Symantec provides a summary of its fiscal year 2000 results and outlook. It achieved record revenue of $745.7 million, a 26% increase over 1999, with net income of $170.1 million. It focused on expanding its security business through acquisitions and investments in content and network security. Looking ahead, Symantec aims to continue growing its security business globally and remain a leader in protecting individuals and enterprises from cyber threats through innovative solutions.
In this report we share our insight on the recruitment of cyber security professionals including information regarding the key drivers in the cyber security market, permanent and contract recruitment trends, transferable skills, the top job titles, salaries and qualifications analysis, a heat map of skills demands/talent pools across the UK, concluding with recommendations on attracting and retaining cyber security talent.
This document provides a program guide for the Dbriefs webcast series from July to September 2013. It outlines various webcast topics within the areas of financial executives, industries, markets, HR executives, technology executives, and tax executives. The webcasts will discuss emerging issues leaders need to address, including driving enterprise value, governance and risk, financial reporting, transactions and business events, and specific industry topics. The guide provides details on subscription information and accessing materials from past Dbriefs webcasts.
This document provides an overview and summary of key findings from CyberSource's 14th annual online fraud report. It discusses trends in online payment fraud rates and losses. Some of the key points covered include:
- Estimated $3.5 billion was lost to online fraud in 2012, with the average fraud rate by revenue being 0.9% and by orders being 0.8%. Fraudulent orders on average had a ticket value of $200, about 1/3 higher than valid orders.
- While fraud screening tools and budgets are staying the same, online sales and orders are increasing, posing challenges for companies to screen more orders with the same resources.
- Mobile commerce fraud is increasingly being tracked,
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
This document provides a summary of the Brazil cyber security market report by Ken Research. It details that the Brazil cyber security market has grown from USD ~million in 2011 to USD ~million in 2016 at a CAGR of ~%. The market is expected to continue growing due to rising internet and smartphone usage, increasing online transactions, and growing cyber threats. The report segments the market by type of security, solutions, industries, and regions and provides competitive analysis of companies in the Brazil cyber security market.
The document discusses the challenges of cybersecurity in today's data-driven age. It notes that the rapid growth of technology and data has created significant challenges for data security and regulatory compliance. Additionally, as organizations adopt more sophisticated digital business models, the board's need for assurance around data access and security increases. The document outlines some of the key challenges in combating cybercrime, such as consumers and SMEs not fully comprehending the threat or how to defend against it. It also notes that increased regulation around data protection and privacy adds further complexity, highlighting the importance of transparency and education.
We found that while cyber security was named as the topmost future tech adoption for organizations in 2019, cyber security is now the second tech priority for 2021 but with a higher budget than previously allocated. We also discovered that cloud security currently holds more importance with CISOs, CTOs and CIOs than data security and privacy.
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
globalaviationairospace.com
Cyber security for telecommunications companies
The rewards and risks of the cloud, devices, and data
The fastest growing sources of security incidents, increase over 2013
Security strategies for evolving technologies
Strategic initiatives to improve cybersecurity
The document discusses how businesses should approach technology through the framework of SMACIC (Social, Mobile, Analytics, Cloud, Internet of Things, and Cybersecurity). It argues that while SMAC focuses on important areas, modern businesses also need to consider the Internet of Things and cybersecurity to remain secure and competitive. Adopting all six elements of SMACIC allows businesses to fully leverage new technologies, gather data, and strengthen customer relationships in a connected world with increasing online threats.
In this report we share our insight on the recruitment of cyber security professionals including information regarding the key drivers in the cyber security market, permanent and contract recruitment trends, transferable skills, the top job titles, salaries and qualifications analysis, a heat map of skills demands/talent pools across the UK, concluding with recommendations on attracting and retaining cyber security talent.
This document provides a program guide for the Dbriefs webcast series from July to September 2013. It outlines various webcast topics within the areas of financial executives, industries, markets, HR executives, technology executives, and tax executives. The webcasts will discuss emerging issues leaders need to address, including driving enterprise value, governance and risk, financial reporting, transactions and business events, and specific industry topics. The guide provides details on subscription information and accessing materials from past Dbriefs webcasts.
This document provides an overview and summary of key findings from CyberSource's 14th annual online fraud report. It discusses trends in online payment fraud rates and losses. Some of the key points covered include:
- Estimated $3.5 billion was lost to online fraud in 2012, with the average fraud rate by revenue being 0.9% and by orders being 0.8%. Fraudulent orders on average had a ticket value of $200, about 1/3 higher than valid orders.
- While fraud screening tools and budgets are staying the same, online sales and orders are increasing, posing challenges for companies to screen more orders with the same resources.
- Mobile commerce fraud is increasingly being tracked,
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
This document provides a summary of the Brazil cyber security market report by Ken Research. It details that the Brazil cyber security market has grown from USD ~million in 2011 to USD ~million in 2016 at a CAGR of ~%. The market is expected to continue growing due to rising internet and smartphone usage, increasing online transactions, and growing cyber threats. The report segments the market by type of security, solutions, industries, and regions and provides competitive analysis of companies in the Brazil cyber security market.
The document discusses the challenges of cybersecurity in today's data-driven age. It notes that the rapid growth of technology and data has created significant challenges for data security and regulatory compliance. Additionally, as organizations adopt more sophisticated digital business models, the board's need for assurance around data access and security increases. The document outlines some of the key challenges in combating cybercrime, such as consumers and SMEs not fully comprehending the threat or how to defend against it. It also notes that increased regulation around data protection and privacy adds further complexity, highlighting the importance of transparency and education.
We found that while cyber security was named as the topmost future tech adoption for organizations in 2019, cyber security is now the second tech priority for 2021 but with a higher budget than previously allocated. We also discovered that cloud security currently holds more importance with CISOs, CTOs and CIOs than data security and privacy.
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
globalaviationairospace.com
Cyber security for telecommunications companies
The rewards and risks of the cloud, devices, and data
The fastest growing sources of security incidents, increase over 2013
Security strategies for evolving technologies
Strategic initiatives to improve cybersecurity
The document discusses how businesses should approach technology through the framework of SMACIC (Social, Mobile, Analytics, Cloud, Internet of Things, and Cybersecurity). It argues that while SMAC focuses on important areas, modern businesses also need to consider the Internet of Things and cybersecurity to remain secure and competitive. Adopting all six elements of SMACIC allows businesses to fully leverage new technologies, gather data, and strengthen customer relationships in a connected world with increasing online threats.
The document analyzes data from the RSA conferences in 2009 and 2010. It shows the popularity of different security products and technologies at each conference. In 2010, the number of exhibitors decreased by 15% from 2009. Compliance management and enterprise security management remained the most popular topics, while interest increased significantly in areas like data security, cloud computing, and mobile security. Authentication, databases security, and access control saw larger decreases in popularity from 2009 to 2010.
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
The vital role that cybersecurity plays in protecting our privacy, rights, freedoms, and everything up to and including our physical safety will be more prominent than ever during 2020.
Final file fastest growing companies of 2020Mirror Review
Witnessing the great efforts made by companies, we bring our latest magazine issue, “The 10
Fastest Growing Companies of 2020.” In this issue, we have featured companies that are
thriving and growing in today's competitive business landscape while facing market
uncertainties and challenges. The companies are using their unique approach to deliver a
stellar customer experience as well as making sure that its products, services, and solutions
are helping its clients to address their business pain points
This whitepaper will help you to answer key questions such as: How will your organization protect itself from advanced cyber-attacks? What are you doing to detect suspicious behavior within the organization and beyond? What processes and tools will you implement to quickly respond to threats and quickly recover from the effects of an attack?
Network security solutions and services sellingALEX CHANG
Softline is an international software licensing company expanding its services in Malaysia to include technical support, IT solutions, software asset management, and consulting services. It plans to offer network security solutions to address the growing cloud computing and mobile markets in Malaysia. The security solutions will target industries such as manufacturing, government, education, healthcare, financial services, telecommunications, and others with over 500 PCs. Softline aims to establish itself as the leading software expert in Malaysia and increase its brand awareness in the local IT industry.
This document discusses the evolving cyber threat landscape and increasing cyber risks that organizations face. It notes that cyber attacks are becoming more frequent, sophisticated, and targeted. The document outlines several recent major cyber attacks including data breaches at Sony, Target, and Ashley Madison, as well as ransomware attacks and hacking incidents. It emphasizes that organizations need to adopt a proactive, intelligence-led approach to cyber security that includes red team exercises, assuming breaches will occur, and deploying security intelligence systems to detect threats early. The key is understanding adversaries and their tactics in order to adapt defenses accordingly.
Grant Thornton provides cyber security and privacy services to help organizations protect their information assets and govern cyber security risks. They have expertise in areas like cyber security governance, cyber crime prevention, digital security, business resilience, and third party assurance. Their services help organizations assess cyber security maturity, identify vulnerabilities, improve controls, and develop strategies to prevent and respond to cyber attacks and security incidents.
Omlis Data Breaches Report - An Inside Perspective Omlis
The rise in digital and mobile financial services has introduced an onset of increased data breaches over the last few years. The digital revolution has undermined the traditional framework used to regulate financial institutions, which has led to areas of vulnerability within their security systems.
In the report, Data Breaches: An Inside Perspective, Omlis conducted in-depth interviews with experienced cyber security professionals to understand why TFIs (traditional financial institutions) aren't adequately addressing security weaknesses.
In our research, the discussions centered on the types of security systems employed by TFIs, personal and industry-wide attitudes to security, and the types of security measures used to prevent breaches.
The findings indicate that TFIs current preference towards technology creates an increasingly complex system with associated vulnerabilities and ultimately it requires greater manual input for maintenance and updates.
There are also issues related to the attitudes of employees and difficulties implementing comprehensive and in-depth incident strategies.
Taking this into account, the report suggests a new direction for TFI's security systems to provide secure, innovative solutions.
The Top 5 Fintech Trends Everyone Should Be Watching In 2020Bernard Marr
While historically slower to embrace change, the financial industry is adopting fintech trends, technology that can automate and improve financial services, to respond to consumer demand and provide more efficient and effective services. Here are the top five fintech trends everyone should be watching in 2020.
This document provides an overview of Cloudflare's Channel & Alliance Program. It discusses how partners can benefit from integrated security, reliability and performance solutions while earning attractive discounts. Partners have different routes to generate revenue, such as reselling Cloudflare products, providing professional services, or embedding Cloudflare into their own applications. The program has multiple tiers (Select, Advanced, Elite) that partners can progress through by meeting sales and technical certification requirements. This allows partners to receive more benefits like dedicated account teams and joint planning. Overall, the program aims to create a fruitful ecosystem for partners to accelerate their business using Cloudflare's global cloud platform.
Challenges and Risks for the CIO from Outsourcing in the digital eraAntoine Vigneron
This document discusses the challenges facing CIOs from outsourcing in the digital era. It covers several topics: how trends like cloud computing are disrupting traditional outsourcing arrangements; whether everything as a service models could lead to outsourcing everything; and how governance needs to evolve to address challenges from digital and transformational outsourcing. The document also examines how digital disruption is impacting industries, and discusses trends in areas like travel and transportation that are improving customer experiences through new technologies.
The document provides 10 predictions for the cybersecurity industry in 2022. It predicts that critical infrastructure will be a prime target for both cybercriminals and nation-states. Ransomware attacks will grow significantly in scope and impact, potentially disrupting entire societies. Cyber attacks will increasingly be used as a tool of foreign policy and domestic control by oppressive governments. Artificial intelligence and quantum computing developments will further escalate the arms race between attackers and defenders. Overall, 2022 will be a very challenging year for cybersecurity as threats become more powerful and widespread.
