Greg Butterfield - Symantec - Group President - Altiris Business Unit

Total Page:16

File Type:pdf, Size:1020Kb

Greg Butterfield - Symantec - Group President - Altiris Business Unit Greg Butterfield - Symantec - Group President - Altiris Business Unit Good morning, it's good to be here. It's been a great week here at Vision to participate in all the activities and events to meet with the customers. It's great to be part of Symantec. Today there are three things that I'd like to accomplish during my presentation. First of all I would like to go over the objectives for FY '08. Since Altiris is a new business unit inside Symantec, I thought it would be helpful to give you a high level overview of who we are as a company and what's the value proposition we provide to our customers. I want to take a moment a talk about some of the synergies and some of the excitement that our customers and partners are experiencing as a result of this transaction, as well as our employees. You know over the past six months I've met with over 1,000 customers personally. And so I want to share with you some of the excitement that they've experienced relative to this transaction and why they believe that this makes huge success and makes sense for all customers. And then I'm going to share with you just a few of the growth drivers that we've been able to identify in the first 60 days being part of Symantec. So before I talk about the business in general, let me just first of all say that business unit's number initiative for FY '08 is to meet our financial objectives, both revenue as well as profitability. How are we going to do that? Well we're going to stay focused on the things, the goals, the objectives that we established as a stand alone company before the acquisition. You know this transaction has been basically seamless for many of our employees. You know credit to John and his team, I've done nine acquisitions in the last three years, I've been acquired multiple times in my life, this has been by far the best transaction that I've ever been involved with, including those that we've done our self. So for most of the employees the goal for me is to make sure that they're staying focused on the things that they were already doing. So developers still have the same deadlines, they're working on the same code, our field marketing people have the same campaigns, the same events, our customer support people, the Global Services people are still talking with the exact same customers, still the same exact phone lines, phone numbers. And most importantly, our sales reps are still part of this business unit, they're calling on the same customers and they have exact same quotas they had prior to the transaction. So focus on the things that are currently being done and the goals and objectives that we had as a stand alone company. As we get to know each other better we'll drill down on some of those objectives at a later date. The second most important thing is for executive staff, myself and my team, to make sure that we're maximizing the global resources and the strengths of the greater Symantec. And as we get into growth drivers we're going to talk about some of those things that are very obvious. And then the third thing where I view that there's a huge opportunity in '07, end of '07, moving into '08 and beyond, is the energy associated with the Vista migration. Analysts have forecasted that 10% of all commercial desktops will be converted in the 2007 time frame, and so we view there is a huge opportunity associated with this, there's billions of dollars that are going to be spent. And so we're going to talk about how Symantec is going to be the best company to manage the transitions, not only once they do the migration, but manage the Vista platform going forward and making Windows a better managed operating platform and a more secure operating platform. So those are three or four main objectives we have for FY '08. Let me now transition and share with you the overall value proposition provided by Altiris. Did you know that 80% of IT person's budget is spent and focused on just doing routine maintenance functions, basically keeping the lights on or keeping the system status quo. Well that's the business that were in is helping customers reduce the overall cost and complexity of managing IT. Now being part of Symantec we have the ability not only to cut the costs and complexity of managing the information technology, endpoint and devices, but we also now have the ability to secure that technology. So regardless of customer size, we help reduce risk and we help enhance IT performance. How do we do it? Well we've gone out over the past eight years and we've identified many things that IT organizations are doing on a manual basis and we've taken those things and we've created what's known as an IT Lifecycle Management Suite. So we've taken the manual things that are being done from cradle to grave and we've automated the process through web services and products that solve business problems. Now today we do not have time to go through all of the different products that are available from this business unit. We have over 40 different point solutions, we have five major suites, but let me just identify a few of the solutions that we provide to help reduce business costs and complexity of managing technology. The first thing you'll notice on lifecycle wheel is Asset Identification. Three weeks ago we had a Fortune 500 event. We had 20 plus CIOs in a room. A question was asked, how many of you know how many servers you have in your organization. Guess how many people raised their