YellowBook 2013

42
CUSTOMER IT PRIORITIES CUSTOMER BUSINESS PRIORITIES HIGH GROWTH OPPORTUNITIES Confidence in a connected world. THE YELLOW BOOK EMEA 2013 PLANNING FOR SPECIALIZED PARTNERS FEBRUARY 2013 EDITION SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved. APPLIANCES CROSS-SELL STORAGE SECURITY MANAGEMENT BUSINESS CONTINUITY MANUFACTURING CONSUMERIZATION ENERGY PUBLIC SECTOR ENERGY BANKING TELECOM VIRTUALIZATION THREAT LANDSCAPE BIG DATA INFORMATION EXPLOSION MOBILE CLOUD OPPORTUNITIES

Transcript of YellowBook 2013

Customer It PrIorItIesCustomer BusIness PrIorItIes

HIgH growtH oPPortunItIes

Confidence in a connected world.

THE YELLOW BOOK EMEA 2013 PLANNINGFOR SPECIALIZED PARTNERS FEBRUARY 2013 EDITION

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

APPLIANCES Cr

oss-sell

STOR

AGE Security ManageMent

BUSINESS CONTINUITY

MANufActurING

cONSuMErIzAtIONENERGY

PubLIc SEctOrEN

ErG

y Ban

kin

g

tELEcOM

Virtualization

thrEAt LANdScAPE Big DataInformatIon ExplosIon

MObILE

cLOudOppOrtunities

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

2

emeA 2013 eXeCutIVe summArY

2013 mArket oPPortunItIes

technology drivers � Mobility: Enterprise App Store, Device & User Authentication, File Sync & Share

� Security Management: Security Operation Center, Data Loss Prevention, Managed Security Services

� datacenter transformation: Integrated Backup Appliance, Application Availability, Backup as a Service

� cloud: Identity Management, Cloud Security Services

2013 – 2016 � consumerization of It, It-ization of consumer: ‘Bring your Own Everything’ & ‘Personal Cloud’

� Internet of things: explosion of new devices, ‘Verticalization’ of security solutions

� big data: explosion of storage and analytics

Mobile Devices Apps Data

Mobile Devices Apps Data

wHY sYmAnteC?

sYmAnteC enABles PeoPle, BusInesses And CountrIesto ProteCt And mAnAge tHeIr dIgItAl InformAtIonso tHeY CAn foCus tHeIr tIme And energY ACHIeVIng tHeIr AsPIrAtIons.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

3

tABle of Contents

cuStOMEr It PrIOrItIES

FY14 EMEA SPEND ON ITSYMANTEC OFFERINGS

- MOBILITY- INFORMATION MANAGEMENT- SECURITY MANAGEMENT- CLOUD

cuStOMEr buSINESS PrIOrItIES: VErtIcAL MArkEtS

BUSINESS AND IT PROjECTS PER VERTICALEMEA INFRASTRUCTURE IT SPENDING PER VERTICAL

- TELECOMS/COMMUNICATIONS SERVICE PROVIDERS- BANKING- PUBLIC SECTOR- MANUFACTURING- ENERGY

tOP hIGh GrOwth OPPOrtuNItIES

TOP HIGH GROWTH OPPORTUNITIES WITH SYMANTEC- UP-SELL NETBACKUP APPLIANCE- CROSS-SELL ENTERPRISE VAULT- CROSS-SELL ENCRYPTION

rEfErENcES

GLOSSAry

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

4

FY14 EMEA SPEND ON IT

SYMANTEC OFFERINGS

- MOBILITY

- INFORMATION MANAGEMENT

- SECURITY MANAGEMENT

- CLOUD

CUSTOMER IT

PrIOrItIES

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

4

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

5

FY14 EMEA SPEND ON IT

Source: 2013 Forecast EMEA Spend on IT, Symantec

TOTAL IT SPEND$608Bn

TOTAL INFRASTRUCTURESW SPEND

$32Bn

SYMANTEC TOTAL OPPORTUNITY

$7.5Bn

TOTAL SW SPEND$113Bn

tOtAL It SPENd

$674bntOtAL Sw SPENd

$127bntOtAL INfrAStructurE Sw SPENd

$33bn

SyMANtEc tOtAL OPPOrtuNIty

$9.4bn

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

6

SYMANTEC OFFERINGS

INFORMATION SECURITY Managed Security Services

Symantec™ Data Loss PreventionMail and Web Security SolutionsSymantec™ O3Symantec™ Control Compliance SuiteSymantec™ Critical System ProtectionTrust Services

CURRENT OFFERING

Security Compliance

Managed Security Services

Authentication Services

HIGH GROWTH OPPORTUNITIESCORE BUSINESS

Mail and Web Security Market

USER PRODUCTIVITY AND PROTECTION

Norton 360™Norton™ Mobile SecurityNorton Data ServicesSymantec™ Endpoint ProtectionEnterprise Mobility SolutionsEndpoint Encryption SolutionsUser Authentication Solutions

CURRENT OFFERING

Endpoint Encryption

Personal Cloud (Sync & Share)

Mobile AppStore

HIGH GROWTH OPPORTUNITIESCORE BUSINESS

Endpoint Security Market

INFORMATION MANAGEMENT AVAILABILITY AND SCALABILITY

Symantec™ Storage Foundation HASymantec™ NetBackup™Symantec™ Enterprise Vault™/eDiscoverySymantec™ Backup Exec™Symantec™ Backup Exec.cloud

