Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Symantec Education Skills Assessment SESA 3.0 Feature Showcase
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
1 Exchange Management : Archiving & Storage Do you really need 3rd party archiving with Exchange 2010? James Bushell Symantec Enterprise.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Backup Modernization with NetBackup Appliances
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC and Microsoft SharePoint Server Performance Name Title Date.
Private Cloud: Application Transformation Business Priorities Presentation.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
The Next Phase of Virtual Infrastructure Kevin Bailey Director - Product Marketing EMEA Symantec Corporation.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Presentation Outline (hidden slide) Technical Level: 100 Intended Audience: TDMs, ITPros, ITDMs, BI specialists Objectives (what do you want the audience.
Deploying SharePoint Products and Technologies for Enterprise Collaboration Microsoft IT group’s Centrally Hosted Collaboration Solution.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Next Generation Partner Program Fady Iskander Symantec Corp.
Marketing Information Technology in Emerging Markets: Hewlett-Packard in Latin America.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Build Your Business by making the Right Connections.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
President’s Forum and WSML 2012 SYMSTRAT 01: Enterprise Sales Conversations for Cloud Computing Dave Elliott, Dan Graves, Dan Lamorena, Mike Reynolds,
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Microsoft and Symantec
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
Upstate NY Storage & High Availability User Group October 23, 2009.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Agile Information Lifecycle: A Customer Journey March 2016 Dan Jennings Veritas Partner Technical Account Manager +44 (0) Veritas Technologies.
LIMS (Location Information Management System) is the Smart Claim Solution for Motor Insurers, Built on the Powerful Microsoft Azure Platform MICROSOFT.
Vodafone Business Cloud
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Hybrid Management and Security
Partner Toolbox Cloud Infrastructure & Management
Hybrid Management and Security
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Microsoft Azure: The only consistent Hybrid Cloud
Soft1 Open Enterprise Edition Allows Customers to Easily Synchronize Files Using Microsoft Office 365 and Seamlessly Store Any Information in SharePoint.
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
AddIn Intranet for Office 365 Lets Teams Contribute and Communicate from Any Device. AddIn Analytics on Microsoft Azure Measures Employee Adoption Partner.
Microsoft Virtual Academy
2/25/2019.
Microsoft Data Insights Summit
Presentation transcript:

Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE

Agenda 2 Vision for the Information-Centric Enterprise Addressing the Challenges Next Steps Symantec Enterprise Vision and Strategy

Driving the Connected Enterprise Symantec Enterprise Vision and Strategy 3 Cloud Services Mobility Rich Media Partners Employees Customers Society Collaboration

Employees Connect In A Whole New Way Symantec Enterprise Vision and Strategy 4 Updates lead status on salesforce.com. Checks Facebook on company group page. Updates status to say “big meeting today!” Completes expense report in Concur. Downloads the latest presentation from SharePoint. Uploads a new product demo on YouTube. Posts link on his Facebook profile. Edits ROI models with his team on Office Live.

5 More information in more places, accessed from more points, than ever before Symantec Enterprise Vision and Strategy

How to Enable the Business and Remain in Control Symantec Enterprise Vision and Strategy 6 Reduce Complexity; Increase Efficiency InformationRisksInformationRisks Information Availability Breaches RegulationsInformationGrowthInformationGrowth 50% Growth Structured Unstructured Cost $ € £ Information Trust Virtualization Private Cloud Public Cloud

Symantec’s Enterprise Vision Symantec Enterprise Vision and Strategy 7 Secure and Manage Your Information-Driven Enterprise, across Physical, Virtual, and Cloud “Confidence in the Connected World”

IT Must Evolve to Meet New Demands Symantec Solutions for Virtualization and Cloud Computing 8 Driver: Business automation Data: Centralized, structured Infrastructure: Physical IT focus: Systems tasks Driver: Agility with collaboration and knowledge sharing Data: Distributed, unstructured Infrastructure: Virtual, cloud, outsourced IT focus: Information tasks Information- Centric System- Centric

The Information-Centric Model Symantec Enterprise Vision and Strategy 9 Compliance Reporting Remediation Policy Classification Ownership Threats Discovery Encryption Identity

Innovating and Integrating – Encryption 10 Control Access to Your Information – Prevent unauthorized access – Invoke encryption based on user and system events – Monitor and control copy and transfer of information Symantec Enterprise Vision and Strategy

Innovating and Integrating – Data Insight Technology 11 Know Who Owns Your Unstructured Data – Who has accessed and owns the information? – Remediate based on policy violations – Accurate storage reclamation and chargeback – Intelligent archiving based on ownership Symantec is Uniquely Positioned to Deliver on the Information-Centric Model Symantec Enterprise Vision and Strategy

Agenda 12 Vision for the Information-Centric Enterprise Addressing the Challenges Next Steps Symantec Enterprise Vision and Strategy

Addressing the Challenges 13InformationRisksInformationRisks How to Gain Control of the Organization’s Information Risks? How to Efficiently Manage the Organization’s Information?InformationGrowthInformationGrowth How to Confidently Adopt Virtualization and Cloud Computing? Information Trust Symantec Enterprise Vision and Strategy

How to Gain Control of the Organization’s Information Risks? Information Availability Information Breach Protection Information Compliance 14 Enterprise Requirements Enforce IT Policies Efficient and Timely Discovery Protect Data Completely Integrated Application and Storage Recovery Protect Infrastructure Solutions & Benefits Secure Information Symantec Enterprise Vision and Strategy

Reduce Redundant Data How to Efficiently Manage the Organization’s Information? 15 Increase Storage Utilization Enterprise Requirements Eliminate Duplicate Copies Faster Backup Policy-based Information Deletion Efficient Discovery Application, Database, Server, and Storage Independent Increased Storage Utilization Commoditize Storage Hardware Solutions & Benefits Store Only What’s Necessary Symantec Enterprise Vision and Strategy

How to Confidently Adopt Virtualization and Cloud Computing? 16 Manage Private Clouds Enterprise Requirements Secure Backup and Archive to the Cloud Partner delivered Software-as-a- service Solutions & Benefits Confidently subscribe to , web and IM security Proven Enterprise Security & Storage management Cloud Storage Economics Virtual Aware Data Protection Virtual Optimized Security Leverage Hosted Services Symantec Enterprise Vision and Strategy Take Advantage of Public Clouds

Agenda 17 Vision for the Information-Centric Enterprise Addressing the Challenges Next Steps Symantec Enterprise Vision and Strategy

18 Advise on strategic information-driven IT agenda Diagnose current gaps and opportunities for information-centric model Delve into specific areas of information challenges – Information Risks – Information Growth – Information Delivery via Virtualization and Cloud Next Steps Symantec Enterprise Vision and Strategy

Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Enterprise Vision and Strategy 19