Printmgr File

Total Page:16

File Type:pdf, Size:1020Kb

Printmgr File 2017 Annual Report Proxy Statement and Form 10-K FORWARD-LOOKING STATEMENT: This Annual Report contains forward-looking statements that are subject to safe harbors under the Securities Act of 1933, as amended and the Securities Exchange Act of 1934, as amended. Statements that refer to projections of our future financial performance, anticipated growth and trends in our businesses and in our industries, the actions we intend to take as part of our new strategy and the expected impact thereof, the anticipatedimpactsof our acquisitions and restructurings, our intent to pay quarterly cash dividends in the future, and other characterizations of future events or circumstances are forward-looking statements. These statements are only predictions, based on our current expectations about future events and may not prove to be accurate. We do not undertake any obligation to update these forward-looking statements to reflect events occurring or circumstances arising after the date of this report. These forward-looking statements involve risks and uncertainties, and our actual results, performance, or achievements could differ materially from those expressed or implied by the forward-looking statements on the basis of several factors, including those that we discuss in the “Risk Factors” section and throughout our 2017 Form 10-K, which is included in this Annual Report. We encourage you to read that section carefully. Two Year Summary of Selected Financial Data1 ($ in millions, except per share data) FY2017 FY2016 GAAP Financial Results Net revenue $ 4,019 $ 3,600 Operating income (loss) $ (100) $ 457 Net income (loss) $ (106) $ 2,488 Diluted net income (loss) per share $ (0.17) $ 3.71 Diluted weighted-average shares outstanding 618 670 Cash position (including short-term investments) $ 4,256 $ 6,025 Total assets $ 18,174 $11,767 Deferred revenue $ 2,787 $ 2,638 Current portion of long-term debt $ 1,310 $ - Long-term debt $ 6,876 $ 2,207 Total stockholders’ equity $ 3,487 $ 3,676 Cash flow from operations $ (220) $ 796 Non-GAAP Financial Results Net revenue $ 4,163 $ 3,600 Operating income $ 1,194 $ 1,026 Operating margin 28.7% 28.5% Net income $ 762 $ 698 Diluted net income per share $ 1.18 $ 1.03 Diluted weighted-average shares outstanding 645 676 Reconciliation of Non-GAAP Adjustments Gross profit Deferred revenue fair value adjustment $ 144 $ - Unallocated corporate charges - 22 Stock-based compensation 21 10 Amortization of intangible assets 146 28 Inventory fair value adjustment 24 - Total gross profit adjustment 335 60 Operating expenses Unallocated corporate charges - 164 Stock-based compensation 419 152 Amortization of intangible assets 147 57 Restructuring, separation, transition and other 273 136 Acquisition and integration costs 120 - Total operating expense adjustment 959 509 Operating income adjustment 1,294 569 Net income Non-cash interest expense and amortization of debt issuance costs 36 - Income tax effect on above items (332) 950 Net income adjustment from discontinued operations (130) (3,309) Total net income (loss) adjustment $ 868 $ (1,790) Diluted net income (loss) per share Net income adjustment from continued operations per share $ 1.56 $ 2.26 Net income adjustment from discontinued operations per share $ (0.21) $ (4.94) Total diluted net income (loss) per share adjustment $ 1.35 $ (2.68) 1 Non-GAAP financial measures adjust for the following items: the impact of purchase accounting on revenue and cost of revenue, certain acquisition and integration costs, discontinued operations, stock-based compensation, restructuring, separation and transition matters, charges related to the amortization of intangible assets, non-cash interest expense and amortization of debt issuance costs and certain other income and expense items that management considers unrelated to the Company’s core operations; and the associated income tax effects of the adjustments. We believe our presentation of non-GAAP financial measures, when taken together with corresponding GAAP financial measures, provides meaningful supplemental information regarding the Company’s operating performance. Our management team uses these non-GAAP financial measures in assessing the Company’s operating results, as well as when planning, forecasting and analyzing future periods. We believe that these non-GAAP financial measures also facilitate comparisons of the Company’s performance to prior periods and to our peers and that investors benefit from an understanding of the non-GAAP financial measures. Non-GAAP financial measures are supplemental and should not be considered a substitute for financial information presented in accordance with GAAP. [THIS PAGE INTENTIONALLY LEFT BLANK] 350 Ellis Street Mountain View, California 94043 NOTICE OF 2017 ANNUAL MEETING OF