What matters in security - A highlighterAndre Muscat
Macro and strategic trends in digital security for leaders trying to understand and communicate what matters to be assured and secured. Master the connection between business value and cybersecurity management through a non-technical lens.
Women in Technology Leadership Latest IT news In mid-March of last year, the World Health Organization officially declared the world was facing a pandemic, and countries rushed to enact measures to stem the spread. A popular measure to combat the pandemic was switching companies to remote work. However, with little time to make the transition, many companies had no time to enact proper security measures, leaving them vulnerable to a number of new security risks. One of the most common were attacks against the protocols used by employees to access corporate resources remotely. RDP is perhaps the most popular remote desktop protocol and is used to access Windows or servers. After the switch to remote work, bruteforce attacks against this protocol skyrocketed. In a bruteforce attack, attackers test different usernames and passwords until the correct combination is found-and they gain access to the corporate resources. Over the past year, while the total number of bruteforce attacks has ebbed and flowed, they have continued to increase when compared to pre-pandemic levels. Visit on varindia official site https://www.varindia.com/ to know more. According to Kaspersky’s telemetry, when the world went into lockdown in March 2020, the total number of bruteforce attacks against RDP jumped from 93.1 million worldwide in February 2020 to 277.4 million 2020 in March—a 197 percent increase. The numbers in India went from 1.3 million (1363953) in Feb 2020 to 3.3 million (3301848) in March 2020. From April 2020 onward, monthly attacks never dipped below 300 million, and they reached a new high of 409 million attacks worldwide in November 2020. The highest number of attacks 4.5 million (4586533) in India was recorded in July 2020. In February 2021—nearly one year from the start of the pandemic—there were 377.5 million brute-force attacks—a far cry from the 93.1 million witnessed at the beginning of 2020. India alone witnessed 9.04 million (9048791) attacks in Feb 2021.
The total number of attacks in India from Feb-Dec 2020 was around 37 million (37664893), while the total number of attacks recorded in India during Jan & Feb 2021 are around 15 million (15804209).
Quick Start Guide to IT Security for BusinessesCompTIA
IT security is constantly changing, which means it can be hard for businesses to keep up. This guide from CompTIA educates IT solution providers on the importance of providing clients with up-to-date IT security, identifies the risks of inadequate or poor security, and examines the technology shifts and factors affecting security in in the workplace.
The GFI LanGuard SDK enables software developers and OEMs to quickly and easily integrate patch management, vulnerability assessment, asset tracking, network and software auditing and more into new or existing products.
The document discusses the need for businesses to update their cyber security policies due to shifts in communication technologies and regulations. Real-time communication apps now dominate personal and work communications, exposing businesses to new threats. Regulations like the EU's GDPR also extend security requirements. The document advocates developing clear, multi-layered cyber security policies that recognize cyber criminals operate via value chains and that reasonable protections are needed to comply with regulations and withstand legal scrutiny if breached.
This document contains the bylaws of NVR, Inc. as adopted on September 30, 1993 and amended on May 4, 2007. It outlines various provisions regarding shareholder meetings, the board of directors, committees, officers, and other administrative matters. Key details include requirements for annual shareholder meetings, the process for nominating directors, responsibilities and composition of the board, and establishment of required officer positions.
The document discusses Thermo Scientific's leadership in serving science through analytical instruments, equipment, reagents, software and services. It highlights the company's size and scale, unmatched capabilities, portfolio of leading brands, and mission to make the world healthier, cleaner and safer. Key strengths include global industry leadership, ability to continuously invest in growth opportunities through R&D, and an excellent track record of financial performance. New products are presented for applications such as sample preparation, analysis, and data interpretation.
The document analyzes data from the RSA conferences in 2009 and 2010. It shows the popularity of different security products and technologies at each conference. In 2010, the number of exhibitors decreased by 15% from 2009. Compliance management and enterprise security management remained the most popular topics, while interest increased significantly in areas like data security, cloud computing, and mobile security. Authentication, databases security, and access control saw larger decreases in popularity from 2009 to 2010.
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
The vital role that cybersecurity plays in protecting our privacy, rights, freedoms, and everything up to and including our physical safety will be more prominent than ever during 2020.
Final file fastest growing companies of 2020Mirror Review
Witnessing the great efforts made by companies, we bring our latest magazine issue, “The 10
Fastest Growing Companies of 2020.” In this issue, we have featured companies that are
thriving and growing in today's competitive business landscape while facing market
uncertainties and challenges. The companies are using their unique approach to deliver a
stellar customer experience as well as making sure that its products, services, and solutions
are helping its clients to address their business pain points
This whitepaper will help you to answer key questions such as: How will your organization protect itself from advanced cyber-attacks? What are you doing to detect suspicious behavior within the organization and beyond? What processes and tools will you implement to quickly respond to threats and quickly recover from the effects of an attack?
Network security solutions and services sellingALEX CHANG
Softline is an international software licensing company expanding its services in Malaysia to include technical support, IT solutions, software asset management, and consulting services. It plans to offer network security solutions to address the growing cloud computing and mobile markets in Malaysia. The security solutions will target industries such as manufacturing, government, education, healthcare, financial services, telecommunications, and others with over 500 PCs. Softline aims to establish itself as the leading software expert in Malaysia and increase its brand awareness in the local IT industry.
This document discusses the evolving cyber threat landscape and increasing cyber risks that organizations face. It notes that cyber attacks are becoming more frequent, sophisticated, and targeted. The document outlines several recent major cyber attacks including data breaches at Sony, Target, and Ashley Madison, as well as ransomware attacks and hacking incidents. It emphasizes that organizations need to adopt a proactive, intelligence-led approach to cyber security that includes red team exercises, assuming breaches will occur, and deploying security intelligence systems to detect threats early. The key is understanding adversaries and their tactics in order to adapt defenses accordingly.
Grant Thornton provides cyber security and privacy services to help organizations protect their information assets and govern cyber security risks. They have expertise in areas like cyber security governance, cyber crime prevention, digital security, business resilience, and third party assurance. Their services help organizations assess cyber security maturity, identify vulnerabilities, improve controls, and develop strategies to prevent and respond to cyber attacks and security incidents.
Omlis Data Breaches Report - An Inside Perspective Omlis
The rise in digital and mobile financial services has introduced an onset of increased data breaches over the last few years. The digital revolution has undermined the traditional framework used to regulate financial institutions, which has led to areas of vulnerability within their security systems.
In the report, Data Breaches: An Inside Perspective, Omlis conducted in-depth interviews with experienced cyber security professionals to understand why TFIs (traditional financial institutions) aren't adequately addressing security weaknesses.
In our research, the discussions centered on the types of security systems employed by TFIs, personal and industry-wide attitudes to security, and the types of security measures used to prevent breaches.
The findings indicate that TFIs current preference towards technology creates an increasingly complex system with associated vulnerabilities and ultimately it requires greater manual input for maintenance and updates.
There are also issues related to the attitudes of employees and difficulties implementing comprehensive and in-depth incident strategies.
Taking this into account, the report suggests a new direction for TFI's security systems to provide secure, innovative solutions.
The Top 5 Fintech Trends Everyone Should Be Watching In 2020Bernard Marr
While historically slower to embrace change, the financial industry is adopting fintech trends, technology that can automate and improve financial services, to respond to consumer demand and provide more efficient and effective services. Here are the top five fintech trends everyone should be watching in 2020.
This document provides an overview of Cloudflare's Channel & Alliance Program. It discusses how partners can benefit from integrated security, reliability and performance solutions while earning attractive discounts. Partners have different routes to generate revenue, such as reselling Cloudflare products, providing professional services, or embedding Cloudflare into their own applications. The program has multiple tiers (Select, Advanced, Elite) that partners can progress through by meeting sales and technical certification requirements. This allows partners to receive more benefits like dedicated account teams and joint planning. Overall, the program aims to create a fruitful ecosystem for partners to accelerate their business using Cloudflare's global cloud platform.
Challenges and Risks for the CIO from Outsourcing in the digital eraAntoine Vigneron
This document discusses the challenges facing CIOs from outsourcing in the digital era. It covers several topics: how trends like cloud computing are disrupting traditional outsourcing arrangements; whether everything as a service models could lead to outsourcing everything; and how governance needs to evolve to address challenges from digital and transformational outsourcing. The document also examines how digital disruption is impacting industries, and discusses trends in areas like travel and transportation that are improving customer experiences through new technologies.
The document provides 10 predictions for the cybersecurity industry in 2022. It predicts that critical infrastructure will be a prime target for both cybercriminals and nation-states. Ransomware attacks will grow significantly in scope and impact, potentially disrupting entire societies. Cyber attacks will increasingly be used as a tool of foreign policy and domestic control by oppressive governments. Artificial intelligence and quantum computing developments will further escalate the arms race between attackers and defenders. Overall, 2022 will be a very challenging year for cybersecurity as threats become more powerful and widespread.
What matters in security - A highlighterAndre Muscat
Macro and strategic trends in digital security for leaders trying to understand and communicate what matters to be assured and secured. Master the connection between business value and cybersecurity management through a non-technical lens.
Women in Technology Leadership Latest IT news In mid-March of last year, the World Health Organization officially declared the world was facing a pandemic, and countries rushed to enact measures to stem the spread. A popular measure to combat the pandemic was switching companies to remote work. However, with little time to make the transition, many companies had no time to enact proper security measures, leaving them vulnerable to a number of new security risks. One of the most common were attacks against the protocols used by employees to access corporate resources remotely. RDP is perhaps the most popular remote desktop protocol and is used to access Windows or servers. After the switch to remote work, bruteforce attacks against this protocol skyrocketed. In a bruteforce attack, attackers test different usernames and passwords until the correct combination is found-and they gain access to the corporate resources. Over the past year, while the total number of bruteforce attacks has ebbed and flowed, they have continued to increase when compared to pre-pandemic levels. Visit on varindia official site https://www.varindia.com/ to know more. According to Kaspersky’s telemetry, when the world went into lockdown in March 2020, the total number of bruteforce attacks against RDP jumped from 93.1 million worldwide in February 2020 to 277.4 million 2020 in March—a 197 percent increase. The numbers in India went from 1.3 million (1363953) in Feb 2020 to 3.3 million (3301848) in March 2020. From April 2020 onward, monthly attacks never dipped below 300 million, and they reached a new high of 409 million attacks worldwide in November 2020. The highest number of attacks 4.5 million (4586533) in India was recorded in July 2020. In February 2021—nearly one year from the start of the pandemic—there were 377.5 million brute-force attacks—a far cry from the 93.1 million witnessed at the beginning of 2020. India alone witnessed 9.04 million (9048791) attacks in Feb 2021.
The total number of attacks in India from Feb-Dec 2020 was around 37 million (37664893), while the total number of attacks recorded in India during Jan & Feb 2021 are around 15 million (15804209).
Quick Start Guide to IT Security for BusinessesCompTIA
IT security is constantly changing, which means it can be hard for businesses to keep up. This guide from CompTIA educates IT solution providers on the importance of providing clients with up-to-date IT security, identifies the risks of inadequate or poor security, and examines the technology shifts and factors affecting security in in the workplace.
The GFI LanGuard SDK enables software developers and OEMs to quickly and easily integrate patch management, vulnerability assessment, asset tracking, network and software auditing and more into new or existing products.
The document discusses the need for businesses to update their cyber security policies due to shifts in communication technologies and regulations. Real-time communication apps now dominate personal and work communications, exposing businesses to new threats. Regulations like the EU's GDPR also extend security requirements. The document advocates developing clear, multi-layered cyber security policies that recognize cyber criminals operate via value chains and that reasonable protections are needed to comply with regulations and withstand legal scrutiny if breached.
