Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
6/29/2011
1
1
Mobile Security OverviewRob Greer, VP Endpoint Management and Mobility Product Management
Dave Cole, Sr. Director Consumer Mobile Product Management
June 29, 2011
Forward-Looking Statements
This presentation contains statements regarding our projected financial and business results, which may be considered forward-looking within the meaning of the U.S. federal securities laws. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, levels of activity, performance or achievements to differ materially from results expressed or implied in this presentation. Such risk factors include those related to: maintaining customer and partner relationships; the anticipated growth of certain market segments, particularly with regard to security and storage; the competitive environment in the software industry; changes to operating systems and product strategy by vendors of operating systems; fluctuations in currency exchange rates; the timing and market acceptance of new product releases and upgrades; the successful development of new products and integration of acquired businesses; and the degree to which these products and businesses gain market acceptance. Actual results may differ materially from those contained in the forward-looking statements in this presentation. Additional information concerning these and other risk factors is contained in the Risk Factors section of our Form 10-K for the year ended April 1, 2011.
We assume no obligation to update any forward-looking information contained in this presentation.
2
6/29/2011
2
Agenda
3
Enterprise Mobile Security1
Consumer Mobile Security2
Summary3
Q&A4
4
Enterprise Mobile Security
Rob Greer - VP Endpoint Management and Mobility Product Management
6/29/2011
3
Devices
Corporate-Owned Personally-Owned
Man
age
dU
nm
anag
ed
Future Devices
177M Corp PCs300M Smartphones
15M Tablets
246M Corp PCs293M Personal PCs819M Smartphones
116M Tablets
Disruptive Industry Trends
5
Relevent Devices
Today
Full
Co
ntr
ol
Info
/Ap
p O
nly
Acc
ess
TraditionalFocus
EvolvingFocus
Increased Risk of Data Loss
Explosion of New Devices
New Apps Must Be Supported
•How do I enterprise-activate these devices?
•How do I manage application deployment & associated costs?
•How do I protect corporate secrets, protect the brand & comply with regulations?
1B+ SmartPhones / Tablets by 2014
6
Enterprise Challenges
Infrastructure Silos
•Who will own enterprise mobility?
CIO
Messaging
Security Ops
Info Security
Desktop Ops
6/29/2011
4
Symantec’s Approach to Enterprise Mobility
7
Manage
Authenticate
ConfigureProtect
• Configure
– Enterprise activation
– Policy compliance
– Application management
• Authenticate
– Secure access for Users, Devices AND Applications
• Protect
– Messaging security
– Threat protection
– DLP & Encryption
• Manage
– Central management
– Enterprise integration
– Business processes
Symantec’s Enterprise SolutionCONFIGURE
8
Robust policy and compliance control
Enterprise Policy
• Functions– Device Policy Controls
• Security Settings: Password Protect, Lock, Wipe
• Group Based Policy Management
• Device Specific API Support
– Application and Configuration Management
• User Enrollment
• Auto-configuration of Enterprise Services
• Application distribution services
– Compliance
• Actionable data: Device, User, App, Data
• Policy Enforcement
• Auditing and Reporting
• Symantec Products– Symantec Mobile Management
6/29/2011
5
Symantec’s Enterprise SolutionAUTHENTICATE
9
Enterprise authentication and access
Secure Access
• Functions– Strong User Authentication
• User Authentication and Security Settings
• Client certificate authentication for email
• VPN, Wi-Fi and Web apps: End-to-end solution
– Device Access Control
• Device Authentication
– Enterprise Authentication Options
• Embedded App Authentication
• Fraud Prevention
• Symantec Products– Managed Public Key Infrastructure Platform
– VeriSign Identity Protection Access for Mobile
Symantec’s Enterprise SolutionPROTECT
10
Protect your most valuable assets: information
Information Protection
• Functions– Core Threat Protection
• Antimalware
• Firewall Capabilities for Legacy Devices
– Encryption
• End to end Email Encryption
• Full Device Encryption Compliance/Management
– Security Options
• Email DLP
• Application & Removable Media Access Control
• Symantec Products– PGP Encryption
– Data Loss Prevention
– Symantec.cloud
6/29/2011
6
Symantec’s Enterprise SolutionMANAGE
11
Complete cross platform management
Enterprise Integration
• Functions– Endpoint Management
• Integrated management for ALL endpoints
• OS and application inventory
– Business Processes
• Workflow integration
• Common console and APIs
• Symantec Products– Symantec Workflow
– Client Management Suite
– Symantec Service Desk
Enterprise Routes to Market
12
Direct Carriers ManufacturersVARs / MSPs Cloud
6/29/2011
7
13
Consumer Mobile Security
Dave Cole - Sr. Director Consumer Mobile Product Management
We Are Successfully Expanding Our Consumer Business Beyond The PC
14
NortonLive Services• New subscription services launched
• 2.3M active PC Checkup users
• 11 new partners in last year
People
Norton Data Services• #1 in consumer online backup
• 70+ petabytes of customer data
• 66% increase in non-Norton 360 users
Information
27% revenue growth in consumer services
6/29/2011
8
Our Consumer Mobile Approach
15
Multi-DeviceServices w/ Apps
Many acquisition channels, single
experience
Beyond Device Security
Norton Mobile Security: Android
16
A logical starting point, but only 1 example
• Stand-alone app for phones, tablets• Entry point to AntiTheft service (future)• Beta versions distributed via App Market• Sold via partners worldwide in retail, carriers• “Lite” version available shortly in App Markets
6/29/2011
9
Consumer Mobile Product Strategy
17
Example: Mobile Security for Android
APPS
SERVICES
PACKAGES
upsell to
upsell to
Monetizing the Consumer Mobile Opportunity
18
We will use a combination of methods for each app & service
Freemium Paid Apps Ad BasedUpsell Service Upsell Package
Use a limited, free version of certain apps to
acquire customers
Sell throughpartners &
app markets
Extension of Safe Search
business to protect web browsing on tablets & phones
Upsell free & paid app users to
a cross-device, multi-OS service
Use mobile features as part of a premium
package to drivehigher ASP and
retention
6/29/2011
10
Consumer Channel Strategy for Mobile SecurityWill vary by service, combines free & paid offerings
19
The 1st Year of “Norton Everywhere”
NortonMobile Security• AntiMalware
• AntiTheft
• Web Safety
• Call & text blocking
New in Beta
• Service Expansion: Norton OnlineFamily To Go
• Experiment: Norton Mobile Utilities
Future Services Planned• New applications
• Expanded device & OS support
Norton DNS• Web safety for
home, hot spots
• Parental controls
• Malware &spyware blocking
25+ new partners
20
6/29/2011
11
Summary
• We are delivering an enterprise mobile solution that uniquely allows organizations to centrally manage device configuration, user authentication, and information protection.
• We are penetrating the enterprise mobile market opportunity through a variety of new and existing channels and relationships.
• We are extending consumer solutions beyond mobile device security to include services and an experience that allows users to access information anytime, anywhere, from any device.
• We are leveraging our consumer strength across distribution channels through a combination of free and paid, up-sell and cross-sell, and indirect business models.
21
We have clear plans in place to capture the mobile opportunity
22
Questions & Answers
6/29/2011
12
Thank you
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you
23