FTNT - 2012.10K
Table of Contents

 
 
 
 
 
 
 
 
 
 
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
 
 FORM 10-K 
(Mark One)
T
ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended December 31, 2012
or
o
TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
 For the transition period from              to             
Commission file number: 001-34511
______________________________________
 FORTINET, INC.
(Exact name of registrant as specified in its charter)
______________________________________

Delaware
77-0560389
(State or other jurisdiction of
incorporation or organization)
(I.R.S. Employer
Identification No.)
1090 Kifer Road
Sunnyvale, California
94086
(Address of principal executive offices)
(Zip Code)
(408) 235-7700
(Registrant’s telephone number, including area code)
 
 Securities registered pursuant to Section 12(b) of the Act: 
Common Stock, $0.001 Par Value
 
The NASDAQ Stock Market LLC
 
 
 
(Title of each class)
 
(Name of exchange on which registered)
Securities registered pursuant to Section 12(g) of the Act: None
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.    Yes  x    No  o
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.    Yes  o No  x



Table of Contents

Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 (“Exchange Act”) during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.    Yes  x    No  o
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files).    Yes  x  No  o 
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be contained, to the best of the registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.  x
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act. 
Large accelerated filer
x
 
 
Accelerated filer
o
Non-accelerated filer
o 
(Do not check if smaller reporting company)
 
Smaller reporting company
o
Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Act).    Yes  o     No  x
The aggregate market value of voting stock held by non-affiliates of the registrant, as of June 29, 2012, the last business day of the registrant’s most recently completed second quarter, was $2,800,919,536 (based on the closing price for shares of the registrant’s common stock as reported by The NASDAQ Global Select Market on that date). Shares of common stock held by each executive officer, director, and holder of 5% or more of the registrant’s outstanding common stock have been excluded in that such persons may be deemed to be affiliates. This determination of affiliate status is not necessarily a conclusive determination for other purposes.
As of February 20, 2013, there were 161,607,952 shares of the registrant’s common stock outstanding.
DOCUMENTS INCORPORATED BY REFERENCE
Portions of the registrant’s definitive Proxy Statement relating to its 2013 Annual Meeting of Stockholders are incorporated by reference into Part III of this Annual Report on Form 10-K where indicated. Such Proxy Statement will be filed with the United States Securities and Exchange Commission (“SEC”) within 120 days after the end of the fiscal year to which this report relates.




FORTINET, INC.
ANNUAL REPORT ON FORM 10-K
For the Fiscal Year Ended December 31, 2012
Table of Contents
 
 
 
 
 
 
Page
 
 
 
 
Part I
 
 
 
 
Item 1.
Item 1A.
Item 1B.
Item 2.
Item 3.
Item 4.
 
 
 
 
Part II
 
 
 
 
Item 5.
Item 6.
Item 7.
Item 7A.
Item 8.
Item 9.
Item 9A.
Item 9B.
 
 
 
 
Part III
 
 
 
 
Item 10.
Item 11.
Item 12.
Item 13.
Item 14.
 
 
 
 
Part IV
 
 
 
 
Item 15.


 


Table of Contents

Part I

ITEM 1.    Business
    
Overview

We provide network security solutions that are designed to address the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated information technology (“IT”) threat landscape. Through our products and subscription services, we provide broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises, service providers and governmental entities worldwide. Our flagship integrated network security solution consists of our FortiGate physical and virtual appliance products that provide a broad array of security and networking functions to protect data, applications, and users from network- and content-level security threats. These functions provide Unified Threat Management (“UTM”)/Next Generation Firewall (“NGFW”) technologies, including firewall, VPN, application control, anti-malware, intrusion prevention, Web filtering, vulnerability management, anti-spam, wireless controller, and WAN acceleration. Our FortiGate appliances, from the FortiGate-20 for small businesses and branch offices to the FortiGate-5000 series for large enterprises and service providers, are based on our proprietary technology platform. This platform includes our FortiASICs, which are specifically designed for accelerated processing of security and networking functions, and our FortiOS operating system, which provides the foundation for all of our security functions. Our FortiGuard security subscription services provide end-customers with access to dynamic updates to our application control, anti-malware, intrusion prevention, Web filtering and anti-spam functionality based on intelligence gathered by our dedicated FortiGuard Labs team. By combining multiple proprietary security and networking functions with our purpose-built FortiASIC and FortiOS, our FortiGate UTM/NGFW solution delivers broad protection against dynamic security threats while reducing the operational burden and costs associated with managing multiple point products.

