STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO
|
|
- Cameron Dortha Wilkins
- 5 years ago
- Views:
Transcription
1 STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO
2 MEGATRENDS CONTINUE TO SUPPORT OUR STRATEGY REGULATION GEOPOLITICS CLOUDIFICATION CYBER ATTACKS Increasing demand for cyber security products and services DIGITALIZATION NEED FOR DETECTION AND RESPONSE NEED FOR AN INTEGRATED OFFERING NEED FOR OUTSOURCING 2
3 CORPORATE SECURITY IS DRIVING THE INDUSTRY Market size, USD billion B2B CAGR 10% MANAGED DETECTION AND RESPONSE 1) Fast growth ENDPOINT PROTECTION & EDR 2) Accelerating VULNERABILITY MANAGEMENT 2) Growth SECURITY CONSULTING 2) Growth BILLION 5.0 BILLION 0.9 BILLION 19.0 BILLION CONSUMER CAGR 4% CAGR % CAGR % CAGR % CAGR % Corporate security services Consumer security products Corporate security products Source: Gartner, Forecast: Information Security and Risk Management, Worldwide, , 3Q18 Sources: 1) CAGR https:// (November 2017) 2) CAGR Gartner, Forecast: Information Security and Risk Management, Worldwide, , 3Q18 (November 2017) 3
4 CORPORATE SECURITY IS NOW OUR LARGEST BUSINESS F-Secure revenue EUR million B2B CAGR +18% Corporate security became the largest contributor to revenue in Q Q3/2018* Corporate security Consumer security 4 * Including the acquisition of MWR InfoSecurity on 2 July 2018.
5 INCREASING SHARE OF OUR B2B SOLUTIONS ARE ADDRESSING FAST GROWTH MARKETS Endpoint protection Order Intake, % of total 100% 90% 80% 70% 60% 57% 50% 40% 39% New cyber security solutions 30% 20% 10% 0% 29% 18% 10% YTD Last 3M 5 * Includes cyber security services, detection and response solutions, vulnerability management solutions and other corporate solutions Endpoint protection (EPP) New cyber security solutions
6 OUR UNIQUE MIX OF SOLUTIONS PREDICT PREVENT DETECT & RESPOND Cyber security consulting Vulnerability management Anti-phishing behavioral management Endpoint protection Endpoint detection and response Managed Detection & Response Managed Threat Hunting Radar Phishd Protection Service for Business Rapid Detection & Response (EDR) Countercept (MDR)* 6 * Including RDS
7 EXAMPLE OF A MIDMARKET CUSTOMER OPPORTUNITIES FOR CROSS-SELL 5-7 x 2,5-4 x 1 x Endpoint protection (EPP) only Integrated suite with EDR (EPP, Vulnerability management, EDR) Integrated suite with MDR 7
8 WE HAVE UNIQUE VISIBILITY INTO REAL-LIFE ATTACKS IN ALL MARKETS Data from millions of endpoint worldwide World-renowned F-Secure Labs 24/7/365 Incident Response 8
9 OUR MAN & MACHINE APPROACH OFFERS UNIQUE COMPETITIVE ADVANTAGE Human orchestration ADVANCED THREATS MASS ATTACKS Detection & response technology Prevention technology Human skills and services Technology drives the scale Volume of attacks 9
10 EMERGING NEW SOLUTIONS ARE DRIVING GROWTH IN THE CONSUMER SECURITY MARKET USD million CAGR +4% VPN & Privacy Connected Home Security Multi-device Security Password Management Source: Gartner, Forecast: Information Security and Risk Management, Worldwide, , 3Q18 10
11 STRENGTHS OF F-SECURE S CONSUMER SECURITY BUSINESS EFFICIENT GO-TO- MARKET GLOBALLY NEW MARKET OPPORTUNITIES CROSS-SELL AND UPSELL OPPORTUNITIES IMPROVING BUSINESS METRICS Global market leader in proving security via around 200 operators A front runner digital home security solutions Complete security & privacy offering addressing consumers needs Strong and sustainable business model (AARPU, activations, renewals) 11
12 WE ARE ON THE RIGHT TRACK FOCUS AREAS Enterprise-grade cyber security Market leadership in advanced detection and response solutions Increase share of wallet by cross-selling and upselling with the integrated cyber security suite Continued growth and excellence in cyber security consulting Addressing new opportunities in consumer security 12
F-SECURE FOR 30 YEARS FRONTRUNNER IN CYBER SECURITY. Samu Konttinen, CEO, F-Secure
F-SECURE FRONTRUNNER IN CYBER SECURITY FOR 30 YEARS Samu Konttinen, CEO, F-Secure 1 F-SECURE IN A NUTSHELL Award-winning cyber security products & worldclass cyber security services Revenue by region 12
More informationSamu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure
Samu Konttinen, CEO, F-Secure WE ARE F-SECURE 1 F-SECURE A FRONT RUNNER IN CYBER SECURITY We are the largest European single source of cyber security services and detection and response solutions for companies,
More informationACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018
ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationA STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017
A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security
More informationJens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY
Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY IMPROVED SECURITY FOR THE MID-MARKET 1 SYNERGIES ACROSS SEGMENTS Privacy Family Connected home
More informationInterim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR
Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN
More informationWELCOME TO F-SECURE S ANNUAL GENERAL MEETING
WELCOME TO F-SECURE S ANNUAL GENERAL MEETING 1 MATTERS ON THE AGENDA 1. Opening of the meeting 2. Calling the meeting to order 3. Election of persons to scrutinize the minutes and to supervise the counting
More informationCONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President
CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationInvestor Overview 2018
Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions
More information2018 Cyber Security Predictions
2018 Cyber Security Predictions Rampa Manoonsin Country Manager, Thailand Symantec At a Glance 175M endpoints under protection $5B+ FY18E revenue 2100+ patents Leader in 4 Gartner MQs SWG, EPP, DLP and
More informationA Simple Guide to Understanding EDR
2018. 08. 22 A Simple Guide to Understanding EDR Proposition for Adopting Next-generation Endpoint Security Technology 220, Pangyoyeok-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, South Korea Tel: +82-31-722-8000
More informationSTRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015
CONSUMER SECURITY STRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015 1 AGENDA Consumer Security in brief Market overview and key trends Offering and channels Competition
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationFrom Managed Security Services to the next evolution of CyberSoc Services
From Managed Security Services to the next evolution of CyberSoc Services Gianluca Busco Arré Country Manager pandasecurity.com MSSP / MDR Where the Industry is going leaders and laggers MSSP industry
More informationaccelerate your ambition Chris Jenkins
accelerate your ambition Chris Jenkins Changing landscape of the Security Industry Chris Jenkins European GM Security Dimension Data Business relationships Geographic footprint Revenue USD 700+m 1 NTT
More informationFINANCIAL STATEMENT RELEASE 1 JANUARY 31 DECEMBER 2018 BUSINESS IN STRATEGIC GROWTH AREAS PERFORMED WELL CORPORATE SECURITY UP BY 48% IN Q4
FINANCIAL STATEMENT RELEASE 1 JANUARY 31 DECEMBER BUSINESS IN STRATEGIC GROWTH AREAS PERFORMED WELL CORPORATE SECURITY UP BY 48% IN Q4 02 F-SECURE FINANCIAL STATEMENT RELEASE 1 JAN 31 DEC HIGHLIGHTS OF
More informationInnovation Infrastructure Partnership
Innovation Infrastructure Partnership Vision The Innovation Infrastructure Partnership s vision is to support the creation, adoption and commercialisation of new technologies, helping UK companies to gain
More informationLeading in the Data-Driven World
Leading in the Data-Driven World George Kurian Chief Executive Officer Agenda 1) Industry Context 2) Our Market Opportunity 3) Transforming to Lead Industry Context The world is changing fundamentally
More informationKaspersky Security. The Power to Protect Your Organization
Kaspersky Security SOLUTIONS The Power to Protect Your Organization We believe that every organization from the smallest business to the largest corporation or government body should feel empowered to
More informationPRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources
PRODUCT OVERVIEW On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources What is a Threat Hunting service? ESET Threat Hunting service
More informationSingtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018
