton Group, Cloud Vendor Benchmark, June V3 Technology Awards, V3.co.uk, November 2014 In 2009, Trend Micro captured 23% by 2013 it had garnered nearly 28% share of the market. 1
10 ENDPOINT SENSOR for threat investigation Automatic threat intelligence sharing with HP TIPPINGPOINT 160% Customer growth for Deep Discovery (YoY 2014)
11 2 1 HP TippingPoint Advanced Threat Appliance family includes Trend Micro Deep Discovery for breach detection NSS Labs Breach Detection Tests 2. V3 Technology Awards, V3.co.uk, November Trend Micro PR: December, 2014
12 Using Strategic Solutions to Penetrate New Accounts Manufacturing, Fortune 500 Faced admin and operational challenges with incumbent; chose us for superior agentless, virtual patching, and visibility Deep Security (Virtual Patching) Financial services Competitive advanced threat solution already in place but was inadequate; wanted to add better solution, defense in depth Deep Discovery US-based online shopping Needed to protect their brand and data in a very large virtual Ne server environment and meet compliance concerns Deep Security (Compliance) US government agency Prospect originally tried to secure AWS with their incumbent security provider but failed; we did in 2.5 weeks what incumbent failed to do in 6 months of trying! Deep Security (AWS) Source: Sampling of customer deals, 2H 2014
13 Increasing Lifetime Customer Value by Adding Solutions Large pharmaceutical Gained initial interest with Deep Security, which opened door to compete for endpoint business too (dissatisfied with incumbent) Deep Security + Endpoint Security Healthcare / Higher Education Happy customer (with 17,000 endpoints secured) opened doors for addition of strategic solutions Endpoint Security (over 15 years) + Deep Security: VDI, Web Apps (2013) + Deep Discovery (Q4 14) Manufacturing Initial need was encryption; showed value-add of suite, then opened the door for more Smart Protection for Endpoints + ScanMail for Exchange + Deep Security Education Happy 10-year endpoint customer, added Deep Security after attending AWS Re:Invent Endpoint Security (over 10 years) + Deep Security for AWS (2013) + Deep Discovery (2014) Source: Sampling of customer accounts
14 Strategic Solutions Accelerating New Business and Aiding Retention in the U.S. Have sold Trend Micro Deep Security to almost 1000 US customers where a competitor was the incumbent at endpoint Experiencing a 95% retention (10% above industry average) for US enterprise customers who own more than one solution! 43% growth in NEW US enterprise business (YoY, Q4 2014) Source: Trend Micro analysis of US commercial business in 2014
15 Sales Productivity Channel Enablement Strategic Alliances Targeted Marketing Focus for 2015: Operational Excellence Customer Retention Continual Innovation
16 16 Thank you!
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO
Connected Threat Defense Strategy Eva Chen, Co-Founder and CEO Japanese Pension Service Over a Million of Personal Data Leaked by APT IT Pro, June 1, 2015 Tokyo Government Office 9 PCs infected by watering
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
overview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS.
SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS. RESELLER BROCHURE Take Advantage of Today s Dynamic Security Market The security landscape has dramatically shifted. New device types, new computing models,
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
ENABLING SDDC WITH XTREMIO & BROCADE
ENABLING SDDC WITH XTREMIO & BROCADE MICHAEL COONEY PR. SOLUTIONS ARCHITECT, EMC XTREMIO MARCUS THORDAL DIRECTOR, SOLUTION CENTER OCTOBER 2015 1 EMC XTREMIO: LEADING BY ALL MEASURES #1 >34% market share
How To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
Gartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Own, launch, grow and support your cloud backup and recovery offering
Asigra Hybrid Partner Program Own, launch, grow and support your cloud backup and recovery offering Recovery is Everything Get powered by Asigra. Deliver your own backup service, be a data recovery specialist,
Cloud Vendor Benchmark 2015 A Comparison of Cloud Computing Vendors and Service Providers
Cloud Pervasive Computing Driver No.1 An The Overview digital world of is becoming German a reality, and Swiss and more Cloud so each Computing day. E-commerce, Market online advertising, mobile applications
Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)
Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
Sophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Automated Protection on UCS with Trend Micro Deep Security
Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer Agenda 1. Industrialization of Cyber threats The boomerang of Project
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Separating Security and Information Management into Two Industry-Leading Technology Companies
Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction
Windows Server 2003 End of Support. What does it mean? What are my options?
Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from
HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise
HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
Splunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
overview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
VMware End-User Computing May 8, 2014. 2014 VMware Inc. All rights reserved.
VMware End-User Computing May 8, 2014 2014 VMware Inc. All rights reserved. Sanjay Poonen, EVP & GM, End-User Computing Alan Dabbiere Chairman, AirWatch 2 Mainframe Client-Server Mobile-Cloud Thousands
Security Operation Centre 5th generation
Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to
Palo Alto Networks. September 2014
Palo Alto Networks September 2014 Safe harbor This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are
McAfee Next Generation Firewall
McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect
Secure Your Success. Intel Security Partner Program
Secure Your Success Intel Security Partner Program Today s digital security threats are more sophisticated and complex than ever. At the same time, computing advancements are opening up new possibilities
Malware and Other Malicious Threats
21 August Thailand Securing Your Endpoints from Malware and Other Malicious Threats Steven Scheurmann Sales Leader, Tivoli Endpoint Management Products, built on BigFix, IBM Software Group, Asia Pacific
EMC AND VIRTUSTREAM MAY 26, 2015. Copyright 2015 EMC Corporation. All rights reserved.
EMC AND VIRTUSTREAM MAY 26, 2015 1 FORWARD-LOOKING STATEMENTS This presentation contains forward-looking statements as defined under the Federal Securities Laws. Actual results could differ materially
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
How To Understand Cloud Economics
WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization
McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)
McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
Your New Cloud Storage Business. Three solutions that will impact your organization
Your New Cloud Storage Business Three solutions that will impact your organization Agenda Infrascale Overview: Our company and our platform What Infrascale technology can do for you Security and encryption
Connected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
Remote Collaboration Solutions In the Financial Services Industry
WHITE PAPER Remote Collaboration Solutions In the Financial Services Industry Using Audio/Web Conferencing to Drive Profitable Growth By Debra Chin Senior Vice President Palmer Research May 2011 This Palmer
Cloud Storage Overview
Cloud Storage Overview Tim Sheets Sr. Manager, Product Management HP CloudSystem 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice The World
Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013
Copyright 2013 Vivit Worldwide Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Brought to you by Vivit Cloud Builders Special Interest Group (SIG) Jim Murphy Cloud
Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.
Overview Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated
Kea Influencer Relations and Marketing for High-Tech & Technology Providers
Kea Analyst Relations Industry analysts play a key role in defining markets and educating buyers. We work with clients to identify and track the most influential and relevant industry analysts, and advise
Big Data overview. Livio Ventura. SICS Software week, Sept 23-25 Cloud and Big Data Day
Big Data overview SICS Software week, Sept 23-25 Cloud and Big Data Day Livio Ventura Big Data European Industry Leader for Telco, Energy and Utilities and Digital Media Agenda some data on Data Big Data
The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications
The Next Generation of IT Management Jason Andrew Vice President, Marketing & Communications BMC Has Outperformed the Market Growing Stock Price Over 130 Percent in 5 Years BMC +134% IBM +76% HP +50% NASDAQ
VMware Vision Accelerating the Journey to Your Cloud
VMware Vision Accelerating the Journey to Your Cloud Ralf von Gunten Sr. Systems Engineer 2010 VMware Inc. All rights reserved VMware is the Customer-Proven Market Leader Company Overview > $2.6 billion
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh
People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform
COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA
COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER SECURITY STORAGE BUSINESS CONTINUITY INFRASTRUCTURE MANAGEMENT Simplify and strengthen information
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure [email protected]
Protecting the Irreplacable November Athens Ian Whiteside, F-Secure [email protected] PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the
Accenture Cloud Platform Unlocks Agility and Control
Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?
Securing your IOT journey and beyond Alvin Rodrigues Market Development Director South East Asia and Hong Kong 1 What is the internet of things? 2 1 Imagine if Meeting @ 9am 5 mins later Meeting delayed
Tivoli Automation for Proactive Integrated Service Management
Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Avoiding Turbulence in the Cloud:
Avoiding Turbulence in the Cloud: ediscovery, Archiving & Cloud Computing Avoiding ediscovery Turbulence in the Cloud 1 Symantec Knows Information & Security We protect 1 billion systems around the world
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
VCE BUSINESS UPDATE AND OVERVIEW
VCE BUSINESS UPDATE AND OVERVIEW October, 2014 BUSINESS UPDATE VCE is a privately held company funded by Cisco, EMC, VMware, and Intel 2000+ employees globally, with manufacturing operations in the US
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
