Symantec 2013 Annual Report Download - page 109

Download and view the complete annual report

Please find page 109 of the 2013 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 204

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

We did not make any material acquisitions during fiscal 2013. For further discussion of our acquisitions, see
Note 3 of the Notes to Consolidated Financial Statements in this annual report.
Competition
Our markets are consolidating, highly competitive, and subject to rapid changes in technology. The
competitive landscape has changed significantly over the past few years, with new competition arising; much of
the market growth has come from startups whose focus is on solving a specific customer issue or delivering a
specific niche-oriented product and from larger integration providers that increasingly are looking to put various
types of protection, whether it is backup, high availability or security, into their platforms. We are focused on
delivering comprehensive customer solutions, integrating across our broad product portfolio and partnering with
other technology providers to differentiate ourselves from the competition. We believe that the principal
competitive factors necessary to be successful in our industry include product quality and effectiveness, time-to-
market, price, reputation, financial stability, breadth of product offerings, customer support, brand recognition,
and effective sales and marketing efforts.
In addition to the competition we face from direct competitors, we face indirect or potential competition
from retailers, application providers, operating system providers, network equipment manufacturers, and other
OEMs who may provide various solutions and functions in their current and future products. We also compete
for access to retail distribution channels and for spending at the retail level and in corporate accounts. In addition,
we compete with other software companies, operating system providers, network equipment manufacturers, and
other OEMs to acquire technologies, products, or companies and to publish software developed by third parties.
We also compete with other software companies in our effort to place our products on the computer equipment
sold to consumers and enterprises by OEMs.
The competitive environments for each segment are described below.
Consumer
Most of the channels in which our consumer products are offered are highly competitive. Our competitors
are intensely focused on customer acquisition, which has led competitors to offer their technology for free,
engage in aggressive marketing, or enter into competitive partnerships. Our primary competitors in the Consumer
segment are McAfee, Inc., owned by Intel Corporation (“McAfee”), and Trend Micro Inc. (“Trend Micro”).
There are also several freeware providers and regional security companies that we compete against. For our
consumer backup offerings, our primary competitors are Carbonite, Inc. and Mozy, Inc., owned by EMC
Corporation (“EMC”).
Security and Compliance
In the security and management markets, we compete against many companies that offer competing
products to our solutions. Our primary competitors in the security and management market are McAfee,
Microsoft Corporation (“Microsoft”), and Trend Micro. There are also several smaller regional security
companies with which we compete. In the authentication services market, our primary competitors are Comodo
Group, Inc., RSA, the security division of EMC, Entrust, Inc., and GoDaddy.com, Inc. In the Software-as-a-
Service (“SaaS”) security market, our primary competitors are Google Inc.’s Postini Services and Microsoft. Our
primary competitors in the managed services business are SecureWorks, Inc., owned by Dell, Inc., and Verizon
Communications, Inc.
Storage and Server Management
The markets for storage management, backup, archiving, and eDiscovery are intensely competitive. Our
primary competitors are CommVault Systems, Inc., EMC, Hewlett-Packard Company, IBM, Oracle, and Veeam
Software.
11