SlideShare a Scribd company logo
1 of 13
Download to read offline
Symantec To Acquire VeriSign’s
Identity and Authentication Business

May 19, 2010
Forward-Looking Statements
• This presentation contains forward-looking statements within the
  meaning of U.S. federal securities laws, including expectations
  regarding the closing of Symantec’s acquisition of VeriSign’s identity
  and authentication business and the integration of their products and
  technologies into Symantec’s products and solutions, that involve
  known and unknown risks and uncertainties that may cause actual
  results to differ materially from those expressed or implied in this
  presentation. Such risks include, among others, satisfaction of closing
  conditions to the transaction, our ability to successfully integrate the
  acquired businesses and technologies, and customer demand for the
  technologies and integrated product offerings. Actual results may
  differ materially from those contained in the forward-looking
  statements contained in this presentation. Additional information
  concerning these and other risk factors is contained in the Risk
  Factors section of Symantec’s Form 10-K for the year ended April 3,
  2009. Symantec assumes no obligation to update any forward-looking
  statement contained in this presentation.

                                                                         2
What Are We Announcing Today?
• Symantec to acquire VeriSign’s identity and authentication business
    – Server authentication services composed of secure sockets layer (SSL) & trust services
    – User authentication services composed of hosted public key infrastructure (PKI), and VeriSign
      identity protection (VIP).
    – Purchase price includes majority equity stake (54%) of publicly-traded Japanese subsidiary
    – Revenue of $408 million for LTM ending March 31, 2010 (1)
• Aggregate purchase price of $1.28 billion
    – Funded with cash from Symantec’s balance sheet to utilize approx. $300-$400m of offshore cash
• Operations
    – Acquired business with approx. 900 employees to join Enterprise Security Group led by Francis
      deSouza
    – Products and services to be sold through both Symantec and VeriSign channels
    – Shared services provided by VeriSign under transition services agreement (TSA)
• Transaction expected to be 9 cents dilutive to non-GAAP EPS during FY11 due to
  purchase price write down of deferred revenue. Will become accretive in Q2FY12.
• Expected to close by end of September quarter pending regulatory approval
(1) Japanese subsidiary (TSE: 3722) generated $81Mof revenue. Revenue ex-Japanese subsidiary is $327M.
                                                                                                         3
    Including the 54% of revenue from Japanese subsidiary results in $371M of revenue.
Why VeriSign’s Identity and Authentication business?
1. Trust and identity are key to the future of securing and managing information
   – VeriSign is the leading provider of digital authentication services, enabling trusted interactions within
     and across businesses, consumers, applications and processes
   – With identity security, Symantec solutions can enable information access control, enhanced data security
     and better enforcement of compliance policies
2. Strengthens Symantec’s cloud initiatives
   – Benefit from strong VeriSign brand which is highly-relevant to enterprises and consumers
   – Infrastructure can securely process more than 2 billion certificate checks per day
   – VeriSign’s strong brand, emerging trust services business and Symantec’s leading high-capacity web
     scanning capabilities combine to drive growth
   – Hosted PKI offerings complement the capabilities of our recent PGP acquisition
   – VIP user authentication service complements our Norton Identity Safe capabilities
   – Combine with Data Loss Prevention and Data Insight technology to ensure only authorized users have
     access to specific information
3. New cross-sell opportunities and go-to-market advantages to increase average deal value
   – Sell products to protect the server (e.g., Critical System Protection) to customers who purchase SSL to
     secure transactions
   – Add SSL to suites, such as Symantec Protection Suite for Servers managed by Symantec Protection Center
   – Sell VeriSign user authentication into Symantec install base utilizing reach of Symantec sales force
   – Utilize VeriSign’s high volume web store to expand reach into small business segment
                                                                                                                 4
Market Leading Position

      Technology Leadership                Market Leadership
    • Offers the highest and          • 4 million SSL certificates issued
      broadest standards of             to date
      authentication
                                      • Secures more than 1 million
    • Robust management console,        web servers
      creating highly sticky
      relationship with enterprises


                                             Brand Strength
     Attractive Customer Base
                                      • As high as 250 million
    • Displayed on over 90,000 Web      impressions in one day of the
      sites                             VeriSign checkmark
    • 2+ billion certificate status   • VeriSign seal has driven as
      checks per day                    much as 36% sales uplift for
                                        online retailers



