Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Similar documents
OVERVIEW. Enterprise Security Solutions

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

OVERVIEW. Enterprise Security Solutions

overview Enterprise Security Solutions

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Cloud Vendor Benchmark 2014 A Comparison of Software Vendors and Service Providers

The Hillstone and Trend Micro Joint Solution

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Решения HP по информационной безопасности

SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS.

McAfee Server Security

Cloud Leader Report. A Comparison of Cloud Vendors in Germany. Executive Summary of the Cloud Vendor Benchmark 2013 for TREND MICRO Deutschland GmbH

ENABLING SDDC WITH XTREMIO & BROCADE

How To Get A Cloud Service For A Small Business

Gartner Magic Quadrant Sources and Disclaimer

Cloud and Data Center Security

Own, launch, grow and support your cloud backup and recovery offering

Cloud Vendor Benchmark 2015 A Comparison of Cloud Computing Vendors and Service Providers

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Product Analysis: 2012 Frost & Sullivan Customer Value Enhancement Award in Mobile Device Management

Sophos Acquires Cyberoam

How To Buy Nitro Security

Automated Protection on UCS with Trend Micro Deep Security

Changing the Enterprise Security Landscape

Separating Security and Information Management into Two Industry-Leading Technology Companies

Windows Server 2003 End of Support. What does it mean? What are my options?

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Splunk Company Overview

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

overview Enterprise Security Solutions

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Chief Security Strategist Symantec Public Sector

(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg

The Clock is Ticking on Windows Server 2003 Support

VMware End-User Computing May 8, VMware Inc. All rights reserved.

Security Operation Centre 5th generation

Palo Alto Networks. September 2014

Architecting Security for the Private Cloud. Todd Thiemann

McAfee Next Generation Firewall

Windows XP End-of-Life Handbook for Upgrade Latecomers

Secure Your Success. Intel Security Partner Program

Malware and Other Malicious Threats

EMC AND VIRTUSTREAM MAY 26, Copyright 2015 EMC Corporation. All rights reserved.

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Netzwerkvirtualisierung? Aber mit Sicherheit!

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Meeting the Challenges of Virtualization Security

Informa*on Management

Security Information & Event Management (SIEM)

Your Customers Want Secure Access

How To Understand Cloud Economics

Cybersecurity Tips for Startups and Small Businesses

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

2012 North American Managed Security Service Providers Growth Leadership Award

Virtualized Architecture Enables Choice, Efficiency, and Agility for Enterprise Mobility

Your New Cloud Storage Business. Three solutions that will impact your organization

Connected Intelligence and the 21 st Century Digital Enterprise

Remote Collaboration Solutions In the Financial Services Industry

REPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different?

Cloud Storage Overview

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Kea Influencer Relations and Marketing for High-Tech & Technology Providers

Big Data overview. Livio Ventura. SICS Software week, Sept Cloud and Big Data Day

IT Security by the Numbers: Calculating the Total Cost of Protection

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Rally Investor Presentation Q4 FY2015

VMware Vision Accelerating the Journey to Your Cloud

VDI Security for Better Protection and Performance

Vulnerability Management

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA

How To Protect A Virtual Desktop From Attack

Market Share Leadership of the Year, Vulnerability Assessment Global, 2010

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Accenture Cloud Platform Unlocks Agility and Control

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA

EMPOWERING THE DYNAMIC WORKPLACE

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

We are here to save the world

Trend Micro Inc.

Sage CRM. Gartner Magic Quadrant for Sales Force Automation 2014 Sage CRM Opinion Brief. Sage CRM

Tivoli Automation for Proactive Integrated Service Management

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Avoiding Turbulence in the Cloud:

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

VCE BUSINESS UPDATE AND OVERVIEW

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010

2012 North American Enterprise Firewalls Market Penetration Leadership Award

VULNERABILITY MANAGEMENT

Securing Cloud Infrastructures with Elastic Security

VIRTUALIZATION AND CLOUD COMPUTING THE JOURNEY TO THE CLOUD. Data Center Security

Transcription:

Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder

OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying one step ahead of evolving threats while keeping pace with the changing IT ecosystem

MISSION: Enable Customers in Each Segment Consumer 35% Small Business 65% Midsize & Enterprise Business Totaling over 500k commercial customers worldwide

CENTRALIZED VISIBILITY & CONTROL

How Well Did We Execute Upon Our Vision in 2014?

