Free Essay

Symantec

In:

Submitted By
Words 4430
Pages 18
Symantec Corporation and the Device-Centric Strategy

BA 301 Final Term Paper
3/17/14
Table of Contents

Executive Summary……………………………………………………………………………… 3
Position…………………………………………………………………………………………... 4
Sense…………………………………………………………………………………………....... 8
Uncover…………………………………………………………………………………………. 10
Solve…………………………………………………………………………………………..... 12
Build…………………………………………………………………………………………...... 14
Achieve…………………………………………………………………………………………. 17
Conclusion……………………………………………………………………………………… 19
Works Cited…………………………………………………………………………………….. 20
Appendix A…………………………………………………………………………………….. 22

Executive Summary

This report focuses on Symantec Corporation and the problems and symptoms the company faces. Throughout the report one will gain knowledge about the company in general and learn about different problems the company faces. Financial standing of the company will be given and their competitors will be listed. Over the last few years the company has faced issues with leadership and their financials have stayed in the same place. As of 2012 Symantec acquired a new CEO who hopes to implement a new strategy into the business by focusing on protection tablets and smartphones rather than just computers. Even though the strategy is new Bennett has to come up with ideas on how to get the product out to their customers. One solution to this that will be discussed is using word of mouth through their philanthropic giving program. If Symantec can get the device-centric strategy to take flight than it could be their answer to raising their revenue and stock prices in the near future.

Position
Symantec is an American based company that specializes in computer security and cloud storage solutions. Its headquarters are in Mountain View, California. Gary Hendrix founded the company in 1982. Hendrix’s original focus for the company was artificial intelligence-related projects. In 1984 a small company acquired Symantec where they decided to stick with the Symantec name. The first product put out was, Q&A for the IBM-compatible PC, it was a database program that used natural language query. They are now known for their Norton Anti-Virus protection software for computers and larger networks. (Funding Universe, 2005) Symantec’s mission statement, out of their handbook states:
“Symantec Enterprise Support Services is committed to responding quickly to your inquiries. We will help you ensure that your IT environments – including infrastructure, information, and interactions – remain secure, available, and compliant at all times, maximizing the business value of your Symantec solutions. Our primary focus is to enable you to leverage the operational functionality of your Symantec licensed software by providing tools, resources, and technical assistance” (Symantec Corp., 2009, pp. , 4).

