How To Get A Cloud Service For A Small Business



Similar documents
Public, Private, Hybrid:

Best Practices for a BYOD World

Better Together: Microsoft Office 365 & Symantec Office 365

Symantec Enterprise Vault.cloud Giovanni Alberici

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

#ITtrends #ITTRENDS SYMANTEC VISION

On and off premises technologies Which is best for you?

Risk and threats everywhere, all the time

Secure Your Mobile Workplace

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Countering Insider Threats Jeremy Ho

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

How To Protect Your Endpoints From Attack

2012 Endpoint Security Best Practices Survey

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Addressing Evolving Threats & Responses in a MITA 3.0 World Robert Myles, CISSP, CISM

Small and Midsize Business Protection Guide

White Paper: Security Management

INFORMATION PROTECTED

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

OVERVIEW. Enterprise Security Solutions

Symantec Protection Suite Add-On for Hosted and Web Security

Corporate Presentation

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

For additional information and evaluation copies of Trend Micro products and services, visit our website at

Managing Security Risks in Modern IT Networks

Proven LANDesk Solutions

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Data Center security trends

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

The Headache of Managing an Service Top 10 Reasons to Outsource. White Paper July 08

McAfee - Overview. Anthony Albisser

Website Security Solutions Path to Specialization Experienced. Proven. Trusted.

V1.4. Spambrella Continuity SaaS. August 2

Cyber and Mobile Landscape, Challenges, & Best Practices

If you can't beat them - secure them

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Symantec Federal Solutions

McAfee Total Protection Reduce the Complexity of Managing Security

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

State of Security Survey GLOBAL FINDINGS

overview Enterprise Security Solutions

Symantec Backup Exec 2014

Symantec Security.cloud - Skeptic Whitepaper

Find the needle in the security haystack

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Next-Generation Firewalls: Critical to SMB Network Security

Top 10 Reasons Enterprises are Moving Security to the Cloud

How to Turn the Promise of the Cloud into an Operational Reality

SYMANTEC ENTERPRISE SOLUTION STRATEGY

Confidence in the Cloud Five Ways to Capitalize with Symantec

/Endpoint Security and More Rondi Jamison

Cyber Security. John Leek Chief Strategist

Putting Web Threat Protection and Content Filtering in the Cloud

Optimize Business Productivity Evolve Your Business with the Cloud. Slide 1

Altiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit

How To Buy Nitro Security

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

IBM Cloud :Infrastructure-as-a-Service

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

TCO and ROI Calculations Help Make the Case

EMPOWERING THE DYNAMIC WORKPLACE

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

Mobile App Management:

End to End Security do Endpoint ao Datacenter

Symantec Mobile Management 7.2

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Transcription:

Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances

Compelling Trends for Change Symantec as a Leader in Security Winning Together 2

NOT SO LONG AGO

SMB Attitudes Towards Business and Technology 61% believe current environment favors smaller, more agile businesses 53% expect to grow sales over next 12 to 18 months 3,000 SMBs Surveyed Globally 300 = China 200 = S Korea 200 = Australia 200 = Japan 27% expect to invest in new technology Americas Europe Asia-Pacific Source: Edge Strategies 2012 Drivers & Inhibitors to Cloud Adoption for SMBs 5

SMBs & Cloud Adoption Average Number of Paid Cloud Services 5.7 6.0 5.0 3.8 4.0 3.3 3.0 2.0 1.0 0.0 2010 2011 2014 35% 30% 48% 22% Users Today + Users over the next 2 3 Years Nonusers All SMBs SMBs w/ Cloud Services Today Source: Edge Strategies 2012 Drivers & Inhibitors to Cloud Adoption for SMBs 6

Evolving Security Needs > 5 Years Ago All about loading Anti- Virus On PCs and Servers Recent Years Anti-virus, Anti-spam Firewall Intrusion Prevention Vulnerability Protection Remote Management Looking Ahead BYOD User Access and Authentication Data Center Regulation & Compliance 7

BYOD Is Exploding 39% 69% 340% 2,170% 2010 177M Corp PCs 2015 246M Corp PCs 2010 173 M Personal PCs 2015 293M Personal PCs 2010 300M Smartphones 2015 1017M Smartphones 2010 15M Tablets 2015 326M Tablets (Sources: Gartner & IDC)

Almost 1M Mobile Apps PREPARE

Global Online Threat Landscape 403Million Unique Variants of Malware 42Billion Estimated Global Spam per Day 5.5B Malicious Attacks Blocked in 2011 malicious websites 4,595 blocked per day emails are 1in299 Phishing! Target Businesses & Consumers vs. Devices Source: 2011 Internet Security Threat Report - Symantec Research 10

Security and SMBs 50% of SMBs think that because they are small businesses, they are not a target for cyber attacks 62% of SMBs have lost devices such as laptops, smart phones, or tablets in the past 12 months 42% of SMBs have lost confidential or proprietary information in the past 1 in 341 emails to small businesses are phishing attacks; 1 in 208 contain email-borne viruses The median cost of downtime for an SMB is $12,500 per day 73% of SMBs have been the victim of cyber attacks Mark 11

People and Information Protection Stuff Data Devices Assets Clouds Systems Smart Grids Servers Transactions Livelihood ID Apps 12

Symantec.cloud: Market Leadership 11 million SaaS users 32,000 clients 104 Countries A leading provider of SaaS Web Security (IDC) A leader in Gartner Magic Quadrant for Secure Email Gateway Worldwide leader in SaaS Messaging Security (IDC)

Symantec Global Cloud Infrastructure Mesa Tucson Denver Toronto Virginia (2) Gloucester Hemel Hempstead London Amsterdam Frankfurt Oman Hong Kong Tokyo Kitakyūshū Singapore (2) Network Operation Center (3) Data Center (17) 17 data centers spanning four continents Johannesburg Every data center is scalable and secured to the highest standards Redundancy within and across data centers for high availability Sydney 14

Parallels and Symantec Enabling Your Business $600 $400 $200 Annual Revenue ($000) Impact of Adding Services Develop new revenue streams Increase customer retention Reduce overhead $- Hosted Mail + Email Security + Email Archiving + Endpoint Security Boost agility + = Your Cloud Services Delivery Platform 1 2 3 Bundle Sell Provision 15

Symantec Cloud Services Portfolio Communication Security Data Protection and Management End User Protection Web Site Security Email Security* Email Encryption Instant Messaging Security Enterprise Vault (Email Archiving)* Backup Exec Email Continuity Endpoint Protection (Anti-Virus)* Web Security SSL & Trust Certificates (Verisign/Norton Secure)* * Enabled through Parallels Today! 16

Winning Through Partnership Parallels Automation Symantec Email Security.cloud With Parallels Automation, we are now executing on our strategic plan to manage an increasing number of cloud services we offer our customers without physically growing in size as a company ourselves. Hosted Communications solutions from Apptix Chris Damvakaris VP, Sales & Business Development Apptix 17

Winning Through Partnership Differentiate Offer uncompromised security and performance Leverage the power of the Symantec brand Bundle, sell & provision a range of cloud services Maximize Increase customer retention & cross-sell/up-sell potential SLA for 100% service availability Manage centrally across customers Accelerate Grow revenue by offering more value-add services Shift to predictable, recurring revenue Offer a simple and scalable customer experience 18

Thank you! Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 19