David Hill

Network Computing Blogger


Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

See more from this blogger

Symantec 4.0: A New Strategy

Symantec reported revenues of $6.73 billion in fiscal year (FY) 2012 with a profit of $1.17 billion, and recently reported third quarter FY 2013 results were higher than Q3 2012. In fact, Steve Bennett, the company's president and CEO, stated, "We continue to deliver better than expected results."

So why the change? CEO Bennett said revision is necessary because "Our system is just broken." For instance, in analyst teleconferences the company admitted that only partially integrated acquisitions have resulted in a lot of redundant product silos. The company needs to cut duplicative activities, improve customer renewal rates, improve its slow decision-making processes and dissolve communications barriers. It should also want to address negative customer service criticism in 2012, as well as its internal security after intruders stole source code last year.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Symantec's expressed goal is to address underserved customer needs better than its competitors. This is not just talk; Symantec has defined specific action items. For example, it plans a business continuity value-added service, an effort that will take a minimum of six months to as much as two years to complete.

Tackling tough issues is a good thing as it can provide a competitive differentiation--if it works. However even if the problem proves intractable, it shows willingness to take risks--and to fail. The companies that succeed in the long run are those that accept inevitable failures but have enough successes to more than offset them.

What Symantec 4.0 Means

Let's look selectively at what Symantec is planning to do in its 4.0 effort -- product portfolio, reorganization, and financially.

On the product front, Symantec divides the competitive landscape into startups, specialists, and integrated stack providers. It views itself as a specialist (along with direct competitors such as Commvault and McAfee). It also competes with startups (such as Dropbox and Veeam) that focus on very specific products or services; and integrated stack providers (like IBM and Microsoft) that are platform-focused.

Symantec feels that it wins (and will continue to do so) by focusing on being "best of need," which it views as best of breed tailored to the customer, scale, integration and cross-platform.

An interjection: Symantec's "best of need" claim is something customers need to consider closely. General purpose software has swept the IT industry for a number of years now. So as a customer, you can choose parameters to tailor products to some extent, but there are limits. Going beyond the boundary conditions of your software to introduce enterprise-specific functionality may create problems (such as the inability to upgrade to a new release of software). There are ways to get around this, but they have to be examined carefully.

Symantec states that "best of need" efforts focus on addressing unmet, underserved requirements in three areas: user productivity and protection (simple solutions for home and work); information security (safety and compliance for businesses); and information management, availability and scalability (where business information and applications are kept up and running).

Symantec does not appear to be abandoning any products that fit into the three areas. However, the focus is to deliver ten new, integrated modular offerings over the next 6 to 24 months that fit into the above-mentioned categories:

Although Symantec will not rule out acquisitions, it plans to focus on organic growth, which includes an increase in R&D spending from 14% to 16%.

Next page: Reorganization


Page:  1 | 2  | Next Page »


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers