SlideShare a Scribd company logo
1 of 9
Download to read offline
Symantec Next Generation Network
     Protection



Symantec Next Generation Network Protection   1
Global Mobile Market                                                                                            iPad /
                                                                                                                           iPhone
                                                                                                                 2B iPhone    4
             1000                                                                                     iPhone 3G
                                                                                                                   Apps
                                                                                                                Downloaded
                                     Total Operator                                                     / Apple
                                                                                               iPhone App Store
              900                                                                                2G
                                     Revenue
              800
                                     Operator Data                                               Google Convinces FCC
              700                                                                                   to Open Access
                                     Revenue                                                      Network for 700MHz
              600                                                                                                       Android
$Billions




                                                                                                              First       2.1
                                                                                                Android     Android
              500                                                                             Open Source    Phone
                                                                                               OS Started
              400                            Blackberry                                             Blackberry Blackberry
                                                Email                                                Bold and    App World
              300                                                                                     Storm
                                  Japan 3G                  US 3G        Japan >                           US 4G
                                  Launched                Launched       50% 3G                          Launched
              200                                                                                                           HP
                       Windows                                                                                            Acquires
                        Mobile                                                                                             Palm
              100      Launched
                                                      Symbian
                                                                                                     Symbian Becomes
                                                     Launched
                                                                                                       Open Source
                 0
                        2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
                                        Revenue Data Source: Chetan Sharma Consulting, 2010
            Symantec Next Generation Network Protection                                                                              2
THREATS               NEEDS
 Mobile Ecosystem                                                      DEVICE THEFT

                                                                        DATA LOSS
                                                                                       Pswd Control & Wipe
                                                                                       Encryption
                                                                      MOBILE
                                                                      DEVICE            (Device/Email)
             MOBILE                                                    APP THREATS
                                                                                       Device/App Control
             DEVICES                                                   COMPLIANCE
                                                                                       Policy Delivery
                                                  Corporate Devices
                                                                                       Identity
                                   Personal Devices

                                                     3G-4G
                                                     Access


  THREATS                NEEDS
   MALWARE
                    Mobile Management
   DATA LOSS                                                                                               MOBILE
                    Email/Web Protection INTERNET
 ENTERPRISE                                                                                               CARRIER
DATA CENTER  Email Encrypt / DLP
  COMPLIANCE

                    Authentication

                                                                               THREATS               NEEDS
                                                                                 MISUSE        Quality of
                                                                                                Experience
                                                                             CARRIER /
                                                                               CAPACITY
                                                                             SERVICE           Hosted Mobile
                                                                               OUTAGES
                                                                                                Device/Service Mgt
                                                                             PROVIDER
                                                                                 BRAND         Fraud prevention
                                            DATA
                                           CENTER

 Symantec Next Generation Network Protection                                                                       3
Symantec’s Broad Mobile Strategy & Solutions
                                                   ENTERPRISE /              CARRIER /
       MOBILE DEVICE
                                                   DATA CENTER            SERVICE PROVIDER




                                                       v
         Cross Platform




 Mobile MGMT / Security                       Email Anti-Malware/SPAM       Mobile Security

     Mobile Encryption                         Data Loss Prevention     Email Anti-Malware/SPAM

  Two-Factor Auth (VIP)                          Email Encryption             Hosted PKI

     Device Certificates                      Endpoint Virtualization    Two-Factor Auth (VIP)

                                                 Key Management             Fraud Detection



Symantec Next Generation Network Protection                                                       4
How Symantec Can Help Now
A Complete Approach to Mobility Security and Management

               Consumers                           Enterprise             Communication
                                                                         Service Providers
       • Secure your mobile                   • Gain visibility and      • Improve your customer
         phone and keep your                    control of all mobile      user experience
         personal data safe                     platforms
                                                                         • Increase average
       • Remotely lock or wipe                • Embrace                    revenue per user
         your mobile device in                  consumerization            (ARPU)
         case of loss or theft                            s
         and keep your device                 • Protect and extend       • Provide stronger
         clean through                          your existing security     network security
         Symantec’s anti-                       investments
         malware functionality
                                                                         • Reduce network
                                                                           operation costs by
                                                                           eliminating malware
                                                                           and mobile spam


Symantec Next Generation Network Protection                                                        5
Symantec Next Generation Network Protection




  Set rules and policies         Analyse and inspect               Enforce policy          Subscriber interaction
                                  traffic and content
 • Users / Groups of users      • Network Monitoring               • Time of day          • Warnings / Notifications
    • Network Usage              • Behaviour Profiles             • Acceptable use            • Remediation
• Regulatory requirements         • Malware / Spam                 • Regulations          • Personal policy controls
 • Parental and Corproate      • Content Categorisation            • Preferences               • Quarantine
           controls                                             • Security Permissions




                                                 Network Elements




                                                 Services / Bearers
  Voice               SMS             Web                 P2P              IM            MMS             Email


Symantec Next Generation Network Protection                                                                            6
Next Generation Network Protection Summary
                 Personal Black & White Lists                      Voice                      Web/SMS/IVR self care
                    Web Filtering Controls                         SMS
                                                                                                 Policy Templates




                                                                                  SELF-CARE
                  Time of Day / Day of Week                        Web




                                                  COVERAGE
                                                                                              Parental Notifications
                        Safe Browsing                              Email
                                                                                                 Usage reporting
                     Offensive Text Filters                        MMS
                                                                                                    PIN Codes
                   Message usage controls                         Services

                       STOP commands
                                                             Device independent
 KEY FEATURES




                  Premium Content Controls

                      Personal Redirects

                    Anti-Spam / Anti-Virus

                Application control (eg gaming)

                       Image Screening

                        Image Analysis

                  Social Networking Controls

                        Anti-Grooming

                       Personal Archive



Symantec Next Generation Network Protection                                                                            7
Why?

• Communication service providers are looking to:
     • Drive a higher quality experience for their customers
     • While simultaneously reducing operating costs
     • And increasing average revenue per user (ARPU)
• Only Symantec can seamlessly secure information from the
  individual to the device to the enterprise to the network and
  back again.
• Symantec Next Generation Network Protection gives
  communication service providers and their customers
  confidence by securing their telecommunications experience in
  today’s digitally converging world.


Symantec Next Generation Network Protection                       8
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Next Generation Network Protection

More Related Content

What's hot

Ishiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application DevelopmentIshiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application Developmentbhadrah
 
App stores optimization 110318
App stores optimization 110318App stores optimization 110318
App stores optimization 110318Paul Cowman
 
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkMr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkIDATE DigiWorld
 
Van wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyVan wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyiStrategy
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21shenwai
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide DeckKevin McGee, MBA
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer AppsMarko Gargenta
 
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligenceIBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligenceIBM Sverige
 
IP power stone 4000v.5
IP power stone 4000v.5IP power stone 4000v.5
IP power stone 4000v.5Scott Shelton
 
JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007Edoardo Schepis
 
Internet Trends 2010
Internet Trends 2010Internet Trends 2010
Internet Trends 2010techMAP
 
4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei4G LTE Network – an update from Huawei
4G LTE Network – an update from HuaweiGen-i
 
Web 3 Tom Gruber
Web 3 Tom GruberWeb 3 Tom Gruber
Web 3 Tom GruberMediabistro
 
Vietnam mobile day 2012 developer opportunity - nokia
Vietnam mobile day 2012   developer opportunity - nokiaVietnam mobile day 2012   developer opportunity - nokia
Vietnam mobile day 2012 developer opportunity - nokiaQuang Anh Le
 
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)EMC
 
The Why, What and How of Mobile
The Why, What and How of MobileThe Why, What and How of Mobile
The Why, What and How of MobileMartijn Pannevis
 
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П..."Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...Procontent.Ru Magazine
 

What's hot (20)

Ishiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application DevelopmentIshiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application Development
 
Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012
 
Situational Web
Situational WebSituational Web
Situational Web
 
App stores optimization 110318
App stores optimization 110318App stores optimization 110318
App stores optimization 110318
 
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkMr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
 
Van wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyVan wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydney
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide Deck
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer Apps
 
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligenceIBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
 
IP power stone 4000v.5
IP power stone 4000v.5IP power stone 4000v.5
IP power stone 4000v.5
 
JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007
 
Internet Trends 2010
Internet Trends 2010Internet Trends 2010
Internet Trends 2010
 
4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei
 
Web 3 Tom Gruber
Web 3 Tom GruberWeb 3 Tom Gruber
Web 3 Tom Gruber
 
Vietnam mobile day 2012 developer opportunity - nokia
Vietnam mobile day 2012   developer opportunity - nokiaVietnam mobile day 2012   developer opportunity - nokia
Vietnam mobile day 2012 developer opportunity - nokia
 
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
 
The Why, What and How of Mobile
The Why, What and How of MobileThe Why, What and How of Mobile
The Why, What and How of Mobile
 
Infinity Wire Frame
Infinity Wire FrameInfinity Wire Frame
Infinity Wire Frame
 
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П..."Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
 

Viewers also liked

【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へシスコシステムズ合同会社
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011Chika Yoshimura
 
Gestalt Terapia - Psicologia
Gestalt Terapia - PsicologiaGestalt Terapia - Psicologia
Gestalt Terapia - PsicologiaAdriane Fernandes
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own DeviceMicrosoft
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningSymantec
 
A historia da gestalt
A historia da gestaltA historia da gestalt
A historia da gestaltDiego Avila
 
Aula 02 - Princípios da Gestalt
Aula 02 - Princípios da GestaltAula 02 - Princípios da Gestalt
Aula 02 - Princípios da GestaltDanilo Aroeira
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017InvestorSymantec
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft CloudMicrosoft
 

Viewers also liked (19)

Gestalt na publicidade
Gestalt na publicidadeGestalt na publicidade
Gestalt na publicidade
 
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
Leis da Gestalt
Leis da GestaltLeis da Gestalt
Leis da Gestalt
 
Teoria da Gestalt
Teoria da GestaltTeoria da Gestalt
Teoria da Gestalt
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011
 
Gestalt Terapia - Psicologia
Gestalt Terapia - PsicologiaGestalt Terapia - Psicologia
Gestalt Terapia - Psicologia
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Teoria da Gestalt
Teoria da GestaltTeoria da Gestalt
Teoria da Gestalt
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
A historia da gestalt
A historia da gestaltA historia da gestalt
A historia da gestalt
 
Aula 02 - Princípios da Gestalt
Aula 02 - Princípios da GestaltAula 02 - Princípios da Gestalt
Aula 02 - Princípios da Gestalt
 
Gestalt
GestaltGestalt
Gestalt
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft Cloud
 

Similar to Symantec Next Generation Network Protection

Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile InternetKlaas Wierenga
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012Chuck Goldman
 
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsIndiginox
 
Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsmobilesquared Ltd
 
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsStefan Kolb
 
M2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredM2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredmobilesquared Ltd
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 
Sip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreSip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreAT Kishore
 
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Cisco Canada
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
 
Mobile Pres
Mobile PresMobile Pres
Mobile Presslbedard
 
FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012Rick Huijbregts
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009servicesmobiles.fr
 
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)Alcatel-Lucent Nederland
 
SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition Lars Kamp
 

Similar to Symantec Next Generation Network Protection (20)

Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile Internet
 
Firefox OS
Firefox OSFirefox OS
Firefox OS
 
Mobile experiences
Mobile experiencesMobile experiences
Mobile experiences
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012
 
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & apps
 
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
 
M2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredM2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squared
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Sip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreSip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishore
 
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
 
Mobile Pres
Mobile PresMobile Pres
Mobile Pres
 
Dumb Pipes
Dumb PipesDumb Pipes
Dumb Pipes
 
FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012
 
Samsung's smartphone operating system: bada
Samsung's smartphone operating system: badaSamsung's smartphone operating system: bada
Samsung's smartphone operating system: bada
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
 
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
 
SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition SF Mobile: Founder Labs Mobile Edition
SF Mobile: Founder Labs Mobile Edition
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Symantec Next Generation Network Protection

  • 1. Symantec Next Generation Network Protection Symantec Next Generation Network Protection 1
  • 2. Global Mobile Market iPad / iPhone 2B iPhone 4 1000 iPhone 3G Apps Downloaded Total Operator / Apple iPhone App Store 900 2G Revenue 800 Operator Data Google Convinces FCC 700 to Open Access Revenue Network for 700MHz 600 Android $Billions First 2.1 Android Android 500 Open Source Phone OS Started 400 Blackberry Blackberry Blackberry Email Bold and App World 300 Storm Japan 3G US 3G Japan > US 4G Launched Launched 50% 3G Launched 200 HP Windows Acquires Mobile Palm 100 Launched Symbian Symbian Becomes Launched Open Source 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Revenue Data Source: Chetan Sharma Consulting, 2010 Symantec Next Generation Network Protection 2
  • 3. THREATS NEEDS Mobile Ecosystem DEVICE THEFT DATA LOSS  Pswd Control & Wipe  Encryption MOBILE DEVICE (Device/Email) MOBILE APP THREATS  Device/App Control DEVICES COMPLIANCE  Policy Delivery Corporate Devices  Identity Personal Devices 3G-4G Access THREATS NEEDS MALWARE  Mobile Management DATA LOSS MOBILE  Email/Web Protection INTERNET ENTERPRISE CARRIER DATA CENTER  Email Encrypt / DLP COMPLIANCE  Authentication THREATS NEEDS MISUSE  Quality of Experience CARRIER / CAPACITY SERVICE  Hosted Mobile OUTAGES Device/Service Mgt PROVIDER BRAND  Fraud prevention DATA CENTER Symantec Next Generation Network Protection 3
  • 4. Symantec’s Broad Mobile Strategy & Solutions ENTERPRISE / CARRIER / MOBILE DEVICE DATA CENTER SERVICE PROVIDER v Cross Platform Mobile MGMT / Security Email Anti-Malware/SPAM Mobile Security Mobile Encryption Data Loss Prevention Email Anti-Malware/SPAM Two-Factor Auth (VIP) Email Encryption Hosted PKI Device Certificates Endpoint Virtualization Two-Factor Auth (VIP) Key Management Fraud Detection Symantec Next Generation Network Protection 4
  • 5. How Symantec Can Help Now A Complete Approach to Mobility Security and Management Consumers Enterprise Communication Service Providers • Secure your mobile • Gain visibility and • Improve your customer phone and keep your control of all mobile user experience personal data safe platforms • Increase average • Remotely lock or wipe • Embrace revenue per user your mobile device in consumerization (ARPU) case of loss or theft s and keep your device • Protect and extend • Provide stronger clean through your existing security network security Symantec’s anti- investments malware functionality • Reduce network operation costs by eliminating malware and mobile spam Symantec Next Generation Network Protection 5
  • 6. Symantec Next Generation Network Protection Set rules and policies Analyse and inspect Enforce policy Subscriber interaction traffic and content • Users / Groups of users • Network Monitoring • Time of day • Warnings / Notifications • Network Usage • Behaviour Profiles • Acceptable use • Remediation • Regulatory requirements • Malware / Spam • Regulations • Personal policy controls • Parental and Corproate • Content Categorisation • Preferences • Quarantine controls • Security Permissions Network Elements Services / Bearers Voice SMS Web P2P IM MMS Email Symantec Next Generation Network Protection 6
  • 7. Next Generation Network Protection Summary Personal Black & White Lists Voice Web/SMS/IVR self care Web Filtering Controls SMS Policy Templates SELF-CARE Time of Day / Day of Week Web COVERAGE Parental Notifications Safe Browsing Email Usage reporting Offensive Text Filters MMS PIN Codes Message usage controls Services STOP commands Device independent KEY FEATURES Premium Content Controls Personal Redirects Anti-Spam / Anti-Virus Application control (eg gaming) Image Screening Image Analysis Social Networking Controls Anti-Grooming Personal Archive Symantec Next Generation Network Protection 7
  • 8. Why? • Communication service providers are looking to: • Drive a higher quality experience for their customers • While simultaneously reducing operating costs • And increasing average revenue per user (ARPU) • Only Symantec can seamlessly secure information from the individual to the device to the enterprise to the network and back again. • Symantec Next Generation Network Protection gives communication service providers and their customers confidence by securing their telecommunications experience in today’s digitally converging world. Symantec Next Generation Network Protection 8
  • 9. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Next Generation Network Protection