Attached files

file filename
EXCEL - IDEA: XBRL DOCUMENT - Palo Alto Networks IncFinancial_Report.xls
EX-23.1 - CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM - Palo Alto Networks Incpanwex231q414.htm
EX-31.1 - CERTIFICATION OF THE CHIEF EXECUTIVE OFFICER PURSUANT TO SECTION 302 - Palo Alto Networks Incpanwex311q414.htm
EX-32.1 - CERTIFICATION OF THE CHIEF EXECUTIVE OFFICER PURSUANT TO SECTION 906 - Palo Alto Networks Incpanwex321q414.htm
EX-21.1 - LIST OF SUBSIDIARIES OF THE REGISTRANT - Palo Alto Networks Incpanwex211q414.htm
EX-10.4 - 2012 EMPLOYEE STOCK PURCHASE PLAN, AS AMENDED - Palo Alto Networks Incpanwex104q414.htm
EX-10.3 - 2012 EQUITY INCENTIVE PLAN, AS AMENDED - Palo Alto Networks Incpanwex103q414.htm
EX-31.2 - CERTIFICATION OF THE CHIEF FINANCIAL OFFICER PURSUANT TO SECTION 302 - Palo Alto Networks Incpanwex312q414.htm
EX-10.29 - LETTER AGREEMENT BETWEEN THE REGISTRANT AND WILSON XU - Palo Alto Networks Incpanwex1029q414.htm
EX-32.2 - CERTIFICATION OF THE CHIEF FINANCIAL OFFICER PURSUANT TO SECTION 906 - Palo Alto Networks Incpanwex322q414.htm

 
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
_____________________ 
Form 10-K
_____________________
(Mark One)
x
ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended July 31, 2014
or
¨
TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the transition period from             to             
Commission File Number 001-35594
Palo Alto Networks, Inc.
(Exact name of registrant as specified in its charter)
Delaware
20-2530195
(State or other jurisdiction of
incorporation or organization)
(I.R.S. Employer
Identification No.)
4401 Great America Parkway
Santa Clara, California 95054
(Address of principal executive office, including zip code)
(408) 753-4000
(Registrant's telephone number, including area code)
Securities registered pursuant to Section 12(b) of the Act:
 
 
 
Title of each class
 
Name of each exchange on which registered
Common Stock, par value $0.0001 per share
 
New York Stock Exchange LLC
Securities registered pursuant to Section 12(g) of the Act:
None
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.    Yes  x No  ¨
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Securities Exchange Act of 1934 (the “Exchange Act”).    Yes  ¨ No  x
Indicate by check mark whether the registrant: (1) has filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.   
Yes  x No  ¨
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files).    Yes  x No  ¨
Indicate by a check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be contained, to the best of registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.      ¨
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act. (Check one):
Large accelerated filer
x
Accelerated filer
¨
Non-accelerated filer
¨ (Do not check if a smaller reporting company)
Smaller reporting company
¨
Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act).   Yes  ¨ No  x
The aggregate market value of voting stock held by non-affiliates of the registrant was $3,496,229,947 as of the end of the Registrant's second fiscal quarter (based on the closing sales price for the common stock on the New York Stock Exchange on January 31, 2014). Shares of common stock held by each executive officer, director, and holder of 5% or more of the outstanding common stock have been excluded in that such persons may be deemed to be affiliates. This determination of affiliate status is not necessarily a conclusive determination for other purposes.
On September 10, 2014, 79,628,471 shares of the registrant’s common stock, $0.0001 par value, were outstanding.

DOCUMENTS INCORPORATED BY REFERENCE
Portions of the information called for by Part III of this Form 10-K is hereby incorporated by reference from the definitive proxy statement for the Registrant's annual meeting of stockholders, which will be filed with the Securities and Exchange Commission not later than 120 days after the Registrant's fiscal year ended July 31, 2014.
 



TABLE OF CONTENTS

 
 
 
 
 
Page
 
PART I
 
Item 1.
Item 1A.
Item 1B.
Item 2.
Item 3.
Item 4.
 
 
 
 
PART II
 
Item 5.
Item 6.
Item 7.
Item 7A.
Item 8.
Item 9.
Item 9A.
Item 9B.
 
 
 
 
PART III
 
Item 10.
Item 11.
Item 12.
Item 13.
Item 14.
 
 
 
 
PART IV
 
Item 15.
 
 
 



- 2 -


PART I
SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS
This Annual Report on Form 10-K, including the sections entitled “Business,” “Risk Factors,” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. The words “believe,” “may,” “will,” “potentially,” “estimate,” “continue,” “anticipate,” “intend,” “could,” “would,” “project,” “plan,” “expect,” and similar expressions that convey uncertainty of future events or outcomes are intended to identify forward-looking statements.
These forward-looking statements include, but are not limited to, statements concerning the following:
our ability to maintain an adequate rate of revenue growth;
our business plan and our ability to effectively manage our growth;
trends in and expectations regarding revenue, costs of revenue, gross margin, cash flows, interest expense, and operating expenses, including future share-based compensation expense;
our expectations regarding future investments in research and development, customer support, and in our sales force, including expectations regarding growth in our sales headcount;
our ability to extend our leadership position in next-generation enterprise security;
our ability to timely and effectively scale and adapt our existing technology;
our ability to expand internationally;
the effects of increased competition in our market and our ability to offer differentiated products and compete effectively;
our ability to introduce new subscriptions, renew existing contracts, and increase sales to our existing customer base;
costs associated with defending intellectual property infringement and other claims;
the effects of seasonal trends and macroeconomic conditions on our results of operations;
the adequacy of our current facilities;
the sufficiency of our cash flow from operations with existing cash and cash equivalents to meet our cash needs for the foreseeable future;
future acquisitions of, or investments in, complementary companies, products, services, or technologies;
our ability to grow our installed end-customer base; and
our expectations regarding current and future product releases.
These forward-looking statements are subject to a number of risks, uncertainties, and assumptions, including those described in “Risk Factors” included in Part I, Item 1A and elsewhere in this Annual Report on Form 10-K. Moreover, we operate in a very competitive and rapidly changing environment, and new risks emerge from time to time. It is not possible for our management to predict all risks, nor can we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties, and assumptions, the forward-looking events and circumstances discussed in this Annual Report on Form 10-K may not occur, and actual results could differ materially and adversely from those anticipated or implied in the forward-looking statements. We undertake no obligation to revise or publicly release the results of any revision to these forward-looking statements, except as required by law. Given these risks and uncertainties, readers are cautioned not to place undue reliance on such forward-looking statements.
ITEM 1.
BUSINESS
General
We have pioneered the next-generation of enterprise security with our innovative platform that allows enterprises, service providers, and government entities to simultaneously empower and secure their organizations by safely enabling the increasingly complex and rapidly growing number of applications running on their networks and by preventing breaches stemming from targeted cyber attacks. Our enterprise security platform consists of three major elements: our Next-Generation Firewall, our Advanced Endpoint Protection, and our Threat Intelligence Cloud. Our Next-Generation Firewall delivers application, user, and content visibility

- 3 -


and control as well as protection against network-based cyber threats integrated within the firewall through our proprietary hardware and software architecture. Our Advanced Endpoint Protection, which we expect to release in fiscal 2015, prevents cyber attacks that aim to exploit software vulnerabilities on a broad variety of fixed and virtual endpoints. Our Threat Intelligence Cloud provides central intelligence capabilities as well as automated delivery of preventative measures against cyber attacks. The cloud-based element of our platform is delivered in the form of a service that can be used either in the public cloud or in a private cloud using a dedicated appliance.
Our platform offers a number of compelling benefits for our end-customers, including the ability to identify, control, and safely enable applications while offering full prevention of breaches stemming from cyber attacks in real time. We believe our platform also offers superior performance compared to legacy approaches and reduces the total cost of ownership for organizations by simplifying their enterprise security infrastructure and eliminating the need for multiple, stand-alone security appliances and software products. Our products and services can address a broad range of our end-customers’ enterprise security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of endpoints and mobile devices.
Our platform uses an innovative traffic classification engine that identifies network traffic by application, user, and content. As a result, it provides in-depth visibility into all traffic and all applications, at the user level, at all times, and at the full speed of the network in order to control usage, content, risks, and cyber threats. This enables our end-customers to transform their organizations by safely enabling applications through a positive security model with fine-grained policy implementation capabilities and by preventing breaches stemming from cyber attacks.
The network-based element of our platform is delivered in the form of a hardware or virtual appliance and includes a suite of subscription services. The endpoint-based element of our platform is delivered in the form of software. The cloud-based element of our platform is delivered in the form of a service that can be used either in the public cloud or in a private cloud using our dedicated WF-500 appliances. Our subscription services can be easily activated on any of our appliances without requiring additional hardware or processing resources, thereby providing a seamless implementation path for our end-customers. All of our appliances incorporate our PAN-OS operating system and are based on our proprietary identification technologies, application visibility and control (App-ID), user identification (User-ID), and Content-ID, which allow security policies to be defined within the context of applications, users, and content. We deliver these capabilities through an innovative, Single Pass Parallel Processing (SP3) architecture that simultaneously performs multiple identification, security, and networking functions. As a result, our end-customers achieve safe application enablement and prevention of cyber attacks, while maintaining high network performance.
We serve the enterprise network and endpoint security markets, which consists of Firewall, Unified Threat Management (UTM), Web Gateway, Intrusion Detection and Prevention (IDS/IPS), Specialized Threat Analysis and Protection (STAP), Virtual Private Network (VPN), and Enterprise Endpoint Security technologies.
We sell our platform through a high touch, channel fulfilled sales model. Our business is geographically diversified, with 66% of our total revenue from the Americas, 21% from Europe, the Middle East, and Africa (EMEA), and 13% from Asia Pacific and Japan (APAC) in fiscal 2014. As of July 31, 2014, we had more than 19,000 end-customers in more than 130 countries.
We were incorporated in 2005 as Palo Alto Networks, Inc., a Delaware corporation. Our principal executive offices are located in Santa Clara, California, and our telephone number is +1 (408) 753-4000. Our website is www.paloaltonetworks.com.
We are organized and operate in a single segment. See Note 15. Segment Information of Notes to Consolidated Financial Statements included in Part II, Item 8 of this Annual Report on Form 10-K.
Products and Services
Appliances. All firewall appliances come with the same rich set of features ensuring consistent operation across the entire product line. These features include: App-ID, User-ID, site-to-site VPN, remote access Secure Sockets Layer (SSL) VPN, and Quality-of-Service (QoS). We classify our appliances based on throughput. Our firewall appliances come in a physical form factor, as well as in a virtual form factor that is available for virtualization platforms from VMware, Inc. (“VMware”) and Citrix Systems, Inc. In addition to firewall appliances, we offer dedicated Panorama, GlobalProtect, and WildFire appliances.
Panorama. Panorama is our centralized security management solution for global control of all of our appliances deployed on an end-customer’s network as a virtual appliance or a physical appliance. Panorama is used for centralized policy management, device management, software licensing and updates, centralized logging and reporting, and log storage. Panorama controls the security, network address translation (NAT), QoS, policy based forwarding, decryption, application override, captive portal, and distributed denial of service/denial of service (DDoS/DoS) protection aspects of the appliances and virtual systems under management. Panorama centrally manages device software and associated updates, including SSL-VPN clients, GlobalProtect clients, dynamic content updates, and software licenses. Panorama offers the ability to view logs and run reports from all managed appliances without the need to forward the logs and to report on aggregate user activity for all users, including mobile users. Panorama reliably expands the log storage for long-term event investigation and analysis through high-availability features for central management.

- 4 -


Virtual System Upgrades. Virtual System Upgrades are available as extensions to the Virtual System capacity that ships with the appliance. Virtual Systems provide a virtualization solution to our large enterprise and service provider end-customers that implement large data centers, private cloud, and public cloud security infrastructures and need to support a multi-tenant firewall environment.
Subscription Services. We offer a number of subscription services as part of our platform. These services include:
Threat Prevention Subscription. This service provides the intrusion detection and prevention capabilities of our platform. Our threat prevention engine blocks vulnerability exploits, viruses, spyware, buffer overflows, denial-of-service attacks, and port scans from compromising and damaging enterprise information resources. It includes mechanisms such as protocol decoder-based analysis, protocol anomaly-based protection, stateful pattern matching, statistical anomaly detection, heuristic-based analysis, custom vulnerability, and spyware phone home signatures.
URL Filtering Subscription. This service provides the uniform resource locator (URL) filtering capabilities of our platform. The URL filtering database consists of millions of URLs across many categories and is designed to monitor and control employee web surfing activities. The on-appliance URL database can be augmented to suit the traffic patterns of the local user community with a custom URL database. URLs that are not categorized by the local URL database can be pulled into a separate, cache-based URL database from a very extensive, cloud-based URL database.
GlobalProtect Subscription. This service provides protection for mobile users of both traditional laptop devices and mobile devices. It expands the boundaries of the physical network, effectively establishing a logical perimeter that encompasses remote laptop and mobile device users irrespective of their location. When a remote user logs into the device, GlobalProtect automatically determines the closest gateway available to the roaming device and establishes a secure connection. Windows and Apple laptops as well as mobile devices, such as Android phones and tablets and Apple iPhones and iPads, will stay connected to the corporate network whenever they are on a network of any kind. As a result, they are protected as if they never left the corporate campus. GlobalProtect ensures that the same secure application enablement policies that protect users at the corporate site are enforced for all users, independent of their location.
WildFire Subscription. This service provides protection against targeted malware and advanced persistent threats. Its cloud-based analysis service provides a near real-time analysis engine for detecting previously unseen malware. The core component of this service is a sandbox environment that can operate on an end-customers' private cloud or our public cloud where files can be run and monitored for more than 100 behavioral characteristics that identify the file as malware. Once identified, preventive measures are automatically generated and delivered to all devices that subscribe to the service. By providing this as a cloud-based service, all of our end-customers benefit from malware found on any network.
Endpoint Software Subscription. This service, called Traps, provides protection for Windows-based fixed and virtual endpoints, and is expected to be released in fiscal 2015. It protects against cyber attacks that aim to exploit software vulnerabilities through its unique capability of stopping the underlying exploit techniques and can prevent cyber attacks without relying on prior knowledge of the attack.
Support and Maintenance. We offer technical support on our products and subscriptions to our end-customers and channel partners. We offer Standard Support, Premium Support, and 4-hour Premium Support. Our channel partners that operate a Palo Alto Networks Authorized Support Center (ASC) typically deliver level-one and level-two support. We provide level-three support 24 hours a day, seven days a week through regional support centers that are located worldwide. We also offer an annual subscription-based Technical Account Management (TAM) service that provides dedicated support for end-customers with unique or complex support requirements. We offer our end-customers ongoing maintenance services for both hardware and software in order to receive ongoing security updates, PAN-OS upgrades, bug fixes, and repair. These services are typically sold to end-customers for a one-year or longer term at the time of the initial product sale and typically renew for successive one-year or longer periods. Additionally, we provide expedited replacement for any defective hardware. We use a third-party logistics provider to manage our worldwide deployment of spare appliances and other accessories.
Professional Services. Professional services include on-location, hands-on experts who plan, design, and deploy effective security solutions tailored to our end-customers’ specific requirements. We generally do not directly provide such professional services to our end-customers. Instead, we primarily deliver these services through our authorized partners. These services include application traffic management, solution design and planning, configuration, and firewall migration. Our education services provide online and classroom-style training and are also primarily delivered through our authorized partners.
Major Product Development Projects
We continue to invest in innovation and strengthening our product portfolio, which resulted in several new product offerings during fiscal 2014. These new product offerings include: the PA-7050 firewall with a throughput of 120Mbps; the GP-100 mobile security management appliance, which offers an easy to deploy, high-performance, dedicated management appliance for our GlobalProtect customers; and the VM-1000-HV virtual Next-Generation Firewall, which is fully integrated with VMware’s NSX virtualization platform.

- 5 -


Technology
We combine our proprietary SP3 hardware and software architecture, PAN-OS operating system, Traps endpoint software, and Threat Intelligence Cloud to provide a comprehensive enterprise security platform. The core of our platform is our Next-Generation Firewall, which integrates application visibility and control and is comprised of three identification technologies, App-ID, User-ID, and Content-ID. These technologies allow organizations to enable the secure use of applications while managing the inherent risks of doing so. These fine-grained policy management and enforcement capabilities are delivered at low latency, multi-gigabit performance through our innovative SP3 architecture.
App-ID. Our application classification engine, called App-ID, uses multiple identification techniques to determine the exact identity of applications traversing the network. App-ID is the foundational classification engine that provides the core traffic classification to all other functions in our platform. The App-ID classification is used to invoke other security functions.
App-ID uses a series of classification techniques to accurately identify an application. When traffic first enters the network, App-ID applies an initial policy check based on Internet Protocol (IP) and port. Signatures are then applied to the traffic to identify the application based on application properties and related transaction characteristics. If the traffic is encrypted and a decryption policy is in place, the application is first decrypted, then application signatures are applied. Additional context-based signature analysis is then performed to identify known protocols that may be hiding other applications. Encrypted traffic that was decrypted is then re-encrypted before being sent back into the network. For evasive applications that cannot be identified through advanced signature and protocol analysis, heuristics or behavioral analysis are used to determine the identity of the application. When an application is accurately identified during this series of successive techniques, the policy check determines how to treat the application and associated functions. The policy check can block the application, allow it and scan for threats, inspect it for unauthorized file transfer and data patterns, or shape its use of network resources by applying a quality-of-service policy.
App-ID consistently classifies all network traffic, including business applications, consumer applications, and network protocols, across all ports. Consequently, there is no need to perform a series of signature checks to look for an application that is thought to be on the network. App-ID continually monitors the state of the application to determine if the application changes. Our platform only allows applications within the policy to enter the network, while all other applications are blocked.
Internally developed or custom applications can be managed using either an application override or custom App-IDs. End-customers can use either of these mechanisms to apply the same level of control over their internal or custom applications that they apply to common applications. Because the application landscape is constantly changing, our research teams are constantly updating our App-ID classification engine. We deliver updated App-IDs automatically to our end-customers through our weekly update service.
User-ID. User-ID integrates our platform with a wide range of enterprise user directories and technologies, including Active Directory, eDirectory, Open LDAP, Citrix Terminal Server, Microsoft Exchange, Microsoft Terminal Server, and ZENworks. A network-based, User-ID agent communicates with the domain controllers, directories, or supported enterprise applications, mapping information such as user, role, and current IP address to the firewall, making the policy integration transparent. In cases where user repository information does not include the current IP address of the user, a transparent, captive portal authentication or challenge/response mechanism can be used to tie users into the security policy. In cases where a user repository or application is in place that already has knowledge of users and their current IP address, a standards-based application programming interface (API) can be used to tie the repository to our platform.
Content-ID. Content-ID is a collection of technologies that enables many of our subscription services. Content-ID combines a real-time threat prevention engine, a cloud-based analysis service, and a comprehensive URL categorization database to limit unauthorized data and file transfers, detect and block a wide range of threats, and control non-work related web surfing.
The threat prevention engine blocks several common types of attacks, including vulnerability exploits, buffer overflows, and port scans from compromising and damaging enterprise information resources. It includes mechanisms such as protocol decoder-based analysis, protocol anomaly-based protection, stateful pattern matching, statistical anomaly detection, heuristic-based analysis, custom vulnerability, and spyware “phone home” signatures.
Our cloud-based analysis service, called WildFire, provides a near real-time analysis engine for detecting previously unseen targeted malware. The core component of WildFire is a sandbox environment that can be deployed in a customer's private cloud or on Palo Alto Networks' public cloud where files can be run and monitored for more than 100 behavioral characteristics that identify the file as malware. Once identified, signatures are automatically generated and delivered to all devices that subscribe to the WildFire service. By providing WildFire as a cloud-based service, all of our end-customers benefit from malware found on a single network.
Our URL filtering database consists of millions of URLs across many categories and is designed to monitor and control employee web surfing activities. The on-appliance URL database can be augmented to suit the traffic patterns of the local user community with a custom URL database. URLs that are not categorized by the local URL database can be pulled into an on-appliance data cache from a very extensive, cloud-based URL database. The data filtering features in our platform enable policies that reduce the risks associated with the transfer of unauthorized files and data. This can be achieved by blocking files by type, by controlling sensitive data, such as credit card and social security numbers in application content or attachments, and by controlling file transfers within applications.

