Symantec 2007 Annual Report Download - page 5

Download and view the complete annual report

Please find page 5 of the 2007 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 124

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

the world. We’re also focusing on managing our diverse portfolio of products and striving
for a better balance among revenue growth, operating costs, and margin expansion.
In 2008, we are focused on building stronger links between sales and marketing, tighter
alignment between our product integration activities and better product launch quality.
This year, we have a sales force that has had one full year operating as “one-team” under
its belt. It understands the breadth and depth of our product portfolio. As a result, we have
entered fiscal 2008 with a sales team that has built deeper relationships with many of our
largest customers and so our focus now is on leveraging those relationships to deliver
better returns.
There are a number of important growth drivers that will establish the foundation for not
just this fiscal year, but the next few years.
First is Symantec
TM
Endpoint Protection 11.0, which integrates technologies from our
leading antivirus, anti-spyware, endpoint firewall, zero-day protection, and network
access control offerings, all managed through a single management platform. This
comprehensive solution represents the successful integration of many Symantec and
acquired technologies. The solution will not only deliver a more advanced approach to
endpoint protection, but also address an important issue for our customers regarding
agent proliferation and systems resource consumption. Customers continue to tell us
they see value in operating with fewer vendors supporting their IT initiatives, and they’d
like to see the real benefits of our integration actions.
Furthermore, compliance is an important part of our portfolio. During fiscal 2007 we
launched compliance initiatives around both our Control Compliance Suite and
ESM products. As this year unfolds, you’ll see us combine ESM, a core product in
Symantec’s portfolio with our Control Compliance Suite. This initiative will combine the
strength of our agent-based and non-agent based compliance products, giving cus-
tomers a choice of deployment approaches.
In the storage arena, a refresh of our market-leading offerings, combined with our ability
to help customers standardize and simplify their data center infrastructure will strengthen
our competitive position. Our standardization strategy has as its underpinning a focus on
helping reduce the complexity and cost of managing large data centers.
We remain committed to building our Global Services offerings. After all, the most
sophisticated software in the world is powerless without the right people implementing
and managing it, without a strategy to guide it, and without an understanding of the best
practices with which to utilize it. Drawing on the expertise of more than 1,200 profes-
sionals worldwide, we can tailor solutions that meet an individual enterprise’s risk profile,
performance goals, and budget.
And finally, in the consumer business, we believe there is a shift that is occurring whereby
identity-based protection and protecting consumer-based information is becoming as
important as protecting the device with which the consumer interacts. Our consumer
3