Symantec Investor Presentation March Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION

Size: px
Start display at page:

Download "Symantec Investor Presentation March Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION"

Transcription

1 Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION Our results of operations have undergone significant change due to the impact of litigation accruals, stock-based compensation, restructuring, transition and separation matters, charges related to the amortization of intangible assets, and certain other income and expense items that management considers unrelated to the Company s core operations. To help our readers understand our past financial performance and our future results, we supplement the financial results that we provide in accordance with generally accepted accounting principles, or GAAP, with non-gaap financial measures. The method we use to produce non-gaap results is not computed according to GAAP and may differ from the methods used by other companies. Non-GAAP financial measures are supplemental, should not be considered a substitute for financial information presented in accordance with GAAP and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. Our management team uses these non-gaap financial measures in assessing the Company s operating results, as well as when planning, forecasting and analyzing future periods. Investors are encouraged to review the reconciliation of our non-gaap financial measures to the comparable GAAP results, which is attached to our quarterly earnings release and which can be found, along with other financial information, on the investor relations page of our website at: 2 1

2 FORWARD LOOKING STATEMENTS This presentation contains statements which may be considered forward-looking within the meaning of the U.S. federal securities laws, including statements regarding the use of proceeds from the sale of Veritas, including statements regarding the capital allocation program, including the ASR and special dividend; statements regarding the strategic investment of Silver Lake Partners; statements regarding the growth prospects of our security business; and statements with respect to our continuation of our current dividend. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, performance or achievements to differ materially from results expressed or implied in this press release. Such risk factors include those related to: general economic conditions; fluctuations and volatility in Symantec s stock price; the ability of Symantec to successfully execute strategic plans, including acquisitions or strategic transactions; maintaining customer and partner relationships; fluctuations in tax rates and currency exchange rates; the timing and market acceptance of new product releases and upgrades; and the successful development of new products, and the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking statements in this press release. We assume no obligation, and do not intend, to update these forward-looking statements as a result of future events or developments. Additional information concerning these and other risks factors is contained in the Risk Factors section of our Form 10-K for the year ended April 3, Any information regarding pre-release of Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. We assume no obligation to update any forward looking information contained in this presentation. 3 THE GLOBAL LEADER IN CYBERSECURITY Operating one of the world s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives. 4 2

3 THREAT LANDSCAPE MORE CHALLENGING THAN EVER Consumers Need Reassurance They Are Safe Online Enterprises Are Not Ready For Tomorrow s Threats Data Is The New Perimeter Never Have Enough Time or Resources Online customers don t know if they can trust e-commerce websites Don t have visibility into attacks on brand Advanced attacks are lost in a mass of less important alerts Average attack goes undetected for 170 days Just 31% of breaches are found by the victim organization the rest are found by a third party, law enforcement, etc. With 65% of workloads in the cloud (Amazon Web Services, Salesforce, Box, Office 365), more of your data is at risk Data is increasingly accessed from outside the firewall Organizations don t know how they are doing or where to focus 96% of alerts never reviewed Hard to hire the right security talent 5 Q3 HIGHLIGHTS Consumer Enterprise Ahead of plan 56% operating margin 1% revenue growth for the 3 rd consecutive quarter +3% revenue growth New on-line acquisition grew 8% y/y Launched ATP: Endpoint, , and Network Norton Shopping Guarantee offering increases customer confidence 6 3

4 SYMANTEC AT A GLANCE Consumer FY15 Non-GAAP Revenue FY16 Q3 Revenue FY16 Q3 Non- GAAP Operating Margin $1, % % Y/Y (CC) (5%) (6%) Enterprise $2, % % Y/Y (CC) (1%) 1% Total Revenue $3, % % Y/Y (CC) (3%) (2%) Enterprise (FY16 YTD) Threat Protection Information Protection Website Cyber Services 7 Q3 FY16 FINANCIAL SUMMARY Q3 FY16 operating margin and EPS exceeded guidance Revenue was above midpoint of guidance range Operating margin and EPS exceeded guidance Excluding TSAs, operating margin would have been 200 basis points higher Non-GAAP in $M Guidance Actuals Yr/Yr (FX Neutral) Total Revenue $890 - $920 $909 (2%) Operating Margin 25.5% % 27.9% N/A EPS ( /share) N/A 8 4

