Canada Edition 1 Symantec.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Ca_096-097 8/26/06 3:53 AM Page 3 Since 1999, Symantec has been led by current RECENT DEVELOPMENTS Symantec has a wide range of CEO John W. Thompson. Under Thompson’s lead- Today, Symantec is one of the educational resources, such ership, Symantec has grown from a small con- fastest growing software com- as: Webcasts, online courses, sumer software publisher to the market leader for panies in North America. articles, podcasts, white papers, security and availability solutions to help cus- Symantec is currently reshaping seminars and events. The tomers manage their rapidly growing digital assets. the competitive landscape and recently launched “Symantec Recognizing the growing importance of infor- is uniquely positioned to drive Yellow Books” are a great edu- mation and the need to protect it, Thompson has industry convergence across the cational tool, as they provide spearheaded company efforts to solidify and expand major security and availability technical know-how to IT pro- its industry-leading security products. This has been segments of the market. fessionals in Symantec’s cus- achieved by developing additional software solu- The new, post-VERITAS– tomer and partner communities tions and acquiring 40 companies, including: merger Symantec will provide — and to the technical market- AXENT Technologies, PowerQuest Corporation, enterprise customers with a more place in general. Written to ON Technology, Brightmail and Sygate. effective way to protect their show how to solve real-world The 2005 merger of Symantec with VERITAS infrastructure, information and business and technical prob- Software (an industry leader in backup and data- interactions. Symantec can now lems using Symantec solutions, protection software) helped establish Symantec as deliver security and availability these books include best- an IT industry powerhouse that ranks as the fourth- solutions across all platforms practice recommendations as largest independent software company in the world. and to customers of all sizes. well as detailed information on installation, configuration and THE PRODUCT PROMOTION product integration. Symantec protects a wide range of customers — Norton’s new consumer mes- Symantec Vision, the com- from consumers to small and mid-sized businesses sage is built around freedom, because that is what pany’s annual premiere global enterprise customer to large enterprises and government organizations. customers value most about their computers and and partner showcase, provides Symantec’s enter- Symantec’s Norton brand of consumer security the Internet. Symantec's value proposition prise stakeholders with an opportunity to make a solutions delivers Internet security and problem- describes the functional and emotional benefits direct and compelling connection with the Symantec solving capabilities to individual users, home customers enjoy when we keep the Norton prom- brand. Attendees have access to a myriad of work- offices and small businesses. The Norton brand of ise: “Use Norton products and services to enjoy shops, seminars and forums that provides them with products is a market leader in desktop protection, your freedom to work and play in the connected a 360-degree understanding and appreciation of world — protected from fear, frus- how Symantec can help provide them with the pro- tration, loss and chaos.” tection they need to be able to do business with con- THREAT RELEASED DECEASED THREAT RELEASED DECEASED THREAT RELEASED DECEASED Backdoor.Hesive.B 2/21/06 2/21/06 W32.Sygyp.A@mm 1/21/06 1/22/06 Bloodhound.Exploit.55 12/20/05 12/21/05 Trojan.Satiloler.D 2/21/06 2/21/06 W32.HLLP.Sality!inf 1/21/06 1/21/06 Trojan.Lodeight.A 12/20/05 12/20/05 Symantec’s consumer marketing fidence. Symantec Vision is replicated, on a smaller Trojan.Meheerwar 2/21/06 2/21/06 PWSteal.Topfox 1/20/06 1/20/06 Trojan.Lodear.G 12/20/05 12/20/05 Linux.Plupii.C 2/19/06 2/19/06 PWSteal.Tarno.R 1/20/06 1/20/06 