SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
TRUST.
CONFIDENCE.
FREEDOM.

PROTECTION.




SYMANTEC PROTECTS
THE DIGITAL WORLD.
PRO
2                                                   SY M A N T EC




TECTION
YOUR INFRASTRUCTURE. YOUR INFORMATION. YOUR INTERACTIONS.
ONLY SYMANTEC PROTECTS THEM ALL.


Today, everyone lives in a digital world. Our entertain-
ment, financial transactions, business activities, and
communications are largely comprised of digital data,
transported over digital networks, and delivered on digi-
tal devices. The benefits have been extraordinary — our
productivity, efficiency, comfort, enjoyment, and ability
                                                              Our digital infrastructures (whether the servers and PCs
to connect and collaborate with others have increased
                                                              of a family business or a vast corporate network), infor-
almost exponentially.
                                                              mation (from personal photos to proprietary research
Unfortunately, so have the potential problems.                data), and interactions (email, instant messaging, file
                                                              sharing, e-commerce, and more) have become both more
Once we only worried about a corrupted hard drive
                                                              integral to our lives and more at risk than ever before.
or disk error that could turn our PC into a slab of useless
                                                              Without protection, those risks can rapidly foster doubt,
metal. As the digital world grew more connected and
                                                              uncertainty, and lack of confidence in the digital world.
distributed, we needed to beware of viruses, worms,
                                                              With protection, however, we can be sure that our infra-
and malicious hackers — not to mention missed soft-
                                                              structures, information, and interactions are secure
ware patches, neglected backup schedules, policy
                                                              and unfettered.
non-compliance, or other self-inflicted mistakes that
could destroy data. Today we still face all of these          Protection inspires trust. It instills confidence. It provides
challenges, as well as insidious emerging threats from        freedom for anyone anywhere to work and play in the
sophisticated criminals who use email phishing,               connected world. Only one company has the experience
spoofing, and phony websites to steal money, personal          and technological expertise to provide this kind of com-
identities, and corporate secrets.                            prehensive digital protection. That company is Symantec.
A PROVEN
APPROACH
Focusing on our customers
has driven Symantec’s trans-
formation into a broad-based
provider of integrated security
and availability solutions for
consumers, small- and medium-
sized businesses, and large
enterprises.
4                                                SY M A N T EC




                                                               …WITH EXACTLY
                                                               THE RIGHT SOLUTION.
                                                               Symantec’s offering is broad, encompassing more than
RECOGNIZE AND RESPOND                                          150 stand-alone and integrated solutions. Our con-
                                                               sumer line of Norton products includes award-winning
TO CUSTOMER NEEDS…                                             desktop security and backup/recovery software. For the
It should be no surprise that Symantec is the worldwide        corporate market, from small- and medium-sized busi-
leader in data security and storage management. After          nesses to large enterprises, we provide network security
all, over the past 24 years we’ve made it our job to recog-    and policy-compliance technology for all tiers: gateway,
nize how the digital universe is changing and to quickly       server, and client, including mobile devices. We also
develop solutions to keep our customers ahead of emerg-        have leading data, systems, and application availability
ing risks. It’s how we’ve evolved from specializing in PC      solutions that optimize backup and recovery, data stor-
utilities and desktop antivirus technology to pioneering       age, and the management of servers, infrastructure, and
advanced storage management solutions to providing             applications in heterogeneous environments.
holistic protection for all of our customers’ digital assets
                                                               And because we recognized that the growing complexity
and activities.
                                                               of large networks would prompt many customers to seek
This focus on our customers has always been one of             help in designing, implementing, and maintaining the
Symantec’s core values — the others are innovation,            protection of their digital assets, Symantec has created
trust, and action — and it has driven our transformation       a global services organization that provides customers
into a broad-based provider of integrated data security        worldwide with training, consulting, and technical sup-
and availability solutions for consumers, small- and           port. We also offer fully outsourced management of our
medium-sized businesses, and large enterprises. These          customers’ security and data management needs. As with
core values continue to inform everything we do, from          all Symantec solutions, our goal is to ensure that custom-
developing new protection technologies to providing            ers have comprehensive and sustainable protection of all
unsurpassed customer service to actively pursuing our          aspects of their digital environments — from infrastruc-
corporate responsibility initiatives.                          ture to information to interactions.
5
SY M A N T EC




