President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Ray Ozzie Chief Software Architect. Applications and Solutions Cloud Infrastructure Services Live Platform Services Global Foundation Services Services.
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
BUSINESS DRIVEN TECHNOLOGY
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Creating Collaborative Partnerships in Business
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Study conducted on behalf of Microsoft by Harris Interactive Inc. Study conducted on behalf of Microsoft by Harris Interactive, Inc. Study conducted on.
Consumerisation of IT James Lockyer Windows Product Manager.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
GPS 2011 Slide - 1 THE CERTIFICATION REVOLUTION HOW IT INDUSTRY CERTIFICATION HAS REVOLUTIONIZED THE AMERICAN SCHOOL SYSTEM Denise Spence, Dunbar High.
© 2012 Intel-GE Care Innovations LLC. All rights reserved. *All other third-party trademarks referenced herein belong to their respective owners. Multiplying.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
BUSINESS DRIVEN TECHNOLOGY UNIT 4: Creating Collaborative Partnerships in Business UNIT FOUR OPENING CASE Amazon.com – Just a Click Away.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Next Generation Partner Program Fady Iskander Symantec Corp.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Build Your Business by making the Right Connections.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
President’s Forum and WSML 2012 SYMSTRAT 01: Enterprise Sales Conversations for Cloud Computing Dave Elliott, Dan Graves, Dan Lamorena, Mike Reynolds,
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
2011 EMEA. Larry Orecklin Vice President, Worldwide Specialist Sales Microsoft Corporation.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Total Enterprise Mobility Comprehensive Management and Security
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Office 365 Upsell Paths.
Internal primer Empower Your Employees
The time to address enterprise mobility is now
Office 365 is cloud-based productivity, hosted by Microsoft.
Deployment Planning Services
The power of common identity across any cloud
The Information Protection Problem
Microsoft Intune MAM without Device Enrollment
Access and Information Protection Product Overview October 2013
System Center Marketing
Microsoft Virtual Academy
Presentation transcript:

President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”

1.Recognize the key customer experiences and concerns that drive mobile opportunities. 2.Articulate the broad spectrum of challenges facing customers and the different ways these challenges are being addressed. 3.Be aware of the goals and objectives our customers set to define progress. 4.Navigate the mobile landscape in order to prepare your customers for the future. Course Objectives 2 President’s Forum and WSML 2012

“A Day in the Life of a Mobile Family” A Mobile Monday Morning 3

President’s Forum and WSML Introducing “Michael”

Explosion of Mobile Devices 5 Internet connected devices per household 3 Operating Systems Need to provide multi-device, multi-OS, multi-platform services for ALL devices in household All Amount of their “stuff” consumers want to access anytime, anywhere

Global Threat Landscape In 4 Q 2011, smartphone shipments passed PCs Consumers’ concerns focus on privacy, device protection and family safety Consumers face different threats in the new mobile world Hackers are motivated by financial reward

Global Mobile Usage m-Commerce is climbing with Japan leading the way App market usage varies by region One size does not “fit all”. Each market is different. Smartphones now have larger share than traditional mobile phones in all major markets

Digital Family Life is Complicated 84% of teens have their own mobile phone 62% of children have been in negative experience online Education and awareness are key as kids become more Internet savvy and socially connected 45% of teens use location-based services such as Facebook Places

Wi-Fi is Becoming More Prevalent 65% of tablet users connect exclusively to Wi-Fi 39% of users conduct sensitive transactions on their mobile device Personal VPN services are critical to securing data and information wherever the user is “hanging out” 44% of users keep the same password combination across multiple sites

Honeystick Project Findings 89% of devices were accessed for personal apps and information 83% of devices were accessed for corporate apps and information Lost or stolen devices can impact many different areas in a user’s life – personally and professionally 50% of device finders notified the owner

Placing Trust in your Network MY COMMUNITY MY CONTENT MY CREDITMY CONNECTIVITY MY CHILDREN MY COMPANY 18

Source of Threats 78% of Android threat families are hosted on 3 rd party sites 38% of Android threat families are hosted on Google Play CSPs must protect subscribers from unauthorized, illegal and harmful material 1% of Android threat families are EXCLUSIVELY hosted on Google Play

Mobile Productivity 66% of companies are discussing a corporate ‘app store’ 59% of companies are running line-of- business applications Mobile devices are rapidly becoming critical business tools

Cost of an Exploit $429,000 Average annual cost of mobile incidents in an enterprise Costs include: lost productivity, direct financial costs, data loss, damaged brands, and loss of customer trust.

Mobile Advantage 71% of companies are discussing custom mobile applications Many companies are moving beyond a defensive approach to mobile, and looking to create competitive advantages.

Blending Mobile Worlds 48% of workers choose smartphones for work without IT input 25% of Enterprise and SMB companies WW support the use of personal devices for business purposes BYOD brings greater efficiency and greater risks to corporate environment 62% of companies have no controls in place for allowed personal devices

SOLUTIONSCONSUMERENTERPRISECARRIERS/CSPs Mobile Device Management Norton Mobile Security Norton Tablet Security Norton Anti-Theft Norton Hotspot Privacy (coming soon) Norton DNS Norton Mobile Utilities Norton Snap Norton Online Family Norton Safety Minder Norton Identity Safe Norton Connect Symantec Mobile Management Next Generation Network Protection Accelerated Next Generation Network Protection “Pay as you Grow” ExSP Licensing for CSPs Mobile Device Security Symantec Mobile Security, Symantec Endpoint Protection Mobile Edition Mobile Encryption PGP for Mobile & Blackberry, PGP iOS Viewer Mobile Authentication VIP Mobile, Managed PKI Data Loss Prevention Symantec Data Loss Prevention for Tablets Cloud Mobile Authentication Management Symantec O 3 We Secure Users Everywhere

President’s Forum and WSML Questions

Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. President’s Forum and WSML 2012 Deborah Clark Norton Global Mobile Marketing 32 Dawn Davis Norton Global Partner Marketing Brian Duckering Enterprise Mobile Product Marketing Marie Pettersson Enterprise EMEA Product Marketing