Securing Your Journey to the Cloud. CEO Eva Chen

Size: px
Start display at page:

Download "Securing Your Journey to the Cloud. CEO Eva Chen"

Transcription

1 Securing Your Journey to the Cloud CEO Eva Chen Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 1

2 Building Cloud Security Strategy Around IT 4 Pillars Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 2

3 Cloud Related Product Revenue Q to Q Growth Deep Security, Hosted Services, CPVM, IDF DeepSecurity/Hosted/CPVM/IDF M'JPY Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 DeepSecurity/Hosted/CPVM Copyright 2011 Trend Micro Inc. 3

4 Pillar #1: Cloud Infrastructure Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 4

5 Cloud Infrastructure Evolution Trend Micro s Server Security Strategy Also Moves Along With Evolution Physical Machine Virtual Machine Cloud Virtual Machine Agentless AV & IPS Virtual Patching Cloud Data Encryption Integrity Monitoring All Others 87% Trend Micro 13% Trend Micro 22.9% All Others 77.1% Source: 2011 Technavio Global Virtualization Security Management Solutions Source: Worldwide Endpoint Security Forecast and 2009 Vendor Shares, IDC Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 5 Deep Security Growth: Number of Orders

6 Unified Datacenter Security Platform Unified Datacenter Platform for Hybrid Cloud Security 8/10/2011 Copyright 2011 Trend Micro Inc. 6

7 Pillar #2: Cloud Devices/Endpoint Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 7

8 Strategy Built for Mobile Devices Capitalizing on Trend Micro s Strong Global Presence on Consumer and Commercial Endpoint Businesses to Increase Customer Lifetime Value Enterprise Consumer Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 8

9 Our Responses to Mobile Device and Endpoint Protection Embrace Consumerization! Reduce operational costs and the risk of compromised mobile devices Trend Micro Mobile Security (TMMS) A single point of visibility and control for device management and security More green, secure and faster Virus Buster 2012 Battery Consumption reduced System performance enhanced Secured social networking for Facebook, twitter, My Space & Mixi Year 2011 More intuitive, simplicity Trend Micro SafeSync Support more than 8 languages Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 9

10 Mobility Momentum Mobility momentum continues with Trend Micro Mobile Security 2.0 (end of Aug), we will be announcing several top handset and carrier partners in Japan and US Mobile Security has ~170,000 downloads Growth since Dec 2010: 568% Includes beta downloads in Japan Mobile Security sold to ~7,000 customers via US and UK retail Growth Q1 vs Q2: 128% Increasing number of SafeSync customers using mobile devices to access, share, upload files (30%) Growth Potential Not yet available in Asia (excluding Taiwan) Currently available for testing in Japan since May 2011, these figures are included in downloads and active installs Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 10

11 Commentary on Consumer 1H 2011 Outside of JP (March disaster), Consumer business is growing and taking share In particular, good growth in UK and France where a year ago, our market share was next to zero NA shows new customer growth (including S2) #1 position in Mac security Growth in upsell and cross-sell to new products and services - higher AOV Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 11

12 Growing Active User Base (Over all Consumer) 18,500 Active User Base 18,000 Unit: Thousand 17,500 17,000 16,500 Total 16,000 15, Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 12

13 Trend Micro: #1 in Mac Share in NA Market Share Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 13 Unit Share

14 Pillar #3: Cloud Data Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 14

15 Data is Everywhere Who is accessing your data from where using what? Public Cloud Desktop Virtualization Private Cloud? Server Virtualization Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 15

16 Smart Data Protection Strategy The Data Protection Must to be Context-aware!! Knowing who is accessing your data from where using what Context-aware Policy Management built into TMCM DP-SDK built into all layers of products/services Ease of DLP deployment Ease of Up-sell to Trend install base Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 16