                   475 OF THE GLOBAL
                   500 COMPANIES USE
                 SYMANTEC SOLUTIONS




INFRASTRUCTURE                                                   MASTER COMPLEXITY

                                                                 The digital infrastructure of a modern
Whether your infrastructure supports a small- to medium-
                                                                 corporation has become unimaginably
sized business or a large multinational corporation,
                                                                 complex with heterogeneous server
you want to ensure that it is up and running whenever
                                                                 platforms and operating systems, mul-
you need it to be. Symantec helps make it happen by              tiple storage devices, and huge numbers
protecting all layers of your environment against all man-       of applications. In response, Symantec
ner of security threats — viruses, spyware, unauthorized         has developed a uniquely standardized
access — and by enabling you to monitor all elements of          approach to managing information
your digital environment, from stand-alone PCs and               infrastructures: a single layer of software
                                                                 that delivers world-class data protection
servers to complex data centers, to make sure that they
                                                                 and management of all servers, storage
are provisioned, patched, backed up, and running at
                                                                 devices, and applications. We are the only
optimal performance.
                                                                 vendor with the breadth of technology to
                                                                 provide this kind of holistic solution — one
We understand that complexity is unavoidable in today’s
                                                                 that reduces complexity, lowers opera-
heterogeneous environments, so we have developed
                                                                 tional costs, and frees IT to once again be
solutions to provide a standardized management soft-
                                                                 a source of competitive advantage.
ware layer that can support the multiple platforms found
in a modern data center. This unified approach allows
customers to deploy the most advanced storage, server,
and application management tools — for any platform,
in any configuration — and do so more reliably, easily,
and affordably.
Infrastructure management has long been considered
a necessary, but time-consuming and frustrating task.
Symantec protection can transform these critical IT
functions from a cost center into a source of competi-
tive advantage.
INFORMATION
Information can be literally priceless. Unlike physical
assets and infrastructure, digital data cannot simply be
replaced when it is lost or destroyed — and the emo-
tional and financial cost to individuals and corporations
can be huge. With an estimated 75% of a company’s
intellectual property residing in email and messaging sys-
tems, managers need advanced message management
tools to scan inbound and outbound traffic, accurately
categorize the content according to established policies,
and retrieve it — all in a single integrated solution.
                                                             PLAN AHEAD
Symantec can provide all this and more, including best-
of-breed protection against targeted attacks on email        The key to effective digital protection is
and database servers. Our innovative technologies also       being able to identify and act on problems
improve overall data storage and can automatically           as early as possible, and Symantec has de-
                                                             veloped sophisticated tools to see threats
analyze and evaluate archived information for rapid,
                                                             as they emerge around the world. Our
cost-effective discovery and retrieval. And our policy-
                                                             proprietary Global Intelligence Network
compliance solutions are among the most advanced in
                                                             monitors email and web traffic through
the industry, allowing you to define and control your
                                                             more than 24,000 network sensors in 180
internal policy initiatives, meet external regulatory        countries. We track vulnerabilities in
requirements, monitor activity across all tiers and          more than 30,000 operating system and
endpoints, and rapidly remediate deficiencies.                software applications. And we make sure
                                                             our customers are armed with regular up-
Information, personal or corporate, is your most valu-       dates, alerts, and security fixes that allow
able asset. Wherever it resides and however you use          them to translate these early warnings
it, Symantec can help ensure its security, availability,     into proactive preparations that maintain
and integrity.                                               business continuity.
SYMANTEC SENSORS
                   MONITOR MORE
                   THAN 25% OF THE
                   WORLD’S EMAIL




       IDENTITY THEFT
COSTS U.S. BUSINESSES
       MORE THAN $48
    BILLION ANNUALLY
9
SY M A N T EC




                                                               TAKE CONTROL

                                                               Protection isn’t static. It’s a proactive
                                                               discipline that constantly adjusts to
                                                               changing threat environments, new and
                                                               updated policies, and the evolving state
                                                               of your infrastructure, information, and
                                                               interactions. Symantec solutions are
                                                               designed to provide this kind of proactive
                                                               control of your security and data man-
                                                               agement. From our consumer Internet
                                                               security suite to our integrated security
                                                               appliances for small- and medium-sized
                                                               businesses to our Data Center Foundation
                                                               technology for large enterprises, we
                                                               streamline the underlying technology and
                                                               simplify the user interface so that our
                                                               customers can readily enforce the appro-
                                                               priate protection of their digital assets.




INTERACTIONS
The digital world is increasingly defined by collabora-
tion. As the Internet environment has continued to
evolve — driven by ubiquitous high-speed connections
and sophisticated network architectures — individ-
uals and corporations have embraced highly interactive
models like etailing, instant messaging, supply chain
integration, multiplayer gaming, online banking, wikis,
blogs, and more. It’s no longer enough to secure net-
work elements and data inside the firewall; today the
digital interactions themselves need to be protected
from attacks, disruptions, and misuse.
In response, Symantec is developing ways for all partici-
pants in online interactions — businesses and consumers
alike — to verify the identities of other participants. We
are partnering with financial institutions and e-commerce
companies to create stronger trusted models for online
transactions. We are also building tools for real-time pro-
tection of personal information or sensitive corporate
data while it is in transit.
As this kind of open data sharing becomes increasingly
ubiquitous, the boundaries between consumers and
providers will continue to blur and disappear, making inter-
actions the next great protection challenge. Symantec is
committed to meeting that challenge and to maintaining
user confidence in the safety of digital collaboration.
A GLOBAL LEADER
IN DIGITAL
PROTECTION.
AND MORE.
                                                                                        4 Symantec SOCs

                                                                                        11 Symantec Support Centers

                                                                                        8 Symantec Security
                                                                                        Response Labs

                                                                                        72 Symantec Monitored Countries

                                                                                        40,000 Registered Sensors
                                                                                        in 180 Countries




As one of the largest software companies in the world,
Symantec has a truly global perspective on its market
and its business. Nearly half of our fiscal 2006 revenue      Symantec’s active approach also reflects how our corpo-
was generated outside the United States. Our nearly          rate values align with those of our customers. We are,
16,000 employees are active in 40 countries on five           for example, a leading participant in the effort to develop
continents. Our state-of-the-art manufacturing facility in   effective national legislation to protect online consumer
Ireland, our Security Operations Centers around the          privacy. We are also actively involved in Internet safety
globe, and our extensive network of Internet traffic          initiatives, such as the Internet Keep Safe Coalition and
sensors make the company an active citizen of the            National Cyber Security Alliance. We have strong internal
world’s business community.                                  programs that promote workplace and supplier diversity
                                                             and local volunteerism. And we are a member of Sustain-
And as such, we strive to be as engaged and responsible a
                                                             able Silicon Valley, which is committed to reducing energy
citizen as possible. Our emphasis on reasonable and ethi-
                                                             usage and CO² emissions.
cal action reflects a strategic commitment to best business
practices that motivate employees, strengthen customer       Our commitment to corporate responsibility isn’t just a
relationships, confer competitive advantage, and build       reflection of our principles. It’s also a good business prac-
long-term company value. Our signing of the U.N. Global      tice and competitive differentiator, and we believe it has
Compact, a framework of ten principles that address          been — and will continue to be — an important engine of
human rights and labor issues, environmental impacts,        our growth as Symantec strengthens its position as the
and corruption is a clear reflection of that commitment.      world’s preeminent provider of digital protection.
12   SY M A N T EC
Copyright © 2006 Symantec Corporation. All rights reserved. P / N 10733850 Symantec and the Symantec Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Mais conteúdo relacionado

Mais procurados

Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)GuardEra Access Solutions, Inc.
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 

Mais procurados (20)

Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 

Destaque

symc_annual1998
symc_annual1998symc_annual1998
symc_annual1998finance40
 
thermo fisher 2005
thermo fisher 2005thermo fisher 2005
thermo fisher 2005finance40
 
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIfinance40
 
Symantec Final_Symantec_2005_10Kwrap
Symantec  Final_Symantec_2005_10KwrapSymantec  Final_Symantec_2005_10Kwrap
Symantec Final_Symantec_2005_10Kwrapfinance40
 
Symantec 2005_Proxy
Symantec  2005_ProxySymantec  2005_Proxy
Symantec 2005_Proxyfinance40
 

