Verified Document

Shareholders, Managers And Employees Are Term Paper

The main fundamentals behind this growth strategy were favorably exploited by Symantec's CEOs in the recent years. For example, answering the question 'Why is Symantec's strategy to become a full service security company while others in the market are just focusing on single areas for future development, such as antivirus?' Of a journalist, Symantec's chairman and CEO John W. Thompson, answered: 'Look at some of the market leaders from a few years ago which were focused on a single technology. Today they find their businesses stalled. Companies that specialise in firewalls today face low growth and few new customers. If you close your eyes to the emerging threat landscape your ability to service customers is limited. The nature of today's threats means that antivirus technology alone is not enough; you need a combination of tightly integrated technologies operating at each tier of the network'. Another fundamentals behind this strategy can be traced in the words of Symantec officials on their competitiveness, presented at the beginning of this essay.

The second successful rapid growth strategy is mass market development strategy which involves reconfiguring a manufactured product that changes expectations revealing a new, mass market potential. The potential market needs to be developed over time and regulatory, cultural, transportational, production and cost barriers need to be overcome, as the potential market becomes known to the firm, it must consolidate it and keep out potential entrants. The main implementation methods are reduction of costs and prices to appeal to a mass market and using aggressive marketing strategies.

The third is increasing value to select customers strategy and maximize their profits on selected customers. The fourth strategy is knows as the distributions innovation strategy which can be used by the newcomers to the industry to break into the market segments which have been underserved by the incumbents. The already existing companies in this market area dominate some channels and they do not want to break the existing relations by introducing new channels.

This refers to international markets and a new company trying to enter it and distribution innovations may depend on facilitating technical change such as credit card usage, efficient postal systems, telephone penetration, and Internet access. The fundamental point for implementing this strategy is understanding the weaknesses of the operations and services of already existing companies in this very market segments and then exploiting existing channels them with innovation and adjusting for the possible mistakes.

The fifth, or the acquisition and consolidation strategy, can be pursued in fragmented industries composed of numerous firms. Industry deregulation and innovation create market disequilibrium that encourages acquisition and consolidation because deregulation increases competition and weakens many firms, that may merge to reduce costs and to increase their market power. Innovations in technology or operating methods can create untapped scale economies in specific functions that firms pursue through consolidation after acquisition. This strategy was successfully applied by Symantec lately and thus deserves consideration.

The first step is to develop new business model and acquisition target profile by identifying sources of scale economies in the industry; defining functions to integrate, to decentralize, to outsource, and insource after acquisitions, developing a profile of ideal acquisition targets; making acquisitions early to obtain choice picks and lower prices; benchmarking post-acquisition rub-off benefits.

The second step in the acquisition and consolidation strategy is refocusing acquisitions to fit new business model by: integrating functions that have scale economies; retaining management talent in acquired companies or bringing in specialized talent; decentralizing functions where acquisitions have an edge; outsourcing functions where parent and acquisition have limited resources; insourcing functions where firm has an edge that were previously outsourced because of small scale; investing in human resources and infrastructure to improve productivity; extending new business model to acquisitions; refocusing acquisitions on market growth segments; developing and cross-selling related products and services.

The final stage is to further enhance acquisition capabilities of parent by: using new technologies to manage larger volume; targeting and developing relationships with larger suppliers and customers; elevating role of investor relations and providing forward looking information; investing in more acquisitions with greater capital resources of parent. When implementing this strategy, it is vitally important to keep strong investor relations and upgrade all the information for the financial community to maintain their interest in the company.

All the growth strategies are supported by scale, scope and/or time-based advantages and each strategy has its' own mix of the multiple advantages. Scale advantages refer to lower unit costs that occur when increasing the volumes of production/services as well as higher prices permitted by stronger market...

The scope advantages relate to domain of the firm's customer, market, product, geographic, and technology segments and change in it which allows to shift the shared cost structure, customer benefits such as bundling and interoperability, and firm growth prospects tied to growth of the underlying segments. Time-based advantages encompass first mover effects, such as wider choice of resources and longer time to learn or build a reputation, as well as benefits associated with reduced cycle time, and quicker diffusion. To make a recapitulation, Symantec's recent corporate strategy possesses fundamentals of proliferation, mass market development, acquisition and consolidation strategies and they are recapitulated in Table 1.
Table 1. Sources of Advantages Within Symantec's Growth Strategies.