                                                                            5
Identity & Authentication Business At A Glance
                                                                                  CY09 Authentication
• Strong renewal rates drive cash flow                                             Revenue Segments
  generation and operating margins
• Approximately 60% of authentication
                                                                                      85% Server             15% User
  business generated in the US
                                                                                      Auth.(SSL)          Auth. (PKI & VIP)
   Historical Authentication Revenue
          CY07 to CY09: 8.5% CAGR                                Product                Description
                                                                                        Encrypts and authenticates information
                                           $410M                 SSL Authentication
                      $399M                                      (VeriSign, Thawte,
                                                                                        for secure online transactions. Leader in
 $349M                                                           GeoTrust brands)
                                                                                        secure sockets layer authentication
                                                                                        market.
                                                                                        Scans site and identifies as safe to browse.
                                                                 Trust Services         Target beyond eCommerce sites.
                                                                                        Launched in Feb 2010.
                                                                                        Issues certificates to create a trusted
                                                                 PKI                    ecosystem across users and networks.
                                                                                        Hosted service.
                                                                                        Verifies identity via two-factor
                                                                 VIP                    authentication to permit secure online
  2007                  2008                 2009                                       transactions. Multiple credential choices.


Note: Revenue segment percentages do not include majority-owned Japan entity                                                      6
Sales and Go-To-Market Capabilities
                                                                         CY09 Identity & Authentication
 • Global, multi-tiered channel strategy                                       Go-To-Market Mix
   addresses SSL needs of large
   enterprises to small businesses
                                                                                Indirect

     – Enterprise sales force composed of                                         21%
                                                                                            Direct &
       strategic account managers as well as                                               Telesales
                                                                                              44%
       telesales                                                              Web Store
                                                                                35%
     – Direct sales to end-users on the web
     – 10,000 partners
 • SSL business has multi-brand strategy
     – Target distinct customer segments
       through premium VeriSign, and value
       Thawte and Geotrust brands
 • Hosted PKI and VIP web offerings
   primarily utilize a direct model
Note: Go-to-market data does not consider majority-owned Japan entity.                                    7
Bringing Premium Brands Together
• The acquisition creates a unique opportunity to redefine and
  strengthen our brand
  – Symantec to begin transition of brand post close
  – Shared use of VeriSign name during transition period
  – Symantec will retain exclusive rights to graphic identity (the “check mark”)




                                                                               8
VeriSign & Symantec:
Providing Trust For People And Information




                              Identity
                   Verify Who Is Accessing Information


                            Protection
                          Keep Information Safe


                              Context
                   Understand How Information Is Used



                  Trusted Transaction



                                                         9
VeriSign & Symantec:
Creating A Convenient And Secure Experience

 Information at Rest                                                                             Information in Use


                                               Information in Motion
                                                Security & Hosted Services

                                    •   SSL Certificates     •   Hosted Messaging Security
                                    •   Hosted PKI           •   Hosted Web Security
                                    •   VIP                  •   Hosted Endpoint Protection
                                    •   Trust Services       •   Web Gateway
• Critical System Protection        •   Data Loss Prevention •   Network Access Control       • Symantec Endpoint Protection
• Endpoint Protection for Servers   •   Encryption           •   FileStore                    • Control Compliance Suite
• NetBackup & Backup Exec                                    •   Norton Online Backup         • Norton Security Suites
• Enterprise Vault                                                                            • Mobile Antivirus
• Storage Foundation                                                                          • Mobile Management
• Workflow                                                                                    • Altiris IT Mgmt Suite




        Symantec provides trust across endpoints, data centers and the cloud.
 Authentication technology protects information in motion across these environments.

                                                                                                                        10
Market Expansion: Addressable Market Opportunity
   • Symantec gains entry into identity market
                                                                                                            Total 2013 Market = $1.6B
                                                                                                            10-13 CAGR = 7.5%
      ($ Millions)                                                                            1,576
                                                                  1,464
            1,268                     1,293
                                                                                                               Adv Authentication = $737M
                                                                                                737            10-13 CAGR = 7.4%
                                                                    669
               595                       620



                                                                                                                Credentials = $839M
                                                                    795                         839             10-13 CAGR = 7.6%
               673                       673




             2010                       2011                       2012                       2013
                          Credentials                       Advanced Authentication
Note: “Advanced Authentication (or server authentication) includes SSL. “Credentials” (or user authentication) includes personal
portable security device (PPSD) and software licensing and authentication tokens (SLAT).
  Source: IDC, Worldwide Identity and Access Management 2009-2013 Forecast and 2008 Vendor Shares.                                    11
  Doc # 219008, July 2009.
Summary:
Everything Revolves Around People and Information
• Creates the most trusted brand for protecting information and
  identities online.
• Adds market leading identity security services that are critical
  for providing individuals and businesses with secure access to
  their information from any device, across any application, at
  any time.
• Complementary technologies provide the most comprehensive
  security for information when it is at rest, in motion, or in use.
• Offers compelling cross-selling opportunities into combined
  customer base.
• Expands Symantec’s addressable security market opportunity.