5 FOCUSED ON FOUR PRIORITIES 1 Realizing our Unified Strategy 2 Building our Enterprise Sales Pipeline/GTM 3 Improving our Cost Structure 4 Efficiently Allocate Capital 9 REALIZING OUR UNIFIED SECURITY STRATEGY Users CYBER SECURITY SERVICES Monitoring Incident Response Simulation Adversary Threat Intelligence Data Apps Cloud THREAT PROTECTION Endpoints Data Center Gateway Threat Prevention, Detection, Forensics & Resolution Device, , Server, Virtual & Cloud Workloads Available On-premise and in the Cloud INFORMATION PROTECTION Data Access Identity and Data Loss Protection Cloud-based Key Management Cloud Broker Network Devices UNIFIED SECURITY ANALYTICS PLATFORM Telemetry Threat Analytics Global Intelligence Protection Engines Incident Management Big data security analytics; available to customers in self-service mode Data Center 10 5

6 NORTON GROWTH DRIVERS Benefit from modest PC security market growth Increasing threat activity drives new users TelCo / Mobile growing success in an increasingly multi-device world Well-positioned for growth in the Consumer IoT market 11 NORTON WELL-POSITIONED IN THE CONSUMER SECURITY MARKET WW Consumer Norton Competitive Advantage Total Market Size $5.1B CY15 CAGR +2.4% Source: IDC and Company data $5.4B CY18 Revenue Market Share CY14 4% ESET 5% AVG 9% Trend Micro 15% Others 10% Kaspersky 15% McAfee 42% Norton Unrivaled Protection 63M devices, 4M SMBs, 6.8M mobile devices protected 2.4T attacks blocked, 540M searches protected each year Leveraging Intelligence of Combined Enterprise & Consumer Network 175M endpoints, 57M attack sensors, 157 countries Premium Brand 99% aided awareness in US Best-in-class unaided awareness in all top markets Technology Leadership Most awards for performance and innovation 34x PCMag Editors Choice winner 12 6

7 CONSUMER MOBILE SECURITY TAM SMALL BUT GROWING WW Consumer Mobile Mobile Growth Opportunities Total Market Size $249M +15% $217M CY15 CY16 Source: IDC and Company data Paid Share 85% Paid for 15% Free Robust Protection Through Norton Mobile Insight 15M Android Apps in database, in 200 App Stores 3M Malicious Apps identified, another 9M with intrusive behavior Norton Mobile Strategies Part of Norton multi device value prop Introduce customers to Norton Service Stand alone revenue from Premium Provides telemetry and insights to Enterprise 13 ENTERPRISE SECURITY GROWTH DRIVERS Addressable Market Size Key Growth Areas ($ in billions) Enterprise (FY16 YTD) Threat Protection +50% TAM 11.7 CY CY18 Threat Protection +35% TAM CY15 CY18 Information Protection Expanded Current +50% TAM CY CY18 Cyber Services Threat Protection Information Protection Website Cyber Services Renaissance underway in Endpoint to upgrade devices with next generation functionality Information Protection Move to cloud requires increase need for data loss protection and user authentication Cyber Services Lack of qualified security professionals and complexity of ever changing threat environment requires outsourcing security monitoring and response Analytics Offerings Leverage big data analytics for detecting and remediating targeted attacks and zero day vulnerabilities Source: IDC, Gartner, and Company data 14 7

