Premium Essay

Symantec

In: Computers and Technology

Submitted By asmith12
Words 513
Pages 3
Profile:
Symantec Corp (SYMC.O)
Related Topics: STOCKSSTOCK SCREENERTECHNOLOGYSOFTWARE
Advertisement
Advertisement

Advertisement
Advertisement
Advertisement

OVERVIEW NEWS KEY DEVELOPMENTS PEOPLE CHARTS FINANCIALS ANALYSTS RESEARCH PULSE
SYMC.O on Nasdaq

23.35USD
27 Mar 2015
Change (% chg)

$0.08 (+0.32%)
Prev Close
$23.28
Open
$23.39
Day's High
$23.42
Day's Low
$23.10
Volume
4,053,739
Avg. Vol
3,928,393
52-wk High
$27.32
52-wk Low
$18.75

SEARCH STOCKS
Submit
FULL DESCRIPTION
Symantec Corporation, incorporated on April 19, 1988, is a security, backup and availability solutions. The Company’s products and services protect people and information in any digital environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. The Company’s software and services protect against advanced threats independent of the device and environment in which information is used or stored. The Company operates in three segments: User Productivity & Protection, Information Security, and Information Management.
User Productivity & Protection
The User Productivity & Protection segment focuses on making customers to be protected at home and at work. These products include its Norton solutions, endpoint security and management, encryption, and mobile offerings. Its Norton products help customers protect against increasingly complex threats and address the need for identity protection, while also managing the increase in mobile and digital data, such as personal financial records, photos, music, and videos. The endpoint security and management offerings support the evolving endpoint, providing advanced threat protection while helping reduce cost and complexity. The mobile solutions help organizations secure corporate data while gaining visibility into and control of all mobile platforms and enforcing

Similar Documents

Free Essay

Symantec

...Symantec Corporation and the Device-Centric Strategy BA 301 Final Term Paper 3/17/14 Table of Contents Executive Summary……………………………………………………………………………… 3 Position…………………………………………………………………………………………... 4 Sense…………………………………………………………………………………………....... 8 Uncover…………………………………………………………………………………………. 10 Solve…………………………………………………………………………………………..... 12 Build…………………………………………………………………………………………...... 14 Achieve…………………………………………………………………………………………. 17 Conclusion……………………………………………………………………………………… 19 Works Cited…………………………………………………………………………………….. 20 Appendix A…………………………………………………………………………………….. 22 Executive Summary This report focuses on Symantec Corporation and the problems and symptoms the company faces. Throughout the report one will gain knowledge about the company in general and learn about different problems the company faces. Financial standing of the company will be given and their competitors will be listed. Over the last few years the company has faced issues with leadership and their financials have stayed in the same place. As of 2012 Symantec acquired a new CEO who hopes to implement a new strategy into the business by focusing on protection tablets and smartphones rather than just computers. Even though the strategy is new Bennett has to come up with ideas on how to get the product out to their customers. One solution to this that will be discussed is using word of mouth through their philanthropic giving program. If Symantec can get the device-centric...

Words: 4430 - Pages: 18

Premium Essay

Symantec Corporation - Mergers and Acquisitions

...| Symantec Corporation | Mergers and Acquisitions | | Chris Miller | 11/9/2011 Dan SalmApplied Microeconomic Theory | | * Introduction * This research paper attempts to give a view of the traditional theory relating to Symantec Corporation and their acquisitions and mergers in an attempt to gain market control. Mergers and acquisitions correspond to change within a business looking to gain market power. No other experience is harder to attain for a company, represents more of a challenge, or as hectic as an acquisition or merger. It is vital that the management understands the methods required to perform acquisitions and mergers and that they have a clear understanding of how the procedure works. A corporate merger is the amalgamation of two company’s liabilities and assets developing into a single business element. Acquisitions occur when a large company, typically in a monopolistically competitive market, encompasses a smaller company giving the larger company a monopolistic advantage. A merger occurs when the amalgamation of liabilities and assets is depicted to be between companies of equal market standing. Within a company merger of estimated equals, there is typically an exchange of company stocks where one business distributes new shares to the shareholders of the other company at a specified percentage. * “Those who boast of their commonsense approach to management are very probably just following the ill-formed, half-forgotten, pseudo-scientific nostrum...

