Symantec 2013 Annual Report Download - page 114

Download and view the complete annual report

Please find page 114 of the 2013 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 204

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

We have begun investing in a plan to better meet customer needs through internal innovation and driving
faster organic growth, with a particular focus on key areas that combine our existing products and services
into new solutions that are designed to meet multiple customer needs with integrated higher value offerings,
and if the return on these investments is lower or develops more slowly than we expect, our operating results
may be harmed.
Pursuant to our recently announced restructuring plan, we have been reallocating talent within our
organization and are dedicating spending and resources to focus on certain key areas, such as mobile workforce
productivity, Norton protection, Norton cloud, information security services, identity/content-aware security
gateway, data center security, business continuity, integrated backup, cloud-based information management and
object storage platform. We expect research and development expenses to increase through fiscal 2017 as we
invest to drive organic innovation for our customers. While we will seek to have the right level of investment and
the right level of resources focused on our biggest growth opportunities, the return on these investments may be
lower, or may develop more slowly, than we expect. If we do not achieve the benefits anticipated from these
investments (including if our selection of areas for investment does not play out as we expect), or if the
achievement of these benefits is delayed, our operating results may be adversely affected.
Over the long term we intend to invest in engineering, sales, service, marketing and manufacturing
activities, and these investments may achieve delayed, or lower than expected, benefits which could harm
our operating results.
While we intend to focus on managing our costs and expenses, over the long term, we also intend to invest
in research and development activities as we focus on organic growth through internal innovation. We are likely
to recognize the costs associated with these investments earlier than some of the anticipated benefits, and the
return on these investments may be lower, or may develop more slowly, than we expect. If we do not achieve the
benefits anticipated from these investments, or if the achievement of these benefits is delayed, our operating
results may be adversely affected.
Defects or disruptions in our SaaS offerings could reduce demand for our services and subject us to
substantial liability.
Our SaaS offerings may contain errors or defects that users identify after they begin using them that could
result in unanticipated service interruptions, which could harm our reputation and our business. Since our
customers use our SaaS offerings for mission-critical protection from threats to electronic information, endpoint
devices, and computer networks, any errors, defects, disruptions in service or other performance problems with
our SaaS offerings could significantly harm our reputation and may damage our customers’ businesses. If that
occurs, customers could elect not to renew, or delay or withhold payment to us, we could lose future sales or
customers may make warranty or other claims against us, which could result in an increase in our provision for
doubtful accounts, an increase in collection cycles for accounts receivable or the expense and risk of litigation.
Risks related to the provision of our SaaS offerings could impair our ability to deliver our services and
could expose us to liability, damage our brand and reputation or otherwise negatively impact our business.
We currently serve our SaaS-based customers from hosting facilities located across the globe. Damage to, or
failure of, any significant element of these hosting facilities could result in interruptions in our service, which
could harm our customers and expose us to liability. Interruptions or failures in our service delivery could cause
customers to terminate their subscriptions with us, could adversely affect our renewal rates, and could harm our
ability to attract new customers. Our business would also be harmed if our customers believe that our SaaS
offerings are unreliable. As we continue to offer more of our software products in a SaaS-based delivery model,
all of these risks could be exacerbated.
Our SaaS offerings also involve the storage and transmission of large amounts of our customers’ proprietary
information, including sensitive and personally identifiable information. Breaches of our security measures or the
16