Symantec Investor Presentation March Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION
|
|
- Barry Cameron
- 6 years ago
- Views:
Transcription
1 Symantec Refocused USE OF GAAP AND NON-GAAP FINANCIAL INFORMATION Our results of operations have undergone significant change due to the impact of litigation accruals, stock-based compensation, restructuring, transition and separation matters, charges related to the amortization of intangible assets, and certain other income and expense items that management considers unrelated to the Company s core operations. To help our readers understand our past financial performance and our future results, we supplement the financial results that we provide in accordance with generally accepted accounting principles, or GAAP, with non-gaap financial measures. The method we use to produce non-gaap results is not computed according to GAAP and may differ from the methods used by other companies. Non-GAAP financial measures are supplemental, should not be considered a substitute for financial information presented in accordance with GAAP and should be read only in conjunction with our consolidated financial statements prepared in accordance with GAAP. Our management team uses these non-gaap financial measures in assessing the Company s operating results, as well as when planning, forecasting and analyzing future periods. Investors are encouraged to review the reconciliation of our non-gaap financial measures to the comparable GAAP results, which is attached to our quarterly earnings release and which can be found, along with other financial information, on the investor relations page of our website at: 2 1
2 FORWARD LOOKING STATEMENTS This presentation contains statements which may be considered forward-looking within the meaning of the U.S. federal securities laws, including statements regarding the use of proceeds from the sale of Veritas, including statements regarding the capital allocation program, including the ASR and special dividend; statements regarding the strategic investment of Silver Lake Partners; statements regarding the growth prospects of our security business; and statements with respect to our continuation of our current dividend. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, performance or achievements to differ materially from results expressed or implied in this press release. Such risk factors include those related to: general economic conditions; fluctuations and volatility in Symantec s stock price; the ability of Symantec to successfully execute strategic plans, including acquisitions or strategic transactions; maintaining customer and partner relationships; fluctuations in tax rates and currency exchange rates; the timing and market acceptance of new product releases and upgrades; and the successful development of new products, and the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking statements in this press release. We assume no obligation, and do not intend, to update these forward-looking statements as a result of future events or developments. Additional information concerning these and other risks factors is contained in the Risk Factors section of our Form 10-K for the year ended April 3, Any information regarding pre-release of Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. We assume no obligation to update any forward looking information contained in this presentation. 3 THE GLOBAL LEADER IN CYBERSECURITY Operating one of the world s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives. 4 2
3 THREAT LANDSCAPE MORE CHALLENGING THAN EVER Consumers Need Reassurance They Are Safe Online Enterprises Are Not Ready For Tomorrow s Threats Data Is The New Perimeter Never Have Enough Time or Resources Online customers don t know if they can trust e-commerce websites Don t have visibility into attacks on brand Advanced attacks are lost in a mass of less important alerts Average attack goes undetected for 170 days Just 31% of breaches are found by the victim organization the rest are found by a third party, law enforcement, etc. With 65% of workloads in the cloud (Amazon Web Services, Salesforce, Box, Office 365), more of your data is at risk Data is increasingly accessed from outside the firewall Organizations don t know how they are doing or where to focus 96% of alerts never reviewed Hard to hire the right security talent 5 Q3 HIGHLIGHTS Consumer Enterprise Ahead of plan 56% operating margin 1% revenue growth for the 3 rd consecutive quarter +3% revenue growth New on-line acquisition grew 8% y/y Launched ATP: Endpoint, , and Network Norton Shopping Guarantee offering increases customer confidence 6 3
