EXCLUSIVE: Symantec plans to double business in APJ in five years, says senior executive

EXCLUSIVE: Symantec plans to double business in APJ in five years, says senior executive

Explosive growth in data, Cloud, BYOD will drive growth

Symantec has ambitious plans in Asia Pacific and Japan, which represents close to 19 per cent of its global business, up from 14 per cent four to five years ago.

The explosive growth in data, advances in Cloud, and bring your own device trends, are all to its advantage, according to Symantec Senior vice-president Asia Pacific and Japan, Bernard Kwok. He spoke to ARN recently about the company’s plans in APJ.

RD: What is your vision for the Asia-Pac region in your role?

BK: We will more than double the business in the next five years. We have the product line and the market is robust. The company is very serious about the future.

The explosive data growth, advances in Cloud are to our advantage. We need to continue to focus on our own people as well as our partner community and need go deeper into each solution and all the specialisation. We have all the success factors available to us and we do need to do think smarter.

RD: What are the top technology growth trends in Asia Pac and how will Symantec target those?

BK: There are multiple aspects: number one is which country we want to go into to invest more and where the key upside is. We see upside potential in all countries and in all segments. We will be focusing most on top three - Japan, China and India, which create a higher upoide in terms of growth rate. In terms of market segments, SMB and government sectors across APJ are creating a lot more opportunities for us.

The top seven products what we call the “move the needle” products represent a high percentage of the booking and our business. We will grow those in addition to paying attention to the new and fast trends such as mobile and Cloud. We will also focus on core storage management, backup recovery and security to help us move the needles.

RD: What are your core offerings for Asia-Pacific?

BK: Our core offerings of storage-related, backup and recovery, the end points and archiving, mail and web security those products continue to contribute a lot to our business.

RD: Are there any unique aspects or attributes to Asia or Asian businesses that are driving the adoption of these technologies?

BK: I would not say unique to Asia but there are things we find encouraging: a lot of enterprises realise that security concerns cannot be addressed by one product. You gotta take a holistic approach. In other words, have a policy-based driven approach. That is advantageous to us because we have the most comprehensive solutions in the industry.

The other aspect is a lot more enterprises understand and know they have the social obligations to protect customer details.

For example, in the health care industry, you need to keep patient records very confidential. If you are in the financial industry, protecting customer information is important. [Many of those] companies are also required to comply with the regulatory environment and later on as they mature in their thinking, they realise that it is not just regulatory requirements we are after really go after is risk management. Have the right protocol and processes in place to manage the overall risk.

RD: What types of companies are showing the appetite for security?

BK: Big companies like banks that are very serious about protecting confidential information, the government, and all industries that have IPs.

In the past, for the IT departments, the boundary of what the need to manage was very well defined - all the apps ran in the datacentre, in the server with all the end points – desktops, PCs, mobile devices. But now as more services move in to the Cloud, a lot of people that are IT savvy –the digital natives - come in and find a way to make it work without paying that much attention to the governance. That is creating a lot of challenge for IT departments.

What used to a very boundary-related type of security posturing needs to change because boundary becomes too fussy to have control over it. You need information-based security posturing. You have to figure out what you are trying to protect.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.


Show Comments