Rosenheimer Strasse 143c
81671 München, de
+49 (89) 173019 0
Symantec to Acquire VeriSign's Security Business Solidifying its Position as the World's Most Trusted Source for Protecting Information and Identities Online
By restoring trust online through universal adoption of identity-based security, Symantec can facilitate a new vision of computing
"With the anonymity of the Internet and the evolving threat landscape, people and organizations are struggling to maintain confidence in the security of their interactions, information and identities online. At the same time, people's personal and professional lives have converged and they want to use their various digital devices to access information wherever they are without jeopardizing their privacy," said Enrique Salem, president and CEO, Symantec. "At the same time, IT is faced with the challenge of giving users the appropriate access, while ensuring that corporate data is not at risk. We believe the solution to this dilemma lies in the ubiquity of identitybased security. With the combined products and reach from Symantec and VeriSign, we are poised to drive the adoption of identity security as the means to provide simple and secure access to anything from anywhere, to prevent identity fraud and to make online experiences more userfriendly and hasslefree."
Under the terms of the agreement, Symantec will purchase the specific assets from VeriSign, including the majority stake in VeriSign Japan, for a purchase price of approximately $1.28 billion in cash. Symantec expects the transaction to be 9 cents dilutive to non-GAAP earnings per share in fiscal year 2011, due to the purchase price accounting write down of deferred revenue, and accretive to non-GAAP earnings per share in the September 2011 quarter. The agreement is subject to customary closing conditions, including regulatory approvals, and is expected to close in the September quarter.
Enabling a New Vision of Computing
Through this acquisition, Symantec can help businesses incorporate identity security into a comprehensive framework so that IT can confidently and securely adopt new computing models, from cloud computing to social networking and mobile computing to userowned devices, that promise operational efficiencies and freedom of choice for their employees and customers. That framework is based on five imperatives that Symantec is enabling as part of its new vision of computing and includes:
-Identity security: proving that people and sites are who they say they are
-Mobile and other device security: securing mobile and other devices and the information on them
-Information protection: protecting information from loss, attack, theft and misuse and ensuring the ability to recover that information
-Context and relevance: delivering information that is relevant to people in both their personal and professional roles
-Cloud security: ensuring the secure delivery of applications and information from both public and private clouds
Ease-of-use, speed-of-delivery and user-driven preferences are the new imperatives in today's workplace. People whose personal and professional lives have converged onto their digital devices increasingly expect the freedom to work from anywhere using their own devices, to use any application and to collaborate with anybody in their social network to effectively get their jobs done and simultaneously live their networkenriched lives.
IT departments struggle to meet user expectations with simple, secure and costeffective solutions. Cloud computing can provide instantaneous scale and delivery of applications and desktops by enabling businesses to leverage services from the cloud instead of deploying applications on premise. Identitybased security gives IT the assurance that as information moves in and out of the cloud it is always protected -- across any device and between the network and devices they control and those that they don't. The user's identity drives what information they can access and how it can be used and shared, independent of the device or application.
Creating Mutually Trusted Interactions Online
VeriSign's SSL Certificate Services provide users with assurance that the websites they are interacting with are legitimate and secure and that their information will be safe when they share it with that site. The VeriSign check mark signifies the authenticity of the websites that users visit and assures them that any sensitive information they share with that site will be encrypted during online transactions. With more than one million web servers using VeriSign SSL certificates, and an infrastructure that processes more than two billion certificate checks daily, VeriSign has the leading share of the SSL market. The addressable market for the server and user authentication segment is estimated to reach $1.6 billion by 2013.
Symantec's current portfolio and along with assets from VeriSign provide the depth and breadth of technologies to make identitybased security of information more universal and part of a comprehensive security solution. By combining VeriSign's SSL Certificate Services with Symantec Critical System Protection or Protection Suite for Servers, Symantec will help organizations ensure a higher level of security on their web servers as well as verify that security, providing users with the trust and confidence necessary to do business online.
VeriSign helps organizations validate the identity of users through its VeriSign Identity Protection (VIP) user authentication service that complements the existing Identity Safe capabilities within the Norton products. The cloudbased VIP service helps organizations doing business online confirm the identities of their customers, employees and partners through userowned digital certificates that reside on a card, token or other device such as a mobile phone, ensuring that they are giving only legitimate users access to their information. VeriSign has already issued more than two million VIP credentials to individuals and has a network of hundreds of merchants.
Through Symantec's worldwide distribution network and footprint on more than one billion systems - including enduser devices such as laptops, desktops and smart devices, as well as servers - Symantec can facilitate the ubiquity of identity security through digital certificates for both individuals and companies. This is critical to creating mutually trusted interactions online. Merchants have added incentive to join the VIP network if user certificates are widely distributed. More merchants in the VIP network means a more secure and convenient experience for customers moving among member sites. Merchants benefit as well from knowing their customers are also trusted and secure.
Symantec can expand the VIP ecosystem by incorporating user certificates into its Nortonbranded consumer products providing a channel through which consumers can easily create secure identities that can be authenticated when they do business online. In addition, the combination of the information classification capabilities of Symantec's Data Loss Prevention solutions and Data Insight technology along with VeriSign's identity security services, will allow us to help customers ensure that only authorized users have access to specific information.
Signifying Trust Online
The VeriSign check mark is the most recognized symbol of trust online with more than 175 million impressions every day on more than 90,000 websites in 160 countries. Symantec's security solutions and the company's Nortonbranded suites protect more than one billion systems and users around the world. With the addition of VeriSign's security assets, Symantec will become the leading source of trust online. Following the close of the transaction, Symantec plans to incorporate the VeriSign check mark into a new Symantec logo to convey to users that it is safe to communicate, transact commerce and exchange information online.
For more information on how VeriSign's services will augment Symantec's portfolio please visit: http://go.symantec.com/....
Webcast and Conference Call Information
Symantec will host a conference call and webcast today to discuss the acquisition at 2:30 p.m. PDT/ 5:30 p.m. EDT. The live discussion can be accessed by dialing 888-208-1332 domestic and 913-312-0687 internationally, passcode 8974237. The audio webcast and slide presentation providing an overview of the transaction and strategic rationale and will be available at http://investor.symantec.com/.... Please go to the website at least 15 minutes early to register, download and install any necessary audio software. A replay of the call will be available via webcast.
Forwardlooking Statements: This press release contains forwardlooking statements within the meaning of U.S. federal securities laws, including expectations regarding the closing of Symantec's acquisition of the VeriSign authentication business, the integration of its products and technologies into Symantec's products and solutions and the expected customer benefits of such integration, and the expected impact of the acquisition on Symantec's fiscal 2011 and 2012 operating results, that involve known and unknown risks and uncertainties that may cause actual results to differ materially from those expressed or implied in this press release. Such risk factors include, among others, satisfaction of closing conditions to the transaction, including the receipt of required regulatory approvals, our ability to successfully integrate the acquired businesses and technology, and customer demand for the technologies and integrated product offerings. Actual results may differ materially from those contained in the forwardlooking statements contained in this press release. Additional information concerning these and other risk factors is contained in the Risk Factors section of Symantec's most recently filed Form 10-K. Symantec assumes no obligation to update any forwardlooking statement contained in this press release. The contents of the Symantec website shall not be deemed incorporated by reference into this press release. Any forwardlooking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to firstname.lastname@example.org.