×




Network Associates: Securing the Internet SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

Case Study SWOT Analysis Solution

Case Study Description of Network Associates: Securing the Internet


Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would begin selling powerful encryption software from its Dutch subsidiary. Such a move looked to the U.S. government like a violation of export regulations, but the company was confident it had operated within the bounds of law. Indeed, Network Associates appeared to have deftly exploited the uncertain nature of government regulation in a time of rapidly changing technology. Encryption export regulations had become highly controversial in the mid-1990s, and were the subject of ongoing legislative debate in 1998. While the regulations had been slowly evolving toward permissiveness, the pace of change did not meet the expectations of many companies in Silicon Valley. Network Associates was the first company to boldly challenge the export regulations and assert its commercial rights to sell its encryption products to foreign users. While such a move gave the company distinct first-mover advantages, it was also a strategy that contained significant political risks.

Authors :: Jennifer Burns, Debora L. Spar

Topics :: Global Business

Tags :: Government, Internet, Security & privacy, SWOT Analysis, SWOT Matrix, TOWS, Weighted SWOT Analysis

Swot Analysis of "Network Associates: Securing the Internet" written by Jennifer Burns, Debora L. Spar includes – strengths weakness that are internal strategic factors of the organization, and opportunities and threats that Encryption Associates facing as an external strategic factors. Some of the topics covered in Network Associates: Securing the Internet case study are - Strategic Management Strategies, Government, Internet, Security & privacy and Global Business.


Some of the macro environment factors that can be used to understand the Network Associates: Securing the Internet casestudy better are - – challanges to central banks by blockchain based private currencies, cloud computing is disrupting traditional business models, increasing commodity prices, wage bills are increasing, there is increasing trade war between United States & China, competitive advantages are harder to sustain because of technology dispersion, increasing inequality as vast percentage of new income is going to the top 1%, central banks are concerned over increasing inflation, supply chains are disrupted by pandemic , etc



12 Hrs

$59.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now

24 Hrs

$49.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now

48 Hrs

$39.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now







Introduction to SWOT Analysis of Network Associates: Securing the Internet


SWOT stands for an organization’s Strengths, Weaknesses, Opportunities and Threats . At Oak Spring University , we believe that protagonist in Network Associates: Securing the Internet case study can use SWOT analysis as a strategic management tool to assess the current internal strengths and weaknesses of the Encryption Associates, and to figure out the opportunities and threats in the macro environment – technological, environmental, political, economic, social, demographic, etc in which Encryption Associates operates in.

According to Harvard Business Review, 75% of the managers use SWOT analysis for various purposes such as – evaluating current scenario, strategic planning, new venture feasibility, personal growth goals, new market entry, Go To market strategies, portfolio management and strategic trade-off assessment, organizational restructuring, etc.




SWOT Objectives / Importance of SWOT Analysis and SWOT Matrix


SWOT analysis of Network Associates: Securing the Internet can be done for the following purposes –
1. Strategic planning using facts provided in Network Associates: Securing the Internet case study
2. Improving business portfolio management of Encryption Associates
3. Assessing feasibility of the new initiative in Global Business field.
4. Making a Global Business topic specific business decision
5. Set goals for the organization
6. Organizational restructuring of Encryption Associates




Strengths Network Associates: Securing the Internet | Internal Strategic Factors
What are Strengths in SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

The strengths of Encryption Associates in Network Associates: Securing the Internet Harvard Business Review case study are -

Organizational Resilience of Encryption Associates

– The covid-19 pandemic has put organizational resilience at the centre of everthing that Encryption Associates does. Organizational resilience comprises - Financial Resilience, Operational Resilience, Technological Resilience, Organizational Resilience, Business Model Resilience, and Reputation Resilience.

Low bargaining power of suppliers

– Suppliers of Encryption Associates in the sector have low bargaining power. Network Associates: Securing the Internet has further diversified its suppliers portfolio by building a robust supply chain across various countries. This helps Encryption Associates to manage not only supply disruptions but also source products at highly competitive prices.

Successful track record of launching new products

– Encryption Associates has launched numerous new products in last few years, keeping in mind evolving customer preferences and competitive pressures. Encryption Associates has effective processes in place that helps in exploring new product needs, doing quick pilot testing, and then launching the products quickly using its extensive distribution network.