Words: 2655 - Pages: 11

Premium Essay

All-in-One Computer Security Systems

...All-in-one Computer Security Systems CIS/105 Some of the different programs that I choose to use as all-in-one security that has total protection are Norton Internet Security and McAfee has an exclusive active protection technology that analyzes and blocks threats in milliseconds. McAfee can immediately detect and remove viruses, even root kits, adware, spyware, and blocks. McAfee has a two-way firewall which blocks outsiders from hacking into your PC. The program also contains other features including ways to better the health of your PC. Norton Internet Security plus 360 versions 4.0 warns you of dangerous downloads before you install and run them on your computer. Norton Internet Security has an extra layer of protection that detects viruses, spyware, Trojans and other threats. In addition Norton 360 4.0 identifies applications that are impacting the performance of your PC. Using an all-in-one computer security protects your CPU from hijackers, identity theft, spyware, and virus. In addition using a security all in one center generally protects the user computer on its own. This keeps your system and all your information safe from others. There are some security programs which protect as well such as Anti-Virus, Anti-Spyware, Anti-Spam, Anti-Root kit, Identity Protection, Link Scanner Active Surf, Link Scanner Search, Web Protection & Firewall, and Sophisticated threat detection. Using an all-in-one security system is effective because the programs are...

Words: 434 - Pages: 2

Premium Essay

Waqas

...Muhammad Waqas Asif MB-S11-1900095 19-B 24 March, 2011 This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills: a. He provides security storage and system management solution. b. The work never stopped to maintain efficiency. c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills: a. Coaching and monitoring the works. b. Networking outside the organization. c. Working in a team to solve the problem. 3. Conceptual skills: a. Using information to solve business problem. b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers...

Words: 354 - Pages: 2

Free Essay

Norton

...6/22/13 OrderConfirmationPage United States | Select Product Cart Billing & Payment Review Confirmation Help Your order is complete. You will receive a confirmation email at: lopezluck01@netzero.net Order Confirmation Number NP176206488 Order Date June 22, 2013 Billing & Payment Details Billing Inform ation Paym ent Method Jose L Lopez 23129 bay av Moreno Valley, CA 92553 United States Jose L Lopez VISA xxxxxxxxxxxx0659 Order Details Product Description Operating System Deliv ery Qty Price Norton™ Internet Security (1 Year Subscription for 1 PC) 366 Day(s) protection for 1 PC Expires on 23-Jun-2014 Product Key:JWK8VJ4M74R8687R9G26HVYX7 Serial number:KYHWMQHRHB6P Y our subscription will continue until June 23, 2014 Window s 7 / XP / XP Pro / Vista Renew al 1 $ 19.99 If you have a Norton Product already installed and are having trouble installing your new purchase, pick one of the follow ing help topics for assistance: My Norton product doesn't install after starting the Dow nload Manager Removing the Norton product installed on my computer already before I install my new purchase Tax (8%) $ 1.60 Total $ 21.59 Your Norton Account Your order information has been saved in your Norton Account. Your Norton Account allows you the freedom to: * Manage your products and account information anytime and anywhere * Access your Norton Product Key for easy reinstall * Take advantage of special offers for Norton...

Words: 448 - Pages: 2

Free Essay

Managing the Virus Hunters

...Case: Managing the Virus Hunters Introduction: Symantec Corp. is a security software company, best known for its Norton antivirus. Founded in 1982 by Gary Hendrix, it is the market leader in security software. Its headquarters are located in Mountain View, California, U.S. and the company operates worldwide. Symantec hires over 18,000 employees and customers all around the globe. Their Response Lab, in Santa Monica, California, is called the “dirtiest network at Symantec” and is the place where the virus-hunters hunt for new computer viruses. Discussion Questions: 1. Keeping Professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? The job of the virus hunters is, round-the-clock, a hectic and chaotic job. With professionals facing new challenges every day, which just keep on getting tougher and tougher, it could be a cause to demotivate the professionals, and demote innovation. Vincent Weafer is in a position, where he has to encourage his team to remain professional, and work with as much innovation as possible; and for this purpose, he will have to utilize his managerial skills. In a job where all the work rotates around technical elements, it is an essential requirement for Mr. Weafer to be knowledgeable in the technical aspects of the work his team does...

Words: 1592 - Pages: 7

Free Essay

Unit 1 Assignment 1

...works or why. These script kiddies have become such a major threat because there are large numbers of them that buy these very lethal malicious software packages and deploy them in mass numbers, wherever the internet touches or wherever technology can be found. Some of these packages have the ability to be custom tailored (called crimeware kits) towards its specific use such as the Zeus kit. This kit can be purchased at $700 and can also be found free in some circles. When these kits are widely distributed and reconfigured so many times in so many ways it creates seemingly infinite amount software which makes it extremely difficult for antivirus companies to keep up. Almost 90,000 different strains of the Zeus toolkit were discovered by Symantec during 2009. “Variants of the Zeus kit use spam to lure users to a website that uses social engineering or that exploits a Web browser vulnerability to install the bot on a victim’s computer. the bot then allows remote access to the computer and can be used to steal information such as the user’s online banking credentials. Each bot can then be used to send additional spam runs to compromise new users.” These kits have become such a lucrative business among cyber criminals that there are rival organizations that develop their software to interfere with...