CURRENT OFFERING

Backup Appliances

Hosted Backup

E-Discovery

HIGH GROWTH OPPORTUNITIESCORE BUSINESS

Backup and Recovery Market

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

7

MOBILITY

MOBILE INITIATIVESSIGNIFICANTLYIMPACTINGIT RESOURCES

Rank mobility in theirtop three IT risks41%

IT’S ABOUT AGILITY

· Security

· Backup

· Reducing cost and complexity

Workforceeffectiveness

Reduce time toaccomplish tasks

Efficiency

59% Running line-of-business applications

71% Discussingcustom mobileapplications

66% Discussinga corporate‘app store’

71%

66%

59%

MOBILE DEVICESNOW CRITICALBUSINESS TOOLS

IT PRIORITIES:

Say mobile computing is somewhat to extremely challenging

½

Organizations are increasingly aware of the improvements mobility can make to business processes and productivity. They’re also aware that security solutions need to be put in place to safely bring those benefits to life.

Source: State of Mobility Survey (2012)

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

8

MOBILITY

A SERIES OF SURVEYS SUGGEST THAT TABLETS ARE ACCELERATING THE ADOPTION OF THE MOBILE INTERNET:

� Two-thirds of companies expect to allow tablets on their networks within a year1

� Consumer interest in tablets is even greater outside of the US

� Users are moving beyond web surfing, email, games, video, and applications to content creation

� Tablets are additive to the broader computing market

Apps DataMobile Devices Apps DataMobile Devices

Apps Data

Company Controls Personal Device

Personally-ownedCompany-owned

Man

aged

(Dev

ice

Cent

ric)

Unm

anag

ed(A

pp C

entr

ic)

Company Controls Relevant App & Data Only

Company Controls Standard Device

Company Owned – Unmanaged

BYOD

Source: Symantec

byOd AdOPtION MAP

1 Source: Morgan Stanley “Tablet Demand and Disruption, Mobile Users Come of Age” February 2011

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

9

44% Mobile computing

43% Server virtualization

43% Budget shortfalls

41% Public cloud

65% Increasing number of business critical apps

51% Growth of dataNorth AmericaRegion

Latin AmericaRegion

6.15

7.17

Europe, The MiddleEast and Africa6.68

7.81

Asia Pacific and Japan

INFORMATION MANAGEMENT

WHAT’S DRIVING DATACENTER COMPLExITY?

Symantec research (State of Datacenter 2012) cites a number of reasons for datacenter complexity. Sixty-five percent of companies attribute it to an increase in business-critical applications, while others point at data volume growth, mobile computing, server virtualization, and cloud computing, as well as inadequate budgets.

As a result, costs often rise. In fact, over half of those surveyed cited cost as a major consequence.

“We may be saving money with virtualization, but the more I talk about going to the cloud, that’s an expense.” says the chief of IT operations at a healthcare organization. “You may alleviate expense in one area, but you may increase it in another.”

Other impacts include reduced agility (stated by 39% of respondents); longer lead times for storage migration (39%) and provisioning storage (38%); longer time to find information (37%); security breaches (35%); lost or misplaced data (35%); downtime (35%); and compliance incidents (34%).

Source: Symantec State of the Datacenter (2012)

rEGIONS Of dAtAcENtEr cOMPLEXIty thE drIVErS Of INcrEASING cOMPLEXIty

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

10

INFORMATION MANAGEMENT

SIMPLIFICATION: THE “APPLIANCE-IZATION” OF THE DATACENTER The growing interest in integrated appliance solutions for datacenters is strongest in the area of storage and is having a significant impact on the storage market. A decade ago, there were numerous ISVs and storage software pure-plays participating in the general storage market.

Today, within the storage software markets, there are only a handful of major players. Natural market behaviors of consolidation, maturation, and convergence contributed to this trend. However, what was once a broad range of distinct stand-alone software is being replaced by bundled data management features, and provided in the form of an integrated appliance.

Market shifts across many storage segments, including backup, archive, storage virtualization, and unification of block, file, and object storage are influencing a changing storage vendor landscape. It is also an important part of an even broader market shift, with the convergence of compute, storage, and networking that is driving a realignment of server, network, and storage supplier ecosystems. Symantec is uniquely positioned to provide scalable integrated appliances, leveraging proven software technology with ease of implementation.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

11

Security will continue to become a boardroom discussion for organizations of all sizes as cyber threats receive increased media coverage. As a result, executives will go to their IT departments for reassurance that they are taking the right steps to protect the business whilst continuing to place more scrutiny around IT budgets.

Many IT departments are struggling to respond to this increased awareness; in fact they struggle to answer these questions internally within the IT department. If you were to ask a senior IT leader what their biggest challenge to security is, they will most likely tell you that there is a lack of visibility across their entire infrastructure.

Many organizations own a large and complex collection of different security technologies and controls that they have built up organically over the years as new threats and capabilities have emerged. With each of these products working in isolation and speaking their own unique language, IT departments find it hard to see the bigger picture required to understand the effectiveness of their overall security infrastructure.

Symantec provides security management that not only consolidates all IT management information but also helps IT departments to display it in a way that the business can understand. This enables IT departments to not only show the state of security but also demonstrate the value that the investment in security brings to the business.

As customers become more mature in the way they manage IT and security, they will look to deploy new solutions that provide even greater value to the business, such as risk management. They will strive for efficiency within the IT department so that more resources can be allocated to supporting business growth and innovation.

