SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
TRUST.
CONFIDENCE.
FREEDOM.

PROTECTION.




SYMANTEC PROTECTS
THE DIGITAL WORLD.
PRO
2                                                   SY M A N T EC




TECTION
YOUR INFRASTRUCTURE. YOUR INFORMATION. YOUR INTERACTIONS.
ONLY SYMANTEC PROTECTS THEM ALL.


Today, everyone lives in a digital world. Our entertain-
ment, financial transactions, business activities, and
communications are largely comprised of digital data,
transported over digital networks, and delivered on digi-
tal devices. The benefits have been extraordinary — our
productivity, efficiency, comfort, enjoyment, and ability
                                                              Our digital infrastructures (whether the servers and PCs
to connect and collaborate with others have increased
                                                              of a family business or a vast corporate network), infor-
almost exponentially.
                                                              mation (from personal photos to proprietary research
Unfortunately, so have the potential problems.                data), and interactions (email, instant messaging, file
                                                              sharing, e-commerce, and more) have become both more
Once we only worried about a corrupted hard drive
                                                              integral to our lives and more at risk than ever before.
or disk error that could turn our PC into a slab of useless
                                                              Without protection, those risks can rapidly foster doubt,
metal. As the digital world grew more connected and
                                                              uncertainty, and lack of confidence in the digital world.
distributed, we needed to beware of viruses, worms,
                                                              With protection, however, we can be sure that our infra-
and malicious hackers — not to mention missed soft-
                                                              structures, information, and interactions are secure
ware patches, neglected backup schedules, policy
                                                              and unfettered.
non-compliance, or other self-inflicted mistakes that
could destroy data. Today we still face all of these          Protection inspires trust. It instills confidence. It provides
challenges, as well as insidious emerging threats from        freedom for anyone anywhere to work and play in the
sophisticated criminals who use email phishing,               connected world. Only one company has the experience
spoofing, and phony websites to steal money, personal          and technological expertise to provide this kind of com-
identities, and corporate secrets.                            prehensive digital protection. That company is Symantec.
A PROVEN
APPROACH
Focusing on our customers
has driven Symantec’s trans-
formation into a broad-based
provider of integrated security
and availability solutions for
consumers, small- and medium-
sized businesses, and large
enterprises.
4                                                SY M A N T EC




                                                               …WITH EXACTLY
                                                               THE RIGHT SOLUTION.
                                                               Symantec’s offering is broad, encompassing more than
RECOGNIZE AND RESPOND                                          150 stand-alone and integrated solutions. Our con-
                                                               sumer line of Norton products includes award-winning
TO CUSTOMER NEEDS…                                             desktop security and backup/recovery software. For the
It should be no surprise that Symantec is the worldwide        corporate market, from small- and medium-sized busi-
leader in data security and storage management. After          nesses to large enterprises, we provide network security
all, over the past 24 years we’ve made it our job to recog-    and policy-compliance technology for all tiers: gateway,
nize how the digital universe is changing and to quickly       server, and client, including mobile devices. We also
develop solutions to keep our customers ahead of emerg-        have leading data, systems, and application availability
ing risks. It’s how we’ve evolved from specializing in PC      solutions that optimize backup and recovery, data stor-
utilities and desktop antivirus technology to pioneering       age, and the management of servers, infrastructure, and
advanced storage management solutions to providing             applications in heterogeneous environments.
holistic protection for all of our customers’ digital assets
                                                               And because we recognized that the growing complexity
and activities.
                                                               of large networks would prompt many customers to seek
This focus on our customers has always been one of             help in designing, implementing, and maintaining the
Symantec’s core values — the others are innovation,            protection of their digital assets, Symantec has created
trust, and action — and it has driven our transformation       a global services organization that provides customers
into a broad-based provider of integrated data security        worldwide with training, consulting, and technical sup-
and availability solutions for consumers, small- and           port. We also offer fully outsourced management of our
medium-sized businesses, and large enterprises. These          customers’ security and data management needs. As with
core values continue to inform everything we do, from          all Symantec solutions, our goal is to ensure that custom-
developing new protection technologies to providing            ers have comprehensive and sustainable protection of all
unsurpassed customer service to actively pursuing our          aspects of their digital environments — from infrastruc-
corporate responsibility initiatives.                          ture to information to interactions.
5
SY M A N T EC




