This excerpt taken from the SYMC 10-K filed May 24, 2007.
The security market consists of endpoint security; the protection and compliance of end-user devices such as desktop computers, laptops, and handhelds; data and messaging security; network security; and security services. Over the past several years, we have seen security threats continue to evolve from traditional viruses, worms, Trojan horses, and other vulnerabilities, and more recently from threats such as phishing (attacks that use spoofed websites and emails designed to record keystrokes or to fool recipients into divulging personal financial data), email fraud, and identity theft. We have also seen security rise to a top priority for enterprises as information security is increasingly linked to regulatory compliance. This evolution is a key driver of our research and development and acquisition strategies, as we strive to differentiate our solutions from the competition and address our customers changing needs.
As a result of our acquisition of Veritas in July 2005, we are now the leading supplier of hardware-independent storage software. The worldwide storage software market consists of storage management, server and application management, backup and archiving, and infrastructure software products and services. Key drivers of demand in this market include the ever-increasing quantity of data being collected, the need for data to be protected, recoverable, and accessible at all times, and the need for a growing number of critical applications to be continuously available and highly performing.
Other factors driving demand in this market include the increase in the number of Internet users, computing devices, companies conducting business online, the continuous automation of business processes, the on-going desire of organizations to manage their overall IT risk, the increasing pressure on companies to lower storage and server management costs while simultaneously increasing the utilization, availability levels, and performance of their existing IT infrastructure, and the increasing importance of document retention and regulatory compliance solutions.
For information regarding our revenue by segment, revenue by geographical area, and long-lived assets by geographical area, see Note 15 of the Notes to Consolidated Financial Statements. For information regarding the amount and percentage of our revenue contributed in each of our product categories and our financial information, including information about geographic areas in which we operate, see Item 7, Managements Discussion and Analysis of Financial Condition and Results of Operations and Note 15 of the Notes to Consolidated Financial Statements. For information regarding risks associated with our international operations, see Item 1A, Risk Factors.