Destaque (6)

symc_annual1998
symc_annual1998symc_annual1998
symc_annual1998
 
thermo fisher 2005
thermo fisher 2005thermo fisher 2005
thermo fisher 2005
 
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
 
Symantec Final_Symantec_2005_10Kwrap
Symantec  Final_Symantec_2005_10KwrapSymantec  Final_Symantec_2005_10Kwrap
Symantec Final_Symantec_2005_10Kwrap
 
Symantec 2005_Proxy
Symantec  2005_ProxySymantec  2005_Proxy
Symantec 2005_Proxy
 
SYMC2007AR
SYMC2007ARSYMC2007AR
SYMC2007AR
 

Semelhante a Symantec 2006_Annual_Report

Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxCompanySeceon
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Cyber Security Company.pptx
Cyber Security Company.pptxCyber Security Company.pptx
Cyber Security Company.pptxCompanySeceon
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Inc
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyTech IT Cloud
 
Company profile sentra english
Company profile sentra englishCompany profile sentra english
Company profile sentra englishSENTRA A.S.
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1Tarek Mekkawy
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 

Semelhante a Symantec 2006_Annual_Report (20)

Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptx
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Cyber Security Company.pptx
Cyber Security Company.pptxCyber Security Company.pptx
Cyber Security Company.pptx
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud company
 
Company profile sentra english
Company profile sentra englishCompany profile sentra english
Company profile sentra english
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 

Mais de finance40

thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIfinance40
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qfinance40
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qfinance40
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qfinance40
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qfinance40
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qfinance40
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qfinance40
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610Kfinance40
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610Kfinance40
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Qfinance40
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Qfinance40
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Qfinance40
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Qfinance40
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Qfinance40
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Qfinance40
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10Kfinance40
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10Kfinance40
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810qfinance40
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810qfinance40
 
thermo fisher tmoq310q
thermo fisher tmoq310qthermo fisher tmoq310q
thermo fisher tmoq310qfinance40
 

Mais de finance40 (20)

thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Q
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Q
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Q
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Q
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Q
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Q
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610K
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610K
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Q
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Q
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Q
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Q
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Q
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Q
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10K
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10K
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810q
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810q
 
thermo fisher tmoq310q
thermo fisher tmoq310qthermo fisher tmoq310q
thermo fisher tmoq310q
 

Último

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfGale Pooley
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modellingbaijup5
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 

Último (20)

CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 

Symantec 2006_Annual_Report

  • 2. PRO
  • 3. 2 SY M A N T EC TECTION YOUR INFRASTRUCTURE. YOUR INFORMATION. YOUR INTERACTIONS. ONLY SYMANTEC PROTECTS THEM ALL. Today, everyone lives in a digital world. Our entertain- ment, financial transactions, business activities, and communications are largely comprised of digital data, transported over digital networks, and delivered on digi- tal devices. The benefits have been extraordinary — our productivity, efficiency, comfort, enjoyment, and ability Our digital infrastructures (whether the servers and PCs to connect and collaborate with others have increased of a family business or a vast corporate network), infor- almost exponentially. mation (from personal photos to proprietary research Unfortunately, so have the potential problems. data), and interactions (email, instant messaging, file sharing, e-commerce, and more) have become both more Once we only worried about a corrupted hard drive integral to our lives and more at risk than ever before. or disk error that could turn our PC into a slab of useless Without protection, those risks can rapidly foster doubt, metal. As the digital world grew more connected and uncertainty, and lack of confidence in the digital world. distributed, we needed to beware of viruses, worms, With protection, however, we can be sure that our infra- and malicious hackers — not to mention missed soft- structures, information, and interactions are secure ware patches, neglected backup schedules, policy and unfettered. non-compliance, or other self-inflicted mistakes that could destroy data. Today we still face all of these Protection inspires trust. It instills confidence. It provides challenges, as well as insidious emerging threats from freedom for anyone anywhere to work and play in the sophisticated criminals who use email phishing, connected world. Only one company has the experience spoofing, and phony websites to steal money, personal and technological expertise to provide this kind of com- identities, and corporate secrets. prehensive digital protection. That company is Symantec.
  • 4. A PROVEN APPROACH Focusing on our customers has driven Symantec’s trans- formation into a broad-based provider of integrated security and availability solutions for consumers, small- and medium- sized businesses, and large enterprises.
  • 5. 4 SY M A N T EC …WITH EXACTLY THE RIGHT SOLUTION. Symantec’s offering is broad, encompassing more than RECOGNIZE AND RESPOND 150 stand-alone and integrated solutions. Our con- sumer line of Norton products includes award-winning TO CUSTOMER NEEDS… desktop security and backup/recovery software. For the It should be no surprise that Symantec is the worldwide corporate market, from small- and medium-sized busi- leader in data security and storage management. After nesses to large enterprises, we provide network security all, over the past 24 years we’ve made it our job to recog- and policy-compliance technology for all tiers: gateway, nize how the digital universe is changing and to quickly server, and client, including mobile devices. We also develop solutions to keep our customers ahead of emerg- have leading data, systems, and application availability ing risks. It’s how we’ve evolved from specializing in PC solutions that optimize backup and recovery, data stor- utilities and desktop antivirus technology to pioneering age, and the management of servers, infrastructure, and advanced storage management solutions to providing applications in heterogeneous environments. holistic protection for all of our customers’ digital assets And because we recognized that the growing complexity and activities. of large networks would prompt many customers to seek This focus on our customers has always been one of help in designing, implementing, and maintaining the Symantec’s core values — the others are innovation, protection of their digital assets, Symantec has created trust, and action — and it has driven our transformation a global services organization that provides customers into a broad-based provider of integrated data security worldwide with training, consulting, and technical sup- and availability solutions for consumers, small- and port. We also offer fully outsourced management of our medium-sized businesses, and large enterprises. These customers’ security and data management needs. As with core values continue to inform everything we do, from all Symantec solutions, our goal is to ensure that custom- developing new protection technologies to providing ers have comprehensive and sustainable protection of all unsurpassed customer service to actively pursuing our aspects of their digital environments — from infrastruc- corporate responsibility initiatives. ture to information to interactions.
  • 6. 5 SY M A N T EC 475 OF THE GLOBAL 500 COMPANIES USE SYMANTEC SOLUTIONS INFRASTRUCTURE MASTER COMPLEXITY The digital infrastructure of a modern Whether your infrastructure supports a small- to medium- corporation has become unimaginably sized business or a large multinational corporation, complex with heterogeneous server you want to ensure that it is up and running whenever platforms and operating systems, mul- you need it to be. Symantec helps make it happen by tiple storage devices, and huge numbers protecting all layers of your environment against all man- of applications. In response, Symantec ner of security threats — viruses, spyware, unauthorized has developed a uniquely standardized access — and by enabling you to monitor all elements of approach to managing information your digital environment, from stand-alone PCs and infrastructures: a single layer of software that delivers world-class data protection servers to complex data centers, to make sure that they and management of all servers, storage are provisioned, patched, backed up, and running at devices, and applications. We are the only optimal performance. vendor with the breadth of technology to provide this kind of holistic solution — one We understand that complexity is unavoidable in today’s that reduces complexity, lowers opera- heterogeneous environments, so we have developed tional costs, and frees IT to once again be solutions to provide a standardized management soft- a source of competitive advantage. ware layer that can support the multiple platforms found in a modern data center. This unified approach allows customers to deploy the most advanced storage, server, and application management tools — for any platform, in any configuration — and do so more reliably, easily, and affordably. Infrastructure management has long been considered a necessary, but time-consuming and frustrating task. Symantec protection can transform these critical IT functions from a cost center into a source of competi- tive advantage.
