Symantec 2014 Annual Report Download - page 110

Download and view the complete annual report

Please find page 110 of the 2014 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 183

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

Strategy
The recent transformation of business and consumer technologies has driven pervasive mobility and an
explosion of data resulting in the need for a new approach to protecting devices, applications, data and users.
Further, the emergence of the Internet of Things, where new devices and everyday objects are becoming
networked and connected to the Internet for the first time, highlights the need for comprehensive information
security and management solutions to protect valuable data. We believe that the market for security and
management solutions will benefit from these trends. As a platform-independent software company without bias
to any individual operating system or hardware environment, Symantec helps customers manage more
technologies with greater efficiency and on a wide range of virtual and mobile platforms.
In January 2013, we announced our strategy to transition from being device-centric or protecting endpoints
and the data center, to having a broader focus of protecting and managing digital information. We track a vast
number of threat indicators across the Internet and continuously collect new telemetry from hundreds of millions
of mobile devices, endpoints, and servers across the globe. This massive amount of security data, combined with
our years of experience analyzing such data allows us to provide advanced intelligence and protection for all of
our customers.
During fiscal year 2014, we implemented changes in three areas: simplifying our organizational structure,
redesigning our GTM strategy, and changing our product offerings.
Simplifying our Organizational Structure
We aligned our organization by functional areas, rather than by market segments in order to reduce
complexity, remove redundancies, increase the speed of decision making, and improve accountability and
execution. We reduced the number of management layers from our previous structure and increased the average
span of control for managers.
Redesigning our Go-To-Market Strategy
We split our direct field sales team into security and information management specialists focused on new
business only and expanded their territories to be more effective for our enterprise customers. We also built a
renewals group in order to extend the customer relationship and make it easier to renew and do business with us.
We redesigned our global channel strategy focused on building partner competency, rewarding performance, and
customer satisfaction.
Changing our Product Offerings
With a portfolio of leading products, we focused our development efforts on making our point solutions
better, designing new integrated solutions, and expanding our offerings by partnering with network security
vendors to offer solutions that provide multi-tier protection.
Financial Implications of New Strategy
We have developed a three-pronged approach to our product offering strategy which includes managing our
portfolio of point solutions and reallocating resources to the offerings we estimate have the greatest growth
potential, expanding our total addressable market by delivering innovative new offerings that integrate our
technologies to solve our customers’ most significant problems, and focusing on developing relationships with other
industry leaders that will begin the process of building ecosystems that delivers more value to our customers.
We believe that sales and marketing of our innovative and differentiated products are enhanced by
knowledgeable salespeople who can convey the strong value of our technology. As such, we restructured the
31