Strategy

Source of advantage

Scale

Scope

Time

Product Proliferation

Low unit production anddistribution costs, global demand

Consistency and umbrella brand across products; Cross-selling products and markets

Early domination of product category, quick product development and diffusion

Mass Market Development

Reconfigure product to have mass market demand

Broaden geographic scope; Outsource functions to reduce costs and increase capacity

Develop policies that travel; Use alliances to hasten international expansion

Acquisition and Consolidation

Capture scale economies in various functions enabled with larger firm size after acquisition; Develop relationships with larger buyers and suppliers

Reorient acquisition toward growth market segments; Reevaluate outsourcing decisions in all functions after acquisition; Cross-sell products and markets across acquisitions; Invest in new technologies that help to manage larger firm.

Start integration process early to hasten returns from acquisitions.

Along with product proliferation and mass market development strategies, the acquisition and consolidation strategy plays a vital role and is articulated in company literature. 'One cornerstone of Symantec's strategy is the pursuit of acquisitions as a way to supplement its in-house product development in the three major categories of development tools, utilities and productivity applications'. Since late 1989, Symantec has acquired more than 22 software companies. 'Mergers and acquisitions (M&a) is an important business process for the company in moving toward its goals. Symantec combines with other companies that have complementary strengths to our own. By combining, Symantec can do more than either company could do on its own. The combined entity becomes a more attractive long-term partner for our customers'. Furthermore, the comment on Symantec's latest integration with Veritas is that it will make the corporation more diversifiable, thus reducing unique risks due to volatile demand and less vulnerable to incoming Microsoft's move into the segment market where Symantec competes.

The major obstacles that Symantec managers face when planning the acquisition, are the market risk, especially in emerging markets with rapidly changing competitive landscapes which makes the matter of whether the customer will buy the product questionable; the product risk with increasingly complex development challenges and shortened product life cycles -- will the product work properly; and finally, the people risk because the entrepreneurial challenge is often far different from that of a more mature software company -- will the acquired talent stay on hand, and do they truly understand the market and technology challenges they face? In order to evaluate the possible acquisition precisely and then carry it out property, Symantec managers have developed their acquisition philosophy, which possesses the following general points: partner with companies that are best in their class; remember that this is a selling process from the first conversation with the acquisition prospects through the close of the deal, thus just keep selling; be open and respectful of the ideas and processes developed by partner; manage the people issues in acquisition aggressively and candidly. As for the financial goals, they are set: ensure that the financial analysis of the merger becomes the budget for the new group and sustain revenue momentum during the integration process.

With the years of experience, Symantec has developed its' acquisition strategy into a disciplined approach. The first step is prospecting the acquisition deal with includes deal desirability and feasibility review. The second stage is scrubbing which implies detailed due diligence and announcement preparation. Finally, the integration stage encompasses building working relationships. The driving factor for the success of the Symantec's acquisition strategy is that the analysis does not stop after the acquisition date, but actual performance after acquisition is monitored thoroughly and compared to the predicted projections. This post-deal analysis makes…

Sources used in this document:
References

Benjamin Gomes-Casseres, "Do You Really Have an Alliance Strategy?" Strategy & Leadership, v26:4 Sep-Oct 1998, 6-11

Bhide a. 1999. The Origin and Evolution of New Businesses. Oxford University Press: Oxford, UK.

Briance Mascarenhas and Arun Kumaraswamy, Five Strategies for Rapid Firm Growth and How to Implement Them, Managerial and Decision Economics, 23, 2002, pp. 317-330.