Diverse revenue streams

– Encryption Associates is present in almost all the verticals within the industry. This has provided firm in Network Associates: Securing the Internet case study a diverse revenue stream that has helped it to survive disruptions such as global pandemic in Covid-19, financial disruption of 2008, and supply chain disruption of 2021.

Digital Transformation in Global Business segment

- digital transformation varies from industry to industry. For Encryption Associates digital transformation journey comprises differing goals based on market maturity, customer technology acceptance, and organizational culture. Encryption Associates has successfully integrated the four key components of digital transformation – digital integration in processes, digital integration in marketing and customer relationship management, digital integration into the value chain, and using technology to explore new products and market opportunities.

Ability to lead change in Global Business field

– Encryption Associates is one of the leading players in its industry. Over the years it has not only transformed the business landscape in its segment but also across the whole industry. The ability to lead change has enabled Encryption Associates in – penetrating new markets, reaching out to new customers, and providing different value propositions to different customers in the international markets.

Sustainable margins compare to other players in Global Business industry

– Network Associates: Securing the Internet firm has clearly differentiated products in the market place. This has enabled Encryption Associates to fetch slight price premium compare to the competitors in the Global Business industry. The sustainable margins have also helped Encryption Associates to invest into research and development (R&D) and innovation.

Operational resilience

– The operational resilience strategy in the Network Associates: Securing the Internet Harvard Business Review case study comprises – understanding the underlying the factors in the industry, building diversified operations across different geographies so that disruption in one part of the world doesn’t impact the overall performance of the firm, and integrating the various business operations and processes through its digital transformation drive.

Highly skilled collaborators

– Encryption Associates has highly efficient outsourcing and offshoring strategy. It has resulted in greater operational flexibility and bringing down the costs in highly price sensitive segment. Secondly the value chain collaborators of the firm in Network Associates: Securing the Internet HBR case study have helped the firm to develop new products and bring them quickly to the marketplace.

Cross disciplinary teams

– Horizontal connected teams at the Encryption Associates are driving operational speed, building greater agility, and keeping the organization nimble to compete with new competitors. It helps are organization to ideate new ideas, and execute them swiftly in the marketplace.

Learning organization

- Encryption Associates is a learning organization. It has inculcated three key characters of learning organization in its processes and operations – exploration, creativity, and expansiveness. The work place at Encryption Associates is open place that encourages instructiveness, ideation, open minded discussions, and creativity. Employees and leaders in Network Associates: Securing the Internet Harvard Business Review case study emphasize – knowledge, initiative, and innovation.

Superior customer experience

– The customer experience strategy of Encryption Associates in the segment is based on four key concepts – personalization, simplification of complex needs, prompt response, and continuous engagement.






Weaknesses Network Associates: Securing the Internet | Internal Strategic Factors
What are Weaknesses in SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

The weaknesses of Network Associates: Securing the Internet are -

Increasing silos among functional specialists

– The organizational structure of Encryption Associates is dominated by functional specialists. It is not different from other players in the Global Business segment. Encryption Associates needs to de-silo the office environment to harness the true potential of its workforce. Secondly the de-silo will also help Encryption Associates to focus more on services rather than just following the product oriented approach.

High operating costs

– Compare to the competitors, firm in the HBR case study Network Associates: Securing the Internet has high operating costs in the. This can be harder to sustain given the new emerging competition from nimble players who are using technology to attract Encryption Associates 's lucrative customers.

Slow decision making process

– As mentioned earlier in the report, Encryption Associates has a very deliberative decision making approach. This approach has resulted in prudent decisions, but it has also resulted in missing opportunities in the industry over the last five years. Encryption Associates even though has strong showing on digital transformation primary two stages, it has struggled to capitalize the power of digital transformation in marketing efforts and new venture efforts.

Products dominated business model

– Even though Encryption Associates has some of the most successful products in the industry, this business model has made each new product launch extremely critical for continuous financial growth of the organization. firm in the HBR case study - Network Associates: Securing the Internet should strive to include more intangible value offerings along with its core products and services.

