Image | Name |
---|---|
Broadcom Corporation | |
![]() | Brocade Communications Systems, Inc. |
CA, Inc. (dba CA Technologies) | |
![]() | Symantec Corporation |
Image | Name |
---|---|
Broadcom Corporation | |
![]() | Brocade Communications Systems, Inc. |
CA, Inc. (dba CA Technologies) | |
![]() | Symantec Corporation |
The following list of related entities is generated by querying the nearest neighbors of embeddings generated using an extension of the methodology described in our report: Reports of a Silicon Valley/Military Divide Have Been Greatly Exaggerated . While the focus is on entities with similar contracting patterns, this is not meaningful for companies which have few direct federal contracts. We therefore augment the contracting co-occurrence scores using the SEC peer groups described in our second report, Death and Taxes, along with manually curated official partnerships and term cooccurrences scraped from our large manually curated database of websites affiliated with each company.
(Primary) Effective Taxation over FY2005-2019 | |
---|---|
(Primary) Income before income taxes | 11.02 Billion USD |
(Primary) Provision for income taxes | -7.74 Billion USD |
(Primary) Provision for income taxes (w/o one-time TCJA payments) | -7.74 Billion USD |
(Primary) Effective tax rate | -70.27% |
(Primary) Effective tax rate (w/o one-time TCJA payments) | -70.27% |
We acquired the Symantec Business to expand our footprint of mission critical infrastructure software with our existing customer base. The Symantec Business includes a deep and broad mix of products, services and solutions, unifying cloud and on-premises security to provide advanced threat protection and information protection across endpoints, network, email and cloud applications. The key components of the Symantec Business include:
- Data Loss Prevention: Data access governance, activity monitoring, threat detection, and remediation solutions that enable security access to cloud applications.
- Endpoint Protection: A single agent architecture that delivers multi-layered security across endpoints - desktop, server, mobile and Internet of Things ("IoT") - and enables customers to protect enterprise and mobile workforces, regardless of operating system, device or network security approaches.
- Network Security: Cloud and on-premises network security solutions, based on an advanced proxy architecture, that provide superior defense against advanced threats, enable users to protect critical business information, and help ensure secure and compliant use of cloud applications and the web.
- Email Security: Multiple layers of protection (including threat isolation and advanced analytics) against ransomware, spear phishing, and enterprise email compromise that help to identify targeted attacks and enable users to protect email against user error and data leakage.
- Cloud Application Security: Advanced solutions that secure cloud access, cloud infrastructure, and cloud applications, providing in-depth visibility, data security, and threat protection to safeguard users, information and workloads across public and private clouds.
The following peer group is defined for executive
compensation purposes and includes companies which
are either competing in the same industry or for
the same employees/board members, have similar
regulatory dynamics, or a combination thereof.
The following competitor group is defined by
members of the listed group of companies choosing
(in an SEC filing) Broadcom Inc. as sectoral
competitor
rather than due to employee/board or regulatory
similarities.
Image | Name |
---|---|
Cisco Systems, Inc. |
The following peer group is defined by members of
the listed group choosing (in an SEC filing)
Broadcom Inc. for executive
compensation purposes, competing in the same
industry, for the same employees/board members,
having similar regulatory dynamics, or a
combination thereof.