W32.Beagle.CZ@mm 12/20/05 12/20/05 W32.Beagle.DU 2/18/06 2/18/06 Trojan.Mdropper.E 1/19/06 1/19/06 W32.Dasher.D 12/19/05 12/20/05 efforts have traditionally focused on scale, in countries around the world — helping OSX.Inqtana.A 2/17/06 2/18/06 SymbOS.Sendtool.A 1/18/06 1/19/06 PWSteal.Tarno.Q 12/19/05 12/20/05 W32.Alcra.F 2/17/06 2/17/06 SymbOS.Pbstealer.D 1/18/06 1/19/06 Trojan.Mdropper.D 12/18/05 12/18/05 PWSteal.Metafisher 2/16/06 2/17/06 SymbOS.Bootton.E 1/18/06 1/19/06 SymbOS.Skulls.R 12/16/05 12/16/05 promoting its flagship products, ensure that the company engages its enterprise cus- OSX.Leap.A 2/16/06 2/16/06 PWSteal.Changgame 1/18/06 1/18/06 SymbOS.Cardtrp.P 12/16/05 12/16/05 W32.Beagle.DS@mm 2/15/06 2/16/06 Trojan.PWS.QQPass.H 1/18/06 1/18/06 W32.Beagle.CY@mm 12/16/05 12/17/05 Norton AntiVirus and Norton Inter- tomers and partners wherever they may be. Bloodhound.Exploit.59 2/14/06 2/14/06 W32.Looksky.H@mm 1/17/06 1/18/06 W32.Dasher.C 12/16/05 12/16/05 Linux.Backdoor.Kaiten 2/14/06 2/14/06 W32.Redplut 1/17/06 1/17/06 W32.Dasher.B 12/16/05 12/16/05 Trojan.Satiloler.C 2/14/06 2/14/06 W32.Blackmal.E@mm 1/17/06 1/17/06 Trojan.Swepdat 12/15/05 12/16/05 net Security. Historically, Symantec W32.Exvid.A@mm 2/13/06 2/13/06 W32.Feebs.J@mm 1/16/06 1/16/06 SymbOS.Cardtrp.O 12/15/05 12/15/05 Bloodhound.Exploit.58 2/10/06 2/10/06 Trojan.Tabela.D 1/14/06 1/15/06 Trojan.Lodear.F 12/15/05 12/16/05 Trojan.Goldun.J 2/14/06 2/14/06 Backdoor.Rustock 1/12/06 1/13/06 W32.Beagle.CX@mm 12/15/05 12/15/05 has run its very successful “Back to BRAND VALUES W32.Kedebe.H@mm 2/13/06 2/13/06 W32.Feebs.E@mm 1/12/06 1/12/06 W32.Dasher.A 12/15/05 12/15/05 W32.Beagle.DR@mm 2/13/06 2/13/06 Trojan.Awax 1/13/06 1/13/06 SymbOS.Cardtrp.M 12/14/05 12/15/05 W32.Beagle.DP 2/10/06 2/10/06 W32.Feebs.D@mm 1/11/06 1/11/06 SymbOS.Cardtrp.N 12/14/05 12/15/05 School” and “Tax Time” promotions The company’s commitment to its brand and val- Trojan.Mdropper.FYou 2/10/06 2/11/06 canTrojan.Beagooz.E get 1/11/06 1/11/06almostTrojan.Lodear.E 12/15/05 12/15/05 W32.Beagle.DO@mm 2/10/06 2/10/06 Bloodhound.Exploit.57 1/10/06 1/11/06 SymbOS.Cabir.W 02/15/05 12/15/05 W32.Jalabed@mm 2/8/06 2/9/06 Trojan.Goldun.I 1/6/06 1/6/06 PWSteal.MSNBancos 12/15/05 12/15/05 at retail stores across North ues over its 20-plus-year history has been at the SymbOS.Cardtrp.U 2/8/06 2/9/06 W32.Looksky.G@mm 1/8/06 1/8/06 SymbOS.Doomboot.R 12/15/05 12/15/05 SymbOS.Cardtrp.V 2/8/06anything 2/9/06 W32.Feebs 1/7/06 online. 1/8/06 SymbOS.Skulls.Q 12/14/05 12/15/05 America. However, more recently, heart of its business success. Symantec believes SymbOS.Cardtrp.W 2/8/06 2/9/06 Trojan.Zlob.H 1/6/06 1/6/06 Trojan.Oxtic 12/14/05 12/14/05 SymbOS.Cardtrp.X 2/8/06 2/9/06 W32.Loxbot.D 1/6/06 1/6/06 SymbOS.Cardtrp.I 12/12/05 12/13/05 W32.Kiman.B 2/8/06 2/8/06 W32.Loxbot.C 1/5/06 1/6/06 SymbOS.Skulls.P 12/13/05 12/13/05 Symantec has partnered with other that people should be able to work and play freely Backdoor.Prosti 2/7/06 2/7/06 W32.Looksky.F@mm 1/5/06 1/5/06 Trojan.Zlob.G 12/13/05 12/13/05 W32.Beagle.DN@mm 2/4/06 2/4/06 Trojan.Satiloler.B 1/4/06 1/4/06 SymbOS.Cardtrp.K 12/12/05 12/13/05 SymbOS.Cardtrp.T 2/3/06 2/3/06 SymbOS.Pbstealer.C 1/3/06 1/4/06 SymbOS.Skulls.O 12/13/05 12/13/05 companies in order to create some in a connected world. The brand is more than a Trojan.Mancsyn 2/2/06 2/2/06 PWSteal.Bankash.G 1/3/06 1/3/06 SymbOS.Cardtrp.J 12/12/05 12/13/05 W32.Beagle.DM@mm 2/2/06 2/2/06 W32.Cleevix 1/2/06 1/3/06 SymbOS.Cardtrp.I. 12/12/05 12/13/05 W32.Beagle.DL@mm 2/2/06But 2/2/06 W32.Dabora.B@mm not 12/30/05these. 12/30/05 SymbOS.Cardtrp.L 12/12/05 12/13/05 very exciting and compelling mar- logo or color scheme — it is the combined behav- W32.Kiman.A 2/2/06 2/2/06 Trojan.Spamlia 12/29/05 12/29/05 W32.Dinoxi.B 12/11/05 12/11/05 W32.Loxbot.F 2/1/06 2/1/06 Trojan.Infticker 12/28/05 12/28/05 W32.Dinoxi 12/10/05 12/10/05 keting campaigns.
Recommended publications
  • Artificial Intelligence in Health Care: the Hope, the Hype, the Promise, the Peril