4 SYMANTEC AT A GLANCE Consumer FY15 Non-GAAP Revenue FY16 Q3 Revenue FY16 Q3 Non- GAAP Operating Margin $1, % % Y/Y (CC) (5%) (6%) Enterprise $2, % % Y/Y (CC) (1%) 1% Total Revenue $3, % % Y/Y (CC) (3%) (2%) Enterprise (FY16 YTD) Threat Protection Information Protection Website Cyber Services 7 Q3 FY16 FINANCIAL SUMMARY Q3 FY16 operating margin and EPS exceeded guidance Revenue was above midpoint of guidance range Operating margin and EPS exceeded guidance Excluding TSAs, operating margin would have been 200 basis points higher Non-GAAP in $M Guidance Actuals Yr/Yr (FX Neutral) Total Revenue $890 - $920 $909 (2%) Operating Margin 25.5% % 27.9% N/A EPS ( /share) N/A 8 4
5 FOCUSED ON FOUR PRIORITIES 1 Realizing our Unified Strategy 2 Building our Enterprise Sales Pipeline/GTM 3 Improving our Cost Structure 4 Efficiently Allocate Capital 9 REALIZING OUR UNIFIED SECURITY STRATEGY Users CYBER SECURITY SERVICES Monitoring Incident Response Simulation Adversary Threat Intelligence Data Apps Cloud THREAT PROTECTION Endpoints Data Center Gateway Threat Prevention, Detection, Forensics & Resolution Device, , Server, Virtual & Cloud Workloads Available On-premise and in the Cloud INFORMATION PROTECTION Data Access Identity and Data Loss Protection Cloud-based Key Management Cloud Broker Network Devices UNIFIED SECURITY ANALYTICS PLATFORM Telemetry Threat Analytics Global Intelligence Protection Engines Incident Management Big data security analytics; available to customers in self-service mode Data Center 10 5
6 NORTON GROWTH DRIVERS Benefit from modest PC security market growth Increasing threat activity drives new users TelCo / Mobile growing success in an increasingly multi-device world Well-positioned for growth in the Consumer IoT market 11 NORTON WELL-POSITIONED IN THE CONSUMER SECURITY MARKET WW Consumer Norton Competitive Advantage Total Market Size $5.1B CY15 CAGR +2.4% Source: IDC and Company data $5.4B CY18 Revenue Market Share CY14 4% ESET 5% AVG 9% Trend Micro 15% Others 10% Kaspersky 15% McAfee 42% Norton Unrivaled Protection 63M devices, 4M SMBs, 6.8M mobile devices protected 2.4T attacks blocked, 540M searches protected each year Leveraging Intelligence of Combined Enterprise & Consumer Network 175M endpoints, 57M attack sensors, 157 countries Premium Brand 99% aided awareness in US Best-in-class unaided awareness in all top markets Technology Leadership Most awards for performance and innovation 34x PCMag Editors Choice winner 12 6
7 CONSUMER MOBILE SECURITY TAM SMALL BUT GROWING WW Consumer Mobile Mobile Growth Opportunities Total Market Size $249M +15% $217M CY15 CY16 Source: IDC and Company data Paid Share 85% Paid for 15% Free Robust Protection Through Norton Mobile Insight 15M Android Apps in database, in 200 App Stores 3M Malicious Apps identified, another 9M with intrusive behavior Norton Mobile Strategies Part of Norton multi device value prop Introduce customers to Norton Service Stand alone revenue from Premium Provides telemetry and insights to Enterprise 13 ENTERPRISE SECURITY GROWTH DRIVERS Addressable Market Size Key Growth Areas ($ in billions) Enterprise (FY16 YTD) Threat Protection +50% TAM 11.7 CY CY18 Threat Protection +35% TAM CY15 CY18 Information Protection Expanded Current +50% TAM CY CY18 Cyber Services Threat Protection Information Protection Website Cyber Services Renaissance underway in Endpoint to upgrade devices with next generation functionality Information Protection Move to cloud requires increase need for data loss protection and user authentication Cyber Services Lack of qualified security professionals and complexity of ever changing threat environment requires outsourcing security monitoring and response Analytics Offerings Leverage big data analytics for detecting and remediating targeted attacks and zero day vulnerabilities Source: IDC, Gartner, and Company data 14 7
8 SYMANTEC NEXT GEN ENDPOINT PROTECTION (SEP) The most robust platform of next generation engines that combine to deliver proactive protection from advanced attacks Vantage Intrusion Prevention SAPE Machine Learning Insight SONAR Behavioral Detection Exploit Protection SymClass MutantX NETWORK FILE ATTRIBUTES RELATIONSHIP BEHAVIORS HARDENING AUTOMATION CLUSTERING Blocks attacks by scanning network application layer traffic in real time Static Attribute Protection Engine (SAPE) blocks malware using advanced signatureless technology Uses the wisdom of the crowd and artificial intelligence to block 99% of advanced attacks Advanced machine learning watches programs and immediately blocks abnormal behaviors Blocks all zero day exploits