hand? Three. Three out of 20 said they new how many servers they had in their organization. At the keynote presentation on Tuesday, Mike Mussard from one of the major editors for the trade rags listed ten top oxymorons in IT. The first one he listed is that we're in charge of managing IT but we don't know what we have in our own organizations. How can you manage it if you don't know what you have? So this business unit, right out of the gate, has discovery technology that allows people first of all to identify all their assets, allowing them to then be able to go out and manage the devices. A quick business case with regards to software identification is the annual maintenance fee that you provide to your large software manufacturer. We have had many customers that just implementing that one component from this business unit were able to more than recapture the cost for the product that they actually paid for. If I'm in the process of doing a large software maintenance contract with my software provider and I don't how many licenses I have, then there's the risk of me paying too much. So asset identification, deployment configuration, deployment configuration, there's a huge PC refresh. You've got Vista migration. Today it takes the average IT person approximately two hours at a minimum, two hours to deploy and configure and set up a new device with the Symantec Altiris Business Unit technology you can actually do that in less than 15 minutes. And the exciting part about this is not only can you do a machine, the time that it takes to do a machine you can do ten machines or hundreds of machines or even thousands of machines. So hopefully that gives you a feel for the value proposition. Once again there are 40 different products. We don't have time to talk about all of them today. A key thing here is not just the technology, but the fact that all of these technologies are running on a common configuration management database. So one thing that we do is we help to eliminate manual procedures. The second thing that we do is we provide technology and this technology is built around business process and this technology is all integrated. Part of the reason IT departments are spending 80% isn't because they haven't gone out and purchased software, they have purchased tools. The problem with the tools is they're not integrated on a common architecture. You don't get the benefit of Asset Identification with regards to service delivery. All of these technologies are web services running on a common UI and a common data model. Now in your supplemental information I've given you a couple of customer success stories. Just to give you once again the cost savings, Cargill, a $60 billion company, 40,000 endpoint devices was struggling with the cost and complexity of managing over 40,000 endpoint devices. By implementing our Asset Identification, our software distribution and our Patch Management technology, were able to realize a $4 million savings in the first year. So hopefully that gives you a feel for the value proposition that we provide. Once again, everything is running on a common architecture, you don't have a centralized management store, a source of truth. If you don't know where your assets are, where they're physically located, which people are using those assets and how those assets are tied to other IT assets, then how can you calculate your service level agreements and help determine the overall cost that you're spending on your systems.
Recommended publications
  • Overview of Client Management Suite 7.1 Hands-On Lab
    Overview of Client Management Suite 7.1 Hands-On Lab Description If you are new to Altiris Client Management Suite, this lab is an excellent place to start. This introduction lab provides a hands-on overview of the suite going through many steps of IT lifecycle management. It includes the basics on software and patch management, deployment, migration, remote assistance, and more to start you on your path to effective client management. At the end of this lab, • Create an inventory policy and run reports to view the you should be able to collected data • Describe the available methods for delivering and metering software within a real-world environment • Describe the process of staging and deploying patches to systems and applications within a network environment • Use Deployment Solution 7.1 to perform an OS Migration Notes . The lab will be directed and will provide you with step-by- step walkthroughs of key features. Feel free to follow along with the instructor, or you may optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Introduction Altiris® Client Management Suite™ reduces the total cost of owning client systems by automating time-consuming and redundant tasks. By minimizing the efforts and costs associated with deploying, managing, securing and troubleshooting client systems, organizations can gain control of their environments. This easy-to-use, integrated suite of solution software for Windows, Mac and Linux is designed to address IT management needs for desktop and notebook computers throughout their entire IT lifecycle.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide
    Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • Server Management Suite 8.1 Release Notes
    Symantec™ Server Management Suite 8.1 powered by Altiris™ technology Release Notes Symantec™ Server Management Suite 8.1 powered by Altiris™ technology Release Notes Legal Notice Copyright © 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and Altiris and Symantec or Altiris are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion.