- 6 -


SP3. SP3 has two elements: single-pass software and parallel processing hardware.
Our single-pass software accomplishes two key functions in our platform. First, it performs operations once per packet. As a packet is processed, the networking functions, the policy lookup, the application identification and decoding, and the signature matching for any and all threats and content are all performed simultaneously. This significantly reduces the amount of processing required to perform multiple functions in one security device. Second, the content scanning step is stream-based and uses uniform signature matching to detect and block threats. Instead of using multiple scanning passes and file proxies, which require download prior to scanning, our single-pass software scans content once in a stream-based fashion to minimize latency. This results in very high throughput and low latency, even with all security functions active. It also offers a single, fully integrated policy, thus enabling easier management of enterprise security.
Our parallel processing hardware is designed to optimize single-pass software performance through the use of separate data and control planes, which means that heavy utilization of one does not negatively impact the performance of the other. Our hardware also uses discrete, specialized processing groups to perform critical functions. On the data plane, this includes functions such as networking, policy enforcement, encryption and decryption, decompression, and content scanning. On the control plane, this includes configuration management, logging, and reporting.
We believe that the combination of single-pass software and parallel processing hardware is unique in the enterprise security industry and allows our platform to safely enable applications and prevent cyber threats at very high levels of performance and throughput.
PAN-OS Operating System. The PAN-OS operating system provides the foundation for our enterprise security platform and contains App-ID, User-ID, and Content-ID. PAN-OS performs the core functions of our platform while also providing the networking, security, and management functions needed for implementation. The PAN-OS networking functions include dynamic routing, switching, high availability, and VPN support, which enables deployment into a broad range of networking environments.
We have the ability to enable a series of virtual firewall instances or virtual systems. Each virtual system is an independent (virtual) firewall within the device that is managed separately and cannot be accessed or viewed by any other administrator of any other virtual system. This capability allows enterprises and service providers to separate firewall instances in departmental and multi-tenant managed services scenarios.
The security functions in PAN-OS are implemented in a single security policy and include application, application function, user, group, port, and service-based elements. Policy responses can range from open (allow but monitor for activity), to moderate (enabling certain applications or functions), to closed (deny). The tight integration of application control, users, and groups, and the ability to scan the allowed traffic for a wide range of threats minimizes the number of policies.
PAN-OS also includes attack protection capabilities, such as blocking invalid or malformed packets, IP defragmentation, Transmission Control Protocol (TCP) reassembly, and network traffic normalization. PAN-OS eliminates invalid and malformed packets, while TCP reassembly and IP de-fragmentation is performed to ensure the utmost accuracy and protection despite any attack evasion techniques.
Certifications. Our products have been awarded Federal Information Processing Standard (FIPS) 140-2 Level 2, Common Criteria/National Information Assurance Partnership (NIAP) Evaluation Assurance Level (EAL) 2, Common Criteria/NIAP EAL4+, Network Equipment-Building System (NEBS), and ICSA Firewall certifications.
Customers
We primarily sell our products and services to end-customers through our channel partners and infrequently directly to end-customers. Our end-customers are predominantly medium to large enterprises, service providers, and government entities. Our end-customers operate in a variety of industries, including education, energy, financial services, government entities, healthcare, Internet and media, manufacturing, public sector, and telecommunications. Our end-customers deploy our platform for a variety of security functions across a variety of deployment scenarios. Typical deployment scenarios include the enterprise perimeter, the enterprise data center, and the distributed enterprise perimeter. Our end-customer deployments typically involve at least one pair of our products along with one or more of our subscription services, depending on size, security needs and requirements, and network complexity. As of July 31, 2014, we had shipped our products to over 19,000 end-customers worldwide. No single end-customer accounted for more than 10% of our total revenue in fiscal 2014.
Backlog
Orders for services for multiple years are billed upfront shortly after receipt of an order and are included in deferred revenue. Timing of revenue recognition for services may vary depending on the contractual service period or when the services are rendered. Products are shipped and billed shortly after receipt of an order. Because orders may be rescheduled by our partners without penalty and the majority of our product revenue comes from orders that are received and shipped in the same quarter, we do not believe that our product backlog at any particular time is meaningful, as it is not necessarily indicative of actual product revenue for any future period.

- 7 -


Sales, Customer Support and Marketing
Sales. Our sales organization is responsible for large-account acquisition and overall market development, which includes the management of the relationships with our channel partners, working with our channel partners in winning and supporting end-customers through a direct-touch approach, and acting as the liaison between the end-customers and the marketing and product development organizations. For additional information about revenue and assets by geographic region, refer to Note 15. Segment Information of Notes to Consolidated Financial Statements included in Part II, Item 8 of this Annual Report on Form 10-K. We expect to continue to grow our sales headcount in all of our principal markets and expand our presence into countries where we currently do not have a direct sales presence.
Our sales organization is supported by sales engineers with responsibility for pre-sales technical support, solutions engineering for our end-customers, and technical training for our channel partners.
Channel Program. We work with channel partners that provide our platform to end-customers. We focus on building in-depth relationships with a smaller number of solutions-oriented partners that have strong enterprise security expertise. As of July 31, 2014, we had approximately 2,673 channel partners. These channel partners are supported by our sales and marketing organization and consist of distributors and resellers with proven enterprise security experience. Sales to these channel partners are subject to our standard, non-exclusive distributor agreement, which provides for an initial term of one year, one year renewal terms, termination by us with 30-90 days written notice prior to the renewal date, and payment to us from the channel partner within 30-45 calendar days of the date we issue an invoice for such sales. For fiscal 2014, 70% of our total revenue was derived from sales to three channel partners.
To ensure optimal productivity, we operate a formal accreditation program for our channel partners’ sales and technical professionals. Around the world, we maintain a two-tier open distribution model where value-added distributors and value-added resellers work together on a non-exclusive basis to market our platform, identify and close sales opportunities, and provide pre-sales and post-sales services to our end-customers. Our channel partner program, NextWave, rewards our channel partners based on a number of attainment goals, as well as provides them access to marketing funds, technical and sales training, and support.
Customer Support. Our customer support organization is responsible for delivering support, professional, and educational services directly to our channel partners and to end-customers. We leverage the capabilities of our channel partners and train them in the delivery of support, professional, and educational services to ensure these services are locally delivered. We believe that a broad range of support services is essential to the successful customer deployment and ongoing support of our products, and we have hired support engineers with proven experience to provide those services.
Marketing. Our marketing is focused on building our brand reputation and the market awareness of our platform, driving pipeline and end-customer demand, and operating the channel program. The marketing team consists primarily of product marketing, programs marketing, field marketing, channel marketing, and public relations functions. Marketing is responsible for the channel program, NextWave, as well as the channel enablement functions. Marketing activities include pipeline development through demand generation, social media and advertising programs, managing the corporate web site and partner portal, trade shows and conferences, press, analyst, and customer relations, and customer awareness. Every year we organize our end-customer conference “Ignite.” We publish major market research papers such as the “Application Usage and Threat Report,” which are based on the application and cyber threat landscape of our end-customers. These activities and tools benefit both our direct and indirect channels and are available at no cost to our channel partners.
Manufacturing
The manufacturing of our security products is outsourced to various contract manufacturers and original design manufacturers. This approach allows us to reduce our costs as it reduces our manufacturing overhead and inventory and also allows us to adjust more quickly to changing end-customer demand. Our primary manufacturing partner is Flextronics International, Ltd., who assembles our products using design specifications, quality assurance programs, and standards that we establish, and procures components and assembles our products based on our demand forecasts. These forecasts represent our estimates of future demand for our products based upon historical trends and analysis from our sales and product management functions as adjusted for overall market conditions.
The component parts within our products are either sourced by our contract manufacturers or by various suppliers. We do not have any long-term manufacturing contracts that guarantee us any fixed capacity or pricing, which could increase our exposure to supply shortages or price fluctuations related to raw materials.
Research and Development
Our research and development effort is focused on developing new hardware and software and on enhancing and improving our existing products. We believe that hardware and software both are critical to expanding our leadership in enterprise security. Our engineering team has deep networking and security expertise and works closely with end-customers to identify their current and future needs. In addition to our focus on hardware and software, our research and development team is focused on research into applications and threats, which allows us to respond to the rapidly changing application and threat landscape.

- 8 -


We believe that innovation and timely development of new features and products is essential to meeting the needs of our end-customers and improving our competitive position. We supplement our own research and development effort with technologies and products that we license from third parties. We test our products thoroughly to certify and ensure interoperability with third-party hardware and software products.
We plan to continue to significantly invest in our research and development effort.
Competition
We operate in the intensely competitive enterprise security market that is characterized by constant change and innovation. Changes in the application, threat, and technology landscape result in evolving customer requirements for the protection from threats and the safe enablement of applications. Our main competitors fall into four categories:
large networking vendors such as Cisco Systems, Inc. (“Cisco”) and Juniper Networks, Inc. (“Juniper”) that incorporate enterprise security features in their products;
large companies such as Intel Corporation (“Intel”), International Business Machines (“IBM”), and Hewlett-Packard Company (“HP”) that have acquired large network and endpoint security specialist vendors in recent years and have the technical and financial resources to bring competitive solutions to the market;
independent security vendors such as Check Point Software Technologies Ltd. (“Check Point”) and Fortinet, Inc. (“Fortinet”) that offer network security products and Symantec, Inc. (“Symantec”) that offers endpoint security products; and
small and large companies that offer point solutions that compete with some of the features present in our platform.
As our market grows, it will attract more highly specialized vendors as well as larger vendors that may continue to acquire or bundle their products more effectively.
The principal competitive factors in our market include:
product features, reliability, performance, and effectiveness;
product line breadth, diversity, and applicability;
product extensibility and ability to integrate with other technology infrastructures;
price and total cost of ownership;
adherence to industry standards and certifications;
strength of sales and marketing efforts; and
brand awareness and reputation.
We believe we generally compete favorably with our competitors on the basis of these factors as a result of the features and performance of our platform, the ease of integration of our products with technological infrastructures, and the relatively low total cost of ownership of our products. However, many of our competitors have substantially greater financial, technical, and other resources, greater name recognition, larger sales and marketing budgets, broader distribution, more diversified product lines, and larger and more mature intellectual property portfolios.
Intellectual Property
Companies in the enterprise security industry own large numbers of patents, copyrights, trademarks, domain names, and trade secrets and frequently enter into litigation based on allegations of infringement, misappropriation or other violations of intellectual property or other rights. Our success depends in part upon our ability to protect our core technology and intellectual property. We rely on patents, trademarks, copyrights and trade secret laws, confidentiality procedures, and employee disclosure and invention assignment agreements to protect our intellectual property rights.
As of July 31, 2014, we had 52 issued patents and 70 patent applications pending in the United States. Our issued patents expire between 2017 and 2032. We cannot assure you whether any of our patent applications will result in the issuance of a patent or whether the examination process will require us to narrow our claims. Any issued patents may be contested, circumvented, found unenforceable or invalidated, and we may not be able to prevent third parties from infringing them. In addition, we have purchased and licensed patents from other entities. We also license software from third parties for integration into our products, including open source software and other software available on commercially reasonable terms.
We control access to and use of our proprietary software and other confidential information through the use of internal and external controls, including contractual protections with employees, contractors, end-customers and partners, and our software is protected by U.S. and international copyright laws. Despite our efforts to protect our trade secrets and proprietary rights through

- 9 -


intellectual property rights, licenses, and confidentiality agreements, unauthorized parties may still copy or otherwise obtain and use our software and technology. In addition, we intend to continue to expand our international operations, and effective patent, copyright, trademark, and trade secret protection may not be available or may be limited in foreign countries.
If we become more successful, we believe that competitors will be more likely to try to develop products and services that are similar to ours and that may infringe our proprietary rights. It may also be more likely that competitors or other third parties will claim that our platform infringes their proprietary rights.
Our industry is characterized by the existence of a large number of patents and frequent claims and related litigation regarding patent and other intellectual property rights. In particular, leading companies in the enterprise security industry have extensive patent portfolios and are regularly involved in both offensive and defensive litigation. From time to time, third parties, including certain of these leading companies, may assert patent, copyright, trademark, and other intellectual property rights against us, our channel partners, or our end-customers, which our standard license and other agreements obligate us to indemnify against such claims. Successful claims of infringement by a third party could prevent us from distributing certain products or performing certain services, require us to expend time and money to develop non-infringing solutions, or force us to pay substantial damages (including treble damages if we are found to have willfully infringed patents or copyrights), royalties or other fees. In addition, to the extent that we gain greater visibility and market exposure as a public company, we face a higher risk of being the subject of intellectual property infringement claims from third parties. We cannot assure you that we do not currently infringe, or that we will not in the future infringe, upon any third-party patents or other proprietary rights. See “Risk Factors—Claims by others that we infringe their proprietary technology or other rights could harm our business” and “Legal Proceedings” below for additional information.
Employees
As of July 31, 2014, we had 1,722 employees. None of our employees is represented by a labor organization or is a party to any collective bargaining arrangement. We have never had a work stoppage, and we consider our relationship with our employees to be good.
Available Information
Our website is located at www.paloaltonetworks.com, and our investor relations website is located at investors.paloaltonetworks.com. Our Annual Reports on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K and amendments to reports filed or furnished pursuant to Sections 13(a) and 15(d) of the Securities Exchange Act of 1934, as amended (the “Exchange Act”), are available free of charge on the Investors portion of our web site as soon as reasonably practicable after we electronically file such material with, or furnish it to, the Securities and Exchange Commission (SEC). We also provide a link to the section of the SEC's website at www.sec.gov that has all of our public filings, including Annual Reports on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K, all amendments to those reports, our Proxy Statements, and other ownership related filings. Further, a copy of this Annual Report on Form 10-K is located at the SEC's Public Reference Room at 100 F Street, NE, Washington, D.C. 20549. Information on the operation of the Public Reference Room can be obtained by calling the SEC at 1-800-SEC-0330.
Webcasts of our earnings calls and certain events we participate in or host with members of the investment community are on our investor relations website. Additionally, we announce investor information, including news and commentary about our business and financial performance, SEC filings, notices of investor events, and our press and earnings releases, on our investor relations website. Investors and others can receive notifications of new information posted on our investor relations website in real time by signing up for email alerts and RSS feeds. Further corporate governance information, including our corporate governance guidelines, board committee charters, and code of conduct, is also available on our investor relations website under the heading “Corporate Governance.” The contents of our websites are not incorporated by reference into this Annual Report on Form 10-K or in any other report or document we file with the SEC, and any references to our websites are intended to be inactive textual references only.

- 10 -


ITEM 1A.
RISK FACTORS
Our operations and financial results are subject to various risks and uncertainties including those described below. The risks and uncertainties described below are not the only ones we face. Additional risks and uncertainties that we are unaware of, or that we currently believe are not material, also may become important factors that affect us. If any of the following risks or others not specified below materialize, our business, financial condition, and results of operations could be materially adversely affected. In that case, the market price of our common stock could decline.
Risks Related to Our Business and Our Industry
Our business and operations have experienced rapid growth in recent periods, and if we do not effectively manage any future growth or are unable to improve our systems and processes, our operating results will be adversely affected.
We have experienced rapid growth and increased demand for our products over the last few years. Our employee headcount and number of end-customers have increased significantly, and we expect to continue to grow our headcount significantly over the next year. For example, from the end of fiscal 2013 to the end of fiscal 2014, our headcount increased from 1,147 to 1,722 employees, and our number of end-customers increased from more than 13,500 to over 19,000. The growth and expansion of our business and product and service offerings places a continuous significant strain on our management, operational, and financial resources. As we have grown, we have increasingly managed more complex deployments of our products and services with larger end-customers. To manage any future growth effectively, we must continue to improve and expand our information technology and financial infrastructure, our operating and administrative systems, and our ability to manage headcount, capital, and processes in an efficient manner.
We may not be able to successfully implement improvements to our systems and processes in an efficient or timely manner, and we may discover deficiencies in our existing systems and processes. We have licensed technology from third parties to help us accomplish this objective. We may experience difficulties in managing improvements to our systems and processes or in connection with third-party software, which could disrupt existing customer relationships, cause us to lose customers, limit us to smaller deployments of our products, or increase our technical support costs. Our failure to improve our systems and processes, or their failure to operate in the intended manner, may result in our inability to manage the growth of our business and to accurately forecast our revenue, expenses, and earnings, or to prevent certain losses. In addition, our systems and processes may not prevent or detect all errors, omissions, or fraud. Our productivity and the quality of our products and services may be adversely affected if we do not integrate and train our new employees quickly and effectively, including employees we acquired in connection with our acquisition of Cyvera Ltd. (“Cyvera”). Any future growth would add complexity to our organization and require effective coordination throughout our organization. For example, as a result of growth in our employee headcount, we relocated our corporate headquarters to a larger office space in Santa Clara, California in November 2013. Failure to manage any future growth effectively could result in increased costs, negatively impact our end-customers’ satisfaction with our products and services, and harm our operating results.
Our operating results are likely to vary significantly from period to period and be unpredictable, which could cause the market price of our common stock to decline.
Our operating results, in particular, our revenues, gross margins, operating margins, and operating expenses, have historically varied from period to period, and we expect that this trend will continue as a result of a number of factors, many of which are outside of our control and may be difficult to predict, including:
our ability to attract and retain new end-customers;
the budgeting cycles and purchasing practices of end-customers;
changes in end-customer, distributor or reseller requirements, or market needs;
changes in the growth rate of the enterprise security market;
the timing and success of new product and service introductions by us or our competitors or any other change in the competitive landscape of our industry, including consolidation among our competitors or end-customers;
changes in mix of our products and services including increases in multi-year subscriptions and support and maintenance;
price competition;
deferral of orders from end-customers in anticipation of new products or product enhancements announced by us or our competitors;
our ability to successfully expand our business domestically and internationally;

- 11 -


the timing and costs related to the development or acquisition of technologies or businesses;
lack of synergy, or the inability to realize expected synergies, resulting from recent acquisitions;
our inability to complete or integrate efficiently any acquisitions that we have completed, or that we may undertake;
our ability to increase the size of our distribution channel;
decisions by potential end-customers to purchase enterprise security solutions from larger, more established security vendors or from their primary network equipment vendors;
changes in end-customer attach rates and renewal rates for our services;
timing of revenue recognition and revenue deferrals;
our ability to manage production and manufacturing related costs, global customer service organization costs, inventory excess and obsolescence costs, and warranty costs;
insolvency or credit difficulties confronting our customers, which could adversely affect their ability to purchase or pay for our products and services, or confronting our key suppliers, including our sole source suppliers, which could disrupt our supply chain;
any disruption in our channel or termination of our relationship with important channel partners, including as a result of consolidation among distributors and resellers of enterprise security solutions;
our inability to fulfill our end-customers’ orders due to supply chain delays or events that impact our manufacturers or their suppliers;
increased expenses, unforeseen liabilities, or write-downs and any impact on our results of operations from any acquisition consummated;
the cost and potential outcomes of litigation, which could have a material adverse effect on our business;
seasonality or cyclical fluctuations in our markets;
future accounting pronouncements or changes in our accounting policies, including the potential impact of the adoption and implementation of the May 2014 Financial Accounting Standards Board’s (FASB) Accounting Standards Update (ASU) No. 2014-09 regarding revenue recognition;
the impact on our overall effective tax rate caused by any reorganization in our corporate structure or any changes in our valuation allowance for domestic deferred assets;
increases or decreases in our expenses caused by fluctuations in foreign currency exchange rates, as an increasing portion of our expenses are incurred and paid in currencies other than the U.S. dollar;
political, economic and social instability, including continued hostilities in the Middle East and any disruption these events may cause to broader global industrial economy; and
general macroeconomic conditions, both domestically and in our foreign markets.
Any one of the factors above, or the cumulative effect of some of the factors referred to above, may result in significant fluctuations in our financial and other operating results. This variability and unpredictability could result in our failure to meet our revenue, margin, or other operating result expectations or those of securities analysts or investors for a particular period. If we fail to meet or exceed such expectations for these or any other reasons, the market price of our common stock could fall substantially, and we could face costly lawsuits, including securities class action suits.
Our revenue growth rate in recent periods may not be indicative of our future performance.
We have recently experienced revenue growth rates of 51% and 55% in fiscal 2014 and 2013, respectively. You should not rely on our revenue for any prior quarterly or annual periods as any indication of our future revenue or revenue growth. If we are unable to maintain consistent revenue or revenue growth, the market price of our common stock could be volatile, and it may be difficult to achieve and maintain profitability.
We have a history of losses, anticipate increasing our operating expenses in the future, and may not be able to achieve or maintain profitability or maintain or increase cash flow on a consistent basis. If we cannot achieve or maintain profitability or maintain or increase our cash flow, our business, financial condition, and operating results may suffer.
Other than fiscal 2012, we have incurred losses in all fiscal years since our inception. We incurred a net loss of $226.5 million in fiscal 2014, $29.2 million in fiscal 2013, and $12.5 million in fiscal 2011. As a result, we had an accumulated deficit of

