Symantec 2008 Annual Report Download - page 93

Download and view the complete annual report

Please find page 93 of the 2008 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 200

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

In addition to the competition we face from direct competitors, we face indirect or potential competition from
retail, application providers, operating system providers, network equipment manufacturers, and other OEMs, who
may provide various solutions and functions in their current and future products. We also compete for access to
retail distribution channels and for the attention of customers at the retail level and in corporate accounts. In
addition, we compete with other software companies, operating system providers, network equipment manufac-
turers and other OEMs to acquire technologies, products, or companies and to publish software developed by third
parties. We also compete with other software companies in our effort to place our products on the computer
equipment sold to consumers by OEMs.
The competitive environments in which each segment operates are described below.
Consumer Products
Some of the channels in which our consumer products are offered are highly competitive. Our competitors are
sometimes intensely focused on customer acquisition, which has led such competitors to offer their technology for
free, engage in aggressive marketing, or enter into competitive partnerships.
Our primary competitors in the Consumer Products segment are McAfee, Inc., Microsoft Corporation, and
Trend Micro Inc. There are also several smaller regional security companies that we compete against primarily in
the EMEA and APJ regions.
Security and Compliance
In the security and compliance markets, we compete against many companies that offer competing products to
our technology solutions and competing services to our response and support services. Our primary competitors in
the security market are Cisco Systems, Inc., McAfee, Microsoft, and Trend Micro. There are also several smaller
regional security companies that we compete against primarily in the EMEA and APJ regions.
Storage and Server Management
The markets for storage and server management are intensely competitive. In the areas of data protection and
storage and server management, our primary competitors are CA Inc., CommVault Systems, Inc., EMC, Inc.,
Hewlett-Packard Co., IBM Corp., Microsoft, Oracle Corp., and Sun Microsystems, Inc.
Services
We believe that the principal competitive factors for our services segment include technical capability,
customer responsiveness, and our ability to hire and retain talented and experienced services personnel. Our
primary competitors in the services segment are EMC, Hewlett-Packard, IBM, and regional specialized consulting
firms. In the managed security services business, our primary competitors are IBM and VeriSign, Inc.
Intellectual Property
Protective Measures
We regard some of the features of our internal operations, software, and documentation as proprietary and rely
on copyright, patent, trademark and trade secret laws, confidentiality procedures, contractual arrangements, and
other measures to protect our proprietary information. Our intellectual property is an important and valuable asset
that enables us to gain recognition for our products, services, and technology and enhance our competitive position.
As part of our confidentiality procedures, we generally enter into non-disclosure agreements with our
employees, distributors, and corporate partners, and we enter into license agreements with respect to our software,
documentation, and other proprietary information. These license agreements are generally non-transferable and
have a perpetual term. We also educate our employees on trade secret protection and employ measures to protect our
facilities, equipment, and networks.
11