Safely processes over 1M indicators of compromise (IOCs)/ day Identifies key attributes, clusters malware into families * AV TEST- Annual Best Protection Award, February 2016 Symantec scored 100% for protection against zero-day attacks AV-Comparatives/MRG Effitas Test February 2016 Symantec Endpoint Protection blocked 100% of in-the-wild malware attacks with no false positives Dennis Technology Labs, December 2015 The most accurate appliance was Symantec ATP Miercom, Dec 2015 Symantec ATP scored 100% against advanced evasive techniques 15 SYMANTEC ADVANCED THREAT PROTECTION Large and sticky Endpoint and install base offers ATP upsell opportunity ADVANCED THREAT PROTECTION ATP is an upsell opportunity into endpoint and security install base Global Intelligence Exported Data 370k customers representing 110 million endpoint security devices 45K customers representing 15.4M end users Advanced Threat Protection Current ASP for endpoint security is mid single digits Detect Prioritize Investigate Remediate Upsell opportunity is $15-$25 per endpoint Competitors charging upwards of $40 per endpoint per module $2b ATP up-sell opportunity over 3-5 years Endpoint Network 3 rd party 16 8
9 INFORMATION PROTECTION Our Information Protection portfolio keeps data protected while keeping employees productive Data Loss Prevention Track and secure confidential data Discover, monitor, and protect confidential information wherever it s stored and however it s used on mobile devices, within data centers, or in the cloud Encryption Encrypt your data in case it falls into the wrong hands Full-disk and removable media encryption for endpoints, encryption secures sensitive communications, and file share encryption protects files on shared network drives and in the cloud Identity Access Manager Give access only to users who need it Single Sign-on (SSO) with strong authentication, access control, and user management, to control who accesses internal and 3rd-party cloud-based applications Validation and ID Protection (VIP) Strong authentication made easy Two-factor and risk-based tokenless authentication prevents unauthorized access to sensitive networks and applications 17 CYBERSECURITY SERVICES Rely on our 1,000+ Cyber Warriors, around the clock, around the world Threat Intelligence Services Managed Services Incident Response Simulation Services Actionable insights Receive proactive notifications of evolving attack vectors and techniques DeepSight Intelligence keeps customers informed of vulnerabilities and threats to their organization Extend customers security program with our experts 24/7 monitoring of customers entire security infrastructure Monitors every major security product on the market Respond with speed and precision Readiness Services help assess, test, and refine response program Incident Response Services provides remote and on-site investigation to help contain attacks, understand their full scope, and ensure that all components have been eradicated Prepare for what s next Strengthen employee cyber-readiness through security education and simulation exercises Identify key risks employees are facing and build a comprehensive program to assess and improve security awareness Leader in Gartner Magic Quadrant for Managed Services 18 9
10 WEBSITE SECURITY Protect online business - always SSL/TLS Certificates Website Code Signing Norton Shopping Guarantee Protect online business always Ensure that traffic to and from websites cannot be compromised by attackers Secure websites, data, and applications 24/7 Assure up-to-the-minute visibility into any potential security weaknesses in your website Deliver trust with every download Protect the integrity of software, ensure that customers only run untampered versions of software Increase sales with the Norton Shopping Guarantee Drive more online sales with increased customer confidence 19 CAPITAL ALLOCATION On February 4 th, announced board increased capital return program to $5.5 billion plans to return all the after-tax cash proceeds from the Veritas transaction to shareholders $500 million ASR completed in January 2016 Paid a $4/share special dividend equaling $2.7 billion on March 22 nd $2.3 billion in share repurchases by March 2017 Of which, $1 billion ASR launched on March 22 nd Quarterly dividend of 7.5 /share with a commitment to increasing this dividend as free cash flow grows over time Announced that Silver Lake Partners has made a $500 million strategic investment in Symantec through a convertible senior note 20 10
11 CONTACT INVESTOR RELATIONS Jonathan Doros (650) Nate Pollack (650)
2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors
2015 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors November 3, 2015 Board of Directors Daniel H. Schulman Chairman of the Board, Symantec President and Chief Executive Officer,
More informationInvestor Overview 2018
Investor Overview 2018 1 SAFE HARBOR This presentation contains forward-looking statements that involve risks, uncertainties and assumptions. If the risks or uncertainties ever materialize or the assumptions
More informationInvestor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO
Investor presentation Philippe Courtot, Chairman and CEO Melissa Fisher, CFO October 31 st, 2017 Safe harbor This presentation includes forward-looking statements within the meaning of the federal securities
More informationSymantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010
Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities
More informationInvestor presentation
Investor presentation Securing the digital transformation and helping build a safer world - one app at a time Philippe Courtot, Chairman and CEO Melissa Fisher, CFO October 30 th, 2018 Safe harbor This
More informationInvestor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO
Investor presentation Philippe Courtot, Chairman and CEO Melissa Fisher, CFO May 1 st, 2018 Safe harbor This presentation includes forward-looking statements within the meaning of the federal securities
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationExtreme Networks Investor Presentation
Extreme Networks Investor Presentation May 2017 2017 Extreme Networks, Inc. All rights reserved Cautionary Statement on Financial Measures Non GAAP Measures: In preparing the accompanying information,
More informationThe Network Will Define The Winners In The Cloud
Forward Looking Statements Statements in these presentation slides and related webcast concerning Juniper Networks business, economic, industry and market outlook, trends and opportunity; 2016 and long-term
More informationFirst Quarter 2018 Earnings Presentation. May 8, 2018
First Quarter 2018 Earnings Presentation May 8, 2018 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions,
More informationSymantec's Fiscal Second Quarter Supplemental Information
Symantec's Fiscal Second Supplemental Information SUMMARY (in thousands) Revenue and Earnings Results Sep-05Q Jun-05Q Sep-04Q Y/Y Growth Q/Q Growth Non-GAAP Revenue (including writedown)* $1,192,144 $1,259,200
More informationHPE to Acquire Nimble Storage
HPE to Acquire Nimble Storage March 7, 2017 http://www.hpe.com/investor/home Forward Looking Statements This document contains forward-looking statements within the meaning of the safe harbor provisions
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationGood afternoon and thank you for joining our call to discuss third quarter 2016 earnings results.
Jonathan Doros Investor Relations Good afternoon and thank you for joining our call to discuss third quarter 2016 earnings results. By now, you should have had the opportunity to review our earnings release
More informationFourth Quarter and Full Year 2018 Earnings Presentation. February 21, 2019
Fourth Quarter and Full Year 2018 Earnings Presentation February 21, 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationSymantec and its partner community are securing the cloud generation, together
Symantec and its partner community are securing the cloud generation, together Guide to the Symantec Secure One partner program Create Solve Support Secure October 2017 Table of Contents Secure One Program
More informationRed Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008
Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More information2016 Summary Annual Report and Annual Meeting Documents
2016 Summary Annual Report and 2017 Annual Meeting Documents To Our Shareholders We enter 2017 with confidence in a bright future ahead for CenturyLink. We are clear in our approach to the market: we
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationWINNING IN A MULTICLOUD WORLD
WINNING IN A MULTICLOUD WORLD Rami Rahim CEO, Juniper Networks 2 CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within the meaning of Section 27A
More informationUBS 42 nd Annual Global Media and Communications Conference December 8, Leigh Fox, CFO
UBS 42 nd Annual Global Media and Communications Conference December 8, 2014 Leigh Fox, CFO Safe Harbor This presentation and the documents incorporated by reference herein contain forward-looking statements
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationA copy of today s prepared remarks will be available on the website after our call is completed.