8 SYMANTEC NEXT GEN ENDPOINT PROTECTION (SEP) The most robust platform of next generation engines that combine to deliver proactive protection from advanced attacks Vantage Intrusion Prevention SAPE Machine Learning Insight SONAR Behavioral Detection Exploit Protection SymClass MutantX NETWORK FILE ATTRIBUTES RELATIONSHIP BEHAVIORS HARDENING AUTOMATION CLUSTERING Blocks attacks by scanning network application layer traffic in real time Static Attribute Protection Engine (SAPE) blocks malware using advanced signatureless technology Uses the wisdom of the crowd and artificial intelligence to block 99% of advanced attacks Advanced machine learning watches programs and immediately blocks abnormal behaviors Blocks all zero day exploits Safely processes over 1M indicators of compromise (IOCs)/ day Identifies key attributes, clusters malware into families * AV TEST- Annual Best Protection Award, February 2016 Symantec scored 100% for protection against zero-day attacks AV-Comparatives/MRG Effitas Test February 2016 Symantec Endpoint Protection blocked 100% of in-the-wild malware attacks with no false positives Dennis Technology Labs, December 2015 The most accurate appliance was Symantec ATP Miercom, Dec 2015 Symantec ATP scored 100% against advanced evasive techniques 15 SYMANTEC ADVANCED THREAT PROTECTION Large and sticky Endpoint and install base offers ATP upsell opportunity ADVANCED THREAT PROTECTION ATP is an upsell opportunity into endpoint and security install base Global Intelligence Exported Data 370k customers representing 110 million endpoint security devices 45K customers representing 15.4M end users Advanced Threat Protection Current ASP for endpoint security is mid single digits Detect Prioritize Investigate Remediate Upsell opportunity is $15-$25 per endpoint Competitors charging upwards of $40 per endpoint per module $2b ATP up-sell opportunity over 3-5 years Endpoint Network 3 rd party 16 8

9 INFORMATION PROTECTION Our Information Protection portfolio keeps data protected while keeping employees productive Data Loss Prevention Track and secure confidential data Discover, monitor, and protect confidential information wherever it s stored and however it s used on mobile devices, within data centers, or in the cloud Encryption Encrypt your data in case it falls into the wrong hands Full-disk and removable media encryption for endpoints, encryption secures sensitive communications, and file share encryption protects files on shared network drives and in the cloud Identity Access Manager Give access only to users who need it Single Sign-on (SSO) with strong authentication, access control, and user management, to control who accesses internal and 3rd-party cloud-based applications Validation and ID Protection (VIP) Strong authentication made easy Two-factor and risk-based tokenless authentication prevents unauthorized access to sensitive networks and applications 17 CYBERSECURITY SERVICES Rely on our 1,000+ Cyber Warriors, around the clock, around the world Threat Intelligence Services Managed Services Incident Response Simulation Services Actionable insights Receive proactive notifications of evolving attack vectors and techniques DeepSight Intelligence keeps customers informed of vulnerabilities and threats to their organization Extend customers security program with our experts 24/7 monitoring of customers entire security infrastructure Monitors every major security product on the market Respond with speed and precision Readiness Services help assess, test, and refine response program Incident Response Services provides remote and on-site investigation to help contain attacks, understand their full scope, and ensure that all components have been eradicated Prepare for what s next Strengthen employee cyber-readiness through security education and simulation exercises Identify key risks employees are facing and build a comprehensive program to assess and improve security awareness Leader in Gartner Magic Quadrant for Managed Services 18 9

10 WEBSITE SECURITY Protect online business - always SSL/TLS Certificates Website Code Signing Norton Shopping Guarantee Protect online business always Ensure that traffic to and from websites cannot be compromised by attackers Secure websites, data, and applications 24/7 Assure up-to-the-minute visibility into any potential security weaknesses in your website Deliver trust with every download Protect the integrity of software, ensure that customers only run untampered versions of software Increase sales with the Norton Shopping Guarantee Drive more online sales with increased customer confidence 19 CAPITAL ALLOCATION On February 4 th, announced board increased capital return program to $5.5 billion plans to return all the after-tax cash proceeds from the Veritas transaction to shareholders $500 million ASR completed in January 2016 Paid a $4/share special dividend equaling $2.7 billion on March 22 nd $2.3 billion in share repurchases by March 2017 Of which, $1 billion ASR launched on March 22 nd Quarterly dividend of 7.5 /share with a commitment to increasing this dividend as free cash flow grows over time Announced that Silver Lake Partners has made a $500 million strategic investment in Symantec through a convertible senior note 20 10

11 CONTACT INVESTOR RELATIONS Jonathan Doros (650) Nate Pollack (650)

2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors

2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors 2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors November 3, 2015 Board of Directors Daniel H. Schulman Chairman of the Board, Symantec President and Chief Executive Officer,

More information

Investor Overview 2018

Investor Overview 2018 Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions

More information

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO Investor presentation Philippe Courtot, Chairman and CEO Melissa Fisher, CFO October 31 st, 2017 Safe harbor This presentation includes forward-looking statements within the meaning of the federal securities

More information

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010 Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities

More information

Investor presentation

Investor presentation Investor presentation Securing the digital transformation and helping build a safer world - one app at a time Philippe Courtot, Chairman and CEO Melissa Fisher, CFO October 30 th, 2018 Safe harbor This

More information

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO Investor presentation Philippe Courtot, Chairman and CEO Melissa Fisher, CFO May 1 st, 2018 Safe harbor This presentation includes forward-looking statements within the meaning of the federal securities

More information

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582

More information

Extreme Networks Investor Presentation

Extreme Networks Investor Presentation Extreme Networks Investor Presentation May 2017 2017 Extreme Networks, Inc. All rights reserved Cautionary Statement on Financial Measures Non GAAP Measures: In preparing the accompanying information,

More information

The Network Will Define The Winners In The Cloud

The Network Will Define The Winners In The Cloud Forward Looking Statements Statements in these presentation slides and related webcast concerning Juniper Networks business, economic, industry and market outlook, trends and opportunity; 2016 and long-term

More information

First Quarter 2018 Earnings Presentation. May 8, 2018

First Quarter 2018 Earnings Presentation. May 8, 2018 First Quarter 2018 Earnings Presentation May 8, 2018 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions,

More information

Symantec's Fiscal Second Quarter Supplemental Information

Symantec's Fiscal Second Quarter Supplemental Information Symantec's Fiscal Second Supplemental Information SUMMARY (in thousands) Revenue and Earnings Results Sep-05Q Jun-05Q Sep-04Q Y/Y Growth Q/Q Growth Non-GAAP Revenue (including writedown)* $1,192,144 $1,259,200

More information

HPE to Acquire Nimble Storage

HPE to Acquire Nimble Storage HPE to Acquire Nimble Storage March 7, 2017 http://www.hpe.com/investor/home Forward Looking Statements This document contains forward-looking statements within the meaning of the safe harbor provisions

More information

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ

More information

Good afternoon and thank you for joining our call to discuss third quarter 2016 earnings results.

Good afternoon and thank you for joining our call to discuss third quarter 2016 earnings results. Jonathan Doros Investor Relations Good afternoon and thank you for joining our call to discuss third quarter 2016 earnings results. By now, you should have had the opportunity to review our earnings release

More information

Fourth Quarter and Full Year 2018 Earnings Presentation. February 21, 2019

Fourth Quarter and Full Year 2018 Earnings Presentation. February 21, 2019 Fourth Quarter and Full Year 2018 Earnings Presentation February 21, 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements

More information

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing

More information

Symantec and its partner community are securing the cloud generation, together

Symantec and its partner community are securing the cloud generation, together Symantec and its partner community are securing the cloud generation, together Guide to the Symantec Secure One partner program Create Solve Support Secure October 2017 Table of Contents Secure One Program

More information

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008 Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

2016 Summary Annual Report and Annual Meeting Documents

2016 Summary Annual Report and Annual Meeting Documents 2016 Summary Annual Report and 2017 Annual Meeting Documents To Our Shareholders We enter 2017 with confidence in a bright future ahead for CenturyLink. We are clear in our approach to the market: we

More information

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab

More information

WINNING IN A MULTICLOUD WORLD

WINNING IN A MULTICLOUD WORLD WINNING IN A MULTICLOUD WORLD Rami Rahim CEO, Juniper Networks 2 CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within the meaning of Section 27A

More information

UBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO

UBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO UBS 42 nd Annual Global Media and Communications Conference December 8, 2014 Leigh Fox, CFO Safe Harbor This presentation and the documents incorporated by reference herein contain forward-looking statements

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

A copy of today s prepared remarks will be available on the website after our call is completed.