                   475 OF THE GLOBAL
                   500 COMPANIES USE
                 SYMANTEC SOLUTIONS




INFRASTRUCTURE                                                   MASTER COMPLEXITY

                                                                 The digital infrastructure of a modern
Whether your infrastructure supports a small- to medium-
                                                                 corporation has become unimaginably
sized business or a large multinational corporation,
                                                                 complex with heterogeneous server
you want to ensure that it is up and running whenever
                                                                 platforms and operating systems, mul-
you need it to be. Symantec helps make it happen by              tiple storage devices, and huge numbers
protecting all layers of your environment against all man-       of applications. In response, Symantec
ner of security threats — viruses, spyware, unauthorized         has developed a uniquely standardized
access — and by enabling you to monitor all elements of          approach to managing information
your digital environment, from stand-alone PCs and               infrastructures: a single layer of software
                                                                 that delivers world-class data protection
servers to complex data centers, to make sure that they
                                                                 and management of all servers, storage
are provisioned, patched, backed up, and running at
                                                                 devices, and applications. We are the only
optimal performance.
                                                                 vendor with the breadth of technology to
                                                                 provide this kind of holistic solution — one
We understand that complexity is unavoidable in today’s
                                                                 that reduces complexity, lowers opera-
heterogeneous environments, so we have developed
                                                                 tional costs, and frees IT to once again be
solutions to provide a standardized management soft-
                                                                 a source of competitive advantage.
ware layer that can support the multiple platforms found
in a modern data center. This unified approach allows
customers to deploy the most advanced storage, server,
and application management tools — for any platform,
in any configuration — and do so more reliably, easily,
and affordably.
Infrastructure management has long been considered
a necessary, but time-consuming and frustrating task.
Symantec protection can transform these critical IT
functions from a cost center into a source of competi-
tive advantage.
INFORMATION
Information can be literally priceless. Unlike physical
assets and infrastructure, digital data cannot simply be
replaced when it is lost or destroyed — and the emo-
tional and financial cost to individuals and corporations
can be huge. With an estimated 75% of a company’s
intellectual property residing in email and messaging sys-
tems, managers need advanced message management
tools to scan inbound and outbound traffic, accurately
categorize the content according to established policies,
and retrieve it — all in a single integrated solution.
                                                             PLAN AHEAD
Symantec can provide all this and more, including best-
of-breed protection against targeted attacks on email        The key to effective digital protection is
and database servers. Our innovative technologies also       being able to identify and act on problems
improve overall data storage and can automatically           as early as possible, and Symantec has de-
                                                             veloped sophisticated tools to see threats
analyze and evaluate archived information for rapid,
                                                             as they emerge around the world. Our
cost-effective discovery and retrieval. And our policy-
                                                             proprietary Global Intelligence Network
compliance solutions are among the most advanced in
                                                             monitors email and web traffic through
the industry, allowing you to define and control your
                                                             more than 24,000 network sensors in 180
internal policy initiatives, meet external regulatory        countries. We track vulnerabilities in
requirements, monitor activity across all tiers and          more than 30,000 operating system and
endpoints, and rapidly remediate deficiencies.                software applications. And we make sure
                                                             our customers are armed with regular up-
Information, personal or corporate, is your most valu-       dates, alerts, and security fixes that allow
able asset. Wherever it resides and however you use          them to translate these early warnings
it, Symantec can help ensure its security, availability,     into proactive preparations that maintain
and integrity.                                               business continuity.
SYMANTEC SENSORS
                   MONITOR MORE
                   THAN 25% OF THE
                   WORLD’S EMAIL




       IDENTITY THEFT
COSTS U.S. BUSINESSES
       MORE THAN $48
    BILLION ANNUALLY
9
SY M A N T EC




                                                               TAKE CONTROL

                                                               Protection isn’t static. It’s a proactive
                                                               discipline that constantly adjusts to
                                                               changing threat environments, new and
                                                               updated policies, and the evolving state
                                                               of your infrastructure, information, and
                                                               interactions. Symantec solutions are
                                                               designed to provide this kind of proactive
                                                               control of your security and data man-
                                                               agement. From our consumer Internet
                                                               security suite to our integrated security
                                                               appliances for small- and medium-sized
                                                               businesses to our Data Center Foundation
                                                               technology for large enterprises, we
                                                               streamline the underlying technology and
                                                               simplify the user interface so that our
                                                               customers can readily enforce the appro-
                                                               priate protection of their digital assets.