Introduction Sean Hazlett, Senior Manager, Investor Relations Good morning and thank you for joining our call to discuss first quarter 2016 earnings results. By now, you should have had the opportunity
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationEnabling a Multicloud World. Kip Compton VP, Cloud Platform & Solutions Group December 4,
Enabling a Multicloud World Kip Compton VP, Platform & Solutions Group December 4, 2017 @kipcompton Forward-Looking Statements This presentation contains projections and other forward-looking statements
More informationOPPORTUNITY TO ACCELERATE MOMENTUM
OPPORTUNITY TO ACCELERATE MOMENTUM Pierre-Paul Allard Chief Customer Officer Juniper Networks CAUTIONARY STATEMENTS Forward-Looking Statements. This presentation contains forward-looking statements within
More informationPrepared Remarks Red Hat Q3FY2018 Earnings Call 12/19/17
Speaker: Tom McCallum, VP of Investor Relations Thank you operator, Hello everyone, and welcome to Red Hat's earnings call for the third quarter of FY18. Speakers for today's call will be Jim Whitehurst,
More informationInterim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR
Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN
More informationForward Looking Statement
Forward Looking Statement This presentation contains forward-looking statements which are statements that refer to expectations and plans for the future and include, without limitation, statements regarding
More informationNorton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace
Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace Disclaimer The information provided by Symantec in this document is the confidential and proprietary information of Symantec
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More information2017 Q4 Earnings Conference Call
2017 Q4 Earnings Conference Call Forward Looking Statements This presentation includes certain forward-looking statements that are made as of the date hereof and are based upon current expectations, which
More information2014 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors
04 Annual Stockholder Meeting Dan Schulman, Chairman of the Board of Directors October 8, 04 Board of Directors Daniel H. Schulman Chairman of the Board, Symantec Chief Executive Officer, Paypal Michael
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationTech Data s Acquisition of Avnet Technology Solutions
Tech Data s Acquisition of Avnet Technology Solutions Creating a Premier Global IT Distributor: From the Data Center to the Living Room September 19, 2016 techdata.com 1 Forward-Looking Statements Safe
More informationSecuring the SMB Cloud Generation
Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product
More informationHello everyone, and welcome to Red Hat's earnings call for the second quarter of FY17.
Red Hat Q2 FY17 Earnings Call Prepared Remarks Speaker Tom McCallum VP of Investor Relations Thank you operator, Hello everyone, and welcome to Red Hat's earnings call for the second quarter of FY17. Speakers
More informationReinvention and Transformation in Personal Systems March 22,
Reinvention and Transformation in Personal Systems March 22, 2017 http://www.hp.com/investor/home 1 Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationFrom Managed Security Services to the next evolution of CyberSoc Services
From Managed Security Services to the next evolution of CyberSoc Services Gianluca Busco Arré Country Manager pandasecurity.com MSSP / MDR Where the Industry is going leaders and laggers MSSP industry
More informationForeScout Extended Module for Splunk
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look
More informationACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018
ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials Supplementary material 2 KEY TAKEAWAYS FROM
More informationI N V E S T O R S P R E S E N T A T I O N
I N V E S T O R S P R E S E N T A T I O N Rafi Amit, CEO Moshe Eisenberg, CFO November 2018 SAFE HARBOR The information presented today contains forward-looking statements that relate to anticipated future
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCincinnati Bell Inc. March 4, 2013
Cincinnati Bell Inc. March 4, 2013 Safe Harbor This presentation and the documents incorporated by reference herein contain forwardlooking statements regarding future events and our future results that
More informationA STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017
A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY Samu Konttinen, CEO Interim Results Q1 2017 1 AGENDA Key takeaways from Q1 Financials Business updates Outlook 2 KEY TAKEAWAYS FROM Q1 Corporate security
