Enterprise Security - Symantec

Enterprise Security: Markets, Strategy, Roadmap, Go‐to‐Market
Jeff Scheel, SVP, Corporate Development, Alliances, and Strategy Balaji Yelamanchili, EVP & GM, Enterprise Security Business Unit
Amit Mital, EVP, CTO & Emerging Endpoints Forward Looking Statements This presentation contains statements regarding our projected financial and business results, which may be considered forward‐
looking within the meaning of the U.S. federal securities laws, including statements regarding our financial guidance and targets (as a
combined company and by business segment); our proposed separation into two publicly traded companies; the projected market
growth rates and margin expansion opportunities for the security business and the information management business; statements
regarding our competitive advantages in security and information management; statements with respect to the proposed timing of
the separation; and statements with respect to proposed capital allocation strategies for both Symantec and Veritas. These
statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, levels of
activity, performance or achievements to differ materially from results expressed or implied in this presentation. Such risk factors
include those related to: risks related to the separation of the company into the security business and the information management
business; general economic conditions; maintaining customer and partner relationships; the anticipated growth of certain market
segments, particularly with regard to security and information management; the competitive environment in the industries in which
we operate; changes to operating systems and product strategy by vendors of operating systems; fluctuations in currency exchange
rates; the timing and market acceptance of new product releases and upgrades; the successful development of new products; and
the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those
contained in the forward‐looking statements in this presentation. We assume no obligation, and do not intend, to update these
forward‐looking statements as a result of future events or developments. Additional information concerning these and other risks
factors is contained in the Risk Factors sections of our Form 10‐K for the year ended March 28, 2014 and our Form 10‐Q for the
quarter ended January 2, 2015.
Any information regarding pre‐release of Symantec offerings, future updates or other planned modifications is subject to ongoing
evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or
implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently
available.
We assume no obligation to update any forward‐looking information contained in this presentation.
2
ENTERPRISE SECURITY
1
Use of GAAP and Non‐GAAP Financial Information
Our results of operations have undergone significant change due to a series of acquisitions, the impact of stock‐based compensation,
impairment charges and other corporate events. To help our readers understand our past financial performance and our future
results, we supplement the financial results that we provide in accordance with generally accepted accounting principles, or GAAP,
with non‐GAAP financial measures. The method we use to produce non‐GAAP results is not computed according to GAAP and may
differ from the methods used by other companies. Our non‐GAAP results are not meant to be considered in isolation or as a
substitute for comparable GAAP measures and should be read only in conjunction with our consolidated financial statements
prepared in accordance with GAAP.
Our management regularly uses our supplemental non‐GAAP financial measures internally to understand, manage and evaluate our
business and make operating decisions. These non‐GAAP measures are among the primary factors management uses in planning for
and forecasting future periods. Investors are encouraged to review the reconciliation of our non‐GAAP financial measures to the
comparable GAAP results, which can be found, along with other financial information, on the investor relations’ page of our website
at www.symantec.com/invest.
Reconciliations for our financial results and guidance can be found on Symantec’s investor relations website.