Singtel Investor Day 2018 Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Group Enterprise at a glance #1 International IPVPN in APeJ #1 EVPN and Eline in APeJ
More information2017 Global Endpoint Security Growth Excellence Leadership Award
2017 Global Endpoint Security Growth Excellence Leadership Award Contents Background and Company Performance... 3 Industry Challenges... 3 Growth Performance and Customer Impact... 4 Conclusion... 7 Significance
More informationINVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO
INVESTOR UPDATE SSH COMMUNICATIONS SECURITY Kaisa Olkkonen, CEO 21.12.2017 CONTENTS 1 2 3 4 SSH Background and Business SSH Strategic Direction renewed Marketing Update Questions and Answers 22 December
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationPartner Program Overview PARTNER PROGRAM
Partner Program Overview Endpoint Security Market will be worth $17.38 Billion* USD by 2020. Do you want a piece of this large, addressable market? SentinelOne has awarded and certified: Top five reasons
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationKristian Järnefelt, EVP, Consumer Cyber Security CONSUMER SECURITY
Kristian Järnefelt, EVP, Consumer Cyber Security CONSUMER SECURITY PROFITABLE GROWTH SYNERGIES ACROSS SEGMENTS Privacy Family Connected home CONSUMERS SECURITY NEEDS ARE GETTING BROADER PRIVACY FAMILY
More informationANNUAL REPORT 2017 A FRONT RUNNER IN CYBER SECURITY FOR 30 YEARS
ANNUAL REPORT 2017 A FRONT RUNNER IN CYBER SECURITY FOR 30 YEARS Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationSTAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response
STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationBREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response
BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone of cyber security,
More informationSOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)
SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.
More informationMay the (IBM) X-Force Be With You
Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security
More informationTech Data s Acquisition of Avnet Technology Solutions
Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe
More informationin PCI Regulated Environments
in PCI Regulated Environments JULY, 2018 PCI COMPLIANCE If your business accepts payments via credit, debit, or pre-paid cards, you are required to comply with the security requirements of the Payment
More informationWindows 10 IoT Overview. Microsoft Corporation
Windows 10 IoT Overview Microsoft Corporation 25 $7.2 BILLION TRILLION Connected things will by 2020 be in use by 2020 worldwide market for IoT solutions IDC: Worldwide and Regional Internet of Things
More informationSECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE
SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:
More informationCERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University
CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationThe Deloitte-NASCIO Cybersecurity Study Insights from
The Deloitte-NASCIO Cybersecurity Study Insights from 2010-2016 August 21, 2018 Srini Subramanian State Government Sector Leader Deloitte Erik Avakian CISO Pennsylvania Michael Roling CISO Missouri Meredith
More informationCountry Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.
North America Country Focus: USA Key facts GDP $19.5 +2.2% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure 3% of GDP Annually TIC Services $43 Billion GDP Growth Services
More informationA C H I E V E B O T H W I T H K E Y S I G H T. Company Profile
A C H I E V E B O T H W I T H K E Y S I G H T 1 W E H E L P Y O U C R E AT E. I N N O VAT E. A N D D E L I V E R W H AT S N E X T. The innovation leader in electronic design and test for over 75 years
More informationA Data-Centric Approach to Endpoint Security
A Data-Centric Approach to Endpoint Security September 28, 2017 Eric Ogren Senior Analyst, Security 451 Research Bill Bradley Director of Product Marketing Digital Guardian About Eric Ogren Eric Ogren
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationSECURING THE CONNECTED ENTERPRISE.
SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationSGS CYBER SECURITY GROWTH OPPORTUNITIES
SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER
More informationSymantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010
Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationAcquisition of SIMCom Wireless
Acquisition of SIMCom Wireless Investor presentation January 20, 2017 locate, communicate, accelerate Disclaimer This presentation contains certain forward-looking statements. Such forward-looking statements
More informationGrowth Leadership, Unified Threat Management (UTM) Global, 2010
Growth Leadership, Unified Threat Management (UTM) Global, 2010 Frost & Sullivan s Global Research Platform Frost & Sullivan is entering its 49 th year in business with a global research organization of
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More informationREINVENTING CYBERSECURITY.
REINVENTING CYBERSECURITY www.pandasecurity.com 28 Years of Innovation Over the course of its 28 years, Panda has marked some of the most important advances in the world of cybersecurity. 2018 Visionaries
More informationF-Secure Corporation - Interim report Q2 2011
F-Secure Corporation - Interim report Q2 2011 (Unaudited) July 27, 2011 Kimmo Alkio, President & CEO Protecting the irreplaceable f-secure.com Q2 highlights Operator channel performed strongly showing
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationWHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale
WHITE PAPER Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale One key number that is generally
More informationSocial Engineering: We are the target Sponsor Guide
Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationHow to Create, Deploy, & Operate Secure IoT Applications
How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections
More informationCELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS
analysysmason.com RESEARCH FORECAST REPORT CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 About this report This report
More informationEFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave
EFFECTIVELY TARGETING ADVANCED THREATS Terry Sangha Sales Engineer at Trustwave THE CHALLENGE PROTECTING YOUR ENVIRONMENT IS NOT GETTING EASIER ENDPOINT POINT OF SALE MOBILE VULNERABILITY MANAGEMENT CYBER
More informationJason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV. Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES
corporate overview the challenge Organizations are spending billions of dollars a year on security products, however recent security breaches have proven that the traditional security solutions are not
More informationEvolving Corporate Networks and the Business Case for SD-WAN
Evolving Corporate Networks and the Business Case for SD-WAN Until recently, corporate networking has been a fairly stable component of enterprise IT. Its return to prominence goes hand-in-hand with changes
More informationData Loss Prevention - Global Market Outlook ( )
Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report
More informationA STRONG FOURTH QUARTER CONCLUDED A SOLID YEAR Accelerating investments in corporate security in 2017
FINANCIAL STATEMENT RELEASE 1 JANUARY 31 DECEMBER A STRONG FOURTH QUARTER CONCLUDED A SOLID YEAR Accelerating investments in corporate security in 2017 F-SECURE FINANCIAL STATEMENT RELEASE 1 JAN 31 DEC
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationF-SECURE ACQUIRED MWR INFOSECURITY TO ACCELERATE CORPORATE SECURITY GROWTH
F-SECURE HALF YEAR REPORT 1 JANUARY 30 JUNE 2018 F-SECURE ACQUIRED MWR INFOSECURITY TO ACCELERATE CORPORATE SECURITY GROWTH CORPORATE SECURITY REVENUE INCREASED BY 8% IN Q2 02 HIGHLIGHTS OF APRIL JUNE
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More informationAccelera'ng Our Path Forward. Stephen Gille8
Accelera'ng Our Path Forward Stephen Gille8 Two Independent Companies with Strong Market Posi'ons $6.7Billion Revenues 1 IM 38% Norton 31% SYMANTEC SECURITY ES 31% INFORMATION MANAGEMENT $4.2 billion Revenue
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationService Provider VPN Market Disruption in the LATAM Market
Service Provider VPN Market Disruption in the LATAM Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become increasingly critical
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationARM Holdings plc Morgan Stanley 7 th Annual TMT Conference 14 November Warren East Chief Executive Officer
ARM Holdings plc Morgan Stanley 7 th Annual TMT Conference 14 November 2007 Warren East Chief Executive Officer 1 Background Semiconductor Market ARM is a secular growth story with a 25+ year time horizon
More informationService Provider VPN Market Disruption in the Central and Eastern European Market