A copy of today s prepared remarks will be available on the website after our call is completed. Introduction Sean Hazlett, Senior Manager, Investor Relations Good morning and thank you for joining our call to discuss first quarter 2016 earnings results. By now, you should have had the opportunity

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

Enabling a Multicloud World. Kip Compton VP, Cloud Platform & Solutions Group December 4,

Enabling a Multicloud World. Kip Compton VP, Cloud Platform & Solutions Group December 4, Enabling a Multicloud World Kip Compton VP, Platform & Solutions Group December 4, 2017 @kipcompton Forward-Looking Statements This presentation contains projections and other forward-looking statements

More information

OPPORTUNITY TO ACCELERATE MOMENTUM

OPPORTUNITY TO ACCELERATE MOMENTUM OPPORTUNITY TO ACCELERATE MOMENTUM Pierre-Paul Allard Chief Customer Officer Juniper Networks CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within

More information

Prepared Remarks Red Hat Q3FY2018 Earnings Call 12/19/17

Prepared Remarks Red Hat Q3FY2018 Earnings Call 12/19/17 Speaker: Tom McCallum, VP of Investor Relations Thank you operator, Hello everyone, and welcome to Red Hat's earnings call for the third quarter of FY18. Speakers for today's call will be Jim Whitehurst,

More information

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN

More information

Forward Looking Statement

Forward Looking Statement Forward Looking Statement This presentation contains forward-looking statements which are statements that refer to expectations and plans for the future and include, without limitation, statements regarding

More information

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace Disclaimer The information provided by Symantec in this document is the confidential and proprietary information of Symantec

More information

OpenText Buys Guidance Software

OpenText Buys Guidance Software OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information

2017 Q4 Earnings Conference Call

2017 Q4 Earnings Conference Call 2017 Q4 Earnings Conference Call Forward Looking Statements This presentation includes certain forward-looking statements that are made as of the date hereof and are based upon current expectations, which

More information

2014 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors

2014 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors 04 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors October 8, 04 Board of Directors Daniel H. Schulman Chairman of the Board, Symantec Chief Executive Officer, Paypal Michael

More information

CloudSOC and Security.cloud for Microsoft Office 365

CloudSOC and  Security.cloud for Microsoft Office 365 Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

Tech Data s Acquisition of Avnet Technology Solutions

Tech Data s Acquisition of Avnet Technology Solutions Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe

More information

Securing the SMB Cloud Generation

Securing the SMB Cloud Generation Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product

More information

Hello everyone, and welcome to Red Hat's earnings call for the second quarter of FY17.

Hello everyone, and welcome to Red Hat's earnings call for the second quarter of FY17. Red Hat Q2 FY17 Earnings Call Prepared Remarks Speaker Tom McCallum VP of Investor Relations Thank you operator, Hello everyone, and welcome to Red Hat's earnings call for the second quarter of FY17. Speakers

More information

Reinvention and Transformation in Personal Systems March 22,

Reinvention and Transformation in Personal Systems March 22, Reinvention and Transformation in Personal Systems March 22, 2017 http://www.hp.com/investor/home 1 Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

From Managed Security Services to the next evolution of CyberSoc Services

From Managed Security Services to the next evolution of CyberSoc Services From Managed Security Services to the next evolution of CyberSoc Services Gianluca Busco Arré Country Manager pandasecurity.com MSSP / MDR Where the Industry is going leaders and laggers MSSP industry

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM

More information

I N V E S T O R S P R E S E N T A T I O N

I N V E S T O R S P R E S E N T A T I O N I N V E S T O R S P R E S E N T A T I O N Rafi Amit, CEO Moshe Eisenberg, CFO November 2018 SAFE HARBOR The information presented today contains forward-looking statements that relate to anticipated future

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Cincinnati Bell Inc. March 4, 2013

Cincinnati Bell Inc. March 4, 2013 Cincinnati Bell Inc. March 4, 2013 Safe Harbor This presentation and the documents incorporated by reference herein contain forwardlooking statements regarding future events and our future results that

More information

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017 A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security

More information

Verizon closes 2017 with strong wireless customer growth and retention, well-positioned in new markets

Verizon closes 2017 with strong wireless customer growth and retention, well-positioned in new markets News Release FOR IMMEDIATE RELEASE January 23, 2018 Media contact: Bob Varettoni 908.559.6388 robert.a.varettoni@verizon.com Verizon closes 2017 with strong wireless customer growth and retention, well-positioned

More information

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY IMPROVED SECURITY FOR THE MID-MARKET 1 SYNERGIES ACROSS SEGMENTS Privacy Family Connected home

More information

Nasdaq: DAIO. Anthony Ambrose. President and CEO. Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation

Nasdaq: DAIO. Anthony Ambrose. President and CEO. Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation Nasdaq: DAIO Anthony Ambrose President and CEO Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation Safe Harbor The matters that we discuss today will include forward-looking