3
Agenda
1
Market Opportunity
2
Product Strategy
3
Roadmap & Go‐To‐Market
4
ENTERPRISE SECURITY
2
Enterprise Threat Landscape Digital extortion on the rise
Attackers Moving Faster Malware gets smarter
5 of 6 large 317M new 1M new 60% of 113% 45X more 28% of malware companies attacked
malware created
threats daily
attacks targeted SMEs
increase in ransomware
devices held hostage was Virtual Machine Aware
Zero‐Day Threats
Many Sectors Under Attack
24 24 all‐time high
Top 5 unpatched for 295 days
Healthcare
+ 37% Retail
Education Government
Financial
+11% +10%
+8%
+6%
Source: Symantec Internet Security Threat Report 2015
5
Key Trends Reshaping the Enterprise Security Market
RESURGENCE OF ENDPOINT
Rapid shift to mobile and IoT
DISAPPEARING PERIMETER
Decreasingly relevant with “fuzzy” perimeter
RAPID CLOUD ADOPTION
Enterprise data and applications moving to cloud
SERVICES
Security as a Service; box fatigue
CYBERSECURITY
Governments and regulators playing ever larger role
6
ENTERPRISE SECURITY
3
Symantec Enterprise Security | STRONG FRANCHISES
Endpoint Security
Data Protection
Email Security
#1 share; AAA rating
nine quarters in a row
#1 DLP share;
100% of Fortune 100
#1 share; 100% uptime with <0.0003% FPs 5 years in a row
Trust
Services
Authentication & Authorization
Managed
Security Services
#1 share
6B certificate lookups/day
13B validations every day
100% uptime last 5 years
12 Yrs Gartner MQ leader
30B logs analyzed/day 7
Symantec Enterprise Security | UNIQUE VISIBILITY
endpoints
175M 57M attack sensors in 157 countries
182M web attacks blocked last year
3.7T
30% of world’s enterprise 9
rows of telemetry
email traffic scanned/day
threat response centers
100 Billion 1.8 Billion 500+
more/month
web requests
rapid security response team
8
ENTERPRISE SECURITY
4
Symantec Enterprise Security | GROWTH DRIVERS
Addressable Market Size ($B)
Symantec Opportunity
Expanded
Current
12.0
Threat Protection
• With Advanced Threat Protection (ATP) and Cloud Workload Protection, our addressable market expands 50% by CY 2018
Information Protection
CAGR
9.6%
• With Cloud Information Protection and Identity as a Service, our addressable market expands 35% by CY 2018
Cyber Security Services
24.6
• With expanded Cyber Security Services offerings, our addressable market expands 50%+ by CY 2018
18.7
CY15
CY18
Source: IDC Security forecast, Gartner, Harbor Research, Ovum, and Symantec Analyses
9
Symantec Enterprise Security | GROWTH DRIVERS
Addressable Market Size ($B)
Symantec Opportunity
Expanded
Current
+50%
TAM
Threat Protection
• With Advanced Threat Protection (ATP) and Cloud Workload Protection, our addressable market expands 50% by CY 2018
6.9
Information Protection
11.7
13.8
TAM
TAM
3.6
4.3
CY15
CY18
Information Protection
• With Cloud Information Protection and Identity as a Service, our addressable market expands 35% by CY 2018
Cyber Security Services
1.5
3.2
CY15
CY18
Threat Protection
+50%
+35%
6.5
3.9
• With expanded Cyber Security Services offerings, our addressable market expands 50%+ by CY 2018
CY15
CY18
Cyber Security Services
Source: IDC Security forecast, Gartner, Harbor Research, Ovum, and Symantec Analyses
10
ENTERPRISE SECURITY
5
Agenda
1
Market Opportunity
2
Product Strategy
3
Roadmap & Go‐To‐Market
11
Enterprise Security | PRODUCT STRATEGY
Users
Cyber Security Services
Monitoring, Incident Response, Simulation, Adversary Threat Intelligence
Data
Threat Protection
Information Protection
Apps
ENDPOINTS
Cloud
•
•
•
•
DATA CENTER
GATEWAYS
Advanced Threat Protection Across All Control Points
Built‐In Forensics and Remediation Within Each Control Point
Integrated Protection of Server Workloads: On‐Premise, Virtual, and Cloud
Cloud‐based Management for Endpoints, Datacenter, and Gateways
DATA
•
•
•
•
IDENTITIES
Integrated Data and Identity Protection
Cloud Security Broker for Cloud and Mobile Apps
User and Behavioral Analytics
Cloud‐based Encryption and Key Management
Gateways