Not only are they committed to their customers; they are also committed to their employees and the community. When looking at their website they have pages dedicated to these topics. They want to make a difference and they want their staff to feel like they are making a difference in the industry and community. “Smart people who collaborate and innovate make great things happen. Whatever your role, your ideas are encouraged and rewarded. Together we give people the confidence to work and play in a digital world” (Symantec Corp., 2014, pp. , Careers). To touch base on these topics they state that their corporate responsibility is to “Conduct our business with a commitment to ethical operation, sound environmental management, and positive societal impact. Our corporate responsibility platform is organized into three pillars: Our People, Your Information, and The World” (Symantec Corp., 2014, pp. , Corporate Responsibility). Where they talk about their people they believe to achieve all of the company goals they need to have the right team that reflects their mission and values. They want their employees to be creative and innovative and to do that they need to supply them with the right type of tools, resources, and support from the company. They are working on expanding their international employee base to better understand their markets all over the world and to enhance everyone’s user experience (Symantec Corp., 2014, pp. , Our People).
To ensure everyone’s user experience is enhanced they want to make sure people’s information is safe and secure and that as the world becomes more interconnected, people keep the sense of security, and that their confidential information is going to stay confidential. Their promise is “to enable confidence in a connected world—is becoming more urgent every day. The world is increasingly interconnected, and much of the vast amount of data flowing around the globe is personal and confidential information” (Symantec Corp., 2014, pp. , Your Information). These responsibilities are all tied into the global spectrum. Where they talk about their impact on the world and what they would like it to be, their main focus seems to be on making sure things are done in an environmentally friendly way. They address the topic of “climate change, and our partnerships with global non-profit organizations as well as the local communities where we work, live, and play” (Symantec Corp., 2014, pp. , The World). Symantec may be committed to all these things but when you go onto Yahoo Finance and look at their stock over the last few months their stock price has hovered right around $23 per share, with the highest price being $24.62 and the lowest price being $21.49. (Those two prices were back on October 23 and 24, respectively.) Today’s current stock price is $23.62. There revenues are $6.88 billion with a debt level of $2.09 billion.
As of right now Symantec’s biggest competitor is Microsoft Corporation, along with McAfee, Inc., Trend Micro Incorporated, AVG, Avira, BitDefender, BullGuard, Comodo, F-Secure, Kaspersky, Panda Security, and Sophos. Most people have heard of Microsoft and McAfee, Inc., but none of the others. Microsoft though, if you were to ask anybody on the street what Microsoft was known for, they would most likely say computers and windows, for example. If you asked someone what McAfee was known for they would most likely say virus protection. So even though Microsoft is listed as one of the major competitors on Yahoo Finance people would generally think of McAfee before they thought of Microsoft when they think of Symantec’s competitors.
Nobody can say how much of a competitor McAfee is though because they are a privately held company along with, BitDefender, BullGuard, Comodo, Frisk, Kaspersky, and Sophos, therefore their financials are not given. Microsoft on the other hand has revenue of $80.37 billion and a debt level of $16.52 billion. One thing to keep in mind though is that Microsoft provides a lot more products and services than Symantec does. Employees are one of the most important primary stakeholders to Symantec. The company provides their families a way to live by providing a salary. Symantec employs about 21,500 people around the world and are looking to expand their international employee base, like mentioned before. If this is the case their employees as stakeholders become even more reliant on the company’s profit margin because the more people they hire the more money that has to be divided between.
Shareholders also rely on the company succeeding. Last year they set up a program that allowed them to pay out their first dividend in June. Overtime the strategy is to “return approximately 50% of free cash flow to shareholders through a combination of dividends and share repurchases while still enabling the company to invest in its future” (Symantec Corp., 2013, pp. , Press Release). The good thing about being a Symantec shareholder right now is it has strong buyback activity. According to an article in The Street, Symantec “Is the #69 broker analyst pick among those stocks screened by The Online Investor for strong stock buyback activity. To make that list, a stock must have repurchased at least 5% of its outstanding shares over the trailing twelve month period” (TheOnlineInvestor.com, 2014). They also say that “Symantec Corp. is a company with strong buyback activity that is also considered a compelling buy by analysts; a bullish investor could take this to mean that sharp analyst minds came to the same bullish conclusion as the company itself that the stock is a good value, and therefore the stock should do well in the future” (TheOnlineInvestor.com, 2014). This leads us to think about how certain activities outside of the company affect our performance. TheOnlineInvestor.com says that Symantec stock has good future value.
Customers are important to any company, without them the company wouldn’t survive. Customers also have many different substitutes to choose from so Symantec’s goal is to always be a customer’s first choice. To help Symantec promote their product they need partners that help get their image out. In 2006 Adobe agreed to promote Symantec’s Norton Internet Security to people who download their free Adobe Reader. Symantec also has deals with several PC makers like Cisco Systems (Evers, 2006).
There are also secondary stakeholders to think about, which is mainly the surrounding community of Symantec locations. Symantec provides many jobs that are good for the people who live in the community. If Symantec wants to expand to create more jobs could be bad or good depending on how a person look at it. If they do expand it could be good because it creates more jobs but also the company could produce more pollution in the surrounding area because it could mean that many more people driving to and from work.
Sense
Symantec’s mission and vision pushes them to move with the innovative population as it moves forward and they want to be the company that everyone uses for anti-virus software, storage, and software management systems. We know that their revenues and debt levels are doing fairly well and that their largest competitors are Microsoft and McAfee, Inc. Investors have also told us that Symantec’s stock is a good buy and has good future potential.
Their revenues and debt levels may be doing fairly well but one problem that the company faces is the lack of growth. As mentioned before their stock price has hovered over the last couple of years and really hasn’t grown. There is a fear that the company isn’t keeping up with the rest of the competition and customers are choosing substitutes and not Symantec’s products. One reason can always be that Norton is overpriced compared to their competitors. Below is a graph of some of the prices of 1-year anti-virus software:

From the list of competitors that were given earlier there are some missing from the chart. The reason for that is because they didn’t offer the same product as the companies in the chart so I left them out. Symantec’s Norton product is right in the middle of the group, where McAfee is one of the lowest priced software’s. This could potentially be a problem, especially if the two programs offer the same features. A customer in the industry will choose the lowest price every time if reviews and features are the same. If this is the case than it doesn’t help Symantec’s stock price, especially because their Norton Anit-Virus software is 36.7% of the total stock price. Below is a breakdown of percentages of Symantec’s stock price according to Trefis data that has been collected:

(Trefis Team, 2014)
To give a little background Trefis is “an online financial community structured around trends, forecasts and insights related to some of the most popular stocks in the US. Whereas most finance sites simply give you the facts about where a stock has been and what a company has done in the past, Trefis focuses entirely on the future” (Trefis, 2014). In the diagram the percentages are based of the Trefis price which is a estimate of what they believe the intrinsic price of the company’s stock is. In Appendix A there are more graphs provided where the same division are broken down by revenue, adjusted EBITDA, and free cash flow.
Another problem to look at is that “Globally, PC shipments have been declining at a double-digit pace as consumer buying shifts towards smartphones and tablets due to their flexibility in addressing customers’ increasingly variable demands” (Trefis Team, 2014). If this is the case than Symantec may want to think about re-working their software to aim it towards tablets and smartphones. Shifting their whole platform though takes a lot of time and money with research and development. They have to make sure if they go into the new market it will be beneficial. They already have software that works with computers, if they come up with new software they have to think about the potential danger of it failing and what kind of name it would give Symantec. Also they will want to be a front-runner in the new market and not a follower. If other competitors have released new software that is successful than they have to make sure theirs is just as good and better. Symantec definitely needs to look into the tablet and smartphone industry to see what they can do and where they can fit in. If shipments of PCs are going down that quickly they will need to rethink their strategy to keep up with the evolving industry.
Uncover
One symptom can be the redesign of their protection software. Symantec wants to move anti-virus software into the phone and tablet industry rather than keeping it solely in the computer industry. This could eventually cause some problems if people are unwilling to buy into the idea or if the software doesn’t end up working. According to the same SWOT analysis piracy is becoming more prevalent in today’s software industry. “According to industry estimates, software piracy causes more than $2.9 billion of competitive disadvantage per year across manufacturers in Latin America, Central and Eastern Europe and the Asia-Pacific region. According to industry reports, in 2011, software piracy resulted in a loss of approximately $64 billion to the global software industry. Symantec witnessed losses due to software piracy in the last few years” (Symantec Corporation, 9).
Another symptom to a larger problem for Symantec Corp. could be that in the last year they fired their CEO. According to an article by Jim Finkle and Nicola Leske the firing of the CEO was unexpected. The reasoning given for doing so was because Symantec’s stock has not grown in years. Even though Symantec has went to new leadership in hopes of boosting their stock and profits, their net income this last year compared to 2012 was down by $407,000 and their stock hasn’t gone anywhere in the past year either. According to a SWOT analysis published in Marketline one weakness that is discussed is Symantec’s reliance on OEM sales channels. Symantec is in and industry that is highly competitive and if they rely too heavily on their product being delivered and sold through computer packages than they may have no control over how much they sell. One of their main competitors is McAfee who is owned by Intel or Microsoft who is a brand name of their own. They don’t have to rely on anyone else but themselves to deliver their products to their customers.
Both of these symptoms can lead to a larger problem of leadership. Symantec may have had an idea that they needed someone fresh and new but their net income over the last year has suffered and their stock price is still hovering in the same area it has been for the last couple years. One good thing with the idea of a redesign is that they are trying to keep up with the shifting market. Also maybe the redesign will help make it so the software can’t be pirated also. In the long run maybe research and development costs will be high but it could also save them some money if they can keep people away from their software formula.
One last thing that is always considered a problem in this industry that Symantec has to keep in mind is that as the population, as a whole, shifts to storing everything online cybercrime becomes more and more dangerous and common. Cyber criminals know that most people don’t know how to protect their information and that there are many tricks for them to get a person’s personal information. According to their Corporate Responsibility Report the victims that are most common are:

(Symantec Corporation, 2012, p. 34)
Solve
Symantec knows that something needs to be done in order to get out of the flat line they are in. In July of 2012 they ended up replacing their CEO with Steve Bennett in hopes that it would turn things around. Now that he has been the CEO for more than a year he has come up with a new game plan in order to keep up with the market. Earlier it was mentioned that shipments of PCs have been rapidly decreasing because of the increase in the tablet and smartphone industry.
Recently, according to the Business Essentials Edgar glimpse of Symantec’s 10-K, they will be working their way into a “device-centric, which means protecting endpoints and the data center, to having the broader focus of protecting and managing digital information” (Edgar-Online Glimpse, 2013). The reason for this new development is because they believe that the market is switching from computers to mobile devices and tablets. They feel it is the right time to also shift their market while keeping up with computer anti-virus software. With this their “strategy is to establish leadership in this evolving information-centric world by identifying and delivering solutions that solve large unmet or underserved customer needs, while building competitive advantage and creating sustainable financial performance” (Edgar-Online Glimpse, 2013).
We know that Symantec wants to raise the bar when it comes to what they offer but they have to consider what factors are going to affect them along the way. Just a few days ago Symantec gave a press release stating that their new NetBackup software was ready to go and would provide its consumer with multiple upgrades. The new software,
“Is the only backup product designed for enterprise level scale, which can accommodate hundreds of thousands of virtual machines and petabytes of data while giving customers 400x faster virtual machine recovery than a standard restore. IT organizations can now simplify and automate the protection of massive and complex physical, virtual and cloud environments that are the building blocks of a modern data center” (Symantec, 2014).