Service Provider VPN Market Disruption in the Central and Eastern European Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become
More informationin Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM
Delivering the digital enterprise The five stages of infrastructure evolution Ralf Salzmann Human Centric Innovation in Action Manager OEM Sales @Brocade Agenda BRCD Company details What does digital mean
More informationMATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services
MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services THE NEED FOR MATURE CYBER DEFENSE CAPABILITIES The average annual cost of cyber crime reached $11.7 million per organization
More informationPrinting and Personal Systems
Printing and Personal Systems Todd Bradley Executive Vice President, PPS Our path Deliver value to stakeholders Cross-pollinate PSG operational leadership with IPG innovation Drive cost optimization (sales
More informationPowering Resilience. Keep your business on 24/7. Proposition series September 2017
Powering Resilience Keep your business on 24/7 Proposition series September 2017 Centrica Business Solutions Powering Resilience Reliable power is mission-critical As more businesses become digital, the
More informationCybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY
Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security
More informationThe Evolution of : Continuous Advanced Threat Protection
The Evolution of : Continuous Advanced Threat Protection Craig Bird Senior Solutions Engineer Security is a combination of protection, detection and response You need Prevention to defend against low-focus
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationCLOUD ORCHESTRATION. A global trend in the context of digital transformation
CLOUD ORCHESTRATION A global trend in the context of digital transformation In American pop culture an orchestra is described as a creature and the conductor as the dragon tamer. It s an apt analogy for
More informationISE Cyber Security UCITS Index (HUR)
ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,
More informationSymantec Investor Presentation March Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION
Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION Our results of operations have undergone significant change due to the impact of litigation accruals, stock-based compensation, restructuring,
More informationGlobal Anti-counterfeit Market Size, Status and Forecast 2025
Report Information More information from: https://www.wiseguyreports.com/reports/3322889-global-anti-counterfeit-market-size-status-andforecast-2025 Global Anti-counterfeit Market Size, Status and Forecast
More informationMicro Focus Partner Program. For Resellers
Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert
More informationhird Q uarter R eport
hird Quarter Report Safe Harbor Statement This presentation contains forward looking statements. Such statements are based on our current expectations and are subject to certain risks and uncertainties
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationPolicy Session 4 Identifying Risk: An abundance of Potential Shock Waves
Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017
More informationWe are Digital Transformakers
We are Digital Transformakers We make clear choices, to Digital @scale Agility & proximity Cloud platform ecosystem A new generation of CIO++ Be SMACS Experts Stay Multi Local Grow next to Global Digital
More informationPEOPLE CENTRIC SECURITY THE NEW
PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS
More informationSOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines
SOFTWARE as a Service PLATFORM as a Service INFRASTRUCTURE as a Service Empower Users Develop Apps Manage Machines 2013 2009 $2.9B $5.7B $6.9B $13.3B $14.0B $17.6B By 2014, cloud computing services will
More informationCYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION
SELF-AUDIT GUIDE CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION A Primer for Moving Beyond AV and Firewalls 1 The Problem As software systems become more distributed and interactive
More informationThe Transformation in Security How RSA is responding to the Changing Threat Landscape
The Transformation in Security How RSA is responding to the Changing Threat Landscape Dr. Robert Griffin Chief Security Architect RSA, the Security Division of EMC 1 Agenda The changing threat landscape
More informationFOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES
FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES TABLE OF CONTENTS 1 INTRODUCTION NETWORK AND ENDPOINT SECURITY INTEGRATION 2 SECTION 1 RISK-BASED VISIBILITY 3 SECTION 2 CONTROL
More information