Unified Security Analytics Platform
Endpoints
Data Center
Log and
Telemetry
Collection
Integrated Threat
and Behavioral
Analysis
Unified Incident
Management and Customer Hub
Inline Integrations
for Closed‐loop
Actionable Intelligence
Regional and Industry Benchmarking
12
ENTERPRISE SECURITY
6
THREAT PROTECTION
Cyber Security Services
Threat Protection
ENDPOINTS
Information Protection
DATA CENTER GATEWAYS
DATA
IDENTITIES
Unified Security Analytics Platform
13
Threat Protection Requirements | FULL THREAT LIFE‐CYCLE
Harden and isolate systems
Proactive risk analysis
PREDICT
Divert attackers
Predict attacks
Baseline systems
Prevent issues
Advanced Threat Protection
Remediate/ Make change
Detect issues
Design/
Model change
RESPOND
PREVENT
Confirm and prioritize risk
Investigate/ Forensics
Contain issues
DETECT
Source: Gartner
14
ENTERPRISE SECURITY
7
Symantec Threat Protection | STRATEGY
• Advanced Threat Protection Across
Control Points
Endpoints
• Built‐in Forensics and Remediation Within Each Control Point
• Integrated Protection of Server Workloads across On‐Premise, Virtual, and Cloud
Advanced
Threat
Protection
• Cloud‐based Management for Endpoints, Datacenter, and Gateways
Network/
Gateways
Data
Center
15
Symantec Threat Protection | ADVANCED THREAT PROTECTION
Advanced
Threat Protection
Global Intelligence
Exported Data
Advanced Threat Protection
Cloud Sandbox
Endpoint
Correlation
Network
Email
Prioritization
• Single detection platform across endpoint, network, and email
• Cross correlation and incident prioritization
• Cloud‐based payload detonation
• Closed‐loop remediation
• Unified incident management
• Key differentiator: high efficacy with least false positives and low TCO
3rd party offerings
16
ENTERPRISE SECURITY
8
Symantec Threat Protection | FORENSICS & REMEDIATION Next Gen Forensics and Remediation
Global Intelligence
Targeted Attack Visualization
Endpoint Protection (SEP)
Flight Recorder
IoC
Search
Repair and Remediation
• Extensions built within existing agent technology
• Granular flight recorder
• Fine‐grained remediation policies
• Common management console with centralized activity logs
• Known and unknown exploit detection • Key differentiator: no new agent, easy to upgrade
Proactive Exploit Protection
17
Symantec Threat Protection | INTEGRATED SERVER WORKLOAD PROTECTION
Server Workload Protection
• Integrated protection across on premise, virtualized, and cloud‐based workloads
• Consistent enforcement of app control, lockdown, and other hardening policies
• Common management and orchestration as workloads move to and from cloud
• Support for VMWare (NSX/ESX) and Amazon, Azure, and OpenStack Clouds
Data Center Security (DCS) File Integrity Monitoring
Application
Hardening
Control &
Compliance
18
ENTERPRISE SECURITY
9
Symantec Threat Protection | SUMMARY OF KEY CAPABILITIES
Advanced
Threat Protection
Next Gen Forensics
and Remediation
Server
Workload Protection • Single platform
• Granular flight recorder
• Cloud‐based payload detonation
• Fine‐grained remediation policies
• Integrated protection across on premise, virtualized, and cloud‐based workloads
• Cross‐control point correlation and incident prioritization
• Known and unknown exploit detection • Consistent application of lockdown, app control, and lockdown policies
• Closed‐loop remediation
• Common management console with centralized activity logs
• Common Management/orchestration as workloads move to and from cloud
• Unified incident management
• Closed‐loop remediation
• Support for VMWare (NSX/ESX) and Amazon, Azure, and OpenStack
• No new agent (easy upgrade)
Cloud‐based management with single extendable agent technology,
self‐service BYOD provisioning, and native encryption & key management
19
Symantec Threat Protection | KEY REVENUE OPPORTUNITIES
Installed Base • Endpoint customers: Endpoint ATP and Forensics & Remediation add‐ons
• Email customers: Email ATP add‐on