    [Show full text]
  • Overall Messaging/Description (We'll Want to Highlight
    Storage and Availability Management Group Data Protection Group At-a-Glance PROFILE Symantec provides enterprise customers with storage management, high availability and data protection solutions across heterogeneous storage and server platforms in both physical and virtual environments. These solutions enable companies to standardize on a single layer of infrastructure software that works on every major distributed operating system and supports every major storage device, database and application. Storage and Availability Management – Symantec’s storage management and high availability family of products provide storage management, storage resource management, storage utilization management, storage area network, or SAN management, storage virtualization and replication, allowing enterprises to ensure the availability of critical applications and data. Products include Veritas CommandCentral Storage, Veritas Storage Foundation and Veritas Cluster Server. Data Protection – Symantec’s data protection family of products is designed to ensure successful backup and recovery of information and systems for organizations across all market segments, from small and medium-sized businesses to large enterprises, using the latest disk, tape, deduplication, indexing and virtual technologies. Products include Veritas NetBackup Platform, Symantec Backup Exec and Symantec Backup Exec System Recovery. LEADERSHIP • Rob Soderbery, senior vice president, Storage and Availability Management Group • Deepak Mohan, senior vice president, Data Protection Group Symantec Corp., 2008 1 STORAGE AND AVAILABILITY MANAGEMENT PRODUCTS Veritas Storage Foundation Veritas Storage Foundation from Symantec provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager and Veritas File System, it provides a standard set of integrated tools to centrally manage explosive data growth, maximize storage hardware investments, provide data protection and adapt to changing business requirements.
    [Show full text]
  • Gartner's Magic Quadrant for Endpoint Protection Platform 2010
    Magic Quadrant for Endpoint Protection Platforms Gartner RAS Core Research Note G00208912, Peter Firstbrook, John Girard, Neil MacDonald, 17 December 2010, R3563 01092012 Malware effectiveness continues to accelerate, while vendors are busy polishing increasingly ineffective solutions and doing little to fundamentally reduce the attack surface and protect users. WHAT YOU NEED TO KNOW • This year’s analysis did not show considerable movement of vendors from last year’s analysis. • Malware detection accuracy has not improved significantly, while malware is improving in efficiency and volume. • The inclusion of basic vulnerability and configuration management in endpoint protection platform (EPP) suites is still low as vendors continue to focus on signature-based defenses rather than addressing root causes. • Application control (also referred to as “default deny” or “whitelisting”) holds significant promise, but with a few exceptions, most of the vendors in this analysis do not provide flexible enough solutions for larger enterprises. MAGIC QUADRANT Market Overview The threat environment continues to outpace improvements in malware detection effectiveness. High-profile attacks, such as Aurora and Stuxnet in 2010, illustrate the growing sophistication of malware attacks. While the volume and effectiveness of malware are growing rapidly, there have been few effective improvements in EPP vendors’ defensive technologies. Gartner clients are increasingly frustrated with having to clean PCs from well- known consumer infections like “Fake AV” and are concerned about the potential impact of more stealthy, undetected, targeted attacks. Signature-based malware detection has been limping along on life support for years, yet vendors seem unwilling to aggressively invest in more-effective solutions, preferring to “tweak” the existing paradigm.
    [Show full text]
  • Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ User Guide Altiris™ IT Analytics Solution 7.1 from Symantec™ User Guide
    Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ User Guide Altiris™ IT Analytics Solution 7.1 from Symantec™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, Altiris, and any Altiris or Symantec trademarks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
    [Show full text]
  • Altiris™ Software Management Solution from Symantec Users Guide
    Altiris™ Software Management Solution from Symantec Users Guide Version 7.0 SP2 Altiris™ Software Management Solution from Symantec Users Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 7.0 SP2 Legal Notice Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • HOW to USE THIS DOCUMENT: Buying Programs