Interest costs

– Compare to the competition, Encryption Associates has borrowed money from the capital market at higher rates. It needs to restructure the interest payment and costs so that it can compete better and improve profitability.

Employees’ incomplete understanding of strategy

– From the instances in the HBR case study Network Associates: Securing the Internet, it seems that the employees of Encryption Associates don’t have comprehensive understanding of the firm’s strategy. This is reflected in number of promotional campaigns over the last few years that had mixed messaging and competing priorities. Some of the strategic activities and services promoted in the promotional campaigns were not consistent with the organization’s strategy.

Aligning sales with marketing

– It come across in the case study Network Associates: Securing the Internet that the firm needs to have more collaboration between its sales team and marketing team. Sales professionals in the industry have deep experience in developing customer relationships. Marketing department in the case Network Associates: Securing the Internet can leverage the sales team experience to cultivate customer relationships as Encryption Associates is planning to shift buying processes online.

Ability to respond to the competition

– As the decision making is very deliberative, highlighted in the case study Network Associates: Securing the Internet, in the dynamic environment Encryption Associates has struggled to respond to the nimble upstart competition. Encryption Associates has reasonably good record with similar level competitors but it has struggled with new entrants taking away niches of its business.

High dependence on star products

– The top 2 products and services of the firm as mentioned in the Network Associates: Securing the Internet HBR case study still accounts for major business revenue. This dependence on star products in has resulted into insufficient focus on developing new products, even though Encryption Associates has relatively successful track record of launching new products.

Compensation and incentives

– The revenue per employee as mentioned in the HBR case study Network Associates: Securing the Internet, is just above the industry average. Encryption Associates needs to redesign the compensation structure and incentives to increase the revenue per employees. Some of the steps that it can take are – hiring more specialists on project basis, etc.

Slow to strategic competitive environment developments

– As Network Associates: Securing the Internet HBR case study mentions - Encryption Associates takes time to assess the upcoming competitions. This has led to missing out on atleast 2-3 big opportunities in the industry in last five years.




Opportunities Network Associates: Securing the Internet | External Strategic Factors
What are Opportunities in the SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis


The opportunities highlighted in the Harvard Business Review case study Network Associates: Securing the Internet are -

Redefining models of collaboration and team work

– As explained in the weaknesses section, Encryption Associates is facing challenges because of the dominance of functional experts in the organization. Network Associates: Securing the Internet case study suggests that firm can utilize new technology to build more coordinated teams and streamline operations and communications using tools such as CAD, Zoom, etc.

Reconfiguring business model

– The expansion of digital payment system, the bringing down of international transactions costs using Bitcoin and other blockchain based currencies, etc can help Encryption Associates to reconfigure its entire business model. For example it can used blockchain based technologies to reduce piracy of its products in the big markets such as China. Secondly it can use the popularity of e-commerce in various developing markets to build a Direct to Customer business model rather than the current Channel Heavy distribution network.

Identify volunteer opportunities

– Covid-19 has impacted working population in two ways – it has led to people soul searching about their professional choices, resulting in mass resignation. Secondly it has encouraged people to do things that they are passionate about. This has opened opportunities for businesses to build volunteer oriented socially driven projects. Encryption Associates can explore opportunities that can attract volunteers and are consistent with its mission and vision.

Finding new ways to collaborate

– Covid-19 has not only transformed business models of companies in Global Business industry, but it has also influenced the consumer preferences. Encryption Associates can tie-up with other value chain partners to explore new opportunities regarding meeting customer demands and building a rewarding and engaging relationship.

Harnessing reconfiguration of the global supply chains

– As the trade war between US and China heats up in the coming years, Encryption Associates can build a diversified supply chain model across various countries in - South East Asia, India, and other parts of the world. This reconfiguration of global supply chain can help, as suggested in case study, Network Associates: Securing the Internet, to buy more products closer to the markets, and it can leverage its size and influence to get better deal from the local markets.

Use of Bitcoin and other crypto currencies for transactions

– The popularity of Bitcoin and other crypto currencies as asset class and medium of transaction has opened new opportunities for Encryption Associates in the consumer business. Now Encryption Associates can target international markets with far fewer capital restrictions requirements than the existing system.

