Securing Your Journey to the Cloud. CEO Eva Chen
|
|
- Homer Hines
- 5 years ago
- Views:
Transcription
1 Securing Your Journey to the Cloud CEO Eva Chen Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 1
2 Building Cloud Security Strategy Around IT 4 Pillars Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 2
3 Cloud Related Product Revenue Q to Q Growth Deep Security, Hosted Services, CPVM, IDF DeepSecurity/Hosted/CPVM/IDF M'JPY Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 DeepSecurity/Hosted/CPVM Copyright 2011 Trend Micro Inc. 3
4 Pillar #1: Cloud Infrastructure Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 4
5 Cloud Infrastructure Evolution Trend Micro s Server Security Strategy Also Moves Along With Evolution Physical Machine Virtual Machine Cloud Virtual Machine Agentless AV & IPS Virtual Patching Cloud Data Encryption Integrity Monitoring All Others 87% Trend Micro 13% Trend Micro 22.9% All Others 77.1% Source: 2011 Technavio Global Virtualization Security Management Solutions Source: Worldwide Endpoint Security Forecast and 2009 Vendor Shares, IDC Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 5 Deep Security Growth: Number of Orders
6 Unified Datacenter Security Platform Unified Datacenter Platform for Hybrid Cloud Security 8/10/2011 Copyright 2011 Trend Micro Inc. 6
7 Pillar #2: Cloud Devices/Endpoint Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 7
8 Strategy Built for Mobile Devices Capitalizing on Trend Micro s Strong Global Presence on Consumer and Commercial Endpoint Businesses to Increase Customer Lifetime Value Enterprise Consumer Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 8
9 Our Responses to Mobile Device and Endpoint Protection Embrace Consumerization! Reduce operational costs and the risk of compromised mobile devices Trend Micro Mobile Security (TMMS) A single point of visibility and control for device management and security More green, secure and faster Virus Buster 2012 Battery Consumption reduced System performance enhanced Secured social networking for Facebook, twitter, My Space & Mixi Year 2011 More intuitive, simplicity Trend Micro SafeSync Support more than 8 languages Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 9
10 Mobility Momentum Mobility momentum continues with Trend Micro Mobile Security 2.0 (end of Aug), we will be announcing several top handset and carrier partners in Japan and US Mobile Security has ~170,000 downloads Growth since Dec 2010: 568% Includes beta downloads in Japan Mobile Security sold to ~7,000 customers via US and UK retail Growth Q1 vs Q2: 128% Increasing number of SafeSync customers using mobile devices to access, share, upload files (30%) Growth Potential Not yet available in Asia (excluding Taiwan) Currently available for testing in Japan since May 2011, these figures are included in downloads and active installs Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 10
11 Commentary on Consumer 1H 2011 Outside of JP (March disaster), Consumer business is growing and taking share In particular, good growth in UK and France where a year ago, our market share was next to zero NA shows new customer growth (including S2) #1 position in Mac security Growth in upsell and cross-sell to new products and services - higher AOV Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 11
12 Growing Active User Base (Over all Consumer) 18,500 Active User Base 18,000 Unit: Thousand 17,500 17,000 16,500 Total 16,000 15, Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 12
13 Trend Micro: #1 in Mac Share in NA Market Share Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 13 Unit Share
14 Pillar #3: Cloud Data Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 14
15 Data is Everywhere Who is accessing your data from where using what? Public Cloud Desktop Virtualization Private Cloud? Server Virtualization Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 15
16 Smart Data Protection Strategy The Data Protection Must to be Context-aware!! Knowing who is accessing your data from where using what Context-aware Policy Management built into TMCM DP-SDK built into all layers of products/services Ease of DLP deployment Ease of Up-sell to Trend install base Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 16
17 Our Responses to Data-Centric Attack TiM + TDA Help customers more effectively combat APTs with new real-time threat management solutions: Threat Intelligence Manager Threat Discovery Appliance Prevent corporate data from leakage and abused OfficeScan 10.6 VirusBuster Corp Content and location aware Leakage channel control and alert Endpoint device control Year 2011 Prevent unauthorized access and data breeches Mobile Armor Endpoint Encryption Secures private data on mobile devices with full disk, file/ folder encryption and device control Provide visibility and control over gateway traffic InterScan Web Security Policy based actionable on 400+ Internet applications Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 17
