SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity
Total Page:16
File Type:pdf, Size:1020Kb
SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPORT T Corporate Information N Board of Directors Tania Amochaev Donald E. Frischmann Rowan M. Trollope Former Chief Executive Officer Senior Vice President, Vice President, QRS Corporation Communications and Brand Management Security Management Solutions William T. Coleman III Dieter Giesbrecht Giuseppe Verrini Founder, Chairman and Senior Vice President, Vice President, Sales and Marketing, Chief Executive Officer Enterprise Administration Europe, Middle East, and Africa Cassatt Corporation Gail E. Hamilton Arthur W. Wong Franciscus Lion Executive Vice President, Vice President, Security Response Former Board Advisor and Global Services and Support Senior Executive Vice President N Investor Information ABN Amro Bank Thomas W. Kendra Senior Vice President, Worldwide Sales Annual Meeting David L. Mahoney The annual meeting of shareholders will be Former Co-Chief Executive Officer Rebecca A. Ranninger held on Wednesday, September 15, 2004 at McKesson HBOC Senior Vice President, Human Resources 8 a.m. at Symantec’s worldwide headquarters: 20330 Stevens Creek Blvd. Robert S. Miller Enrique T. Salem Senior Vice President, Gateway Solutions Cupertino, CA 95014 Former Chairman of the Board and (408) 517 8000 Chief Executive Officer Bethlehem Steel N Other Senior Executives Stock Exchange Listing Cosmo P. Battinelli Symantec’s common stock trades on George Reyes Vice President, Global Support the Nasdaq under the symbol SYMC. Chief Financial Officer Google Robert A. Clyde Transfer Agent Vice President, Chief Technology Officer EquiServe Trust Company, N.A. Daniel H. Schulman P.O. Box 219045 Chief Executive Officer Lily T. De Los Rios Kansas City, MO 64121 Virgin Mobile USA Vice President, Client Solutions www.equiserve.com (816) 843 4299 John W. Thompson Mark E. Egan Chairman of the Board and Vice President, Information Technology Investor Relations Chief Executive Officer Investor inquires may be directed to: Symantec Corporation Gregory M. Gotta Helyn Corcos Vice President, Investor Relations N Executive Officers Gateway Security and Appliances 20330 Stevens Creek Blvd. Cupertino, CA 95014 John W. Thompson Henri J. Isenberg (408) 517 8324 Chairman of the Board and Vice President, Business Development investor-relations symantec.com Chief Executive Officer @ Charles A. Johnson www.symantec.com/invest John G. Schwarz Vice President, Global Security Services Annual Report on Form 10-K President and Chief Operating Officer Donald Kleinschnitz A copy of Symantec’s Form 10-K, including Gregory E. Myers Vice President, exhibits, for the period ended April 2, 2004, Senior Vice President of Finance Enterprise Administration Products as filed with the Securities and Exchange Chief Financial Officer Commission, is available without charge Steven B. Messick upon request or can be accessed at: Janice D. Chaffin Vice President, www.symantec.com/invest Senior Vice President, Sales and Marketing, Americas Chief Marketing Officer Outside Counsel John B. Sorci, Jr. Fenwick & West LLP Arthur F. Courville Vice President, Worldwide Operations 801 California Street tz Printing: Cenveo Anderson Lithograph Senior Vice President, Mountain View, CA 94041 General Counsel and Secretary Vincent W. Steckler (650) 988 8500 t Schwar Vice President, Sales and Marketing, Stephen G. Cullen Asia Pacific and Japan Independent Auditors Senior Vice President, KPMG LLP trait: Stuar Security Products and Solutions 500 East Middlefield Road Mountain View, CA 94043 Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Norton Internet Security, Symantec Client Security, Symantec DeepSight Alert Services, Symantec Gateway Security, and Symantec Managed Security Services are trademarks of Symantec Corporation. Other brands and products are trademarks of their respective holder/s. Design: 1185 Design Executive Por © 2004 Symantec Corporation. All rights reserved. 10281117 2004 Annual Report Information is the fuel driving today’s global economy. By carefully analyzing critical information, doctors make decisions about their patients’ well-being—military com- manders guide troop movements—bankers determine how to invest millions—utilities control the flow of power and water—individuals make decisions about purchases from birthday presents to houses. To Use It,You Must Trust It A wealth of information now exists and is readily available to empower individuals, businesses, and governments to make better-informed decisions. We have come to assume that the information we rely on every day is trustworthy; however, that is not necessarily the case. Internet threats, technical failures, and everyday errors undermine the integrity of this