This release doesn’t necessarily affect the everyday person who uses a computer for recreational use but affects large businesses that rely on good protection against outside threats. Since the new software has just come out we can’t decide how well it is performing and will have to keep an eye out for more releases on the subject or potential problems it causes. Keeping in mind that their new strategy is to keep up with the evolving market I believe their mission statement stays true and reflects their strategy. Since the new device-centric strategy fits the company and will hopefully help raise revenue so Symantec can continue to expand I think that the new leadership under Bennett could be a good thing.
Build
Having revenue and cash flow are two of the most important aspects of business. If you can’t make money and don’t have any to spend on research and development then there is no way a company will stay in business. Over the last few of years Symantec’s revenue has gone up along with their research and development expenses. This is all tied to the new strategy that was talked about in the last section. Cybercrime has also become more popular and below are some facts and percentages about some of the most common attacks that can happen:

(Symantec Corporation, 2013, p. 12)
Symantec provides these facts to their customers because they want to make sure their customers are as equipped as they can be to be prepared for attacks. The more informed people are the quicker they can react to any possible threat. Bennett as CEO is moving in the right direction. Tablets and smartphones are becoming a larger target because they are becoming more popular. As we can see phones are becoming more vulnerable to viruses every year.

(Symantec Corporation, 2013, p. 10) Symantec also already does a good job of informing their customers of who is most likely to be targeted by attackers. In their Internet Security Threat Report they list the top 10 industries that were attacked in 2012.

(Symantec Corporation, 2013, p. 15)
They also give graphs of attacks by size of targeted organization and targeted attack recipients.

(Symantec Corporation, 2013, pp. 16-17)
These graphs are helpful and show that Symantec knows what to expect and how to best help their customers. Since they have been spending more money each year on research and development and their revenue levels have been raising it shows that the company knows what they are doing. According to the graphs from Trefis we know that their largest market is Norton. If they continue to build on the device-centric software and make sure that it is functioning they could build up their security and software for business to also make it a larger market. Bigger corporations are obviously the ones being attacked. Since employees now have easy access to the work e-mail and the Internet on their phones or tablets the company becomes three times more likely to be attacked through any of those forms of devices. Symantec already has a good connection with many large companies. If they use their connections well and the software ends up being successful than they could see their security and software market of the business might become their second if not third largest part of Symantec’s operations.
Achieve
To implement the new software Bennett needs to make sure the reports on how not only computers are being attacked out there to their customers. Symantec needs to be willing to go out and advertise the product and prove that tablets and phones are becoming more and more dangerous by the day. Many companies don’t think about blocking social media sites on their employees work phones or tablets but Symantec knows that this is one of the major issues. “As new social media tools emerge and become popular, criminals will target them” (Symantec Corporation, 2013, p. 54). Social media can be a great way to advertise and get word out quickly about an upcoming event or new product, but as new way come out where customers can buy product directly off social media websites the more attention they will grab from online criminals. One great way to get the new product out is to also donate it to companies that need it. Symantec has a great philanthropic program. If they allow certain industries to use their product than they may go out and tell other companies how great the product is. Word of mouth is proven to be one of the best advertising strategies there is, so why not use it as an advantage while keeping up with the philanthropy work. Below is a breakdown of Symantec’s philanthropic giving by region and by focus area:

(Symantec Corporation, 2013, p. 21) As long as Bennett can keep up the leadership and keep the device-centric strategy moving in the right direction and implements it to their customers right than Symantec should be successful in raising their revenues even if their debt levels increase for the next couple years because of research and development.
Conclusion
In the end even though Symantec has had issues with leadership in the recent past Bennett seems to be leading the company in the right direction. The market is changing and he realized that, got together with part of his team, and implemented a new strategy that focused on protecting peoples tablets and smartphones rather than just their computers. This is a good solution to the problem of a flat lining stock price and no recent change in revenues. Without revenues and customers buying product a company cannot stay in business. A company has to be able to stay on top of trends and move with the innovative population, which I think Symantec is doing.

