Symantec 2004 Annual Report Download - page 4

Download and view the complete annual report

Please find page 4 of the 2004 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 80

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

‹‹2›› SYMANTEC CORPORATION
2004 Annual Report
To Trust It,You Must Secure It
BUSINESS AND PERSONAL INFORMATION IS WORTH FAR MORE THAN THE INFRASTRUCTURE
THAT STORES IT, THE DATABASE THAT MANAGES IT, THE APPLICATION THAT TRANSFORMS IT, OR
THE NETWORK THAT TRANSPORTS ITCOMBINED. IF THAT INFORMATION IS COMPROMISED,
EVERYTHING THAT ANYONE DOES WITH IT IS SUSPECT. ENSURING THE TRUSTWORTHINESS OF
CRITICAL INFORMATION ASSETS STARTS WITH SECURITY.
Symantec is dedicated to helping individuals
and enterprises ensure the integrity of informa-
tion critical to their work, play, and daily lives.
Our company started on this quest nearly 15 years
ago when we pioneered the antivirus industry
and became the leaders in protecting home and
small business users as well as large enterprise
customers. Since then, the threat spectrum
has shifted toward much more sophisticated,
aggressive, and rapid attacks.
According to the Symantec Internet Security
Threat Report, blended threats accounted for 54
percent of the top attacks in the last six months of
2003. Computer users are also facing an average
of seven new vulnerabilitiesor “holes” in soft-
ware and hardware systemsdiscovered every day.
In addition, the time between the identification
of a new vulnerability and the release of its
exploit is shrinking from months to days, soon
to be within minutes or even simultaneously.
Recognizing this trend, Symantec has devel-
oped broader information security solutions to
protect today’s computing environment and
ensure information integrity.
Today’s security solutions must recognize the
need for early awareness of emerging threats.They
must provide an understanding of and an ability
to address the rapid increase in vulnerabilities
with more integrated technologies to protect
critical information assets. They must prevent
attacks as well as outline a plan to respond to and
recover from their impact.
They must block new threats automatically and
provide protection updates in real-time. Above
all, they must offer the capability to manage the
entire processeither by internal administrators
or by a dedicated services organization outside
the company.
Whether it is an individual system connecting
through an Internet service provider or an office
with thousands of systems on a network, the
security of the overall information technology
infrastructure directly impacts the integrity of
the information flowing across that infrastructure.
Ensuring information integrity is about manag-
ing the security of the computing environment,
distributing software updates and patches,
maintaining a secure archive of important data
and software assets, and ensuring that the value
of the infrastructure is realized.