• Both: Full ATP including Endpoint, Email, and Network
Expanded
Current
+50%
TAM
$6.9B
Net New Customers
• ATP with cross‐correlation value proposition
• Replacement of manual IR projects with automated tools for Forensics and Remediation
Customers moving to Cloud and BYOD
• Protection for Cloud workloads (e.g. Amazon, Azure)
• Cloud‐based management of endpoint, server, and BYOD devices with self‐service capabilities
$13.8B
$11.7B
CY15
CY18
Source: IDC Security forecast, Harbor Research, Ovum, and Symantec Analyses
20
ENTERPRISE SECURITY
10
INFORMATION PROTECTION
Cyber Security Services
Threat Protection
ENDPOINTS
Information Protection
DATA CENTER GATEWAYS
DATA
IDENTITIES
Unified Security Analytics Platform
21
USERS ARE MOVING Information Protection Requirements | CLOUD AND MOBILE FOCUS
With the advent of mobile and BYOD devices, more users are accessing and consuming information when outside the firewalls
With more data in cloud and more mobile users, information protection across cloud and mobile, combined with behavioral analytics, is a critical imperative
Historically data was created and consumed on premise; most users would create and consume this data from inside firewalls
With more applications and workloads migrating to public clouds, more and more data is created and consumed on cloud
DATA AND APPS ARE MOVING 22
ENTERPRISE SECURITY
11
Symantec Information Protection | STRATEGY
• Extend Data and Identity protection regardless of where data resides: On Premise, On Mobile, In the Cloud
Identities
• Common SSO and Access Management regardless of where applications reside: On Premise, On Mobile, In the Cloud
Cloud
Security
Broker
• Integrated user and behavioral analytics to detect and prevent insider and outsider (APT) threats
Data
Access
23
Symantec Information Protection | CLOUD SECURITY BROKER
• A new cloud‐based control point that integrates DLP, Identity, and Analytics
Cloud Security Broker
DLP
Encryption
MAM
Cloud
Security
Broker
SSO
Identity &
Access Control
• Visibility
• Control
• Compliance • Compliance
• Ensures identity and data protection between mobile users and cloud apps, independent of perimeter
• Highly contextual protection by connecting user, device, location, and data loss prevention policies
• Cloud‐based SSO with biometric authorization
• Scan and remediation of data already in cloud apps
24
ENTERPRISE SECURITY
12
Symantec Information Protection | USER AND BEHAVIORAL ANALYTICS
Behavioral Analytics
• Integrated analytics to track
and profile behaviors and data flow
• Content, Context, and Identity aware
• Pre‐built threat models and big‐data analytics to quickly detect and prevent incidents Integrated Threat
Visualization &
Modeling
• Prioritized incident management based on risk profile, risk timeline, and risk comparison Global Intelligence
Access
Logs
DLP
Logs
• Industry and global intel correlation to detect coordinated attacks
Identity
Data
25
Symantec Information Protection | SUMMARY OF KEY CAPABILITIES
Cloud Security Broker
User and
Behavioral Analytics
• Data and identity protection between mobile and cloud, with no perimeter
• Integrated analytics to track
and profile behaviors and data flow
• Highly contextual protection by connecting user, device, location, and data loss prevention policies
• Prioritized incident management
• Cloud‐based SSO with biometric authorization
• Scan and remediation of data already in cloud apps
• Pre‐built threat models and big‐data analytics to quickly flag and detect incidents • Industry and global intel correlation to detect coordinated attacks
26
ENTERPRISE SECURITY
13
Symantec Information Protection | KEY REVENUE OPPORTUNITIES
Installed Base Expanded
• Cloud Security Broker combing identity, DLP, analytics (increasing ARPU )
• Individuals add‐ons such as DLP for Cloud apps, Cloud SSO, and Behavioral Analytics
Current
+35%
$1.5B
TAM
Net New Customers moving to Cloud
• Cloud Security Broker combing identity, DLP, analytics