    Artificial Intelligence in Health Care: the Hope, the Hype, the Promise, the Peril

    Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril Michael Matheny, Sonoo Thadaney Israni, Mahnoor Ahmed, and Danielle Whicher, Editors WASHINGTON, DC NAM.EDU PREPUBLICATION COPY - Uncorrected Proofs NATIONAL ACADEMY OF MEDICINE • 500 Fifth Street, NW • WASHINGTON, DC 20001 NOTICE: This publication has undergone peer review according to procedures established by the National Academy of Medicine (NAM). Publication by the NAM worthy of public attention, but does not constitute endorsement of conclusions and recommendationssignifies that it is the by productthe NAM. of The a carefully views presented considered in processthis publication and is a contributionare those of individual contributors and do not represent formal consensus positions of the authors’ organizations; the NAM; or the National Academies of Sciences, Engineering, and Medicine. Library of Congress Cataloging-in-Publication Data to Come Copyright 2019 by the National Academy of Sciences. All rights reserved. Printed in the United States of America. Suggested citation: Matheny, M., S. Thadaney Israni, M. Ahmed, and D. Whicher, Editors. 2019. Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril. NAM Special Publication. Washington, DC: National Academy of Medicine. PREPUBLICATION COPY - Uncorrected Proofs “Knowing is not enough; we must apply. Willing is not enough; we must do.” --GOETHE PREPUBLICATION COPY - Uncorrected Proofs ABOUT THE NATIONAL ACADEMY OF MEDICINE The National Academy of Medicine is one of three Academies constituting the Nation- al Academies of Sciences, Engineering, and Medicine (the National Academies). The Na- tional Academies provide independent, objective analysis and advice to the nation and conduct other activities to solve complex problems and inform public policy decisions.
  • Essential Trends and Dynamics of the Endpoint Security Industry

    Essential Trends and Dynamics of the Endpoint Security Industry

    Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................
  • RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC

    RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC

    NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, IN WHOLE OR IN PART, DIRECTLY OR INDIRECTLY, IN, INTO OR FROM ANY JURISDICTION WHERE TO DO SO WOULD CONSTITUTE A VIOLATION OF THE RELEVANT LAWS OR REGULATIONS OF SUCH JURISDICTION FOR IMMEDIATE RELEASE THIS ANNOUNCEMENT CONTAINS INSIDE INFORMATION 10 August 2021 RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC. to be effected by means of a Scheme of Arrangement under Part 26 of the Companies Act 2006 Summary Further to the announcements made by NortonLifeLock Inc. (“NortonLifeLock”) and Avast plc (“Avast” or the “Company”) on 14 July 2021, the boards of NortonLifeLock and Avast are pleased to announce that they have reached agreement on the terms of a recommended merger of Avast with NortonLifeLock, in the form of a recommended offer by Nitro Bidco Limited (“Bidco”), a wholly- owned subsidiary of NortonLifeLock, for the entire issued and to be issued ordinary share capital of the Company (the “Merger”). It is intended that the Merger will be effected by means of a Court- sanctioned scheme of arrangement under Part 26 of the Companies Act (the “Scheme”). The boards of NortonLifeLock and Avast believe the Merger has compelling strategic logic and represents an attractive opportunity to create a new, industry leading consumer Cyber Safety business, leveraging the established brands, technical expertise and innovation of both groups to deliver substantial benefits to consumers, shareholders and other stakeholders. Under the terms of the Merger, Avast Shareholders will be entitled to receive: for each Avast Share held: USD 7.61 in cash and 0.0302 of a New NortonLifeLock Share in respect of their entire holding of Avast Shares (the “Majority Cash Option”).
  • David Gennarelli, Director, Investor Relations Good Afternoon And

    David Gennarelli, Director, Investor Relations Good Afternoon And

    Q2 Fiscal 2005 Transcript David Gennarelli, Director, Investor Relations Good afternoon and thank you for joining us. With me today are John Thompson, Chairman of the Board, and CEO of Symantec and Greg Myers, Senior Vice President of Finance and CFO. In a moment, I will turn the call over to Greg. He will discuss our financial results for the fiscal second quarter, which ended October 1, 2004. He will also review the raised guidance for the December quarter and fiscal 2005 as outlined in the press release. John will then discuss highlights of our performance. This will be followed by a Q&A session. Today’s call is being recorded and will be available for replay on Symantec’s investor relations home page at symantec.com/invest. In addition to today’s press releases, a copy of our prepared remarks and supplemental financial information is also available on the IR website. Before we begin, I would like to remind everyone that some of the information discussed on this call, particularly our revenue and operating model targets for the coming quarter and fiscal year, contain forward-looking statements that involve risks and uncertainty. These statements are based on current expectations. Actual results may differ materially from those set forth in such statements. Additional information concerning factors that may cause actual results to differ is contained in the risk factor section of the Company’s previously filed form 10-Q. Lastly, in addition to reporting financial results in accordance with generally accepted accounting principles, or GAAP, Symantec reports non-GAAP financial results.
  • FORM 425 SYMANTEC CORP − SYMC Filed: January 20, 2005 (Period: )

    FORM 425 SYMANTEC CORP − SYMC Filed: January 20, 2005 (Period: )

    FORM 425 SYMANTEC CORP − SYMC Filed: January 20, 2005 (period: ) Filing of certain prospectuses and communications in connection with business combination transactions Filed by Symantec Corporation Pursuant to Rule 425 Under the Securities Act of 1933 And Deemed Filed Pursuant to Rule 14a−12 Under the Securities Exchange Act of 1934 Subject Company: VERITAS Software Corporation Commission File No.: 000−26247 This transcript contains forward−looking statements, including expectations regarding the post−closing integration of the businesses and product lines of Symantec and VERITAS and other matters that involve known and unknown risks, uncertainties and other factors that may cause actual results, levels of activity, performance or achievements to differ materially from results expressed or implied by this press release. Such risk factors include, among others: difficulties encountered in integrating merged businesses; uncertainties as to the timing of the merger; approval of the transaction by the stockholders of the companies; the satisfaction of closing conditions to the transaction, including the receipt of regulatory approvals; whether certain market segments grow as anticipated; the competitive environment in the software industry and competitive responses to the proposed merger; and whether the companies can successfully develop new products and the degree to which these gain market acceptance. Actual results may differ materially from those contained in the forward−looking statements in this press release. Additional information concerning these and other risk factors is contained in the Risk Factors sections of Symantec’s and VERITAS’ most recently filed Forms 10−K and 10−Q. Symantec and VERITAS undertake no obligation and do not intend to update these forward−looking statements to reflect events or circumstances occurring after the date of this press release.
  • Falconer Central School District Technology Plan