Manufacturing automation

– Encryption Associates can use the latest technology developments to improve its manufacturing and designing process in Global Business segment. It can use CAD and 3D printing to build a quick prototype and pilot testing products. It can leverage automation using machine learning and artificial intelligence to do faster production at lowers costs, and it can leverage the growth in satellite and tracking technologies to improve inventory management, transportation, and shipping.

Better consumer reach

– The expansion of the 5G network will help Encryption Associates to increase its market reach. Encryption Associates will be able to reach out to new customers. Secondly 5G will also provide technology framework to build new tools and products that can help more immersive consumer experience and faster consumer journey.

Increase in government spending

– As the United States and other governments are increasing social spending and infrastructure spending to build economies post Covid-19, Encryption Associates can use these opportunities to build new business models that can help the communities that Encryption Associates operates in. Secondly it can use opportunities from government spending in Global Business sector.

Developing new processes and practices

– Encryption Associates can develop new processes and procedures in Global Business industry using technology such as automation using artificial intelligence, real time transportation and products tracking, 3D modeling for concept development and new products pilot testing etc.

Changes in consumer behavior post Covid-19

– Consumer behavior has changed in the Global Business industry because of Covid-19 restrictions. Some of this behavior will stay once things get back to normal. Encryption Associates can take advantage of these changes in consumer behavior to build a far more efficient business model. For example consumer regular ordering of products can reduce both last mile delivery costs and market penetration costs. Encryption Associates can further use this consumer data to build better customer loyalty, provide better products and service collection, and improve the value proposition in inflationary times.

Building a culture of innovation

– managers at Encryption Associates can make experimentation a productive activity and build a culture of innovation using approaches such as – mining transaction data, A/B testing of websites and selling platforms, engaging potential customers over various needs, and building on small ideas in the Global Business segment.

Lowering marketing communication costs

– 5G expansion will open new opportunities for Encryption Associates in the field of marketing communication. It will bring down the cost of doing business, provide technology platform to build new products in the Global Business segment, and it will provide faster access to the consumers.




Threats Network Associates: Securing the Internet External Strategic Factors
What are Threats in the SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis


The threats mentioned in the HBR case study Network Associates: Securing the Internet are -

Instability in the European markets

– European Union markets are facing three big challenges post Covid – expanded balance sheets, Brexit related business disruption, and aggressive Russia looking to distract the existing security mechanism. Encryption Associates will face different problems in different parts of Europe. For example it will face inflationary pressures in UK, France, and Germany, balance sheet expansion and demand challenges in Southern European countries, and geopolitical instability in the Eastern Europe.

Consumer confidence and its impact on Encryption Associates demand

– There is a high probability of declining consumer confidence, given – high inflammation rate, rise of gig economy, lower job stability, increasing cost of living, higher interest rates, and aging demography. All the factors contribute to people saving higher rate of their income, resulting in lower consumer demand in the industry and other sectors.

Aging population

– As the populations of most advanced economies are aging, it will lead to high social security costs, higher savings among population, and lower demand for goods and services in the economy. The household savings in US, France, UK, Germany, and Japan are growing faster than predicted because of uncertainty caused by pandemic.

High dependence on third party suppliers

– Encryption Associates high dependence on third party suppliers can disrupt its processes and delivery mechanism. For example -the current troubles of car makers because of chip shortage is because the chip companies started producing chips for electronic companies rather than car manufacturers.

Shortening product life cycle

– it is one of the major threat that Encryption Associates is facing in Global Business sector. It can lead to higher research and development costs, higher marketing expenses, lower customer loyalty, etc.

Technology acceleration in Forth Industrial Revolution

– Encryption Associates has witnessed rapid integration of technology during Covid-19 in the Global Business industry. As one of the leading players in the industry, Encryption Associates needs to keep up with the evolution of technology in the Global Business sector. According to Mckinsey study top managers believe that the adoption of technology in operations, communications is 20-25 times faster than what they planned in the beginning of 2019.

Technology disruption because of hacks, piracy etc

– The colonial pipeline illustrated, how vulnerable modern organization are to international hackers, miscreants, and disruptors. The cyber security interruption, data leaks, etc can seriously jeopardize the future growth of the organization.

