Symantec 2013 Annual Report Download - page 112

Download and view the complete annual report

Please find page 112 of the 2013 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 204

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

Managing new product and service strategies, including integrating our various security and storage
technologies, management solutions, customer service, and support into unified enterprise security and
storage solutions
Addressing trade compliance issues affecting our ability to ship our products
Developing or expanding efficient sales channels
Obtaining sufficient licenses to technology and technical access from operating system software vendors
on reasonable terms to enable the development and deployment of interoperable products, including
source code licenses for certain products with deep technical integration into operating systems
If we are not successful in managing these risks and challenges, or if our new products, product upgrades,
and services are not technologically competitive or do not achieve market acceptance, our business and operating
results could be adversely affected.
We operate in a highly competitive environment, and our competitors may gain market share in the markets
for our products that could adversely affect our business and cause our revenues to decline.
We operate in intensely competitive markets that experience rapid technological developments, changes in
industry standards, changes in customer requirements, and frequent new product introductions and improvements. If
we are unable to anticipate or react to these competitive challenges or if existing or new competitors gain market
share in any of our markets, our competitive position could weaken and we could experience a decline in our sales
that could adversely affect our business and operating results. To compete successfully, we must maintain an
innovative research and development effort to develop new products and services and enhance existing products and
services, effectively adapt to changes in the technology or product rights held by our competitors, appropriately
respond to competitive strategies, and effectively adapt to technological changes and changes in the ways that our
information is accessed, used, and stored within our enterprise and consumer markets. If we are unsuccessful in
responding to our competitors or to changing technological and customer demands, our competitive position and
our financial results could be adversely affected.
Our traditional competitors include independent software vendors that offer software products that directly
compete with our product offerings. We expect that competition may intensify as a result of future software
industry consolidation. In addition to competing with these vendors directly for sales to end-users of our
products, we compete with them for the opportunity to have our products bundled with the product offerings of
our strategic partners such as computer hardware OEMs and ISPs. Our competitors could gain market share from
us if any of these strategic partners replace our products with the products of our competitors or if these partners
more actively promote our competitors’ products than our products. In addition, software vendors who have
bundled our products with theirs may choose to bundle their software with their own or other vendors’ software
or may limit our access to standard product interfaces and inhibit our ability to develop products for their
platform. In the future, further product development by these vendors could cause our software applications and
services to become redundant, which could significantly impact our sales and financial results.
We face growing competition from network equipment, computer hardware manufacturers, large operating
system providers and other technology companies. These firms are increasingly developing and incorporating
into their products data protection and storage and server management software that competes at some levels
with our product offerings. Our competitive position could be adversely affected to the extent that our customers
perceive the functionality incorporated into these products as replacing the need for our products.
Security protection is also offered by some of our competitors at prices lower than our prices or, in some
cases is offered free of charge. Some companies offer the lower-priced or free security products within their
computer hardware or software products that we believe are inferior to our products and SaaS offerings. Our
competitive position could be adversely affected to the extent that our customers perceive these security products
14