17 Our Responses to Data-Centric Attack TiM + TDA Help customers more effectively combat APTs with new real-time threat management solutions: Threat Intelligence Manager Threat Discovery Appliance Prevent corporate data from leakage and abused OfficeScan 10.6 VirusBuster Corp Content and location aware Leakage channel control and alert Endpoint device control Year 2011 Prevent unauthorized access and data breeches Mobile Armor Endpoint Encryption Secures private data on mobile devices with full disk, file/ folder encryption and device control Provide visibility and control over gateway traffic InterScan Web Security Policy based actionable on 400+ Internet applications Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 17

18 Data Protection and Risk Management (Growing) DLP grew but driven by one large deal in Mexico Other than that DLP is suffering Japan is back in now, possible upside in 2H Encryption revenue = $1.3M so far against forecast of >$3M $10M runrate for the category TIM upside in 2H for mid-market; ENT not until 2012 Trend Micro Confidential8/10/2011 Copyright 2011 Trend Micro Inc. 18

19 Pillar #4: Cloud Application Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 19

20 Cloud Applications Strategy Building New Channel & Business Model in Cloud Era Cloud Service Providers (Application) (Platform) (Infrastructure) Corporate Customers Consumer Customers Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 20

21 Successful Projects Highlight NTT BizXaaS Office (OfficeSan) Salesforce.com Cloud CRM (DeepSecurity) SwissCom Cloud Infrasture (DeepSecurity) $$$ $$$ $$$ Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 21

22 Thank you! Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012 Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012 Agenda Consumerization What is it? What should I do? Mobile Security

More information

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web

More information

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi Combating APTs with the Custom Defense Solution Hans Liljedahl Peter Szendröi RSA Attack Overview : 1. Two spear phishing emails were sent over a two-day period targeted at low to mid- xls attachment with

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro 2 Customer Challenges 3 Most Attacks Include Phishing Emails 5 Advanced Malware Difficult to

More information

Security Readiness Assessment

Security Readiness Assessment Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Enterprise & Cloud Security

Enterprise & Cloud Security Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

New Content and Cloud Security Suites

New Content and Cloud Security Suites New Content and Cloud Security Suites Customer Business Problems & Pain Points Too many point products to manage for and email security. Need to lower costs, save time so considering SaaS for security

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why

More information

Don t Be the Next Data Loss Story

Don t Be the Next Data Loss Story Don t Be the Next Data Loss Story Titus: Blair Canavan McAfee: Chris Ellis Date The Importance of Data Protection McAfee DLP + TITUS Data Classification About McAfee Founded in 1987 as the world s largest

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Driving Business Outcomes: Cisco Data Center Innovation and Solutions

Driving Business Outcomes: Cisco Data Center Innovation and Solutions Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,

More information

Trend Micro Reports First Quarter Results

Trend Micro Reports First Quarter Results Trend Micro Reports First Quarter Results Net sales up 27% YoY and operating income rises 42% in 1Q2005 Tokyo, Japan April 21, 2005 Trend Micro, Inc. (TSE: 4704, NASDAQ: TMIC), a leader in network antivirus

More information

Availability in the Modern Datacenter

Availability in the Modern Datacenter Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending

More information

Cisco Cloud Application Centric Infrastructure

Cisco Cloud Application Centric Infrastructure Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified

More information

Here s a look at some of the latest technology trends and key offerings from providers.

Here s a look at some of the latest technology trends and key offerings from providers. 9 20 3 59 20 Tweet Like Share Share Enterprise networking is becoming increasingly complex these days. With several applications, including physical security, access control and surveillance moving to

More information

Cisco Meraki Cisco and/or its affiliates. All rights reserved.

Cisco Meraki Cisco and/or its affiliates. All rights reserved. Cisco Meraki 2014 Cisco and/or its affiliates. All rights reserved. Cisco Meraki Market Trends New Wireless Hardware New Wireless Software Timing and Availability Q&A 2014 Cisco and/or its affiliates.