INTERACTIONS
The digital world is increasingly defined by collabora-
tion. As the Internet environment has continued to
evolve — driven by ubiquitous high-speed connections
and sophisticated network architectures — individ-
uals and corporations have embraced highly interactive
models like etailing, instant messaging, supply chain
integration, multiplayer gaming, online banking, wikis,
blogs, and more. It’s no longer enough to secure net-
work elements and data inside the firewall; today the
digital interactions themselves need to be protected
from attacks, disruptions, and misuse.
In response, Symantec is developing ways for all partici-
pants in online interactions — businesses and consumers
alike — to verify the identities of other participants. We
are partnering with financial institutions and e-commerce
companies to create stronger trusted models for online
transactions. We are also building tools for real-time pro-
tection of personal information or sensitive corporate
data while it is in transit.
As this kind of open data sharing becomes increasingly
ubiquitous, the boundaries between consumers and
providers will continue to blur and disappear, making inter-
actions the next great protection challenge. Symantec is
committed to meeting that challenge and to maintaining
user confidence in the safety of digital collaboration.
A GLOBAL LEADER
IN DIGITAL
PROTECTION.
AND MORE.
                                                                                        4 Symantec SOCs

                                                                                        11 Symantec Support Centers

                                                                                        8 Symantec Security
                                                                                        Response Labs

                                                                                        72 Symantec Monitored Countries

                                                                                        40,000 Registered Sensors
                                                                                        in 180 Countries




As one of the largest software companies in the world,
Symantec has a truly global perspective on its market
and its business. Nearly half of our fiscal 2006 revenue      Symantec’s active approach also reflects how our corpo-
was generated outside the United States. Our nearly          rate values align with those of our customers. We are,
16,000 employees are active in 40 countries on five           for example, a leading participant in the effort to develop
continents. Our state-of-the-art manufacturing facility in   effective national legislation to protect online consumer
Ireland, our Security Operations Centers around the          privacy. We are also actively involved in Internet safety
globe, and our extensive network of Internet traffic          initiatives, such as the Internet Keep Safe Coalition and
sensors make the company an active citizen of the            National Cyber Security Alliance. We have strong internal
world’s business community.                                  programs that promote workplace and supplier diversity
                                                             and local volunteerism. And we are a member of Sustain-
And as such, we strive to be as engaged and responsible a
                                                             able Silicon Valley, which is committed to reducing energy
citizen as possible. Our emphasis on reasonable and ethi-
                                                             usage and CO² emissions.
cal action reflects a strategic commitment to best business
practices that motivate employees, strengthen customer       Our commitment to corporate responsibility isn’t just a
relationships, confer competitive advantage, and build       reflection of our principles. It’s also a good business prac-
long-term company value. Our signing of the U.N. Global      tice and competitive differentiator, and we believe it has
Compact, a framework of ten principles that address          been — and will continue to be — an important engine of
human rights and labor issues, environmental impacts,        our growth as Symantec strengthens its position as the
and corruption is a clear reflection of that commitment.      world’s preeminent provider of digital protection.
12   SY M A N T EC
Copyright © 2006 Symantec Corporation. All rights reserved. P / N 10733850 Symantec and the Symantec Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Más contenido relacionado

La actualidad más candente

Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)GuardEra Access Solutions, Inc.
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 

La actualidad más candente (20)

Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 

Destacado

symc_annual1998
symc_annual1998symc_annual1998
symc_annual1998finance40
 
thermo fisher 2005
thermo fisher 2005thermo fisher 2005
thermo fisher 2005finance40
 
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIfinance40
 
Symantec Final_Symantec_2005_10Kwrap
Symantec  Final_Symantec_2005_10KwrapSymantec  Final_Symantec_2005_10Kwrap
Symantec Final_Symantec_2005_10Kwrapfinance40
 
Symantec 2005_Proxy
Symantec  2005_ProxySymantec  2005_Proxy
Symantec 2005_Proxyfinance40
 

Destacado (6)

symc_annual1998
symc_annual1998symc_annual1998
symc_annual1998
 
thermo fisher 2005
thermo fisher 2005thermo fisher 2005
thermo fisher 2005
 
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher  ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
 
Symantec Final_Symantec_2005_10Kwrap
Symantec  Final_Symantec_2005_10KwrapSymantec  Final_Symantec_2005_10Kwrap
Symantec Final_Symantec_2005_10Kwrap
 