STOCKHOLDERS to be held on: October 5, 2017 9:00 a.m. Pacific Time Dear Stockholder: You are cordially invited to attend our 2017 Annual Meeting of Stockholders, which will be held at 9:00 a.m. (Pacific Time) on Thursday, October 5, 2017. We are pleased to announce that the 2017 Annual Meeting will be a completely virtual meeting of stockholders, which will be conducted via live webcast. You will be able to attend the Annual Meeting online and submit your questions prior to or during the meeting by visiting www.virtualshareholdermeeting.com/SYMC2017. You will also be able to vote your shares electronically at the Annual Meeting. We are excited to embrace the latest technology to provide expanded access, improved communication and cost savings for our stockholders. Hosting a virtual meeting will enable increased stockholder attendance and participation since stockholders can participate from any location around the world. In addition, the online format will allow us to communicate more effectively with you via a pre-meeting forum that you can enter by visiting www.virtualshareholdermeeting.com/SYMC2017 and submit questions in advance of the Annual Meeting. For your convenience, we are also pleased to offer a re-playable webcast of the Annual Meeting at investor.symantec.com. We are holding the Annual Meeting for the following purposes, which are more fully described in the proxy statement: 1. To elect the eleven nominees named in the proxy statement to Symantec’s Board of Directors; 2. To ratify the appointment of KPMG LLP as Symantec’s independent registered public accounting firm for the 2018 fiscal year; 3. To approve amendments to our 2013 Equity Incentive Plan, as amended, to increase the number of shares authorized for issuance thereunder by 8,000,000 shares and to approve additional amendments; 4. To hold an advisory vote to approve executive compensation; 5. To hold an advisory vote on the frequency of future advisory votes on executive compensation; 6. To consider and vote upon two stockholder proposals, if properly presented at the meeting; and 7. To transact such other business as may properly come before the meeting or any adjournment or postponement thereof. We are furnishing proxy materials to our stockholders primarily via the Internet to expedite stockholders’ receipt of proxy materials, lower the cost of the Annual Meeting and help conserve natural resources. On or about August 16, 2017, we expect to send to our stockholders (other than those who previously requested electronic or paper delivery) a Notice of Internet Availability of Proxy Materials containing instructions on how to access our proxy materials, including our proxy statement and our annual report, and to vote through the Internet or by telephone. Only stockholders of record as of the close of business on August 7, 2017 are entitled to notice of, and vote at, the Annual Meeting or any postponement or adjournment thereof. A list of stockholders entitled to vote will be available for inspection at our offices for ten days prior to the Annual Meeting. If you would like to view this stockholder list, please contact Investor Relations at (650) 537-3511. Your vote is very important. Whether or not you plan to virtually attend the Annual Meeting, please vote at your earliest convenience by following the instructions in the Notice of Internet Availability of Proxy Materials or the proxy card you received in the mail. You may revoke your proxy at any time before it is voted. Please refer to the “2017 Annual Meeting of Stockholders Meeting Information” section of the proxy statement for additional information. BY ORDER OF THE BOARD OF DIRECTORS SCOTT C. TAYLOR Executive Vice President, General Counsel and Secretary Mountain View, California August 16, 2017 IMPORTANT NOTICE REGARDING THE AVAILABILITY OF PROXY MATERIALS FOR THE STOCKHOLDER MEETINGTOBEHELD ON OCTOBER 5, 2017. The proxy statement and Symantec’s Form 10-K for the 2017 fiscal year, as amended, are available at http://investor.symantec.com/About/Investors/financial-information/Annual-Reports/default.aspx. [THIS PAGE INTENTIONALLY LEFT BLANK] TABLE OF CONTENTS Page PROXY SUMMARY ............................................................... 1 CORPORATE GOVERNANCE ...................................................... 9 Corporate Governance Guidelines .................................................. 9 Code of Conduct and Code of Ethics ................................................ 9 Policy Against Short-Selling, Hedging and Pledging Symantec Securities .................. 9 Stock Ownership Guidelines ...................................................... 9 Stockholder Engagement ......................................................... 10 Majority Vote Standard and Director
Recommended publications
  • “Global Positioning Systems” GPS Mean Never Having to Say “I’M Lost”?