Increasing international competition and downward pressure on margins

– Apart from technology driven competitive advantage dilution, Encryption Associates can face downward pressure on margins from increasing competition from international players. The international players have stable revenue in their home market and can use those resources to penetrate prominent markets illustrated in HBR case study Network Associates: Securing the Internet .

Learning curve for new practices

– As the technology based on artificial intelligence and machine learning platform is getting complex, as highlighted in case study Network Associates: Securing the Internet, Encryption Associates may face longer learning curve for training and development of existing employees. This can open space for more nimble competitors in the field of Global Business .

Easy access to finance

– Easy access to finance in Global Business field will also reduce the barriers to entry in the industry, thus putting downward pressure on the prices because of increasing competition. Encryption Associates can utilize it by borrowing at lower rates and invest it into research and development, capital expenditure to fortify its core competitive advantage.

Stagnating economy with rate increase

– Encryption Associates can face lack of demand in the market place because of Fed actions to reduce inflation. This can lead to sluggish growth in the economy, lower demands, lower investments, higher borrowing costs, and consolidation in the field.

Backlash against dominant players

– US Congress and other legislative arms of the government are getting tough on big business especially technology companies. The digital arm of Encryption Associates business can come under increasing regulations regarding data privacy, data security, etc.

Barriers of entry lowering

– As technology is more democratized, the barriers to entry in the industry are lowering. It can presents Encryption Associates with greater competitive threats in the near to medium future. Secondly it will also put downward pressure on pricing throughout the sector.




Weighted SWOT Analysis of Network Associates: Securing the Internet Template, Example


Not all factors mentioned under the Strengths, Weakness, Opportunities, and Threats quadrants in the SWOT Analysis are equal. Managers in the HBR case study Network Associates: Securing the Internet needs to zero down on the relative importance of each factor mentioned in the Strengths, Weakness, Opportunities, and Threats quadrants. We can provide the relative importance to each factor by assigning relative weights. Weighted SWOT analysis process is a three stage process –

First stage for doing weighted SWOT analysis of the case study Network Associates: Securing the Internet is to rank the strengths and weaknesses of the organization. This will help you to assess the most important strengths and weaknesses of the firm and which one of the strengths and weaknesses mentioned in the initial lists are marginal and can be left out.

Second stage for conducting weighted SWOT analysis of the Harvard case study Network Associates: Securing the Internet is to give probabilities to the external strategic factors thus better understanding the opportunities and threats arising out of macro environment changes and developments.

Third stage of constructing weighted SWOT analysis of Network Associates: Securing the Internet is to provide strategic recommendations includes – joining likelihood of external strategic factors such as opportunities and threats to the internal strategic factors – strengths and weaknesses. You should start with external factors as they will provide the direction of the overall industry. Secondly by joining probabilities with internal strategic factors can help the company not only strategic fit but also the most probably strategic trade-off that Encryption Associates needs to make to build a sustainable competitive advantage.



--- ---

Danville Airlines SWOT Analysis / TOWS Matrix

Andrew Wicks, Jenny Mead , Organizational Development


Hoechst in the United States (A) SWOT Analysis / TOWS Matrix

Benjamin Gomes-Casseres, Krista McQuade , Global Business


Neilson International in Mexico (A) SWOT Analysis / TOWS Matrix

Paul W. Beamish, C. Bud Johnston, Gayle Duncan, Shari Ann Wortel , Global Business


HP Labs in Singapore SWOT Analysis / TOWS Matrix

Willy Shih, Pankaj Agarwal, Christine Chi , Technology & Operations


HealthCare.gov: The Crash and the Fix (A) SWOT Analysis / TOWS Matrix

Leonard A. Schlesinger, Paras D. Bhayani , Organizational Development


Satellite Radio SWOT Analysis / TOWS Matrix

Thomas R. Eisenmann, Alastair Brown , Strategy & Execution


CBS and Online Video SWOT Analysis / TOWS Matrix

Dennis Yao, Julia Rozovsky, Francisco Queiro , Strategy & Execution


American Automobiles Limited: Production Planning SWOT Analysis / TOWS Matrix

Ajith J. Kumar, Soumitra Chakraborty, Ankit Dhaka , Technology & Operations