Premium Essay

Symantec Analysis

In:

Submitted By laurab
Words 4658
Pages 19
Table of Contents Executive Summary 1 Introduction 2 Financial Structure 2 Corporate Governance 5 Value Creation for Investors 6 Market Analysis 7 Future Outlook 8 Challenges and Opportunities 8 Conclusion 9 Bibliography 10 Appendices 12 Table A 12 Table B 12 Table C 13 Chart A 13 Financial Accounts 14

Executive Summary

This report provides an overview of the financial position of Symantec Corporation (SYMC), a global provider of security, storage, and systems management solutions.
The followings areas are considered: * The Debt and Equity position of the company are analysed. The various sources of financing used by the company are examined and evaluated by looking at the various debt instruments utilised by the company. * The possible value to be gained for investors is gauged by looking at the potential for market capitalisation. * This report also looks at the area of corporate governance, broadly within the Security Software Services industry. * Finally, the report assesses the future outlook in terms of growth, and the challenges and opportunities facing the company in the years ahead and its evolution stratagem.
Introduction

Symantec Corporation, currently number 391 on the Fortune 500 listing, operates within five segments: Consumer, Security and Compliance, Storage and Server Management, Services, and Other; hence Symantec is incontrovertibly diversified within the IT industry. The Company conducts business in three geographic regions: Americas, EMEA, and APJ. Symantec has remained financially viable throughout and since the burst of The Information Technology Bubble in 2000. (Galbraith & Hale, 2004) Great emphasis is placed on future-maturity; a necessity in this rapidly developing industry.
Financial Structure

A public limited company can finance itself through debt and/or equity. An

Similar Documents

Premium Essay

Symantec Corporation - Mergers and Acquisitions

...| Symantec Corporation | Mergers and Acquisitions | | Chris Miller | 11/9/2011 Dan SalmApplied Microeconomic Theory | | * Introduction * This research paper attempts to give a view of the traditional theory relating to Symantec Corporation and their acquisitions and mergers in an attempt to gain market control. Mergers and acquisitions correspond to change within a business looking to gain market power. No other experience is harder to attain for a company, represents more of a challenge, or as hectic as an acquisition or merger. It is vital that the management understands the methods required to perform acquisitions and mergers and that they have a clear understanding of how the procedure works. A corporate merger is the amalgamation of two company’s liabilities and assets developing into a single business element. Acquisitions occur when a large company, typically in a monopolistically competitive market, encompasses a smaller company giving the larger company a monopolistic advantage. A merger occurs when the amalgamation of liabilities and assets is depicted to be between companies of equal market standing. Within a company merger of estimated equals, there is typically an exchange of company stocks where one business distributes new shares to the shareholders of the other company at a specified percentage. * “Those who boast of their commonsense approach to management are very probably just following the ill-formed, half-forgotten, pseudo-scientific nostrum...

Words: 2655 - Pages: 11

Free Essay

Symantec

...Symantec Corporation and the Device-Centric Strategy BA 301 Final Term Paper 3/17/14 Table of Contents Executive Summary……………………………………………………………………………… 3 Position…………………………………………………………………………………………... 4 Sense…………………………………………………………………………………………....... 8 Uncover…………………………………………………………………………………………. 10 Solve…………………………………………………………………………………………..... 12 Build…………………………………………………………………………………………...... 14 Achieve…………………………………………………………………………………………. 17 Conclusion……………………………………………………………………………………… 19 Works Cited…………………………………………………………………………………….. 20 Appendix A…………………………………………………………………………………….. 22 Executive Summary This report focuses on Symantec Corporation and the problems and symptoms the company faces. Throughout the report one will gain knowledge about the company in general and learn about different problems the company faces. Financial standing of the company will be given and their competitors will be listed. Over the last few years the company has faced issues with leadership and their financials have stayed in the same place. As of 2012 Symantec acquired a new CEO who hopes to implement a new strategy into the business by focusing on protection tablets and smartphones rather than just computers. Even though the strategy is new Bennett has to come up with ideas on how to get the product out to their customers. One solution to this that will be discussed is using word of mouth through their philanthropic giving program. If Symantec can get the device-centric...

Words: 4430 - Pages: 18

Free Essay

Can Norton Antivirus Detect Worm’s Virus?