    APRIL 2003 VOLUME 19 NUMBER 4 PPCUGPPCUG NEWS A PUBLICATION OF THE PRINCETON PC USERS GROUP Monday April 14, 2003 “Global Positioning Systems” GPS mean never having to say “I’m Lost”? Don Arrowsmith will demonstrate the Garmin Street Pilot III Auto Navigation unit and the MapSource PC software. At Lawrence Library Meetng Rooms 1 & 2 US Route 1 South & Darrah Lane, Lawrenceville, NJ Meetings of an organization at any of the facilities of the Mercer County Library System in No Way implies endorsement of its programs In this issue About PPCUG............................................. 2 Presidents Message .................................. 2 Parcel Pick-up @TCF2003 ........................ 2 Backups-Lite .............................................. 3 New Year’s Resolutions ............................ 4 Member E-mail Directory .......................... 5 General Meeting Minutes ........ Back Cover Digital Photo by: Tom Carman Tom Digital Photo by: President Clarke Walker making his opening remarks to the group at the March general meeting. About PPCUG General Meetings Coming Events Second Monday of the month at the May 3 & 4, 2003 - Trenton Computer Festival Lawrenceville Library. Route 1 and Darrah Lane. May 12, 2003 - Lindow Operating System - Jim Russ 7:00-7:45 PM: Social Time / Tech Corner June 9, 2003 - Batch Files & Scripting - Vic Laurie 7:45 PM: Meeting Comes to Order 8 PM: Featured Presentation July 14, 2003 - Music & Video on Your PC - Don Slepian For information about upcoing meetings or joining PPCUG call 908-218-0778 to leave a message. Board Meetings Presidents Message For Meeting Location, Date and Time, call By: Clarke Walker 908-218-0778 Board meetings are open to All. I want to thank everyone who participated in last month’s “Digital Camera Show, Tell and Shoot”.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • Gartner's Magic Quadrant for Endpoint Protection Platform 2012
    Research G00219355 16 January 2012 Magic Quadrant for Endpoint Protection Platforms Peter Firstbrook, Neil MacDonald, John Girard Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools, such as vulnerability detection and application control, that reduce the attack surface. Market Definition/Description (This document was revised on 18 January 2012. The document you are viewing is the corrected version. For more information, see the Corrections page on gartner.com.) The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include: ■ Anti-malware ■ Anti-spyware ■ Personal firewalls ■ Host-based intrusion prevention ■ Port and device control ■ Full-disk and file encryption ■ Endpoint data loss prevention (DLP) ■ Application vulnerability management and application control These products and features are typically centrally managed and ideally integrated at the policy level. Despite the introduction of new players, the displacement of incumbents is still a significant challenge in the large-enterprise market. The biggest impact of the Magic Quadrant Challengers and Visionaries is to push the dominant market players into investing in new features and functionality (sometimes via acquisitions), and to keep pricing rational. However, in the sub-thousand-seat-level market, we do see more displacement, and buyers have more product choices due to lower management requirements. Current prices for comparable offerings are down from our last Magic Quadrant; 1-18TSGZT however, vendors are often substituting more-complete suite offerings with little or no increase in annual costs.
