Symantec 2012 Annual Report Download - page 86

Download and view the complete annual report

Please find page 86 of the 2012 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 188

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

Infrastructure Protection
We provide solutions that allow customers to secure their endpoints, messaging, and Web environments in
addition to defending critical servers, either physically or virtually. Our solutions include market leading
technologies which leverage our global intelligence network making them some of the most effective and fastest
performing solutions for identifying and stopping the latest attacks. In addition, we keep systems safe by
protecting their connections. Our enterprise authentication services enable organizations to protect assets by
ensuring the true identity of a device, system, or application and using Secure Socket Layer (“SSL”) to encrypt
data in transit. Products include: Endpoint Protection for enterprise and small business, Protection Suites, Mail
and Web Security, and Trust Services.
Information and Identity Protection
We help businesses proactively protect their information by taking a content-aware approach. This includes
enabling businesses to identify the owners of specific information, locating sensitive data and identifying those
with access to it, and encrypting and preventing sensitive material from leaving an organization. In addition, we
offer two-factor authentication and cloud-based single sign-on to better protect the identities of an organization’s
employees. Products include: Data Loss Prevention, Data Insight, Encryption, O3, Validation and Identity
Protection, and Managed Public Key Infrastructure (“PKI”).
Mobility and Systems Management
Our mobile solutions help organizations embrace the “Bring Your Own Device” trend by allowing users to
select their devices of choice while securing corporate data, gaining visibility and control of all mobile platforms,
and enforcing security policies. Systems management capabilities help IT organizations provide faster and more
predictable service to their businesses. Our integrated solutions ensure that organizations are able to easily
support new technology changes, quickly adapt to changing processes and business needs, and provide the
necessary insight to make more intelligent, data-driven decisions. Products include: Mobile Management, Device
and Application Management, and IT Management Suite.
Cloud-Delivered Security Services
Our SaaS offerings provide customers the flexibility to manage their business requirements using hosted
services across a wide range of our security and backup solutions. Services include: the Symantec.cloud portfolio
and SSL Certificates.
Storage and Server Management
Our Storage and Server Management segment consists of information management and storage management
solutions. We enable organizations to secure and manage the information-driven world by leveraging our backup
and recovery, archiving, eDiscovery, storage management, and high availability solutions. Our offerings enable
companies to standardize on a single layer of infrastructure software, work on all major distributed operating
systems, and support storage devices, databases, and applications in both physical and virtual environments.
Intelligent Information Management
Our Intelligent Information Management business, which includes software, appliances and SaaS based
offerings, is driven by the rapid growth of information, data duplication, and virtual environments. We help SMB
and enterprise organizations protect their information. With our solutions, customers can back up and deduplicate
data closer to information sources to reduce storage consumption. Our archive, eDiscovery, and intelligent
information governance solutions allow organizations to bridge the gap between their business, legal, and IT
groups, and reduce their risks and costs. Products include: NetBackup, Backup Exec, Enterprise Vault, Enterprise
Vault.cloud, and eDiscovery.
7