Symantec 2012 Annual Report Download - page 90

Download and view the complete annual report

Please find page 90 of the 2012 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 188

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

Competition
Our markets are consolidating, highly competitive, and subject to rapid changes in technology. We are
focused on integration across our broad product portfolio and are including next-generation technology
capabilities into our solution set to differentiate ourselves from the competition. We believe that the principal
competitive factors necessary to be successful in our industry include product quality and effectiveness, time to
market, price, reputation, financial stability, breadth of product offerings, customer support, brand recognition,
and effective sales and marketing efforts.
In addition to the competition we face from direct competitors, we face indirect or potential competition
from retailers, application providers, operating system providers, network equipment manufacturers, and other
OEMs who may provide various solutions and functions in their current and future products. We also compete
for access to retail distribution channels and for spending at the retail level and in corporate accounts. In addition,
we compete with other software companies, operating system providers, network equipment manufacturers and
other OEMs to acquire technologies, products, or companies and to publish software developed by third parties.
We also compete with other software companies in our effort to place our products on the computer equipment
sold to consumers and enterprises by OEMs.
The competitive environments for each segment are described below.
Consumer
Some of the channels in which our consumer products are offered are highly competitive. Our competitors
are intensely focused on customer acquisition, which has led competitors to offer their technology for free,
engage in aggressive marketing, or enter into competitive partnerships. Our primary competitors in the Consumer
segment are McAfee, Inc., owned by Intel Corporation (“McAfee”) and Trend Micro Inc. (“Trend Micro”).
There are also several security companies and freeware providers that we compete against primarily in the
EMEA and APJ regions. For our consumer backup offerings, our primary competitors are Carbonite, Inc. and
Mozy, Inc., owned by EMC Corporation (“EMC”).
Security and Compliance
In the security and management markets, we compete against many companies that offer competing
products to our solutions. Our primary competitors in the security and management market are McAfee,
Microsoft Corporation (“Microsoft”), and Trend Micro. There are also several smaller regional security
companies that we compete against primarily in the EMEA and APJ regions. In the authentication services
market, our primary competitors are Comodo Group, Inc., RSA, the security division of EMC, Entrust, Inc., and
GoDaddy.com, Inc. In the SaaS security market, our primary competitors are Google Inc.’s Postini Services and
Microsoft. Our primary competitors in the managed services business are SecureWorks, Inc., owned by Dell, Inc.
and Verizon Communications, Inc.
Storage and Server Management
The markets for storage management, backup, archiving, and eDiscovery are intensely competitive. Our
primary competitors are CommVault Systems, Inc., EMC, Hewlett-Packard Company, IBM, and Oracle.
Intellectual Property
Protective Measures
We regard some of the features of our internal operations, software, and documentation as proprietary and
rely on copyright, patent, trademark and trade secret laws, confidentiality procedures, contractual arrangements,
and other measures to protect our proprietary information. Our intellectual property is an important and valuable
asset that enables us to gain recognition for our products, services, and technology and enhance our competitive
position.
11