    [Show full text]
  • Veritas Backup Reporter 6.5 Clustering Guide Veritas Backup Reporter Clustering Guide
    Veritas Backup Reporter 6.5 Clustering Guide Veritas Backup Reporter Clustering Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™,
    [Show full text]
  • Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide
    Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.2 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2007 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™,
    [Show full text]
  • Symantec Corporation (Exact Name of the Registrant As Specified in Its Charter)
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 þ For the Fiscal Year Ended March 31, 2017 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 o For the Transition Period from to Commission File Number 000-17781 Symantec Corporation (Exact name of the registrant as specified in its charter) Delaware 77-0181864 (State or other jurisdiction of (I.R.S. employer incorporation or organization) Identification no.) 350 Ellis Street Mountain View, California 94043 (Address of principal executive offices) (zip code) Registrant’s telephone number, including area code: (650) 527-8000 Securities registered pursuant to Section 12(b) of the Act: Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: None (Title of class) Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes þ No o Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or 15(d) of the Exchange Act. Yes o No þ Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Corporate Review May 2009
    IT Security Products for Corporate Users Review of IT Security Suites for Corporate Users, 2009 Language: English May 2009 Last revision date: 2009-05-27 www.av-comparatives.org 1 Table of Contents The risk of malicious software 3 Management Summary 5 SPAM-Test 9 HIPS-Test 11 Product Review Section 13 AVIRA 14 ESET 29 G DATA 42 Kaspersky 54 SOPHOS 72 Symantec 85 TrustPort 97 Appendix A – Feature list & System Requirements 2 The risk of malicious software Most organizations are aware of the risk threatening their IT environment. Viruses, Trojans, Worms, Exploits and many others threats represent a serious risk for the IT department. A collapse of the IT systems could mean grave financial losses right up to insolvency for a com- pany. The IT departments of companies are conscious about this problem. Getting the best protec- tion against this threat is the only issue. An Anti-Virus safeguard alone is far too inadequate. There are too many threats starting from contaminated e-mails, exploits etc. What is required is comprehensive protection suite against all of these. Functional Diversity Because of the immense functional diversity of various Anti-Virus suites and corporate prod- ucts, it is becoming increasingly difficult for decision-makers in the IT sector to get a proper overview. Which product should one opt for and for which area of application? During these tests our main focus has not been on detection rates but, instead, on the prod- ucts with respect to their handling and user-friendliness and the scope of functionality. We have compiled the functional scope of various products in an extensively detailed table.
    [Show full text]
  • SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity
    SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPORT T Corporate Information N Board of Directors Tania Amochaev Donald E. Frischmann Rowan M. Trollope Former Chief Executive Officer Senior Vice President, Vice President, QRS Corporation Communications and Brand Management Security Management Solutions William T. Coleman III Dieter Giesbrecht Giuseppe Verrini Founder, Chairman and Senior Vice President, Vice President, Sales and Marketing, Chief Executive Officer Enterprise Administration Europe, Middle East, and Africa Cassatt Corporation Gail E. Hamilton Arthur W. Wong Franciscus Lion Executive Vice President, Vice President, Security Response Former Board Advisor and Global Services and Support Senior Executive Vice President N Investor Information ABN Amro Bank Thomas W. Kendra Senior Vice President, Worldwide Sales Annual Meeting David L. Mahoney The annual meeting of shareholders will be Former Co-Chief Executive Officer Rebecca A. Ranninger held on Wednesday, September 15, 2004 at McKesson HBOC Senior Vice President, Human Resources 8 a.m. at Symantec’s worldwide headquarters: 20330 Stevens Creek Blvd. Robert S. Miller Enrique T. Salem Senior Vice President, Gateway Solutions Cupertino, CA 95014 Former Chairman of the Board and (408) 517 8000 Chief Executive Officer Bethlehem Steel N Other Senior Executives Stock Exchange Listing Cosmo P. Battinelli Symantec’s common stock trades on George Reyes Vice President, Global Support the Nasdaq under the symbol SYMC. Chief Financial Officer Google Robert A. Clyde Transfer Agent Vice President, Chief Technology Officer EquiServe Trust Company, N.A. Daniel H. Schulman P.O. Box 219045 Chief Executive Officer Lily T. De Los Rios Kansas City, MO 64121 Virgin Mobile USA Vice President, Client Solutions www.equiserve.com (816) 843 4299 John W.