Works Cited
Edgar-Online Glimpse. (2013, May 17). 10-K Symantec Corp. Business Insights: Essentials .
Evers, J. (2006, March 2). Adobe to promote Symantec suite. (CNET News) Retrieved March 5, 2014, from CNET News: http://news.cnet.com/Adobe-to-promote-Symantec-suite/2110-1029_3-6045446.html
Funding Universe. (2005). Symantec Corporation History. (St. James Press) Retrieved February 27, 2014, from http://www.fundinguniverse.com/company-histories/symantec-corporation-history/
Symantec Corp. (2014). Business Overview. Retrieved January 22, 2014, from Symantec: http://www.symantec.com/about/profile/business.jsp
Symantec Corp. (2014). Careers. Retrieved January 22, 2014, from Symantec Corporation: http://www.symantec.com/about/careers/
Symantec Corp. (2014). Corporate Responsibility. Retrieved January 22, 2014, from Symantec: http://www.symantec.com/corporate_responsibility/
Symantec Corp. (2014). Our People. Retrieved January 22, 2014, from Symantec Corporation: http://www.symantec.com/corporate_responsibility/topic.jsp?id=our_people
Symantec Corp. (2013, January 23). Press Release Details. Retrieved February 27, 2014, from Symantec Corporation: http://investor.symantec.com/investor-relations/press-releases/press-release-details/2013/Symantec-Announces-New-Strategy-for-Returning-Cash-to-Shareholders/default.aspx
Symantec Corp. (2009). Symantec Enterprise Support Services. In S. Corp., Symantec™ Enterprise Support Services Handbook for Essential Support and Basic Maintenance (p. 4). Cuepertino, California: Symantec Corporation.
Symantec Corp. (2014). The World. Retrieved January 22, 2014, from Symantec: http://www.symantec.com/corporate_responsibility/topic.jsp?id=the_world
Symantec Corp. (2014). Your Information. Retrieved January 22, 2014, from Symantec : http://www.symantec.com/corporate_responsibility/topic.jsp?id=your_information
Symantec Corporation. (2012). 2012 Corporate Responsibility Report. Report.
Symantec Corporation. (2013). 2013 Corporate Responsiblity Report. Report.
Symantec Corporation. (2013). Internet Security Threat Report 2013. Report.
Symantec. (2014, January 21). Symantec NetBackup Tackles Data Growth, Performance and Virtual Sprawl as Customers Transition to the Modern Data Center. Mountain View, California: Market Wired.
TheOnlineInvestor.com. (2014, January 10). The Street. Retrieved January 22, 2014, from http://www.thestreet.com/story/12225096/1/analyst-favorites-with-strong-buyback-activity-symantec-ranks-as-a-top-pick.html?puc=yahoo&cm_ven=YAHOO
Trefis Team. (2014, February 25). Big Data and Data Center Growth Should Expand Symantec's Information Management Revenues. Retrieved March 5, 2014, from Forbes: http://www.forbes.com/sites/greatspeculations/2014/02/25/big-data-and-data-center-growth-should-expand-symantecs-information-management-revenues/
Trefis Team. (2014, January 31). Symantec Analysis for NASDAQ: SYMC. Retrieved March 7, 2014, from Trefis: https://www.trefis.com/company#/SYMC
Trefis. (2014, March 5). Trefis. Retrieved March 5, 2014, from Linkedin: http://www.linkedin.com/company/trefis

Appendix A
Trefis graphs:
Revenue

Adjusted EBITDA

Free Cash Flow

(Trefis, 2014)

Similar Documents

Premium Essay

Symantec Corporation - Mergers and Acquisitions

...| Symantec Corporation | Mergers and Acquisitions | | Chris Miller | 11/9/2011 Dan SalmApplied Microeconomic Theory | | * Introduction * This research paper attempts to give a view of the traditional theory relating to Symantec Corporation and their acquisitions and mergers in an attempt to gain market control. Mergers and acquisitions correspond to change within a business looking to gain market power. No other experience is harder to attain for a company, represents more of a challenge, or as hectic as an acquisition or merger. It is vital that the management understands the methods required to perform acquisitions and mergers and that they have a clear understanding of how the procedure works. A corporate merger is the amalgamation of two company’s liabilities and assets developing into a single business element. Acquisitions occur when a large company, typically in a monopolistically competitive market, encompasses a smaller company giving the larger company a monopolistic advantage. A merger occurs when the amalgamation of liabilities and assets is depicted to be between companies of equal market standing. Within a company merger of estimated equals, there is typically an exchange of company stocks where one business distributes new shares to the shareholders of the other company at a specified percentage. * “Those who boast of their commonsense approach to management are very probably just following the ill-formed, half-forgotten, pseudo-scientific nostrum...

Words: 2655 - Pages: 11

Premium Essay

Symantec

...Profile: Symantec Corp (SYMC.O) Related Topics: STOCKSSTOCK SCREENERTECHNOLOGYSOFTWARE Advertisement Advertisement Advertisement Advertisement Advertisement OVERVIEW NEWS KEY DEVELOPMENTS PEOPLE CHARTS FINANCIALS ANALYSTS RESEARCH PULSE SYMC.O on Nasdaq 23.35USD 27 Mar 2015 Change (% chg) $0.08 (+0.32%) Prev Close $23.28 Open $23.39 Day's High $23.42 Day's Low $23.10 Volume 4,053,739 Avg. Vol 3,928,393 52-wk High $27.32 52-wk Low $18.75 SEARCH STOCKS Submit FULL DESCRIPTION Symantec Corporation, incorporated on April 19, 1988, is a security, backup and availability solutions. The Company’s products and services protect people and information in any digital environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. The Company’s software and services protect against advanced threats independent of the device and environment in which information is used or stored. The Company operates in three segments: User Productivity & Protection, Information Security, and Information Management. User Productivity & Protection The User Productivity & Protection segment focuses on making customers to be protected at home and at work. These products include its Norton solutions, endpoint security and management, encryption, and mobile offerings. Its Norton products help customers protect against increasingly complex threats and address the need for identity protection, while also managing the...