  • 7.
  • 8. INFORMATION Information can be literally priceless. Unlike physical assets and infrastructure, digital data cannot simply be replaced when it is lost or destroyed — and the emo- tional and financial cost to individuals and corporations can be huge. With an estimated 75% of a company’s intellectual property residing in email and messaging sys- tems, managers need advanced message management tools to scan inbound and outbound traffic, accurately categorize the content according to established policies, and retrieve it — all in a single integrated solution. PLAN AHEAD Symantec can provide all this and more, including best- of-breed protection against targeted attacks on email The key to effective digital protection is and database servers. Our innovative technologies also being able to identify and act on problems improve overall data storage and can automatically as early as possible, and Symantec has de- veloped sophisticated tools to see threats analyze and evaluate archived information for rapid, as they emerge around the world. Our cost-effective discovery and retrieval. And our policy- proprietary Global Intelligence Network compliance solutions are among the most advanced in monitors email and web traffic through the industry, allowing you to define and control your more than 24,000 network sensors in 180 internal policy initiatives, meet external regulatory countries. We track vulnerabilities in requirements, monitor activity across all tiers and more than 30,000 operating system and endpoints, and rapidly remediate deficiencies. software applications. And we make sure our customers are armed with regular up- Information, personal or corporate, is your most valu- dates, alerts, and security fixes that allow able asset. Wherever it resides and however you use them to translate these early warnings it, Symantec can help ensure its security, availability, into proactive preparations that maintain and integrity. business continuity.
  • 9. SYMANTEC SENSORS MONITOR MORE THAN 25% OF THE WORLD’S EMAIL IDENTITY THEFT COSTS U.S. BUSINESSES MORE THAN $48 BILLION ANNUALLY
  • 10. 9 SY M A N T EC TAKE CONTROL Protection isn’t static. It’s a proactive discipline that constantly adjusts to changing threat environments, new and updated policies, and the evolving state of your infrastructure, information, and interactions. Symantec solutions are designed to provide this kind of proactive control of your security and data man- agement. From our consumer Internet security suite to our integrated security appliances for small- and medium-sized businesses to our Data Center Foundation technology for large enterprises, we streamline the underlying technology and simplify the user interface so that our customers can readily enforce the appro- priate protection of their digital assets. INTERACTIONS The digital world is increasingly defined by collabora- tion. As the Internet environment has continued to evolve — driven by ubiquitous high-speed connections and sophisticated network architectures — individ- uals and corporations have embraced highly interactive models like etailing, instant messaging, supply chain integration, multiplayer gaming, online banking, wikis, blogs, and more. It’s no longer enough to secure net- work elements and data inside the firewall; today the digital interactions themselves need to be protected from attacks, disruptions, and misuse. In response, Symantec is developing ways for all partici- pants in online interactions — businesses and consumers alike — to verify the identities of other participants. We are partnering with financial institutions and e-commerce companies to create stronger trusted models for online transactions. We are also building tools for real-time pro- tection of personal information or sensitive corporate data while it is in transit. As this kind of open data sharing becomes increasingly ubiquitous, the boundaries between consumers and providers will continue to blur and disappear, making inter- actions the next great protection challenge. Symantec is committed to meeting that challenge and to maintaining user confidence in the safety of digital collaboration.
  • 11.
  • 12. A GLOBAL LEADER IN DIGITAL PROTECTION. AND MORE. 4 Symantec SOCs 11 Symantec Support Centers 8 Symantec Security Response Labs 72 Symantec Monitored Countries 40,000 Registered Sensors in 180 Countries As one of the largest software companies in the world, Symantec has a truly global perspective on its market and its business. Nearly half of our fiscal 2006 revenue Symantec’s active approach also reflects how our corpo- was generated outside the United States. Our nearly rate values align with those of our customers. We are, 16,000 employees are active in 40 countries on five for example, a leading participant in the effort to develop continents. Our state-of-the-art manufacturing facility in effective national legislation to protect online consumer Ireland, our Security Operations Centers around the privacy. We are also actively involved in Internet safety globe, and our extensive network of Internet traffic initiatives, such as the Internet Keep Safe Coalition and sensors make the company an active citizen of the National Cyber Security Alliance. We have strong internal world’s business community. programs that promote workplace and supplier diversity and local volunteerism. And we are a member of Sustain- And as such, we strive to be as engaged and responsible a able Silicon Valley, which is committed to reducing energy citizen as possible. Our emphasis on reasonable and ethi- usage and CO² emissions. cal action reflects a strategic commitment to best business practices that motivate employees, strengthen customer Our commitment to corporate responsibility isn’t just a relationships, confer competitive advantage, and build reflection of our principles. It’s also a good business prac- long-term company value. Our signing of the U.N. Global tice and competitive differentiator, and we believe it has Compact, a framework of ten principles that address been — and will continue to be — an important engine of human rights and labor issues, environmental impacts, our growth as Symantec strengthens its position as the and corruption is a clear reflection of that commitment. world’s preeminent provider of digital protection.
  • 13. 12 SY M A N T EC
  • 14. Copyright © 2006 Symantec Corporation. All rights reserved. P / N 10733850 Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.