• Individual solutions: DLP for Cloud apps, Cloud SSO, and Behavioral Analytics
$4.3B
$3.2B
CY15
CY18
Source: IDC Security forecast and Symantec Analyses
27
CYBER SECURITY PROTECTION
Cyber Security Services
Threat Protection
ENDPOINTS
DATA CENTER GATEWAYS
Information Protection
DATA
IDENTITIES
Unified Security Analytics Platform
28
ENTERPRISE SECURITY
14
Cyber Security Services Market | PRIORITY ON FULL LIFECYCLE
LIFECYCLE
Reactive
Ongoing
Proactive
Incident Response
Monitoring
Intelligence
TECHNOLOGY
• Collection
• Analytics
• Dissemination
PEOPLE
• Identify
• Interpret
• Manage
SIMULATION
29
Symantec Cyber Security Services | STRATEGY
• Incident Response and Forensics services
• Security Simulation Services for security preparedness and overall health checks
Scale up of existing and new services with core tech
• Big Data‐based streaming & batch analytics
• High speed ingestion of large and ever growing log data
EXISTING
Expanded services
• Expansion of number of SOCs globally to address demand as well as regulatory requirements
SYMANTEC OFFERING
Monitor Threats & Campaigns
Security Monitoring Service
Track & Analyze
Key Events & Trends
Adversary Threat Intelligence Service
Respond to Breaches
Quickly & Effectively
Incident Response and Forensics Service
Assess Security Readiness
Under Different Scenarios
Security Simulation Service
NEW
Expanded global footprint
SECURITY SERVICE NEED
30
ENTERPRISE SECURITY
15
Symantec Cyber Security Services | SUMMARY OF KEY CAPABILITIES
Security Monitoring Services
IR and Simulation Services
Threat Intelligence Services
• Key technology IP for log collection, analytics, and incident investigation
• Global team with extensive experience in forensics investigation
• Tailored to customer maturity/industry
• Emergency/Retained/Managed options
• High‐touch 24x7 service model
• Integrated with SOCs to provide end to end service
• Integration with next gen security infrastructure to detect advanced threats
• Realistic live fire training missions delivered as a SaaS solution
• Global Intelligence Network
• Early warning Portal
• Adversary threat intelligence
• Integrated IoCs from internal and external feeds
Global team of 500+ threat and intel experts with unique knowledge of attack actors; Supported by Cloud‐based Big Data analytics infrastructure
31
Symantec Cyber Security Services | KEY REVENUE OPPORTUNITIES
Net New Customers
• Integrated suite of services covering monitoring, IR, threat intelligence, and security simulation
Expanded
Current
Installed Base +50%
• Cross‐selling of IR and Simulation Services into Monitoring service installed base
TAM
$3.6B
Specific opportunities within Public Sector
• Security best practices and solutions tailored for agencies
Data residency and regulatory compliance enables expansion into new geographies
$6.5B
$3.9B
CY15
CY18
Source: Gartner and Symantec Analyses
32
ENTERPRISE SECURITY
16
UNIFIED SECURITY ANALYTICS
Cyber Security Services
Threat Protection
ENDPOINTS
Information Protection
DATA CENTER GATEWAYS
DATA
IDENTITIES
Unified Security Analytics Platform
33
Security Platforms Market | FOCUS SHIFTING TO ANALYTICS
ATTACKS ARE INCREASINGLY SOPHISTICATED
• Micro‐targeted
• New techniques and zero day attacks
• Stealthy to remain undetected
EXISTING TECHNOLOGY CAN’T KEEP UP
• Reactive methods
• Insufficient data to find
subtle trends and patterns
• Isolated approaches
without broader context
ANALYST FATIGUE IS RAMPANT
• Too many alerts and
false positives
• Slow and manual detection, forensics,
and remediation
RISE OF SECURITY
BIG DATA ANALYTICS
Big data, analytics, and machine learning techniques needed to address these challenges
34
ENTERPRISE SECURITY
17
Symantec Unified Security in a Nutshell
WHAT IT IS:
3 part ecosystem
1
Unified Security Analytics Platform
A comprehensive Big Data Analytics platform for collecting vast security telemetry, analyzing it for local and global threats and converting the insights into secure outcomes