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC The New Enterprise Network In The Era Of The Cloud Rohit Mehra Director, Enterprise Communications Infrastructure IDC Agenda 1. Dynamics of the Cloud Era 2. Market Landscape 3. Implications for the new

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong

More information

Cloud Computing Private Cloud

Cloud Computing Private Cloud Cloud Computing Private Cloud Amplifying Business Value thru IT Ivo Sladoljev, Territory Manager, Adriatic Region December, 2010. 2010 VMware Inc. All rights reserved Agenda Company Facts VMware Focus

More information

Encryption Vision & Strategy

Encryption Vision & Strategy Encryption Vision & Strategy Brad Zehring Principal Product Manager Encryption Vision & Strategy 1 Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased

More information

PEOPLE CENTRIC SECURITY THE NEW

PEOPLE CENTRIC SECURITY THE NEW PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS

More information

Data Protection Everywhere. For the modern data center

Data Protection Everywhere. For the modern data center Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright

More information

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

State of Cloud Adoption. Cloud usage is over 90%, are you ready? State of Cloud Adoption Cloud usage is over 90%, are you ready? State of Cloud Adoption Cloud hardware, software and services are capturing 60% of IT market growth, mostly in the public cloud space Trust

More information

Qualys Cloud Platform

Qualys Cloud Platform Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new

More information

Build a Software-Defined Network to Defend your Business

Build a Software-Defined Network to Defend your Business Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks

More information

Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager

Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager Threat Landscape vs Threat Management Thomas Ludvik Næss Country Manager Threat Landscape Past, Present and Future So it begins in the year of 1802 Joseph Marie Jacquard 3 Very first computer virus 1971

More information

Trend Micro Reports Record First Quarter Revenue & Operating Profit

Trend Micro Reports Record First Quarter Revenue & Operating Profit Trend Micro Reports Record First Quarter Revenue & Operating Profit Continued strong growth in U.S and Asia highlight quarter Tokyo, Japan April 25, 2006 Trend Micro, Incorporated (TSE: 4704, NASDAQ: TMIC),

More information

Next Generation Data Center : Future Trends and Technologies

Next Generation Data Center : Future Trends and Technologies Next Generation Data Center : Future Trends and Technologies November 18 th 2016 Rajender Singh Bhandari Director Technology and Solutions Group NetApp India 1 Agenda 1)About NetApp 2)Next Generation Data

More information

Evolutia pietei de IT

Evolutia pietei de IT Evolutia pietei de IT Laurentiu Popescu IDC Romania Covasna, 23 Martie 2013 Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Romanian Hardware Market Developments

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

Comprehensive Database Security

Comprehensive Database Security Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Renovating your storage infrastructure for Cloud era

Renovating your storage infrastructure for Cloud era Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches

More information

Service Provider Consulting

Service Provider Consulting From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected

More information

Changing IT Landscapes VIP Customer Day. Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer

Changing IT Landscapes VIP Customer Day. Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer Changing IT Landscapes VIP Customer Day Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer 1 BEFORE THE END OF THIS YEAR 2 there will be more mobile internet-connected devices than

More information

Business Strategy Theatre

Business Strategy Theatre Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:

More information

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads Kimmo Vesajoki, Country Manager Finland & Baltics Trend Micro EMEA Ltd. Copyright 2016 Trend Micro Inc. Cross-generational

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

Printing and Personal Systems

Printing and Personal Systems Printing and Personal Systems Todd Bradley Executive Vice President, PPS Our path Deliver value to stakeholders Cross-pollinate PSG operational leadership with IPG innovation Drive cost optimization (sales

More information

Data Protection Everywhere

Data Protection Everywhere Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support

More information

Are You Protected. Get Ahead of the Curve

Are You Protected. Get Ahead of the Curve Are You Protected Get Ahead of the Curve DEMOGRAPHICS INTERVIEWED 2,200 IT DECISION- MAKERS IN 3 REGIONS: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific Japan INDEPENDENT RESEARCH

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

Unified Communications Market Opportunity - EMEA. Andrew Wyatt Vice President Strategy - Broadsoft

Unified Communications Market Opportunity - EMEA. Andrew Wyatt Vice President Strategy - Broadsoft Unified Communications Market Opportunity - EMEA Andrew Wyatt Vice President Strategy - Broadsoft Evolution of Business Communications 2000 PBX Key Systems Centrex 2009 Mobile PBX Early UC Systems 2014