Symantec 2005_Proxy
Symantec  2005_ProxySymantec  2005_Proxy
Symantec 2005_Proxy
 
SYMC2007AR
SYMC2007ARSYMC2007AR
SYMC2007AR
 

Similar a Symantec 2006_Annual_Report

Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxCompanySeceon
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Cyber Security Company.pptx
Cyber Security Company.pptxCyber Security Company.pptx
Cyber Security Company.pptxCompanySeceon
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyTech IT Cloud
 
Company profile sentra english
Company profile sentra englishCompany profile sentra english
Company profile sentra englishSENTRA A.S.
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1Tarek Mekkawy
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 

Similar a Symantec 2006_Annual_Report (20)

Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptx
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Cyber Security Company.pptx
Cyber Security Company.pptxCyber Security Company.pptx
Cyber Security Company.pptx
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud company
 
Company profile sentra english
Company profile sentra englishCompany profile sentra english
Company profile sentra english
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 

Más de finance40

thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIfinance40
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qfinance40
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qfinance40
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qfinance40
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qfinance40
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qfinance40
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qfinance40
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610Kfinance40
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610Kfinance40
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Qfinance40
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Qfinance40
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Qfinance40
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Qfinance40
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Qfinance40
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Qfinance40
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10Kfinance40
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10Kfinance40
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810qfinance40
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810qfinance40
 
thermo fisher tmoq310q
thermo fisher tmoq310qthermo fisher tmoq310q
thermo fisher tmoq310qfinance40
 

Más de finance40 (20)

thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Q
 
thermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Qthermo fisher 04/01/06_10Q
thermo fisher 04/01/06_10Q
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Q
 
thermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Qthermo fisher 07/01/06_10Q
thermo fisher 07/01/06_10Q
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Q
 
thermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Qthermo fisher 09/30/06_10Q
thermo fisher 09/30/06_10Q
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610K
 
thermo fisher 12/30/0610K
thermo fisher 12/30/0610Kthermo fisher 12/30/0610K
thermo fisher 12/30/0610K
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Q
 
thermo fisher Q107_10Q
thermo fisher Q107_10Qthermo fisher Q107_10Q
thermo fisher Q107_10Q
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Q
 
thermo fisher Q207_10Q
thermo fisher Q207_10Qthermo fisher Q207_10Q
thermo fisher Q207_10Q
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Q
 
thermo fisher Q307_10Q
thermo fisher Q307_10Qthermo fisher Q307_10Q
thermo fisher Q307_10Q
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10K
 
tmo_2007_10K
tmo_2007_10Ktmo_2007_10K
tmo_2007_10K
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810q
 
thermo fisher Q10810q
thermo fisher Q10810qthermo fisher Q10810q
thermo fisher Q10810q
 
thermo fisher tmoq310q
thermo fisher tmoq310qthermo fisher tmoq310q
thermo fisher tmoq310q
 

Último

NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingAbdi118682
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 

Último (20)

NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial Accounting
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 