SECURITY MANAGEMENT

SYMANTEC PROTECTION CENTER MOBILE DASHBOARD

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

12

REACTIVE & MANUAL

People based, following doctrine and doing their best to “Put Out Fires”

TOOLS BASED

Applying tools & technologies piecemeal to assist people

INTEGRATED PICTURE

Loosely integrated with focus on interoperability and standards based data exchange for IA situational awareness

DYNAMIC DEFENSE

Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix and target for response

RESILIENT ENTERPRISE

Predictive & mission focused, isolates and contains damage, secures supply chains and protects key critical infrastructures to operate through cyber attack

TOWARDS CYBER-RESILIENCE

RIS

K M

AN

AG

EMEN

T

AGILITY / SPEED OF ACTION

CURRENT STATE ?

DESIRED STATE ?

SECURITY MANAGEMENT

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

13

CLOUD

While the move to the cloud often yields operational efficiencies and business agility, it must not increase your customer’s availability or security vulnerabilities. Enterprises must remain protected.

Cloud outages and cloud breaches can be avoided with an approach that aligns with IT investment strategy. Three patterns of successful cloud deployments have emerged: consuming cloud services directly, building cloud services, and extending existing IT to leverage other third-party cloud services. These models differ in key success factors, required skills, vendor capabilities, and investment priorities.

Whether your customers want to consume services directly, build their own cloud for internal operations or external reach, or extend into third-party clouds safely and efficiently, Symantec delivers a path to a protected cloud that can help them be more confident.

TOP CLOUD SERVICES DISCUSSEDEmail management or security cloud backup or storage security management

93%of organizations are at least discussing cloud services

Source: Symantec, State of Cloud Survey (2012)

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

14

PRIVATE CLOUD

One Login with Strong Credentials

Identity-based Access Control

Application Visibility and Audit

Information Protection

O3

CLOUD

SyMANtEc O3 : thE NEw cLOud cONtrOL POINt

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

15

BUSINESS AND IT PROjECTS PER VERTICAL

EMEA INFRASTRUCTURE IT SPENDING PER VERTICAL

- TELECOMS/COMMUNICATIONS SERVICE PROVIDERS

- BANKING

- PUBLIC SECTOR

- GOVERNMENT

- DEFENCE

- HEALTHCARE

- MANUFACTURING

- ENERGY

CUSTOMER BUSINESS

PrIOrItIES VERTICAL MARKETS

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

15

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

16

BUSINESS AND IT PROjECTS PER VERTICAL

tELEcOM � Cloud and network convergence

� new cloud and mobile services

� reducing churn

fINANcE � Infrastructure resilience

� mobility for the workforce

� operational risk

PubLIc SEctOr � shared services implementation

� Cyber risk mitigation � operational efficiency

MANufActurING � security on the plant floor

� Intelligent automation � ecosystem productivity

ENErGy � securing production operations

� smart meter rollouts � data privacy and regulatory compliance

58% of new It InVestments In 2013 wIll InVolVe dIreCt PArtICIPAtIon BY lIne of BusIness eXeCutIVes

Source: IDC CIO Agenda Top 10 Predictions 2013

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

17

29%Other Verticals

25%Manufacturing

20%Finance

19%Public Sector

7%Telecommunications

EMEA INFRASTRUCTURE IT SPENDING PER VERTICAL

Source: IDC Vertical Markets Sizing for Symantec, 2013

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

18

TELECOMS / COMMUNICATIONS SERVICE PROVIDERS

The telecommunications industry is becoming a battlefield. All manner of new players are entering the marketplace, and some of these are already using the existing network resources of Communication Service Providers (CSPs) to generate new income streams. As a result, the competition for customers and revenue is more complex and price sensitive than ever before.

Security and information protection will become a major priority for companies of all sizes, as the industry moves towards service-enabling initiatives for cloud, mobile and machine-to-machine (M2M) communication.

But the greatest impact will be to SMBs who lack the resources to deal with information protection issues internally. As a result, there is increasing evidence that many SMB customers would rather purchase cloud and mobile services than try to solve these information protection challenges themselves.

CSPs have an advantage over many other players in the market. They run networks, have a huge customer base and are seen as very trustworthy in their core business. This presents CSPs with the ideal opportunity to expand their network-related services and turn the necessity of security and information protection for their customers into an avenue for additional revenue and growth.

thEIr fOcuS: To increase revenue with new cloud and mobile services.

yOur OPPOrtuNIty:Solutions to build and sell information protection services with confidence.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

19

TELECOMS / COMMUNICATIONS SERVICE PROVIDERS

KEY TRENDS � Decline in traditional business, such as voice and fixed line services � Strong competition with OTT players (e.g. Netflix) and web-based service providers (e.g. Skype)

� Reduction of TCO in IT and Network Operations (all-IP, virtualization) � Investments in promising service enabling initiatives � The convergence of forces impacts CSPs: Cloud, Mobile, Social, Big Data � Internet of Things – The next internet revolution

OPPORTUNITIES

Customer Priorities and Concerns

Solutions Added Value

Explore new revenue opportunities

Information Protection as a Service

Increase Average Revenue Per User (ARPU) for customers with cloud and mobile services

Exploit new generation mobile network access (4G/LTE)

LTE infrastructure protectionBuild trusted and efficient network infrastructures for your customers’ future high bandwidth, low latency services

Manage the explosion of connected devices/machines

Secure M2M servicesBecome a key player in the upcoming M2M ecosystem and increase revenue

Adapt to cloud business models

Consume/resell, build or extend to cloud

Reduce time to market, reduce cost and tailor offerings to customers’ businesses

Optimize the customer experience

Scalable, protected platforms with self-care portals

Increase lifecycle value and reduce churn

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

20

Next Generation Network Protection Services

SYMANTEC OFFERINGS

CSP TARGET MARKETS

Enterprises

SMB

Consumers

M2M

Information Protection as a Service

Secure M2M Services

TELCO CHANNEL BUSINESS MODEL & SOLUTION INTEGRATION

(Symantec Sell-Through Solutions)