More information

Manage the Performance of SaaS and Cloud Hosted Applications

Manage the Performance of SaaS and Cloud Hosted Applications Manage the Performance of SaaS and Cloud Hosted Applications Corporate Identity Who are we? Where are we heading? 2 Who we are A WireData Analytics Provider (for NPM and APM) 13 years of cumulated experience

More information

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work? SMARTCRYPT PKWARE s Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO

INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO 21.12.2017 CONTENTS 1 2 3 4 SSH Background and Business SSH Strategic Direction renewed Marketing Update Questions and Answers 22 December

More information

Cyber Threat XChange: A New Approach to Managing Security

Cyber Threat XChange: A New Approach to Managing Security Cyber Threat XChange: A New Approach to Managing Security Cyber Threat XChange Kevin Charest, HCSC 2 2018 HITRUST Alliance The Evolving Threat Landscape 3 2018 Cysiv LLC. 3 2018 HITRUST Alliance Evolving

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility

SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility Control Any Data. Any Cloud. Anywhere. SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility Understanding SoftNAS Cloud SoftNAS, Inc. is the #1 software-defined

More information

Transforming your network for the digital economy

Transforming your network for the digital economy Transforming your network for the digital economy Ricky Chau, Vice President, Enterprise, CenturyLink Asia Pacific 15/11/2018 Services not available everywhere. 2 We re in an Era of Digital Transformation

More information

Thin Clients as Attractive Solutions for Cost Effective, Secure Endpoint Management

Thin Clients as Attractive Solutions for Cost Effective, Secure Endpoint Management IDC Topline Sponsored by: IGEL Author: Michael Ceroici May 2018 Thin Clients as Attractive Solutions for Cost Effective, Secure Endpoint Management Situation Overview Managing IT endpoint infrastructure

More information

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data Trend Micro Deep Discovery for Education Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data 1 Computers, the Internet, and portable devices are now

More information

MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE. Jonas Gyllenhammar NNTF 2012

MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE. Jonas Gyllenhammar NNTF 2012 MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE Jonas Gyllenhammar NNTF 2012 ALWAYS ON / ALWAYS MOBILE LIFE Proliferation of Devices, Applications and Content 2 Copyright 2012 Juniper Networks, Inc.

More information

Copyright 2015 EMC Corporation. All rights reserved. STRATEGIC FORUM PAT GELSINGER CEO, VMware

Copyright 2015 EMC Corporation. All rights reserved. STRATEGIC FORUM PAT GELSINGER CEO, VMware STRATEGIC FORUM 2015 PAT GELSINGER CEO, VMware Federation: VMware Perspective In a Period of Industry Tumult Being bigger and more strategic is good Customers Get Better Together Customers want choice

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

Emerging Trends of Micro Data Centers

Emerging Trends of Micro Data Centers Emerging Trends of Micro Data Centers Micro Modular Data Centers and the IoT The Internet of Things can be defined as an interconnected network of real-world physical objects capable of communicating without

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Investor Day 2018 Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Group Enterprise at a glance #1 International IPVPN in APeJ #1 EVPN and Eline in APeJ

More information

New Digital Business Models Driving the Softwarization of the Network

New Digital Business Models Driving the Softwarization of the Network New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

Service provider GTM strategy session: New revenue opportunities with Veeam

Service provider GTM strategy session: New revenue opportunities with Veeam Service provider GTM strategy session: New revenue opportunities with Veeam Jordan Jacobs Senior Director, Global Cloud Solutions Anthony Spiteri Global Technologist, Product Strategy Leah Troscianecki

More information

Constant Contact. Responsyssy. VerticalResponse. Bronto. Monitor. Satisfaction

Constant Contact. Responsyssy. VerticalResponse. Bronto. Monitor. Satisfaction Contenders Leaders Marketing Cloud sy Scale Campaign aign Monitor Niche High Performers Satisfaction Email Marketing Products Products shown on the Grid for Email Marketing have received a minimum of 10

