Our Channel 3 The Team Liat Ivri Nadav Elkabets Orit Cittone Nir Peim.

Post on 12-Jan-2016

216 views 1 download

Tags:

Transcript of Our Channel 3 The Team Liat Ivri Nadav Elkabets Orit Cittone Nir Peim.

Our Channel

3

The Team Liat Ivri

Nadav Elkabets

Orit Cittone

Nir Peim

SafeNet Company Overview

Prakash PanjwaniSenior Vice President

• Founded: 1983• Ownership: private• Revenues: ~$500 million• Global success with more than

25,000 customers in 100 countries

• Employees: 1,600 in 25 countries

• Recognized Security Technology leadership. Products certified to the highest security standards

A leading company exclusively focused on the protection of high-value information assets.

SafeNet Fact Sheet

7

88

2008 Revenue

SafeNet In the global dedicated security markets ($6.2B)

SafeNet

IR_CO_08032009_1_0

Heritage As one of the world’s largest information

security and licensing companies, SafeNet secures critical data, software applications, systems and networks worldwide.. • the most money that

moves in the world. 80% of all electronic banking transfers -- $1 Trillion a day

• the most digital identities in the world. Most PKI identities for governments and F-100 companies

• the most high-value software in the world. 80 Million hardware keys; more than any other vendor

• the most classified information in the world. The largest deployment of government communications security

protects:

9

10

One Focused Vendor Providing The Industry’s Most Comprehensive

Security

• Network & WAN Encryption• Disk & File Encryption• Database & Application Encryption• Hardware Security Modules• Key Management• Multi-Factor Authentication• Content Security

• SW Anti-Piracy Protection • SW License Entitlement &

Mgmt

Solution Focus Products Markets

10

Collaboration Threats

• Boundaries?• What's sensitive?• Sharing without

Risking?• Data granularity?• How do you

protect?

Th

reat

Dri

vers

The Market is Changing—Customers Demand Intelligent Data Protection

Data Conscious Protection

• Perimeter-level security

• All-or-nothing encryption

• Keep bad guys out, authorized users get full access

• Multiple products to meet business and security needs

• Limited to no visibility

• Intelligent data protection—as data is viewed, altered, copied and shared

• Granular protection—protect specific data elements (files, fields, columns), data types (structured or unstructured)

• Granular protection for authorized users—who can access what, when

• Solution that addresses many business, compliance & security issues

• Greater data control and visibility with centralized key/policy mgmt, logging

Data Blindness

Data Access control & Management

Data Protection Management Data Protection InfrastructureData Control at

Perimeter

Data Protection Evolution Architecture

Data Protection Evolution – SafeNet Solutions

Inbound /outbound Perimeter data Protection

Go-To-Market Approach

Kane HardyVP, Southern EMEA Sales

SafeNet - Go-to-Market

• Our business grows with your business

• Partner Relationships• Sales Channel – VAD’s + VAR’s & SI’s• Technology & Solution Partners

• Indirect fulfillment, direct touch market development

• Partner Support Initiatives & programs

SafeNet Southern EMEA Organisation