18 Data Protection and Risk Management (Growing) DLP grew but driven by one large deal in Mexico Other than that DLP is suffering Japan is back in now, possible upside in 2H Encryption revenue = $1.3M so far against forecast of >$3M $10M runrate for the category TIM upside in 2H for mid-market; ENT not until 2012 Trend Micro Confidential8/10/2011 Copyright 2011 Trend Micro Inc. 18
19 Pillar #4: Cloud Application Virtualization & Network Mobile & Endpoint Cloud Infrastructure Cloud Devices Hybrid Cloud Management Physical Virtual Cloud Mobile Data, Cloud Storage Social Network & SaaS Cloud Data Cloud Application Copyright 2011 Trend Micro Inc. 19
20 Cloud Applications Strategy Building New Channel & Business Model in Cloud Era Cloud Service Providers (Application) (Platform) (Infrastructure) Corporate Customers Consumer Customers Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 20
21 Successful Projects Highlight NTT BizXaaS Office (OfficeSan) Salesforce.com Cloud CRM (DeepSecurity) SwissCom Cloud Infrasture (DeepSecurity) $$$ $$$ $$$ Classification 8/10/2011 Copyright 2011 Trend Micro Inc. 21
22 Thank you! Copyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationTrend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012
Trend Micro Guide and solution to help embrace Consumerization and BYOD James Walker EMEA Product Marketing Manager 26 September 2012 Agenda Consumerization What is it? What should I do? Mobile Security
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationCombating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi
Combating APTs with the Custom Defense Solution Hans Liljedahl Peter Szendröi RSA Attack Overview : 1. Two spear phishing emails were sent over a two-day period targeted at low to mid- xls attachment with
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationProteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro
Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro 2 Customer Challenges 3 Most Attacks Include Phishing Emails 5 Advanced Malware Difficult to
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationNew Content and Cloud Security Suites
New Content and Cloud Security Suites Customer Business Problems & Pain Points Too many point products to manage for and email security. Need to lower costs, save time so considering SaaS for security
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationDon t Be the Next Data Loss Story
Don t Be the Next Data Loss Story Titus: Blair Canavan McAfee: Chris Ellis Date The Importance of Data Protection McAfee DLP + TITUS Data Classification About McAfee Founded in 1987 as the world s largest
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationDriving Business Outcomes: Cisco Data Center Innovation and Solutions
Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,
More informationTrend Micro Reports First Quarter Results
Trend Micro Reports First Quarter Results Net sales up 27% YoY and operating income rises 42% in 1Q2005 Tokyo, Japan April 21, 2005 Trend Micro, Inc. (TSE: 4704, NASDAQ: TMIC), a leader in network antivirus
More informationAvailability in the Modern Datacenter
Availability in the Modern Datacenter Adriana Rangel SIS Research Director IDC Middle East, Turkey & Africa IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 US$ Mn Middle East IT Market Spending
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationHere s a look at some of the latest technology trends and key offerings from providers.
9 20 3 59 20 Tweet Like Share Share Enterprise networking is becoming increasingly complex these days. With several applications, including physical security, access control and surveillance moving to
More informationCisco Meraki Cisco and/or its affiliates. All rights reserved.
Cisco Meraki 2014 Cisco and/or its affiliates. All rights reserved. Cisco Meraki Market Trends New Wireless Hardware New Wireless Software Timing and Availability Q&A 2014 Cisco and/or its affiliates.
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationThe New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC
The New Enterprise Network In The Era Of The Cloud Rohit Mehra Director, Enterprise Communications Infrastructure IDC Agenda 1. Dynamics of the Cloud Era 2. Market Landscape 3. Implications for the new
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationCloud Computing Private Cloud
Cloud Computing Private Cloud Amplifying Business Value thru IT Ivo Sladoljev, Territory Manager, Adriatic Region December, 2010. 2010 VMware Inc. All rights reserved Agenda Company Facts VMware Focus
More informationEncryption Vision & Strategy
Encryption Vision & Strategy Brad Zehring Principal Product Manager Encryption Vision & Strategy 1 Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased
More informationPEOPLE CENTRIC SECURITY THE NEW
PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS
More informationData Protection Everywhere. For the modern data center
Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright
More informationState of Cloud Adoption. Cloud usage is over 90%, are you ready?