TELCO NETWORK & SERVICES PLATFORM

(Symantec Sell-To Solutions)

Telco Platform Protection OSS/BSS/Network Operations

Next Generation Network Protection

4G/LTE Infrastructure Protection

USER PRODUCTIVITY & PROTECTION

INFORMATION CONTROL & SECURITY

INFORMATION AVAILABILITY, PERFORMANCE & SCALABILITY

TELECOMS / COMMUNICATIONS SERVICE PROVIDERS

SYMANTEC CSP VERTICAL SOLUTION FOCUS 2013

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

21

BANKING

As part of core transformation projects, many banks are consolidating their application portfolio. To achieve this successfully and increase operational efficiency, the selection of resilient, hardware vendor agnostic infrastructure will be key.

As consumers continue to embrace online, mobile and social channels, both IT and business departments will need to address new challenges relating to data privacy and access security. They will also need to develop secure transactions using non-traditional methods such as mobile, to remain competitive against new entrants.

The adoption of tablets in the bank as an alternative - or complement - to standard desktops will transform the way IT delivers applications to various departments. The need for Enterprise AppStores is emerging, and securing access to these apps from any device should be considered as the number one priority before implementation.

The recent turmoil about Libor will bring tighter regulations and compliance to anti-fraud regulations, forcing financial institutions to retain more data about their employees, and their communications with third parties.

thEIr fOcuS: To enable banking through the use of enterprise applications and new devices, amongst customers and employees.

yOur OPPOrtuNIty:To meet associated data privacy and security needs. Work closely with Financial Services Application Vendors.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

22

Top Banking Vendor Headquarters Banking Solutions

fiserv USA Core Banking

Sungard UK Financial Services

Swift Belgium Interbank Transfer

Experian Ireland IT Services, Risk Management

tcS India IT Services and Applications

Infosys India IT Services

temenos Switzerland Core Banking, Payments

Oracle US Core Banking

Misys UK Core Banking

Murex France Trading, Risk Management

SAP Germany Core Banking

Sopra banking Software France Core Banking

wincor Nixdorf Germany ATM, Payments

BANKING

FINANCIAL SERVICES APPLICATION VENDORS OPPORTUNITIES

Customer Priorities and Concerns

Solutions Added Value

As part of core banking transformation, need to ensure end-to-end business continuity

Business Continuity platform for Banking Applications – end-to-end application availability

Managing server and storage SLA on various databases and systems (Unix, Linux® & Windows®)

Securing mobile adoption in the bank

Corporate Mobile AppStore Securing applications for both corporate and personal devices

Libor, MiFID, Basel III data retention & compliance

Email/IM/File Archiving On-premise or cloud archiving to ensure faster e-discovery processes

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

23

PUBLIC SECTOR: GOVERNMENT

Social, economic and political tensions will continue to impact governments’ spending strategies, eroding their ability to provide the same level of services to citizens and businesses, and further reinforcing the adoption of a “do less with less” approach.

In IT, governments will have little capacity to embark on new developments, and will need to focus on solutions that can both demonstrate clear efficiency savings and ensure the security of critical assets and information.

The Symantec Internet Security Threat Report (ISTR)1 show that cyber attacks against citizens and governments are intensifying at a dramatic rate. Landmark cases show that the risks to governments and national critical infrastructures are real and can be highly damaging. At the same time, compliance needs will drive further adoption of security and data protection measures for government agencies.

According to many industry analysts, cloud computing, shared services and BYOD “are happening in government”. However, the adoption will be slower and with much more caution than in the Private Sector. Notably, the percentage of cloud spend against the total IT spend in the Public Sector in EMEA is a low one-digit figure. Security continues to be the main inhibitor to both BYOD and cloud adoption. This presents security and cloud vendors, as well as Systems Integrators, with the opportunity and responsibility to educate IT/business decision makers on the best way to implement and secure cloud solutions.

Smart City is a growing subject of discussion and already being implemented by municipalities of all sizes. Cities have a vested interest in attracting new businesses and citizens to the area. As a result, visionary administrators are investing in improvements to infrastructure such as energy, utilities and intelligent transportation; incidentally all are closely linked to carbon footprint compliance. Successful initiatives will rely on multiple disciplines including security, backup, critical infrastructure protection, disaster recovery and data loss prevention.

thEIr fOcuS: Efficiency savings & critical asset security.

yOur OPPOrtuNIty:Cloud education and implementation and solutions around infrastructure protection and data loss prevention.

1 Symantec Internet Security Threat Report: Volume 17 Published April 2012. www.symantec.com/threatreport

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

24

PUBLIC SECTOR: GOVERNMENT

KEY TRENDS � The rising cost of sophisticated and increasingly targeted attacks on complex, heterogeneous infrastructure

� Protecting Information and Critical Infrastructure from damaging cyber and cyber warfare attacks

� Explosion of data � Cloud adoption – private, public and some hybrid – to meet cost efficiency needs

� BYOD/BYOT – managing and securing devices and leveraging capabilities offered by mobility

� Smart City, to ease urban congestion (Intelligent Transportation + M2M) and energy efficiency (Smart Grid)

� Increased use of Intelligence Threat Reports

� EU and national governments to favour SME cloud vendors to boost economy

� EU to endorse cloud regulations and CSP certification

OPPORTUNITIES

Customer Priorities and Concerns Solutions Added Value

Security and agile device management for BYOD adoption

user/App/device management & Protection solutions – manage devices and their security