SMART PROTECTION SUITES for better protection, more flexible management, simplified licensing Cloud-based security for OFFICE 365 215% Customer growth for Smart Protection Suites (QoQ, Q4 2014)

#1 in protection and performance 13 consecutive years as Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, John Girard, Neil MacDonald, December 22, 2014 Info-Tech Research Group Vendor Landscape: Endpoint Protection, July 2014 http://www.av-test.org (Sept 2013 Feb 2014 test results, Corporate Solutions on Win XP,7, 8 Systems)

Optimized server security for VMWARE NSX and MS AZURE APPROVED SCANNER for web apps on AWS 50% Customer growth for Deep Security (YoY 2014)

3 2 The market leader in server security each year also has increased its share of the market 1. IDC Tech Spotlight: Server Security: Not What it Used to Be!, December 2014 2. experton Group, Cloud Vendor Benchmark, June 2014 3. V3 Technology Awards, V3.co.uk, November 2014 In 2009, Trend Micro captured 23% by 2013 it had garnered nearly 28% share of the market. 1

ENDPOINT SENSOR for threat investigation Automatic threat intelligence sharing with HP TIPPINGPOINT 160% Customer growth for Deep Discovery (YoY 2014)

2 1 HP TippingPoint Advanced Threat Appliance family includes Trend Micro Deep Discovery for breach detection 3 1. 2014 NSS Labs Breach Detection Tests 2. V3 Technology Awards, V3.co.uk, November 2014 3. Trend Micro PR: December, 2014

Using Strategic Solutions to Penetrate New Accounts Manufacturing, Fortune 500 Faced admin and operational challenges with incumbent; chose us for superior agentless, virtual patching, and visibility Deep Security (Virtual Patching) Financial services Competitive advanced threat solution already in place but was inadequate; wanted to add better solution, defense in depth Deep Discovery US-based online shopping Needed to protect their brand and data in a very large virtual Ne server environment and meet compliance concerns Deep Security (Compliance) US government agency Prospect originally tried to secure AWS with their incumbent security provider but failed; we did in 2.5 weeks what incumbent failed to do in 6 months of trying! Deep Security (AWS) Source: Sampling of customer deals, 2H 2014

Increasing Lifetime Customer Value by Adding Solutions Large pharmaceutical Gained initial interest with Deep Security, which opened door to compete for endpoint business too (dissatisfied with incumbent) Deep Security + Endpoint Security Healthcare / Higher Education Happy customer (with 17,000 endpoints secured) opened doors for addition of strategic solutions Endpoint Security (over 15 years) + Deep Security: VDI, Web Apps (2013) + Deep Discovery (Q4 14) Manufacturing Initial need was encryption; showed value-add of suite, then opened the door for more Smart Protection for Endpoints + ScanMail for Exchange + Deep Security Education Happy 10-year endpoint customer, added Deep Security after attending AWS Re:Invent Endpoint Security (over 10 years) + Deep Security for AWS (2013) + Deep Discovery (2014) Source: Sampling of customer accounts

Strategic Solutions Accelerating New Business and Aiding Retention in the U.S. Have sold Trend Micro Deep Security to almost 1000 US customers where a competitor was the incumbent at endpoint Experiencing a 95% retention (10% above industry average) for US enterprise customers who own more than one solution! 43% growth in NEW US enterprise business (YoY, Q4 2014) Source: Trend Micro analysis of US commercial business in 2014

Sales Productivity Channel Enablement Strategic Alliances Targeted Marketing Focus for 2015: Operational Excellence Customer Retention Continual Innovation

16 Thank you!