We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKyle McKinney
Modified over 2 years ago
Symantec & IMlogic January 2006
2© 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap
3© 2006 Symantec - CONFIDENTIAL Introduction Symantec is acquiring IMlogic, the leader in IM security and archiving –Symantec continuing to bulk up on best of breed Messaging assets –Portfolio also includes: Brightmail, KVS Enterprise Vault and TurnTide Creates a new, broader category around Messaging Security –Customers want inbound and outbound threat protection as well the ability to monitor, archive and manage for compliance across multiple protocols –Symantec is the first vendor to credibly play in this broader space Strengthens an already proven relationship –Integration since 2002 between Enterprise Vault (formerly KVS) and IM Manager –30+ joint customers, including several major Wall Street organizations –Symantec is the only single source supplier of an IM archiving, search and review solution
4© 2006 Symantec - CONFIDENTIAL Increasing Scope of Business Messaging Viruses / Worms SPAM / Phishing Archiving / Availability Compliance IM / P2P Web VOIP Collaboration Type Messaging is Growing in Complexity, Breadth, and Business Impact Business Impact Traffic / Complexity
5© 2006 Symantec - CONFIDENTIAL Vision Provide comprehensive solutions to manage massive quantities of information by monitoring, categorizing and protecting our customers messaging infrastructure. Monitor – traffic across all key collaboration systems Categorize – spam, virus, but also: confidential, health-related, financial, etc. Protect – Block threats, archive data, and increase compliance
6© 2006 Symantec - CONFIDENTIAL Key Benefits - Customers 1.Customers can now protect the full lifecycle of business-critical messaging Monitor and IM in real time Check for suspicious activity, both internal and external Block activity when necessary Archive for review and compliance 2.Buy with confidence from a single, market-leading vendor Global support and integrated product roadmaps Multiple deployment options – Software, Appliance & Hosted
7© 2006 Symantec - CONFIDENTIAL Product Strategy Short term –Continue to offer IM Manager as a standalone product with Symantec branding and via Symantec channels and salesforce –Integrate IMlogic RTTPS service into Symantec Security Response Medium Term –Integrate IM scanning technology into our security products (SBAS, 8000) –Integrate IM scanning technology into our archiving products (Enterprise Vault) –Share policies across and IM traffic –IM scanning will be a premium add-on Long Term –Continue to drive towards a common platform for our all of messaging solutions
8© 2006 Symantec - CONFIDENTIAL Business Strategy Integrate IMlogic engineering and product management into Symantec Messaging and Web Security division Integrate IMlogic salesforce into Symantec messaging security overlay team Move IMlogics Waltham, MA team into Symantecs Waltham, MA office Retain key executives to drive the IM security business Offer IM Security through the Symantec channel partners as well as global and overlay teams Offer IMlogics standalone product, under Symantec brand, on day 1 following deal close
9© 2006 Symantec - CONFIDENTIAL Product Roadmap Yosemite release of SMS 8000 Appliance includes embedded IMlogic IM security functionality, available as a premium add-on feature. This will be the first IM solution for Small and Medium Businesses Add IM Archiving into Enterprise Vault Integration of IM technology into the software version of Symantecs gateway solution Release IM Linkage v3.5 Q1 2006Q2 2006Q3 2006Q Deal closes Symantec releases IM Manager v8.0 and continues to be sold as stand alone solution Symantec releases updated OEM product, IM Linkage 3.0 Symantec updates IM Real-time Threat Center technology and integrates it with Symantec Security Response
10© 2006 Symantec - CONFIDENTIAL APPENDIX
11© 2006 Symantec - CONFIDENTIAL EV And IM Archiving Sources Enterprise Vault Archive IM Applications Outlook / OWA Shortcuts Search Outlook, Web, SP Archive Explorer Compliance Accelerator Monitoring and supervision Discovery Accelerator Legal discovery Win. Explorer Placeholders SDK Application / Search Exchange Journal Mailbox SMTP MAPI x-sender: x-receiver: x-KVS-MessageType:IM.[vendorName] Date: Mon, 10 Feb :26:13 From: IMUser1 To: IMUser2 Subject: Conversation ID Mime-Version: 1.0 Content-Type: text/html 1. Third-party IM logging vendors capture IMs 2. Deliver conversations to Exchange Journal Mailbox 3. Archive and index properties 4. Search using Accelerators
Electronic Mail Management A-Z Storage Management.
Microsoft ® Exchange Online Overview. Notes (hidden) The default view of this deck is a short (6-slide) presentation, targeted to mid-sized customers.
© 2006 RightNow Technologies, Inc. CONFIDENTIAL - SUBJECT TO CHANGE RightNow Product Roadmap September 2007.
GlobalCerts & SurfControl Only a layered approach can provide total risk management.
Office 365 for education Customer Deck. | Copyright© 2010 Microsoft Corporation MEET STUDENT AND EDUCATOR NEEDS LEARNING FROM ANYWHERE LOWER COSTS ENTERPRISE.
Sophos Security and Data Protection Overview by: Mun Foong, Che – Channel Manager.
1 Present and Future Trends in K-12 Learning Management Systems Adam Davy Blackboard Inc.
Start Page 1 of 33 EndPreviousNext © 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential – For Cisco and Reseller Use Only Welcome to the.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
1 Blackboard Sales Presentation. 2 Agenda Introduction –The Company and the Community Why Blackboard –Product Strategy What Blackboard Provides –Product.
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses.
INTRODUCTION In business today, the formula for success includes two vital ingredients, effectively utilizing the latest technologies and proper information.
EX04: Exchange 2007 Security, Part II Jim McBee
Duncan Williams - Deltascheme 7 th December 2010 An introduction, overview & update of use.
Unified Communications Bill Palmer ADNET Technologies, Inc.
Soluzioni IBM per il Product Information Management Nicola Nodari Information Management Solutions Business Development Segrate, 25 novembre 2009.
ID#: S Title: Safe Hands - What Do You Look For In a System Implementer How do customers select their partners? We will look at the importance of.
Chapter 5 B2B E-Commerce: Selling and Buying in Private E-Markets.
© 2005 Avaya Inc. All rights reserved. Avaya Global Services: Delivering IP Telephony Easily and Securely Peter Licata, VP, Managed Services George Sullivan,
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Contact Solution Options Assessment and High Level Implementation Plan – Initial Draft Version East Devon District Council February, 2005.
January 23-26, 2007 Ft. Lauderdale, Florida Developing a Unified Communications Strategy Using Use Cases to Identify Opportunities Applying Analysis to.
1 © 2008 Avaya Inc. All rights reserved. Empowering UC & CEBP Anywhere, Any Device, Any Network date name.
Supply Chain Management Workshop Buenos Aires, 13 de Agosto de 2004.
Yammer Technical Solutions Overview. Audience and Requirements 2 The Yammer Technical Solutions Overview module is an introduction to the Yammer Platform.
Invitation to Join Open Health Tools Draft by Skip McGaughey
Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,
© 2016 SlidePlayer.com Inc. All rights reserved.