BusinessWeek Online, Symantec's Thompson: "I Can't Wait to Compete...," Friday March 11, 3:58 PM ET, by Sarah Lacy in San Mateo, Calif., with Steve Hamm in New York
Computing Canada, Sept 14, 1998, Kevin Restivo, http://www.findarticles.com/p/articles/mi_m0CGC/is_n34_v24/ai_21121679
Dan Neel, Symantec's Expected Acquisition of Veritas Reflects Changes in the Security Game, http://www.itutilitypipeline.com/news/55800364
Data available at http://phx.corporate-ir.net/phoenix.zhtml?c=89422&p=irol-homeprofile
Harvard Management Update. 1996. The Latest thinking on Growth, No. U9606B. http://biz.yahoo.com/bizwk/050311/b3925093mz063_1.html
Iain Thompson, Security: The Bigger Picture, available at http://www.vnunet.com/analysis/1157848
Industry Analysis a la Michael Porter, Fred Nickols, 2000, available at http://home.att.net/~nickols/five_forces.htm
Symantec, Annual Review, 2004, available at http://media.corporate-ir.net/media_files/irol/89/89422/FileUpload/Symantec_2004_AnnualReport.pdf
Symantec, McAfee Launch Enterprise Anti-Spyware Tools at RSA, http://www.techweb.com/wire/security/60400657,Gregg Keizer, TechWeb News
Symantec's strategy shift, Paul Roberts, http://reseller.co.nz/news.nsf/UNID/4B973C5635DA18C8CC256FAA000825C7
Data available at http://phx.corporate-ir.net/phoenix.zhtml?c=89422&p=irol-homeprofile
Symantec, Annual Review, 2004, available at http://media.corporate-ir.net/media_files/irol/89/89422/FileUpload/Symantec_2004_AnnualReport.pdf
Industry Analysis a la Michael Porter, Fred Nickols, 2000, available at http://home.att.net/~nickols/five_forces.htm
Iain Thompson, Security: The Bigger Picture, available at http://www.vnunet.com/analysis/1157848
http://biz.yahoo.com/bizwk/050311/b3925093mz063_1.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Managers As Professionals Management As
Words: 3443 Length: 10 Document Type: Term Paper

It can be argued that from a responsibility standpoint, it is only money and can be replaced. Therefore, the risk associated with the actions of the manager do not compare with other professional fields. It would appear that licensure is not necessary, nor is a particular body of knowledge in order to become a successful manager. Morality and Managers We have demonstrated that managers do not have to possess a standardized

Managers Spend Approximately 25 of
Words: 1815 Length: 6 Document Type: Term Paper

E. telling someone that you think he is still discontent), paraphrasing the emotion that the other expresses, and encouraging emotional perspective taking (with questions like "how would you feel about this in the future?" Or attempting to convey the emotion of the other party). In short, emphasis on emotion should be placed forefront in the mediation session and the underlying emotions should be uncovered and dealt with in order that

Culture Pervasiveness and the Difficulty of Defining
Words: 5510 Length: 19 Document Type: Essay

Culture pervasiveness and the difficulty of defining it is one of the reasons why it is attributed for many merger failures. The problem considered in this study was the unstable operating environment that existed following the acquisition of INTEC Engineering by Worley Parsons which was likely caused by differences in organizational cultures. WorleyParsons acquired SEA Engineering in 2007 and INTEC Engineering April 2008 and combined these organizations to form INTECSEA.

Organization 25 Employees Worked, Em-Ployed, a -Employer
Words: 2657 Length: 9 Document Type: Essay

organization 25 employees worked, em-ployed, a -employer organization . Using congruence framework, analyze organization 12 components model: history, environment, resources, & strategy (inputs); task, informal & formal organization, & individuals (throughputs); individual, group, & organizational outputs; feedback loop. Organizational congruence The congruence model as put forth by Nadler and Tushman (1980) suggests that organizations need to have a particular degree of consistency and fit for twelve components in order to achieve success

Ethics the Manager or Managers
Words: 601 Length: 2 Document Type: Essay

408). If what Berenbeim states as truth, is true, then it is important to the business community as well as specific business' to have employees that understand the difference(s) between ethical and unethical behavior. The question then remains, where would these employees acquire that knowledge. Many students of business could be missing a key component to their future success by not having access to ethical studies and training. Therefore,

Incentive Plans Cannot Work Employees
Words: 326 Length: 1 Document Type: Term Paper

From different studies and research paper conducted in the field, we find out that employees feel manipulated to do a certain assignment, which his superior could not do or does not want to do it. For this reason, he is entitled to an additional sum of money, bonuses and other motivational elements. Also, on the long-term, people will tend to lose focus on what makes them perform their daily

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now