SlideShare a Scribd company logo
1 of 14
Download to read offline
Accidental Entrepreneur

    June 13, 2012


The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   1
The Accidental
                                                                          Entrepreneur is
                                                                          NOT a Theory
                                                                          Anymore




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                     2
Business Creation Up during and after Great Recession
  • Great Recession caused unprecedented business death AND unprecedented
    business birth
  • 60,000 more new businesses were created per month in 2009 than in 2007
  • Trend Continues…70,000 more per month in 2010, and 50,000 more per
    month in 2011




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market    3

Source: Kauffman Index of Entrepreneurial Activity 1996-2011, March 2012
Research Methodology
• Survey performed by Forrester Consulting
• 305 U.S. SMBs (3 to 250 employees)
  – 50/50 split among companies founded pre- and post-2008
• Company executive or IT decision maker
• Cross industry




  Objective:
  Understand the differences – with respect to technology adoption/
  utilization /consumption models – between SMBs started since 2008
  as a result of the recession (accidental entrepreneurs) and those
  started prior to 2008.


The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   4
Who is the Accidental Entrepreneur?
• Laid off from white collar job
• Returning from war
• The “newly unretired”
• Stay-at-home spouses
• Not just “old economy”
• White collar, tech-savvy professionals at the peak of
  their career




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   5
How are Accidental Entrepreneurs different?
  Key Findings
  • Driven by profits not passion
  • Bullish about growth
  • Take dramatic and immediate advantage of the cloud
  • Better prepared to scale security
  • More self-sufficient in making software decisions




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          6

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Profits not passion drive post-2008 small businesses
  • 54% of SBs founded post-2008 have an exit strategy(15% higher)
  • 34% of founders of SBs since 2008 come from large enterprises (500+
    employee)
  • 35% left their large employers due to the recession




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          7

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Growing faster than traditional small businesses
  • Four times as many Accidental Entrepreneurs expect to double their number
    of employees in the next two years
  • 75% expect revenue to grow more than 10 percent in the next year




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          8

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Trust more applications to the cloud
  • 21% of Accidental Entrepreneurs have zero servers and 35% have 3+ servers
        – Sophisticated IT infrastructure; four times more likely to build in the cloud
  • 51% deploy cloud software
        – 26% have implemented cloud security vs. 16% of pre-2008
  • All SBs aggressively adopting cloud storage and backup
        – 32% post-2008 and 29% of pre-2008




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          9

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Better prepared to scale security for growth
  • Turn to the cloud more for endpoint, network firewall, email and web
    security
  • 27% more confident that their current security solution will scale




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          10

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
More self-sufficient in making software decisions
  • Base software decisions on what the
    founder used in their previous job or as a
    consumer (across all software types)
  • Strongly prefer known brands
  • Extremely less likely than pre-recession
    SBs to rely on VAR recommendation for
    collaboration and security software




  The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                          11

Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
Accidental Entrepreneurs Are
Velociraptors Feasting On The Herd




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market   12
Conclusions
• Accidental Entrepreneurs:
    – Are growing significantly faster and at the expense of less technically-
      confident, less agile, less ‘connected’ small business owner
    – Are mostly “Enterprise-like” or “Cutting Edge” companies
    – Are very likely to acquire “consumer technology” at retail and then seek
      to modify it as their needs become more complex
    – Need simple, easy-to-deploy and easy-to-manage solutions that can keep
      pace as they quickly scale their company




The Accidental Entrepreneur is REAL and Forever Changing the SMB Market          13
Thank you!




    Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


The Accidental Entrepreneur is REAL and Forever Changing the SMB Market                                                                                                                     14

More Related Content

Viewers also liked

Survey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSurvey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence ReportSymantec
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...Symantec
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...Symantec
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 

Viewers also liked (7)

Survey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSurvey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspective
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 

Similar to Accidental entrepreneur

Chapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-UpsChapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-UpsRayman Soe
 
Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)MidMarket Place
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessSameer Khan
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationIngram Micro Cloud
 
Benefits Of A Small Business Essay
Benefits Of A Small Business EssayBenefits Of A Small Business Essay
Benefits Of A Small Business EssayAmanda Crow
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15Tirrah Switzer
 
BUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small BusinessBUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small BusinessDeborah Oronzio
 
Capital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of GrowthCapital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of GrowthCIT Group
 
The essential elements of a digital transformation strategy
The essential elements of a digital transformation strategyThe essential elements of a digital transformation strategy
The essential elements of a digital transformation strategyMarcel Santilli
 
What does Digital Disruption look like?
What does Digital Disruption look like?What does Digital Disruption look like?
What does Digital Disruption look like?Mike Shaw
 
Tamm & kitt
Tamm & kittTamm & kitt
Tamm & kittJeff Roy
 
Small Business Trends 2009
Small Business Trends 2009Small Business Trends 2009
Small Business Trends 2009Michael Bowers
 
Understanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo MatarreseUnderstanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo MatarreseLeonardo Matarrese
 
Macro Business Environment in India
Macro Business Environment in IndiaMacro Business Environment in India
Macro Business Environment in IndiaAkshay Pratap Singh
 
SMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTapSMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTapChirantan Ghosh
 
Adobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceAdobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceDay Software
 
Medical Record Company Network Security Plan
Medical Record Company Network Security PlanMedical Record Company Network Security Plan
Medical Record Company Network Security PlanKrystal Green
 
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead Windows 7 Professional
 
7 strategies of Best Managed companies
7 strategies of Best Managed companies7 strategies of Best Managed companies
7 strategies of Best Managed companiesDeloitte Canada
 

