RSA Media & Analyst Briefing March 2-4, 2010. The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger 2 Changing WorldBusiness Priorities.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Connect. Transact. Profit. Lessons Learned: 5 Reasons Cloud is CFO Friendly.
Barracuda Load Balancer Server Availability and Scalability.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Virtualisation Challenges IBM Smarter Storage Symposium – July 2012 Hardev Sanghera, Partner SE.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Network security Product Group 2 McAfee Network Security Platform.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Vodafone Business Cloud
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Web Content Security Unlock the Power of the Web
Avenues International Inc.
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
New Heights by Guiding Them into the Cloud
How Smart Networks are Changing Corporate Networks
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
On-Premises, or Deployed in a Hybrid Environment
Big Red Cloud Offers a Simple Online Accounts Solution for Business Owners and Bookkeepers Hosted on the Powerful Microsoft Azure Platform MICROSOFT AZURE.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Check Point Connectra NGX R60
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
Improve Patient Experience with Saama and Microsoft Azure
DATS International Portfolio.
Zendos Tecnologia Utilizes the Powerful, Scalable
AT&T Dedicated Internet (ADI)
Presentation transcript:

RSA Media & Analyst Briefing March 2-4, 2010

The CxOs Balancing Act Changing World, Changing Priorities, Increasing Danger 2 Changing WorldBusiness Priorities Partner & Customer Collaboration High ROI Low TCO Workforce Effectiveness Risk Management & Compliance New & Malicious Threats Macro Economics Mobile Social Media

Technology Trends Impacts to Productivity & ROI 3 Infrastructure Demands:  Bandwidth  Performance  Availability  Ease of use  Manageability  Security  TCO Converged Comms Cloud/SaaS Consolidation Virtualization Web 2.0 Mobile Devices

2001: Network Perimeter2010: Network Expansion VOIP Users Traveling Users Remote Employees Corporate Data Centers Customers or Suppliers Remote Access External Users The Business Impact – Perimeter Contraction / Network Expansion User Protection Access Control Productivity Controls Saas, Web 2.0 Real-Time Apps Perimeter / Internal Security Business Communication Protection Beyond 2010 – More Collaboration, More Content, More Communications = More IT Challenges Partner Access WANs Extranets Collaboration Cloud/ SaaS Converged Communications

Employee Productivity & Security Impact Copyright 2009 SonicWALL Inc. All Right Reserved. 5  Blogging  Facebook  Twitter  IM  Streaming video  Streaming audio  Downloading files  Playing games  Webmail  Wikis 25% of office Internet traffic is non-business related (Burst Media Survey, 2008) 50% of surveyed companies said at least 30% of their bandwidth is being consumed by social networking traffic (Forrester, Feb 2009) Malware, Trojans, BotNets, Intrusions out of control

A Secure Future What if....  You could control, manage and protect your global network easily, automatically?  You could control different applications more easily, manage their bandwidth, and block objectionable applications?  You could receive & share threat and defense data around the world in real time?  You could secure any user, any device, using any application from anywhere?  You could scale services securely without compromising reliability?  You could access any Carrier, SaaS, or Cloud without security impact?  You could always see and know what the malicious activities are on your network?  You could do all of this and actually lower your TCO? What if....  You could control, manage and protect your global network easily, automatically?  You could control different applications more easily, manage their bandwidth, and block objectionable applications?  You could receive & share threat and defense data around the world in real time?  You could secure any user, any device, using any application from anywhere?  You could scale services securely without compromising reliability?  You could access any Carrier, SaaS, or Cloud without security impact?  You could always see and know what the malicious activities are on your network?  You could do all of this and actually lower your TCO?

Dynamic Security for the Global Network  Global, Distributed, Mobile and Cloud  Real-time Situational Visibility and Awareness  Communication of Shared Threats and Shared Defenses  Proactive Risk Management and Compliance  Best Economics 7

What's New? Introducing Portfolio of Security Virtual Appliances  Family of Virtual Appliances Focused on SECURITY  Deployed in VMware environment  Choice and flexibility for Enterprises, SMBs, and Managed Service Providers  Solutions to range from Global Management, Reporting, Security, SSL VPN  Family of Virtual Appliances Focused on SECURITY  Deployed in VMware environment  Choice and flexibility for Enterprises, SMBs, and Managed Service Providers  Solutions to range from Global Management, Reporting, Security, SSL VPN New Category of Products Focused on Application Intelligence, Control, and Security  Multi-Gigabit Appliances delivered with Application Intelligence & Control AND Intrusion Prevention  New Intuitive Visualization Tools to categorize and take action on all network activity for optimization  Flexible Deployment as the Gateway or In-Line behind a Firewall  Multi-Gigabit Appliances delivered with Application Intelligence & Control AND Intrusion Prevention  New Intuitive Visualization Tools to categorize and take action on all network activity for optimization  Flexible Deployment as the Gateway or In-Line behind a Firewall

Delivering Virtual Appliance Solutions 9

Technology Trends Impacts to Productivity & ROI 10 Converged Comms Cloud/SaaS Consolidation Virtualization Infrastructure Demands:  Bandwidth  Performance  Availability  Ease of use  Manageability  Security  TCO Web 2.0 Mobile Devices Cloud, SaaS, Consolidation, Virtualization Driven By TCO and Optimization Needs

Technology Trends Plus Fundamental TCO Economics Source:1. IDC, U.S. and Worldwide Server Installed Base 2007–2011 Forecast, Doc #207044, May IDC, Virtualization And Multicore Innovations Disrupt The Worldwide Server Market, Doc #206035, March Source: VMware

Benefits of Security Virtual Appliance Strategy AdvantageDetails Increased Security:Hardened SonicLinux Operating System; users are not able to tamper with the virtual appliance Lower TCO:The virtual appliance is a pre-configured virtual machine - there are no dedicated hardware prerequisites, no professional service fees and no hidden costs. It's all in the appliance! Higher PerformanceOptimized software and hardware architecture; no unnecessary processes active Reduced Complexity: Simplified product selection, product integration, ongoing support.