More informationVerizon closes 2017 with strong wireless customer growth and retention, well-positioned in new markets
News Release FOR IMMEDIATE RELEASE January 23, 2018 Media contact: Bob Varettoni 908.559.6388 robert.a.varettoni@verizon.com Verizon closes 2017 with strong wireless customer growth and retention, well-positioned
More informationJens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY
Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY IMPROVED SECURITY FOR THE MID-MARKET 1 SYNERGIES ACROSS SEGMENTS Privacy Family Connected home
More informationNasdaq: DAIO. Anthony Ambrose. President and CEO. Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation
Nasdaq: DAIO Anthony Ambrose President and CEO Data I/O Corporation May 2017 B. Riley & Co. Conference -- Investor Presentation Safe Harbor The matters that we discuss today will include forward-looking
More informationCybersecurity, Trade, and Economic Development
Cybersecurity, Trade, and Economic Development G7 ICT Priorities: Technology, Innovation, and the Global Economy UNCTAD E-Commerce Week Danielle Kriz Senior Director, Global Policy Palo Alto Networks April
More informationExtreme Networks Investor Presentation
Extreme Networks Investor Presentation December 2017 2017 Extreme Networks, Inc. All rights reserved Cautionary Statement on Financial Measures Non GAAP Measures: In preparing the accompanying information,
More informationMobile World Congress Claudine Mangano Director, Global Communications Intel Corporation
Mobile World Congress 2015 Claudine Mangano Director, Global Communications Intel Corporation Mobile World Congress 2015 Brian Krzanich Chief Executive Officer Intel Corporation 4.9B 2X CONNECTED CONNECTED
More informationSophos. Allan Widell Channel Account Executive. 24. August 2017
Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationF-Secure Corporation Interim report Q4 2012
F-Secure Corporation Interim report Q4 2012 (Unaudited) President & CEO Christian Fredrikson February 1, 2013 Protecting the irreplaceable f-secure.com Contents 1. Highlights in Q4 and in 2012 2. Financial
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationWindstream acquisition of Broadview Networks Transaction overview April 13, 2017
Windstream acquisition of Broadview Networks Transaction overview April 13, 2017 Safe Harbor Statement Windstream Holdings, Inc. claim the protection of the safe-harbor for forward-looking statements contained
More informationSTOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.
Intelligence-driven security STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. BETTER INTELLIGENCE. BETTER DEFENSE. The
More informationVMware Reports First Quarter 2009 Results
VMware Reports First Quarter 2009 Results Revenue Increased 7% to $470 Million GAAP Operating Income Increased 80% to $87 Million; Non-GAAP Operating Income Increased 14% to $121 Million GAAP Diluted EPS
More informationSeagate Point of View Cloud and Data Center Trend
DATA IS IN OUR DNA Seagate Point of View Cloud and Data Center Trend Raj Rajagopalan March 2018 1 Safe Harbor Statement This document contains forward-looking statements within the meaning of Section 27A
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSierra Wireless. Corporate Overview. May 2017
Sierra Wireless Corporate Overview May 2017 Sierra Wireless Leader, Innovator, Trusted Partner in the IoT IoT Leader in device-to-cloud solutions Innovator essential IP in Cat M1 edge intelligence open
More informationOracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker
Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker October 14, 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle is currently
More informationInvestor Presentation February 2019
Investor Presentation February 2019 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions, acquisition
More informationConference call February 2, :00 / Helsinki 08:00 / New York 1 Nokia Q4 and FY 2016
Conference call February 2, 2017 15:00 / Helsinki 08:00 / New York 1 Nokia 2016 Q4 and FY 2016 Disclaimer It should be noted that Nokia and its business are exposed to various risks and uncertainties,
More informationAre we breached? Deloitte's Cyber Threat Hunting
Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationManaged Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts
Managed Enterprise Phishing Protection Comprehensive protection delivered 24/7 by anti-phishing experts MANAGED ENTERPRISE PHISHING PROTECTION 24/7 expert protection against phishing attacks that get past
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationJ.P. Morgan Healthcare Conference Investor Presentation Matt Wallach, President & Co-Founder January 14, Veeva Systems veeva.