Help customers with device management design and implementation

Security, data portability and data sovereignty for private cloud adoption

o3 – maintain control of employee use of cloud systems

eV.cloud – archive emails in a secure cloud environment

Be.cloud – back up data to the cloud

Provide reassurance to IT and business decision makers about their data and applications

Protect government data in critical departments

user Authentication – ensure only authorized users have access to resources

data loss Prevention – identify data spills of confidential information and monitor for inappropriate access

security Information manager – detect and correlate suspicious traffic patterns within the infrastructure

encryption – render data unreadable by unauthorized users

Assist customers in identifying what assets are important to their business, where the data is held and how to enforce access policy

Manage disruption of activity by politically motivated attackers

managed security services – monitor networks to detect intrusion attempts

Critical system Protection – harden vital services against attack

endpoint Protection – block files with low reputation or prevalence – Powered by Insight technology

Design and implement robust threat mitigation strategies to protect against current and future threats

Secure critical country infrastructure

Control Compliance suite – consolidate and analyze security information to understand risk exposure

Critical system Protection – harden vital services against attack

Help customers understand and manage the security risks found on their infrastructure

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

25

PUBLIC SECTOR: DEFENCE

Even while geo-political tensions deepen and global threats such as terrorism and cyber warfare intensify and become more sophisticated, Ministries of Defence (MoDs) will remain under pressure to achieve cost efficiency. Nevertheless, securing information and protecting assets and citizens are key priorities and governments will continue to ring-fence budgets and invest in these vital areas.

MoDs will also focus on compliance, in order to align to allied States in their approaches to military operations, information security and the management of big data. MoDs will need to be able to process, store and retrieve large amounts of data with constant availability and flawless reliability for real-time situational awareness purposes.

Private cloud adoption will continue, creating a critical need for security, backup and recovery. And the need for mobile capabilities will increase, especially in the military, operational and disaster relief spaces. MoDs will need to ensure that communication is secure by protecting networks and managing identity and access. Encryption plays a vital role in ensuring mobile data is protected, but MoDs also need to improve cyber knowledge across organizations and refine and strengthen processes and tools to prevent malicious insider attacks designed to smuggle classified information out of legitimate premises.

thEIr fOcuS: Increased cost efficiency and compliance while protecting assets.

yOur OPPOrtuNIty:Solutions around private cloud, mobile capabilities, big data and encryption.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

26

PUBLIC SECTOR: DEFENCE

KEY TRENDS � Political tensions and global threats will escalate the importance of cyber security solutions

� Private cloud adoption will increase the need for security, backup and recovery � The adoption of mobile working will drive the need for identity management and network security

� Data on the move is increasing the risk of data loss and targeted attacks � Big data management continues to be a concern

OPPORTUNITIES

Customer Priorities and Concerns Solutions Added Value

Security and agile device management for BYOD adoption

user/App/device management & Protection solutions – manage devices and their security

Help customers with device management design and implementation

Secure critical resident data

user Authentication – ensure only authorized users have access to resources

data loss Prevention – identify where data is held and secure access

encryption – render data unreadable by unauthorized users

Assist customers in identifying what assets are important to their business, where the data is held and how to enforce access policy

Manage disruption of activity by politically motivated attackers

managed security services – monitor networks to detect intrusion attempts

Critical system Protection – harden vital services against attack

endpoint Protection – rapidly detect malware incursions

Design and implement robust threat mitigation strategies to protect against current and future threats

Secure critical country infrastructureControl Compliance suite – consolidate and analyze security information to understand risk exposure

system recovery – superior backup and disaster recovery for Windows® servers

Help customers understand and manage the security risks found on their infrastructure

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

27

PUBLIC SECTOR: HEALTHCARE

Healthcare Vendor IT Security Requirement Storage & Server Infrastructure

McKesson Protecting officesLeading ISV with more than 20 applications, need for high availability

Cerner Device Security Application Availability

AGFA Healthcare Access Control PACS Storage

CSC Security Services, Telemedecine eHealth, Mobile Health

GE Healthcare Device Security Imaging Systems Protection

Siemens Medical Device Security and Compliance eHealth solutions for hospitals, PACS

THE HEALTHCARE PROVIDER ECOSYSTEM

SECURITY OPPORTUNITYAs healthcare organizations learn more about potential security threats, many are already implementing data protection and data loss prevention initiatives. Mobile devices and consumer connectivity will also create new security challenges for CIOs as wired and wireless connected remote patient and personal health monitoring devices will collect and send clinical data.

STORAGE MANAGEMENT OPPORTUNITYThe provider community will continue to transform – moving away from a reliance on paper based processes and records and embracing electronic records – signalling changes in the approach to IT infrastructure and specifically storage. The amount of storage required in support of legacy and new healthcare applications will continue to increase, for both documents and images with widespread EMR (Electronic Medical Records) adoption.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

28

PUBLIC SECTOR: HEALTHCARE

OPPORTUNITIES

IdENtIty ANd AccESS MANAGEMENt

� rIsk mAnAgement � sIngle sIgn on � strong AutHentICAtIon

Customer Priorities and Concerns Solutions Added Value

hISHospital Information System

� High Availability � Security & Event Management � User Authentication � Desktop Virtualization

Maintain secure 24x7 operation of critical hospital IT systems

EMrElectronic Medical Record

� Data Loss Prevention � Encryption � Security Compliance

Prevent loss of healthcare data without impacting clinical workflows. Protect against malware and automate processes to meet compliance needs, as well as privacy requirements

PAcSPicture Archiving andCommunication System

� Backup Deduplication � Storage Management � Archiving

Augment providers’ PACS infrastructure and provide business continuity in the event of a disruption or disaster. Contribute to lower storage cost capabilities

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

29

MANUFACTURING

Manufacturing will remain a significant driver of innovation, increased productivity and export sales. New technologies and markets will drive manufacturers to adopt new business models to ensure that their products thrive in the 21st century.