    [Show full text]
  • Symantec Protection Suite Enterprise Edition 4.0 Getting Started Guide
    Symantec™ Protection Suite Enterprise Edition 4.0 Getting Started Guide Dec. 2012 CONTENTS GETTING STARTED WITH SYMANTEC™ PROTECTION SUITE ....................................................... 4 ABOUT SYMANTEC PROTECTION SUITE ENTERPRISE EDITION ............................................................................ 4 ABOUT THE COMPONENTS INCLUDED IN SYMANTEC PROTECTION SUITE ENTERPRISE EDITION ............................. 5 SYMANTEC PROTECTION SUITE 4.0 ENTERPRISE EDITION REFERENCE ARCHITECTURE ......................................... 9 GETTING STARTED WITH SPS EE 4.0 ........................................................................................................... 11 WHERE TO GET MORE INFORMATION ........................................................................................................... 15 DOCUMENT LOCATIONS .......................................................................................................................... 15 ACCESSING THE SUITE SOFTWARE ................................................................................................ 17 Dec. 2012 SPS Enterprise Edition 4.0 Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2012 Symantec™ Corporation. All rights reserved. Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System, LiveUpdate, Norton, Norton 360, Sygate, and TruScan are trademarks or registered trademarks
    [Show full text]
  • SYMANTEC CORPORATION (Exact Name of the Registrant As Speciñed in Its Charter) Delaware 77-0181864 (State Or Other Jurisdiction of (I.R.S
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ¥ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Fiscal Year Ended April 1, 2005 OR n TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Transition Period from to . Commission File Number 0-17781 SYMANTEC CORPORATION (Exact name of the registrant as speciÑed in its charter) Delaware 77-0181864 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) IdentiÑcation No.) 20330 Stevens Creek Blvd., 95014-2132 Cupertino, California (zip code) (Address of principal executive oÇces) Registrant's telephone number, including area code: (408) 517-8000 Securities registered pursuant to Section 12(b) of the Act: None None (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: Common Stock, par value $0.01 per share, and Related Stock Purchase Rights (Title of class) Indicate by check mark whether the registrant (1) has Ñled all reports required to be Ñled by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to Ñle such reports), and (2) has been subject to such Ñling requirements for the past 90 days. Yes ¥ No n Indicate by check mark if disclosure of delinquent Ñlers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in deÑnitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.
    [Show full text]
  • Symantec Enterprise Product Catalog October 2005
    Symantec Enterprise Product Catalog October 2005 Symantec has developed a new approach to IT management that simultaneously provides for the security and the availability of network resources. Known as I n formation Integ r i ty™, this balanced approach ke e ps information safe, yet accessible wherever, whenever, and to whomever business needs dictate. It’s an approach designed to help keep businesses up, running, and growing, no matter what happens. On the following pages, you will find a complete range of world-class enterprise security and ava i l a b i l i t y solutions, including products for p reventing intrusions, detecting and removing malicious code, managing enterprise-wide security systems, p r e s e rving business continuity, and much more. In short, just about everything you need to ensure the integrity of information assets in your enterprise environment. Symantec Enterprise Solutions—October 2005 Symantec Enterprise Product Catalog Contents Appliances . .5 Symantec Clientless VPN Gateway 4400 Series . .5 Symantec Gateway Security 300 Series . .5 Symantec Gateway Security 400 Series . .6 Symantec Gateway Security 5400 Series . .6 Symantec Gateway Security 5600 Series . .7 Symantec Mail Security 8100 Series . .7 Symantec Mail Security 8200 Series . .8 Symantec Network Security 7100 Series . .8 Application Performance Management . .9 VERITAS Application Saver . .9 VERITAS i3 for ClarifyCRM . .9 VERITAS i3 for J2EE . .10 VERITAS i3 for .Net . .10 VERITAS i3 for Oracle . .10 VERITAS i3 for Oracle Applications . .11 VERITAS i3 for PeopleSoft . .11 VERITAS i3 for SAP . .11 VERITAS i3 for Siebel . .12 VERITAS i3 for SQL Server . .12 VERITAS i3 for Web Servers .
    [Show full text]