IncFact
Company Profiles: Revenue, Growth, Competition

NORTONLIFELOCK Revenue, Growth & Competitor Profile

DBA SYMANTEC
DBA SYMANTEC CORPORATION GLOBAL BENEFITS
Last updated:

Company Awards

Big Fish
Big Fish
Brain Power (IP)
Patent/Trademark IP
 

Company Profile & Annual Report for Nortonlifelock

Access the complete profile.

Nortonlifelock Fast Facts

Revenue$100 - $500 million    See Exact Annual Revenue
EmployeesOver 1,000Exact Company Size
Primary Industry5415 Information Technology & Computer Systems
Address60 E Rio Salado Pkwy
10th Floor
Tempe, AZ 85281

symantec.com
Note: Revenues for privately held companies are statistical evaluations.


Nortonlifelock's annual revenues are $100-$500 million (see exact revenue data) and has over 1,000 employees. It is classified as operating in the Information Technology & Computer Systems industry.


Nortonlifelock's Annual Report & Profile shows critical firmographic facts:
  • What is the company's size? (Annual sales and employees)
  • What industry is the company in?

Nortonlifelock Annual Revenue and Growth Rate

Nortonlifelock Revenue Est.
($ Million)
Growth Rate (%)# Employees
2023 Details in Premium Report
2022
2021
2020
2019


1-Year Growth Rate:
3-Year Growth Rate (CAGR):
Premium Report

Note: Nortonlifelock's revenues are gauged from an analysis of company filings.



Nortonlifelock's Income Statement (based on Industry Averages)

$ Millions
(Industry Average)
Nortonlifelock Revenue (Sales) Nortonlifelock Premium Report
Cost of Goods Sold
Gross Profit

Operating Expenses
Advertising
Salaries and wages
Other Operating Expenses
Total Operating Expenses
Operating Income
EBITDA
EBIT (Earnings Before Interest and Taxes)
Net Profit
 


Trademark Applications

Trademark applications show the products and services that Nortonlifelock is developing and marketing. Nortonlifelock doesn't have any recent trademark applications, indicating Nortonlifelock is focusing on its existing business rather than expanding into new products and markets. Trademarks may include brand names, product names, logos and slogans.

Trademark Date
LIFELOCK BY NORTON
Downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing and configuring computers; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; Internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer application software for use in anonymous browsing, encryption, antitracking protection, network protection, and privacy protection; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, gaming account credential theft, investment account activity, social media account takeovers, phone number takeovers, home title records scanning, and court records scanning; downloadable computer and mobile application software for use in security and location surveillance relating to individuals; downloadable software that allows others to share computing processing power over a network; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
11/10/2021
OPT-IN TO CYBER SAFETY
Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network
02/12/2021
NORTONLIFELOCK
Downloadable computer antivirus software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs; downloadable computer optimization software, namely, software that enhances computer processing power; downloadable computer software for providing computer intrusion detection and prevention; downloadable computer software for providing network, Internet, and computer security; downloadable computer software for providing online identity protection and parental control; downloadable computer software for providing online transaction security; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer software for the back-up, storage, restoration and recovery of data, folders, and files; downloadable computer software to prevent, diagnose, and repair computer problems; downloadable content filtering software; downloadable computer programs for data communications applications, and for the encryption and authentication of electronic information; downloadable computer software for diagnosing, repairing and configuring computers; downloadable computer application software for mobile phones, tablets, portable media players, and handheld computers, namely, software for use in anonymous browsing that provides secure and private access for users to the internet, software that encrypts electronic data for transmission through a secure and private connection over the internet, software that provides blocking from targeted advertising, and software for compressing data; downloadable computer software for detecting identity fraud; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for encrypting and authenticating data; downloadable computer software for encryption; downloadable computer software for providing identity security; downloadable computer software for providing cryptographic network security and data security functions; downloadable computer software for the creation of virtual private networks; downloadable computer software for use in analysis and reporting of firewall log data; downloadable computer software for use in detecting malware; downloadable computer software for use in monitoring computers for security purposes; downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable computer software for updating other computer software; downloadable computer software for use in vulnerability scanning of networks and websites; downloadable computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable computer utility software for removal of computer applications and software; downloadable electronic publications in the nature of manuals, instruction manuals, teaching manuals, and newsletters in the field of computer software and computer and on-line security; downloadable software for the creation of firewalls; downloadable fraud protection software, namely, software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, and credit fraud; Internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable privacy control software, namely, software for use in protecting and safeguarding online identity, privacy, data and information; downloadable computer application software for mobile devices, namely, software for researching suspicious applications; downloadable software for analyzing privacy threats and detecting malware and other system vulnerabilities for computers and mobile devices; downloadable computer software for detecting, blocking, and intercepting targeted advertising; downloadable computer software for storing and retrieving login credentials securely and generating strong passwords; downloadable computer software for tracking and managing personal and private identity data entered on websites; downloadable computer application software that tracks, manages, and reports expenses, credit scores, financial account information, and commercial transactions; downloadable mobile application software that enables users to monitor for identity theft and track their credit scores; downloadable mobile application software that enables users to respond to identity theft and credit fraud alerts and to contact support service representatives by instant message or telephone for assistance in reporting and remediating the theft or fraud; downloadable mobile application software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, investment account activity, home title records scanning, and court records scanning; downloadable electronic publications in the nature of user manuals and instructional guides supplied with all of the foregoing
11/04/2019

