Symantec 2011 Annual Report Download - page 81

Download and view the complete annual report

Please find page 81 of the 2011 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 178

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178

Consumer
Some of the channels in which our consumer products are offered are highly competitive. Our competitors are
intensely focused on customer acquisition, which has led such competitors to offer their technology for free, engage
in aggressive marketing, or enter into competitive partnerships. Our primary competitors in the Consumer segment
are McAfee, Inc., (“MFE”) owned by Intel Corporation, and Trend Micro Inc. (“Trend Micro”). There are also
several smaller regional security companies and freeware providers that we compete against primarily in the EMEA
and APJ regions. For our consumer backup offerings, our primary competitors are Carbonite, Inc., and Mozy, Inc.,
owned by EMC Corporation (“EMC”).
Security and Compliance
In the security and management markets, we compete against many companies that offer competing products
to our solutions. Our primary competitors in the security and management market are LANDesk Software, Inc.,
MFE, Microsoft Corporation (“Microsoft”), and Trend Micro. There are also several smaller regional security
companies that we compete against primarily in the EMEA and APJ regions. In the authentication services market
our primary competitors are RSA, the security division of EMC, Entrust, Inc., Comodo Group, Inc., and
GoDaddy.com, Inc.
In the SaaS security market our primary competitors are Google Inc.s Postini Services and Microsoft.
Storage and Server Management
The markets for storage management and backup are intensely competitive. Our primary competitors are CA,
Inc., CommVault Systems, Inc., EMC, Hewlett-Packard Company (“HP”), International Business Machines
Corporation (“IBM”), Microsoft and Sun Microsystems, Inc., owned by Oracle Corporation.
Services
We believe that the principal competitive factors for our Services segment include technical capability,
customer responsiveness, and our ability to hire and retain talented and experienced services personnel. Our
primary competitors in the managed services business are IBM, and SecureWorks, Inc., owned by Dell, Inc.
Intellectual Property
Protective Measures
We regard some of the features of our internal operations, software, and documentation as proprietary and rely
on copyright, patent, trademark and trade secret laws, confidentiality procedures, contractual arrangements, and
other measures to protect our proprietary information. Our intellectual property is an important and valuable asset
that enables us to gain recognition for our products, services, and technology and enhance our competitive position.
As part of our confidentiality procedures, we generally enter into non-disclosure agreements with our
employees, distributors, and corporate partners, and we enter into license agreements with respect to our software,
documentation, and other proprietary information. These license agreements are generally non-transferable and
have a perpetual term. We also educate our employees on trade secret protection and employ measures to protect our
facilities, equipment, and networks.
Trademarks, Patents, Copyrights, and Licenses
Symantec and the Symantec logo are trademarks or registered trademarks in the U.S. and other countries. In
addition to Symantec and the Symantec logo, we have used, registered, and/or applied to register other specific
trademarks and service marks to help distinguish our products, technologies, and services from those of our
competitors in the U.S. and foreign countries and jurisdictions. We enforce our trademark, service mark, and trade
name rights in the U.S. and abroad. The duration of our trademark registrations varies from country to country, and
in the U.S. we generally are able to maintain our trademark rights and renew any trademark registrations for as long
as the trademarks are in use.
11