Norton Anti-Virus, Made By Symantec Research Paper

PAGES
2
WORDS
720
Cite

With the sophistication of computer users generally increasing, the corporate market forms an important part of the customer base as these users are a more captive audience. One sale to an it department can be worth hundreds of licenses. However, Norton is weak in the corporate market and competes mainly in the consumer market at present. Demand for Norton products is declining. While Symantec overall has continued to grow in size, acquisitions and other business segments have spurred this growth (2009 Symantec Form 10-K). From 2007 to 2008, Norton revenue grew 7.2%, but the market share declined as the overall security software market increased 19.4% by revenue (Gartner, 2009). The market is trending towards increased fragmentation. The share of minor players in the industry has increased from 48% of the market in 2007 to 50.9% of the market in 2008. McAfee has increased its market share slightly, while each of the other largest players in security software has seen its market share decrease. Consumers are increasingly willing to explore their options.

In an attempt to reverse this trend, producers are experimenting with different distribution channels. For example, Norton has struck a deal with Comcast to provide its software to that company's Internet subscribers (Trefis,...

...

This hints at another trend as well. These customers will already have a security suite installed by their OEM. Firms in the industry therefore are competing directly against one another on each machine. Rather than surrendering a customer at the OEM level, firms are finding new ways to reach customers such that every consumer is essentially faced with multiple security software options, even without seeking them out.
Works Cited:

Gartner Inc. (2009). Symantec market share falls; McAfee's shows growth. The Windows Club. Retrieved March 16, 2010 from http://www.thewindowsclub.com/symantec-market-share-falls-mcafees-shows-growth

2009 Symantec Form 10-K. Retrieved March 16, 2010 from http://phx.corporate-ir.net/External.File?item=UGFyZW50SUQ9MzQ3OTU4fENoaWxkSUQ9MzM2NTY1fFR5cGU9MQ==&t=1

Trefis. (2010). Comcast deal can slow Symantec's market share declines. Trefis.com. Retrieved March 16, 2010 from http://www.trefis.com/articles/11016/comcast-and-quest-deals-could-plug-symantec%E2%80%99s-market-share-declines-temporarily/2010-03-04

Weiner, K. (2009). Symantec and McAfee is arms race in PC security market. Neowin.net. Retrieved March 16, 2010 from http://www.neowin.net/news/symantec-and-mcafee-in-arms-race-for-security

Sources Used in Documents:

Works Cited:

Gartner Inc. (2009). Symantec market share falls; McAfee's shows growth. The Windows Club. Retrieved March 16, 2010 from http://www.thewindowsclub.com/symantec-market-share-falls-mcafees-shows-growth

2009 Symantec Form 10-K. Retrieved March 16, 2010 from http://phx.corporate-ir.net/External.File?item=UGFyZW50SUQ9MzQ3OTU4fENoaWxkSUQ9MzM2NTY1fFR5cGU9MQ==&t=1

Trefis. (2010). Comcast deal can slow Symantec's market share declines. Trefis.com. Retrieved March 16, 2010 from http://www.trefis.com/articles/11016/comcast-and-quest-deals-could-plug-symantec%E2%80%99s-market-share-declines-temporarily/2010-03-04

Weiner, K. (2009). Symantec and McAfee is arms race in PC security market. Neowin.net. Retrieved March 16, 2010 from http://www.neowin.net/news/symantec-and-mcafee-in-arms-race-for-security


Cite this Document:

"Norton Anti-Virus Made By Symantec" (2010, March 16) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/norton-anti-virus-made-by-symantec-661

"Norton Anti-Virus Made By Symantec" 16 March 2010. Web.19 April. 2024. <
https://www.paperdue.com/essay/norton-anti-virus-made-by-symantec-661>

"Norton Anti-Virus Made By Symantec", 16 March 2010, Accessed.19 April. 2024,
https://www.paperdue.com/essay/norton-anti-virus-made-by-symantec-661

Related Documents

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the

The market size for AAA Software based on PC usage can be estimated by the total number of new PC sales and the level of antivirus usage on them. The total PC usage during the corresponding year is shown in the figure. Source: http://www.etforecasts.com/products/ES_pcww1203.htm C3: Competitive Analysis- Describe your company's current competition. KEY DIFFERENTIATORS Registered/Head Office Czech Republic United States United States Slovak Republic United States Number of Users More than 150mn users NA NA NA NA Product Variants Home Users - Antivirus (Free, Pro and

The role of eCommerce in the success of Vapeusa, an eCommerce business that is B2B and B2C -- using a website to sell vaporizer products and accessories to consumers looking for an alternative way to smoke. The company uses Symantec safety and security for its sales and shows that all purchases and shipments are guaranteed by Norton Guarantee -- which is meant to give consumers peace of mind about doing

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and