Symantec 2014 Annual Report Download - page 88

Download and view the complete annual report

Please find page 88 of the 2014 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 183

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

We did not make any material acquisitions during fiscal 2014.
Competition
Our markets are consolidating, highly competitive, and subject to rapid changes in technology. The
competitive landscape has changed significantly over the past few years, with new competition arising. Much of
the market growth has come from startups whose focus is on solving a specific customer issue or delivering a
specific niche-oriented product and from larger integration providers that increasingly are looking to put various
types of protection, whether it is backup, high availability or security, into their platforms. We are focused on
delivering comprehensive customer solutions, integrating across our broad product portfolio and partnering with
other technology providers to differentiate ourselves from the competition. We believe that the principal
competitive factors necessary to be successful in our industry include product quality and effectiveness, time-to-
market, price, reputation, financial stability, breadth of product offerings, customer support, brand recognition,
and effective sales and marketing efforts.
In addition to the competition we face from direct competitors, we face indirect or potential competition
from retailers, application providers, operating system providers, network equipment manufacturers, and other
OEMs who may provide various solutions and functions in their current and future products. We also compete
for access to retail distribution channels and for spending at the retail level and in corporate accounts. In addition,
we compete with other software companies, operating system providers, network equipment manufacturers, and
other OEMs to acquire technologies, products, or companies and to publish software developed by third parties.
We also compete with other software companies in our effort to place our products on the computer equipment
sold to consumers and enterprises by OEMs.
The competitive environments for our security and management products are described below.
Security
Most of the channels in which our security products are offered are highly competitive. Some of our consumer
competitors are intensely focused on customer acquisition, which has led competitors to offer their technology for
free, engage in aggressive marketing, or enter into competitive partnerships. Our primary security competitors are
McAfee, Inc., owned by Intel Corporation, Microsoft Corporation (“Microsoft”), and Trend Micro Inc. There are
also several freeware providers and regional security companies that we compete against. For our consumer backup
offerings, our primary competitors are Carbonite, Inc. and Mozy, Inc., owned by EMC Corporation (“EMC”). In the
authentication services market, our primary competitors are Comodo Group, Inc., RSA, the security division of
EMC, Entrust, Inc., and GoDaddy.com, Inc. In the Software-as-a-Service (“SaaS”) security market, our primary
competitors are Google Inc.’s Postini Services and Microsoft. Our primary competitors in the managed services
business are SecureWorks, Inc., owned by Dell, Inc., and Verizon Communications, Inc.
Information Management
The markets for storage management, backup, archiving, and eDiscovery are intensely competitive. Our
primary competitors are CommVault Systems, Inc., EMC, Hewlett-Packard Company, IBM, Oracle, and Veeam
Software.
Intellectual Property
Protective Measures
We regard some of the features of our internal operations, software, and documentation as proprietary and rely
on copyright, patent, trademark and trade secret laws, confidentiality procedures, contractual arrangements, and
other measures to protect our proprietary information. Our intellectual property is an important and valuable asset
that enables us to gain recognition for our products, services, and technology and enhance our competitive position.
9