More information

Cybersecurity, Trade, and Economic Development

Cybersecurity, Trade, and Economic Development Cybersecurity, Trade, and Economic Development G7 ICT Priorities: Technology, Innovation, and the Global Economy UNCTAD E-Commerce Week Danielle Kriz Senior Director, Global Policy Palo Alto Networks April

More information

Extreme Networks Investor Presentation

Extreme Networks Investor Presentation Extreme Networks Investor Presentation December 2017 2017 Extreme Networks, Inc. All rights reserved Cautionary Statement on Financial Measures Non GAAP Measures: In preparing the accompanying information,

More information

Mobile World Congress Claudine Mangano Director, Global Communications Intel Corporation

Mobile World Congress Claudine Mangano Director, Global Communications Intel Corporation Mobile World Congress 2015 Claudine Mangano Director, Global Communications Intel Corporation Mobile World Congress 2015 Brian Krzanich Chief Executive Officer Intel Corporation 4.9B 2X CONNECTED CONNECTED

More information

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Sophos. Allan Widell Channel Account Executive. 24. August 2017 Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017 Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication

More information

F-Secure Corporation Interim report Q4 2012

F-Secure Corporation Interim report Q4 2012 F-Secure Corporation Interim report Q4 2012 (Unaudited) President & CEO Christian Fredrikson February 1, 2013 Protecting the irreplaceable f-secure.com Contents 1. Highlights in Q4 and in 2012 2. Financial

More information

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

Windstream acquisition of Broadview Networks Transaction overview April 13, 2017

Windstream acquisition of Broadview Networks Transaction overview April 13, 2017 Windstream acquisition of Broadview Networks Transaction overview April 13, 2017 Safe Harbor Statement Windstream Holdings, Inc. claim the protection of the safe-harbor for forward-looking statements contained

More information

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. Intelligence-driven security STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. BETTER INTELLIGENCE. BETTER DEFENSE. The

More information

VMware Reports First Quarter 2009 Results

VMware Reports First Quarter 2009 Results VMware Reports First Quarter 2009 Results Revenue Increased 7% to $470 Million GAAP Operating Income Increased 80% to $87 Million; Non-GAAP Operating Income Increased 14% to $121 Million GAAP Diluted EPS

More information

Seagate Point of View Cloud and Data Center Trend

Seagate Point of View Cloud and Data Center Trend DATA IS IN OUR DNA Seagate Point of View Cloud and Data Center Trend Raj Rajagopalan March 2018 1 Safe Harbor Statement This document contains forward-looking statements within the meaning of Section 27A

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

Sierra Wireless. Corporate Overview. May 2017

Sierra Wireless. Corporate Overview. May 2017 Sierra Wireless Corporate Overview May 2017 Sierra Wireless Leader, Innovator, Trusted Partner in the IoT IoT Leader in device-to-cloud solutions Innovator essential IP in Cat M1 edge intelligence open

More information

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker October 14, 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle is currently

More information

Investor Presentation February 2019

Investor Presentation February 2019 Investor Presentation February 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions, acquisition

More information

Conference call February 2, :00 / Helsinki 08:00 / New York 1 Nokia Q4 and FY 2016

Conference call February 2, :00 / Helsinki 08:00 / New York 1 Nokia Q4 and FY 2016 Conference call February 2, 2017 15:00 / Helsinki 08:00 / New York 1 Nokia 2016 Q4 and FY 2016 Disclaimer It should be noted that Nokia and its business are exposed to various risks and uncertainties,

More information

Are we breached? Deloitte's Cyber Threat Hunting

Are we breached? Deloitte's Cyber Threat Hunting Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts Managed Enterprise Phishing Protection Comprehensive protection delivered 24/7 by anti-phishing experts MANAGED ENTERPRISE PHISHING PROTECTION 24/7 expert protection against phishing attacks that get past

More information

with Advanced Protection

with Advanced  Protection with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations

More information

J.P. Morgan Healthcare Conference Investor Presentation Matt Wallach, President & Co-Founder January 14, Veeva Systems veeva.