...Can Norton antivirus detect worm’s virus? Fadi M.S Al-suhimat Recent Internet worm outbreaks have infected hundreds of thousands of Internet servers and user machines within minutes, causing billions of dollars in losses for businesses, governments, and service providers. The high stakes involved have inspired numerous research projects, through which industry and academic institutions are working to strengthen local-area and wide-area networked systems’ abilities to fend off cyber-attacks. To that end, we propose to find new algorithm to detect internet worm viruses deploying fast, scalable security overlay networks to facilitate high-speed intrusion detection and alert-information exchange by depend on failure connection. Fortifying the Internet infrastructure with such a solution could benefit many security-sensitive applications, such as digital government, critical infrastructures, grid computing, e-commerce, and law enforcement. The broader impacts are far reaching in science, education, business, and homeland security. Currently, the internet is getting close to the persons’ life. They login internet to chat with others, download files or browse Web Pages. The internet is also playing an important role in the economy of country. Once the internet breaks down, it will cause an enormous economic loss. Worms is a serious security threat that may cause network congestion and internet break down. Anti-virus software scans files regularly for unusual changes in...

Words: 627 - Pages: 3

Premium Essay

All-in-One Computer Security Systems

...All-in-one Computer Security Systems CIS/105 Some of the different programs that I choose to use as all-in-one security that has total protection are Norton Internet Security and McAfee has an exclusive active protection technology that analyzes and blocks threats in milliseconds. McAfee can immediately detect and remove viruses, even root kits, adware, spyware, and blocks. McAfee has a two-way firewall which blocks outsiders from hacking into your PC. The program also contains other features including ways to better the health of your PC. Norton Internet Security plus 360 versions 4.0 warns you of dangerous downloads before you install and run them on your computer. Norton Internet Security has an extra layer of protection that detects viruses, spyware, Trojans and other threats. In addition Norton 360 4.0 identifies applications that are impacting the performance of your PC. Using an all-in-one computer security protects your CPU from hijackers, identity theft, spyware, and virus. In addition using a security all in one center generally protects the user computer on its own. This keeps your system and all your information safe from others. There are some security programs which protect as well such as Anti-Virus, Anti-Spyware, Anti-Spam, Anti-Root kit, Identity Protection, Link Scanner Active Surf, Link Scanner Search, Web Protection & Firewall, and Sophisticated threat detection. Using an all-in-one security system is effective because the programs are...

Words: 434 - Pages: 2

Premium Essay

Waqas

...Muhammad Waqas Asif MB-S11-1900095 19-B 24 March, 2011 This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills: a. He provides security storage and system management solution. b. The work never stopped to maintain efficiency. c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills: a. Coaching and monitoring the works. b. Networking outside the organization. c. Working in a team to solve the problem. 3. Conceptual skills: a. Using information to solve business problem. b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers...

Words: 354 - Pages: 2

Free Essay

Norton

...6/22/13 OrderConfirmationPage United States | Select Product Cart Billing & Payment Review Confirmation Help Your order is complete. You will receive a confirmation email at: lopezluck01@netzero.net Order Confirmation Number NP176206488 Order Date June 22, 2013 Billing & Payment Details Billing Inform ation Paym ent Method Jose L Lopez 23129 bay av Moreno Valley, CA 92553 United States Jose L Lopez VISA xxxxxxxxxxxx0659 Order Details Product Description Operating System Deliv ery Qty Price Norton™ Internet Security (1 Year Subscription for 1 PC) 366 Day(s) protection for 1 PC Expires on 23-Jun-2014 Product Key:JWK8VJ4M74R8687R9G26HVYX7 Serial number:KYHWMQHRHB6P Y our subscription will continue until June 23, 2014 Window s 7 / XP / XP Pro / Vista Renew al 1 $ 19.99 If you have a Norton Product already installed and are having trouble installing your new purchase, pick one of the follow ing help topics for assistance: My Norton product doesn't install after starting the Dow nload Manager Removing the Norton product installed on my computer already before I install my new purchase Tax (8%) $ 1.60 Total $ 21.59 Your Norton Account Your order information has been saved in your Norton Account. Your Norton Account allows you the freedom to: * Manage your products and account information anytime and anywhere * Access your Norton Product Key for easy reinstall * Take advantage of special offers for Norton...

Words: 448 - Pages: 2

Free Essay

Unit 1 Assignment 1

...works or why. These script kiddies have become such a major threat because there are large numbers of them that buy these very lethal malicious software packages and deploy them in mass numbers, wherever the internet touches or wherever technology can be found. Some of these packages have the ability to be custom tailored (called crimeware kits) towards its specific use such as the Zeus kit. This kit can be purchased at $700 and can also be found free in some circles. When these kits are widely distributed and reconfigured so many times in so many ways it creates seemingly infinite amount software which makes it extremely difficult for antivirus companies to keep up. Almost 90,000 different strains of the Zeus toolkit were discovered by Symantec during 2009. “Variants of the Zeus kit use spam to lure users to a website that uses social engineering or that exploits a Web browser vulnerability to install the bot on a victim’s computer. the bot then allows remote access to the computer and can be used to steal information such as the user’s online banking credentials. Each bot can then be used to send additional spam runs to compromise new users.” These kits have become such a lucrative business among cyber criminals that there are rival organizations that develop their software to interfere with...