- 12 -


$335.7 million at July 31, 2014. We anticipate that our operating expenses will increase substantially in the foreseeable future as we continue to enhance our product and service offerings, broaden our installed end-customer base, expand our sales channels, expand our operations, hire additional employees, and continue to develop our technology. These efforts may prove more expensive than we currently anticipate, and we may not succeed in increasing our revenues sufficiently, or at all, to offset these higher expenses. Revenue growth may slow or revenue may decline for a number of possible reasons, including slowing demand for our products or services, increasing competition, a decrease in the growth of our overall market, or a failure to capitalize on growth opportunities. Any failure to increase our revenues as we grow our business could prevent us from achieving or maintaining profitability or maintaining or increasing cash flow on a consistent basis. If we are unable to meet these risks and challenges as we encounter them, our business, financial condition, and operating results may suffer.
Our limited operating history makes it difficult to evaluate our current business and future prospects, and may increase the risk of your investment.
We were founded in 2005 and shipped our first products in 2007. The majority of our revenue growth has occurred since 2009. Our limited operating history makes it difficult to evaluate our current business and our future prospects, including our ability to plan for and model future growth. We have encountered and will continue to encounter risks and difficulties frequently experienced by rapidly growing companies in constantly evolving industries, including the risks described in this Annual Report on Form 10-K. If we do not address these risks successfully, our business and operating results will be adversely affected, and the market price of our common stock could decline. Further, we have limited historical financial data and we operate in a rapidly evolving market. As such, any predictions about our future revenue and expenses may not be as accurate as they would be if we had a longer operating history or operated in a more predictable market.
If we are unable to sell additional products and services to our end-customers or maintain or increase our installed end-customer base, our future revenue and operating results will be harmed.
Our future success depends, in part, on our ability to expand the deployment of our platform with existing end-customers by selling additional products, to secure other areas of our end-customers’ network and endpoints, and by upselling additional subscription services to provide increasing levels of enterprise security. This may require increasingly sophisticated and costly sales efforts and may not result in additional sales. In addition, the rate at which our end-customers purchase additional products and services depends on a number of factors, including the perceived need for additional enterprise security products and services as well as general economic conditions. If our efforts to sell additional products and services to our end-customers are not successful, our business may suffer.
Further, existing end-customers that purchase our subscriptions have no contractual obligation to renew their contracts after the completion of their initial contract period, which is typically one year, and we cannot accurately predict renewal rates. Our end-customers’ renewal rates may decline or fluctuate as a result of a number of factors, including their satisfaction with our services and our end-customer support, the frequency and severity of subscription outages, our product uptime or latency, and the pricing of our, or competing, services. If our end-customers renew their subscriptions, they may renew for shorter contract lengths or on other terms that are less economically beneficial to us. We have limited historical data with respect to rates of end-customer renewals, so we may not accurately predict future renewal trends. We cannot assure you that our end-customers will renew their subscriptions, and if our end-customers do not renew their agreements or renew on less favorable terms, our revenues may grow more slowly than expected or decline.
We also depend on our installed end-customer base for future support and maintenance revenues. Our support and maintenance agreements are typically one year. If end-customers choose not to continue renewing their support and maintenance or seek to renegotiate the terms of support and maintenance agreements prior to renewing such agreements, our revenue may decline.
We face intense competition in our market, especially from larger, well-established companies, and we may lack sufficient financial or other resources to maintain or improve our competitive position.
The market for enterprise security products is intensely competitive, and we expect competition to increase in the future from established competitors and new market entrants. Our main competitors fall into four categories:
large networking vendors such as Cisco Systems, Inc. (“Cisco”) and Juniper Networks, Inc. (“Juniper”) that incorporate enterprise security features in their products;
large companies such as Intel Corporation (“Intel”), International Business Machines (“IBM”), and Hewlett-Packard Company (“HP”) that have acquired large network and endpoint security specialist vendors in recent years and have the technical and financial resources to bring competitive solutions to the market;
independent security vendors such as Check Point Software Technologies Ltd. (“Check Point”) and Fortinet, Inc. (“Fortinet”) that offer network security products and Symantec, Inc. (“Symantec”) that offers endpoint security products; and

- 13 -


small and large companies that offer point solutions that compete with some of the features present in our platform.
Many of our existing competitors have, and some of our potential competitors could have, substantial competitive advantages such as:
greater name recognition and longer operating histories;
larger sales and marketing budgets and resources;
broader distribution and established relationships with distribution partners and end-customers;
greater customer support resources;
greater resources to make acquisitions;
lower labor and development costs;
larger and more mature intellectual property portfolios; and
substantially greater financial, technical, and other resources.
In addition, some of our larger competitors have substantially broader and more diverse product offerings and leverage their relationships based on other products or incorporate functionality into existing products to gain business in a manner that discourages users from purchasing our products, including through selling at zero or negative margins, product bundling, or closed technology platforms. Potential end-customers may also prefer to purchase from their existing suppliers rather than a new supplier regardless of product performance or features. These larger competitors often have broader product lines and market focus and may therefore not be as susceptible to downturns in a particular market. Many of our smaller competitors that specialize in providing protection from a single type of enterprise security threat are often able to deliver these specialized enterprise security products to the market more quickly than we can. Conditions in our market could change rapidly and significantly as a result of technological advancements, partnering by our competitors, or continuing market consolidation. New start-up companies that innovate and large competitors that are making significant investments in research and development may invent similar or superior products and technologies that compete with our products and technology. Our current and potential competitors may also establish cooperative relationships among themselves or with third parties that may further enhance their resources.
Some of our competitors have made acquisitions of businesses that may allow them to offer more directly competitive and comprehensive solutions than they had previously offered, such as Intel’s acquisition of McAfee, Inc. and Stonesoft Oyj, Check Point’s acquisition of Nokia Corporation’s security appliance business, and Cisco's acquisition of SourceFire, Inc. As a result of such acquisitions, our current or potential competitors might be able to adapt more quickly to new technologies and end-customer needs, devote greater resources to the promotion or sale of their products and services, initiate or withstand substantial price competition, take advantage of acquisition or other opportunities more readily, or develop and expand their product and service offerings more quickly than we do. Due to various reasons, organizations may be more willing to incrementally add solutions to their existing enterprise security infrastructure from competitors than to replace it with our solutions. These competitive pressures in our market or our failure to compete effectively may result in price reductions, fewer orders, reduced revenue and gross margins, and loss of market share. Any failure to meet and address these factors could seriously harm our business and operating results.
If functionality similar to that offered by our products is incorporated into existing network infrastructure products, organizations may decide against adding our appliances to their network, which would have an adverse effect on our business.
Large, well-established providers of networking equipment such as Cisco and Juniper offer, and may continue to introduce, enterprise security features that compete with our products, either in stand-alone security products or as additional features in their network infrastructure products. The inclusion of, or the announcement of an intent to include, functionality perceived to be similar to that offered by our security solutions in networking products that are already generally accepted as necessary components of network architecture may have an adverse effect on our ability to market and sell our products. Furthermore, even if the functionality offered by network infrastructure providers is more limited than our products, a significant number of end-customers may elect to accept such limited functionality in lieu of adding appliances from an additional vendor such as us. Many organizations have invested substantial personnel and financial resources to design and operate their networks and have established deep relationships with other providers of networking products, which may make them reluctant to add new components to their networks, particularly from other vendors such as us. In addition, an organization’s existing vendors or new vendors with a broad product offering may be able to offer concessions that we are not able to match because we currently offer only enterprise security products and have fewer resources than many of our competitors. If organizations are reluctant to add additional network infrastructure from new vendors or otherwise decide to work with their existing vendors, our ability to increase our market share and improve our financial condition and operating results will be adversely affected.

- 14 -


Reliance on shipments at the end of the quarter could cause our revenue for the applicable period to fall below expected levels.
As a result of end-customer buying patterns and the efforts of our sales force and channel partners to meet or exceed their sales objectives, we have historically received a substantial portion of sales orders and generated a substantial portion of revenue during the last few weeks of each fiscal quarter. If expected revenue at the end of any fiscal quarter is delayed for any reason, including the failure of anticipated purchase orders to materialize, our logistics partners’ inability to ship products prior to fiscal quarter-end to fulfill purchase orders received near the end of the fiscal quarter, our failure to manage inventory to meet demand, our inability to release new products on schedule, any failure of our systems related to order review and processing, or any delays in shipments based on trade compliance requirements, our revenue for that quarter could fall below our expectations and the estimates of analysts, which could adversely impact our business and results of operations and cause a decline in the market price of our common stock.
If we are unable to hire, retain, train, and motivate qualified personnel and senior management, our business could suffer.
Our future success depends, in part, on our ability to continue to attract and retain highly skilled personnel. The loss of the services of any of our key personnel, the inability to attract or retain qualified personnel, or delays in hiring required personnel, particularly in engineering and sales, may seriously harm our business, financial condition, and operating results. Although we have entered into employment offer letters with our key personnel, these agreements have no specific duration and constitute at-will employment. We are also substantially dependent on the continued service of our existing development personnel because of the complexity of our platform. Additionally, any failure to hire, train, and adequately incentivize our sales personnel could negatively impact our growth. Further, the inability of our recently hired sales personnel to effectively ramp to target productivity levels could negatively impact our operating margins. If we are not effective in managing any leadership transition in our sales organization, our business could be adversely impacted and our operating results and financial condition could be harmed.
Competition for highly skilled personnel is often intense, especially in the San Francisco Bay Area, where we have a substantial presence and need for highly skilled personnel. Additionally, the industry in which we operate generally experiences high employee attrition. We may not be successful in attracting, integrating, or retaining qualified personnel to fulfill our current or future needs. Also, to the extent we hire personnel from competitors, we may be subject to allegations that they have been improperly solicited, that they have divulged proprietary or other confidential information, or that their former employers own their inventions or other work product.
Our future performance also depends on the continued services and continuing contributions of our senior management to execute on our business plan and to identify and pursue new opportunities and product innovations. The loss of services of senior management could significantly delay or prevent the achievement of our development and strategic objectives, which could adversely affect our business, financial condition, and operating results.
Our employees do not have employment arrangements that require them to continue to work for us for any specified period, and therefore, they could terminate their employment with us at any time. We do not maintain key person life insurance policies on any of our employees. The loss of one or more of our key employees could seriously harm our business.
We rely on third-party channel partners to sell substantially all of our products, and if our partners fail to perform, our ability to sell and distribute our products and services will be limited, and our operating results will be harmed.
Substantially all of our revenue is generated by sales through our channel partners, including distributors and resellers. We provide our sales channel partners with specific training and programs to assist them in selling our products, but there can be no assurance that these steps will be effective. In addition, our channel partners may be unsuccessful in marketing, selling, and supporting our products and services. If we are unable to develop and maintain effective sales incentive programs for our third-party channel partners, we may not be able to incentivize these partners to sell our products to end-customers and, in particular, to large enterprises. These partners may also market, sell, and support products and services that are competitive with ours and may devote more resources to the marketing, sales, and support of such competitive products. These partners may have incentives to promote our competitors’ products to the detriment of our own or may cease selling our products altogether. Our agreements with our channel partners may generally be terminated for any reason by either party with advance notice prior to each annual renewal date. We cannot assure you that we will retain these channel partners or that we will be able to secure additional or replacement channel partners. The loss of one or more of our significant channel partners or a decline in the number or size of orders from them could harm our operating results. In addition, any new sales channel partner requires extensive training and may take several months or more to achieve productivity. Our channel partner sales structure could subject us to lawsuits, potential liability, and reputational harm if, for example, any of our channel partners misrepresent the functionality of our products or services to end-customers or violate laws or our corporate policies. If we fail to effectively manage our existing sales channels, if our channel partners are unsuccessful in fulfilling the orders for our products, or if we are unable to enter into arrangements with, and retain a sufficient number of, high quality channel partners in each of the regions in which we sell products and keep them motivated to sell our products, our ability to sell our products and operating results will be harmed.

- 15 -


Because we depend on third-party manufacturers to build and ship our products, we are susceptible to manufacturing and logistics delays and pricing fluctuations that could prevent us from shipping customer orders on time, if at all, or on a cost-effective basis, which may result in the loss of sales and customers.
We depend on third-party manufacturers, primarily Flextronics International Ltd. (“Flextronics”), our contract manufacturer, as sole source manufacturers for our product lines. Our reliance on these third-party manufacturers reduces our control over the manufacturing process and exposes us to risks, including reduced control over quality assurance, product costs, and product supply and timing, as well as the risk that minerals which originate from the Democratic Republic of the Congo and adjoining countries, or conflict minerals, may be included in our products. In addition, while the majority of our products are manufactured by our contract manufacturers at facilities located in the United States, any growth or expansion of such manufacturing at facilities in foreign countries may subject us to additional risks associated with complying with local rules and regulations. Any manufacturing and logistics disruption by these third-party manufacturers could severely impair our ability to fulfill orders. In addition, we are subject to requirements under the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 that require us to diligence, disclose, and report whether or not our products contain conflicts minerals. These requirements could adversely affect the sourcing, availability, and pricing of minerals used in the manufacture of semiconductor devices or other components used in our products. We may also encounter customers who require that all of the components of our products be certified as conflict free. If we are not able to meet this requirement, such customers may choose not to purchase our products, which could adversely impact sales of our products. In addition, we incur additional costs to comply with these disclosure requirements, including costs related to determining the source of any of the relevant minerals and metals used in our products.
These manufacturers typically fulfill our supply requirements on the basis of individual orders. We do not have long term contracts with our third-party manufacturers that guarantee capacity, the continuation of particular pricing terms, or the extension of credit limits. Accordingly, they are not obligated to continue to fulfill our supply requirements, which could result in supply shortages, and the prices we are charged for manufacturing services could be increased on short notice. Our contract with Flextronics permits them to terminate the agreement for their convenience, subject to prior notice requirements. If we are required to change contract manufacturers, our ability to meet our scheduled product deliveries to our customers could be adversely affected, which could cause the loss of sales to existing or potential customers, delayed revenue or an increase in our costs which could adversely affect our gross margins. Any production interruptions for any reason, such as a natural disaster, epidemic, capacity shortages, or quality problems, at one of our manufacturing partners would negatively affect sales of our product lines manufactured by that manufacturing partner and adversely affect our business and operating results.
Managing the supply of our products and product components is complex. Insufficient supply and inventory may result in lost sales opportunities or delayed revenue, while excess inventory may harm our gross margins.
Our third-party manufacturers procure components and build our products based on our forecasts, and we generally do not hold inventory for a prolonged period of time. These forecasts are based on estimates of future demand for our products, which are in turn based on historical trends and analyses from our sales and marketing organizations, adjusted for overall market conditions. In order to reduce manufacturing lead times and plan for adequate component supply, from time to time we may issue forecasts for components and products that are non-cancelable and non-returnable.
Our inventory management systems and related supply chain visibility tools may be inadequate to enable us to forecast accurately and effectively manage supply of our products and product components. Supply management remains an increased area of focus as we balance the need to maintain supply levels that are sufficient to ensure competitive lead times against the risk of obsolescence because of rapidly changing technology and end-customer requirements. If we ultimately determine that we have excess supply, we may have to reduce our prices and write-down inventory, which in turn could result in lower gross margins. If our actual component usage and product demand are lower than the forecast we provide to our third-party manufacturers, we accrue for losses on manufacturing commitments in excess of forecasted demand. Alternatively, insufficient supply levels may lead to shortages that result in delayed revenue or loss of sales opportunities altogether as potential end-customers turn to competitors’ products that are readily available. Additionally, any increases in the time required to manufacture our products or ship products could result in supply shortfalls. If we are unable to effectively manage our supply and inventory, our operating results could be adversely affected.
Because some of the key components in our products come from limited sources of supply, we are susceptible to supply shortages or supply changes, which could disrupt or delay our scheduled product deliveries to our customers and may result in the loss of sales and customers.
Our products rely on key components, including integrated circuit components, which our contract manufacturers purchase on our behalf from a limited number of suppliers, including sole source providers. The manufacturing operations of some of our component suppliers are geographically concentrated in Asia and elsewhere, which makes our supply chain vulnerable to regional disruptions. A fire, flood, earthquake, tsunami or other disaster, condition or event such as political instability, civil unrest or a power outage that adversely affects any of these component suppliers’ facilities could significantly affect our ability to obtain the

- 16 -


necessary components for our products, which could result in a substantial loss of sales and revenue and a substantial harm to our operating results. Similarly, a localized health risk affecting employees at these facilities, such as the spread of a pandemic influenza, could impair the volume of components that we are able to obtain, which could result in substantial harm to our operating results.
We do not have volume purchase contracts with any of our component suppliers, and they could cease selling to us at any time. In addition, our component suppliers change their selling prices frequently in response to market trends, including industry-wide increases in demand, and because we do not have volume purchase contracts with these suppliers, we are susceptible to price fluctuations related to raw materials and components. If we are unable to pass component price increases along to our customers or maintain stable pricing, our gross margins and operating results could be negatively impacted. If we are unable to obtain a sufficient quantity of these components in a timely manner for any reason, sales of our products could be delayed or halted or we could be forced to expedite shipment of such components or our products at dramatically increased costs, which would negatively impact our revenue and gross margins. Additionally, poor quality in any of the sole-sourced components in our products could result in lost sales or lost sales opportunities. If the quality of the components does not meet our or our end-customers’ requirements, if we are unable to obtain components from our existing suppliers on commercially reasonable terms, or if any of our sole source providers cease to remain in business or continue to manufacture such components, we could be forced to redesign our products and qualify new components from alternate suppliers. The resulting stoppage or delay in selling our products and the expense of redesigning our products could result in lost sales opportunities and damage to customer relationships, which would adversely affect our business and operating results.
If we are not successful in executing our strategy to increase sales of our products to new and existing medium and large enterprise end-customers, our operating results may suffer.
Our growth strategy is dependent, in part, upon increasing sales of our products to medium and large enterprises. Sales to these types of end-customers involve risks that may not be present (or that are present to a lesser extent) with sales to smaller entities. These risks include:
competition from larger competitors, such as Cisco, Check Point, and Juniper, that traditionally target larger enterprises, service providers, and government entities and that may have pre-existing relationships or purchase commitments from those end-customers;
increased purchasing power and leverage held by large end-customers in negotiating contractual arrangements with us;
more stringent requirements in our worldwide support service contracts, including stricter support response times and penalties for any failure to meet support requirements; and
longer sales cycles and the associated risk that substantial time and resources may be spent on a potential end-customer that elects not to purchase our products and services.
Large enterprises often undertake a significant evaluation process that results in a lengthy sales cycle, in some cases over 12 months. Although we have a channel sales model, our sales representatives typically engage in direct interaction with our distributors and resellers in connection with sales to larger end-customers. Because these evaluations are often lengthy, with significant size and scope and stringent requirements, we typically provide evaluation products to these end-customers. We may spend substantial time, effort, and money in our sales efforts without being successful in generating any sales. In addition, product purchases by large enterprises are frequently subject to budget constraints, multiple approvals, and unplanned administrative, processing, and other delays. Finally, large enterprises typically have longer implementation cycles, require greater product functionality and scalability and a broader range of services, demand that vendors take on a larger share of risks, sometimes require acceptance provisions that can lead to a delay in revenue recognition, and expect greater payment flexibility from vendors. All of these factors can add further risk to business conducted with these end-customers. If we fail to realize an expected sale from a large end-customer in a particular quarter or at all, our business, operating results, and financial condition could be materially and adversely affected.
We rely on revenue from subscription and support services, which may decline, and because we recognize revenue from subscriptions and support services over the term of the relevant service period, downturns or upturns in sales of these subscription and support services are not immediately reflected in full in our operating results.
Services revenue accounts for a significant portion of our revenue, comprising 43% of total revenue in fiscal 2014 and 38% of total revenue in fiscal 2013. Sales of new or renewal subscription and support and maintenance contracts may decline and fluctuate as a result of a number of factors, including end-customers’ level of satisfaction with our products and services, the prices of our products and services, the prices of products and services offered by our competitors, and reductions in our end-customers’ spending levels. If our sales of new or renewal subscription and support and maintenance contracts decline, our revenue and revenue growth may decline and our business will suffer. In addition, we recognize subscription and support and maintenance revenue monthly over the term of the relevant service period, which is typically one year and can be up to five years. As a result,