Words: 513 - Pages: 3

Premium Essay

All-in-One Computer Security Systems

...All-in-one Computer Security Systems CIS/105 Some of the different programs that I choose to use as all-in-one security that has total protection are Norton Internet Security and McAfee has an exclusive active protection technology that analyzes and blocks threats in milliseconds. McAfee can immediately detect and remove viruses, even root kits, adware, spyware, and blocks. McAfee has a two-way firewall which blocks outsiders from hacking into your PC. The program also contains other features including ways to better the health of your PC. Norton Internet Security plus 360 versions 4.0 warns you of dangerous downloads before you install and run them on your computer. Norton Internet Security has an extra layer of protection that detects viruses, spyware, Trojans and other threats. In addition Norton 360 4.0 identifies applications that are impacting the performance of your PC. Using an all-in-one computer security protects your CPU from hijackers, identity theft, spyware, and virus. In addition using a security all in one center generally protects the user computer on its own. This keeps your system and all your information safe from others. There are some security programs which protect as well such as Anti-Virus, Anti-Spyware, Anti-Spam, Anti-Root kit, Identity Protection, Link Scanner Active Surf, Link Scanner Search, Web Protection & Firewall, and Sophisticated threat detection. Using an all-in-one security system is effective because the programs are...

Words: 434 - Pages: 2

Premium Essay

Waqas

...Muhammad Waqas Asif MB-S11-1900095 19-B 24 March, 2011 This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills: a. He provides security storage and system management solution. b. The work never stopped to maintain efficiency. c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills: a. Coaching and monitoring the works. b. Networking outside the organization. c. Working in a team to solve the problem. 3. Conceptual skills: a. Using information to solve business problem. b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers...

Words: 354 - Pages: 2

Free Essay

Norton

...6/22/13 OrderConfirmationPage United States | Select Product Cart Billing & Payment Review Confirmation Help Your order is complete. You will receive a confirmation email at: lopezluck01@netzero.net Order Confirmation Number NP176206488 Order Date June 22, 2013 Billing & Payment Details Billing Inform ation Paym ent Method Jose L Lopez 23129 bay av Moreno Valley, CA 92553 United States Jose L Lopez VISA xxxxxxxxxxxx0659 Order Details Product Description Operating System Deliv ery Qty Price Norton™ Internet Security (1 Year Subscription for 1 PC) 366 Day(s) protection for 1 PC Expires on 23-Jun-2014 Product Key:JWK8VJ4M74R8687R9G26HVYX7 Serial number:KYHWMQHRHB6P Y our subscription will continue until June 23, 2014 Window s 7 / XP / XP Pro / Vista Renew al 1 $ 19.99 If you have a Norton Product already installed and are having trouble installing your new purchase, pick one of the follow ing help topics for assistance: My Norton product doesn't install after starting the Dow nload Manager Removing the Norton product installed on my computer already before I install my new purchase Tax (8%) $ 1.60 Total $ 21.59 Your Norton Account Your order information has been saved in your Norton Account. Your Norton Account allows you the freedom to: * Manage your products and account information anytime and anywhere * Access your Norton Product Key for easy reinstall * Take advantage of special offers for Norton...

Words: 448 - Pages: 2

Free Essay

Managing the Virus Hunters

...Case: Managing the Virus Hunters Introduction: Symantec Corp. is a security software company, best known for its Norton antivirus. Founded in 1982 by Gary Hendrix, it is the market leader in security software. Its headquarters are located in Mountain View, California, U.S. and the company operates worldwide. Symantec hires over 18,000 employees and customers all around the globe. Their Response Lab, in Santa Monica, California, is called the “dirtiest network at Symantec” and is the place where the virus-hunters hunt for new computer viruses. Discussion Questions: 1. Keeping Professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? The job of the virus hunters is, round-the-clock, a hectic and chaotic job. With professionals facing new challenges every day, which just keep on getting tougher and tougher, it could be a cause to demotivate the professionals, and demote innovation. Vincent Weafer is in a position, where he has to encourage his team to remain professional, and work with as much innovation as possible; and for this purpose, he will have to utilize his managerial skills. In a job where all the work rotates around technical elements, it is an essential requirement for Mr. Weafer to be knowledgeable in the technical aspects of the work his team does...