Words: 344 - Pages: 2

Free Essay

Managing the Virus Hunters

...Case: Managing the Virus Hunters Introduction: Symantec Corp. is a security software company, best known for its Norton antivirus. Founded in 1982 by Gary Hendrix, it is the market leader in security software. Its headquarters are located in Mountain View, California, U.S. and the company operates worldwide. Symantec hires over 18,000 employees and customers all around the globe. Their Response Lab, in Santa Monica, California, is called the “dirtiest network at Symantec” and is the place where the virus-hunters hunt for new computer viruses. Discussion Questions: 1. Keeping Professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? The job of the virus hunters is, round-the-clock, a hectic and chaotic job. With professionals facing new challenges every day, which just keep on getting tougher and tougher, it could be a cause to demotivate the professionals, and demote innovation. Vincent Weafer is in a position, where he has to encourage his team to remain professional, and work with as much innovation as possible; and for this purpose, he will have to utilize his managerial skills. In a job where all the work rotates around technical elements, it is an essential requirement for Mr. Weafer to be knowledgeable in the technical aspects of the work his team does...

Words: 1592 - Pages: 7

Premium Essay

Marketing

...QA Concept Introducing LoadRunner  • Why should you automate performance testing?  • What are the LoadRunner components?  • Understanding LoadRunner Terminology  • What is the load testing process?  • Getting Familiar with HP Web Tours  • Application Requirements  The Power of LoadRunner  • Creating the Load Test  • Running the Load Test  • Monitoring the Load Test  • Analyzing Results  Building Scripts  • Introducing the Virtual User Generator (VuGen)  • How do I start recording user activities?  • Using VuGen’s Wizard mode  • How do I record a business process to create a script?  • How do I view the script?  Playing Back Your Script  • How do I set the run-time behavior?  • How do I watch my script running in real time?  • Where can I view information about the replay?  • How do I know if my test passed?  • How do I search or filter the results?  Solving Common Playback Problems  • Preparing HP Web tours for playback errors  • How do I work with unique server values?  Preparing a Script for Load Testing  • How do I measure business processes?  • How do I emulate multiple users?  • How do I verify Web page content?  • How can I produce debugging information?  • Did my test succeed?  Creating a Load Testing Scenario  • Introducing the LoadRunner Controller  • How do I start the Controller?  • The Controller window at a glance  • How do I modify the script details?  • How do I generate a heavy load?  • How do I emulate real load...

Words: 468 - Pages: 2

Free Essay

Preparing Business Scenario Analyses

...Preparing Business Scenario Analyses The following general guidelines may be used in preparing for an oral or written business scenario analysis and presentation. There may be several feasible courses of action regarding the solution to any case. It is more important to concern yourself with the process of problem definition and isolation, analysis, and evaluation of alternatives, and the choice of one or more recommendations, rather than trying to find a single answer. Very often, the right answer is the one that you can propose, explain, defend, and make work. • The Process of Analyzing a Case 1. Read and study the scenario thoroughly and efficiently. Read the scenario once for familiarity, noting issues that come to the forefront. Read the scenario again. Determine all the facts, making notes about symptoms of problems, root problems, unresolved issues, and roles of key players. Watch for issues beneath the surface. 2. Isolate the problem(s). Get a feel for the overall environment by putting yourself in the position of one of the key players. Seek out the pertinent issues and problems. 3. Analyze and evaluate alternatives. a. Once the problems and issues are isolated, work at gaining a better understanding of causes. In what area of the unit do the problems exist? Why? What caused them? Examine and evaluate the strengths and weaknesses of the unit’s processes (e.g., planning, communication), human behaviors, and/or exhibits (e.g., financial statements,...

Words: 505 - Pages: 3

Free Essay

Pest Analysis

...PEST Analysis One way of planning your business is to undertake a PEST analysis.1 PEST analysis involves looking at the Political, Economic, Socio-cultural and Technological factors that could affect your business. Every business needs to consider a range of external forces in order to take decisions. For many people imagination is very limited and is coloured solely by their own experience and personal beliefs. This can lead to wish fulfilment or a refusal to see reality or recognise the critical changes that are happening in the world around them. It can also lead to grabbing short-term solutions that, if they do not exacerbate problems, certainly ignore the longer term. In the business world pressure is often applied to take decisions quickly, acting on judgement and instinct rather than careful analysis. There are many driving forces in the external environment that might impact on your business. These can be categorised as: • Social; • Technological; • Economic; • Environmental; and • Political. Social forces Social forces include, for example, changing demography and education, etc. The population in Western Europe is relatively static, but the age bands are changing. The number of older people, for example, is growing rapidly. Technological forces Technological forces are changing dramatically quickly. What effects will this have on your production, marketing and distribution plans? Depending on your market, technology might either raise or lower entry barriers...