This document contains the bylaws of NVR, Inc. as adopted on September 30, 1993 and amended on May 4, 2007. It outlines various provisions regarding shareholder meetings, the board of directors, committees, officers, and other administrative matters. Key details include requirements for annual shareholder meetings, the process for nominating directors, responsibilities and composition of the board, and establishment of required officer positions.
The document discusses Thermo Scientific's leadership in serving science through analytical instruments, equipment, reagents, software and services. It highlights the company's size and scale, unmatched capabilities, portfolio of leading brands, and mission to make the world healthier, cleaner and safer. Key strengths include global industry leadership, ability to continuously invest in growth opportunities through R&D, and an excellent track record of financial performance. New products are presented for applications such as sample preparation, analysis, and data interpretation.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended September 29, 2007. It provides financial statements including the consolidated balance sheet, statement of income, and statement of cash flows. Key details include total revenues of $2.4 billion for the quarter, net income of $218.5 million, and cash and cash equivalents increasing to $830.8 million. It also summarizes two acquisitions completed in the first nine months of 2007, expanding analytical technologies offerings.
The document summarizes a quarterly earnings call by Symantec Corporation. It provides an overview of Symantec's financial results for the fiscal fourth quarter and year end, as well as objectives for the upcoming fiscal year. Key highlights include record revenue and earnings, strong growth in areas like email archiving and backup, and momentum entering the new fiscal year from acquisitions and a rich product portfolio.
This document summarizes Southwest Airlines' performance in 2001, a difficult year marked by the events of September 11th. It notes that Southwest was well-positioned financially to withstand the crisis due to its conservative approach of managing well in good times. It describes how Southwest maintained 100% employment while other major carriers furloughed staff, and still reported an annual profit despite revenue declines. The summary highlights that Southwest expanded service in 2001 and increased its market share, showing resilience in the face of adversity through the dedication of its employees.
Southwest Airlines reported its 32nd consecutive annual profit in 2004 despite challenging conditions in the airline industry. Record high fuel prices and a glut of domestic airline seats led to massive losses for the industry as a whole. However, Southwest was able to maintain its position as one of the lowest cost producers through cost reduction efforts by its employees. Looking forward, Southwest is well positioned for growth once industry capacity rationalizes or business travel rebounds, given its strong brand, loyal customers, and solid financial position compared to other airlines.
Symantec is a world leader in internet security that provides a broad range of security solutions including virus protection, firewalls, intrusion detection, and security services to enterprises and individuals globally. In 2001, Symantec achieved record sales and profitability while expanding its global operations to 37 countries. The company offers the industry's widest range of security solutions and services and has the capability to respond rapidly to security threats.
Symantec announced the planned acquisition of MessageLabs, a leading provider of message security services. This acquisition will strengthen Symantec's leadership in the messaging security market and provide a strong foothold in the growing software-as-a-service market. MessageLabs' cloud-based security solutions will complement Symantec's existing portfolio and allow them to provide comprehensive on-premise and online security options to customers. The deal is valued at approximately $695 million and is expected to close by the end of the year, pending regulatory approvals.
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
Since 2007, Solution IP have been creating operational efficiencies with our expansive foundation technology portfolio across voice, unified communications, cyber security, connectivity and network. Our engineers and ICT expert team design and deploy award-winning cloud technology and networks to solve UK business infrastructure challenges. Our clients switch for our expertise but stay for our exceptional managed service with 5* independently-rated support from our skilled in-house engineers and service desk.
Identity - building trust in a digital worldConor Bronsdon
- The document discusses the importance of identity in today's digital world where remote work is common and security perimeters have expanded.
- It emphasizes that identity attacks have increased 300% and that identity is now the most important control plane for security. Strong, trusted identity is key to enabling digital transformation and productivity while maintaining security.
- Microsoft's approach focuses on providing a single, protected identity across devices and applications, on-premises and in the cloud, with risk-based conditional access controls. Their identity solutions are designed to clean up existing systems and enable a centralized identity provider.
Attackers are already signaling that they view identity as crucial to modern security, concentrating their attacks on this important control plane as identity-based attacks lead the 300% overall increase in attacks experienced over the last year. This attack concentration is due to the changing shape of the modern workplace, with identity playing such a vital role in every cloud IT environment, cyber-attacks against identities will only continue to increase in their sophistication and persistence.
This document is the April 2013 issue of the CIO Digest magazine published by Symantec. It includes articles on topics related to information technology such as data protection appliances, big data strategies, and business continuity in the wake of a natural disaster. The cover story discusses how CSX Transportation protects its information across trains, data centers, and endpoints. Other articles profile IT strategies for organizations such as a Spanish government agency and the city of Lansing, Michigan. The issue also includes columns on trends in IT security, reviews of business books, and an introduction to Symantec's new strategy and leadership under its new CEO.
Traditional security measures are ineffective against evolving cyber threats, leaving organizations unprepared to defend against and respond to attacks. The document discusses Scalar Security, a company that helps clients prepare for security risks, defend critical assets, and respond quickly to incidents through risk assessments, robust security technologies, and advanced managed security services. Scalar is ranked as the top ICT security company in Canada and helps clients understand their risk and build effective security programs through solutions like threat assessments and virtual security offices.
Community Healthcare System transformed its IT infrastructure by standardizing systems, implementing shared services, and adopting cloud technologies. This replaced the old, fragmented infrastructure with a modern, efficient environment that improved operations and reduced costs.
We live in a digital world in which our happiness, health, and even our lives can depend on the performance of technology. From medical equipment to cars, and home security systems to smartphones, computerized equipment plays a greater role in the human experience with each passing year.
This document provides an overview of Symantec's strategy to define the future of cybersecurity. Some key points:
- Symantec aims to execute a strategy focused on cloud generation security through organic growth and $550 million in cost efficiencies by fiscal year 2018.
- Their portfolio includes threat protection, information protection, and security services solutions to protect consumers, businesses and governments.
- Symantec sees opportunities in protecting against advanced threats, securing a mobile workforce, and ensuring safe cloud usage.
- They discuss their Norton and Enterprise Security segments and growth opportunities in both consumer and enterprise markets.
This document discusses the growing threat of cyber attacks faced by UK businesses and outlines steps businesses can take to improve their cyber security posture. It finds that many UK companies lack confidence in their cyber security policies and abilities to protect against attacks. Cyber attacks can have significant negative financial and reputational impacts on businesses. The document recommends that businesses improve basic security procedures, understand the risks they face, and create a culture where cyber security is a priority for all employees through education and enforcement of security best practices. Taking proactive steps in these areas can help businesses better protect themselves against cyber threats now and in the future.
An advanced portfolio of leading infrastructure solutions for IT and OT networks. Our solutions include protection for wired and wireless networks and aid in the construct of highly secure indoor, campus, and outdoor networks.
The document provides information about Infotech Services, a consulting firm that has helped clients for over 15 years with strategic marketing, branding, and other services. It highlights the firm's proprietary branding process and industries served. The document also discusses the importance of information technology and how acquisitions have impacted growth in the industry. Key services provided by Infotech include cybersecurity, IT support, networking, and web/application development.
"In this issue of “The 10 Most Trusted Companies in
Enterprise Security” Insights Success has shortlisted
those enterprise security providers which are providing
solutions that are systematically profile and
contextualize security threats with a level of detail and
granularity that has never been achieved before."
MayaSoft is an internet security solutions company based in Amman, Jordan that provides IT solutions across the Middle East. It partners with major security solution providers like Kaspersky Lab, Cyberoam, Sophos, Trend Micro, Dahua, and Brocade to offer unified threat management, antivirus, anti-spam, web filtering, backup and disaster recovery solutions. MayaSoft aims to become a leader in the region by expanding its presence and offering reliable security solutions and support. It prioritizes customer and supplier satisfaction through innovative solutions, technical support, trust, respect, teamwork, and valuing individual contributions.
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
The document discusses how cybercriminals are outpacing digital businesses due to a rise in security threats, data breaches, and malware. It emphasizes that organizations need to not only prevent security breaches but also detect, intercept, and remediate threats to truly defend and empower themselves. Accenture provides security services to help clients build resilience, outpace attackers, and focus on innovation and business growth without interruptions from increasingly sophisticated cyber threats.
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
The workplace has changed and so has the threat landscape. Our secure workplace solution enables your employees to work from wherever they are, with whoever they need to, however, they want to, and from whatever device they choose.
Symantec's London vision 2014 event more details emerge on the company splitLluis Altes
IDC attended Symantec's Vision 2014 symposium which took place in London on October 21–22. During the event, a team of Symantec's top executives discussed the rationale behind the decision to separate Symantec into two public companies — one company grouping Symantec's security business and the other focused on information management. The executives also presented the company's strategy going forward in terms of product and services updates in the unified security solutions and unified information management areas. Symantec devoted the second day of the event to discuss with partners market trends and opportunities and how the company split should bring benefits to the company and its partners.
The decision to separate Symantec into two independent public companies was announced on October 9 and is expected to be completed by the end of December 2015. Last year, Symantec's global revenues stood at $6.7 billion; after the split the new security focused Symantec is estimated to be a $4.2 billion business accounting for approximately 62% of Symantec's current total business, with the new information management company expected to account for the remaining $2.5 billion in revenue.
Addressing cyber risk managment from SME perspectiveCyber Watching
Miguel Manteca's (Technical Sales Manager at HISPASEC) presentation will focus on making visible the most frequent cyber risks to which SMEs are exposed. Emphasis will be placed on the loss of data and its possible consequences for the business. The talk will try to give the guidelines to prevent them and make your company digitally safer. Brief introduction to the "Seriot" European project, which addresses the issue of internet security of things.
The document discusses Thermo Scientific's leadership in serving science through analytical instruments, equipment, reagents, software and services. It highlights the company's size and scale, unmatched capabilities, portfolio of leading brands, and mission to make the world healthier, cleaner and safer. Key strengths include global industry leadership, ability to continuously invest in growth opportunities through R&D, and an excellent track record of financial performance. New products are presented for applications such as sample preparation, analysis, and data interpretation.
- Thermo Electron Corporation filed a quarterly report with the SEC for Q1 2006.
- In the report, they disclosed revenues of $684 million for Q1 2006 and net income of $46.9 million.
- They also noted that in May 2005, their Life and Laboratory Sciences segment acquired the Kendro Laboratory Products division of SPX Corporation.
- Thermo Electron Corporation filed a quarterly report with the SEC for Q1 2006.
- In the report, they disclosed revenues of $684 million for Q1 2006 and net income of $46.9 million.
- They also noted that in May 2005, their Life and Laboratory Sciences segment acquired the Kendro Laboratory Products division of SPX Corporation.
This document is Thermo Electron Corporation's Form 10-Q quarterly report filed with the SEC for the quarter ended July 1, 2006. It includes Thermo's consolidated balance sheet, income statement, and cash flow statement for the quarter, as well as notes to the financial statements. The financial statements show that for the quarter, Thermo's revenues increased 9% to $713 million, net income decreased 20% to $48 million, and earnings per share from continuing operations decreased 14% to $0.30. Thermo also announced a definitive agreement to merge with Fisher Scientific International in an all-stock transaction expected to close in the fourth quarter of 2006.
- Thermo Electron Corporation filed a Form 10-Q with the SEC for the quarter ended July 1, 2006.
- Thermo announced an agreement to merge with Fisher Scientific International in a stock-for-stock exchange to create Thermo Fisher Scientific.
- The merger is subject to shareholder and regulatory approvals and is expected to close in the fourth quarter of 2006.
This document is Thermo Electron Corporation's quarterly report filed with the SEC for the quarter ended September 30, 2006. It provides condensed financial statements and notes for the periods presented. The financial statements show revenues of $724.9 million for the quarter and income from continuing operations of $48.8 million. Notes include details on the planned merger with Fisher Scientific International and recent acquisitions completed during the periods.