- 17 -


much of the subscription and support and maintenance revenue we report each fiscal quarter is the recognition of deferred revenue from subscription and support and maintenance contracts entered into during previous fiscal quarters. Consequently, a decline in new or renewed subscription or support and maintenance contracts in any one fiscal quarter will not be fully or immediately reflected in revenue in that fiscal quarter but will negatively affect our revenue in future fiscal quarters. Accordingly, the effect of significant downturns in new or renewed sales of our subscriptions or support and maintenance is not reflected in full in our operating results until future periods. Also, it is difficult for us to rapidly increase our services revenue through additional service sales in any period, as revenue from new and renewal service contracts must be recognized over the applicable service period. Furthermore, any increase in the average term of services contracts would result in revenue for services contracts being recognized over longer periods of time.
Defects, errors, or vulnerabilities in our products or services or the failure of our products or services to block a virus or prevent a security breach could harm our reputation and adversely impact our results of operations.
Because our products and services are complex, they have contained and may contain design or manufacturing defects or errors that are not detected until after their commercial release and deployment by our end-customers. For example, from time to time, certain of our end-customers have reported defects in our products related to performance, scalability, and compatibility that were not detected before shipping the product. Additionally, defects may cause our products or services to be vulnerable to security attacks, cause them to fail to help secure networks, or temporarily interrupt end-customers’ networking traffic. Because the techniques used by computer hackers to access or sabotage networks change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques and provide a solution in time to protect our end-customers’ networks. Furthermore, as a well-known provider of enterprise security solutions, our networks, products, and services could be targeted by attacks specifically designed to disrupt our business and harm our reputation. In addition, defects or errors in our subscription updates or our products could result in a failure of our services to effectively update end-customers’ hardware products and thereby leave our end-customers vulnerable to attacks. Our data centers and networks may experience technical failures and downtime, may fail to distribute appropriate updates, or may fail to meet the increased requirements of a growing installed end-customer base, any of which could temporarily or permanently expose our end-customers’ networks, leaving their networks unprotected against the latest security threats.
Any defects, errors, or vulnerabilities in our products could result in:
expenditure of significant financial and product development resources in efforts to analyze, correct, eliminate, or work-around errors or defects or to address and eliminate vulnerabilities;
loss of existing or potential end-customers or channel partners;
delayed or lost revenue;
delay or failure to attain market acceptance;
an increase in warranty claims compared with our historical experience, or an increased cost of servicing warranty claims, either of which would adversely affect our gross margins; and
litigation, regulatory inquiries, or investigations that may be costly and harm our reputation.
Our business is subject to the risks of warranty claims, product returns, product liability, and product defects.
Our products are very complex and, despite testing prior to their release, they have contained and may contain undetected defects or errors, especially when first introduced or when new versions are released. Product defects or errors could affect the performance of our products and could delay the development or release of new products or new versions of products, adversely affect our reputation and our end-customers’ willingness to buy products from us, and adversely affect market acceptance or perception of our products. Any such errors or delays in releasing new products or new versions of products or allegations of unsatisfactory performance could cause us to lose revenue or market share, increase our service costs, cause us to incur substantial costs in redesigning the products, cause us to lose significant end-customers, subject us to liability for damages, and divert our resources from other tasks, any one of which could materially and adversely affect our business, results of operations, and financial condition. Our products must successfully interoperate with products from other vendors. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. For example, from time to time, certain of our end-customers have experienced temporary delays or interoperability issues when implementing our products in large complex global deployments where our products are required to interoperate with a complex environment of third party products. The occurrence of hardware or software errors, whether or not caused by our products, could delay or reduce market acceptance of our products, and have an adverse effect on our business and financial performance, and any necessary revisions may cause us to incur significant expenses. The occurrence of any such problems could harm our business, financial condition, and results of operations.
The limitation of liability provisions in our standard terms and conditions of sale may not fully or effectively protect us from claims as a result of federal, state, or local laws or ordinances, or unfavorable judicial decisions in the United States or other

- 18 -


countries. The sale and support of our products also entails the risk of product liability claims. Although we may be indemnified by our third-party manufacturers for product liability claims arising out of manufacturing defects, because we control the design of our products, we may not be indemnified for product liability claims arising out of design defects. We maintain insurance to protect against certain claims associated with the use of our products, but our insurance coverage may not adequately cover any claim asserted against us. In addition, even claims that ultimately are unsuccessful could result in our expenditure of funds in litigation, divert management’s time and other resources, and harm our reputation.
If the enterprise security market does not continue to adopt our enterprise security platform, our sales will not grow as quickly as anticipated, and the market price of our common stock could decline.
We are seeking to disrupt the enterprise security market with our enterprise security platform. However, organizations that use legacy products and services for their enterprise security needs may believe that these products and services sufficiently achieve their purpose. Organizations may also believe that our products and services only serve the needs of a portion of the enterprise security market. Accordingly, organizations may continue allocating their information technology (IT) budgets for legacy products and services and may not adopt our enterprise security platform. If the market for enterprise security solutions does not continue to adopt our enterprise security platform, if end-customers do not recognize the value of our platform compared to legacy products and services, or if we are otherwise unable to sell our products and services to organizations, then our revenue may not grow or may decline, which would have a material adverse effect on our operating results and financial condition.
If we do not accurately predict, prepare for, and respond promptly to the rapidly evolving technological and market developments and changing end-customer needs in the enterprise security market, our competitive position and prospects will be harmed.
The enterprise security market is expected to continue to evolve rapidly. Moreover, many of our end-customers operate in markets characterized by rapidly changing technologies and business plans, which require them to add numerous network access points and adapt increasingly complex enterprise networks, incorporating a variety of hardware, software applications, operating systems, and networking protocols. The technology in our products is especially complex because it needs to effectively identify and respond to new and increasingly sophisticated methods of attack, while minimizing the impact on network performance. Additionally, some of our new products and enhancements may require us to develop new hardware architectures that involve complex, expensive, and time-consuming research and development processes. Although the market expects rapid introduction of new products or product enhancements to respond to new threats, the development of these products is difficult and the timetable for commercial release and availability is uncertain as there can be long time periods between releases and availability of new products. We may experience unanticipated delays in the availability of new products and services and fail to meet customer expectations for such availability. If we do not quickly respond to the rapidly changing and rigorous needs of our end-customers by developing, releasing, and making available on a timely basis new products and services or enhancements that can respond adequately to new security threats, our competitive position and business prospects will be harmed.
Additionally, the process of developing new technology is complex and uncertain, and if we fail to accurately predict end-customers’ changing needs and emerging technological trends in the enterprise security industry, including the areas of mobility, virtualization, cloud computing, and software defined networks (SDN), our business could be harmed. We must commit significant resources to developing new products before knowing whether our investments will result in products the market will accept. The success of new products depends on several factors, including appropriate new product definition, component costs, timely completion and introduction of these products, differentiation of new products from those of our competitors, and market acceptance of these products. There can be no assurance that we will successfully identify new product opportunities, develop and bring new products to market in a timely manner, or achieve market acceptance of our products, or that products and technologies developed by others will not render our products or technologies obsolete or noncompetitive.
To remain competitive, we must successfully manage product introductions and transitions.
Due to the highly volatile and competitive nature of the industries in which we compete, we must continually introduce new products, services and technologies, and enhance existing products and services. The success of new product introductions depends on a number of factors including, but not limited to, timely and successful product development, market acceptance, our ability to manage the risks associated with new product production ramp-up issues, the availability of application software for new products, the effective management of purchase commitments and inventory in line with anticipated product demand, the availability of products in appropriate quantities and costs to meet anticipated demand, and the risk that new products may have quality or other defects or deficiencies in the early stages of introduction. Accordingly, we cannot determine in advance the ultimate effect of new product introductions and transitions on our business and results of operations.

- 19 -


Our current research and development efforts may not produce successful products or features that result in significant revenue, cost savings or other benefits in the near future, if at all.
Developing our products and related enhancements is expensive. Our investments in research and development may not result in significant design improvements, marketable products or features, or may result in products that are more expensive than anticipated. Additionally, we may not achieve the cost savings or the anticipated performance improvements we expect, and we may take longer to generate revenue, or generate less revenue, than we anticipate. Our future plans include significant investments in research and development and related product opportunities. We believe that we must continue to dedicate a significant amount of resources to our research and development efforts to maintain our competitive position. However, we may not receive significant revenue from these investments in the near future, if at all, or these investments may not yield the expected benefits, either of which could adversely affect our business and operating results.
The sales prices of our products and services may decrease, which may reduce our gross profits and adversely impact our financial results.
The sales prices for our products and services may decline for a variety of reasons, including competitive pricing pressures, discounts, a change in our mix of products and services, anticipation of the introduction of new products or services, or promotional programs. Competition continues to increase in the market segments in which we participate, and we expect competition to further increase in the future, thereby leading to increased pricing pressures. Larger competitors with more diverse product and service offerings may reduce the price of products or services that compete with ours or may bundle them with other products and services. Additionally, although we price our products and services worldwide in U.S. dollars, currency fluctuations in certain countries and regions may negatively impact actual prices that partners and end-customers are willing to pay in those countries and regions. Furthermore, we anticipate that the sales prices and gross profits for our products will decrease over product life cycles. We cannot assure you that we will be successful in developing and introducing new offerings with enhanced functionality on a timely basis, or that our product and service offerings, if introduced, will enable us to maintain our prices and gross profits at levels that will allow us to achieve and maintain profitability.
We generate a significant amount of revenue from sales to distributors, resellers, and end-customers outside of the United States, and we are therefore subject to a number of risks associated with international sales and operations.
We have a limited history of marketing, selling, and supporting our products and services internationally. As a result, we must hire and train experienced personnel to staff and manage our foreign operations. To the extent that we experience difficulties in recruiting, training, managing, and retaining an international staff, and specifically staff related to sales management and sales personnel, we may experience difficulties in sales productivity in foreign markets. We also enter into strategic distributor and reseller relationships with companies in certain international markets where we do not have a local presence. If we are not able to maintain successful strategic distributor relationships internationally or recruit additional companies to enter into strategic distributor relationships, our future success in these international markets could be limited. Business practices in the international markets that we serve may differ from those in the United States and may require us in the future to include terms other than our standard terms in customer contracts. To the extent that we may enter into customer contracts in the future that include non-standard terms related to payment, warranties, or performance obligations, our operating results may be adversely impacted.
Additionally, our international sales and operations are subject to a number of risks, including the following:
political, economic and social uncertainty around the world, in particular, macroeconomic challenges in Europe and continued hostilities in the Middle East;
greater difficulty in enforcing contracts and accounts receivable collection and longer collection periods;
the uncertainty of protection for intellectual property rights in some countries;
greater risk of unexpected changes in regulatory practices, tariffs, and tax laws and treaties;
risks associated with trade restrictions and foreign legal requirements, including the importation, certification, and localization of our products required in foreign countries;
greater risk of a failure of foreign employees, partners, distributors, and resellers to comply with both U.S. and foreign laws, including antitrust regulations, the U.S. Foreign Corrupt Practices Act, the U.K. Bribery Act, U.S. or foreign sanctions regimes and export or import control laws, and any trade regulations ensuring fair trade practices;
heightened risk of unfair or corrupt business practices in certain geographies and of improper or fraudulent sales arrangements that may impact financial results and result in restatements of, or irregularities in, financial statements;
increased expenses incurred in establishing and maintaining office space and equipment for our international operations;

- 20 -


greater difficulty in recruiting local experienced personnel, and the costs and expenses associated with such activities;
management communication and integration problems resulting from cultural and geographic dispersion;
fluctuations in exchange rates between the U.S. dollar and foreign currencies in markets where we do business; and
general economic and political conditions in these foreign markets.
These factors and other factors could harm our ability to gain future international revenues and, consequently, materially impact our business, operating results, and financial condition. The expansion of our existing international operations and entry into additional international markets will require significant management attention and financial resources. Our failure to successfully manage our international operations and the associated risks effectively could limit the future growth of our business.
We are exposed to the credit and liquidity risk of some of our channel partners and to credit exposure in weakened markets, which could result in material losses.
For fiscal 2014, three channel partners represented 70% of our total revenue, and as of July 31, 2014, three channel partners represented 73% of our gross accounts receivable. Most of our sales to our channel partners are made on an open credit basis. Although we have programs in place that are designed to monitor and mitigate these risks, we cannot assure you these programs will be effective in reducing our credit risks, especially as we expand our business internationally. If we are unable to adequately control these risks, our business, operating results, and financial condition could be harmed.
A portion of our revenue is generated by sales to government entities, which are subject to a number of challenges and risks.
Sales to U.S. and foreign, federal, state, and local governmental agency end-customers have accounted for an increasingly significant amount of our revenue, and we may in the future increase sales to government entities. Sales to government entities are subject to a number of risks. Selling to government entities can be highly competitive, expensive, and time-consuming, often requiring significant upfront time and expense without any assurance that these efforts will generate a sale. Government certification requirements for products like ours may change, thereby restricting our ability to sell into the federal government sector until we have attained the revised certification. Government demand and payment for our products and services may be impacted by public sector budgetary cycles and funding authorizations, with funding reductions or delays adversely affecting public sector demand for our products and services. For example, the U.S. Congress may take additional action in 2014 to further reduce federal spending and the deficit which could further impact our business and operating results.
The substantial majority of our sales to date to government entities have been made indirectly through our channel partners. Government entities may have statutory, contractual, or other legal rights to terminate contracts with our distributors and resellers for convenience or due to a default, and any such termination may adversely impact our future operating results. Governments routinely investigate and audit government contractors’ administrative processes, and any unfavorable audit could result in the government refusing to continue buying our products and services, a reduction of revenue or fines or civil or criminal liability if the audit uncovers improper or illegal activities, which could adversely impact our operating results in a material way. Finally, for purchases by the U.S. government, the government may require certain products to be manufactured in the United States and other relatively high cost manufacturing locations, and we may not manufacture all products in locations that meet the requirements of the U.S. government, affecting our ability to sell these products to the U.S. government.
If our products do not interoperate with our end-customers’ infrastructure, sales of our products and services could be negatively affected, which would harm our business.
Our products must interoperate with our end-customers’ existing infrastructure, which often have different specifications, utilize multiple protocol standards, deploy products from multiple vendors, and contain multiple generations of products that have been added over time. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. If we find defects in the hardware, we replace the hardware as part of our normal warranty process. If we find errors in the existing software that create problematic network configurations or settings, as we have in the past, we may have to issue software updates as part of our normal maintenance process. Any delays in identifying the sources of problems or in providing necessary modifications to our software or hardware could have a negative impact on our reputation and our end-customers’ satisfaction with our products and services, and our ability to sell products and services could be adversely affected. In addition, government and other end-customers may require our products to comply with certain security or other certifications and standards. If our products are late in achieving or fail to achieve compliance with these certifications and standards, or our competitors achieve compliance with these certifications and standards, we may be disqualified from selling our products to such end-customers, or at a competitive disadvantage, which would harm our business, operating results, and financial condition.

- 21 -


Our ability to sell our products is dependent on the quality of our channel partners’ technical support services, and our channel partners’ failure to offer high quality technical support services could have a material adverse effect on our end-customers’ satisfaction with our products and services, our sales, and our operating results.
Once our products are deployed within our end-customers’ networks, our end-customers depend on our technical support services, as well as the support of our channel partners, to resolve any issues relating to our products. Our channel partners often provide similar technical support for third parties’ products, and may therefore have fewer resources to dedicate to the support of our products. If we or our channel partners do not effectively assist our end-customers in deploying our products, succeed in helping our end-customers quickly resolve post-deployment issues, or provide effective ongoing support, our ability to sell additional products and services to existing end-customers would be adversely affected and our reputation with potential end-customers could be damaged. Many larger enterprise, service provider, and government entity end-customers have more complex networks and require higher levels of support than smaller end-customers. If we or our channel partners fail to meet the requirements of these larger end-customers, it may be more difficult to execute on our strategy to increase our coverage with larger end-customers. Additionally, if our channel partners do not effectively provide support to the satisfaction of our end-customers, we may be required to provide direct support to such end-customers, which would require us to hire additional personnel and to invest in additional resources. It can take several months to recruit, hire, and train qualified technical support employees. We may not be able to hire such resources fast enough to keep up with unexpected demand, particularly when the sales of our products exceed our internal forecasts. To the extent that we or our channel partners are unsuccessful in hiring, training, and retaining adequate support resources, our and our channel partners’ ability to provide adequate and timely support to our end-customers will be negatively impacted, and our end-customers’ satisfaction with our products and services will be adversely affected. Additionally, to the extent that we may need to rely on our sales engineers to provide post-sales support while we are ramping our support resources, our sales productivity will be negatively impacted, which would harm our revenues. Our or our channel partners' failure to provide and maintain high quality support services would have a material adverse effect on our business, financial condition, and operating results.
We face risks associated with having operations and employees located in Israel.
As a result of our acquisition of Cyvera, we have offices and employees located in Israel. As a result, political, economic, and military conditions in Israel directly affect our operations. The future of peace efforts between Israel and its Arab neighbors remains uncertain. Most recently, there has been a significant increase in hostilities and political unrest between Hamas and Israel. The effects of these hostilities and violence on the Israeli economy and our operations in Israel are unclear, and we cannot predict the effect on us of further increases in these hostilities or future armed conflict, political instability or violence in the region. Current or future tensions and conflicts in the Middle East could adversely affect our business, operating results, financial condition and cash flows.
In addition, many of our employees in Israel are obligated to perform annual reserve duty in the Israeli military and are subject to being called for active duty under emergency circumstances. We cannot predict the full impact of these conditions on us in the future, particularly if emergency circumstances or an escalation in the political situation occurs. If many of our employees in Israel are called for active duty for a significant period of time, our operations and our business could be disrupted and may not be able to function at full capacity. Any disruption in our operations in Israel could adversely affect our business.
We may acquire other businesses, which could require significant management attention, disrupt our business, dilute stockholder value, and adversely affect our operating results.
As part of our business strategy, we may acquire or make investments in complementary companies, products, or technologies. For example, in December 2013, we acquired Morta Security, Inc. (“Morta”), and in April 2014, we acquired Cyvera, both cybersecurity companies. However, we have not made any other significant acquisitions to date, and as a result, our ability as an organization to acquire and integrate other companies, products, or technologies in a successful manner is unproven. The identification of suitable acquisition candidates is difficult, and we may not be able to complete such acquisitions on favorable terms, if at all. If we do complete future acquisitions, we may not ultimately strengthen our competitive position or achieve our goals and business strategy, we may be subject to claims or liabilities assumed from an acquired company, product, or technology, and any acquisitions we complete could be viewed negatively by our end-customers, investors, and securities analysts. In addition, if we are unsuccessful at integrating past or future acquisitions, or the technologies associated with such acquisitions, into our company, the revenue and operating results of the combined company could be adversely affected. Any integration process may require significant time and resources, which may disrupt our ongoing business and divert management’s attention, and we may not be able to manage the integration process successfully. We may not successfully evaluate or utilize the acquired technology or personnel, realize anticipated synergies from the acquisition, or accurately forecast the financial impact of an acquisition transaction and integration of such acquisition, including accounting charges. We may have to pay cash, incur debt, or issue equity or equity-linked securities to pay for any future acquisitions, each of which could adversely affect our financial condition or the market price of our common stock. The sale of equity or issuance of equity-linked debt to finance any future acquisitions could result in dilution to our stockholders. The incurrence of indebtedness would result in increased fixed obligations and could also

- 22 -


include covenants or other restrictions that would impede our ability to manage our operations. The occurrence of any of these risks could harm our business, operating results, and financial condition.
False detection of applications, viruses, spyware, vulnerability exploits, data patterns, or URL categories could adversely affect our business.
Our classifications of application type, virus, spyware, vulnerability exploits, data, or uniform resource locator (URL) categories may falsely detect applications, content, or threats that do not actually exist. This risk is heightened by the inclusion of a “heuristics” feature in our products, which attempts to identify applications and other threats not based on any known signatures but based on characteristics or anomalies which indicate that a particular item may be a threat. These false positives may impair the perceived reliability of our products and may therefore adversely impact market acceptance of our products. If our products restrict important files or applications based on falsely identifying them as malware or some other item that should be restricted, this could adversely affect end-customers’ systems and cause material system failures. Any such false identification of important files or applications could result in damage to our reputation, negative publicity, loss of channel partners, end-customers and sales, increased costs to remedy any problem, and costly litigation.
Claims by others that we infringe their proprietary technology or other rights could harm our business.
Companies in the enterprise security industry own large numbers of patents, copyrights, trademarks, domain names, and trade secrets and frequently enter into litigation based on allegations of infringement, misappropriation, or other violations of intellectual property or other rights. As we face increasing competition and gain an increasingly high profile, the possibility of intellectual property rights claims against us grows. Third parties have asserted and may in the future assert claims of infringement of intellectual property rights against us. For example, in December 2011, Juniper, one of our competitors, filed a lawsuit against us alleging patent infringement. In September 2013, we filed a lawsuit against Juniper alleging patent infringement. In May 2014, we entered into a Settlement, Release and Cross-License Agreement (the “settlement agreement”) with Juniper to resolve all pending disputes between Juniper and us, including dismissal of all pending litigation. Please refer to the discussion under “Legal Proceedings” included in Part I, Item 3 of this Annual Report on Form 10-K for more information related to our intellectual property litigation and settlement with Juniper.
Third parties may also assert such claims against our end-customers or channel partners, whom our standard license and other agreements obligate us to indemnify against claims that our products infringe the intellectual property rights of third parties. Furthermore, we may be unaware of the intellectual property rights of others that may cover some or all of our technology or products. As the number of products and competitors in our market increases and overlaps occur, infringement claims may increase. While we intend to increase the size of our patent portfolio, our competitors and others may now and in the future have significantly larger and more mature patent portfolios than we have. In addition, future litigation may involve patent holding companies or other adverse patent owners who have no relevant product revenue and against whom our own patents may therefore provide little or no deterrence or protection. In addition, we have not registered our trademarks in all of our geographic markets and failure to secure those registrations could adversely affect our ability to enforce and defend our trademark rights. Any claim of infringement by a third party, even those without merit, could cause us to incur substantial costs defending against the claim, could distract our management from our business, and could require us to cease use of such intellectual property. Furthermore, because of the substantial amount of discovery required in connection with intellectual property litigation, there is a risk that some of our confidential information could be compromised by disclosure during this type of litigation.
Although third parties may offer a license to their technology or other intellectual property, the terms of any offered license may not be acceptable and the failure to obtain a license or the costs associated with any license could cause our business, financial condition, and operating results to be materially and adversely affected. In addition, some licenses may be non-exclusive, and therefore our competitors may have access to the same technology licensed to us. If a third party does not offer us a license to its technology or other intellectual property on reasonable terms, or at all, we could be enjoined from continued use of such intellectual property. As a result, we may be required to develop alternative, non-infringing technology, which could require significant time (during which we would be unable to continue to offer our affected products or services), effort, and expense and may ultimately not be successful. Furthermore, a successful claimant could secure a judgment or we may agree to a settlement that prevents us from distributing certain products or performing certain services or that requires us to pay substantial damages, royalties, or other fees. Any of these events could seriously harm our business, financial condition, and operating results.
In addition, although we have settled our litigation with Juniper, there is no guarantee that future claims of infringement will not arise between us and Juniper or other third parties. Under the settlement agreement with Juniper, the parties agreed to a mutual dismissal of all pending litigation, a cross-license of the patents in suit for the life of the patents, and an eight-year mutual covenant not to sue for infringement of any other patents. We also agreed to pay Juniper a one-time settlement amount of approximately $175.0 million, consisting of $75.0 million in cash, 1,080,747 shares of our common stock, and a warrant to purchase 463,177 shares of our common stock. After the eight-year covenant not to sue period, Juniper could file additional lawsuits against us, asserting patent infringement for other patents that are not subject to the cross-license.