Words: 1592 - Pages: 7

Free Essay

Unit 1 Assignment 1

...works or why. These script kiddies have become such a major threat because there are large numbers of them that buy these very lethal malicious software packages and deploy them in mass numbers, wherever the internet touches or wherever technology can be found. Some of these packages have the ability to be custom tailored (called crimeware kits) towards its specific use such as the Zeus kit. This kit can be purchased at $700 and can also be found free in some circles. When these kits are widely distributed and reconfigured so many times in so many ways it creates seemingly infinite amount software which makes it extremely difficult for antivirus companies to keep up. Almost 90,000 different strains of the Zeus toolkit were discovered by Symantec during 2009. “Variants of the Zeus kit use spam to lure users to a website that uses social engineering or that exploits a Web browser vulnerability to install the bot on a victim’s computer. the bot then allows remote access to the computer and can be used to steal information such as the user’s online banking credentials. Each bot can then be used to send additional spam runs to compromise new users.” These kits have become such a lucrative business among cyber criminals that there are rival organizations that develop their software to interfere with...

Words: 344 - Pages: 2

Free Essay

Can Norton Antivirus Detect Worm’s Virus?

...Can Norton antivirus detect worm’s virus? Fadi M.S Al-suhimat Recent Internet worm outbreaks have infected hundreds of thousands of Internet servers and user machines within minutes, causing billions of dollars in losses for businesses, governments, and service providers. The high stakes involved have inspired numerous research projects, through which industry and academic institutions are working to strengthen local-area and wide-area networked systems’ abilities to fend off cyber-attacks. To that end, we propose to find new algorithm to detect internet worm viruses deploying fast, scalable security overlay networks to facilitate high-speed intrusion detection and alert-information exchange by depend on failure connection. Fortifying the Internet infrastructure with such a solution could benefit many security-sensitive applications, such as digital government, critical infrastructures, grid computing, e-commerce, and law enforcement. The broader impacts are far reaching in science, education, business, and homeland security. Currently, the internet is getting close to the persons’ life. They login internet to chat with others, download files or browse Web Pages. The internet is also playing an important role in the economy of country. Once the internet breaks down, it will cause an enormous economic loss. Worms is a serious security threat that may cause network congestion and internet break down. Anti-virus software scans files regularly for unusual changes in...

Words: 627 - Pages: 3

Free Essay

Symantec Paper

...Since this is a small business, all of the decisions on technology software, hardware and networking decisions are made by the company president. Symantec Backup Exec Symantec Backup Exec provides continuous backup and recovery protection from the server to the desktop. The software protects the company’s data while providing the opportunity to reduce storage costs and improve backup performance through integrated deduplication and archiving technology. (Symantec 3, 2010) Symantec Backup Exec was chosen due to Symantec’s reputation for producing quality products along with the outstanding technical support that the company provides. The Backup Exec software is one of the leading software packages available and includes some of the best features when compared to other backup and recovery software options. About Symantec “Symantec was founded in 1982 by visionary computer scientists. The company has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides security, storage and systems management solutions to help their customers – from consumers and small businesses to the largest global organizations – secure and manage their information-driven world against more risks at more points, more completely and efficiently than any other company.” (Symantec 2, 2011) Specifications * Market leading data protection for physical and virtual server environments from desktop to servers * Integrated...

Words: 1333 - Pages: 6

Premium Essay

Symantec Analysis

...10 Appendices 12 Table A 12 Table B 12 Table C 13 Chart A 13 Financial Accounts 14 Executive Summary This report provides an overview of the financial position of Symantec Corporation (SYMC), a global provider of security, storage, and systems management solutions. The followings areas are considered: * The Debt and Equity position of the company are analysed. The various sources of financing used by the company are examined and evaluated by looking at the various debt instruments utilised by the company. * The possible value to be gained for investors is gauged by looking at the potential for market capitalisation. * This report also looks at the area of corporate governance, broadly within the Security Software Services industry. * Finally, the report assesses the future outlook in terms of growth, and the challenges and opportunities facing the company in the years ahead and its evolution stratagem. Introduction Symantec Corporation, currently number 391 on the Fortune 500 listing, operates within five segments: Consumer, Security and Compliance, Storage and Server Management, Services, and Other; hence Symantec is incontrovertibly diversified within the IT industry. The Company conducts business in three geographic regions: Americas, EMEA, and APJ. Symantec has remained financially viable throughout and since the burst of The Information Technology Bubble in 2000. (Galbraith & Hale, 2004) Great emphasis is placed on future-maturity;...