This document is Thermo Electron Corporation's quarterly report filed with the SEC for the quarter ended September 30, 2006. It provides condensed financial statements and notes for the periods presented. The financial statements show that revenues increased from the prior year period but net income decreased due to higher costs and expenses. Thermo also announced a definitive agreement in May 2006 to combine with Fisher Scientific International in an all-stock merger transaction subject to regulatory approvals.
The document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2006. It provides information on the company's business operations and financial performance. Specifically, it discusses Thermo Fisher's merger with Fisher Scientific to create a global leader in serving science. It also describes the company's two business segments - Analytical Technologies and Laboratory Products and Services - and provides an overview of key product lines within the Analytical Technologies segment, including scientific instruments, biosciences products, and diagnostic and environmental instruments.
The document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2006. It provides information on the company's business operations and financial performance. Specifically, it discusses Thermo Fisher's merger with Fisher Scientific to create a global leader in serving science. It also describes the company's two business segments - Analytical Technologies and Laboratory Products and Services - and provides an overview of key product lines within the Analytical Technologies segment, including scientific instruments, biosciences products, and diagnostic and environmental instruments.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended March 31, 2007. It includes Thermo Fisher's consolidated balance sheet, statement of income, and notes on significant events from the quarter. The quarter saw revenues of $2.3 billion, operating income of $192 million, and net income of $139 million. Expenses increased along with revenues from the prior year quarter following Thermo Fisher's merger transactions.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended March 31, 2007. It includes Thermo Fisher's consolidated balance sheet, statement of income, and statement of cash flows for the quarter, as well as notes to the financial statements. The notes disclose that in the first quarter of 2007, Thermo Fisher acquired two businesses in Switzerland for $24 million and a small manufacturer of electrostatic discharge products for $5 million total. Thermo Fisher also paid $5 million for various acquisition-related costs and adjustments.
- Thermo Fisher Scientific Inc. filed a quarterly report with the SEC for the quarter ended June 30, 2007.
- The company reported revenues of $2.385.9 million for the quarter and income from continuing operations of $187.9 million.
- Thermo Fisher has major operations in scientific instrument manufacturing, life sciences, diagnostics, and laboratory products and services.
This document is Thermo Fisher Scientific's Form 10-Q quarterly report filed with the SEC for the quarter ended June 30, 2007. It provides financial statements and notes including the consolidated balance sheet, statement of income, and statement of cash flows for the quarter, as well as information on acquisitions, accounting policies, and segment information. In the quarter, Thermo Fisher reported revenues of $2.4 billion, net income of $164 million, and earnings per share of $0.39. It also acquired Spectronex AG and Flux AG for $24 million in cash to expand its mass spectrometry offerings.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended September 29, 2007. It provides Thermo Fisher's consolidated balance sheet and income statement for the periods shown. The balance sheet shows the company had total assets of $21.2 billion, including $8.5 billion in goodwill. Total liabilities were $6.7 billion and shareholders' equity was $14.4 billion. The income statement shows revenues of $2.4 billion for the quarter and net income of $218.5 million.
This document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2007. It provides information on Thermo Fisher's business, including that it was formed through the merger of Thermo Electron and Fisher Scientific in 2006. Thermo Fisher has two principal brands, Thermo Scientific and Fisher Scientific, that serve over 350,000 customers in various industries through analytical instruments, equipment, consumables and services. The report provides an overview of Thermo Fisher's products and services and its strategy to continuously advance its technologies and services to address customers' emerging needs.
The document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2007. It provides information on the company's business segments and products. Specifically, it discusses the company's two business segments - Analytical Technologies and Laboratory Products and Services. It provides details on the various product groupings within the Analytical Technologies segment, which serves markets like pharmaceutical, biotechnology, academic, and clinical laboratories.
Thermo Fisher Scientific filed a Form 10-Q with the SEC for the quarter ended March 29, 2008. The filing includes financial statements and notes. The financial statements show that Thermo Fisher's revenues increased to $2.55 billion for the quarter, up from $2.34 billion in the same quarter the previous year. Net income was $233 million compared to $139 million in the prior year. Thermo Fisher also acquired the intellectual property of an immunohistochemistry control slide business during the quarter for $3 million in cash plus potential future payments of up to $2 million.
Thermo Fisher Scientific filed a Form 10-Q with the SEC for the quarter ended March 29, 2008. The filing includes financial statements and notes. The financial statements show that Thermo Fisher's revenues increased to $2.55 billion for the quarter, up from $2.34 billion in the same quarter of the prior year. Net income for the quarter was $233 million compared to $139 million in the prior year. Thermo Fisher also acquired the intellectual property of an immunohistochemistry control slide business during the quarter for $3 million in cash plus potential future payments of up to $2 million.
This document is a quarterly report filed with the SEC by Thermo Fisher Scientific Inc. for the quarter ended September 27, 2008. It includes Thermo Fisher's consolidated balance sheet, statement of income, and statement of cash flows for the periods presented. Some key details:
- Thermo Fisher reported revenues of $2.6 billion for the quarter and $7.9 billion for the nine months ended September 27, 2008.
- Net income was $221.5 million for the quarter and $704 million for the nine months.
- In the first nine months of 2008, Thermo Fisher made several acquisitions for aggregate consideration of $142 million in cash, plus $8 million of assumed debt and up to $19
This document is a quarterly report filed with the SEC by Thermo Fisher Scientific Inc. for the quarter ended September 27, 2008. It includes Thermo Fisher's consolidated balance sheet, statement of income, and statement of cash flows for the periods presented. Some key details:
- Thermo Fisher reported revenues of $2.6 billion for the third quarter of 2008 and $7.9 billion for the first nine months of 2008.
- Net income was $221.5 million for the third quarter and $704 million for the first nine months.
- Cash flows from operating activities totaled $960 million for the first nine months of 2008.
STREETONOMICS: Exploring the Uncharted Territories of Informal Markets throug...sameer shah
Delve into the world of STREETONOMICS, where a team of 7 enthusiasts embarks on a journey to understand unorganized markets. By engaging with a coffee street vendor and crafting questionnaires, this project uncovers valuable insights into consumer behavior and market dynamics in informal settings."
1. Elemental Economics - Introduction to mining.pdfNeal Brewster
After this first you should: Understand the nature of mining; have an awareness of the industry’s boundaries, corporate structure and size; appreciation the complex motivations and objectives of the industries’ various participants; know how mineral reserves are defined and estimated, and how they evolve over time.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
OJP data from firms like Vicinity Jobs have emerged as a complement to traditional sources of labour demand data, such as the Job Vacancy and Wages Survey (JVWS). Ibrahim Abuallail, PhD Candidate, University of Ottawa, presented research relating to bias in OJPs and a proposed approach to effectively adjust OJP data to complement existing official data (such as from the JVWS) and improve the measurement of labour demand.
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Vighnesh Shashtri
Under the leadership of Abhay Bhutada, Poonawalla Fincorp has achieved record-low Non-Performing Assets (NPA) and witnessed unprecedented growth. Bhutada's strategic vision and effective management have significantly enhanced the company's financial health, showcasing a robust performance in the financial sector. This achievement underscores the company's resilience and ability to thrive in a competitive market, setting a new benchmark for operational excellence in the industry.
The Rise of Generative AI in Finance: Reshaping the Industry with Synthetic DataChampak Jhagmag
In this presentation, we will explore the rise of generative AI in finance and its potential to reshape the industry. We will discuss how generative AI can be used to develop new products, combat fraud, and revolutionize risk management. Finally, we will address some of the ethical considerations and challenges associated with this powerful technology.
^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...mayaclinic18
Whatsapp (+971581248768) Buy Abortion Pills In Dubai/ Qatar/Kuwait/Doha/Abu Dhabi/Alain/RAK City/Satwa/Al Ain/Abortion Pills For Sale In Qatar, Doha. Abu az Zuluf. Abu Thaylah. Ad Dawhah al Jadidah. Al Arish, Al Bida ash Sharqiyah, Al Ghanim, Al Ghuwariyah, Qatari, Abu Dhabi, Dubai.. WHATSAPP +971)581248768 Abortion Pills / Cytotec Tablets Available in Dubai, Sharjah, Abudhabi, Ajman, Alain, Fujeira, Ras Al Khaima, Umm Al Quwain., UAE, buy cytotec in Dubai– Where I can buy abortion pills in Dubai,+971582071918where I can buy abortion pills in Abudhabi +971)581248768 , where I can buy abortion pills in Sharjah,+97158207191 8where I can buy abortion pills in Ajman, +971)581248768 where I can buy abortion pills in Umm al Quwain +971)581248768 , where I can buy abortion pills in Fujairah +971)581248768 , where I can buy abortion pills in Ras al Khaimah +971)581248768 , where I can buy abortion pills in Alain+971)581248768 , where I can buy abortion pills in UAE +971)581248768 we are providing cytotec 200mg abortion pill in dubai, uae.Medication abortion offers an alternative to Surgical Abortion for women in the early weeks of pregnancy. Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman
3. Dear Fellow Shareholders,
Fiscal 2000’s record-breaking results are a testament to the dedication and enthusiasm of our
employees around the world — and also to the support and encouragement of our valued customers
and shareholders.
Last year, we pledged to refocus our attention on our traditional core competencies of building security
and connectivity-related solutions. We vowed to shift resources to meet the ever-growing needs of the
enterprise community while maintaining our leadership position in the consumer markets. Our invest-
ments are paying off. Symantec has emerged as an undisputed leader in providing Internet security for
individuals and businesses worldwide. But, there is much more to do.
The results of Symantec’s landmark year, punctuated by strong growth in all areas, speak for them-
selves: revenues increased 26% from fiscal year 1999 to 2000, from $592.6 million to $745.7 million. We
reported net income of $170.1 million, or $ 2.73 per diluted share, compared to $50.2 million, or $ 0.86 per
diluted share, last year. And, during the year, we shipped approximately 50 million units of our products
around the world.
This solid performance was due in part to our aggressive strategy of promoting solutions globally. In
fact, sales outside of North America grew 41% and accounted for 41% of this past year’s total sales.
The Asian markets experienced accelerated growth; European sales were solid. Symantec’s reach
expanded into India, China, Spain and Eastern Europe, and we expect strong worldwide growth for
the coming year as well.
0{ 03
During the year, we focused on three key areas: business strategy, attracting and retaining talent, and
superior execution.
Business Strategy. We aligned investments with our enterprise focus by targeting the high-growth
areas of Internet security: content and network security. According to market research firm, IDC, these
are the largest and fastest growing segments of the security software market, with growth projected at
over 30% and 40%, respectively, in the next three years. By 2003, combined sales for these segments are
expected to reach $5 billion.
To broaden our Internet security offerings, we acquired two leading firms, URLabs® and L-3 Network
Security™. URLabs’ technologies and award-winning products deliver e-mail and Internet scanning and
filtering solutions to protect customers by blocking unauthorized or inappropriate content. The tech-
nologies and products we acquired from L-3 Network Security enable customers to assess, manage
and monitor network vulnerability levels and assist in security planning and design. In addition to these
acquisitions, we licensed personal firewall technology from WRQ® to incorporate added security protec-
tion in our products for individuals and businesses.
As we grew our security business, we also divested product lines that fell outside our core competencies.
On December 31, 1999, we sold our Visual Café™ and ACT!™ product lines.
4. John W. Thompson
Talent. Building and delivering products and services that allow customers to feel secure in their
use of the Internet requires a knowledgeable and experienced team of experts. In today’s very com-
petitive market for talent, attracting and retaining highly skilled employees is critical. Our track
record is outstanding.