- 23 -


Our proprietary rights may be difficult to enforce or protect, which could enable others to copy or use aspects of our products without compensating us.
We rely and expect to continue to rely on a combination of confidentiality and license agreements with our employees, consultants, and third parties with whom we have relationships, as well as trademark, copyright, patent, and trade secret protection laws, to protect our proprietary rights. We have filed various applications for certain aspects of our intellectual property. Valid patents may not issue from our pending applications, and the claims eventually allowed on any patents may not be sufficiently broad to protect our technology or products. Any issued patents may be challenged, invalidated or circumvented, and any rights granted under these patents may not actually provide adequate defensive protection or competitive advantages to us. Patent applications in the United States are typically not published until 18 months after filing, or, in some cases, not at all, and publications of discoveries in industry-related literature lag behind actual discoveries. We cannot be certain that we were the first to make the inventions claimed in our pending patent applications or that we were the first to file for patent protection, which could prevent our patent applications from issuing as patents or invalidate our patents following issuance. Additionally, the process of obtaining patent protection is expensive and time-consuming, and we may not be able to prosecute all necessary or desirable patent applications at a reasonable cost or in a timely manner. Additional uncertainty may result from changes to patent-related laws enacted in the United States and other jurisdictions, including the America Invents Act and changes that may bring into question the validity of certain categories of software patents, and from interpretations of the intellectual property laws of the United States and other countries by applicable courts and agencies. As a result, we may not be able to obtain adequate patent protection or effectively enforce any issued patents.
Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality or license agreements with our employees, consultants, vendors, and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that we have entered into such agreements with all parties who may have or have had access to our confidential information or that the agreements we have entered into will not be breached. We cannot guarantee that any of the measures we have taken will prevent misappropriation of our technology. Because we may be an attractive target for computer hackers, we may have a greater risk of unauthorized access to, and misappropriation of, our proprietary information. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States. From time to time, we may need to take legal action to enforce our patents and other intellectual property rights, to protect our trade secrets, to determine the validity and scope of the proprietary rights of others or to defend against claims of infringement or invalidity. Such litigation could result in substantial costs and diversion of resources and could negatively affect our business, operating results, and financial condition. Attempts to enforce our rights against third parties could also provoke these third parties to assert their own intellectual property or other rights against us, or result in a holding that invalidates or narrows the scope of our rights, in whole or in part. If we are unable to protect our proprietary rights (including aspects of our software and products protected other than by patent rights), we may find ourselves at a competitive disadvantage to others who need not incur the additional expense, time, and effort required to create the innovative products that have enabled us to be successful to date. Any of these events would have a material adverse effect on our business, financial condition, and operating results.
Our use of open source software in our products could negatively affect our ability to sell our products and subject us to possible litigation.
Our products contain software modules licensed to us by third-party authors under “open source” licenses. Some open source licenses contain requirements that we make available source code for modifications or derivative works we create based upon the type of open source software we use. If we combine our proprietary software with open source software in a certain manner, we could, under certain open source licenses, be required to release the source code of our proprietary software to the public. This would allow our competitors to create similar products with lower development effort and time and ultimately could result in a loss of product sales for us.
Although we monitor our use of open source software to avoid subjecting our products to conditions we do not intend, the terms of many open source licenses have not been interpreted by United States courts, and there is a risk that these licenses could be construed in a way that could impose unanticipated conditions or restrictions on our ability to commercialize our products. From time to time, there have been claims against companies that distribute or use open source software in their products and services, asserting that open source software infringes the claimants’ intellectual property rights. We could be subject to suits by parties claiming infringement of intellectual property rights in what we believe to be licensed open source software. Moreover, we cannot assure you that our processes for controlling our use of open source software in our products will be effective. If we are held to have breached the terms of an open source software license, we could be required to seek licenses from third parties to continue offering our products on terms that are not economically feasible, to re-engineer our products, to discontinue the sale of our products if re-engineering could not be accomplished on a timely basis, or to make generally available, in source code form, our proprietary code, any of which could adversely affect our business, operating results, and financial condition.

- 24 -


In addition to risks related to license requirements, usage of open source software can lead to greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or assurance of title or controls on origin of the software. In addition, many of the risks associated with usage of open source software, such as the lack of warranties or assurances of title, cannot be eliminated, and could, if not properly addressed, negatively affect our business. We have established processes to help alleviate these risks, including a review process for screening requests from our development organizations for the use of open source software, but we cannot be sure that all open source software is submitted for approval prior to use in our products.
Our failure to adequately protect personal information could have a material adverse effect on our business.
A wide variety of provincial, state, national, and international laws and regulations apply to the collection, use, retention, protection, disclosure, transfer, and other processing of personal data. These data protection and privacy-related laws and regulations are evolving and being tested in courts and may result in ever-increasing regulatory and public scrutiny and escalating levels of enforcement and sanctions. Our failure to comply with applicable laws and regulations, or to protect such data, could result in enforcement action against us, including fines, imprisonment of company officials and public censure, claims for damages by end-customers and other affected individuals, damage to our reputation and loss of goodwill (both in relation to existing end-customers and prospective end-customers), any of which could have a material adverse effect on our operations, financial performance, and business. Evolving and changing definitions of personal data and personal information, within the European Union, the United States, and elsewhere, especially relating to classification of Internet Protocol (IP) addresses, machine identification, location data, and other information, may limit or inhibit our ability to operate or expand our business, including limiting strategic partnerships that may involve the sharing of data. Even the perception of privacy concerns, whether or not valid, may harm our reputation and inhibit adoption of our products by current and future end-customers.
A network or data security incident may allow unauthorized access to our network or data, harm our reputation, create additional liability and adversely impact our financial results.
Increasingly, companies are subject to a wide variety of attacks on their networks on an ongoing basis. In addition to traditional computer “hackers,” malicious code (such as viruses and worms), employee theft or misuse, denial of service attacks, and sophisticated nation-state and nation-state supported actors now engage in intrusions and attacks (including advanced persistent threat intrusions), and add to the risks to our internal networks and the information they store and process. Despite significant efforts to create security barriers to such threats, it is virtually impossible for us to entirely mitigate these risks. Any such breach could compromise our networks, creating system disruptions or slowdowns and exploiting security vulnerabilities of our products, and the information stored on our networks could be accessed, publicly disclosed, lost, or stolen, which could subject us to liability and cause us financial harm. These breaches may also result in damage to our reputation, negative publicity, loss of channel partners, end-customers and sales, increased costs to remedy any problem, and costly litigation and may therefore adversely impact market acceptance of our products.
We license technology from third parties, and our inability to maintain those licenses could harm our business.
We incorporate technology that we license from third parties, including software, into our products and services. We cannot be certain that our licensors are not infringing the intellectual property rights of third parties or that our licensors have sufficient rights to the licensed intellectual property in all jurisdictions in which we may sell our products. Some of our agreements with our licensors may be terminated for convenience by them. If we are unable to continue to license any of this technology because of intellectual property infringement claims brought by third parties against our licensors or against us, or if we are unable to continue our license agreements or enter into new licenses on commercially reasonable terms, our ability to develop and sell products and services containing that technology would be severely limited, and our business could be harmed. Additionally, if we are unable to license necessary technology from third parties, we may be forced to acquire or develop alternative technology, which we may be unable to do in a commercially feasible manner or at all, and that may require us to use alternative technology of lower quality or performance standards. This would limit and delay our ability to offer new or competitive products and services and increase our costs of production. As a result, our margins, market share, and operating results could be significantly harmed.
Misuse of our products could harm our reputation and divert resources.
Our products may be misused by end-customers or third parties that obtain access to our products. For example, our products could be used to censor private access to certain information on the Internet. Such use of our products for censorship could result in negative press coverage and negatively affect our reputation.
We are subject to governmental export and import controls that could subject us to liability or impair our ability to compete in international markets.
Because we incorporate encryption technology into our products, certain of our products are subject to U.S. export controls and may be exported outside the U.S. only with the required export license or through an export license exception. If we were to

- 25 -


fail to comply with U.S. export licensing requirements, U.S. customs regulations, U.S. economic sanctions, or other laws, we could be subject to substantial civil and criminal penalties, including fines, incarceration for responsible employees and managers, and the possible loss of export or import privileges. Obtaining the necessary export license for a particular sale may be time-consuming and may result in the delay or loss of sales opportunities. Furthermore, U.S. export control laws and economic sanctions prohibit the shipment of certain products to U.S. embargoed or sanctioned countries, governments, and persons. Even though we take precautions to ensure that our channel partners comply with all relevant regulations, any failure by our channel partners to comply with such regulations could have negative consequences for us, including reputational harm, government investigations, and penalties.
In addition, various countries regulate the import of certain encryption technology, including through import permit and license requirements, and have enacted laws that could limit our ability to distribute our products or could limit our end-customers’ ability to implement our products in those countries. Changes in our products or changes in export and import regulations may create delays in the introduction of our products into international markets, prevent our end-customers with international operations from deploying our products globally or, in some cases, prevent or delay the export or import of our products to certain countries, governments, or persons altogether. Any change in export or import regulations, economic sanctions or related legislation, shift in the enforcement or scope of existing regulations, or change in the countries, governments, persons, or technologies targeted by such regulations, could result in decreased use of our products by, or in our decreased ability to export or sell our products to, existing or potential end-customers with international operations. Any decreased use of our products or limitation on our ability to export or sell our products would likely adversely affect our business, financial condition, and operating results.
Our corporate culture has contributed to our success, and if we cannot maintain this culture as we grow, we could lose the innovation, creativity, and teamwork fostered by our culture, and our business may be harmed.
We believe that a critical contributor to our success has been our corporate culture, which we believe fosters innovation, teamwork, passion for customers, and focus on execution, as well as facilitating critical knowledge transfer and knowledge sharing. As we grow and change, we may find it difficult to maintain these important aspects of our corporate culture, which could limit our ability to innovate and operate effectively. Any failure to preserve our culture could also negatively affect our ability to retain and recruit personnel, continue to perform at current levels or execute on our business strategy.
Our financial condition and results of operations could suffer if there is an impairment of goodwill or intangible assets.
As of July 31, 2014, our goodwill and intangible assets were $203.0 million, and we have not recorded any goodwill or intangible assets impairments to date. We evaluate our goodwill for impairment on an annual basis in the fourth quarter of our fiscal year, and whenever events or changes in circumstances indicate the carrying amount of goodwill may not be recoverable. Any excess of the goodwill carrying amount over its implied fair value is recognized as an impairment loss. This would result in incremental expense in the period in which the impairment was determined to have occurred. We cannot accurately predict the amount and timing of an impairment loss and any such impairment would have an adverse effect on our results of operations.
Our failure to raise additional capital or generate the significant capital necessary to expand our operations and invest in new products could reduce our ability to compete and could harm our business.
We intend to continue to make investments to support our business growth and may require additional funds to respond to business challenges, including the need to develop new features to enhance our platform, improve our operating infrastructure, or acquire complementary businesses and technologies. Accordingly, we may need to engage in equity or debt financings to secure additional funds. If we raise additional equity or equity-linked financing, our stockholders may experience significant dilution of their ownership interests and the market price of our common stock could decline. For example, in June 2014, we issued 0.0% Convertible Senior Notes due 2019 (the “Notes”) and any conversion of some or all of the Notes into common stock will dilute the ownership interests of existing stockholders to the extent we deliver shares upon conversion of any of the Notes. See the risk factor entitled “The issuance of additional stock in connection with financings, acquisitions, investments, our stock incentive plans, the conversion of our Notes, or otherwise will dilute all other stockholders.” Furthermore, if we engage in debt financing, the holders of our debt would have priority over the holders of our common stock, and we may be required to accept terms that restrict our ability to incur additional indebtedness. We may also be required to take other actions that would otherwise be in the interests of the debt holders and would require us to maintain specified liquidity or other ratios, any of which could harm our business, operating results, and financial condition. We may not be able to obtain additional financing on terms favorable to us, if at all. If we are unable to obtain adequate financing or financing on terms satisfactory to us when we require it, our ability to continue to support our business growth and to respond to business challenges could be significantly impaired, and our business may be adversely affected.

- 26 -


We may not be able to successfully manage the growth of our business if we are unable to improve our internal systems, processes, and controls.
We need to continue to improve our internal systems, processes, and controls to effectively manage our operations and growth. We may not be able to successfully implement improvements to these systems, processes, and controls in an efficient or timely manner. We may not be able to successfully scale improvements to our enterprise resource planning system or implement and scale other systems and processes in a timely or efficient manner or in a manner that does not negatively affect our operating results. In addition, our systems and processes may not prevent or detect all errors, omissions, or fraud. We have licensed technology from third parties to help us improve our internal systems, processes, and controls. The support services available for such third-party technology may be negatively affected by mergers and consolidation in the software industry, and support services for such technology may not be available to us in the future. We may experience difficulties in managing improvements to our systems, processes, and controls or in connection with third-party software, which could impair our ability to provide products or services to our customers in a timely manner, causing us to lose customers, limit us to smaller deployments of our products, or increase our technical support costs.
We recently implemented a corporate structure more closely aligned with the international nature of our business activities, and if we do not achieve increased tax benefits as a result of our corporate structure, our financial condition and results of operations could be adversely affected.
We recently reorganized our corporate structure and intercompany relationships to more closely align with the international nature of our business activities. This corporate structure may allow us to reduce our overall effective tax rate through changes in how we use our intellectual property, international procurement, and sales operations. This corporate structure may also allow us to obtain financial and operational efficiencies. These efforts will require us to incur expenses in the near term for which we may not realize related benefits. If the structure is not accepted by the applicable taxing authorities, changes in domestic and international tax laws negatively impact the structure, including proposed legislation to reform U.S. taxation of international business activities, or we do not operate our business consistent with the structure and applicable tax provisions, we may fail to achieve the reduction in our overall effective tax rate and the other financial and operational efficiencies that we anticipate as a result of the structure and our future financial condition and results of operations may be negatively impacted.
If our estimates or judgments relating to our critical accounting policies are based on assumptions that change or prove to be incorrect, our operating results could fall below expectations of securities analysts and investors, resulting in a decline in the market price of our common stock.
The preparation of financial statements in conformity with U.S. generally accepted accounting principles (GAAP) requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances, as provided in the section entitled “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” the results of which form the basis for making judgments about the carrying values of assets, liabilities, equity, revenue, and expenses that are not readily apparent from other sources. Our operating results may be adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions, which could cause our operating results to fall below the expectations of securities analysts and investors, resulting in a decline in the market price of our common stock. Significant assumptions and estimates used in preparing our consolidated financial statements include those related to revenue recognition, share-based compensation, contract manufacturing liabilities, warranties, loss contingencies, income taxes, and, with respect to business combinations, determining purchase price allocation and estimating the fair value of assets acquired and liabilities assumed.
Failure to comply with governmental laws and regulations could harm our business.
Our business is subject to regulation by various federal, state, local, and foreign governmental agencies, including agencies responsible for monitoring and enforcing employment and labor laws, workplace safety, product safety, environmental laws, consumer protection laws, anti-bribery laws, import/export controls, federal securities laws, and tax laws and regulations. In certain jurisdictions, these regulatory requirements may be more stringent than those in the United States. Noncompliance with applicable regulations or requirements could subject us to investigations, sanctions, mandatory product recalls, enforcement actions, disgorgement of profits, fines, damages, civil and criminal penalties, or injunctions. If any governmental sanctions are imposed, or if we do not prevail in any possible civil or criminal litigation resulting from any alleged noncompliance, our business, operating results, and financial condition could be materially adversely affected. In addition, responding to any action will likely result in a significant diversion of management’s attention and resources and an increase in professional fees. Enforcement actions, litigation, and sanctions could harm our business, operating results, and financial condition.

- 27 -


If we fail to comply with environmental requirements, our business, financial condition, operating results, and reputation could be adversely affected.
We are subject to various environmental laws and regulations including laws governing the hazardous material content of our products and laws relating to the collection of and recycling of electrical and electronic equipment. Examples of these laws and regulations include the European Union (EU), Restriction on the Use of Certain Hazardous Substances in Electrical and Electronic Equipment Directive (RoHS), and the EU Waste Electrical and Electronic Equipment Directive (WEEE Directive), as well as the implementing legislation of the EU member states. Similar laws and regulations have been passed or are pending in China, South Korea, Norway, and Japan and may be enacted in other regions, including in the United States, and we are, or may in the future be, subject to these laws and regulations.
The EU RoHS and the similar laws of other jurisdictions limit the content of certain hazardous materials such as lead, mercury, and cadmium in the manufacture of electrical equipment, including our products. Currently, our products comply with the EU RoHS requirements. However, if there are changes to this or other laws (or their interpretation) or if new similar laws are passed in other jurisdictions, we may be required to reengineer our products to use components compatible with these regulations. This reengineering and component substitution could result in additional costs to us or disrupt our operations or logistics.
The WEEE Directive requires electronic goods producers to be responsible for the collection, recycling, and treatment of such products. Changes in interpretation of the directive may cause us to incur costs or have additional regulatory requirements to meet in the future in order to comply with this directive, or with any similar laws adopted in other jurisdictions.
We are also subject to environmental laws and regulations governing the management of hazardous materials, which we use in small quantities in our engineering labs. Our failure to comply with past, present, and future similar laws could result in reduced sales of our products, substantial product inventory write-offs, reputational damage, penalties, and other sanctions, any of which could harm our business and financial condition. We also expect that our products will be affected by new environmental laws and regulations on an ongoing basis. To date, our expenditures for environmental compliance have not had a material impact on our results of operations or cash flows, and although we cannot predict the future impact of such laws or regulations, they will likely result in additional costs and may increase penalties associated with violations or require us to change the content of our products or how they are manufactured, which could have a material adverse effect on our business, operating results, and financial condition.
We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and operating results.
Our sales contracts are primarily denominated in U.S. dollars, and therefore, substantially all of our revenue is not subject to foreign currency risk. However, a strengthening of the U.S. dollar could increase the real cost of our products to our end-customers outside of the United States, which could adversely affect our financial condition and operating results. In addition, increased international sales in the future, including through our channel partners and other partnerships, may result in greater foreign currency denominated sales, increasing our foreign currency risk. Moreover, an increasing portion of our operating expenses is incurred outside the United States, is denominated in foreign currencies, and is subject to fluctuations due to changes in foreign currency exchange rates. If we are not able to successfully hedge against the risks associated with currency fluctuations, our financial condition and operating results could be adversely affected. To date, we have not entered into any hedging transactions in an effort to reduce our exposure to foreign currency exchange risk. While we may decide to enter into hedging transactions in the future, the availability and effectiveness of these hedging transactions may be limited and we may not be able to successfully hedge our exposure, which could adversely affect our financial condition and operating results.
Our business is subject to the risks of earthquakes, fire, power outages, floods, and other catastrophic events, and to interruption by man-made problems such as terrorism.
A significant natural disaster, such as an earthquake, fire, flood, or significant power outage could have a material adverse impact on our business, operating results, and financial condition. Both our corporate headquarters and the location where our products are manufactured are located in the San Francisco Bay Area, a region known for seismic activity. In addition, natural disasters could affect our supply chain, manufacturing vendors, or logistics providers’ ability to provide materials and perform services such as manufacturing products or assisting with shipments on a timely basis. In the event our or our service providers’ information technology systems or manufacturing or logistics abilities are hindered by any of the events discussed above, shipments could be delayed, resulting in missed financial targets, such as revenue and shipment targets, for a particular quarter. In addition, acts of terrorism and other geo-political unrest could cause disruptions in our business or the business of our supply chain, manufacturers, logistics providers, partners, or end-customers or the economy as a whole. Any disruption in the business of our supply chain, manufacturers, logistics providers, partners, or end-customers that impacts sales at the end of a fiscal quarter could have a significant adverse impact on our future quarterly results. All of the aforementioned risks may be further increased if the disaster recovery plans for us and our suppliers prove to be inadequate. To the extent that any of the above should result in