State of Cloud Adoption Cloud usage is over 90%, are you ready? State of Cloud Adoption Cloud hardware, software and services are capturing 60% of IT market growth, mostly in the public cloud space Trust
More informationQualys Cloud Platform
Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationThreat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager
Threat Landscape vs Threat Management Thomas Ludvik Næss Country Manager Threat Landscape Past, Present and Future So it begins in the year of 1802 Joseph Marie Jacquard 3 Very first computer virus 1971
More informationTrend Micro Reports Record First Quarter Revenue & Operating Profit
Trend Micro Reports Record First Quarter Revenue & Operating Profit Continued strong growth in U.S and Asia highlight quarter Tokyo, Japan April 25, 2006 Trend Micro, Incorporated (TSE: 4704, NASDAQ: TMIC),
More informationNext Generation Data Center : Future Trends and Technologies
Next Generation Data Center : Future Trends and Technologies November 18 th 2016 Rajender Singh Bhandari Director Technology and Solutions Group NetApp India 1 Agenda 1)About NetApp 2)Next Generation Data
More informationEvolutia pietei de IT
Evolutia pietei de IT Laurentiu Popescu IDC Romania Covasna, 23 Martie 2013 Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Romanian Hardware Market Developments
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationRenovating your storage infrastructure for Cloud era
Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationChanging IT Landscapes VIP Customer Day. Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer
Changing IT Landscapes VIP Customer Day Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer 1 BEFORE THE END OF THIS YEAR 2 there will be more mobile internet-connected devices than
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationSeamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads
Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads Kimmo Vesajoki, Country Manager Finland & Baltics Trend Micro EMEA Ltd. Copyright 2016 Trend Micro Inc. Cross-generational
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationPrinting and Personal Systems
Printing and Personal Systems Todd Bradley Executive Vice President, PPS Our path Deliver value to stakeholders Cross-pollinate PSG operational leadership with IPG innovation Drive cost optimization (sales
More informationData Protection Everywhere
Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support
More informationAre You Protected. Get Ahead of the Curve
Are You Protected Get Ahead of the Curve DEMOGRAPHICS INTERVIEWED 2,200 IT DECISION- MAKERS IN 3 REGIONS: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific Japan INDEPENDENT RESEARCH
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationUnified Communications Market Opportunity - EMEA. Andrew Wyatt Vice President Strategy - Broadsoft
Unified Communications Market Opportunity - EMEA Andrew Wyatt Vice President Strategy - Broadsoft Evolution of Business Communications 2000 PBX Key Systems Centrex 2009 Mobile PBX Early UC Systems 2014
More informationManage the Performance of SaaS and Cloud Hosted Applications
Manage the Performance of SaaS and Cloud Hosted Applications Corporate Identity Who are we? Where are we heading? 2 Who we are A WireData Analytics Provider (for NPM and APM) 13 years of cumulated experience
More informationSMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?
SMARTCRYPT PKWARE s Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationINVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO
INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO 21.12.2017 CONTENTS 1 2 3 4 SSH Background and Business SSH Strategic Direction renewed Marketing Update Questions and Answers 22 December
More informationCyber Threat XChange: A New Approach to Managing Security
Cyber Threat XChange: A New Approach to Managing Security Cyber Threat XChange Kevin Charest, HCSC 2 2018 HITRUST Alliance The Evolving Threat Landscape 3 2018 Cysiv LLC. 3 2018 HITRUST Alliance Evolving
More informationData Loss Prevention - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report
More informationSoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility
Control Any Data. Any Cloud. Anywhere. SoftNAS Cloud Data Management Products for AWS Add Breakthrough NAS Performance, Protection, Flexibility Understanding SoftNAS Cloud SoftNAS, Inc. is the #1 software-defined
More informationTransforming your network for the digital economy
Transforming your network for the digital economy Ricky Chau, Vice President, Enterprise, CenturyLink Asia Pacific 15/11/2018 Services not available everywhere. 2 We re in an Era of Digital Transformation
More informationThin Clients as Attractive Solutions for Cost Effective, Secure Endpoint Management
IDC Topline Sponsored by: IGEL Author: Michael Ceroici May 2018 Thin Clients as Attractive Solutions for Cost Effective, Secure Endpoint Management Situation Overview Managing IT endpoint infrastructure
More informationTrend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data
Trend Micro Deep Discovery for Education Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data 1 Computers, the Internet, and portable devices are now
More informationMOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE. Jonas Gyllenhammar NNTF 2012
MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE Jonas Gyllenhammar NNTF 2012 ALWAYS ON / ALWAYS MOBILE LIFE Proliferation of Devices, Applications and Content 2 Copyright 2012 Juniper Networks, Inc.