The acquisition of URLabs and L-3 Network Security resulted in more than just expanding our port-
folio of offerings, it gave Symantec a dramatic infusion of highly skilled security professionals. We
are pleased that virtually all of these important contributors have stayed with Symantec. In addition,
we launched a professional services team dedicated to helping enterprise customers build secure
networks in today’s increasingly complex Internet environment. To extend that expertise to cus-
tomers worldwide, we are attracting a global network of security partners certified in security
implementation, training and support.
In the past year, over 70% of the management team is new to our company or to their position, bring-
ing with them a wealth of security, development, marketing, sales and service experience. We are
pleased all of these highly skilled professionals share our excitement about the unique strengths
of our company, and we are determined to continue to offer creative, flexible and competitive com-
04 }0
pensation and benefit packages to attract and keep world-class talent.
Execution. A focused business strategy and highly talented people are only the beginning. In the
end, success comes from making things happen. Our core consumer business maintained a solid
growth rate of 15% for the fiscal year. We attribute this to the continual improvement of our prod-
uct offerings and innovative solutions to customer problems. By introducing Norton Internet
Security™, we created an entirely new category of software for personal Internet security. This suite
combines a personal firewall, content filtering and virus protection and has ranked in the top 10
for best-selling business software for several months.
We paid the same attention to building industry-wide relationships. Because of our significantly
expanded partnerships with major PC suppliers, Symantec technology now reaches an even greater
number of individuals. We currently work with all major PC suppliers, displacing competitive security
providers on certain desktop and portable PC product lines at Dell®, Micron®, Gateway ® and Toshiba®.
Symantec continues to gain headway in the enterprise security market, which accounted for 45%
of total revenues in fiscal 2000 and grew 42% from the previous year. Our long and impressive list
of worldwide enterprise customers has surged and now includes Bank of America®, SmithKline
Beecham®, Deutsche Bank®, Georgia-Pacific® and Sprint PCS®, to name only a few.
5. Our e-Support tools, Norton Ghost™ and pcAnywhere™, continue to lead the remote management market.
These solutions allow administrators to manage and support software in a global environment. By pro-
viding tools that are needed for remote deployment, we continue to help customers stay connected and
productive no matter where they are.
Looking Forward. As we begin fiscal 2001, we are at the forefront of this emerging industry.
Whether the threat is a new, fast-spreading virus such as “I Love You,” a software agent planted to steal
personal information or a hacker trying to get into “always on” computer systems, millions of users
turn to Symantec for help. And, although security has yet to become a major concern for users of hand-
held devices, our Symantec Research Center has already created prototype software to protect Palm™
and other access device users even before the first virus attacks.
As more people and small businesses turn to service providers for Internet access or applications over
the Internet, they expect secure solutions. Recently announced contracts with Yahoo!®, where we pro-
tect 38 million users from malicious attacks, and with Brightmail™, Inc. and Tele Danmark™ Internet
Service help our products permeate this service provider market. Earlier this year, we created a group
within Symantec with the sole purpose of developing carrier-class products built on our core technolo-
gies and selling them to a wide range of Internet service providers. This is the next step in our market
coverage strategy: to be wherever customers want to buy our technology — in stores, over the Inter-
net, through service providers or in enterprise environments.
0{ 05
Although we are pleased with our accomplishments this year, we all know this is only the beginning. This
year saw a significant increase in cyber crime, elevating Internet security to a global concern. Our cus-
tomers tell us we are at the right place at the right time. They are looking to Symantec to provide the pure
confidence they want in their daily use of the Internet.
Our direction for next year is clear — growth and speed. We greatly appreciate your support and look
forward to continued success in fiscal 2001.
Sincerely,
John W. Thompson
Chairman of the Board, President and Chief Executive Officer
6. Millions of people around the world are communicating and conducting busi-
ness over the Internet. Now, they want to feel confident about it.
Families correspond by e-mail, bank, shop and use the Internet for education
and entertainment. Companies offer products and services online, share infor-
mation with customers and suppliers and instantly connect workers. Both are
giving unprecedented access to their most valuable personal and business
information via the Internet.
Individuals and corporations need assurance that online activities will be free
from viruses, e-mails with malicious intent, loss of personal financial infor-
mation or inappropriate Internet content flooding their computers. And so,
increasingly, they look to Symantec.
Expertise. Because of our unequalled expertise in security protection,
Symantec was the only security company invited to join the U.S. delegation at
the 2000 G-8 Conference on Safety and Confidence in Cyberspace, a worldwide
symposium addressing cyber threats. We continue to work closely with gov-
ernments and industry leaders to address significant threats posed by cyber
crime and to enhance international efforts in identification and response.
100.00
TRUST
00.00
7. Discovered Time to Cure
Melissa 1 hour
3.26.99
Chernobyl automatic fix
4.26.99
I Love You 2 hours
5.4.00
Very Funny less than 1 hour
5.4.00
8. Symantec also was part of a select group that worked to create and pro-
mote British Standard 7799, an emerging world standard for information
security management. BS 7799 ratings will allow companies to demonstrate
compliance with customer information and confidentiality safeguards. At
the same time, it will allow consumers to recognize sites where their
information is secure.
Symantec’s Global Response Centers continue to expand and evolve with
four strategically located offices around the world. These centers assessed
and neutralized a growing number of viruses last year — 520% more than
the previous year. Our burgeoning database of virus definitions currently
protects users from over 50,000 threats, including the well-known “Melissa”
{ Symantec gives individuals and corporations assurance and “I Love You” viruses.
that online activities will be free from viruses, e-mails
Solutions. Symantec is a leader in protecting individuals and enterprises
with malicious intent and loss of confidential information.
from malicious attacks. Our Norton AntiVirus™ product ranks consistently
in the top 10 business software category and has won an unprecedented
number of honors including the Secure Computing Millennium Awards in
1999. More recently, Yahoo! chose Symantec’s anti-virus solution to pro-
tect the e-mail of its 38 million subscribers. Brightmail, Inc., the world’s
leader in protecting users from unwanted e-mail or spam, recently
licensed the right to sell Symantec products along with their own to
Internet access providers.
Internet connections that are “always-on” increase individual and corporate
vulnerability to hackers who steal information or “borrow” the computer
to launch denial-of-service attacks. Symantec’s Norton Internet Security
provides a complete suite of Internet security solutions, including a per-
sonal firewall to detect and stop hackers. Corporations also use this
9. { Toshiba America Information Systems, Inc., Computer Systems Group }
“A Toshiba customer is a connected customer. Symantec’s Norton Internet Security and Norton AntiVirus
are exactly the products we were seeking to protect our customers from both virus and Internet perils.”
Mike Wagner, Vice President, Marketing, Commercial, Desktops,
Toshiba America Information Systems, Inc., Computer Systems Group
product to protect thousands of remote workers from having their systems
used as an open door for malicious attacks on the corporate network.
Our e-mail scanning software goes beyond virus prevention. These solu-
tions protect confidential information from escaping in e-mails and prevent
hate, sexual harassment and content with inappropriate language from
traveling through a corporation’s e-mail network.
FamilyClick™ incorporated our web filtering technologies into its online
service, ensuring families see only appropriate content. Similarly, we
worked closely with teachers, administrators and parents in Virginia’s Fair-
fax County School system to develop Internet filters that match content with
age and educational needs. The county praised the flexibility and ease of 0{ 09
use of Symantec’s URL filtering products. This same filtering technology
was used by a Fortune 500 refinery company to track sites most visited by
employees. As a result, the company was able to develop a comprehensive
electronic use policy and determine the need for additional bandwidth.
One of the most challenging tasks facing corporate security officers is iden-
tifying the network’s weak spots and analyzing which operations are at risk.
Symantec's security assessment and planning products, our professional
services team, our award-winning technical support and certified partners
help organizations around the world develop comprehensive security poli-
cies and implement Symantec technologies that are tailored to the needs of
the company and its employees.
So, whether it is a teenager using the computer at home, a mobile worker
connected to the company network or thousands of employees connected
to a global corporate network via the Internet, Symantec security products
and services provide the ability to use the Internet confidently and securely.
10. Symantec’s promise to its customers is to provide the confidence necessary for
communicating and doing business in a connected world.
Why? Because in a recent FBI survey, 97% of corporations, government agen-
cies and universities reported insider abuse of Internet privileges. Over half
reported unauthorized access by employees. Add viruses and denial-of-service
attacks — and cyber crime experts say this is just the beginning.
Action. In this fiscal year, we are bolstering our investment in Symantec’s
Global Response Centers in the U.S., Asia Pacific and Europe to enhance
around-the-clock surveillance. These centers are the first line of defense
against viruses and intrusions. The global response teams detect new viruses,
worms and malicious code, then assess, find remedies and distribute protec-
tive code to customers — in many cases, before their customers’ work day
even begins. Working with our researchers worldwide, we use time zones to
our advantage, identifying and neutralizing threats often before they cause
widespread damage.
100.00
INNOVATION
00.00
11. { Brightmail, Inc. }
“With Symantec, we are providing the industry’s first integrated anti-virus and anti-spam solution for ISPs and
ASPs. This comprehensive solution incorporating filtering products and services greatly enhances the usability
of e-mail, enabling ISPs and ASPs to extend the Brightmail platform to differentiate their offering.”
Sunil Paul, Founder and Chairman, Brightmail, Inc.
12. We are equipping these Global Response Centers with automatic capa-
bilities far beyond previous virus protection methods. Symantec’s Digital
Immune System™, a key component of our anti-virus products, allows a
computer network to identify potentially harmful agents and take pro-
tective measures instantly. Potential threats are automatically identified,
isolated and in most cases neutralized. If these captured threats are sus-
pect, but are too complex to be handled by an automated response, an
{ Our laboratories research and develop next generation
expert virus researcher examines them in person and provides a fix if
virus protection, intrusion detection and content filter- necessary. This combination of speed and thoroughness ensures prob-
ing solutions to stay well ahead of potential new threats. lems are detected, diagnosed and immunized before they bring down
corporate servers and desktops. The Digital Immune System represents
the highest level of service.
Symantec is determined to remain an industry leader in providing inno-
vative services and products that protect Internet users and vulnerable
environments from cyber threats — no matter what new technologies
may bring. Our laboratories research and develop next generation virus
protection, risk management, intrusion protection and content filtering
solutions to stay well ahead of potential new threats. For example,
although there are currently no known viruses aimed at hand-held access
devices, Symantec developed the world's first anti-virus technology for
the Palm OS® platform. By leveraging our technology, we created a
smaller virus detection program that opens the door for protection of
other devices such as telephones, appliances and wireless devices.
Protection. In June 2000, we introduced Symantec Enterprise Security™,
the first comprehensive enterprise security solution that includes
13. { Tele Danmark }
“As Denmark’s largest Internet Service Provider, we consider Symantec’s Norton AntiVirus to be one of
the best on the market and use it to protect subscribers of our Opasia Internet service from virus attack.
By using the free access to virus updates through LiveUpdate, our customers will have increased pro-
tection against new viruses.”
Per B. Hansen, Head of Security, Tele Danmark
proactive assistance and policy guidance for today’s complex Internet
environment. The system integrates best-of-breed, multi-platform prod-
ucts in intrusion prevention, content filtering and virus protection. This
allows our enterprise customers to determine, monitor and enforce
security levels and practices to secure critical business and e-commerce
assets. We will broaden the solution by providing network mapping, host-
and network-based vulnerability scanning, policy compliance testing and
risk-based security policy recommendations, thereby allowing enterprise
customers to find the appropriate balance between risk, cost, perform-
0{ 13
ance and protection.