We complement our FortiGate product line with the FortiManager product family, which enables end-customers to manage the system configuration and security functions of multiple FortiGate devices from a centralized console, as well as the FortiAnalyzer product family, which enables collection, analysis and archiving of content and log data generated by our products. We also offer other product lines that provide additional protection, such as: (i) FortiAP, secure wireless access points, (ii) FortiWeb, security for Web-based applications, (iii) FortiMail, multi-featured, high performance messaging security, (iv) FortiDB, centrally managed database-specific security, (v) FortiClient, endpoint security for desktops, laptops and mobile devices and that is primarily used in conjunction with our FortiGate appliances, (vi) FortiScan, endpoint vulnerability assessment and remediation, (vii) FortiSwitch, Ethernet switches, (viii) FortiBridge, bypass appliances to help ensure network availability, (ix) FortiAuthenticator, scalable secure authentication for enterprise networks, (x) FortiBalancer, optimizing the availability and performance of mobile, cloud, and enterprise applications, (xi) FortiCache, reducing the cost of and impact of cached internet content, (xii) FortiDNS, providing secure DNS caching, (xiii) FortiDDoS, protection against denial of service attack, and (xiv) FortiVoice, business telephone communication.

Additionally, we offer virtual appliances for the FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, and FortiScan product lines. These virtual appliances help secure network infrastructures with the same functionality as the traditional physical appliances in their respective product lines. They can be used in conjunction with traditional Fortinet appliances (such as FortiGate, FortiManager, and FortiAnalyzer) to help ensure the visibility, management, and protection of physical and virtual environments.

Since our inception through December 31, 2012, we have shipped over 1,100,000 appliances via more than 10,000 channel partners to more than 150,000 end-customers worldwide, including a majority of the 2012 Fortune Global 100.

We were incorporated in Delaware in November 2000. Our principal executive office is located at 1090 Kifer Road, Sunnyvale, California 94086 and our telephone number at that location is (408) 235-7700.

Technology and Architecture

Our proprietary FortiASIC hardware architecture, FortiOS operating system and associated security and networking functions combine to form a platform that integrates security features and enables our products to perform sophisticated security processing for networks with high throughput requirements.

FortiASIC

Our FortiASIC family of Application-Specific Integrated Circuits (“ASICs”), is comprised of three lines of processors: FortiASIC content processor (“CP”), the FortiASIC network processor (“NP”), and the FortiASIC system-on-a-chip (“SOC”).

1

Table of Contents

These custom ASICs are designed to enhance the sophisticated security processing capabilities implemented in software by accelerating the computation-intensive tasks such as firewall policy enforcement or IPS anomaly detection. This architecture provides the flexibility of implementing accelerated processing of new threat detection without requiring a new ASIC release. The FortiASIC CP is currently included in most of our entry-level and all of our mid-range and high-end FortiGate appliances. The FortiASIC NP is currently included in some of our mid-range and high-end FortiGate appliances, delivering further accelerated firewall and VPN performance. The FortiASIC SOC is currently included in our entry-level FortiGate-20 and -40 product families. During fiscal 2012, we also introduced our new FortiASIC-SoC2 processor, which is currently being designed into our new appliances. FortiASIC-SoC2 is our second-generation processor that combines general purpose processing power with Fortinets custom technology to provide hardware-accelerated network security performance for our FortiGate appliances. It provides more than double the general processing capacity than its predecessor.
 
FortiOS

Our FortiOS operating system provides the foundation for the operation of all FortiGate appliances, from the core kernel functions to the security processing feature sets. FortiOS provides multiple layers of security including a hardened kernel layer providing protection for the FortiGate system, a network security layer providing security for end-customers’ network infrastructures, and application content protection providing security for end-customers’ workstations and applications. FortiOS directs the operations of processors and ASICs as well as providing system management functions such as command-line and graphical user interfaces.

In the fourth quarter of fiscal 2012, we released the latest version of our FortiOS operating system, which brings advanced security, control, and intelligence that organizations of all sizes need to protect themselves from today’s sophisticated threats. These enhancements to FortiOS include:

A client reputation feature which delivers specific, actionable information that identifies compromised systems in real time.

On-device behavior-based heuristic engine and cloud-based anti-malware services.

Industry-validated anti-malware protection.

User-based and device-based access and security policy enforcement for mobile devices.

Automatic adjustment of role-based policies for users and guests based on location, data, and application profiles.