    Falconer Central School District Technology Plan

    FFaallccoonneerr CCeennttrraall SScchhooooll DDiissttrriicctt 2 East Avenue, North Falconer, NY 14733 (716) 665-6624 Fax (716) 665-9265 Contact: Terry English [email protected] Technology Plan URL: http://www.falconerschools.org/Page/2478 TTeecchhnnoollooggyy PPllaann JJuullyy 22001133--JJuunnee 22001166 TTaabbllee ooff CCoonntteennttss 1. Stakeholders (page 3) a. Board of Education b. Administrative Team c. Technology Committee 2. District Demographics (page 4) 3. Mission Statement (page 4) 4. Technology Vision Statement (page 4) 5. Technology Goals (pages 5-8) 6. Technology Curriculum (pages 9-12) a. NYS Common Core English Language Arts and Literacy b. NYS Common Core Mathematics c. ISTE Standards for Students d. ISTE Standards for Teachers e. ISTE Standards for Administrators 7. Curriculum Integration (page 13) 8. Student Achievement (page 13) 9. Parental Communications and Community Relations (page 13) 10. Professional Development (pages 14-15) 11. Infrastructure, Hardware, Technical Support, and Software (pages 15-16) 12. Technology Inventory (pages 17-20) 13. Monitoring and Evaluation (page 21) 14. Appendix (pages 22-27) a. Student Acceptable Use Policy b. Staff Acceptable Use Policy c. Children’s Internet Protection Act (Internet Safety/Internet Content Filtering Policy) d. Agreement For Staff Use Of Computerized Information Resources e. Student Agreement for District Computerized Information Resources f. Staff Technology Survey Sample Falconer Central School Technology Plan 2013-2016 2 SSttaakkeehhoollddeerrss Board of
  • SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity

    SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity

    SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPORT T Corporate Information N Board of Directors Tania Amochaev Donald E. Frischmann Rowan M. Trollope Former Chief Executive Officer Senior Vice President, Vice President, QRS Corporation Communications and Brand Management Security Management Solutions William T. Coleman III Dieter Giesbrecht Giuseppe Verrini Founder, Chairman and Senior Vice President, Vice President, Sales and Marketing, Chief Executive Officer Enterprise Administration Europe, Middle East, and Africa Cassatt Corporation Gail E. Hamilton Arthur W. Wong Franciscus Lion Executive Vice President, Vice President, Security Response Former Board Advisor and Global Services and Support Senior Executive Vice President N Investor Information ABN Amro Bank Thomas W. Kendra Senior Vice President, Worldwide Sales Annual Meeting David L. Mahoney The annual meeting of shareholders will be Former Co-Chief Executive Officer Rebecca A. Ranninger held on Wednesday, September 15, 2004 at McKesson HBOC Senior Vice President, Human Resources 8 a.m. at Symantec’s worldwide headquarters: 20330 Stevens Creek Blvd. Robert S. Miller Enrique T. Salem Senior Vice President, Gateway Solutions Cupertino, CA 95014 Former Chairman of the Board and (408) 517 8000 Chief Executive Officer Bethlehem Steel N Other Senior Executives Stock Exchange Listing Cosmo P. Battinelli Symantec’s common stock trades on George Reyes Vice President, Global Support the Nasdaq under the symbol SYMC. Chief Financial Officer Google Robert A. Clyde Transfer Agent Vice President, Chief Technology Officer EquiServe Trust Company, N.A. Daniel H. Schulman P.O. Box 219045 Chief Executive Officer Lily T. De Los Rios Kansas City, MO 64121 Virgin Mobile USA Vice President, Client Solutions www.equiserve.com (816) 843 4299 John W.
  • SYMANTEC CORPORATION (Exact Name of the Registrant As Speciñed in Its Charter) Delaware 77-0181864 (State Or Other Jurisdiction of (I.R.S