- 28 -


delays or cancellations of customer orders, or the delay in the manufacture, deployment, or shipment of our products, our business, financial condition, and operating results would be adversely affected.
Risks Related to Our Notes
We may not have the ability to raise the funds necessary to settle conversions of the Notes or to repurchase the Notes upon a fundamental change, and our future debt may contain limitations on our ability to pay cash upon conversion or repurchase of the Notes.
Holders of the Notes will have the right to require us to repurchase all or a portion of their Notes upon the occurrence of a fundamental change at a repurchase price equal to 100% of the principal amount of the Notes to be repurchased, plus accrued and unpaid special interest, if any, to, but excluding, the fundamental change repurchase date. In addition, upon conversion of the Notes, we will be required to make cash payments for each $1,000 in principal amount of Notes converted of at least the lesser of $1,000 and the sum of the daily conversion values. However, we may not have enough available cash or be able to obtain financing at the time we are required to make repurchases of Notes surrendered therefor or pay cash with respect to Notes being converted.
In addition, our ability to repurchase or to pay cash upon conversion of the Notes may be limited by law, regulatory authority or agreements governing our future indebtedness. Our failure to repurchase the Notes at a time when the repurchase is required by the indenture governing the Notes or to pay cash upon conversion of the Notes as required by the indenture would constitute a default under the indenture. A default under the indenture or the fundamental change itself could also lead to a default under agreements governing our future indebtedness. If the payment of the related indebtedness were to be accelerated after any applicable notice or grace periods, we may not have sufficient funds to repay the indebtedness and repurchase the Notes or to pay cash upon conversion of the Notes.
We may still incur substantially more debt or take other actions which would diminish our ability to make payments on the Notes when due.
We and our subsidiaries may be able to incur substantial additional debt in the future, subject to the restrictions contained in our debt instruments, some of which may be secured debt. We are not restricted under the terms of the indenture governing the Notes from incurring additional debt, securing existing or future debt, recapitalizing our debt or taking a number of other actions that are not limited by the terms of the indenture governing the Notes that could have the effect of diminishing our ability to make payments on the Notes when due. While the terms of any future indebtedness we may incur could restrict our ability to incur additional indebtedness, any such restrictions will indirectly benefit holders of the Notes only to the extent any such indebtedness or credit facility is not repaid or does not mature while the Notes are outstanding.
The conditional conversion feature of the Notes, if triggered, may adversely affect our financial condition and operating results.
In the event the conditional conversion feature of the Notes is triggered, holders of the Notes will be entitled to convert the Notes at any time during specified periods at their option. If one or more holders elect to convert their Notes, we would be required to settle any converted principal through the payment of cash, which could adversely affect our liquidity. In addition, even if holders do not elect to convert their Notes, we could be required under applicable accounting rules to reclassify all or a portion of the outstanding principal of the Notes as a current rather than long-term liability, which would result in a material reduction of our net working capital.
The accounting method for convertible debt securities that may be settled in cash, such as the Notes, could have a material effect on our reported financial results.
Under GAAP, we must separately account for the liability and equity components of convertible debt instruments (such as the Notes) that may be settled entirely or partially in cash upon conversion in a manner that reflects our economic interest cost. GAAP further requires the equity component of the Notes to be included in the additional paid-in capital section of stockholders’ equity on our consolidated balance sheet, and the value of the equity component is treated as debt discount for purposes of accounting for the debt component of the Notes. As a result, we are required to record non-cash interest expense in current and future periods as a result of the amortization of the discounted carrying value of the Notes to their face amount over the term of the Notes.
In addition, under certain circumstances, convertible debt instruments (such as the Notes) that may be settled entirely or partly in cash are currently accounted for utilizing the treasury stock method, the effect of which is that the shares issuable upon conversion of the Notes are not included in the calculation of diluted earnings per share except to the extent that the conversion value of the Notes exceeds their principal amount. Under the treasury stock method, for diluted earnings per share purposes, the transaction is accounted for as if the number of shares of common stock that would be necessary to settle such excess, if we elected to settle such excess in shares, are issued. We cannot be sure that the accounting standards in the future will continue to permit the

- 29 -


use of the treasury stock method. If we are unable to use the treasury stock method in accounting for the shares issuable upon conversion of the Notes, then our diluted earnings per share would be adversely affected.
Risks Related to Ownership of Our Common Stock
Our actual operating results may differ significantly from our guidance.
From time to time, we have released, and may continue to release, guidance in our quarterly earnings releases, quarterly earnings conference call, or otherwise, regarding our future performance that represents our management’s estimates as of the date of release. This guidance, which includes forward-looking statements, has been and will be based on projections prepared by our management. These projections are not prepared with a view toward compliance with published guidelines of the American Institute of Certified Public Accountants, and neither our registered public accountants nor any other independent expert or outside party compiles or examines the projections. Accordingly, no such person expresses any opinion or any other form of assurance with respect to the projections.
Projections are based upon a number of assumptions and estimates that, while presented with numerical specificity, are inherently subject to significant business, economic and competitive uncertainties and contingencies, many of which are beyond our control and are based upon specific assumptions with respect to future business decisions, some of which will change. We intend to state possible outcomes as high and low ranges which are intended to provide a sensitivity analysis as variables are changed but are not intended to imply that actual results could not fall outside of the suggested ranges. The principal reason that we release guidance is to provide a basis for our management to discuss our business outlook with analysts and investors. We do not accept any responsibility for any projections or reports published by any such persons.
Guidance is necessarily speculative in nature, and it can be expected that some or all of the assumptions underlying the guidance furnished by us will not materialize or will vary significantly from actual results. Accordingly, our guidance is only an estimate of what management believes is realizable as of the date of release. Actual results will vary from our guidance and the variations may be material. In light of the foregoing, investors are urged not to rely upon our guidance in making an investment decision regarding our common stock.
Any failure to successfully implement our operating strategy or the occurrence of any of the events or circumstances set forth in this “Risk Factors” section in this Annual Report on Form 10-K could result in the actual operating results being different from our guidance, and the differences may be adverse and material.
The market price of our common stock historically has been volatile and the value of your investment could decline.
The market price of our common stock has been volatile since our initial public offering (IPO). Since shares of our common stock were sold in our IPO in July 2012 at a price of $42.00 per share, the reported high and low sales prices of our common stock has ranged from $99.90 to $39.08, through September 10, 2014. The market price of our common stock may fluctuate widely in response to various factors, some of which are beyond our control. These factors include:
announcements of new products, services or technologies, commercial relationships, acquisitions or other events by us or our competitors;
price and volume fluctuations in the overall stock market from time to time;
significant volatility in the market price and trading volume of technology companies in general and of companies in our industry;
fluctuations in the trading volume of our shares or the size of our public float;
actual or anticipated changes in our operating results or fluctuations in our operating results;
whether our operating results meet the expectations of securities analysts or investors;
actual or anticipated changes in the expectations of securities analysts or investors;
litigation involving us, our industry, or both;
regulatory developments in the United States, foreign countries or both;
major catastrophic events;
sales of large blocks of our stock;
departures of key personnel; or
economic uncertainty around the world, in particular, macroeconomic challenges in Europe.

- 30 -


In addition, if the market for technology stocks or the stock market in general experiences loss of investor confidence, the market price of our common stock could decline for reasons unrelated to our business, operating results, or financial condition. The market price of our common stock might also decline in reaction to events that affect other companies in our industry even if these events do not directly affect us. The market price of our common stock could also be affected by possible sales of our common stock by investors who view the Notes as a more attractive means of equity participation in us and by hedging or arbitrage trading activity that we expect to develop involving our common stock as a result of the existence of the Notes. In the past, following periods of volatility in the market price of a company’s securities, securities class action litigation has often been brought against that company. Securities litigation could result in substantial costs and divert our management’s attention and resources from our business. This could have a material adverse effect on our business, operating results and financial condition.
The convertible note hedge and warrant transactions may affect the value of our common stock.
In connection with the sale of the Notes, we entered into convertible note hedge transactions with the certain counterparties. We also entered into warrant transactions with the counterparties pursuant to which we sold warrants for the purchase of our common stock. The convertible note hedge transactions are expected generally to reduce the potential dilution to our common stock upon any conversion of Notes and/or offset any cash payments we are required to make in excess of the principal amount of any converted Notes, as the case may be. The warrants could separately have a dilutive effect to the extent that the market price per share of our common stock exceeds the strike price of the warrants unless, subject to certain conditions, we elect to cash settle the warrants.
The counterparties or their respective affiliates may modify their hedge positions by entering into or unwinding various derivatives with respect to our common stock and/or purchasing or selling our common stock or other securities of ours in secondary market transactions prior to the maturity of the Notes (and are likely to do so during any observation period related to a conversion of Notes). This activity could also cause or avoid an increase or a decrease in the market price of our common stock or the Notes, which could affect a Note holder’s ability to convert the Notes and, to the extent the activity occurs during any observation period related to a conversion of Notes, it could affect the amount and value of the consideration that such Note holder will receive upon conversion of the Notes.
We do not make any representation or prediction as to the direction or magnitude of any potential effect that the transactions described above may have on the price of the Notes or our common stock. In addition, we do not make any representation that the counterparties or their respective affiliates will engage in these transactions or that these transactions, once commenced, will not be discontinued without notice.
Substantial future sales of shares of our common stock could cause the market price of our common stock to decline.
The market price of our common stock could decline as a result of substantial sales of our common stock, particularly sales by our directors, executive officers, employees and significant stockholders, a large number of shares of our common stock becoming available for sale, or the perception in the market that holders of a large number of shares intend to sell their shares. As of July 31, 2014, we had outstanding approximately 79,519,000 shares of our common stock.
We have also registered shares of our common stock that we may issue under our employee equity incentive plans. These shares will be able to be sold freely in the public market upon issuance.
In addition, additional shares may be sold through two registration statements on Form S-3 that we have filed. First, as a result of our settlement with Juniper in May 2014, Juniper received approximately 1,544,000 shares of our common stock (including the shares of common stock underlying the warrant issued to Juniper). In accordance with the settlement agreement, we filed a registration statement on Form S-3 to register the resale of the shares held by Juniper. Second, we have also filed a registration statement on Form S-3 to register the resale of the approximately 1,557,000 shares of common stock issued to certain former shareholders of Cyvera, in connection with our acquisition of Cyvera. Pursuant to these effective registration statements, the shares held by Juniper and the former shareholders of Cyvera may be sold freely in the public market, with Juniper subject to our insider trading policy and other terms described in the settlement agreement. If these additional shares are sold, or if it is perceived that they will be sold, in the public market, the trading price of our common stock could decline.
The issuance of additional stock in connection with financings, acquisitions, investments, our stock incentive plans, the conversion of our Notes, or otherwise will dilute all other stockholders.
Our amended and restated certificate of incorporation authorizes us to issue up to 1,000,000,000 shares of common stock and up to 100,000,000 shares of preferred stock with such rights and preferences as may be determined by our board of directors. Subject to compliance with applicable rules and regulations, we may issue shares of common stock or securities convertible into shares of our common stock from time to time in connection with a financing, acquisition, investment, our stock incentive plans, the conversion of our Notes, or otherwise. Any such issuance could result in substantial dilution to our existing stockholders and cause the market price of our common stock to decline.

- 31 -


We do not intend to pay dividends for the foreseeable future.
We have never declared or paid any dividends on our common stock. We intend to retain any earnings to finance the operation and expansion of our business, and we do not anticipate paying any cash dividends in the future. As a result, you may only receive a return on your investment in our common stock if the market price of our common stock increases.
The requirements of being a public company may strain our resources, divert management’s attention, and affect our ability to attract and retain qualified board members.
As a public company, we are subject to the reporting requirements of the Securities Exchange Act of 1934, as amended (the “Exchange Act”), the listing requirements of the New York Stock Exchange (NYSE), and other applicable securities rules and regulations. Compliance with these rules and regulations will increase our legal and financial compliance costs, make some activities more difficult, time-consuming or costly, and increase demand on our systems and resources. Among other things, the Exchange Act requires that we file annual, quarterly, and current reports with respect to our business and operating results and maintain effective disclosure controls and procedures and internal control over financial reporting. In order to maintain and, if required, improve our disclosure controls and procedures and internal control over financial reporting to meet this standard, significant resources and management oversight may be required. As a result, management’s attention may be diverted from other business concerns, which could harm our business and operating results. Although we have already hired additional employees to comply with these requirements, we may need to hire even more employees in the future, which will increase our costs and expenses.
Because we are no longer an “emerging growth company” as defined in the JOBS Act, we are subject to the independent auditor attestation requirements of Section 404 of the Sarbanes-Oxley Act, enhanced disclosure obligations regarding executive compensation in our periodic reports and proxy statements, and the requirements of holding a nonbinding advisory vote on executive compensation and stockholder approval of any golden parachute payments not previously approved. While we were able to determine in our management's report for fiscal 2014 that our internal control over financial reporting is effective, as well as provide an unqualified attestation report from our independent registered public accounting firm to that effect, we have and will continue to consume management resources and incur significant expenses for Section 404 compliance on an ongoing basis. In the event that our chief executive officer, chief financial officer, or independent registered public accounting firm determines in the future that our internal control over financial reporting is not effective as defined under Section 404, we could be subject to one or more investigations or enforcement actions by state or federal regulatory agencies, stockholder lawsuits or other adverse actions requiring us to incur defense costs, pay fines, settlements or judgments and causing investor perceptions to be adversely affected and potentially resulting in a decline in the market price of our stock.
In addition, changing laws, regulations, and standards relating to corporate governance and public disclosure, such as continued rulemaking pursuant to the Dodd-Frank Act of 2010 and related rules and regulations regarding the disclosure of conflict minerals that are mandated by the Dodd-Frank Act, are creating uncertainty for public companies, increasing legal and financial compliance costs, and making some activities more time-consuming. These laws, regulations, and standards are subject to varying interpretations, in many cases due to their lack of specificity, and, as a result, their application in practice may evolve over time as new guidance is provided by regulatory and governing bodies. This could result in continuing uncertainty regarding compliance matters and higher costs necessitated by ongoing revisions to disclosure and governance practices. We intend to invest resources to comply with evolving laws, regulations, and standards, and this investment may result in increased general and administrative expense and a diversion of management’s time and attention from revenue-generating activities to compliance activities. If our efforts to comply with new laws, regulations, and standards differ from the activities intended by regulatory or governing bodies, regulatory authorities may initiate legal proceedings against us and our business may be harmed.
We also expect that being a public company and these new rules and regulations will make it more expensive for us to obtain and maintain director and officer liability insurance, and in the future, we may be required to accept reduced coverage or incur substantially higher costs to obtain coverage. These factors could also make it more difficult for us to attract and retain qualified members of our board of directors, particularly to serve on our Audit Committee and Compensation Committee, and qualified executive officers.
We are obligated to maintain proper and effective internal control over financial reporting. We may not complete our analysis of our internal control over financial reporting in a timely manner, or this internal control may not be determined to be effective, which may adversely affect investor confidence in our company and, as a result, the value of our common stock.
We are required, pursuant to the Exchange Act, to furnish a report by management on, among other things, the effectiveness of our internal control over financial reporting. This assessment will need to include disclosure of any material weaknesses identified by our management in our internal control over financial reporting, as well as a statement that our auditors have issued an attestation report on our internal controls.

- 32 -


While we were able to determine in our management's report for fiscal 2014 that our internal control over financial reporting is effective, as well as provide an unqualified attestation report from our independent registered public accounting firm to that effect, we may not be able to complete our evaluation, testing, and any required remediation in a timely fashion or our independent registered public accounting firm may not be able to formally attest to the effectiveness of our internal control over financial reporting in the future. During the evaluation and testing process, if we identify one or more material weaknesses in our internal control over financial reporting that we are unable to remediate before the end of the same fiscal year in which the material weakness is identified, we will be unable to assert that our internal controls are effective. If we are unable to assert that our internal control over financial reporting is effective, or if our independent registered public accounting firm is unable to attest to the effectiveness of our internal controls or determine we have a material weakness in our internal controls, we could lose investor confidence in the accuracy and completeness of our financial reports, which would cause the price of our common stock to decline.
If securities or industry analysts do not publish research or reports about our business, or publish inaccurate or unfavorable research reports about our business, our share price and trading volume could decline.
The trading market for our common stock, to some extent, depends on the research and reports that securities or industry analysts publish about us or our business. We do not have any control over these analysts. If one or more of the analysts who cover us should downgrade our shares or change their opinion of our shares, industry sector, or products, our share price would likely decline. If one or more of these analysts should cease coverage of our company or fail to regularly publish reports on us, we could lose visibility in the financial markets, which could cause our share price or trading volume to decline.
Our charter documents and Delaware law, as well as certain provisions of our Notes, could discourage takeover attempts and lead to management entrenchment, which could also reduce the market price of our common stock.
Our amended and restated certificate of incorporation and amended and restated bylaws contain provisions that could delay or prevent a change in control of our company. These provisions could also make it difficult for stockholders to elect directors that are not nominated by the current members of our board of directors or take other corporate actions, including effecting changes in our management. These provisions include:
a classified board of directors with three-year staggered terms, which could delay the ability of stockholders to change the membership of a majority of our board of directors;
the ability of our board of directors to issue shares of preferred stock and to determine the price and other terms of those shares, including preferences and voting rights, without stockholder approval, which could be used to significantly dilute the ownership of a hostile acquiror;
the exclusive right of our board of directors to elect a director to fill a vacancy created by the expansion of our board of directors or the resignation, death or removal of a director, which prevents stockholders from being able to fill vacancies on our board of directors;
a prohibition on stockholder action by written consent, which forces stockholder action to be taken at an annual or special meeting of our stockholders;
the requirement that a special meeting of stockholders may be called only by the chairman of our board of directors, our president, our secretary, or a majority vote of our board of directors, which could delay the ability of our stockholders to force consideration of a proposal or to take action, including the removal of directors;
the requirement for the affirmative vote of holders of at least 66 2/3% of the voting power of all of the then outstanding shares of the voting stock, voting together as a single class, to amend the provisions of our amended and restated certificate of incorporation relating to the issuance of preferred stock and management of our business or our amended and restated bylaws, which may inhibit the ability of an acquiror to effect such amendments to facilitate an unsolicited takeover attempt;
the ability of our board of directors, by majority vote, to amend the bylaws, which may allow our board of directors to take additional actions to prevent an unsolicited takeover and inhibit the ability of an acquiror to amend the bylaws to facilitate an unsolicited takeover attempt; and
advance notice procedures with which stockholders must comply to nominate candidates to our board of directors or to propose matters to be acted upon at a stockholders’ meeting, which may discourage or deter a potential acquiror from conducting a solicitation of proxies to elect the acquiror’s own slate of directors or otherwise attempting to obtain control of us.
In addition, as a Delaware corporation, we are subject to Section 203 of the Delaware General Corporation Law. These provisions may prohibit large stockholders, in particular those owning 15% or more of our outstanding voting stock, from merging or combining with us for a certain period of time. Additionally, certain provisions of our Notes could make it more difficult or

- 33 -


more expensive for a third party to acquire us. The application of Section 203 or certain provisions of our Notes also could have the effect of delaying or preventing a change in control of us. Any of these provisions could, under certain circumstances, depress the market price of our common stock.

- 34 -


ITEM 1B.
UNRESOLVED STAFF COMMENTS
None.
ITEM 2.
PROPERTIES
Our corporate headquarters is located in Santa Clara, California where we currently lease approximately 300,000 square feet of space under a lease agreement that expires in July 2023, with two separate five-year options to extend the lease term. We also lease space for operations and sales personnel in locations throughout the United States and various international locations, including the Netherlands, Singapore, the United Kingdom, Japan, Australia, and France. We believe that our current facilities are adequate to meet our current needs. We intend to expand our facilities or add new facilities as we add employees and enter new geographic markets, and we believe that suitable additional or alternative space will be available as needed to accommodate ongoing operations and any such growth. However, we expect to incur additional expenses in connection with such new or expanded facilities.
ITEM 3.
LEGAL PROCEEDINGS
The information set forth under the “Litigation” subheading in Note 8. Commitments and Contingencies of Notes to Consolidated Financial Statements in Part II, Item 8 of this Annual Report on Form 10-K is incorporated herein by reference.
ITEM 4.
MINE SAFETY DISCLOSURES
Not applicable.