Words: 4658 - Pages: 19

Free Essay

Security Threats

...In 2011 Symantec listed the most significant attacks of 2010; these were targeted attacks, social networking, attack kits, mobile threats, zero-day and rootkits. These targeted attacks are exactly what it says, they target what they are designed to hit, whether it is a company (small or large), and individual or a specific machine. [ (Symantec, 2011) ] Symantec recorded over 3 billion malware attacks but yet Stuxnet stands out more than the others. However, lets us not forget Hydraq. Each one was highly sophisticated and was tailored for specific targets. Although Hydraq was old-fashioned, what made it stand out was what and whom it stole. Of course targeted attacks didn’t begin until 2010, and it won’t end. Once inside, the attack attempts to avoid detection until its objective is met. [ (Symantec, 2011) ] In 2010, the volume and sophistication of malicious activity increased, the Stuxnet worm became the first with the ability to affect physical devices while attempting exploits for an unprecedented number of zero-day vulnerabilities simultaneously. Although unlikely to become commonplace, Stuxnet does show what a skilled group of organized attackers can accomplish. [ (Symantec, 2011) ] Although providing a look at the security threats that are out there on the internet that us as users face on a daily basis, unless we know what we are dealing with, there is no way to defend against it. This is why it is important that we keep our software updated to help prevent attacks...

Words: 340 - Pages: 2

Premium Essay

Jimmer Paper

...will share with you our currently business model, and a vendor we have chosen to outsource our computer security to. My small business is a pizza shop where all my financial and product data are stored on a ERM system. Our system is largely monitored by myself, and the two managers I have employed at the business. I have chosen to outsource our computer security has it will cost less than to maintain internally. My managers, nor myself have the revenue adequate enough to gain the knowledge or manage the ERM system internally. For this reason I have chose Symantec Partners to oursource our security towards. A second reason, and one for hiring Symantec Partners, is that experience (in addition to low-costs) is essential to mainitain a secure internal information system. With experience, Symantec can provide us what we cannot ourselves, consistant base of security, and knowledge of solutions in the case of a cyber attack. Symantec Partners offers a flexible business model that appeals to each business individually, and offers solutions unique to each industry, and in my case, the dining business. 2. My first argument against oursource computer security is the lack of transperncy between myself, the management, and the entity managing the security. I may not want to control it myself, but being able to visualize its capabilities is essential, and outsourcing the security to a third-party may breach that interest of mine. If there is an individual who has experience with security...

Words: 624 - Pages: 3

Free Essay

Dfdgfg

...Build Your Report | Symantec http://www.symantec.com/threatreport/print.jsp?id=highlights... BOOKMARK THIS PAGE | PRINT THIS PAGE | CLOSE Internet Security Threat Report Volume 17 Custom Report SHARE THIS PAGE Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010. Web based attacks increased by 36% with over 4,500 new attacks each day. 403 million new variants of malware were created in 2011, a 41% increase of 2010. SPAM volumes dropped by 34% in 2011 over rates in 2010. 39% of malware attacks via email used a link to a web page. Mobile vulnerabilities continued to rise, with 315 discovered in 2011. Only 8 zero-day vulnerabilities were discovered in 2011 compared with 14 in 2010. 50% of targeted attacks were aimed at companies with less than 2500 employees. Overall the number of vulnerabilities discovered in 2011 dropped 20%. Only 42% of targeted attacks are aimed at CEOs, Senior Managers and Knowledge Workers. In 2011 232 million identities were exposed. An average of 82 targeted attacks take place each day. Mobile threats are collecting data, tracking users and sending premium text messages. You are more likely to be infected by malware placed on a legitimate web site than one created by a hacker. Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and...

Words: 44470 - Pages: 178

Premium Essay

Stuxnet Worm

...to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET Spreads (New York Times, 2011). 7 Figure 6: Infection By Country (Symantec, 2010). 9 Figure 7: WinCC Software (Symantec, 2010). 11 Introduction Discovered in June of 2010, a computer worm called Stuxnet, was designed to attack Power programmable-logic controllers or PLC’s used in control industrial controls such as used in nuclear power plants that operate a specific type of on...

Words: 2136 - Pages: 9

Free Essay

Managning Virus

...CASE STUDY #1: MANAGING THE VIRUS HUNTERS I.    Time Context           The period in this case study is from 1999 to 2003. Vincent Weafer has been the leader of Symantec Corporation's virus hunting team since 1999. The Launch of Blaster-B worm took place in 2003.   II.    Viewpoint           This case study is about the computer virus hunters at Symantec Corporation. It focuses on the nature of their job and the managerial challenges faced by Vincent Weafer.   III.    Relevant Facts       A.    Symantec Corporation.              Symantec is a global software company. Its mission is to  provide complete online security to its customers and safety  to the cyber world. Symantec deals with the production of antivirus software, which provides protection against harmful  contents for computers. Symantec is a long-term survivor since 1982.       B.    Vincent Weafer                   Vincent Weafer has an extensive range of experience, gained from more than 20 years in the information technology industry, ranging from software development, systems engineering, to security research positions. For the past 10 years, he has been the operational leader of the Symantec Global Security Response team, where his mission is to advance the research into new computer security threats and provide security content solutions such as anti-virus, antispam, intrusion and vulnerability  response, real-time alerting, content solutions, research, and analysis.                 Weafer...

Words: 285 - Pages: 2