There will be increased integration of IT systems – from enterprise accounting and ERP systems to industrial production systems – to support flexible, adaptive practices required by manufacturers. As these systems become interconnected, information security risk will spread throughout the organization. Risks that were previously considered as non-critical may increase in severity when systems are closely associated.

In line with this evolution, the industry will need to deploy the correct security architecture and risk management processes to maintain integrity and availability, as well as protect valuable intellectual property. This presents opportunities for those able to facilitate these changes and secure the processes of the modern production line.

thEIr fOcuS: Interconnecting IT and industrial production systems.

yOur OPPOrtuNIty:Solutions around managing the associated risk.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

30

MANUFACTURING

KEY TRENDS � Closer integration between enterprise and production systems � Adoption of cloud systems to reduce costs and improve flexibility � M2M communication to speed up the manufacturing process � Financially motivated attackers seek to compromise valuable intellectual property � Politically motivated attackers seek to disrupt operation or affect production

OPPORTUNITIES

Customer Priorities and Concerns Solutions Added Value

Maintain production schedules Business Continuity Assist customers to assure application uptime and reduced time to recovery

Protect intellectual property Data Loss Prevention, Encryption Help customer to manage access to highly valuable data

Manage IT and production risks Managed Security, Risk Management Systems Enable customers to prioritize risks and secure networks

Secure cloud adoption Cloud Access Brokerage, Hosted Data Solutions Help customers to control access to cloud services, secure & compliant storage

Secure M2M communication Embedded Solutions Assure authenticity and integrity of machine communications for customers

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

31

ENERGY

SMART GRID AND OIL & GAS Energy utilities are in transition. Increased competition, globalization, regulatory changes as well as the pressure to move to renewable energies have all forced radical change within the industry.

Smart Grids seek to improve operational efficiency and increase the flexibility of energy distribution control systems by digitizing them through the use of internet communication technologies. As a result, power generation, distribution and the end consumer’s active control are are being altered significantly. In fact, the current transformation to Smart Grids is the most radical change for the industry in 100 years.

The impact of digitizing production systems will be felt in other industries also, such as the oil & gas sector. And the need to control costs while increasing production will drive new investments in IT and technology.

The convergence of information technology and operational technology holds both opportunities and risks. Industries that rely on IT to deliver essential goods and services to businesses and the public will feel the immediate impact of any failures or outages.

Safeguarding these critical systems and the sensitive data that they contain requires security to be implemented from the beginning.

Not only do systems need protecting from attack and their availability assured, but data such as valuable oil & gas exploration data or confidential information generated by electricity meters, also needs protecting against loss or attempts of fraud. The recent Shamoon attacks against the oil & gas industry in the Middle East and security breaches in SCADA vendor networks underline how vulnerable the energy sector can be to sophisticated attackers.

thEIr fOcuS: The transition towards Smart Grids and ‘The Digital Oilfield’.

yOur OPPOrtuNIty:Solutions to protect critical infrastructure and sensitive information in transition.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

32

ENERGY

KEY TRENDS � Transition from legacy electricity grid architectures to Smart Grids � Transition to ‘The Digital Oilfield’ to increase operational efficiency � Convergence of Enterprise IT with OT (Operational Technology/SCADA) � Deployment of embedded systems and M2M communication � Politically motivated attacks against critical infrastructures � Big Data – exploration and real-time data for dynamic Grid management

OPPORTUNITIES

PROTECTION AND SECURITY FOR THE ENERGY INDUSTRY

Customer Priorities and Concerns

Solutions Added Value

Meet regulatory complianceIT GRC with Control Compliance Suite

Increase brand reputation, drive down cost to demonstrate compliance and reduce risk of fines for customers

Protect critical infrastructure and information

Critical System Protection, Encryption

Enable customers to prioritize risks, protect company value and gain competitive advantage

Deploy Smart Meters and embedded systems

Scalable and trusted Device Authentication with MPKI

Gain customer confidence, prevent fraud and secure industrial supply chains

Ensure reliability of IT and OT

Disaster Recovery, High Availability with SF/HA

Guarantee application uptime and continuity of essential energy services for consumers and the industry

Manage the explosion of sensitive information

Information Protection with Deduplication, Data Loss Prevention

Deliver secure, highly available and cost efficient storage management infrastructure

SEcurING OPErAtIONSSecurity and management in the SCADA and ICS control center

MANAGING thE dAtA EXPLOSIONProtection and management for data generated by SCADA and AMI networks

EMbEddING SEcurIty wIth thE dAtATrust information from anywhere, from anyone, from any device

MANAGING SMArt ENdPOINtS ANd EMbEddEd SyStEMSProtection for all smart devices

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

33

TOP HIGH GROWTH OPPORTUNITIES WITH SYMANTEC

- UP-SELL NETBACKUP APPLIANCE

- CROSS-SELL ENTERPRISE VAULT

- CROSS-SELL ENCRYPTION

TOP HIGH GROWTH

OPPOrtuNItIES

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

33

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

34

TOP HIGH GROWTH OPPORTUNITIES WITH SYMANTEC

HIGHER REVENUE GENERATION. FASTER DEAL CLOSURE. DEEPER CUSTOMER RELATIONSHIPS. HIGHER CUSTOMER SATISFACTION.