                                                                       12
Thank you
        Helyn Corcos
        hcorcos@symantec.com
        (650) 527-5523


Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. All rights reserved. VeriSign and the Checkmark Circle Design are registered trademarks of VeriSign, Inc. Symantec will acquire the
Checkmark Circle Design mark from VeriSign as a part of the acquisition. Symantec plans to use the Checkmark Circle Design mark in connection with the business after
completion of the acquisition. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                   13

More Related Content

More from Symantec

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 

More from Symantec (20)

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Symantec Acquires VeriSign Security Business

  • 1. Symantec To Acquire VeriSign’s Identity and Authentication Business May 19, 2010
  • 2. Forward-Looking Statements • This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including expectations regarding the closing of Symantec’s acquisition of VeriSign’s identity and authentication business and the integration of their products and technologies into Symantec’s products and solutions, that involve known and unknown risks and uncertainties that may cause actual results to differ materially from those expressed or implied in this presentation. Such risks include, among others, satisfaction of closing conditions to the transaction, our ability to successfully integrate the acquired businesses and technologies, and customer demand for the technologies and integrated product offerings. Actual results may differ materially from those contained in the forward-looking statements contained in this presentation. Additional information concerning these and other risk factors is contained in the Risk Factors section of Symantec’s Form 10-K for the year ended April 3, 2009. Symantec assumes no obligation to update any forward-looking statement contained in this presentation. 2
  • 3. What Are We Announcing Today? • Symantec to acquire VeriSign’s identity and authentication business – Server authentication services composed of secure sockets layer (SSL) & trust services – User authentication services composed of hosted public key infrastructure (PKI), and VeriSign identity protection (VIP). – Purchase price includes majority equity stake (54%) of publicly-traded Japanese subsidiary – Revenue of $408 million for LTM ending March 31, 2010 (1) • Aggregate purchase price of $1.28 billion – Funded with cash from Symantec’s balance sheet to utilize approx. $300-$400m of offshore cash • Operations – Acquired business with approx. 900 employees to join Enterprise Security Group led by Francis deSouza – Products and services to be sold through both Symantec and VeriSign channels – Shared services provided by VeriSign under transition services agreement (TSA) • Transaction expected to be 9 cents dilutive to non-GAAP EPS during FY11 due to purchase price write down of deferred revenue. Will become accretive in Q2FY12. • Expected to close by end of September quarter pending regulatory approval (1) Japanese subsidiary (TSE: 3722) generated $81Mof revenue. Revenue ex-Japanese subsidiary is $327M. 3 Including the 54% of revenue from Japanese subsidiary results in $371M of revenue.
  • 4. Why VeriSign’s Identity and Authentication business? 1. Trust and identity are key to the future of securing and managing information – VeriSign is the leading provider of digital authentication services, enabling trusted interactions within and across businesses, consumers, applications and processes – With identity security, Symantec solutions can enable information access control, enhanced data security and better enforcement of compliance policies 2. Strengthens Symantec’s cloud initiatives – Benefit from strong VeriSign brand which is highly-relevant to enterprises and consumers – Infrastructure can securely process more than 2 billion certificate checks per day – VeriSign’s strong brand, emerging trust services business and Symantec’s leading high-capacity web scanning capabilities combine to drive growth – Hosted PKI offerings complement the capabilities of our recent PGP acquisition – VIP user authentication service complements our Norton Identity Safe capabilities – Combine with Data Loss Prevention and Data Insight technology to ensure only authorized users have access to specific information 3. New cross-sell opportunities and go-to-market advantages to increase average deal value – Sell products to protect the server (e.g., Critical System Protection) to customers who purchase SSL to secure transactions – Add SSL to suites, such as Symantec Protection Suite for Servers managed by Symantec Protection Center – Sell VeriSign user authentication into Symantec install base utilizing reach of Symantec sales force – Utilize VeriSign’s high volume web store to expand reach into small business segment 4