2
Unified Security Applications
3
Data and analytic applications built on the platform by Symantec and 3rd party ecosystem for a variety of security use cases
Telemetry & APIs
Standard set of interfaces and APIs, supplied by Symantec and 3rd party security products, for contributing rich telemetry to the platform
WHAT IT DOES:
Brings in data
and events from all sources
Provides a platform to manage, store, and analyze the aggregated data
Enables a new breed of applications that leverages the aggregated intelligence
Creates a virtuous cycle
35
Unified Security Analytics Blueprint
3rd‐party offerings & apps
SYMC Unified Security offerings & apps
Unified Security Applications
Unified Security Platform
ATP: ATP: Endpoint Network
Managed Services (SYMC or 3rd party)
ATP: SymGauge Attack
UIM/
Email
Detection UII
…
…
PRESENTATION
Customer
Portal
SERVICES LAYER
Collection &
Enrichment Services
DATA LAYER
Reports & Dashboards
Interactive Visualizations
Analytics Services
(Batch & Real‐Time)
CUSTOMER DATA
(NON‐ANONYMIZED)
Unified
Incident Hub
Integration Services
(with Detect/Protect Engines)
GLOBAL DATA
(ANONYMIZED)
Collectors and control APIs
Telemetry & APIs
…
3rd party clouds
Cloud security
(e.g. for AWS)
SYMC hosted security
(e.g. Email, Web)
SYMC on‐prem products
(e.g. SEP, DLP, DCS)
…
3rd party products
(e.g. Firewalls)
36
ENTERPRISE SECURITY
18
Scale Drives Unified Security Analytics
Enables solving a whole new class of customer use cases:
Changes the basis of competition:
Accelerant for continued innovation:
• Identify attacks through richer analytics and algorithms
• Increased visibility by connecting the dots across global telemetry
• Realization of better security outcomes
• Scale of security data we collect across endpoints, gateways, applications, and users
• Ecosystem that is difficult to replicate
• Uniquely differentiated offerings
• We already operate the largest civilian threat intelligence network on the planet
• Platform and telemetry • Robust set of services with cloud‐scale architecture • Enablement of 3rd parties to innovate on our platform
37
Value Created Through Scale
How
We’ll Monetize
Additional
Value We Capture
Unified Security Analytics Platform
• Access to the platform
• Drive cross‐sell through increased value of all of our offerings
Unified Security Analytics Applications
• Encourages new analytics applications built on our vast intelligence
• Revenue share from 3rd parties
Telemetry & APIs
• More effective detecting, blocking, and remediating of attacks than anyone else
• Increased telemetry from our product drives synergy across the ecosystem
38
ENTERPRISE SECURITY
19
Sample Unified Security Analytics Applications
SymGauge
• Risk Advisor and Benchmarking App
• Measures and benchmarks security health, including risks arising from compromised end‐users
Incident Investigation
Targeted Attack Detection
Moneyball
• Drill into incidents to get all associated events across security control points, building out the full attack chain
• Ex: Discover when and how a threat first entered the environment
• Crawls through global telemetry to find targeted attack IOCs and detect brand‐new targeted attacks
• Ex: find all emails sent from a given address, all files attached to those emails, all events associated with those files, etc.
• Correlate security outcomes across customers with differing security controls, policies, and settings
• Quantify ROI for potential new security investments
39
SymGauge (“Taste Test”) Application
Validating Our Unified Security Hypothesis Three questions to answer
• How useful is our data?
• Can we analyze the data to find significant threats?
• What’s the best way to monetize?
“Taste Test” Experiment with a Large Bank
SymGauge
Automated Taste Test
Found targeted attack activity
• Taste Test took 2 analysts > 6 weeks…
this doesn’t scale
Provided analysis of exploits in use
• Solution: automate!