Symantec 2006_Annual_Report

  • 2. PRO
  • 3. 2 SY M A N T EC TECTION YOUR INFRASTRUCTURE. YOUR INFORMATION. YOUR INTERACTIONS. ONLY SYMANTEC PROTECTS THEM ALL. Today, everyone lives in a digital world. Our entertain- ment, financial transactions, business activities, and communications are largely comprised of digital data, transported over digital networks, and delivered on digi- tal devices. The benefits have been extraordinary — our productivity, efficiency, comfort, enjoyment, and ability Our digital infrastructures (whether the servers and PCs to connect and collaborate with others have increased of a family business or a vast corporate network), infor- almost exponentially. mation (from personal photos to proprietary research Unfortunately, so have the potential problems. data), and interactions (email, instant messaging, file sharing, e-commerce, and more) have become both more Once we only worried about a corrupted hard drive integral to our lives and more at risk than ever before. or disk error that could turn our PC into a slab of useless Without protection, those risks can rapidly foster doubt, metal. As the digital world grew more connected and uncertainty, and lack of confidence in the digital world. distributed, we needed to beware of viruses, worms, With protection, however, we can be sure that our infra- and malicious hackers — not to mention missed soft- structures, information, and interactions are secure ware patches, neglected backup schedules, policy and unfettered. non-compliance, or other self-inflicted mistakes that could destroy data. Today we still face all of these Protection inspires trust. It instills confidence. It provides challenges, as well as insidious emerging threats from freedom for anyone anywhere to work and play in the sophisticated criminals who use email phishing, connected world. Only one company has the experience spoofing, and phony websites to steal money, personal and technological expertise to provide this kind of com- identities, and corporate secrets. prehensive digital protection. That company is Symantec.
  • 4. A PROVEN APPROACH Focusing on our customers has driven Symantec’s trans- formation into a broad-based provider of integrated security and availability solutions for consumers, small- and medium- sized businesses, and large enterprises.
  • 5. 4 SY M A N T EC …WITH EXACTLY THE RIGHT SOLUTION. Symantec’s offering is broad, encompassing more than RECOGNIZE AND RESPOND 150 stand-alone and integrated solutions. Our con- sumer line of Norton products includes award-winning TO CUSTOMER NEEDS… desktop security and backup/recovery software. For the It should be no surprise that Symantec is the worldwide corporate market, from small- and medium-sized busi- leader in data security and storage management. After nesses to large enterprises, we provide network security all, over the past 24 years we’ve made it our job to recog- and policy-compliance technology for all tiers: gateway, nize how the digital universe is changing and to quickly server, and client, including mobile devices. We also develop solutions to keep our customers ahead of emerg- have leading data, systems, and application availability ing risks. It’s how we’ve evolved from specializing in PC solutions that optimize backup and recovery, data stor- utilities and desktop antivirus technology to pioneering age, and the management of servers, infrastructure, and advanced storage management solutions to providing applications in heterogeneous environments. holistic protection for all of our customers’ digital assets And because we recognized that the growing complexity and activities. of large networks would prompt many customers to seek This focus on our customers has always been one of help in designing, implementing, and maintaining the Symantec’s core values — the others are innovation, protection of their digital assets, Symantec has created trust, and action — and it has driven our transformation a global services organization that provides customers into a broad-based provider of integrated data security worldwide with training, consulting, and technical sup- and availability solutions for consumers, small- and port. We also offer fully outsourced management of our medium-sized businesses, and large enterprises. These customers’ security and data management needs. As with core values continue to inform everything we do, from all Symantec solutions, our goal is to ensure that custom- developing new protection technologies to providing ers have comprehensive and sustainable protection of all unsurpassed customer service to actively pursuing our aspects of their digital environments — from infrastruc- corporate responsibility initiatives. ture to information to interactions.
  • 6. 5 SY M A N T EC 475 OF THE GLOBAL 500 COMPANIES USE SYMANTEC SOLUTIONS INFRASTRUCTURE MASTER COMPLEXITY The digital infrastructure of a modern Whether your infrastructure supports a small- to medium- corporation has become unimaginably sized business or a large multinational corporation, complex with heterogeneous server you want to ensure that it is up and running whenever platforms and operating systems, mul- you need it to be. Symantec helps make it happen by tiple storage devices, and huge numbers protecting all layers of your environment against all man- of applications. In response, Symantec ner of security threats — viruses, spyware, unauthorized has developed a uniquely standardized access — and by enabling you to monitor all elements of approach to managing information your digital environment, from stand-alone PCs and infrastructures: a single layer of software that delivers world-class data protection servers to complex data centers, to make sure that they and management of all servers, storage are provisioned, patched, backed up, and running at devices, and applications. We are the only optimal performance. vendor with the breadth of technology to provide this kind of holistic solution — one We understand that complexity is unavoidable in today’s that reduces complexity, lowers opera- heterogeneous environments, so we have developed tional costs, and frees IT to once again be solutions to provide a standardized management soft- a source of competitive advantage. ware layer that can support the multiple platforms found in a modern data center. This unified approach allows customers to deploy the most advanced storage, server, and application management tools — for any platform, in any configuration — and do so more reliably, easily, and affordably. Infrastructure management has long been considered a necessary, but time-consuming and frustrating task. Symantec protection can transform these critical IT functions from a cost center into a source of competi- tive advantage.
