Symantec 2011 Annual Report Download - page 80

Download and view the complete annual report

Please find page 80 of the 2011 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 178

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178

We provide customers various levels of enterprise support offerings. Our enterprise security support program
offers annual maintenance support contracts, including content, upgrades, and technical support. Our standard
technical support includes: self-service options, delivered by telephone or electronically, during the contracted-for
hours, immediate patches for severe problems; periodic software updates; and access to our technical knowledge
base and frequently asked questions.
Customers
In fiscal 2011 and 2010 one distributor, Ingram Micro, accounted for 10% of our total net revenue in both
periods. Our distributor arrangements with Ingram Micro consist of several non-exclusive, independently nego-
tiated agreements with its subsidiaries, each of which cover different countries or regions. Each of these agreements
is separately negotiated and is independent of any other contract (such as a master distribution agreement), and these
agreements are not based on the same form of contract. In fiscal 2009 one reseller, Digital River, accounted for 10%
of our total net revenue. In fiscal 2010, we launched an internally-developed eCommerce platform which has
reduced our reliance on Digital River.
Acquisitions
Our acquisitions are designed to enhance the features and functionality of our existing products and extend our
product leadership in core markets. We consider time to market, synergies with existing products, and potential
market share gains when evaluating the economics of acquisitions of technologies, product lines, or companies. We
may acquire and/or dispose of other technologies, products and companies in the future.
During fiscal 2011, we completed the following significant acquisitions:
Company Name Company Description Date Acquired
VeriSign, Inc. (identity and authentication
business assets) Identity and authentication business assets
purchase August 9, 2010
PGP Corporation A nonpublic provider of email and data
encryption software June 4, 2010
GuardianEdge Technologies, Inc. A nonpublic provider of email and data
encryption software June 3, 2010
For further discussion of our acquisitions, see Note 3 of the Notes to Consolidated Financial Statements in this
annual report.
Competition
Our markets are consolidating, highly competitive, and subject to rapid changes in technology. We are focused
on integration across the product portfolio and are including next-generation technology capabilities into our
solution set to differentiate ourselves from the competition. We believe that the principal competitive factors
necessary to be successful in our industry include time to market, price, reputation, financial stability, breadth of
product offerings, customer support, brand recognition, and effective sales and marketing efforts.
In addition to the competition we face from direct competitors, we face indirect or potential competition from
retailers, application providers, operating system providers, network equipment manufacturers, and other OEMs,
who may provide various solutions and functions in their current and future products. We also compete for access to
retail distribution channels and for spending at the retail level and in corporate accounts. In addition, we compete
with other software companies, operating system providers, network equipment manufacturers and other OEMs to
acquire technologies, products, or companies and to publish software developed by third parties. We also compete
with other software companies in our effort to place our products on the computer equipment sold to consumers and
enterprises by OEMs.
The competitive environments in which each segment operates are described below.
10