Calculated security ranking
• Now developing SymGauge, an automated Risk Advisor and Benchmarking application
Analyzed our global SEP telemetry Analyzed our global Norton data Identified active phishing campaigns
Found “spoofed” banking apps
• Narus acquisition accelerating implementation
Showed “hygiene” of customers
accessing the bank’s site
Result: “Shocked” CISO and landed multi‐
million dollar deal with a suite of offerings
40
ENTERPRISE SECURITY
20
Agenda
1
Market Opportunity
2
Product Strategy
3
Roadmap & Go‐To‐Market
41
Symantec Enterprise Security | RAPID RELEASE CYCLES
18 MONTH ROADMAP
THREAT
PROTECTION
INFORMATION
PROTECTION
CYBER
SECURITY
SERVICES
ATP
(Network)
ATP
(Email, Endpoint)
Cloud Endpoint
Management
Email Security
with DLP
Endpoint
Forensics
Endpoint
Remediation
DLP/
Office365
DLP/
Box.Net
DLP/
SFDC & WDAY
DLP
As a Service
Biometric
Authentication
Cloud
Security Broker
User Behavioral Analytics
Identity
As a Service
IR Retainer
Service
Simulation
Service
ATP Monitoring
Service
MSS Self‐Service Admin Portal
IR Readiness Assessment
SymGauge
App (TasteTest)
Targeted Attack Detection App
Incident Investigation App
Moneyball
App
Analytics Platform Internal Preview
Analytics Platform Customer Preview
Analytics Platform
Gen. Availability
Analytics Platform
3rd Party SDK
UNIFIED
SECURITY ANALYTICS
New Product
Enhanced Product
Cloud Workload Protection
Datacenter Security
As a Service
Cloud based
Key Management
IR Managed Service
MSS Log Mgmt
As a Service
Preview Releases
42
ENTERPRISE SECURITY
21
Symantec Enterprise Security | FOCUSED GO TO MARKET
1,750
40%
3X
3X
Strong
Enterprise Security Sales Team More Quota Carrying Field Reps
More
Solution
Architects
Increase
in Coverage for
Global Key Accounts
DEDICATED SALES
MORE FEET ON THE STREET
MORE SECURITY EXPERTS
KEY ACCOUNT PROGRAM
Complemented by Partner and Channel ecosystem with rewards re‐aligned to growth;
Commercial growth through Inside Sales, with focus on SaaS, Subscriptions, and Renewals
43
Symantec Enterprise Security
Large market with 35%‐50% increase in TAM driven by new product pipeline targeting growth segments
Increasing momentum through dedicated sales focus and more quota carrying reps Unrivalled threat intelligence and telemetry drives innovative platform, products, and services Leverage from large installed base in key segments will accelerate growth 44
ENTERPRISE SECURITY
22
Q&A
Jeff Scheel, SVP, Corporate Development, Alliances and Strategy Balaji Yelamanchili, EVP & GM, Enterprise Security Business Unit
Amit Mital, EVP, CTO & Emerging Endpoints 45
Appendix
ENTERPRISE SECURITY
23
Symantec Threat Protection | PROVEN AND INNOVATIVE TECHNOLOGIES
Detection Engines
Protection Engines
Detonation
Correlation
Blocking Exploits
Behavior Analysis
Predictive Analysis
Cynic
Synapse
PEP
SONAR
Skeptic
Insight
Cloud based sandboxing and detonation engine for malware analysis
Correlates security events across the control points
Blocks exploits of known & unknown vulnerabilities
Finely tuned and highly performant engine that enables flight recorder‐like system monitoring
Uses predictive analysis, heuristics, and link following
to find targeted threats
Determines the safety of files & websites using the “wisdom of the crowd”
Reputational
47
Symantec Info Protection | PROVEN AND INNOVATIVE TECHNOLOGIES
Content Engines
Validation Engines
Indexed
Data Matching
Exact
Data Matching
Vector Machine Learning
Crypto
Cloud
Cert Validation
Engine
Virtualized
Identity
Fuzzy matching of indexed files (office, PDF, etc..) based on templates
Precise detection technology with high precision match and eliminate all FPs
Supervised learning classifier; “zero‐day protection” for confidential data
Cloud vault for all types of crypto keys (asymmetric and symmetric)
Verifies wide range of digital identities, including website identities (SSL) and user credentials (PKI, VIP)
Maps identities from any directory, database, or user store to create a virtual identity
48
ENTERPRISE SECURITY
24