Words: 344 - Pages: 2

Free Essay

Can Norton Antivirus Detect Worm’s Virus?

...Can Norton antivirus detect worm’s virus? Fadi M.S Al-suhimat Recent Internet worm outbreaks have infected hundreds of thousands of Internet servers and user machines within minutes, causing billions of dollars in losses for businesses, governments, and service providers. The high stakes involved have inspired numerous research projects, through which industry and academic institutions are working to strengthen local-area and wide-area networked systems’ abilities to fend off cyber-attacks. To that end, we propose to find new algorithm to detect internet worm viruses deploying fast, scalable security overlay networks to facilitate high-speed intrusion detection and alert-information exchange by depend on failure connection. Fortifying the Internet infrastructure with such a solution could benefit many security-sensitive applications, such as digital government, critical infrastructures, grid computing, e-commerce, and law enforcement. The broader impacts are far reaching in science, education, business, and homeland security. Currently, the internet is getting close to the persons’ life. They login internet to chat with others, download files or browse Web Pages. The internet is also playing an important role in the economy of country. Once the internet breaks down, it will cause an enormous economic loss. Worms is a serious security threat that may cause network congestion and internet break down. Anti-virus software scans files regularly for unusual changes in...

Words: 627 - Pages: 3

Free Essay

Symantec Paper

...Since this is a small business, all of the decisions on technology software, hardware and networking decisions are made by the company president. Symantec Backup Exec Symantec Backup Exec provides continuous backup and recovery protection from the server to the desktop. The software protects the company’s data while providing the opportunity to reduce storage costs and improve backup performance through integrated deduplication and archiving technology. (Symantec 3, 2010) Symantec Backup Exec was chosen due to Symantec’s reputation for producing quality products along with the outstanding technical support that the company provides. The Backup Exec software is one of the leading software packages available and includes some of the best features when compared to other backup and recovery software options. About Symantec “Symantec was founded in 1982 by visionary computer scientists. The company has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides security, storage and systems management solutions to help their customers – from consumers and small businesses to the largest global organizations – secure and manage their information-driven world against more risks at more points, more completely and efficiently than any other company.” (Symantec 2, 2011) Specifications * Market leading data protection for physical and virtual server environments from desktop to servers * Integrated...

Words: 1333 - Pages: 6

Premium Essay

Symantec Analysis

...10 Appendices 12 Table A 12 Table B 12 Table C 13 Chart A 13 Financial Accounts 14 Executive Summary This report provides an overview of the financial position of Symantec Corporation (SYMC), a global provider of security, storage, and systems management solutions. The followings areas are considered: * The Debt and Equity position of the company are analysed. The various sources of financing used by the company are examined and evaluated by looking at the various debt instruments utilised by the company. * The possible value to be gained for investors is gauged by looking at the potential for market capitalisation. * This report also looks at the area of corporate governance, broadly within the Security Software Services industry. * Finally, the report assesses the future outlook in terms of growth, and the challenges and opportunities facing the company in the years ahead and its evolution stratagem. Introduction Symantec Corporation, currently number 391 on the Fortune 500 listing, operates within five segments: Consumer, Security and Compliance, Storage and Server Management, Services, and Other; hence Symantec is incontrovertibly diversified within the IT industry. The Company conducts business in three geographic regions: Americas, EMEA, and APJ. Symantec has remained financially viable throughout and since the burst of The Information Technology Bubble in 2000. (Galbraith & Hale, 2004) Great emphasis is placed on future-maturity;...

Words: 4658 - Pages: 19

Free Essay

Security Threats

...In 2011 Symantec listed the most significant attacks of 2010; these were targeted attacks, social networking, attack kits, mobile threats, zero-day and rootkits. These targeted attacks are exactly what it says, they target what they are designed to hit, whether it is a company (small or large), and individual or a specific machine. [ (Symantec, 2011) ] Symantec recorded over 3 billion malware attacks but yet Stuxnet stands out more than the others. However, lets us not forget Hydraq. Each one was highly sophisticated and was tailored for specific targets. Although Hydraq was old-fashioned, what made it stand out was what and whom it stole. Of course targeted attacks didn’t begin until 2010, and it won’t end. Once inside, the attack attempts to avoid detection until its objective is met. [ (Symantec, 2011) ] In 2010, the volume and sophistication of malicious activity increased, the Stuxnet worm became the first with the ability to affect physical devices while attempting exploits for an unprecedented number of zero-day vulnerabilities simultaneously. Although unlikely to become commonplace, Stuxnet does show what a skilled group of organized attackers can accomplish. [ (Symantec, 2011) ] Although providing a look at the security threats that are out there on the internet that us as users face on a daily basis, unless we know what we are dealing with, there is no way to defend against it. This is why it is important that we keep our software updated to help prevent attacks...

