Symantec 2015 Annual Report Download - page 87

Download and view the complete annual report

Please find page 87 of the 2015 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 174

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174

In addition to the competition we face from direct competitors, we face indirect or potential competition
from retailers, application providers, operating system providers, network equipment manufacturers, and other
OEMs who may provide various solutions and functions in their current and future products. We also compete
for access to retail distribution channels and for spending at the retail level and in corporate accounts. In addition,
we compete with other software companies, operating system providers, network equipment manufacturers, and
other OEMs to acquire technologies, products, or companies and to publish software developed by third parties.
We also compete with other software companies in our effort to place our products on the computer equipment
sold to consumers and enterprises by OEMs.
The competitive environments for our security and information management products are described below.
Security
Most of the channels in which our security products are offered are highly competitive. Some of our
consumer competitors are intensely focused on customer acquisition, which has led competitors to offer their
technology for free, engage in aggressive marketing, or enter into competitive partnerships. Our primary security
competitors are Intel Corporation, Microsoft Corporation (“Microsoft”), and Trend Micro Inc. There are also
several freeware providers and regional security companies that we compete against. For our consumer backup
offerings, our primary competitors are Carbonite, Inc. and EMC Corporation (“EMC”). In the SSL market, our
primary competitors are Comodo Group, Inc. and GoDaddy.com, Inc. In the Software-as-a-Service (“SaaS”)
security market, our primary competitors are Google Inc. and Microsoft. Our primary competitors in the
managed security services business are Dell Inc., IBM Corporation (“IBM”), and Hewlett-Packard Company
(“HP”).
Information Management
The markets for storage management, backup, archiving, and eDiscovery are intensely competitive. Our
primary competitors are CommVault Systems, Inc., EMC, HP and IBM.
Intellectual Property
Protective Measures
We regard some of the features of our internal operations, software, and documentation as proprietary and
rely on copyright, patent, trademark and trade secret laws, confidentiality procedures, contractual arrangements,
and other measures to protect our proprietary information. Our intellectual property is an important and valuable
asset that enables us to gain recognition for our products, services, and technology and enhance our competitive
position.
As part of our confidentiality procedures, we generally enter into non-disclosure agreements with our
employees, distributors, and corporate partners and we enter into license agreements with respect to our software,
documentation, and other proprietary information. These license agreements are generally non-transferable and
have either a perpetual or subscription based time limited term. We also educate our employees on trade secret
protection and employ measures to protect our facilities, equipment, and networks.
Trademarks, Patents, Copyrights, and Licenses
Symantec and the Symantec logo are trademarks or registered trademarks in the U.S. and other countries. In
addition to Symantec and the Symantec logo, we have used, registered, or applied to register other specific
trademarks and service marks to help distinguish our products, technologies, and services from those of our
competitors in the U.S. and foreign countries and jurisdictions. We enforce our trademark, service mark, and
trade name rights in the U.S. and abroad. The duration of our trademark registrations varies from country to
country, and in the U.S. we generally are able to maintain our trademark rights and renew any trademark
registrations for as long as the trademarks are in use.
9