See all trademarks and details in the Full Report.


Recession Risk

Determine whether Nortonlifelock grew or shrank during the last recession. This is useful in estimating the financial strength and credit risk of the company. Compare how recession-proof Nortonlifelock is relative to the industry overall. While a new recession may strike a particular industry, measuring the industry and company's robustness during the last recession estimates its ability to weather future recessions.



U.S. Industry Overview & Market Statistics:
Information Technology & Computer Systems

Publisher: AnythingResearch

  • Market Size
  • Growth Rate
  • 5-Year Market Forecast
  • Average Company Size & Growth
  • Salary & Compensation Benchmarks



Market Share of Nortonlifelock's Largest Competitors

A competitive analysis shows these companies are in the same general field as Nortonlifelock, even though they may not compete head-to-head. These are the largest companies by revenue. However, they may not have the largest market share in this industry if they have diversified into other business lines. The "Competition" section of a business plan or investment memorandum would start by analyzing the information about these companies. Competitive advantage comes from offering better pricing or superior products/service.

Company HeadquartersRevenue ($ MM)
NVIDIASanta Clara, CA100 
INNOVA SOLUTIONSDuluth, GA80 
GOOGLEMountain View, CA73 
INTERNATIONAL BUSINESS MACHINESYorktown Heights, NY50 
PAYPAL HOLDINGSSan Jose, CA48 
ORACLERedwood Shores, CA46 
ORACLE AMERICARedwood City, CA43 
TATA AMERICA INTERNATIONALNew York, NY41 
COGNIZANT TECHNOLOGY SOLUTIONSTeaneck, NJ32 




Nearby Competitors

These companies are similar in business line and location to Nortonlifelock. While some companies compete with neighboring businesses for customers, other companies may compete to attract skilled employees.

Company HeadquartersRevenue ($ MM)
GODADDY.COMTempe, AZ100 
BLUE YONDERScottsdale, AZ36 
NORTONLIFELOCKTempe, AZ24 
IT1 SOURCETempe, AZ20 
CREXENDOTempe, AZ14 
DINE DEVELOPMENTScottsdale, AZ13 




Future Competition: Nortonlifelock's Fastest Growing Competitors

These companies are in the same general field as Nortonlifelock and are rapidly expanding. Companies may grow organically or through acquisition. In some cases apparently high growth rates may be caused by data that weren't available in previous years.

CompanyRevenue ($ MM)
Nortonlifelock Competitors