  • 7.
  • 8. INFORMATION Information can be literally priceless. Unlike physical assets and infrastructure, digital data cannot simply be replaced when it is lost or destroyed — and the emo- tional and financial cost to individuals and corporations can be huge. With an estimated 75% of a company’s intellectual property residing in email and messaging sys- tems, managers need advanced message management tools to scan inbound and outbound traffic, accurately categorize the content according to established policies, and retrieve it — all in a single integrated solution. PLAN AHEAD Symantec can provide all this and more, including best- of-breed protection against targeted attacks on email The key to effective digital protection is and database servers. Our innovative technologies also being able to identify and act on problems improve overall data storage and can automatically as early as possible, and Symantec has de- veloped sophisticated tools to see threats analyze and evaluate archived information for rapid, as they emerge around the world. Our cost-effective discovery and retrieval. And our policy- proprietary Global Intelligence Network compliance solutions are among the most advanced in monitors email and web traffic through the industry, allowing you to define and control your more than 24,000 network sensors in 180 internal policy initiatives, meet external regulatory countries. We track vulnerabilities in requirements, monitor activity across all tiers and more than 30,000 operating system and endpoints, and rapidly remediate deficiencies. software applications. And we make sure our customers are armed with regular up- Information, personal or corporate, is your most valu- dates, alerts, and security fixes that allow able asset. Wherever it resides and however you use them to translate these early warnings it, Symantec can help ensure its security, availability, into proactive preparations that maintain and integrity. business continuity.
  • 9. SYMANTEC SENSORS MONITOR MORE THAN 25% OF THE WORLD’S EMAIL IDENTITY THEFT COSTS U.S. BUSINESSES MORE THAN $48 BILLION ANNUALLY
  • 10. 9 SY M A N T EC TAKE CONTROL Protection isn’t static. It’s a proactive discipline that constantly adjusts to changing threat environments, new and updated policies, and the evolving state of your infrastructure, information, and interactions. Symantec solutions are designed to provide this kind of proactive control of your security and data man- agement. From our consumer Internet security suite to our integrated security appliances for small- and medium-sized businesses to our Data Center Foundation technology for large enterprises, we streamline the underlying technology and simplify the user interface so that our customers can readily enforce the appro- priate protection of their digital assets. INTERACTIONS The digital world is increasingly defined by collabora- tion. As the Internet environment has continued to evolve — driven by ubiquitous high-speed connections and sophisticated network architectures — individ- uals and corporations have embraced highly interactive models like etailing, instant messaging, supply chain integration, multiplayer gaming, online banking, wikis, blogs, and more. It’s no longer enough to secure net- work elements and data inside the firewall; today the digital interactions themselves need to be protected from attacks, disruptions, and misuse. In response, Symantec is developing ways for all partici- pants in online interactions — businesses and consumers alike — to verify the identities of other participants. We are partnering with financial institutions and e-commerce companies to create stronger trusted models for online transactions. We are also building tools for real-time pro- tection of personal information or sensitive corporate data while it is in transit. As this kind of open data sharing becomes increasingly ubiquitous, the boundaries between consumers and providers will continue to blur and disappear, making inter- actions the next great protection challenge. Symantec is committed to meeting that challenge and to maintaining user confidence in the safety of digital collaboration.
  • 11.
  • 12. A GLOBAL LEADER IN DIGITAL PROTECTION. AND MORE. 4 Symantec SOCs 11 Symantec Support Centers 8 Symantec Security Response Labs 72 Symantec Monitored Countries 40,000 Registered Sensors in 180 Countries As one of the largest software companies in the world, Symantec has a truly global perspective on its market and its business. Nearly half of our fiscal 2006 revenue Symantec’s active approach also reflects how our corpo- was generated outside the United States. Our nearly rate values align with those of our customers. We are, 16,000 employees are active in 40 countries on five for example, a leading participant in the effort to develop continents. Our state-of-the-art manufacturing facility in effective national legislation to protect online consumer Ireland, our Security Operations Centers around the privacy. We are also actively involved in Internet safety globe, and our extensive network of Internet traffic initiatives, such as the Internet Keep Safe Coalition and sensors make the company an active citizen of the National Cyber Security Alliance. We have strong internal world’s business community. programs that promote workplace and supplier diversity and local volunteerism. And we are a member of Sustain- And as such, we strive to be as engaged and responsible a able Silicon Valley, which is committed to reducing energy citizen as possible. Our emphasis on reasonable and ethi- usage and CO² emissions. cal action reflects a strategic commitment to best business practices that motivate employees, strengthen customer Our commitment to corporate responsibility isn’t just a relationships, confer competitive advantage, and build reflection of our principles. It’s also a good business prac- long-term company value. Our signing of the U.N. Global tice and competitive differentiator, and we believe it has Compact, a framework of ten principles that address been — and will continue to be — an important engine of human rights and labor issues, environmental impacts, our growth as Symantec strengthens its position as the and corruption is a clear reflection of that commitment. world’s preeminent provider of digital protection.
  • 13. 12 SY M A N T EC
  • 14. Copyright © 2006 Symantec Corporation. All rights reserved. P / N 10733850 Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.