Similar to Accidental entrepreneur (20)

Chapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-UpsChapter 06 Managing Small Business Start-Ups
Chapter 06 Managing Small Business Start-Ups
 
Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data Success
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial Transformation
 
Benefits Of A Small Business Essay
Benefits Of A Small Business EssayBenefits Of A Small Business Essay
Benefits Of A Small Business Essay
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
BUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small BusinessBUS110 Chap 6 - Entrepreneurship and Starting a Small Business
BUS110 Chap 6 - Entrepreneurship and Starting a Small Business
 
Capital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of GrowthCapital Equipment Finance: The Lifeblood of Growth
Capital Equipment Finance: The Lifeblood of Growth
 
The essential elements of a digital transformation strategy
The essential elements of a digital transformation strategyThe essential elements of a digital transformation strategy
The essential elements of a digital transformation strategy
 
What does Digital Disruption look like?
What does Digital Disruption look like?What does Digital Disruption look like?
What does Digital Disruption look like?
 
Tamm & kitt
Tamm & kittTamm & kitt
Tamm & kitt
 
Small Business Trends 2009
Small Business Trends 2009Small Business Trends 2009
Small Business Trends 2009
 
Understanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo MatarreseUnderstanding Entrepreneurship Leonardo Matarrese
Understanding Entrepreneurship Leonardo Matarrese
 
Macro Business Environment in India
Macro Business Environment in IndiaMacro Business Environment in India
Macro Business Environment in India
 
SMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTapSMB Comes Of Age Needs-IT OnTap
SMB Comes Of Age Needs-IT OnTap
 
CHAPTER 1
CHAPTER 1CHAPTER 1
CHAPTER 1
 
Adobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceAdobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer Experience
 
Medical Record Company Network Security Plan
Medical Record Company Network Security PlanMedical Record Company Network Security Plan
Medical Record Company Network Security Plan
 
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
Second Annual Microsoft SMBPartner Insight Report - The Year Ahead
 
7 strategies of Best Managed companies
7 strategies of Best Managed companies7 strategies of Best Managed companies
7 strategies of Best Managed companies
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 

Recently uploaded (20)

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 

Accidental entrepreneur

  • 1. Accidental Entrepreneur June 13, 2012 The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 1
  • 2. The Accidental Entrepreneur is NOT a Theory Anymore The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 2
  • 3. Business Creation Up during and after Great Recession • Great Recession caused unprecedented business death AND unprecedented business birth • 60,000 more new businesses were created per month in 2009 than in 2007 • Trend Continues…70,000 more per month in 2010, and 50,000 more per month in 2011 The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 3 Source: Kauffman Index of Entrepreneurial Activity 1996-2011, March 2012
  • 4. Research Methodology • Survey performed by Forrester Consulting • 305 U.S. SMBs (3 to 250 employees) – 50/50 split among companies founded pre- and post-2008 • Company executive or IT decision maker • Cross industry Objective: Understand the differences – with respect to technology adoption/ utilization /consumption models – between SMBs started since 2008 as a result of the recession (accidental entrepreneurs) and those started prior to 2008. The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 4
  • 5. Who is the Accidental Entrepreneur? • Laid off from white collar job • Returning from war • The “newly unretired” • Stay-at-home spouses • Not just “old economy” • White collar, tech-savvy professionals at the peak of their career The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 5
  • 6. How are Accidental Entrepreneurs different? Key Findings • Driven by profits not passion • Bullish about growth • Take dramatic and immediate advantage of the cloud • Better prepared to scale security • More self-sufficient in making software decisions The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 6 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 7. Profits not passion drive post-2008 small businesses • 54% of SBs founded post-2008 have an exit strategy(15% higher) • 34% of founders of SBs since 2008 come from large enterprises (500+ employee) • 35% left their large employers due to the recession The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 7 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 8. Growing faster than traditional small businesses • Four times as many Accidental Entrepreneurs expect to double their number of employees in the next two years • 75% expect revenue to grow more than 10 percent in the next year The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 8 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 9. Trust more applications to the cloud • 21% of Accidental Entrepreneurs have zero servers and 35% have 3+ servers – Sophisticated IT infrastructure; four times more likely to build in the cloud • 51% deploy cloud software – 26% have implemented cloud security vs. 16% of pre-2008 • All SBs aggressively adopting cloud storage and backup – 32% post-2008 and 29% of pre-2008 The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 9 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 10. Better prepared to scale security for growth • Turn to the cloud more for endpoint, network firewall, email and web security • 27% more confident that their current security solution will scale The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 10 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 11. More self-sufficient in making software decisions • Base software decisions on what the founder used in their previous job or as a consumer (across all software types) • Strongly prefer known brands • Extremely less likely than pre-recession SBs to rely on VAR recommendation for collaboration and security software The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 11 Source: “The Accidental Entrepreneur,” Forrester Custom Research prepared for Symantec, May 2012
  • 12. Accidental Entrepreneurs Are Velociraptors Feasting On The Herd The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 12
  • 13. Conclusions • Accidental Entrepreneurs: – Are growing significantly faster and at the expense of less technically- confident, less agile, less ‘connected’ small business owner – Are mostly “Enterprise-like” or “Cutting Edge” companies – Are very likely to acquire “consumer technology” at retail and then seek to modify it as their needs become more complex – Need simple, easy-to-deploy and easy-to-manage solutions that can keep pace as they quickly scale their company The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 13
  • 14. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. The Accidental Entrepreneur is REAL and Forever Changing the SMB Market 14