More informationCopyright 2015 EMC Corporation. All rights reserved. STRATEGIC FORUM PAT GELSINGER CEO, VMware
STRATEGIC FORUM 2015 PAT GELSINGER CEO, VMware Federation: VMware Perspective In a Period of Industry Tumult Being bigger and more strategic is good Customers Get Better Together Customers want choice
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationEmerging Trends of Micro Data Centers
Emerging Trends of Micro Data Centers Micro Modular Data Centers and the IoT The Internet of Things can be defined as an interconnected network of real-world physical objects capable of communicating without
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationSingtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018
Singtel Investor Day 2018 Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Group Enterprise at a glance #1 International IPVPN in APeJ #1 EVPN and Eline in APeJ
More informationNew Digital Business Models Driving the Softwarization of the Network
New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationService provider GTM strategy session: New revenue opportunities with Veeam
Service provider GTM strategy session: New revenue opportunities with Veeam Jordan Jacobs Senior Director, Global Cloud Solutions Anthony Spiteri Global Technologist, Product Strategy Leah Troscianecki
More informationConstant Contact. Responsyssy. VerticalResponse. Bronto. Monitor. Satisfaction
Contenders Leaders Marketing Cloud sy Scale Campaign aign Monitor Niche High Performers Satisfaction Email Marketing Products Products shown on the Grid for Email Marketing have received a minimum of 10
More informationA STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017
A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security
More informationWindows Server 2012/R2 Overview
END OF LICENSE Windows Server 2012/R2 Overview December 31 st, 2017 Agenda Understanding the opportunity Win with Windows Server 2016 Next steps Understanding the opportunity Windows Server 2012/R2 End
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationBeyond a single cloud story Xavier Poisson Gouyou Beauchamps Vice President, Service Providers and March 13, 2018
Beyond a single cloud story Xavier Poisson Gouyou Beauchamps Vice President, Service Providers and Cloud28+ @CLOUDXP10 March 13, 2018 We live in a world where everything computes Technology embedded everywhere
More informationInvestor Overview 2018
Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationA Single Cloud for Business Applications
A Single Cloud for Business Applications Treb Ryan, Chief Strategy Officer 18 December 2013 Cloud Business Unit, Dimension Data Dimension Data today 2012 global revenues of US$5.8 billion Client-centric,
More informationRet h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s
I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream
More informationChannel FAQ: Smartcrypt Appliances
Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise
More informationSD-WAN 101. November 3 rd 2016 Rob McBride Marketing
SD-WAN 101 November 3 rd 2016 Rob McBride Marketing Email: rob@viptela.com Twitter: @digitalmcb Industry trends impacting networking Cloud Mobile Social 2 Today s WAN is challenged to keep up Complex Operations
More informationAre you protected? Get ahead of the curve Global data protection index
Are you protected? Get ahead of the curve Global data protection index 1 Demographics Interviewed 2,200 IT decision-makers In 3 regions: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationHPE Hyper Converged. Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia
HPE Hyper Converged Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia Transform to a hybrid infrastructure Accelerate the delivery of apps and services to
More informationAby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.
Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,
More informationIBM API Connect: Introduction to APIs, Microservices and IBM API Connect
IBM API Connect: Introduction to APIs, Microservices and IBM API Connect Steve Lokam, Sr. Principal at OpenLogix @openlogix @stevelokam slokam@open-logix.com (248) 869-0083 What do these companies have
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationHow unified backup and cloud enable your digital transformation success
Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation
More informationEnabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014
Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2
More informationCloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization
Cloud Computing: The Next Wave Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization The Starting Point For Me www.af.mil www.af.mil Source: www.cartoonstock.com 2 Possibilities
More informationOptimizing your network for the cloud-first world
Optimizing your network for the cloud-first world Why performing cloud and network modernization together assures seamless, reliable user app delivery. Citrix.com ebook Align Cloud Strategy to Business
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationUNE APPROCHE CONVERGÉE AVEC LES SOLUTIONS VCE JEUDI 19 NOVEMBRE Olivier LE ROLLAND : varchitecte Manager, VCE France
UNE APPROCHE CONVERGÉE AVEC LES SOLUTIONS VCE JEUDI 19 NOVEMBRE 2015 Olivier LE ROLLAND : varchitecte Manager, VCE France VCE SUMMARY A HIGHLY SUCCESSFUL AND INNOVATIVE TECHNOLOGY COMPANY 2009: Joint venture
More information