Words: 371 - Pages: 2

Free Essay

Anaylsis for Emc

...Fall 2015: Industry Analysis in Emerging Markets Your role in this analysis is to work with your team and to look at emerging technologies. From autonomous drones to emergent AI to 3D printers, you are going to research and get a better understanding of our fast-approaching technological future. Scientific American compiled the Top 10 List of Emerging Technologies for 2015. You can start here, but you are not limited to these technologies. You must choose an emerging industry, and will analyze the history of this technology and its industry, the trajectories of the technology, the key competitors, and the trends in the market. The end goal is to develop a comprehensive understanding of the industry, the competitive landscape, emerging trends to watch in the future, and an overall assessment as to the attractiveness of this industry. Your final deliverable for this project will be an in-class presentation, due April 26th. 1) What SIC/NAICS code does your industry fall under? 2) Describe your industry- a. Provide a brief history of your industry. (You may use a timeline in a separate appendix) b.  List and describe the characteristics of the products your industry offers in the marketplace. c. Who are the key competitors in the industry? d. What are the main differences between the products offered by key competitors? e. What strengths & weaknesses (capabilities, complementary resources, related intellectual property, etc.)...

Words: 430 - Pages: 2

Premium Essay

Service Marketing

...http://www.mysensex.comPESTLE « Pestle Summary: India | Main | Pestle summary: USA » 03/28/2009 Pestle Summary China Well, I guess this is where I get controversial, at least a bit. There are others who have predicted that China was in for a tough ride over the past few years, but they mostly got ignored, or were proven wrong by events. And, to a certain extent, if you cry doom long enough you'll always get proved right, given the laws of entropy. So this is a bit 'faux' controversy... This is the introductory note taking exercise for a Pestle analysis of China, drawn on conventional internet sources such as Wikipedia, the CIA World Factbook and Nationmaster. China is the most populous country in the world, with 1.34 billion people. It has the third largest GDP, with $4.84 trillion, behind Japan and the U.S. Like India, the currency and conditions make it useful to look at some statistics using Purchasing Power Parity, which bumps up China's GDP to $7.8 trillion, which would move it ahead of Japan. It also is the second in the world in annual military spending, although that needs a bit of context, as the world's number two spends about 15% of what the world number one (USA) spends. But with PPP, that looks like more money, and insofar as it is used to pay salaries, rather than buy Israeli rocket parts, PPP is valid in this context too. China is badly governed by the Communist Party, and in my five-year Pestle forecast I will be making the case that misgovernance will...

Words: 1059 - Pages: 5

Free Essay

Bsa/375

...McCauley, COO * Hugh McCauley, COO of Riordan has sent a service request to us. The service request SR-rm-022 stats that Riordan wants to make improvement on their current HR tools. They are currently using a variety of HR tools and would want’s us create one integrated application. To do this we will have to do a system analysis of their current system. An analysis will be made with recommendations to upgrade and consolidate their system. * The service request is basically a project statement. This is a document from the customer who clearly states what the project should deliver and outline the high-level work required for completing this project * (SR-rm-022). Riordan Manufacturing has 550 employees worldwide and has projected earnings of $46 million. It is a fortune 1000 enterprise with $1 billion in excess revenues. It is wholly owned by Riordon Industries and based in San Jose , California. * . We will use the joint application design (JAD) for our system analysis, this should help keep the analysis efforts to a minimum. Fact finding is at the core of system analysis. Interviewing of individuals who understand the current system and any known issues, including future activities needed. To do this observation of how data is handled and how this is used for their jobs. Through study of the documents, policies, and procedures in reference to the system. * Interviewing and gathering...

Words: 397 - Pages: 2

Free Essay

Hr Stratgey

...29th, 2013 Angela Lucente Planning For People Job analysis is an important process, any organization used to use it in order to collect information and data about required skills, level of education, work environment, responsibilities, and the duties to create a job description, recruiting plans, and performance development planning (Susan M. Heatfield, 2013). Once job analyses are updated as described, a summary of the results is normally prepared in writing in the form of a job description (Wayne F. Cascio, 2010). According to my reading chapter five about job analysis process. There are some topics I felt comfortable with, such as alternative perspectives on jobs. This topic add to my knowledge many information and explained how jobs are important to organizations, what is the highly unusual jobs that some organizations required it, and distinguish job analysis form job design (Wayne F. Cascio, 2010). On the other hand, I struggled with topic job requirements because there are many methods created in order to study job requirements and none of them alone is sufficient. Thus, it is essential to integrate this methods to obtain the results of the tasks and duties of a job (Wayne F. Cascio, 2010). It is not that easy to implement the methods of job analysis, such as job performance, observation, interview, critical incidents, and structured questionnaire, those are the most five common methods of job analysis and each one of those takes time and effort to achieve desirable...

Words: 321 - Pages: 2