More information

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017 A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security

More information

Windows Server 2012/R2 Overview

Windows Server 2012/R2 Overview END OF LICENSE Windows Server 2012/R2 Overview December 31 st, 2017 Agenda Understanding the opportunity Win with Windows Server 2016 Next steps Understanding the opportunity Windows Server 2012/R2 End

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Beyond a single cloud story Xavier Poisson Gouyou Beauchamps Vice President, Service Providers and March 13, 2018

Beyond a single cloud story Xavier Poisson Gouyou Beauchamps Vice President, Service Providers and March 13, 2018 Beyond a single cloud story Xavier Poisson Gouyou Beauchamps Vice President, Service Providers and Cloud28+ @CLOUDXP10 March 13, 2018 We live in a world where everything computes Technology embedded everywhere

More information

Investor Overview 2018

Investor Overview 2018 Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions

More information

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com

More information

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ

More information

A Single Cloud for Business Applications

A Single Cloud for Business Applications A Single Cloud for Business Applications Treb Ryan, Chief Strategy Officer 18 December 2013 Cloud Business Unit, Dimension Data Dimension Data today 2012 global revenues of US$5.8 billion Client-centric,

More information

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream

More information

Channel FAQ: Smartcrypt Appliances

Channel FAQ: Smartcrypt Appliances Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise

More information

SD-WAN 101. November 3 rd 2016 Rob McBride Marketing

SD-WAN 101. November 3 rd 2016 Rob McBride Marketing SD-WAN 101 November 3 rd 2016 Rob McBride Marketing Email: rob@viptela.com Twitter: @digitalmcb Industry trends impacting networking Cloud Mobile Social 2 Today s WAN is challenged to keep up Complex Operations

More information

Are you protected? Get ahead of the curve Global data protection index

Are you protected? Get ahead of the curve Global data protection index Are you protected? Get ahead of the curve Global data protection index 1 Demographics Interviewed 2,200 IT decision-makers In 3 regions: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific

More information

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of

More information

SD-WAN Solution How to Make the Best Choice for Your Business

SD-WAN Solution How to Make the Best Choice for Your Business HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What

More information

HPE Hyper Converged. Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia

HPE Hyper Converged. Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia HPE Hyper Converged Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia Transform to a hybrid infrastructure Accelerate the delivery of apps and services to

More information

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9. Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,

More information

IBM API Connect: Introduction to APIs, Microservices and IBM API Connect

IBM API Connect: Introduction to APIs, Microservices and IBM API Connect IBM API Connect: Introduction to APIs, Microservices and IBM API Connect Steve Lokam, Sr. Principal at OpenLogix @openlogix @stevelokam slokam@open-logix.com (248) 869-0083 What do these companies have

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014 Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2

More information

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization Cloud Computing: The Next Wave Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization The Starting Point For Me www.af.mil www.af.mil Source: www.cartoonstock.com 2 Possibilities

More information

Optimizing your network for the cloud-first world

Optimizing your network for the cloud-first world Optimizing your network for the cloud-first world Why performing cloud and network modernization together assures seamless, reliable user app delivery. Citrix.com ebook Align Cloud Strategy to Business

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

UNE APPROCHE CONVERGÉE AVEC LES SOLUTIONS VCE JEUDI 19 NOVEMBRE Olivier LE ROLLAND : varchitecte Manager, VCE France

UNE APPROCHE CONVERGÉE AVEC LES SOLUTIONS VCE JEUDI 19 NOVEMBRE Olivier LE ROLLAND : varchitecte Manager, VCE France UNE APPROCHE CONVERGÉE AVEC LES SOLUTIONS VCE JEUDI 19 NOVEMBRE 2015 Olivier LE ROLLAND : varchitecte Manager, VCE France VCE SUMMARY A HIGHLY SUCCESSFUL AND INNOVATIVE TECHNOLOGY COMPANY 2009: Joint venture

More information