Words: 340 - Pages: 2

Premium Essay

Jimmer Paper

...will share with you our currently business model, and a vendor we have chosen to outsource our computer security to. My small business is a pizza shop where all my financial and product data are stored on a ERM system. Our system is largely monitored by myself, and the two managers I have employed at the business. I have chosen to outsource our computer security has it will cost less than to maintain internally. My managers, nor myself have the revenue adequate enough to gain the knowledge or manage the ERM system internally. For this reason I have chose Symantec Partners to oursource our security towards. A second reason, and one for hiring Symantec Partners, is that experience (in addition to low-costs) is essential to mainitain a secure internal information system. With experience, Symantec can provide us what we cannot ourselves, consistant base of security, and knowledge of solutions in the case of a cyber attack. Symantec Partners offers a flexible business model that appeals to each business individually, and offers solutions unique to each industry, and in my case, the dining business. 2. My first argument against oursource computer security is the lack of transperncy between myself, the management, and the entity managing the security. I may not want to control it myself, but being able to visualize its capabilities is essential, and outsourcing the security to a third-party may breach that interest of mine. If there is an individual who has experience with security...

Words: 624 - Pages: 3

Free Essay

Dfdgfg

...Build Your Report | Symantec http://www.symantec.com/threatreport/print.jsp?id=highlights... BOOKMARK THIS PAGE | PRINT THIS PAGE | CLOSE Internet Security Threat Report Volume 17 Custom Report SHARE THIS PAGE Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010. Web based attacks increased by 36% with over 4,500 new attacks each day. 403 million new variants of malware were created in 2011, a 41% increase of 2010. SPAM volumes dropped by 34% in 2011 over rates in 2010. 39% of malware attacks via email used a link to a web page. Mobile vulnerabilities continued to rise, with 315 discovered in 2011. Only 8 zero-day vulnerabilities were discovered in 2011 compared with 14 in 2010. 50% of targeted attacks were aimed at companies with less than 2500 employees. Overall the number of vulnerabilities discovered in 2011 dropped 20%. Only 42% of targeted attacks are aimed at CEOs, Senior Managers and Knowledge Workers. In 2011 232 million identities were exposed. An average of 82 targeted attacks take place each day. Mobile threats are collecting data, tracking users and sending premium text messages. You are more likely to be infected by malware placed on a legitimate web site than one created by a hacker. Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and...

Words: 44470 - Pages: 178

Premium Essay

Stuxnet Worm

...to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET Spreads (New York Times, 2011). 7 Figure 6: Infection By Country (Symantec, 2010). 9 Figure 7: WinCC Software (Symantec, 2010). 11 Introduction Discovered in June of 2010, a computer worm called Stuxnet, was designed to attack Power programmable-logic controllers or PLC’s used in control industrial controls such as used in nuclear power plants that operate a specific type of on...

Words: 2136 - Pages: 9

Free Essay

Managning Virus

...CASE STUDY #1: MANAGING THE VIRUS HUNTERS I.    Time Context           The period in this case study is from 1999 to 2003. Vincent Weafer has been the leader of Symantec Corporation's virus hunting team since 1999. The Launch of Blaster-B worm took place in 2003.   II.    Viewpoint           This case study is about the computer virus hunters at Symantec Corporation. It focuses on the nature of their job and the managerial challenges faced by Vincent Weafer.   III.    Relevant Facts       A.    Symantec Corporation.              Symantec is a global software company. Its mission is to  provide complete online security to its customers and safety  to the cyber world. Symantec deals with the production of antivirus software, which provides protection against harmful  contents for computers. Symantec is a long-term survivor since 1982.       B.    Vincent Weafer                   Vincent Weafer has an extensive range of experience, gained from more than 20 years in the information technology industry, ranging from software development, systems engineering, to security research positions. For the past 10 years, he has been the operational leader of the Symantec Global Security Response team, where his mission is to advance the research into new computer security threats and provide security content solutions such as anti-virus, antispam, intrusion and vulnerability  response, real-time alerting, content solutions, research, and analysis.                 Weafer...

Words: 285 - Pages: 2