Since not all customers want to manage their security needs, a new divi-
sion of Symantec is focused specifically on building highly scalable
versions of Symantec security technologies to be delivered via Application
or Internet Service Providers (ASPs or ISPs) and Value-Added Resellers
(VARs). Our goal is to build three sets of services: carrier class solutions,
web-hosted applications and managed services. These solutions will
include virus protection, scanning and filtering tools and intrusion pre-
vention. This is an enormous opportunity for Symantec, and we are
convinced that significant rewards await us in this arena.
Finally, as complex and more destructive threats begin to emerge,
Symantec researchers around the world are working closely with
governments, law enforcement agencies, international security bodies
and academic institutions to bring innovative solutions and new tech-
nologies to market, providing the peace of mind customers need in a
connected world.
15. Selected Financial Data
16
Business Overview
17
Management’s Discussion and Analysis of Financial Condition
22
and Results of Operations
Quantitative and Qualitative Disclosures
30
about Market Risk
Consolidated Financial Statements
32
Summary of Significant Accounting Policies
36
Notes to Consolidated Financial Statements
38
Report of Independent Auditors
56
Forward-Looking Statements The following discussion contains for-
ward-looking statements that involve known and unknown risks,
uncertainties and other factors that may cause our actual results, levels
of activity, performance or achievements to be materially different from
0{ 15
any future results, levels of activity, performance or achievements
expressed or implied by such forward-looking statements. Such factors
include, among others things, those risk factors set forth in our previously
filed Form 10K for the year ended March 31, 2000. We identify forward-look-
ing statements by words such as “may,” “will,” “should,” “could,” “expects,”
“plans,” “anticipates,” “believes,” “estimates,” “predicts,” “potential” or “con-
tinue” or similar terms that refer to the future. We cannot guarantee
future results, levels of activity, performance or achievements.
16. as a purchase and, accordingly, the operating results of these
Introduction Symantec, a world leader in Internet security tech-
businesses have been included in our consolidated financial
nology, provides a broad range of content and network security
statements since their respective dates of acquisition. We did not
solutions to individuals and enterprises. We are a leading provider
complete any acquisitions during fiscal 1998. During fiscal 1997,
of virus protection, risk management, Internet content and e-mail
we acquired Fast Track, Inc. in a transaction accounted for as a
filtering, remote management and mobile code detection tech-
pooling of interests. Since the results of operations of Fast Track
nologies to enterprise and individual customers. Founded in 1982,
were not material to our consolidated financial statements,
we have offices in 33 countries worldwide.
amounts prior to the date of acquisition were not restated to
reflect the combined operations of the companies. In fiscal 1996,
Selected Financial Data
we acquired Delrina Corporation in a transaction accounted for as
a pooling of interests, and therefore, we have restated the results
The following selected financial data is qualified in its entirety
of operations for all periods presented to reflect the consolidated
by and should be read in conjunction with the more detailed con-
results of Delrina and Symantec.
solidated financial statements and related notes included
elsewhere herein.
On December 31, 1999, we divested our ACT! and Visual Café prod-
uct lines. Because the divestitures of the ACT! and Visual Café
During fiscal 2000, we acquired URLabs, L-3 Network Security’s
product lines were effective at the close of business on Decem-
operations and 20/20 Software. During fiscal 1999, we acquired
ber 31, 1999, these product lines are included in the results of
Quarterdeck, Intel’s and IBM’s anti-virus businesses and the
operations through that date for the year ended March 31, 2000.
operations of Binary. Each of these acquisitions was accounted for
Five-Year Summary
Year Ended March 31,
2000 1999 1998 1997 1996
(In thousands, except net income (loss) per share)
Statements of Operations Data:
Net revenues $ 745 , 725 $ 592 , 628 $ 532 ,940 $ 452 ,933 $ 445 , 432
Acquisition, restructuring and other expenses 13 , 318 38 , 395 — 8 ,585 27 , 617
Operating income (loss) 135 , 203 27 , 841 54 ,924 17 ,550 ( 48 , 279 )
Net income (loss) 170 , 148 50 , 201 85 ,089 26 ,068 ( 39 , 783 )
16 }0
Net income (loss) per share - basic $ 2.94 $ 0.89 $ 1.52 $ 0.48 $ ( 0.76)
Net income (loss) per share - diluted $ 2.73 $ 0.86 $ 1.42 $ 0.47 $ ( 0.76)
Shares used to compute net income (loss) per share - basic 57 , 870 56 , 601 56 ,097 54 ,705 52 , 664
Shares used to compute net income (loss) per share - diluted 62 , 214 59 , 289 60 ,281 55 ,407 52 , 664
March 31,
2000 1999 1998 1997 1996
(In thousands)
Balance Sheet Data:
Working capital $ 319 , 020 $ 94 , 036 $ 175 ,537 $ 129 ,569 $ 134 , 643
Total assets 846 , 027 563 , 476 476 ,460 339 ,398 282 , 674
Long-term obligations, less current portion 1 , 553 1 , 455 5 , 951 15 ,066 15 , 393
Stockholders’ equity 617 , 957 345 , 113 317 ,507 217 ,979 180 , 317
17. Quarterly Financial Data
Fiscal 2000
Mar. 31 Dec. 31, Sep. 30, Jun. 30,
(In thousands, except net income per share; unaudited)
2000 1999 1999 1999
Net revenues $ 187, 205 $ 200, 847 $ 182 ,535 $ 175, 138
Gross margin 158, 196 170, 048 151 ,893 144, 515
Restructuring and other expenses 7, 059 2, 246 1 ,240 2, 773
Income, net of expense, from sale of technologies and product lines 7, 491 89, 967 5 , 010 4, 890
Net income 31, 576 89, 013 25 ,832 23, 727
Net income per share-basic $ $ $ $
0.53 1.52 0.45 0.42
Net income per share-diluted $ $ $ $
0.49 1.41 0.43 0.41
Fiscal 1999
Mar. 31, Dec. 31, Sep. 30, Jun. 30,
(In thousands, except net income per share; unaudited)
1999 1998 1998 1998
Net revenues $ 169 , 618 $ 155 ,206 $ 130 ,034 $ 137, 770
Gross margin 141 , 168 128 , 718 108 ,697 117, 487
Restructuring and other expenses 740 7 ,560 10 ,122 19, 973
Income, net of expense, from sale of technologies and product lines 5 , 957 9 ,850 10 ,027 15, 321
Net income 24 , 758 15 ,883 1 ,945 7, 615
Net income per share-basic $ 0.44 $ 0.29 $ 0.03 $ 0.13
Net income per share-diluted $ 0.43 $ 0.28 $ 0.03 $ 0.13
Fiscal 2000
Market Information Common Stock
Mar. 31, Dec. 31, Sep. 30, Jun. 30,
Our common stock is traded on the Nasdaq National Market under (In Canadian Dollars)
2000 1999 1999 1999
the Nasdaq symbol quot;SYMC.quot; The high and low closing sales prices
High $ 116.00 $ 99.00 $ 54.00 $ 40.50
set forth below are as reported on the Nasdaq National Market.
Low 70.00 55.00 38.50 20.00
Fiscal 2000 0{ 17
Fiscal 1999
Mar. 31, Dec. 31, Sep. 30, Jun. 30,
Mar. 31, Dec. 31, Sep. 30, Jun. 30,
2000 1999 1999 1999
(In Canadian Dollars)
1999 1998 1998 1998
High $ 80.81 $ 66.44 $ 35.97 $ 28.00
High $ 34.60 $ 33.00 $ 41.75 $ 46.50
Low 48.06 36.75 25.75 13.00
Low 22.45 13.20 16.60 32.75
Fiscal 1999
Mar. 31, Dec. 31, Sep. 30, Jun. 30,
As of March 31, 2000, there were approximately 663 stockholders
1999 1998 1998 1998
of record, including approximately 22 holders of record of Delrina
exchangeable shares. We have not paid cash dividends in the last
High $ 22.88 $ 21.81 $ 28.00 $ 32.13
three years. In addition, our bank line of credit does not allow for
Low 14.47 8.69 10.13 22.63
the payment of cash dividends on our common stock.
Delrina exchangeable stock has been traded on the Toronto Stock
Exchange under the symbol “DE” since the acquisition of Delrina Business Overview
by Symantec on November 22, 1995. The high and low closing
In the past, we have organized our business on a product group
sales prices set forth below are in Canadian dollars as reported on
basis. In fiscal 2000, we restructured our internal operations and
the Toronto Stock Exchange. Delrina exchangeable stock is
management to allow us to organize our resources by customer
exchangeable at the option of the stockholders on a one-for-one
segment. We currently view our business in five customer-
basis into our common stock.
18. centered segments; Consumer and Small Business, Enterprise data that enters, leaves or travels inside the organization, as well
Solutions, e-Support, Professional Services and Other. as detecting and eliminating malicious code that may be intro-
duced into a company’s network. Using Symantec’s content
In addition to our internal restructuring, we added key technolo-
security software solutions, managers can control user access to
gies by acquiring URLabs, L-3 Network Security’s operations and
information from the Internet and help ensure that users focus on
20/20 Software. These acquisitions will enable us to:
data for work productivity, rather than leisure activities. Elements
increase our addressable market opportunities; of content security include virus and mobile code protection and
•
broaden our security offerings; e-mail and Internet content scanning and filtering.
•
acquire a talented base of UNIX employees; and
•
Virus and Mobile Code Protection Our anti-virus solutions pro-
develop a consulting service organization within
•
tect computers and networks at multiple entry points from known
our company.
and unknown threats. Anti-virus protection provides automatic
Furthermore, we divested the ACT! and Visual Café product lines protection from virus attacks that can occur when files are
to focus our strategy in the Internet security market. exchanged over the Internet. Protection from virus attacks is the
most well-known and largest market component within the con-
Consumer and Small Business Our Consumer and Small Busi-
tent security space.
ness segment provides solutions to individual users, home offices
and small businesses. The division’s charter is to ensure that con- E-mail Content Scanning and Filtering Our e-mail content scan-
sumers and their information are secure and protected in a ning and filtering solutions help protect proprietary information
connected world. Most of the products that we are currently mar- and can reduce liability exposure and improve productivity for e-
keting or developing feature LiveUpdate. This feature enables mail application users. Content can be scanned for proprietary
users to easily download content updates including virus defini- information and for inappropriate words and phrases to ensure a
tions, firewall rules, URL databases and uninstall scripts. company’s e-mail policies are enforced. Filtering can also
increase bandwidth by countering e-mail address forgery attacks.
Enterprise Solutions The objective of our Enterprise Solutions
segment is to provide a broad range of security solutions for our Internet Content Scanning and Filtering Our Internet content
enterprise customers. Our corporate customers need to protect scanning and filtering solutions allow organizations and individuals
their businesses from the threats associated with the use of the to control and focus Internet usage for increased productivity and
Internet. These threats are both external and internal to the potentially decreased liability exposure. Content is scanned and fil-
organization. External threats include such things as viruses or tered based on lists of sensitivities, specific addresses and context.
hacker intrusions; internal threats include undesired use of net-
work resources or potential liability stemming from abuse of Enterprise Solutions - Network Security Network security is another
18 }0
Internet access. core element of Internet security that encompasses network vul-
nerability assessment of the potential dangers to the organization
Our Enterprise Solutions products are available to customers in
from information flows to and from the Internet. Users of our net-
a variety of ways. We offer each product as either a stand-alone
work security solutions are able to assess vulnerabilities to the
product or as a combined solution, allowing the customer to deter-
network or system and/or detect the occurrence of malicious
mine what is most effective for them. The Enterprise Solutions
activities on systems and networks.
segment currently focuses on two areas: Content Security and
Network Security. Our vulnerability assessment solutions provide the tools and serv-
ices to automate the detection and correction of common inactive
Enterprise Solutions - Content Security Content security is a core and network configuration errors.
element of Internet security that combines multi-tier protection
e-Support Our e-Support segment offers products that enable
against viruses and mobile code with the management of Internet
companies to be more effective and efficient within their IT
communications for sensitive content or misuse of data. Mobile
departments. Remote management solutions help remote pro-
code, frequently referred to as viruses or malicious code, refers to
fessionals to remain productive while providing companies access
executable programs that are used with a specific malicious
to information, applications and data from any location.
intent in mind. Users of our content security solutions are able to
take action to protect their enterprise from risks associated with Professional Services Our Professional Services division pro-
using Internet resources. This includes scanning or monitoring vides fee-based technical support and consulting services to
19. enterprise customers to assist them with the planning, design Sales and Marketing,
International Sales and Customer Support
and implementation of enterprise security solutions in the anti-
virus and Internet content filtering technologies. In addition, we
We market our products worldwide utilizing a multi-channel
provide complete vulnerability and security assessments of enter-
strategy of direct and indirect sales through independent software
prise customer information systems.
distributors, major retail chains and resellers.