J.P. Morgan Healthcare Conference Investor Presentation Matt Wallach, President & Co-Founder January 14, 2016 2016 Veeva Systems veeva.com Safe Harbor Forward-looking Statements This presentation contains
More informationInvestor Presentation. December 2017
Investor Presentation December 2017 1 Safe Harbor Caution Concerning Forward-Looking Statements Various remarks that the Company makes contain forward-looking statements regarding acquisitions, acquisition
More informationServices solutions for Managed Service Providers (MSPs)
McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive
More informationINVESTOR PRESENTATION
INVESTOR PRESENTATION Jefferies Technology Conference May 2018 Safe Harbor 2 Safe Harbor Disclaimer This presentation may contain forward-looking information with respect to plans, projections, or future
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More information4 TH. 4Q13 Earnings Conference Call January 28, AT&T Investor Update
4Q13 Earnings Conference Call January 28, 2014 AT&T Investor Update 4 TH 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other marks contained herein are trademarks of
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More informationAccelera'ng Our Path Forward. Stephen Gille8
Accelera'ng Our Path Forward Stephen Gille8 Two Independent Companies with Strong Market Posi'ons $6.7Billion Revenues 1 IM 38% Norton 31% SYMANTEC SECURITY ES 31% INFORMATION MANAGEMENT $4.2 billion Revenue
More informationA Risk Management Platform
A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention
More information2nd Quarter 2017 Earnings Results
2nd Quarter 2017 Earnings Results August 2, 2017 Forward-Looking Statements Except for historical and factual information, the matters set forth in this presentation and other of our oral or written statements
More informationΟ ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος
Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General
More informationBuilding an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO
Building an Effective Threat Intelligence Capability Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO The Race To Digitize Automotive Telematics In-vehicle entertainment
More information(408) (408) NETAPP ANNOUNCES RESULTS FOR SECOND QUARTER FISCAL YEAR 2013
Press Contact: Investor Contact: Ryan Lowry Kris Newton NetApp NetApp (408) 822-7544 (408) 822-3312 ryanl@netapp.com kris.newton@netapp.com NETAPP ANNOUNCES RESULTS FOR SECOND QUARTER FISCAL YEAR 2013
More informationInvestor Presentation. February 2016
Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,
More informationTransforming Security from Defense in Depth to Comprehensive Security Assurance
Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new
More informationCYRUSONE TO ACQUIRE ZENIUM DATA CENTERS
CYRUSONE TO ACQUIRE ZENIUM DATA CENTERS THIRD QUARTER 2017 EARNINGS October 31, 2017 DECEMBER 21, 2017 SAFE HARBOR S A F E H A R B O R This presentation contains forward-looking statements regarding future
More informationTrend Micro Reports Record First Quarter Revenue & Operating Profit
Trend Micro Reports Record First Quarter Revenue & Operating Profit Continued strong growth in U.S and Asia highlight quarter Tokyo, Japan April 25, 2006 Trend Micro, Incorporated (TSE: 4704, NASDAQ: TMIC),
More informationA complete travel commerce experience EXPEDIA, INC.
A complete travel commerce experience Forward-Looking Statements This presentation contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, including
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationChanging the Game: An HPR Approach to Cyber CRM007
Speakers: Changing the Game: An HPR Approach to Cyber CRM007 Michal Gnatek, Senior Vice President, Marsh & McLennan Karen Miller, Sr. Treasury & Risk Manager, FireEye, Inc. Learning Objectives At the end
More informationWi-Fi Perfected. Second Quarter 2017 Earnings Presentation August 7, Proprietary Software. Cloud Analytics. Semiconductors
Wi-Fi Perfected Semiconductors Proprietary Software Cloud Analytics Second Quarter 2017 Earnings Presentation August 7, 2017 Safe Harbor and Non-GAAP Financial Measures This presentation contains forward-looking
More information