- 35 -


PART II
ITEM 5.
MARKET FOR REGISTRANT'S COMMON EQUITY, RELATED STOCKHOLDER MATTERS, AND ISSUER PURCHASES OF EQUITY SECURITIES
Market Information
Our common stock, $0.0001 par value per share, began trading on the New York Stock Exchange (NYSE) on July 20, 2012, where its prices are quoted under the symbol “PANW.”
Holders of Record
As of September 10, 2014, there were 133 holders of record of our common stock. Because many of our shares of common stock are held by brokers and other institutions on behalf of stockholders, we are unable to estimate the total number of stockholders represented by these record holders.
Price Range of Our Common Stock
The following table sets forth the reported high and low sales prices of our common stock for the periods indicated, as regularly quoted on the New York Stock Exchange: 
 
High
 
Low
Year Ended July 31, 2013
 
 
 
First Quarter
$
72.61

 
$
53.27

Second Quarter
$
57.65

 
$
47.00

Third Quarter
$
62.19

 
$
50.29

Fourth Quarter
$
56.60

 
$
39.08

Year Ended July 31, 2014
 
 
 
First Quarter
$
50.50

 
$
42.04

Second Quarter
$
64.92

 
$
40.36

Third Quarter
$
80.84

 
$
57.02

Fourth Quarter
$
85.78

 
$
57.47

Dividend Policy
We have never declared or paid, and do not anticipate declaring or paying in the foreseeable future, any cash dividends on our capital stock. Any future determination as to the declaration and payment of dividends, if any, will be at the discretion of our board of directors, subject to applicable laws and will depend on then existing conditions, including our financial condition, operating results, contractual restrictions, capital requirements, business prospects, and other factors our board of directors may deem relevant.
Securities Authorized for Issuance under Equity Compensation Plans
See Part III, Item 12 “Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters” of this Annual Report on Form 10-K for more information regarding securities authorized for issuance.
Recent Sale of Unregistered Securities
There were no sales of unregistered securities during fiscal 2014 other than those transactions previously reported to the Securities and Exchange Commission (SEC) on our Current Reports on Form 8-K.
Stock Price Performance Graph
This performance graph shall not be deemed “filed” for purposes of Section 18 of the Securities Exchange Act of 1934, as amended (the “Exchange Act”), or incorporated by reference into any filing of Palo Alto Networks, Inc. under the Securities Act of 1933, as amended, or the Exchange Act, except as shall be expressly set forth by specific reference in such filing.
This performance graph compares the cumulative total return on our common stock with that of the NYSE Composite Index and the NYSE Arca Tech 100 Index. This performance graph assumes $100 was invested on July 20, 2012, the date our common stock commenced trading on the NYSE, in each of the common stock of Palo Alto Networks, Inc., the NYSE Composite Index,

- 36 -


and the NYSE Arca Tech 100 Index, and assumes the reinvestment of any dividends. The stock price performance on this performance graph is not necessarily indicative of future stock price performance.
Company/Index
7/20/2012
 
7/31/2012
 
7/31/2013
 
7/31/2014
Palo Alto Networks, Inc.
$
100.00

 
$
107.55

 
$
92.11

 
$
152.19

NYSE Composite Index
$
100.00

 
$
101.34

 
$
123.19

 
$
138.23

NYSE Arca Tech 100 Index
$
100.00

 
$
101.35

 
$
127.39

 
$
154.80


- 37 -


ITEM 6.
SELECTED CONSOLIDATED FINANCIAL DATA
The selected consolidated statement of operations data for fiscal 2014, 2013, and 2012 and the consolidated balance sheet data as of July 31, 2014 and 2013 are derived from our audited consolidated financial statements included elsewhere in this Annual Report on Form 10-K. The selected consolidated statement of operations data for fiscal 2011 and 2010 and the consolidated balance sheet data as of July 31, 2012, 2011, and 2010 are derived from audited financial statements not included in this Annual Report on Form 10-K. Our historical results are not necessarily indicative of the results that may be expected in the future. The selected consolidated financial data below should be read in conjunction with the section entitled “Management’s Discussion and Analysis of Financial Condition and Results of Operations” included in Part II, Item 7 of this Annual Report on Form 10-K and our consolidated financial statements and related notes included in Part II, Item 8 of this Annual Report on Form 10-K.
 
Year Ended July 31,
 
2014
 
2013
 
2012
 
2011
 
2010
 
(in thousands)
Selected Consolidated Statements of Operations Data:
 
 
 
 
 
 
 
 
 
Revenue:
 
 
 
 
 
 
 
 
 
Product
$
340,143

 
$
243,707

 
$
174,462

 
$
84,800

 
$
36,789

Services
258,036

 
152,400

 
80,676

 
33,797

 
11,993

Total revenue
598,179

 
396,107

 
255,138

 
118,597

 
48,782

Cost of revenue:
 
 
 
 
 
 
 
 
 
Product(1)
85,503

 
63,412

 
44,615

 
21,766

 
10,822

Services(1)
74,125

 
46,344

 
25,938

 
10,507

 
4,812

Total cost of revenue
159,628

 
109,756

 
70,553

 
32,273

 
15,634

Total gross profit
438,551

 
286,351

 
184,585

 
86,324

 
33,148

Operating expenses:
 
 
 
 
 
 
 
 
 
Research and development(1)
104,813

 
62,482

 
38,570

 
21,366

 
12,788

Sales and marketing(1)
334,763

 
199,771

 
115,917

 
62,254

 
29,726

General and administrative(1)
73,149

 
42,719

 
26,207

 
13,108

 
11,291

Legal settlement
141,173

 

 

 

 

Total operating expenses
653,898

 
304,972

 
180,694

 
96,728

 
53,805

Operating income (loss)
(215,347
)
 
(18,621
)
 
3,891

 
(10,404
)
 
(20,657
)
Interest expense
(1,883
)
 
(74
)
 
(36
)
 
(25
)
 
(1
)
Other income (expense), net
(4,930
)
 
39

 
(1,056
)
 
(1,623
)
 
(419
)
Income (loss) before income taxes
(222,160
)
 
(18,656
)
 
2,799

 
(12,052
)
 
(21,077
)
Provision for income taxes
4,292

 
10,590

 
2,062

 
476

 
56

Net income (loss)
$
(226,452
)
 
$
(29,246
)
 
$
737

 
$
(12,528
)
 
$
(21,133
)
Net income (loss) attributable to common stockholders, basic and diluted
$
(226,452
)
 
$
(29,246
)
 
$

 
$
(12,528
)
 
$
(21,133
)
Net income (loss) per share attributable to common stockholders, basic and diluted
$
(3.05
)
 
$
(0.43
)
 
$
0.00

 
$
(0.88
)
 
$
(1.78
)
Weighted-average shares used to compute net income (loss) per share attributable to common stockholders, basic and diluted
74,291

 
68,682

 
19,569

 
14,201

 
11,901

(1)
Includes share-based compensation expense as follows:

- 38 -


 
Year Ended July 31,
 
2014
 
2013
 
2012
 
2011
 
2010
 
(in thousands)
Cost of product revenue
$
1,636

 
$
765

 
$
121

 
$
27

 
$
9

Cost of services revenue
9,434

 
3,586

 
653

 
179

 
46

Research and development
29,524

 
9,931

 
3,733

 
1,020

 
318

Sales and marketing
42,647

 
20,493

 
4,267

 
1,133

 
364

General and administrative
16,668

 
9,101

 
5,151

 
2,374

 
132

Total share-based compensation
$
99,909

 
$
43,876

 
$
13,925

 
$
4,733

 
$
869

 
 
 
 
 
 
 
 
 
 
 
July 31,
 
2014
 
2013
 
2012
 
2011
 
2010
 
(in thousands)
Selected Consolidated Balance Sheet Data:
 
 
 
 
 
 
 
 
 
Cash and cash equivalents
$
653,812

 
$
310,614

 
$
322,642

 
$
40,517

 
$
18,835

Investments
320,570

 
126,321

 

 

 

Working capital
610,155

 
323,597

 
259,651

 
9,739

 
7,000

Total assets
1,478,466

 
585,606

 
407,804

 
91,172

 
38,119

Convertible senior notes, net
466,875

 

 

 

 

Preferred stock warrant liability

 

 

 
2,068

 
491

Redeemable convertible preferred stock

 

 

 
64,491

 
64,491

Common stock including additional paid-in capital
804,414

 
381,710

 
309,099

 
9,311

 
2,589

Total stockholders’ equity (deficit)
$
468,583

 
$
272,420

 
$
229,071

 
$
(71,454
)
 
$
(65,648
)

- 39 -


ITEM 7.
MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS
The following discussion and analysis of our financial condition and results of operations should be read in conjunction with our consolidated financial statements and related notes appearing elsewhere in this Annual Report on Form 10-K. The following discussion and analysis contains forward-looking statements based on current expectations and assumptions that are subject to risks and uncertainties, which could cause our actual results to differ materially from those anticipated or implied by any forward-looking statements. Factors that could cause or contribute to such differences include, but are not limited to, those discussed in this Annual Report on Form 10-K, and in particular, the risks discussed under the caption “Risk Factors” in Part I, Item 1A of this report.
Our Management’s Discussion and Analysis of Financial Condition and Results of Operations (MD&A) is organized as follows:
Overview. Discussion of our business and overall analysis of financial and other highlights in order to provide context for the remainder of MD&A.
Key Financial Metrics. An analysis of our generally accepted accounting principles (GAAP) and non-GAAP key financial metrics, which management monitors to evaluate our performance.
Financial Overview. Discussion of the nature and trends of components of our financial results.
Results of Operations. An analysis of our financial results comparing fiscal 2014 and 2013, and fiscal 2013 and 2012.
Liquidity and Capital Resources. An analysis of changes in our balance sheets and cash flows, and discussion of our financial condition and our ability to meet cash needs.
Contractual Obligations and Commitments. Overview of contractual obligations, contingent liabilities, commitments, and off-balance sheet arrangements outstanding as of July 31, 2014, including expected payment schedule.
Critical Accounting Policies and Estimates. A discussion of accounting policies that require critical estimates, assumptions, and judgments.
Recent Accounting Pronouncements. A discussion of expected impacts of impending accounting changes on financial information to be reported in the future.
Overview
We have pioneered the next-generation of enterprise security with our innovative platform that allows enterprises, service providers, and government entities to simultaneously empower and secure their organizations by safely enabling the increasingly complex and rapidly growing number of applications running on their networks and by preventing breaches stemming from targeted cyber attacks. Our enterprise security platform consists of three major elements: our Next-Generation Firewall, our Advanced Endpoint Protection, and our Threat Intelligence Cloud. Our Next-Generation Firewall delivers application, user, and content visibility and control as well as protection against network based cyber threats integrated within the firewall through our proprietary hardware and software architecture. Our Advanced Endpoint Protection, which we expect to release in fiscal 2015, prevents cyber attacks that aim to exploit software vulnerabilities on a broad variety of fixed and virtual endpoints. Our Threat Intelligence Cloud provides central intelligence capabilities as well as automated delivery of preventative measures against cyber attacks. The cloud-based element of our platform is delivered in the form of a service that can be used either in the public cloud or in a private cloud using a dedicated appliance.     
We derive revenue from sales of our products and services, which together comprise our platform. Product revenue is generated from sales of our Next-Generation Firewall, which is available in hardware and virtualized form factors. Our Next-Generation Firewall incorporates our proprietary PAN-OS operating system, which provides a consistent set of capabilities across our entire product line. These capabilities include: application visibility and control (App-ID), user identification (User-ID), site-to-site virtual private network (VPN), remote access Secure Sockets Layer (SSL) VPN, and Quality-of-Service (QoS). Our products are designed for different performance requirements throughout an organization, ranging from the PA-200, which is designed for enterprise remote offices, to the PA-7050, which is designed for data centers and high-speed networks. The same firewall functionality that is delivered in the hardware appliances is also available in the VM-Series virtual firewalls, which secure virtualized and cloud-based computing environments. Multiple firewalls can jointly use our WildFire appliance, WF-500, which identifies, analyzes, and blocks known and unknown malware in a private cloud-based environment. Our platform can be centrally managed in both virtualized and hardware appliances across an organization with our Panorama product. In addition, our GlobalProtect appliance, GP-100, provides mobile device management, malware detection, and shares device state information to safely enable mobile devices for business use.

- 40 -


Services revenue is generated from sales of subscriptions and support and maintenance. Our Threat Prevention, URL Filtering, GlobalProtect, and WildFire subscriptions provide our end-customers with real-time access to the latest antivirus, intrusion prevention, web filtering, and modern malware prevention capabilities across fixed and mobile devices. Our Advanced Endpoint Protection, which we expect to release in fiscal 2015, protects against cyber attacks that exploit software vulnerabilities in Windows-based fixed and virtual endpoints through the use of its unique capability of stopping the underlying exploit techniques, and can prevent cyber attacks without relying on prior knowledge of the attack. When end-customers purchase an appliance, they typically purchase one or more of our subscriptions for additional functionality, as well as support and maintenance in order to receive ongoing security updates, upgrades, bug fixes, and repairs. We leverage our appliances to sell software as a service (SaaS) subscription services to meet our customers’ evolving enterprise security requirements. Our hybrid SaaS revenue model consists of product, subscriptions, and support and maintenance, which will enable us to benefit from recurring revenues as we continue to grow our installed end-customer base. Sales of these services increase our deferred revenue balance and contribute significantly to our positive cash flow provided by operating activities.
We maintain a field sales force that works closely with our channel partners in developing sales opportunities. We use a two-tier, indirect fulfillment model whereby we sell our products and services to our global distributor channel partners, which, in turn, sell our products and services to our reseller network, which then sell to our end-customers. Our channel partners purchase our products and services at a discount to our list prices before reselling them to our end-customers. Our channel partners generally receive an order from an end-customer prior to placing an order with us and generally do not stock appliances.
We continue to invest in innovation and strengthening our product portfolio, which resulted in several new product offerings during fiscal 2014. These new product offerings include: the PA-7050 firewall with a throughput of 120Mbps; the GP-100 mobile security management appliance, which offers an easy to deploy, high-performance, dedicated management appliance for our GlobalProtect customers; and the VM-1000-HV virtual Next-Generation Firewall, which is fully integrated with VMware's NSX virtualization platform.
In addition, we extended our enterprise security platform and our technology leadership with the acquisitions of Cyvera Ltd. (“Cyvera”) and Morta Security, Inc. (“Morta”). Cyvera's endpoint software protects enterprises from cyber threats by using an innovative approach to block unknown, zero-day attacks on the endpoint. We intend to invest approximately $25.0 million in fiscal 2015 in research and development, customer support, and growing our Advanced Endpoint Protection sales force. We anticipate billings (non-GAAP) and revenue of our Advanced Endpoint Protection will begin ramping in the second half of fiscal 2015 with a more meaningful revenue contribution in fiscal 2016. Morta provides a team of cybersecurity experts that will enhance our WildFire threat prevention offering. These enhancements enable quick discovery and elimination of previously unknown malware, zero-day exploits, and advanced persistent threats.
In May 2014, we entered into a Settlement, Release and Cross-License Agreement (the “settlement agreement”) with Juniper Networks, Inc. (“Juniper”). Under the terms of the settlement agreement, we agreed to pay Juniper $75.0 million in cash, transfer 1.1 million shares of our common stock, and issue a warrant to purchase 0.5 million shares of our common stock. The terms of the settlement agreement provide for mutual dismissal with prejudice of all pending litigation between the parties, cross-license of the patents in suit for the life of the patents, and an eight-year mutual covenant not to sue for infringement of any other patents. The settlement with Juniper resolves all pending litigation matters between us and will allow us to further focus on innovating and strengthening our product portfolio, servicing our customers, and growing our business.
For fiscal 2014, we added more than 5,300 new customers, including some of the largest Fortune 100 and Global 2000 companies in the world. We had more than 19,000 end-customers in over 130 countries as of July 31, 2014. Our end-customers represent a broad range of industries including education, energy, financial services, government entities, healthcare, Internet and media, manufacturing, public sector, and telecommunications. As of July 31, 2014, we had 1,722 employees.
For fiscal 2014, 2013, and 2012, revenues were $598.2 million, $396.1 million, and $255.1 million, respectively, representing year over year growth of 51.0% for fiscal 2014 and 55.3% for fiscal 2013, despite continued uncertainty in the macroeconomic environment.
All three components of our hybrid SaaS revenue model experienced year over year growth, led by revenue from subscription services, which grew 73.1% to $123.2 million, followed by support and maintenance services, which grew 66.0% to $134.8 million, and product, which grew 39.6% to $340.1 million. The growth reflected increasing recurring revenue in our business model and rapid adoption of high margin subscription services in our base of end-customers.
In June 2014, we issued $575.0 million aggregate principal amount of 0.0% convertible senior notes due 2019 (the "Notes"). The net proceeds from the offering, after deducting fees and offering expenses of $15.4 million, were approximately $559.6 million. In connection with the offering of the Notes, we entered into convertible note hedge transactions whereby we have the option to purchase up to 5.2 million shares of our common stock at a price of approximately $110.28 per share. In addition, concurrent with entering into the convertible note hedge transactions, we entered into separate warrant transactions whereby we sold warrants to acquire approximately 5.2 million shares of our common stock at an initial strike price of approximately $137.85 per share. We used approximately $32.7 million of the net proceeds from the offering to pay the cost of the convertible note hedge

- 41 -


transactions (after such cost was partially offset by the proceeds from the warrant transactions). Refer to Note 7. Convertible Senior Notes of Notes to Consolidated Financial Statements included in Part II, Item 8 of this Annual Report on Form 10-K for information related to the Notes. Our cash, cash equivalents, and investments were $974.4 million as of July 31, 2014.
We believe that the growth of our business and our short-term and long-term success are dependent upon many factors, including our ability to extend our technology leadership, grow our base of end-customers, expand deployment of our platform and services within existing end-customers, extend the length of service terms within existing end-customers, and focus on end-customer satisfaction. While these areas present significant opportunities for us, they also pose challenges and risks that we must successfully address in order to sustain the growth of our business and improve our operating results.
To manage any future growth effectively, we must continue to improve and expand our information technology and financial infrastructure, our operating and administrative systems and controls, and our ability to manage headcount, capital, and processes in an efficient manner. Additionally, we face intense competition in our market, and to succeed, we need to innovate and offer products that are differentiated from existing infrastructure products, as well as effectively hire, retain, train, and motivate qualified personnel and senior management. If we are unable to successfully address these challenges, our business, operating results, and prospects could be adversely affected.
Key Financial Metrics
We monitor the key financial metrics set forth below to help us evaluate growth trends, establish budgets, measure the effectiveness of our sales and marketing efforts, and assess operational efficiencies. We discuss revenue, gross margin, and the components of operating loss and margin below under “—Financial Overview” and “—Results of Operations.” The following tables summarize deferred revenue, cash flow provided by operating activities, free cash flow (non-GAAP), and billings (non-GAAP).
 
July 31,
 
2014
 
2013
 
(in thousands)
Total deferred revenue
$
422,578

 
$
249,230

Cash, cash equivalents, and investments
$
974,382

 
$
436,935

 
Year Ended July 31,
 
2014
 
2013
 
2012
 
(dollars in thousands)
Total revenue
$
598,179

 
$
396,107

 
$
255,138

Year over year percentage increase
51.0
 %
 
55.3
 %
 
115.1
%
Gross margin percentage(5)
73.3
 %
 
72.3
 %
 
72.3
%
Operating income (loss)(1)(2)(3)(4)(5)
$
(215,347
)
 
$
(18,621
)
 
$
3,891

Operating margin percentage
(36.0
)%
 
(4.7
)%
 
1.5
%
Billings (non-GAAP)
$
771,375

 
$
509,529

 
$
323,691

Cash flow provided by operating activities
$
88,406

 
$
114,519

 
$
77,368

Free cash flow (non-GAAP)(6)
$
52,299

 
$
92,077

 
$
62,803

______________
(1)
Includes share-based compensation expense of $99.9 million, $43.9 million, and $13.9 million for fiscal 2014, 2013, and 2012, respectively.
(2)
Includes intellectual property litigation expense of $11.3 million, $3.6 million, and $0.7 million for fiscal 2014, 2013, and 2012, respectively.
(3)
Includes legal settlement expense of $141.2 million, nil, and nil for fiscal 2014, 2013, and 2012, respectively.
(4)
Includes acquisition transaction costs of $4.4 million, nil, and nil for fiscal 2014, 2013, and 2012, respectively.
(5)
Includes amortization of Juniper intellectual property licenses of $2.0 million, nil, and nil for fiscal 2014, 2013, and 2012, respectively.