    SYMANTEC CORPORATION (Exact Name of the Registrant As Speciñed in Its Charter) Delaware 77-0181864 (State Or Other Jurisdiction of (I.R.S

    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ¥ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Fiscal Year Ended April 1, 2005 OR n TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the Transition Period from to . Commission File Number 0-17781 SYMANTEC CORPORATION (Exact name of the registrant as speciÑed in its charter) Delaware 77-0181864 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) IdentiÑcation No.) 20330 Stevens Creek Blvd., 95014-2132 Cupertino, California (zip code) (Address of principal executive oÇces) Registrant's telephone number, including area code: (408) 517-8000 Securities registered pursuant to Section 12(b) of the Act: None None (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: Common Stock, par value $0.01 per share, and Related Stock Purchase Rights (Title of class) Indicate by check mark whether the registrant (1) has Ñled all reports required to be Ñled by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to Ñle such reports), and (2) has been subject to such Ñling requirements for the past 90 days. Yes ¥ No n Indicate by check mark if disclosure of delinquent Ñlers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in deÑnitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.
  • Download Guide

    Contents About This Guide............................................................................................................1 Who is This Guide For? ..............................................................................................1 Using the Guide ..........................................................................................................1 How This Guide Will Help You to Do Your Job............................................................2 What You Will Be Able to Do With This Guide.............................................................2 Before You Begin — A Note About Windows ..............................................................2 Standard 1: Establish Strategy, Policies, and Documentation......................................3 Section 1: Technology Strategy and Planning .............................................................4 Why Do I Need a Technology Strategy? .....................................................................4 What is a Technology Strategy? .................................................................................4 How Do I Develop a Technology Strategy?.................................................................5 Developing Your Technology Strategy ........................................................................6 Section 2: Inventory and Assess Your Technology Resources................................10 Why Document Your Technology Resources?..........................................................10 What to Document ....................................................................................................11
  • Q1 2021 Nortonlifelock Inc Earnings Call on August 06, 2020 / 9:00PM

    Q1 2021 Nortonlifelock Inc Earnings Call on August 06, 2020 / 9:00PM

    THOMSON REUTERS STREETEVENTS EDITED TRANSCRIPT NLOK.OQ - Q1 2021 NortonLifeLock Inc Earnings Call EVENT DATE/TIME: AUGUST 06, 2020 / 9:00PM GMT OVERVIEW: Co. reported 1Q21 revenues of $614m and non-GAAP diluted EPS of $0.31. Expects 2Q21 non-GAAP revenues to be $615-625m and non-GAAP EPS to be $0.31-0.35. THOMSON REUTERS STREETEVENTS | www.streetevents.com | Contact Us ©2020 Thomson Reuters. All rights reserved. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is prohibited without the prior written consent of Thomson Reuters. 'Thomson Reuters' and the Thomson Reuters logo are registered trademarks of Thomson Reuters and its affiliated companies. AUGUST 06, 2020 / 9:00PM, NLOK.OQ - Q1 2021 NortonLifeLock Inc Earnings Call CORPORATE PARTICIPANTS Natalie Marie Derse NortonLifeLock Inc. - CFO Soohwan Kim NortonLifeLock Inc. - Head of IR Vincent Pilette NortonLifeLock Inc. - CEO & Director CONFERENCE CALL PARTICIPANTS Fatima Aslam Boolani UBS Investment Bank, Research Division - Associate Director and Equity Research Associate Technology-Software Keith Weiss Morgan Stanley, Research Division - Equity Analyst Saket Kalia Barclays Bank PLC, Research Division - Senior Analyst Walter Herbert Pritchard Citigroup Inc., Research Division - MD & U.S. Software Analyst Yi Fu Lee Oppenheimer & Co. Inc., Research Division - Associate PRESENTATION Operator Ladies and gentlemen, thank you for standing by, and welcome to the fiscal 1Q '21 earnings call. (Operator Instructions) Please be advised that today's conference is being recorded. (Operator Instructions) I would now like to hand the conference over to your speaker today, Soohwan Kim, Head of Investor Relations. Please go ahead, sir. Soohwan Kim - NortonLifeLock Inc.