Symantec recently conducted a detailed sales analysis of current customer buying behaviors and identified several opportunities that correlate to higher revenue generation, faster deal closure, deeper customer relationships and higher customer satisfaction.

The top cross-sell and up-sell opportunities outlined take advantage of a customers’ propensity to purchase solutions that solve their business problems; are in high demand; and typically align to new or emerging technologies.

Use this information to focus your selling efforts, maximize opportunities, and accelerate potential incremental revenue while also better positioning your business to enter new markets by building skills complementary to those you may already posses.

MAxIMIZE YOUR OPPORTUNITIES

UP-SELL NETBACKUP APPLIANCESymantec NetBackup Appliances are an excellent up-sell for existing Symantec NetBackup customers looking to consolidate disk space or leverage cloud solutions

CROSS-SELL ENTERPRISE VAULT If you sell Symantec Backup Exec, Symantec NetBackup or Veritas Storage Foundation High Availability, why not expand the offering to include Symantec Enterprise Vault

CROSS-SELL ENCRYPTIONIf you sell Endpoint Management, Compliance or Endpoint Security Management solutions, introduce Symantec Encryption solutions

For more high growth opportunities go to PartnerNet

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

35

UP-SELL NETBACKUP APPLIANCE

THE OPPORTUNITYMost IT departments know how many terabytes a database is consuming. Fewer can describe why the application is experiencing a particular level of growth, how much data is redundant, and how much is retained that is not core to the business – and this means opportunities for you. Help your customers streamline IT operations and raise their backup strategies to a higher level. This up-sell opportunity enables you to be the trusted advisor to your customers by up selling NetBackup Appliances to customers already running NetBackup 6.x and 7.x software.

TARGET CUSTOMER � Backup Administrator � Director of IT/Storage

Target Company Size � Medium to very large enterprise organizations � 500 employees and greater (could reduce down to 250 employees depending on region and country)

IT Size � Greater than 20TB of primary data

Product � Customers currently using NetBackup software for backup and data protection � NetBackup 6.x: End of Support was 3rd October 2012 � NetBackup 7.0 or 7.1: new feature and functionality is current version

we eXPeCt tHe totAl worldwIde PurPose BuIlt BACkuP APPlIAnCe (PBBA) reVenue wIll grow roBustlY wItH A ComPound AnnuAl growtH rAte (CAgr) of 19.4%, totAlIng neArlY $5.9 BIllIon BY tHe Close of 2016…

Worldwide Purpose-Built Backup Appliance 2012-2016, Robert Amatruda, IDC.

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

36

UP-SELL NETBACKUP APPLIANCE

PARTNER VALUEValue To Your Bottom Line

� There is an estimated $825M addressable market opportunity in 2012 selling to 35,000 existing NetBackup customers

� There are 30,000 new or refreshed media servers per year � Data within IT organizations is growing at 62% CAGR – expect continued growth for data protection and replication solutions

� Sell your customers additional Data Protection Optimization (deduplication and replication) licensing

Stand Apart From The Competition � Lockout Competitors: NetBackup Appliances are one of the fastest growing appliances, and the only ones that offer dedupe on both the client and the target

� NetBackup Appliances offer customers scalability at less cost � A complete data protection solution from a single vendor � Differentiate yourself to customers by becoming a Symantec Data Protection Specialist

Additional Services Opportunities � Consulting and design services � Installation & integration services � Help Desk services

$825MAddrESSAbLE MArkEt OPPOrtuNIty IN 2012

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

37

CROSS-SELL ENTERPRISE VAULT

THE OPPORTUNITYIt is estimated that up to 70% of data is duplicate and has not been accessed in 90 days. Customers are experiencing data growth across their email, SharePoint, and file servers. Without the right information management systems in place, customers will continue to struggle to manage and control this growth. This cross-sell opportunity enables you to be the trusted advisor to your customers by positioning Symantec™ Enterprise Vault™ (EV) into your existing Symantec™ Backup Exec™ (BE), NetBackup™ (NBU) or Storage Foundation (SF) install base.

TARGET CUSTOMER � Target the Director of IT, or similar role, as he/she will oversee and care about all of these operations (backup, storage, archiving and primary applications)

� Enterprise Vault personas - Exchange/Storage/IT Admin, IT Architect, Director/VP of IT, Legal

� For NetBackup or Backup Exec customers – Backup Admin, Director of IT � For Storage Foundation customers – Windows®/Linux® IT Architect, Director of IT

¹ Gartner 2012 Magic Quadrant for Enterprise Information Archiving Solutions

ALSO PurchASEd ENtErPrISE VAuLt.

16%19% Of Our NEtbAckuP

cuStOMErS

23% Of Our StOrAGE fOuNdAtION cuStOMErS

Of Our bAckuP EXEc cuStOMErS

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

38

CROSS-SELL ENTERPRISE VAULT

PARTNER VALUEValue To Your Bottom Line

� Enterprise Vault’s (EV) average sales price is over $200,000. There are a number of solutions that can be sold with EV, and this cross-sell opportunity focuses on selling EV into your existing NBU, BE, or SF install base. Once EV is installed, there are opportunities by expanding the archive footprint and cross selling Data Loss Prevention, the Clearwell eDiscovery Platform and other Symantec solutions.