- 42 -


(6)
Includes our cash payments of $75.0 million and $20.0 million in fiscal 2014 for the legal settlement with Juniper and the Mutual Covenant Not to Sue and Release Agreement with Fortinet, respectively.
Deferred Revenue. Our deferred revenue consists of amounts that have been invoiced but that have not yet been recognized as revenue as of the period end. The majority of our deferred revenue balance consists of subscription and support and maintenance revenue that is recognized ratably over the contractual service period. We monitor our deferred revenue balance because it represents a significant portion of revenue to be recognized in future periods.
Cash Flow Provided by Operating Activities. We monitor cash flow provided by operating activities as a measure of our overall business performance. Our cash flow provided by operating activities is driven in large part by sales of our products and from up-front payments for both subscriptions and support and maintenance services. Monitoring cash flow provided by operating activities enables us to analyze our financial performance without the non-cash effects of certain items such as depreciation, amortization, and share-based compensation costs, thereby allowing us to better understand and manage the cash needs of our business.
Free Cash Flow (non-GAAP). We define free cash flow, a non-GAAP financial measure, as cash provided by operating activities less purchases of property, equipment, and other assets. We consider free cash flow to be a liquidity measure that provides useful information to management and investors about the amount of cash generated by the business that, after the purchases of property, equipment, and other assets, can be used for strategic opportunities, including investing in our business, making strategic acquisitions, and strengthening the balance sheet. A limitation of the utility of free cash flow as a measure of our financial performance and liquidity is that it does not represent the total increase or decrease in our cash balance for the period. In addition, it is important to note that other companies, including companies in our industry, may not use free cash flow, may calculate free cash flow in a different manner than we do, or may use other financial measures to evaluate their performance, all of which could reduce the usefulness of free cash flow as a comparative measure. A reconciliation of free cash flow to cash flow provided by operating activities, the most directly comparable financial measure calculated and presented in accordance with GAAP, is provided below:
 
Year Ended July 31,
 
2014
 
2013
 
2012
 
(in thousands)
Cash Flow:
 
 
 
 
 
Cash flow provided by operating activities
$
88,406

 
$
114,519

 
$
77,368

Less: purchase of property, equipment, and other assets
36,107

 
22,442

 
14,565

Free cash flow (non-GAAP)(1)
$
52,299

 
$
92,077

 
$
62,803

Net cash used in investing activities
$
(320,348
)
 
$
(151,565
)
 
$
(14,565
)
Net cash provided by financing activities
$
575,140

 
$
25,018

 
$
219,322

______________
(1)
Includes our cash payments of $75.0 million and $20.0 million in fiscal 2014 for the legal settlement with Juniper and the Mutual Covenant Not to Sue and Release Agreement with Fortinet, respectively.
Billings (non-GAAP). We define billings, a non-GAAP financial measure, as total revenue plus the change in deferred revenue, net of acquired deferred revenue, during the period. Billings is a key measure used by our management to manage our business because billings drive deferred revenue, which is an important indicator of the health and visibility of our business. We consider billings to be a useful metric for management and investors, particularly as we experience increased sales of subscriptions and strong renewal rates for subscriptions and support and maintenance services, and monitor our near term cash flows. We believe that billings provides useful information to investors and others in understanding and evaluating our operating results in the same manner as our management. However, it is important to note that other companies, including companies in our industry, may not use billings, may calculate billings differently, may have different billing frequencies, or may use other financial measures to evaluate their performance, all of which could reduce the usefulness of billings as a comparative measure. A reconciliation of billings to revenue, the most directly comparable financial measure calculated and presented in accordance with GAAP, is provided below:

- 43 -


 
Year Ended July 31,
 
2014
 
2013
 
2012
 
(in thousands)
Billings (non-GAAP):
 
 
 
 
 
Total revenue
$
598,179

 
$
396,107

 
$
255,138

Add: change in total deferred revenue, net of acquired deferred revenue
173,196

 
113,422

 
68,553

Billings (non-GAAP)
$
771,375

 
$
509,529

 
$
323,691

Financial Overview
Revenue
We derive revenue from sales of our products and services. Revenue is recognized when persuasive evidence of an arrangement exists, delivery has occurred, the fee is fixed or determinable, and collectability is reasonably assured.
Our total revenue is comprised of the following:
Product Revenue. The substantial majority of our product revenue is derived from sales of our appliances. Product revenue also includes revenue derived from software licenses of Panorama, Virtual Systems Upgrades, and the VM-Series. We recognize product revenue at the time of shipment, provided that all other revenue recognition criteria have been met. As a percentage of total revenue, we expect our product revenue to vary from quarter to quarter based on seasonal and cyclical factors.
Services Revenue. Services revenue is derived primarily from Threat Prevention, URL Filtering, GlobalProtect, and WildFire subscriptions and support and maintenance. We expect to release our Advanced Endpoint Protection in fiscal 2015. We anticipate revenue from our Advanced Endpoint Protection will begin ramping in the second half of fiscal 2015 with a more meaningful revenue contribution in fiscal 2016. Threat Prevention, URL Filtering, GlobalProtect, and WildFire subscriptions are priced as a percentage of the appliance’s list price. Our contractual subscription and support and maintenance terms are typically one to five years. We recognize revenue from subscriptions and support and maintenance over the contractual service period. As a percentage of total revenue, we expect our services revenue to vary from quarter to quarter and increase over the long term as we introduce new subscriptions, renew existing services contracts, and expand our installed end-customer base.
Cost of Revenue
Our total cost of revenue consists of cost of product revenue and cost of services revenue. Our cost of revenue includes costs paid to our third-party contract manufacturer and personnel costs, which consist of salaries, bonuses, and share-based compensation associated with our operations and global customer support organizations. Our cost of revenue also includes allocated costs, which consist of certain facilities, depreciation, benefits, recruiting, and information technology costs that we allocate based on headcount, and amortization of intangible assets.
Cost of Product Revenue. Cost of product revenue primarily includes costs paid to our third-party contract manufacturer. Our cost of product revenue also includes amortization of intellectual property licenses, product testing costs, allocated costs, warranty costs, shipping costs, and personnel costs associated with logistics and quality control. We expect our cost of product revenue to increase as our product revenue increases.
Cost of Services Revenue. Cost of services revenue includes personnel costs for our global customer support organization, amortization of intangible assets acquired, allocated costs, and URL filtering database service fees. We expect our cost of services revenue to increase as our installed end-customer base grows.
Gross Margin
Gross margin, or gross profit as a percentage of revenue, has been and will continue to be affected by a variety of factors, including the average sales price of our products, manufacturing costs, the mix of products sold, and the mix of revenue between products and services. For sales of our products, our higher throughput firewall products generally have higher gross margins than our lower throughput firewall products within each product series. For sales of our services, our subscriptions typically have higher gross margins than our support and maintenance. We expect our gross margins to fluctuate over time depending on the factors described above.

- 44 -


Operating Expenses
Our operating expenses consist of research and development, sales and marketing, general and administrative expense, and legal settlement expense. Personnel costs are the most significant component of operating expenses and consist of salaries, benefits, bonuses, share-based compensation, and with regard to sales and marketing expense, sales commissions. We expect operating expenses to increase in absolute dollars, and decrease over the long term as a percentage of revenue as we continue to scale our business. As of July 31, 2014, we expect to recognize approximately $320.8 million of share-based compensation expense over a weighted-average period of three years, excluding additional share-based compensation expense related to any future grants of share-based awards. Share-based compensation expense, net of forfeitures, is recognized on a straight-line basis over the requisite service periods of the awards.
Research and Development. Research and development expense consists primarily of personnel costs. Research and development expense also includes prototype related expenses and allocated costs. We expect research and development expense to increase in absolute dollars as we continue to invest in our future products and services, although our research and development expense may fluctuate as a percentage of total revenue.
Sales and Marketing. Sales and marketing expense consists primarily of personnel costs including commission costs. We expense commission costs as incurred. Sales and marketing expense also includes costs for market development programs, promotional and other marketing costs, travel costs, professional services, and allocated costs. We continue to increase the size of our sales force and have also substantially grown our sales presence internationally. We expect sales and marketing expense to continue to increase in absolute dollars as we increase the size of our sales and marketing organizations to increase touch points with end-customers and to expand our international presence, although our sales and marketing expense may fluctuate as a percentage of total revenue.
General and Administrative. General and administrative expense consists of personnel costs, professional services, and certain non-recurring general expenses. General and administrative personnel include our executive, finance, human resources, legal, and IT organizations. Professional services consist primarily of legal, auditing, accounting, and other consulting costs. We expect general and administrative expense to increase in absolute dollars due to additional costs associated with accounting, compliance, insurance, and investor relations, although our general and administrative expense may fluctuate as a percentage of total revenue.
Legal Settlement. Legal settlement expense consists of charges related to the settlement agreement with Juniper and the Mutual Covenant Not to Sue and Release Agreement with Fortinet, Inc. (“Fortinet”). Refer to the discussion under Note 9. Legal Settlement of Notes to Consolidated Financial Statements in Part II, Item 8 of this Annual Report on Form 10-K for information related to these matters.
Interest Expense
Interest expense consists of the amortization of the debt discount and debt issuance costs related to the Notes. We expect interest expense to increase over the term of the Notes.
Other Income (Expense), Net
Other income (expense), net consists primarily of the change in the fair value of the warrant issued to Juniper, which was classified as a liability on our consolidated balance sheets and remeasured to fair value from the date of issuance through the date of exercise with the corresponding change recorded as other expense. Other income (expense), net also includes interest income earned on our cash, cash equivalents, and investments, foreign currency re-measurement gains and losses, and foreign currency transaction gains and losses.
Provision for Income Taxes
Provision for income taxes consists primarily of income taxes in foreign jurisdictions in which we conduct business, withholding taxes, and federal and state income taxes in the United States. We maintain a full valuation allowance for domestic deferred tax assets, including net operating loss carryforwards and tax credits. We implemented our corporate structure and intercompany relationships to more closely align with the international nature of our business in the fourth quarter of fiscal 2013. Income in certain countries may be taxed at statutory tax rates that are lower than the U.S. statutory tax rate. As a result, our overall effective tax rate over the long term may be lower than the U.S. federal statutory tax rate on positive income through changes in international procurement and sales operations.
Results of Operations
The following tables summarize our results of operations for the periods presented and as a percentage of our total revenue for those periods. The period to period comparison of results is not necessarily indicative of results for future periods. 

- 45 -


 
Year Ended July 31,
 
2014
 
2013
 
2012
 
(in thousands)
Consolidated Statements of Operations Data:
 
 
 
 
 
Revenue:
 
 
 
 
 
Product
$
340,143

 
$
243,707

 
$
174,462

Services
258,036

 
152,400

 
80,676

Total revenue
598,179

 
396,107

 
255,138

Cost of revenue:
 
 
 
 
 
Product
85,503

 
63,412

 
44,615

Services
74,125

 
46,344

 
25,938

Total cost of revenue
159,628

 
109,756

 
70,553

Total gross profit
438,551

 
286,351

 
184,585

Operating expenses:
 
 
 
 
 
Research and development
104,813

 
62,482

 
38,570

Sales and marketing
334,763

 
199,771

 
115,917

General and administrative
73,149

 
42,719

 
26,207

Legal settlement
141,173

 

 

Total operating expenses
653,898

 
304,972

 
180,694

Operating income (loss)
(215,347
)
 
(18,621
)
 
3,891

Interest expense
(1,883
)
 
(74
)
 
(36
)
Other income (expense), net
(4,930
)
 
39

 
(1,056
)
Income (loss) before income taxes
(222,160
)
 
(18,656
)
 
2,799

Provision for income taxes
4,292

 
10,590

 
2,062

Net income (loss)
$
(226,452
)
 
$
(29,246
)
 
$
737


- 46 -



 
Year Ended July 31,
 
2014
 
2013
 
2012
 
(as a percentage of revenue)
Consolidated Statements of Operations Data:
 
 
 
 
 
Revenue:
 
 
 
 
 
Product
56.9
 %
 
61.5
 %
 
68.4
 %
Services
43.1
 %
 
38.5
 %
 
31.6
 %
Total revenue
100.0
 %
 
100.0
 %
 
100.0
 %
Cost of revenue:
 
 
 
 
 
Product
14.3
 %
 
16.0
 %
 
17.5
 %
Services
12.4
 %
 
11.7
 %
 
10.2
 %
Total cost of revenue
26.7
 %
 
27.7
 %
 
27.7
 %
Total gross profit
73.3
 %
 
72.3
 %
 
72.3
 %
Operating expenses:
 
 
 
 
 
Research and development
17.5
 %
 
15.8
 %
 
15.1
 %
Sales and marketing
56.0
 %
 
50.4
 %
 
45.4
 %
General and administrative
12.2
 %
 
10.8
 %
 
10.3
 %
Legal settlement
23.6
 %
 
 %
 
 %
Total operating expenses
109.3
 %
 
77.0
 %
 
70.8
 %
Operating income (loss)
(36.0
)%
 
(4.7
)%
 
1.5
 %
Interest expense
(0.3
)%
 
 %
 
 %
Other income (expense), net
(0.8
)%
 
 %
 
(0.4
)%
Income (loss) before income taxes
(37.1
)%
 
(4.7
)%
 
1.1
 %
Provision for income taxes
0.8
 %
 
2.7
 %
 
0.8
 %
Net income (loss)
(37.9
)%
 
(7.4
)%
 
0.3
 %
 

- 47 -


Comparison of Fiscal 2014 and 2013
Revenue
 
Year Ended July 31,
 
 
 
 
 
2014
 
2013
 
Change
 
Amount
 
% of
Revenue
 
Amount
 
% of
Revenue
 
Amount
 
%
 
(dollars in thousands)
Revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
$
340,143

 
56.9
%
 
$
243,707

 
61.5
%
 
$
96,436

 
39.6
%
Services
 
 
 
 
 
 
 
 
 
 
 
Subscription
123,236

 
20.6
%
 
71,203

 
18.0
%
 
52,033

 
73.1
%
Support and maintenance
134,800

 
22.5
%
 
81,197

 
20.5
%
 
53,603

 
66.0
%
Total services
258,036

 
43.1
%
 
152,400

 
38.5
%
 
105,636

 
69.3
%
Total revenue
$
598,179

 
100.0
%
 
$
396,107

 
100.0
%
 
$
202,072

 
51.0
%
Revenue by geographic theater:
 
 
 
 
 
 
 
 
 
 
 
Americas
$
396,626

 
66.3
%
 
$
247,616

 
62.5
%
 
$
149,010

 
60.2
%
EMEA
126,915

 
21.2
%
 
91,496

 
23.1
%
 
35,419

 
38.7
%
APAC
74,638

 
12.5
%
 
56,995

 
14.4
%
 
17,643

 
31.0
%
Total revenue
$
598,179

 
100.0
%
 
$
396,107

 
100.0
%
 
$
202,072

 
51.0
%
Product revenue increased $96.4 million, or 39.6%, for fiscal 2014 compared to fiscal 2013. The increase was driven by increased demand for our higher end appliances. The impact of changes in pricing on our product revenue was insignificant.
Services revenue increased $105.6 million, or 69.3%, for fiscal 2014 compared to fiscal 2013. The increase was driven by a 73.1% increase in our subscription revenue and a 66.0% increase in our support and maintenance revenue due to increased sales to new and existing end-customers. The relative increases in subscriptions and support and maintenance revenue will fluctuate over time, depending on the mix of services revenue and the introduction of new subscription offerings. The impact of changes in pricing on our services revenue was insignificant.
With respect to geographic theaters, the Americas contributed the largest portion of the increase in revenue for fiscal 2014 compared to fiscal 2013 due to its larger and more established sales force compared to our other theaters. Revenue from both Europe, the Middle East, and Africa (EMEA) and Asia Pacific and Japan (APAC) increased during fiscal 2014 compared to fiscal 2013 due to our investment in increasing the size of our sales force and number of channel partners in these theaters.
Cost of Revenue and Gross Margin
 
Year Ended July 31,
 
 
 
 
 
2014
 
2013
 
Change
 
Amount
 
Gross
Margin
 
Amount
 
Gross
Margin
 
Amount
 
Gross
Margin
 
(dollars in thousands)
Cost of revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
$
85,503

 
 
 
$
63,412

 
 
 
$
22,091

 
 
Services
74,125

 
 
 
46,344

 
 
 
27,781

 
 
Total cost of revenue
$
159,628

 
 
 
$
109,756

 
 
 
$
49,872

 
 
Gross profit:
 
 
 
 
 
 
 
 
 
 
 
Product
$
254,640

 
74.9
%
 
$
180,295

 
74.0
%
 
$
74,345

 
0.9
%
Services
183,911

 
71.3
%
 
106,056

 
69.6
%
 
77,855

 
1.7
%
Total gross profit
$
438,551

 
73.3
%
 
$
286,351

 
72.3
%
 
$
152,200

 
1.0
%

- 48 -


Product cost increased $22.1 million, or 34.8%, for fiscal 2014 compared to fiscal 2013 due to an increase in product unit volume. Product cost for fiscal 2014 includes $2.0 million of amortization related to Juniper intellectual property licenses.
Service cost increased $27.8 million, or 59.9%, for fiscal 2014 compared to fiscal 2013 due to an increase in personnel costs of $14.8 million related to increasing our headcount, allocated costs of $5.5 million, professional services costs of $2.1 million, amortization of acquired intangible assets of $1.6 million, and other costs incurred to expand our customer service capabilities to support our growing installed end-customer base.
 Gross margin increased 100 basis points for fiscal 2014 compared to fiscal 2013. The increase of 90 basis points in product margin was due to continued focus on material cost reductions, partially offset by $2.0 million of amortization related to Juniper intellectual property licenses. The increase of 170 basis points in services margin was due to contributions from our higher margin subscription services.
Operating Expenses
 
Year Ended July 31,
 
 
 
 
 
2014
 
2013
 
Change
 
Amount
 
% of
Revenue
 
Amount
 
% of
Revenue
 
Amount
 
%
 
(dollars in thousands)
Operating expenses:
 
 
 
 
 
 
 
 
 
 
 
Research and development
$
104,813

 
17.5
%
 
$
62,482

 
15.8
%
 
$
42,331

 
67.7
%
Sales and marketing
334,763

 
56.0
%
 
199,771

 
50.4
%
 
134,992

 
67.6
%
General and administrative
73,149

 
12.2
%
 
42,719

 
10.8
%
 
30,430

 
71.2
%
Legal settlement
141,173

 
23.6
%
 

 
%
 
141,173

 
N/A

Total operating expenses
$
653,898

 
109.3
%
 
$
304,972

 
77.0
%
 
$
348,926

 
114.4
%
Includes share-based compensation of:
 
 
 
 
 
 
 
 
 
 
 
Research and development
$
29,524

 
 
 
$
9,931

 
 
 
$
19,593

 
197.3
%
Sales and marketing
42,647

 
 
 
20,493

 
 
 
22,154

 
108.1
%
General and administrative
16,668

 
 
 
9,101

 
 
 
7,567

 
83.1
%
Total
$
88,839

 
 
 
$
39,525

 
 
 
$
49,314

 
124.8
%
Research and development expense increased $42.3 million, or 67.7%, for fiscal 2014 compared to fiscal 2013 due to an increase in personnel costs of $31.4 million largely due to an increase in headcount, an increase in allocated costs of $6.4 million, and an increase in development costs of $2.5 million to support continued investment in our future product and service offerings.
Sales and marketing expense increased $135.0 million, or 67.6%, for fiscal 2014 compared to fiscal 2013 due to an increase in personnel costs of $94.6 million largely due to an increase in sales commissions and headcount, an increase in allocated costs of $13.9 million, an increase in travel and entertainment costs of $8.9 million, an increase in professional services costs of $7.6 million, and an increase in demand generation activities, trade shows, and other marketing activities of $6.1 million.
General and administrative expense increased $30.4 million, or 71.2%, for fiscal 2014 compared to fiscal 2013 due to an increase in professional services costs of $12.5 million, including expenses related to the intellectual property litigation with Juniper of $7.7 million and expenses related to our acquisitions of Cyvera and Morta of $4.4 million, an increase in personnel costs of $12.3 million, largely due to an increase in headcount, and an increase of allocated costs of $2.4 million.
Legal settlement expense increased $141.2 million for fiscal 2014 compared to fiscal 2013 due to the recognition of an expense of $121.2 million and $20.0 million for the settlement agreement with Juniper and the Mutual Covenant Not to Sue and Release Agreement with Fortinet, respectively.

- 49 -


Interest Expense
 
Year Ended July 31,
 
 
 
 
 
2014
 
2013
 
Change
 
Amount
 
Amount
 
Amount
 
%
 
(dollars in thousands)
Interest expense
$
1,883

 
$
74

 
$
1,809

 
2,444.6
%
Interest expense increased $1.8 million for fiscal 2014 compared to fiscal 2013 due to the amortization of debt discount and debt issuance costs related to the Notes. Interest expense related to the amortization of debt discount and debt issuance costs will range from $22.3 million to $25.7 million per year over the next five fiscal years.
Other Income (Expense), Net
 
Year Ended July 31,
 
 
 
 
 
2014
 
2013
 
Change
 
Amount
 
Amount
 
Amount
 
%
 
(dollars in thousands)
Other income (expense), net
$
(4,930
)
 
$
39

 
$
(4,969
)
 
NM
Other income (expense), net decreased $5.0 million for fiscal 2014 compared to fiscal 2013 due to an expense of $5.9 million to record the change in the fair value of the warrant issued to Juniper from June 3, 2014, the issuance date of the warrant, through July 1, 2014, the date the warrant was exercised, partially offset by foreign currency remeasurement gains and an increase in interest income.
Provision for Income Taxes
 
Year Ended July 31,
 
 
 
 
 
2014
 
2013
 
Change
 
Amount
 
Amount
 
Amount
 
%
 
(dollars in thousands)
Provision for income taxes
$
4,292

 
$
10,590

 
$
(6,298
)
 
(59.5
)%
Effective tax rate
(1.9
)%
 
(56.8
)%
 
 
 
 
 We recorded an income tax provision for fiscal 2014 due to foreign income taxes and foreign withholding taxes. The provision for income taxes decreased $6.3 million for fiscal 2014 compared to fiscal 2013 due to decreased U.S. taxable income, primarily attributable to the legal settlement with Juniper and the Mutual Covenant Not to Sue and Release Agreement with Fortinet.

- 50 -


Comparison of Fiscal 2013 and 2012
Revenue
 
Year Ended July 31,
 
 
 
 
 
2013
 
2012
 
Change
 
Amount
 
% of
Revenue
 
Amount
 
% of
Revenue
 
Amount
 
%
 
(dollars in thousands)
Revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
$
243,707

 
61.5
%
 
$
174,462

 
68.4
%
 
$
69,245

 
39.7
%
Services
 
 
 
 
 
 
 
 
 
 
 
Subscription
71,203

 
18.0
%
 
38,698

 
15.2
%
 
32,505

 
84.0
%
Support and maintenance
81,197

 
20.5
%
 
41,978