J.P. Morgan Healthcare Conference Investor Presentation Matt Wallach, President & Co-Founder January 14, Veeva Systems veeva. J.P. Morgan Healthcare Conference Investor Presentation Matt Wallach, President & Co-Founder January 14, 2016 2016 Veeva Systems veeva.com Safe Harbor Forward-looking Statements This presentation contains

More information

Investor Presentation. December 2017

Investor Presentation. December 2017 Investor Presentation December 2017 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions, acquisition

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

INVESTOR PRESENTATION

INVESTOR PRESENTATION INVESTOR PRESENTATION Jefferies Technology Conference May 2018 Safe Harbor 2 Safe Harbor Disclaimer This presentation may contain forward-looking information with respect to plans, projections, or future

More information

Symantec Ransomware Protection

Symantec Ransomware Protection Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

4 TH. 4Q13 Earnings Conference Call January 28, AT&T Investor Update

4 TH. 4Q13 Earnings Conference Call January 28, AT&T Investor Update 4Q13 Earnings Conference Call January 28, 2014 AT&T Investor Update 4 TH 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other marks contained herein are trademarks of

More information

HOSTED SECURITY SERVICES

HOSTED SECURITY SERVICES HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal

More information

Accelera'ng Our Path Forward. Stephen Gille8

Accelera'ng Our Path Forward. Stephen Gille8 Accelera'ng Our Path Forward Stephen Gille8 Two Independent Companies with Strong Market Posi'ons $6.7Billion Revenues 1 IM 38% Norton 31% SYMANTEC SECURITY ES 31% INFORMATION MANAGEMENT $4.2 billion Revenue

More information

A Risk Management Platform

A Risk Management Platform A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention

More information

2nd Quarter 2017 Earnings Results

2nd Quarter 2017 Earnings Results 2nd Quarter 2017 Earnings Results August 2, 2017 Forward-Looking Statements Except for historical and factual information, the matters set forth in this presentation and other of our oral or written statements

More information

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General

More information

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO Building an Effective Threat Intelligence Capability Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO The Race To Digitize Automotive Telematics In-vehicle entertainment

More information

(408) (408) NETAPP ANNOUNCES RESULTS FOR SECOND QUARTER FISCAL YEAR 2013

(408) (408) NETAPP ANNOUNCES RESULTS FOR SECOND QUARTER FISCAL YEAR 2013 Press Contact: Investor Contact: Ryan Lowry Kris Newton NetApp NetApp (408) 822-7544 (408) 822-3312 ryanl@netapp.com kris.newton@netapp.com NETAPP ANNOUNCES RESULTS FOR SECOND QUARTER FISCAL YEAR 2013

More information

Investor Presentation. February 2016

Investor Presentation. February 2016 Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS

CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS THIRD QUARTER 2017 EARNINGS October 31, 2017 DECEMBER 21, 2017 SAFE HARBOR S A F E H A R B O R This presentation contains forward-looking statements regarding future

More information

Trend Micro Reports Record First Quarter Revenue & Operating Profit

Trend Micro Reports Record First Quarter Revenue & Operating Profit Trend Micro Reports Record First Quarter Revenue & Operating Profit Continued strong growth in U.S and Asia highlight quarter Tokyo, Japan April 25, 2006 Trend Micro, Incorporated (TSE: 4704, NASDAQ: TMIC),

More information

A complete travel commerce experience EXPEDIA, INC.

A complete travel commerce experience EXPEDIA, INC. A complete travel commerce experience Forward-Looking Statements This presentation contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, including

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Changing the Game: An HPR Approach to Cyber CRM007

Changing the Game: An HPR Approach to Cyber CRM007 Speakers: Changing the Game: An HPR Approach to Cyber CRM007 Michal Gnatek, Senior Vice President, Marsh & McLennan Karen Miller, Sr. Treasury & Risk Manager, FireEye, Inc. Learning Objectives At the end

More information

Wi-Fi Perfected. Second Quarter 2017 Earnings Presentation August 7, Proprietary Software. Cloud Analytics. Semiconductors

Wi-Fi Perfected. Second Quarter 2017 Earnings Presentation August 7, Proprietary Software. Cloud Analytics. Semiconductors Wi-Fi Perfected Semiconductors Proprietary Software Cloud Analytics Second Quarter 2017 Earnings Presentation August 7, 2017 Safe Harbor and Non-GAAP Financial Measures This presentation contains forward-looking

More information