Stand Apart From The Competition � Sell the industry leader¹ in integrated content archiving, that enables users to store, manage and discover unstructured information across the organization. As the industry’s most widely deployed enterprise archiving solution, Enterprise Vault helps customers deduplicate information at the source to reduce costs, delete information confidently and discover information efficiently

� Differentiate yourself to customers by becoming a Symantec Archiving & eDiscovery Specialist

Additional Service Opportunities � Customers planning an email migration project (archive before you migrate and especially after) � Customers who have a non-Symantec archive. Many customers choose to migrate off those solutions and onto EV or EV.cloud

� Attach storage to EV on-premise deals. EV requires a storage target for archived data as well as a SQL server. It is storage-agnostic and can store multiple platforms including NetApp, Hitachi, EMC, Dell, HP, and even vendors in the cloud such as AT&T, Nirvanix, Rackspace, and Amazon

¹ Gartner 2012 Magic Quadrant for Enterprise Information Archiving Solutions

ENtErPrISE VAuLt’S AVErAGE SALES PrIcE IS OVEr

$200,000

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

39

CROSS-SELL ENCRYPTION

THE OPPORTUNITYAccording to the Symantec Global Internet Security Threat Report¹, 1 in 10 people have lost a laptop, smart phone, or USB drive with corporate information. That same report indicates that 32% of those employees did not report the loss or theft in a timely fashion. This cross-sell opportunity enables you to be the trusted advisor to your customers by positioning Symantec Encryption into your existing customers that have Endpoint Management, Endpoint Protection, Data Loss Prevention (DLP) or Compliance.

TARGET CUSTOMERExisting Data Loss Prevention and Compliance customers

� Chief Information Security Officer � Director of IT or Info Security � Director of Compliance or Privacy

Existing Endpoint Management and Endpoint Protection customers

� Director of IT or Info Security � Manager or Director of Desktop Operations

¹ Internet Security Threat Report: Volume 17 Published April 2012

ALSO PurchASEdENcryPtION.

14%12%

20%

Of Our ENdPOINt PrOtEctION cuStOMErS

Of Our cOMPLIANcE cuStOMErS

30% Of Our dAtA LOSS PrEVENtION cuStOMErS

Of Our ENdPOINt MANAGEMENt cuStOMErS

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

| INTRODUCTION | CUsTOmeR IT PRIORITIes | CUsTOmeR BUsINess PRIORITIes | HIgH gROwTH OPPORTUNITIes | RefeReNCes | glOssaRy |

40

CROSS-SELL ENCRYPTION

PARTNER VALUEValue to Your Bottom Line

� Selling encryption will increase your revenue while helping your customers address many compliance and regulatory requirements

� $112M potential addressable market to cross-sell encryption

Stand Apart From The Competition � Differentiate yourself to customers by becoming a Symantec Encryption Specialist � Participate in a Services Review and Workshop and access the Encryption Services Delivery Resource Kit offered to Specialized Partners

Additional Services Opportunities � Implementation or upgrade services � Policy development � Compliance auditing

¹ Internet Security Threat Report: Volume 17 Published April 2012

$112MPOtENtIAL AddrESSAbLE MArkEt tO crOSS-SELL ENcryPtION

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

41

Analysys Mason Mobile research www.analysismason.com

Enterprise Storage Group Storage research www.esg.com

Forrester IT research www.forrester.com

Gartner IT research www.gartner.com

IDC IT research www.idc.com

ISF Security best practices www.securityforum.org

Morgan Stanley Telecom research www.morganstanley.com

OECD – Organisation for economic Cooperation and Development

Economic statistics www.securityforum.org

Pyramid Research IT research www.pyr.com

SNIA – Storage Networking Industry Association

Storage best practices www.snia.org

WHO – World Health Organization Healthcare research www.who.int

REFERENCES

| INtrOductION | cuStOMEr It PrIOrItIES | cuStOMEr buSINESS PrIOrItIES | hIGh GrOwth OPPOrtuNItIES | rEfErENcES | GLOSSAry |

SYMANTEC PROPRIETARY/CONFIDENTIAL – Only for Symantec’s and our SPP Specialized Partner’s internal usage. This documentation may neither be distributed to nor its contents used in its whole, parts or excerpts towards third parties by SPP Specialized Partner. Copyright © 2013 Symantec Corporation. All rights reserved.

42

GLOSSARY

AMI Advanced Metering Infrastructure

APT Advanced Persistent Threats

ARPU Average Revenue Per User

BE Backup Exec

BSS Business Support System

BYOD Bring Your Own Device

BYOT Bring Your Own Technology

CAGR Compound Annual Growth Rate

Churn Attrition rate

CSP Communication Service Provider

DLP Data Loss Prevention

EMR Electronic Medical Record

ERP Enterprise Resource Planning

EV Enterprise Vault

GRC Governance Risk and Compliance

HIS Hospital Information System

IA Information Architecture

ICS Industrial Control Systems

IM Instant Messaging

ISTR Internet Security Threat Report

ISV Independent Software Vendor

LTE Long Term Evolution

M2M Machine to Machine

MoDs Ministery of Defence

MPKI Managed Public Key Infrastructure

NBU NetBackup

OSS Operations Support Systems

OT Operational Technology

OTT Over The Top Player

PACS Picture Archiving and Communication System

SCADA System Control and Data Acquisition

SEP Symantec Endpoint Protection

SF Storage Foundation

SF/HA Storage Foundation High Availability

SLA Service Level Agreement

SME Small and Medium Enterprises

TCO Total Cost of Ownership

| INtrOductION | cuStOMEr It PrIOrItIES | cuStOMEr buSINESS PrIOrItIES | hIGh GrOwth OPPOrtuNItIES | rEfErENcES | GLOSSAry |