We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKyle McKinney
Modified over 3 years ago
Symantec & IMlogic January 2006
2© 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap
3© 2006 Symantec - CONFIDENTIAL Introduction Symantec is acquiring IMlogic, the leader in IM security and archiving –Symantec continuing to bulk up on best of breed Messaging assets –Portfolio also includes: Brightmail, KVS Enterprise Vault and TurnTide Creates a new, broader category around Messaging Security –Customers want inbound and outbound threat protection as well the ability to monitor, archive and manage for compliance across multiple protocols –Symantec is the first vendor to credibly play in this broader space Strengthens an already proven relationship –Integration since 2002 between Enterprise Vault (formerly KVS) and IM Manager –30+ joint customers, including several major Wall Street organizations –Symantec is the only single source supplier of an IM archiving, search and review solution
4© 2006 Symantec - CONFIDENTIAL Increasing Scope of Business Messaging Viruses / Worms SPAM / Phishing Archiving / Availability Compliance IM / P2P Web VOIP Collaboration Type Messaging is Growing in Complexity, Breadth, and Business Impact Business Impact Traffic / Complexity
5© 2006 Symantec - CONFIDENTIAL Vision Provide comprehensive solutions to manage massive quantities of information by monitoring, categorizing and protecting our customers messaging infrastructure. Monitor – traffic across all key collaboration systems Categorize – spam, virus, but also: confidential, health-related, financial, etc. Protect – Block threats, archive data, and increase compliance
6© 2006 Symantec - CONFIDENTIAL Key Benefits - Customers 1.Customers can now protect the full lifecycle of business-critical messaging Monitor and IM in real time Check for suspicious activity, both internal and external Block activity when necessary Archive for review and compliance 2.Buy with confidence from a single, market-leading vendor Global support and integrated product roadmaps Multiple deployment options – Software, Appliance & Hosted
7© 2006 Symantec - CONFIDENTIAL Product Strategy Short term –Continue to offer IM Manager as a standalone product with Symantec branding and via Symantec channels and salesforce –Integrate IMlogic RTTPS service into Symantec Security Response Medium Term –Integrate IM scanning technology into our security products (SBAS, 8000) –Integrate IM scanning technology into our archiving products (Enterprise Vault) –Share policies across and IM traffic –IM scanning will be a premium add-on Long Term –Continue to drive towards a common platform for our all of messaging solutions
8© 2006 Symantec - CONFIDENTIAL Business Strategy Integrate IMlogic engineering and product management into Symantec Messaging and Web Security division Integrate IMlogic salesforce into Symantec messaging security overlay team Move IMlogics Waltham, MA team into Symantecs Waltham, MA office Retain key executives to drive the IM security business Offer IM Security through the Symantec channel partners as well as global and overlay teams Offer IMlogics standalone product, under Symantec brand, on day 1 following deal close
9© 2006 Symantec - CONFIDENTIAL Product Roadmap Yosemite release of SMS 8000 Appliance includes embedded IMlogic IM security functionality, available as a premium add-on feature. This will be the first IM solution for Small and Medium Businesses Add IM Archiving into Enterprise Vault Integration of IM technology into the software version of Symantecs gateway solution Release IM Linkage v3.5 Q1 2006Q2 2006Q3 2006Q Deal closes Symantec releases IM Manager v8.0 and continues to be sold as stand alone solution Symantec releases updated OEM product, IM Linkage 3.0 Symantec updates IM Real-time Threat Center technology and integrates it with Symantec Security Response
10© 2006 Symantec - CONFIDENTIAL APPENDIX
11© 2006 Symantec - CONFIDENTIAL EV And IM Archiving Sources Enterprise Vault Archive IM Applications Outlook / OWA Shortcuts Search Outlook, Web, SP Archive Explorer Compliance Accelerator Monitoring and supervision Discovery Accelerator Legal discovery Win. Explorer Placeholders SDK Application / Search Exchange Journal Mailbox SMTP MAPI x-sender: x-receiver: x-KVS-MessageType:IM.[vendorName] Date: Mon, 10 Feb :26:13 From: IMUser1 To: IMUser2 Subject: Conversation ID Mime-Version: 1.0 Content-Type: text/html 1. Third-party IM logging vendors capture IMs 2. Deliver conversations to Exchange Journal Mailbox 3. Archive and index properties 4. Search using Accelerators
Microsoft and Symantec More Than The Sum Of Our Parts.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Copyright © 2006 Quest Software Quest SharePoint Management.
Unified Communications Bill Palmer ADNET Technologies, Inc.
Unified. Simplified. Unified Communications Launch 2007.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Searching PST folders for legal discovery is costly Multiple regulations require complicated archiving processes.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© Hitachi Data Systems Corporation All Rights Reserved. Hitachi Data Systems File and Content Services Solutions Presented to (Contact name) (Customer.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
Security and Organizational Governance Anand Lakshminarayanan Senior Product Manager Microsoft Corporation.
SaaS, PaaS & TaaS By: Raza Usmani
Exchange Online: Pricing & Licensing Overview. | Copyright© 2010 Microsoft Corporation Agenda Overview of Office 365 suite offers Exchange Online standalone.
ANNELIES BULKENS UNIFIED COMMUNICATIONS PRODUCT MARKETING MANAGER ILSE VAN CRIEKINGE TECHNOLOGY ADVISOR CORE UNIFIED COMMUNICATIONS.
Office 365 for Enterprises: Pricing & Licensing Overview.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.
Office 365 for Enterprises ITExpo February 2, 2012.
Solution Briefing Connecting with Extranets. Solution Briefing Why SharePoint 2010? What are the value adds in extranet deployments?
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor The definition of “endpoint” used to be simple: a.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Module 6 Planning and Deploying Messaging Security.
management “A Gen-i Perspective” Paul McTaggart - ECM Practice Manager.
VERITAS Confidential KVS Enterprise Vault Differences with DLM…
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
1 Effective, secure and reliable hosted security and continuity solution.
DELIVERING SHAREPOINT AS A SERVICE Anders B. Skjønaa Strategy, Architecture and Governance
Secure Services Shared Hosted MS Exchange 2010.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Chapter 6 Public B2B Exchanges and Support Services.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda Chad Bowerman Barracuda Networks March 2016.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Palo Alto Networks Jay Flanyak Channel Business Manager
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
© 2017 SlidePlayer.com Inc. All rights reserved.