information. To effectively use information, we must trust that it is secure and available when we need it. SYMANTEC CORPORATION «1» 2004 Annual Report To Trust It,You Must Secure It BUSINESS AND PERSONAL INFORMATION IS WORTH FAR MORE THAN THE INFRASTRUCTURE THAT STORES IT, THE DATABASE THAT MANAGES IT, THE APPLICATION THAT TRANSFORMS IT, OR THE NETWORK THAT TRANSPORTS IT COMBINED. IF THAT INFORMATION IS COMPROMISED, EVERYTHING THAT ANYONE DOES WITH IT IS SUSPECT. ENSURING THE TRUSTWORTHINESS OF CRITICAL INFORMATION ASSETS STARTS WITH SECURITY. Symantec is dedicated to helping individuals Today’s security solutions must recognize the and enterprises ensure the integrity of informa- need for early awareness of emerging threats.They tion critical to their work, play, and daily lives. must provide an understanding of and an ability to address the rapid increase in vulnerabilities Our company started on this quest nearly 15 years with more integrated technologies to protect ago when we pioneered the antivirus industry critical information assets. They must prevent and became the leaders in protecting home and attacks as well as outline a plan to respond to and small business users as well as large enterprise recover from their impact. customers. Since then, the threat spectrum has shifted toward much more sophisticated, They must block new threats automatically and aggressive, and rapid attacks. provide protection updates in real-time. Above all, they must offer the capability to manage the According to the Symantec Internet Security entire process—either by internal administrators Threat Report, blended threats accounted for 54 or by a dedicated services organization outside percent of the top attacks in the last six months of the company. 2003. Computer users are also facing an average of seven new vulnerabilities—or “holes”in soft- Whether it is an individual system connecting ware and hardware systems—discovered every day. through an Internet service provider or an office In addition, the time between the identification with thousands of systems on a network, the of a new vulnerability and the release of its security of the overall information technology exploit is shrinking from months to days, soon infrastructure directly impacts the integrity of to be within minutes or even simultaneously. the information flowing across that infrastructure. Recognizing this trend, Symantec has devel- Ensuring information integrity is about manag- oped broader information security solutions to ing the security of the computing environment, protect today’s computing environment and distributing software updates and patches, ensure information integrity. maintaining a secure archive of important data and software assets, and ensuring that the value of the infrastructure is realized. ‹‹2›› SYMANTEC CORPORATION 2004 Annual Report To Secure It,You Must Manage It TODAY’S COMPUTING INFRASTRUCTURE CAN BE TRULY SECURE ONLY IF IT IS WELL MANAGED. CENTRALIZED MANAGEMENT OF ALL GATEWAYS, SERVERS, AND CLIENTS WITHIN AN ENVIRONMENT IS ESSENTIAL TO MAINTAINING THE SECURITY AND AVAILABILITY OF INFORMATION ASSETS. Information integrity is not only about security, provisioning tools, administrators can distribute, but also availability. Information that is secure but configure, and update systems and applications, not available is virtually worthless. Individuals ensuring the network is current and consistent. and enterprises must manage the balance between making their systems and information available With asset management tools, administrators and keeping them secure. can discover and track hardware and software assets to understand where systems are installed To maintain the security and availability of a and what’s installed on them. This knowledge computing environment, users need critical is critical so that systems can be updated as information about that environment. vulnerabilities are discovered. In the enterprise, administrators must know Automated backup and recovery tools allow which systems are connecting to the network both individual and enterprise users to quickly and whether or not they meet the company’s and systematically bring systems online after the security policies.They must know which appli- occurrence of potentially disastrous events, such cations are deployed throughout the network as an attack, accidental misconfiguration, file and whether or not they have patched critical corruption, or installation of faulty software. new vulnerabilities.They must know that system and data backup procedures are being per- Underlying each of these elements are tools that allow the creation and consistent enforcement formed when required so the environment can of policies to ensure enterprise-wide security be recovered from an attack or technical failure