Application Control Software in Transportation and Logistics

  • Symantec is one of the premium providers in the application control market and caters to a large customer base. With the growing trends of IoT and rapid rise in the number of connected devices, the company has changed its focus from protecting endpoints to effectively protecting and managing digital information in endpoint devices, which has become one of the prime necessities of today. Symantec’s investment in its channel partners is helping the company in driving customer satisfaction. Their go-to-market strategy includes direct sales as well as indirect sales resources which support their partner ecosystem. The company firmly adheres to the business strategy of having strong relationships with its partners in the market by forming alliances and partnerships with a number of OEMs towards enhancing its products. They partnered with Giesecke & Devrient (G&D), a global leader in mobile security, to collaborate on the development of protected security applications on smartphones and tablets. Symantec also expanded its incident response services to North America, the U.K., and select APAC regions to leverage comprehensive threat intelligence which would help the organization to predict and respond to cyber-threats. This helped the company to double its customer engagement over the last quarter. Besides this, the company is focused toward global Research and Development (R&D) strategy to drive innovations. For this, the company spent USD 1.14 billion in 2015 on in R&D to develop new technologies and product enhancements.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Application Control Software tools.
4.35
4.03
3.68
  • Vision Alignment

    • No. of New products launched in the last one year

    • No. of New customers/clients acquired in the last one year

    • No. of patents

    • Challenges

    • R&D spend

  • Viability

    • Expected revenue FY2019-2020

    • No.of customers

    • No.of endpoints protected

    • Total Revenue

    • %Revenue from Region

      Revenue - North America | Revenue - Europe | Revenue - Asia-Pacific | Revenue - Middle East and Africa | Revenue - Latin America |
  • Mergers and Acquisitions Served

    • Mergers and Acquisitions in past one year

    • Joint Ventures in past one year

    • Partnerships and Collaborations in past one year

  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Indirect Presence - North America

    • Indirect Presence - Europe

    • Indirect Presence - Asia-Pacific

    • Indirect Presence - Middle East and Africa

    • Indirect Presence - Latin America

    • Sales Offices/Development Centers -North America

    • Sales Offices/Development Centers -Europe

    • Sales Offices/Development Centers -Asia-Pacific

    • Sales Offices/Development Centers -Middle East and Africa

    • Sales Offices/Development Centers -Latin America

  • Channel Strategy and Fit

    • Distributors strategy

    • Strategy to address the un-catered and new target audience

    • Partner Ecosystem

      Distributors | Value Added Resellers (VAR) | System Integrators | Consultants |
  • Breadth of Applications Served

    • New industry vertical

    • % Revenue from industry verticals

      Revenue - Other Industry Verticals | Revenue - Travel and Hospitality | Revenue - Transportation and Logistics | Revenue - Retail and eCommerce | Revenue - Media and Entertainment | Revenue - Manufacturing | Revenue - IT and Telecom | Revenue - Healthcare and Life Sciences | Revenue - Governmnet and Defense | Revenue - Energy and Utilities | Revenue - Education | Revenue - BFSI |
    • Industry Verticals catered

      Governmnet and Defense | BFSI | IT and Telecom | Healthcare and Life Sciences | Retail and eCommerce | Transportation and Logistics | Energy and Utilities | Manufacturing | Education | Media and Entertainment | Travel and Hospitality | Other Industry Verticals |
    • Customized application control solutions

  • Support and Services

    • Levels of support

    • Customer redressal mechanism

    • Type of Support services

      Technical Support | Sales Support | Customer Support | Security Support |
    • Support services

      On-Site Support | Remote Support |
    • Pre-sales support

      Software Requirement Specification (SRS) | Proof of Concept | Product Demos | Dedicated Account Manager (DAM) |
  • Scalability

    • End-users/Work stations

    • System configuration required

    • OS/Platforms supported

      Windows XP | Windows Vista | Windows 7 | Windows 8 | Windows 10 | Windows Server 2008 | Windows Server 2003 | Windows Server 2012 | Mac OS | Linux OS |
  • Product Features and Functionality

    • Type of access points

      Desktop/Laptop | Mobile/Tablet | Servers | Point of Sale (PoS) Systems | Virtual Machines | Removable Devices |
    • Application Control features

      Advanced Persistent Threat (APT) Protection | Application Detection and Usage Control | Policy Management | Application Reputation Scoring | Compliance Management | Visibility and Reporting | Threat Detection | Advanced Memory Protection |
  • Delivery

    • Mode of delivery

      Delivery - Directly | Delivery - Through Partners / Third-Party Vendors |
    • End-users catered

      Information Security Specialists | End-Users/Individuals | Application Development Team | IT Administrators |
    • Deployment model

      On-Premise | Hosted / On-Cloud |
  • Breadth and Depth of Product Offering

    • Products/Solutions offered

    • Product variants/licences

    • Services Offered

      Education & Training | Support & Maintenance | Managed Security Services | Vulnerability Assessment | Consulting Services | Compliance & Risk Management |
    • Application Control techniques

      Whitelisting | Blacklisting | Greylisting |
    • Add-on products

      Threat Intelligence | Backup and Recovery | Identity Management | Patch Management |

TOP REVIEWS

Looking for Application Control Software? Get help
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#4 in Application Control Software

“The only security vendor that match our needs"

(*)(*)(*)(*)(*)5
After researching and experiencing different cybersecurity vendors, we found Check Point Security Solutions that match our needs.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#4 in Application Control Software

“Email attachments malware blocked"

(*)(*)(*)(*)(*)5
Impressed with the defensive system of SandBlast. It blocks out the suspicious mail attachments and prevents them from interfering with the disk space or media stored in removable devices.