SonicWALL GMS and ViewPoint Virtual Appliances Introduced at RSA 13

SonicWALL GMS Virtual Appliance  The GMS Virtual Appliance is based on SonicWALL GMS version 6.0 announced earlier this year  Flexible, powerful and intuitive solution to centrally manage and rapidly deploy all of their SonicWALL firewall, anti- spam, backup and recovery, and secure remote access solutions  Enterprises and MSPs use SonicWALL GMS to manage thousands of appliances simultaneously  Centrally create &push security policies  Provide real-time monitoring and Alerting  Intuitive compliance and usage reports from a single management interface. 14

SonicWALL ViewPoint Virtual Appliance  The ViewPoint Virtual Appliance provides granular reporting on one or more SonicWALL security devices, allowing administrators to closely track network utilization, monitor security activity and view Web usage. 15

Delivering Multi-Gigabit Application Intelligent Firewall with IPS 16

Technology Trends Impacts to Productivity & ROI 17 Infrastructure Demands:  Bandwidth  Performance  Availability  Ease of use  Manageability  Security  TCO Web 2.0, Converged Communications, Mobile Devices Drive Need for Dynamic Security While Maintaining Performance Cloud/SaaS Consolidation Virtualization Converged Comms Web 2.0 Mobile Devices

SonicWALL E-Class NSA E8500 Application Intelligence and IPS 18

SonicWALL NSA E8500: High Performance Application Intelligence & IPS Comprehensive Inspection W/ Ease of Use  Application Intelligence & Control  Powerful IPS, Multi-gig performance  Management of traffic  Visualization of traffic  RFDPI Technology (low latency)  SSL Traffic Inspection  “Bump in the Wire” mode or traditional gateway The Technology  16-Core, 4GB RAM  8.0 Gbps Stateful Inspection  3.5 Gbps IPS  2.0 Gbps Application Control  Detects over 1,000,000 unique threats Detects, Classifies and Controls over 1,100 Unique Applications

Unique Technology Approach Every bit, every protocol, every user & application 20  Scalable Engine Architecture  Re-Assembly Free DPI – at wire speed  Virtually no latency introduced  Designed for current & future protocols  Foundation for all technologies  Clustering Technology  Increased availability  Increased throughput  Massive Scalability & Bandwidth  Multi-core, parallel architectures  Unlimited data size or formats  Unlimited number of connections  Best Economical Solution  Easy to adopt, deploy and manage  Modular platform  Real-time, Deep protection  Simultaneous, proactive, multi-threat scanning & analysis  Real-time communications with SonicWALL GRID Network  Behavioral Analysis & Protection

Application Intelligence & Control Identify - By App - Not by Port & Protocol Categorize - By app - By Category of App - By destination - For which person or groups Control - Allow - Block - Bandwidth Prioritize Critical Business (Allocate Bandwidth) Observe, Act, React (Dig in, Take New Action) Acceptable Applications (Limit Bandwidth) Social (Allocate bandwidth to Marketing Block Social to all others) Application Chaos (So many on port 80)

Bringing It All Together 22 Converged Comms Cloud/SaaS Consolidation Virtualization Web 2.0 Mobile Devices Virtualized Environment Network Security Protection for Virtualized Environment

SonicWALL Financial Results 23

Use of Non-GAAP Financial Measures

Fourth Quarter 2009 At-a-Glance Q4 2008Q3 2009Q4 2009Seq. % Growth Y-Y % Growth Revenue $54.3$50.7$54.17% 0% Non-GAAP Gross Margin 71.3%73.3%70.7%-- Non-GAAP Op. Margin 15.5%15.8%16.2%5% Non-GAAP Net Income $5.9m$5.4m$6.0m11%2% Non-GAAP EPS $0.11$0.10$0.1110%0% Deferred Revenue $103.5m$116.7m$124.2m6%20% Cash and Investments $166.9m$203.0m$215.9m6%29% *Please see non-GAAP disclosures.

Momentum in Deferred Revenue

Momentum in Cash Flow $36 million in CFO in 2009

Revenue Breakdown Q4 08 Q3 09 Q % 40% 62% 38% 42% 58%

Total Revenue by Product Category Q4 08 Q3 09 Q % 78% 9% 10% 9% 4%

Product Revenue by Product Line Q4 08 Q3 09 Q % 38% 42% 41% 40% 23% 21% 22%

Our Vision  We believe security solutions should be “smart” enough to adapt as organizations evolve and as threats evolve, dynamically, globally.  We believe customers around the world should have the ability to control, manage and protect their global network easily and automatically.  We believe our customers should be able to receive and share threat and defense data around the world so they can anticipate and stop attacks before they happen. We want our customers to be able to secure any user, any device, using any application from anywhere so they can collaborate securely across different networks.  All this needs to be achieved with maximum ease of deployment and at the best economic value and in a compliant framework.

Thank You! Colleen Nichols Sr. Director, Public Relations John Gordineer Director, Product Marketing Kelly Blough Sr. Director, Investor Relations