Sales and Marketing We sell our products to individuals and
Recent Acquisitions and Divestitures
enterprise users primarily through distributors and resellers. Our
Acquisitions Since our initial public offering on June 23, 1989, we
products are available to customers through channels that
have completed acquisitions of 22 businesses. Our recent acquisi-
include: distributors, retail, mail order, corporate resellers, Inter-
tions are as follows:
net-based resellers or “e-tailers,” value added resellers, original
equipment manufacturers, educational institutions and Internet
20/20 Software, Inc. in the March 2000 quarter;
•
service providers (“ISPs”). We also sell some of our products and
L-3 Network Security’s operations, also in the
•
product upgrades through direct mail and over the Internet. We
March 2000 quarter;
sell corporate site licenses through our distribution and corporate
URLabs in the September 1999 quarter;
•
reseller channels.
Quarterdeck Corporation in the March 1999 quarter;
•
Intel Corporation’s anti-virus business in the
•
We maintain distribution relationships with major independent
September 1998 quarter;
distributors. These distributors stock our products for redistrib-
Binary Research Limited’s operations in the
•
ution to independent dealers, consultants and other resellers. We
June 1998 quarter;
also maintain relationships with major retailers, while marketing
International Business Machine’s anti-virus
•
to these retailers through independent distributors. Our sales
business, also in the June 1998 quarter;
force works closely with our major distributor and reseller
Fast Track, Inc. in the June 1996 quarter; and
•
accounts to manage the flow of orders, inventory levels and sell-
Delrina Corporation in the December 1995 quarter.
•
through to customers. We also work closely with them to manage
promotions and other selling activities.
With the exception of Fast Track and Delrina, we accounted for
each of these acquisitions as a purchase and, accordingly, we Our agreements with distributors are generally nonexclusive and
have included the operating results of these businesses in our may be terminated by either party without cause. These distribu-
consolidated financial statements since their respective dates of tors are not within our control and are not obligated to purchase
acquisition. Fast Track and Delrina were accounted for as pool- products from us. These distributors also represent other ven- 0{ 19
ings of interest. Accordingly, we have restated all financial dors’ product lines.
information to reflect the combined operations of Delrina; how-
Our marketing activities include:
ever, since Fast Track had results of operations that were not
material to our consolidated financial statements, we did not advertising in trade, technical and business publications;
•
restate any financial information related to Fast Track. In the past, on-line advertising;
•
we have acquired businesses, including Peter Norton Comput- public relations;
•
ing, Inc. on August 31, 1990. We continue to use the Norton brand cooperative marketing with distributors,
•
name for products subsequently developed and marketed by us. resellers and dealers;
direct mailings to existing and prospective end-users; and
•
Divestitures We divested the Visual Café and substantially all
participation in trade and computer shows.
•
of the ACT! product lines on December 31, 1999, and have included
their results in our Other business segment. These divestitures We typically offer two types of rebate programs: volume incen-
enabled us to focus our efforts and resources on our Internet tive rebates and rebates to end-users. Volume incentive rebates
security business. These products comprised a significant part of are made available to our distributors and resellers. The distrib-
our business prior to their disposition. utor or reseller earns a rebate based upon their purchases and
their sale of products to end-users. Volume incentive rebates are
accrued when revenue is recorded. From time to time, we also
make rebates available to end-users of various products acquired
20. through major retailers. End-user rebates are accrued when We plan to transition a significant amount of these international
revenue is recorded. customers to unlimited free online support over the next two
years. Through LiveUpdate, we provide online access to applica-
Our return policy allows distributors, subject to various limitations,
tion bug fixes and/or patches for most of our currently marketed
to return purchased products in exchange for new products or for
and developed products. In addition, we offer both enterprise and
credit toward future purchases. End-users may return products
consumer customers a variety of fee-based options designed to
through dealers and distributors for a full refund, within a reason-
meet their technical support requirements. We revise these fee-
able period from the date of purchase. Also subject to limitations,
based support programs from time to time as customer
retailers may return older versions of products. Various distribu-
requirements change and as market trends dictate.
tors and resellers have different return policies that may impact the
level of products that are returned to us. Product returns occur
Product Development, Partnerships and Acquisitions
when we introduce upgrades and new versions of products or
when distributors order too much product. In addition, competi- We use a multiple product sourcing strategy that includes, as necessary:
tive factors often require us to offer rights of return for products
internal development;
•
that distributors or retail stores are unable to sell.
licensing from third parties; and
•
acquisitions of technologies, product lines or companies.
•
International Sales Revenues outside of North America repre-
sented approximately 41%, 37% and 34% of our net revenues for
We develop software products that are designed to operate on a
fiscal 2000, 1999 and 1998, respectively.
variety of operating systems. We typically develop new products
The majority of our net revenues from Europe are derived from and enhancements of existing products through our business
sales by affiliates of our major United States distributors. In other segments with support from our core technology group. Each
countries, we sell our products through authorized distributors. In segment is responsible for its own design, development, docu-
some countries, these distributors are restricted to specified ter- mentation and quality assurance.
ritories. We adapt some of our products by translating the
Independent contractors are used for aspects of the product
documentation and software, where necessary, and preparing
development process. In addition, elements of some of our prod-
marketing programs for each local market.
ucts are licensed from third-party developers.
We have marketing offices in Argentina, Australia, Brazil, Canada,
We use strategic acquisitions, as necessary, to provide certain
China, Columbia, Czech Republic, Finland, France, Germany, Hol-
technology, people and products for our overall product strategy.
land, Hong Kong, Hungary, India, Israel, Italy, Japan, Korea,
We have completed a number of acquisitions and dispositions of
Malaysia, Mexico, New Zealand, Norway, Poland, Russia, Singa-
20 }0
technologies, companies and products and may acquire and dis-
pore, South Africa, Sweden, Switzerland, Taiwan, United Arab
pose of other technologies, companies and products in the future.
Emirates and the United Kingdom. These local offices facilitate
our marketing and distribution in international markets. Our
Competition The computer software market is intensely com-
international operations are subject to various risks common to
petitive and is subject to rapid changes in technology. It is
international operations, including:
influenced by the strategic direction of major computer hardware
government regulations; manufacturers, ISPs, Application Service Providers (“ASPs”) and
•
import restrictions; operating system providers. Our competitiveness depends on our
•
currency fluctuations; ability to deliver products that meet our customers’ needs by
•
repatriation restrictions; and enhancing existing solutions and offering successful new solu-
•
in some jurisdictions, reduced protection for our tions on a timely basis. We have limited resources, and as a result,
•
copyrights and trademarks. we must deploy resources thoughtfully. The principal competitive
factors in our Consumer and Small Business, Enterprise Solu-
Customer Support Our product support program provides a tions and e-Support segments are quality, employment of the
wide variety of free and fee-based technical support services to most advanced technology, price, reputation, breadth of product
our customers. We provide most of our customers with unlimited offerings, customer support and sales and marketing terms. In
free online support. For some of our international customers we our Professional Services segment, the principal competitive fac-
provide free telephone support, limited to a period of 30 to 90 days. tors include technical capability, responsiveness, price and
21. reputation within the industry. This section should be read in con- utility products from features included in these operating systems.
juction with the risk factors set forth in our previously filed Form Our efforts in this regard may be unsuccessful.
10K for the year ended March 31, 2000.
The demand for some of our products, including those currently
Competition in the consumer and small business market is under development, may decrease, if, among other reasons:
intense. Some of the companies that offer competing products to
Microsoft includes additional product features in future
•
our Consumer and Small Business offerings include Network
releases of Windows;
Associates, McAfee.com, PowerQuest, Network ICE, Computer
hardware vendors incorporate additional server-based
•
Associates, WebSense, Secure Computing, Panda, Norman and
network management and security tools into network
Trend Micro. With the recent outbreaks of viruses and other Inter-
operating systems; or
net-based security threats, several other companies have entered
competitors license certain of their products to Microsoft
•
the market and may become significant competitors in the future.
or original equipment manufacturers for inclusion in their
We compete against several companies in the virus and mobile operating systems or products.
code protection market, which is where we sell our anti-virus
In addition, we compete with other computer software companies
products. Some of the companies that we compete against in this
for access to retail distribution channels and for the attention of
area are Network Associates, McAfee.com, Computer Associates,
customers at the retail level and in corporate accounts. We also
Panda, Norman and Trend Micro. WebSense, N2H2, JSB Software,
compete with other software companies to acquire products or
Network Associates, Trend Micro and Secure Computing have prod-
companies and to publish software developed by third parties.
ucts that compete directly with our e-mail and Internet content
scanning and filtering products. We compete against ISS Group, Many of our existing and potential competitors may have greater
AXENT Technologies and Network Associates in the network secu- financial, marketing or technological resources than we do. We
rity marketplace. Our e-Support products, pcAnywhere and Norton believe that competition in the industry will continue to intensify
Ghost Enterprise Edition, compete with Traveling Software, Stac as most major software companies expand their product lines into
Software, Netopia and other programs. additional product categories.
Price competition is intense with most of our products. We expect
Manufacturing Our product development groups produce a set
price competition to continue to increase and become even more
of master CD-ROMs or diskettes and documentation for each
significant in the future, which may reduce our profit margins.
product that are then duplicated and packaged into products by
We also face competition from a number of other products that the manufacturing organization. All of our domestic manufactur-
offer levels of functionality different from those offered by our ing and order fulfillment is performed by an outside contractor
0{ 21
products, or that were designed for a somewhat different group under the supervision of our manufacturing organization. Domes-
of end-users than those targeted by us. Operating system vendors tic purchasing of all raw materials is done by Symantec personnel
such as Microsoft have added features to new versions of their in our Cupertino, California facility. The manufacturing steps that
products that provide some of the same functions offered in our are subcontracted to outside organizations include the duplication
products. Microsoft has incorporated advanced utilities in Win- of diskettes and replication of CD-ROMs, printing of documenta-
dows 95, Windows 98 and Windows 2000, and we believe this trend tion materials and assembly of the final packages. We perform
will continue. In addition, several other operating systems are diskette duplication and assembly of the final package in our
gaining market acceptance, such as Red Hat Linux, Solaris and Dublin, Ireland manufacturing facility for most products distrib-
UNIX-based operating systems, and they may also incorporate uted outside of North America.
advanced utilities or other functionality offered in our products.