    ___________________________________________________________________________________ HOW TO USE THIS DOCUMENT: You can find a key word to use in your search on the repository. • You can use Ctrl + F to search this entire document. • You can also jump to a particular group and manually scroll. Buying Programs Which includes: Express Buying Program Certificate Services Which includes: MPKI for SSL; SSL Certificate; Roots and Audits; Managed PKI (MPKI) Online Services Which includes: CloudSOC (CASB) (formerly Elastica); Web Security Service; DLP Cloud; VIP; Cyber Security Services Education and Technical Services Which includes Customer Success; Training Consumer Software Which includes Norton Enterprise Software Which includes SEP and ATP Version 2019.09.20 ___________________________________________________________________________________ Buying Programs Use These Key Word To Look for These Associated Documents Express Buying Program • Express Buying Program Terms and Conditions [Back to Top] Version 2019.09.20 ___________________________________________________________________________________ Certificate Services Symantec completed its divestiture of its certificate services to DigiCert on October 31, 2017. For standard agreements, service descriptions, audit reports and root policies relevant to the Certificate Authority business (including Symantec, Thawte, GeoTrust, and RapidSSL), please visit the Certificate Authority Repository. [Back to Top] Version 2019.09.20 ___________________________________________________________________________________
    [Show full text]
  • Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide
    Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, Altiris, and any Altiris or Symantec trademarks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • Magic Quadrant for Endpoint Protection Platforms Published: 2 January 2013
    This research note is restricted to the personal use of [email protected] G00239869 Magic Quadrant for Endpoint Protection Platforms Published: 2 January 2013 Analyst(s): Peter Firstbrook, John Girard, Neil MacDonald The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration. Strategic Planning Assumption By 2017, more than 50% of end-user devices will be restricted to running only apps that have been preinspected for security and privacy risks, up from 20% today. Market Definition/Description The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include: ■ Anti-malware ■ Anti-spyware ■ Personal firewalls ■ Host-based intrusion prevention ■ Port and device control ■ Full-disk and file encryption, also known as mobile data protection ■ Endpoint data loss prevention (DLP) ■ Vulnerability assessment ■ Application control (see Note 1) ■ Mobile device management (MDM) These products and features are typically centrally managed and ideally integrated by shared policies. This research note is restricted to the personal use of [email protected] This research note is restricted to the personal use of [email protected] DLP, MDM and vulnerability assessment are also evaluated in their own Magic Quadrant or MarketScope analyses. Longer term, portions of these markets will get subsumed by the EPP market, as the personal firewall, host intrusion prevention, device control and anti-spyware markets have in the past. EPP suites are a logical place for convergence of these functions.
    [Show full text]
  • List of Applications Updated in ARL #2554
    List of Applications Updated in ARL #2554 Application Name Publisher SyncBackLite 8.6 2BrightSparks TaxACT 2001 2nd Story Software TaxACT 2003 2nd Story Software TaxACT 2004 2nd Story Software TaxACT 2005 2nd Story Software 3DxWare 3Dconnexion 3DxWare 10 3Dconnexion HotDocs 6.3 AbacusNext PROMOD IV 11 ABB FineReader 6 Professional ABBYY Typora 0.9 Abner Lee AccuWeather Desktop 1.8 AccuWeather ACDSee 3.1 ACD Systems ACDSee 7 ACD Systems ACDSee Pro 7.0 ACD Systems Acoustica CD/DVD Label Maker Acoustica CutePDF Writer 3 Acro Software ISO Burner 1.1 Active Data Recovery Software FlySpeed SQL Query 3.3 ActiveDBSoft ActivePerl 5.16 ActiveState Rome - Total War 1.0 Activision Visual Lighting 2.4 Acuity Brands Lighting Easy-CD Pro 2.0 Adaptec OneSite 5.6 Adaptiva Acrobat 1 Adobe Acrobat 2 Adobe Acrobat 4 Adobe Acrobat 6 Pro Adobe Acrobat 7.0 Pro Adobe Acrobat DC (2019) Adobe Acrobat DC (2020) Continuous Adobe Acrobat Reader 6 Adobe Acrobat Reader 7 Adobe Acrobat Reader DC Adobe AcroTray Adobe AcroTray XI Adobe After Effects CC (2015) - UNAUTHORIZED Adobe After Effects CC (2018) Adobe After Effects CC (2019) Adobe After Effects CC (2020) Adobe Animate CC (2017) - UNAUTHORIZED Adobe Animate CC (2019) Adobe Animate CC (2020) Adobe Audition CC (2015) - UNAUTHORIZED Adobe Audition CC (2020) Adobe Authorware Runtime 4 Adobe Authorware Runtime 5 Adobe Authorware Runtime 7 Adobe Authorware Web Player 6 Adobe Bridge CC (2020) Adobe Capture Classic FormFlow Filler 2.2 Adobe Character Animator CC (2020) Adobe Connect 2019.3 Adobe Connect 2020.1 Adobe Contribute
    [Show full text]