  • 5. Market Leading Position Technology Leadership Market Leadership • Offers the highest and • 4 million SSL certificates issued broadest standards of to date authentication • Secures more than 1 million • Robust management console, web servers creating highly sticky relationship with enterprises Brand Strength Attractive Customer Base • As high as 250 million • Displayed on over 90,000 Web impressions in one day of the sites VeriSign checkmark • 2+ billion certificate status • VeriSign seal has driven as checks per day much as 36% sales uplift for online retailers 5
  • 6. Identity & Authentication Business At A Glance CY09 Authentication • Strong renewal rates drive cash flow Revenue Segments generation and operating margins • Approximately 60% of authentication 85% Server 15% User business generated in the US Auth.(SSL) Auth. (PKI & VIP) Historical Authentication Revenue CY07 to CY09: 8.5% CAGR Product Description Encrypts and authenticates information $410M SSL Authentication $399M (VeriSign, Thawte, for secure online transactions. Leader in $349M GeoTrust brands) secure sockets layer authentication market. Scans site and identifies as safe to browse. Trust Services Target beyond eCommerce sites. Launched in Feb 2010. Issues certificates to create a trusted PKI ecosystem across users and networks. Hosted service. Verifies identity via two-factor VIP authentication to permit secure online 2007 2008 2009 transactions. Multiple credential choices. Note: Revenue segment percentages do not include majority-owned Japan entity 6
  • 7. Sales and Go-To-Market Capabilities CY09 Identity & Authentication • Global, multi-tiered channel strategy Go-To-Market Mix addresses SSL needs of large enterprises to small businesses Indirect – Enterprise sales force composed of 21% Direct & strategic account managers as well as Telesales 44% telesales Web Store 35% – Direct sales to end-users on the web – 10,000 partners • SSL business has multi-brand strategy – Target distinct customer segments through premium VeriSign, and value Thawte and Geotrust brands • Hosted PKI and VIP web offerings primarily utilize a direct model Note: Go-to-market data does not consider majority-owned Japan entity. 7
  • 8. Bringing Premium Brands Together • The acquisition creates a unique opportunity to redefine and strengthen our brand – Symantec to begin transition of brand post close – Shared use of VeriSign name during transition period – Symantec will retain exclusive rights to graphic identity (the “check mark”) 8
  • 9. VeriSign & Symantec: Providing Trust For People And Information Identity Verify Who Is Accessing Information Protection Keep Information Safe Context Understand How Information Is Used Trusted Transaction 9
  • 10. VeriSign & Symantec: Creating A Convenient And Secure Experience Information at Rest Information in Use Information in Motion Security & Hosted Services • SSL Certificates • Hosted Messaging Security • Hosted PKI • Hosted Web Security • VIP • Hosted Endpoint Protection • Trust Services • Web Gateway • Critical System Protection • Data Loss Prevention • Network Access Control • Symantec Endpoint Protection • Endpoint Protection for Servers • Encryption • FileStore • Control Compliance Suite • NetBackup & Backup Exec • Norton Online Backup • Norton Security Suites • Enterprise Vault • Mobile Antivirus • Storage Foundation • Mobile Management • Workflow • Altiris IT Mgmt Suite Symantec provides trust across endpoints, data centers and the cloud. Authentication technology protects information in motion across these environments. 10
  • 11. Market Expansion: Addressable Market Opportunity • Symantec gains entry into identity market Total 2013 Market = $1.6B 10-13 CAGR = 7.5% ($ Millions) 1,576 1,464 1,268 1,293 Adv Authentication = $737M 737 10-13 CAGR = 7.4% 669 595 620 Credentials = $839M 795 839 10-13 CAGR = 7.6% 673 673 2010 2011 2012 2013 Credentials Advanced Authentication Note: “Advanced Authentication (or server authentication) includes SSL. “Credentials” (or user authentication) includes personal portable security device (PPSD) and software licensing and authentication tokens (SLAT). Source: IDC, Worldwide Identity and Access Management 2009-2013 Forecast and 2008 Vendor Shares. 11 Doc # 219008, July 2009.
  • 12. Summary: Everything Revolves Around People and Information • Creates the most trusted brand for protecting information and identities online. • Adds market leading identity security services that are critical for providing individuals and businesses with secure access to their information from any device, across any application, at any time. • Complementary technologies provide the most comprehensive security for information when it is at rest, in motion, or in use. • Offers compelling cross-selling opportunities into combined customer base. • Expands Symantec’s addressable security market opportunity. 12
  • 13. Thank you Helyn Corcos hcorcos@symantec.com (650) 527-5523 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. All rights reserved. VeriSign and the Checkmark Circle Design are registered trademarks of VeriSign, Inc. Symantec will acquire the Checkmark Circle Design mark from VeriSign as a part of the acquisition. Symantec plans to use the Checkmark Circle Design mark in connection with the business after completion of the acquisition. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 13