While we plan to continue to improve our products with a view toward Intellectual Property We regard our software as proprietary. We
providing enhanced functionality over that provided in current and attempt to protect our software technology by relying on a com-
future operating systems, these efforts may be unsuccessful and bination of copyright, patent, trade secret and trademark laws,
any improved products may not be commercially accepted by restrictions on disclosure and other methods. Litigation may be
users. We will also continue to attempt to cooperate with operat- necessary to enforce our intellectual property rights, to protect
ing system vendors to make our products compatible with those trade secrets or trademarks or to determine the validity and
operating systems, while at the same time, differentiating our scope of the proprietary rights of others. Furthermore, other
22. parties have asserted and may, in the future, assert infringement In March 1999, Quarterdeck shareholders approved the acquisition
claims against us. These claims and any litigation may result in by Symantec of the remaining outstanding shares of Quarterdeck.
invalidation of our proprietary rights. Litigation, even if not meri- The acquisition of Quarterdeck was accounted for as a purchase
torious, could result in substantial costs and diversion of and was paid for with cash. We recorded acquired product rights,
resources and management attention. goodwill, workforce in place and other intangible assets for the
respective purchases. We wrote-off the acquired in-process
Employees As of March 31, 2000, we employed approximately research and development. We are amortizing the value of the
2,600 people worldwide, including approximately 1,500 in sales, workforce in place over two years. We are amortizing the value of
marketing and related staff activities, 500 in product development the remaining intangibles, acquired product rights and goodwill
and 600 in management, manufacturing, administration and over five years.
finance. None of our employees are represented by a labor union
In September 1998, we entered into an agreement with Intel to
and we have experienced no work stoppages. We believe that rela-
acquire its anti-virus business and to license its systems man-
tions with our employees are good. Competition in recruiting
agement technology. The acquisition was accounted for as a
personnel in the software industry is intense. We believe that our
purchase and was paid for with cash. We recorded acquired
future success will depend in part on our ability to recruit and
product rights and other intangibles as of the date of the acqui-
retain highly skilled management, marketing and technical
sition. We wrote-off the acquired in-process research and
personnel. We believe that we must provide personnel with a
development. We are amortizing the value of the intangible assets
competitive compensation package, which necessitates the con-
over five years.
tinued availability of stock options and shares to be issued under
our employee stock option and purchase plans. In June 1998, we acquired the operations of Binary. The acquisition
was accounted for as a purchase and was paid for with cash. We
recorded intangible assets of acquired product rights and work-
Management’s Discussion and Analysis
force in place as of the date of the acquisition. We wrote-off the
of Financial Condition and Results of Operations
acquired in-process research and development. We are amortiz-
During the last three fiscal years, we completed the following ing the value of the workforce in place and acquired product rights
acquisitions and divestitures: over four years.
In March 2000, we purchased 100% of the outstanding common In May 1998, we entered into an agreement with IBM to acquire its
stock of 20/20 Software. The transaction was accounted for as a immune system technology and related anti-virus patents. The
purchase and will be paid for in cash. We recorded goodwill and acquisition was accounted for as a purchase and was paid for with
acquired product rights in connection with this acquisition. We are cash and debt. We recorded intangible assets of prepaid research
22 }0
amortizing these intangible assets over five years. and development, customer base and goodwill. We wrote-off the
acquired in-process research and development. We amortized
Also in March 2000, we acquired L-3 Network Security’s operations.
the value of prepaid research and development over one year. We
The transaction was accounted for as a purchase and was paid for
are amortizing the value of both the goodwill and customer base
with cash. We recorded goodwill and other intangible assets in the
over five years.
transaction. We wrote-off the acquired in-process research and
development. We are amortizing the value of the goodwill, acquired We did not complete any acquisitions during fiscal 1998.
product rights and other intangibles over five years.
On December 31, 1999, we divested our ACT! and Visual Café prod-
In July 1999, we purchased 100% of the outstanding common stock uct lines. Because the divestitures of the ACT! and Visual Café
of URLabs. The transaction was accounted for as a purchase and product lines were effective at the close of business on Decem-
was paid for with cash. We recorded goodwill and other intangi- ber 31, 1999, these product lines are included in the results of
ble assets in connection with the acquisition. We wrote-off the operations through December 31, 1999.
acquired in-process research and development. We are amortiz-
ing the value of the goodwill, acquired product rights and other
Results of Operations The following table sets forth each item
intangibles over a five-year period.
from our consolidated statements of income as a percentage of
In November 1998, we completed a tender offer for the common net revenues and the percentage change in the total amount of
stock of Quarterdeck, obtaining 63% of the outstanding shares. each item for the periods indicated.
23. Period-to-Period
Percentage
Increase (Decrease)
Results of Operations 2000 1999
Year Ended March 31, Compared Compared
2000 1999 1998 to 1999 to 1998
Net revenues 100 % 100% 100 % 26% 11%
Cost of revenues 16 16 16 25 10
Gross margin 84 84 84 26 11
Operating expenses:
Research and development 15 17 17 7 11
Sales and marketing 41 48 49 7 10
General and administrative 6 6 7 18 (6 )
Amortization of goodwill 2 1 190
— *
Amortization of intangibles from acquisitions — — — * *
Acquired in-process research and development 1 5 ( 84)
— *
Restructuring and other expenses 1 1 77
— *
Litigation judgment 1
— — (100) *
Total operating expenses 66 79 73 5 20
Operating income 18 5 11 386 ( 49 )
Interest income 2 2 2 ( 1) 3
Interest expense — — — * *
Income, net of expense, from sale of
technologies and product lines 15 7 8 161 (9 )
Other income (expense), net — — — * *
Income before income taxes 35 14 21 209 ( 26 )
Provision for income taxes 12 6 5 164 22
Net income 23% 8% 16 % 239 ( 41 )
* Percentage change is not meaningful
0{ 23
AntiVirus, Norton SystemWorks and Norton 2000. We have dis-
Net Revenues Net revenues increased 26% from $593 million in
continued Norton 2000 and we no longer expect any future sales
fiscal 1999 to $746 million in fiscal 2000. Net revenues increased
from this product.
11% from $533 million in fiscal 1998 to $593 million in fiscal 1999.
The increase in fiscal 2000 as compared to fiscal 1999 and the
Net revenues in absolute dollars decreased in the Consumer and
increase in fiscal 1999 as compared to fiscal 1998 were largely due
Small Business segment in fiscal 1999 over fiscal 1998, due to
to increased sales to our corporate customers, introductions of
price competition for some of our products. However, we did
new products and increased sales outside of North America.
experience increased revenue from sales of Norton AntiVirus and
our successful introduction of suite products. These increases
Our Consumer and Small Business
Consumer and Small Business
were offset by reductions in net revenues for Norton Utilities. Dur-
segment represented approximately 43%, 44% and 57% of total net
ing fiscal 2000, 1999 and 1998, the financial impact of product price
revenues for fiscal 2000, 1999 and 1998, respectively. Although net
reductions for certain of our principal products was offset by the
revenues for this segment decreased as a percentage of net rev-
increase in the volume of products sold.
enues, net revenues in absolute dollars increased in fiscal 2000 as
Our Enterprise Solutions and
Enterprise Solutions and e-Support
compared to fiscal 1999. This increase was primarily due to out-
e-Support segments represented approximately 49%, 43% and 29%
breaks of significant viruses, new releases of both new and
of total net revenues for fiscal 2000, 1999 and 1998, respectively. Net
existing products and our customers preparing for the Year 2000
revenues increased in fiscal 2000 as compared to fiscal 1999 pri-
rollover. These factors contributed to growth in sales of Norton
marily due to strong demand for our e-Support products, Norton
24. Ghost and pcAnywhere, and increases due to virus outbreaks and Capitalized Software As indicated in the overview, during fiscal
Year 2000 preparation by enterprises. Net revenues increased in 2000 we acquired URLabs, L-3 Network Security’s operations and
fiscal 1999 as compared to fiscal 1998 primarily due to increased 20/20 Software. As a result, we recorded acquired capitalized soft-
sales of pcAnywhere and the new release of Norton Ghost. ware, or acquired product rights, of approximately $5 million, $3
million and $2 million, respectively. In fiscal 1999 we acquired
International Net revenues outside of North America repre- Binary’s operations, Intel’s anti-virus business and Quarterdeck.
sented 41%, 37% and 34% of total net revenues for fiscal 2000, 1999 After adjusting for the final purchase price allocations, we
and 1998, respectively. International net revenues increased by $89 recorded acquired product rights of approximately $17 million, $10
million in fiscal 2000 to $308 million, from $219 million in fiscal million and $8 million, respectively.
1999. This increase in net revenues was the result of increased
Amortization of acquired product rights, which are included in
sales in Europe and Japan. Net revenues from sales outside of
cost of revenues, totaled approximately $10 million, $6 million and
North America were $219 million and $179 million and represented
$1 million in fiscal 2000, 1999 and 1998, respectively. The decrease
37% and 34% of net revenues in fiscal 1999 and 1998, respectively.
in fiscal 2000 from fiscal 1999 is primarily due to a full year of
The increase was also largely due to stronger sales to Europe and
amortization on our fiscal 1999 acquisitions and the acquisition of
Japan. Weaknesses in currencies fixed to the euro during fiscal
URLabs in fiscal 2000. As the L-3 Network Security and 20/20 Soft-
2000, slightly offset by strengths in other currencies, negatively
ware acquisitions were not complete until late March 2000, there
impacted our international revenue growth by approximately $15
was no significant amortization in fiscal 2000 related to these
million. The impact in fiscal 1999 was less than $1 million.
acquisitions. The increase in fiscal 1999 from fiscal 1998 is prima-
rily due to additional amortization related to acquired product
Pro Forma Revenue Giving Effect to Divestitures For compara-
rights associated with our acquisition of Intel’s anti-virus business
tive purposes, the following table displays, on a pro forma basis,
and the acquisitions of Binary’s operations and Quarterdeck. The
our net revenues excluding the ACT! and Visual Café product lines:
amortization of our fiscal 2000 and 1999 acquisitions will occur
over the next three to five years.
Year ended March 31,
Research and Development Expenses We charge research and
2000 1999 1998
(In thousands)
development expenditures to operations as incurred. As a per-
Pro forma net revenues $ 704,875 $ 530,100 $ 469, 623
centage of net revenues, research and development expenses
were 15% for fiscal 2000 and remained flat at 17% for fiscal 1999
Product Returns We estimate and maintain reserves for prod-
and fiscal 1998. The decrease in research and development
uct returns. Product returns principally relate to stock balancing
expenses as a percentage of net revenues in fiscal 2000 from fis-
24 }0
and the replacement of obsolete products, which are offset by
cal 1999 largely resulted from overall growth in our net revenues.
orders of equal or greater value for the current versions of the prod-
Although research and development expenses decreased as a
ucts. The mix of products returned from the distributors/resellers as
percentage of net revenues, absolute dollars increased 7% to
compared to products sold to the distributors/resellers does not
approximately $108 million in fiscal 2000 from $102 million in
impact the gross margins, as our gross margins are consistent
fiscal 1999. The increase was a result of increases in software
across our various product families. Changes in the level of prod-
development costs paid to additional contractors, employee
uct returns and related product returns provision are generally
related expenses and additional costs for settlements related to
offset by a change in the level of gross revenue. As a result, the
disputes over technology rights in fiscal 2000, offset by a reduction
product returns provision did not have a material impact on
of research and development expenses resulting from our divesti-
reported net revenues in any period presented.
tures of the Visual Café and ACT! product lines.
Gross Margin Gross margin represents net revenues less cost
Research and development expenses increased 11% to approximately
of revenues. Cost of revenues consists primarily of manufacturing
$102 million in fiscal 1999 from $91 million in fiscal 1998. The increase
expenses, costs for producing manuals, packaging costs, royalties
was a result of increased spending on new product development.
paid to third parties under publishing contracts and amortization
and write-off of capitalized software. Gross margin was 84% of net
Sales and Marketing Expenses Sales and marketing expenses
revenues in fiscal 2000, 1999 and 1998.
were 41%, 48% and 49%, of net revenues for fiscal 2000, 1999 and
1998, respectively.