protecting your business! sba ft. lauderdale november 15, 2006 gregory levine, sr. director...
TRANSCRIPT
2 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Symantec Today
► 4th largest independent software company in the world
► More than 200 million+ systems protected worldwide
► Diverse customer base: consumer, business, government and education
► Global 24x7 operations: 14,000 employees in 39 countries
► 23 years of industry experience
► Over $700M annual investment in R&D
► Over 80% of business with you, our channel partners
3 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Small Businesses Are Interacting In New Ways
4 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Your Business Is Changing
► Technology surrounds our work and private lives
► The Internet has redefined business dynamics
► Email anytime, anywhere
► Instant messages at a blink of an eye
► Wireless everything – mobile phones, wireless networks
► Access to work from home, hotel, airport
► Huge amounts of data stored on computers and servers
5 – 2005 Symantec Corporation. All rights reserved.Protecting your business
IM threats grew by 1,693% in 2005
With Opportunities Come Risks
35% of Small Businesses UseInstant Messaging (IM)
In 2005, US consumers lodged more than 196,503 internet related fraud
complaints with the FTC
57% of SMBs with websites generate significant revenue
online
One in five organizations said they have sustained financial losses due to attack on mobile data platforms
Usage of converged mobile devices grew 50% worldwide
Usage of converged mobile devices grew 50% worldwide
Sources: IMlogic Threat Center report, Jan 2006; Interland Small and Medium-sized Business Barometer, September 2005; Federal trade commission, 2006; IDC, 2005; PC World, April 2006;
6 – 2005 Symantec Corporation. All rights reserved.Protecting your business
The Problem…
Environmental Environmental ImpactsImpacts Power OutagesPower Outages FloodsFloods Tornadoes Tornadoes Etc.Etc.
User MishapsUser Mishaps End User ErrorEnd User Error TheftTheft Fat FingerFat Finger
Malicious AttacksMalicious Attacks VirusesViruses WormsWorms Trojan HorsesTrojan Horses PhishingPhishing SpyWareSpyWare
Hardware/SoftwareHardware/Software Hard DriveHard Drive Motherboard/PowerMotherboard/Power System CorruptionSystem Corruption Failed Patch or UpdateFailed Patch or Update
Common Denominator:
Loss of System and/or Important Information
7 – 2005 Symantec Corporation. All rights reserved.Protecting your business
months
days
hrs
mins
secs
ProgramViruses Macro
Viruses E-mailWorms Network
Worms
FlashWorms
Co
nta
gio
n P
eri
od
Evolution of Virus/Worm Threats
► The latest threats now spread orders of magnitude faster than years ago, from months to nearly seconds
1990 Time 2006
Contagion Period
8 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Threat Impact On Small Businesses
Direct Losses
• Theft, Money, Digital Assets
• Computer Resources
• Trade Secrets
• Consumer Information
Indirect Losses
• Loss of Potential Sales
• Negative Brand Impact
• Loss of Competitive Advantage
• Loss of Goodwill
Productivity Losses
• Diversion of Funds
• Continuity Expenses
• Corruption of Data
• Recovery Expenses
• Failure to Meet Contracts
• Failure to Meet Privacy Regulations
• Illegal User Activity
• Director Liability
Legal Exposure
9 – 2005 Symantec Corporation. All rights reserved.Protecting your business
But Symantec Can Help…..
Security
Data Center Management Services
Data ProtectionFor all network tiers: the gateway, the server,
the desktop, including PCs, laptops, handhelds Backup and recovery of data and systems
Simplifies administration of heterogeneous environments and provides continuous availability
of mission critical data and applications
Full range of services to assist our customers manage and mitigate IT risk
Plan Design Build Manage
10 – 2005 Symantec Corporation. All rights reserved.Protecting your business
A Simple Blueprint For Windows Security And Availability
Policy
► Proactive alerts
► Endpoint compliance
► Email discovery/compliance
Application
► Mail security
► Exchange archiving
Data
► Data backup and recovery
► Client and server security
System
► Server management & recovery
► Desktop management & recovery
11 – 2005 Symantec Corporation. All rights reserved.Protecting your business
Resources For Small Business
Internet Threat Report
Product Collateral
Whitepapers
Security Tips
Webcasts
Flash Demos
Featured Articles
Newsletters
www.symantec.com/smb