We make available updates to FortiOS through our FortiCare support services. FortiOS also enables advanced, integrated routing and switching, allowing end-customers to deploy FortiGate devices within a wide variety of networks, as well as providing a direct replacement solution option for legacy switching and routing equipment. FortiOS implements a suite of commonly used routing protocols as well as address translation technologies, allowing the FortiGate appliance to integrate and operate in a wide variety of network environments. Additional features include Virtual Domain (“VDOM”), capabilities and traffic queuing and shaping, enabling administrators to set the appropriate configurations and policies that meet their infrastructure needs. FortiOS also provides capabilities for logging of traffic for forensic analysis purposes which are particularly important for regulatory compliance initiatives like PCI DSS. FortiOS’s packet classification, queue disciplines, policy enforcement, congestion management, and other traffic optimization functionality are designed to help control network traffic in order to optimize performance.

Our FortiOS incorporates the following eight core security and networking technologies:
 
Firewall. Our firewall technology delivers high performance network and application firewalling, including the ability to enforce policies based on application behavior and content. Our technology identifies traffic patterns independent of port or protocol used, and links them to the use of specific applications, enabling visibility and control over application behavior (explained in more detail below). By coupling application intelligence with firewall technology, the FortiGate platform is able to deliver real-time security with integrated application content level inspection, thereby simplifying security deployments.
 
Virtual Private Network. Our advanced VPN technology provides secure communications between multiple networks and hosts, through both secure socket layer (“SSL”), and IPsec VPN technologies, leveraging our custom FortiASIC to provide hardware acceleration for high-performance communications and data privacy.

2

Table of Contents


Application Control. Our application control technology allows our end-customers to define granular network-based application policies in over 2,400 applications, providing additional visibility and control over application access, user behavior within applications, and application content.
 
Anti-malware. Our anti-malware technology provides protection against malware, including viruses, spyware and trojans.
 
Intrusion Prevention System (IPS). Our IPS technology provides protection against current and emerging network level threats.
 
Web Filtering. Our Web filtering automation technology works in concert with our research team to collect, analyze and categorize websites to provide real-time protection through website ratings and categorization. Our Web filtering technology is a pro-active defense feature that identifies known locations of malware and blocks access to these malicious sources.
 
Anti-spam. We employ a variety of anti-spam techniques to detect and block spam. These techniques include a hosted service performing algorithmic validations of messages against known spam messages, sophisticated reputation service designed to evaluate and track valid email sources and destinations, intelligent image scanning to evaluate the validity of images and dynamic heuristic rules to allow messages to be evaluated based on content within each message.
 
WAN Acceleration. Our storage-enabled and storage-ready FortiGate appliances provide the ability to accelerate network traffic across the wide area network by implementing a combination of application content caching and protocol optimization techniques.

In addition to the eight core security and networking functions mentioned above, we also incorporate additional technologies within FortiGate appliances that differentiate our UTM/NGFW solution, including:

Data Leakage Prevention (DLP). Our DLP technology provides the ability to define rules based on corporate policies, and consequently detect and help prevent confidential data from being distributed outside of the corporate network.
 
Traffic optimization. Our traffic optimization technology combines quality of service techniques with traffic shaping to provide better service to selected network traffic based on customer policies without causing interruptions to other traffic.
 
SSL inspection. Our SSL inspection technology provides the ability to decrypt SSL application content for processing by FortiOS. The ability to inspect encrypted SSL content enables our customers to ensure protection from malware that would be otherwise hidden from traditional security products, and enforce the full complement of security and networking features available within FortiOS.

Vulnerability Management. Our vulnerability management technology enables the FortiGate platform to perform network scans to discover systems on a network, identity vulnerabilities and recommend steps for remediation. The FortiGate devices can store the results of the scans locally, or send the results from multiple FortiGate devices to a central FortiAnalyzer for aggregation and analysis.

Wireless Controller. Our wireless controller technology provides the ability to deploy FortiAP wireless access points to create a secure wireless network. FortiAP access points tunnel all wireless traffic to FortiGate or FortiWiFi platforms, enabling end-customers to use a single security platform to manage all wired and wireless network traffic.

Products

Our core product offerings consist of our FortiGate UTM/NGFW product family, along with our FortiManager central management and FortiAnalyzer central logging and reporting product families, both of which are typically purchased to complement a large FortiGate deployment.



3

Table of Contents

FortiGate

Our flagship FortiGate physical and virtual appliances offer a broad set of security and networking functions, including firewall, VPN, application control, antivirus, intrusion prevention, Web filtering, anti-spam and WAN acceleration. All FortiGate models are based on our proprietary operating system, FortiOS, and substantially all FortiGate physical appliances include our proprietary FortiASICs to accelerate content and network security features implemented within FortiOS. FortiGate platforms can be centrally managed through both embedded Web-based and command line interfaces, as well as through FortiManager which provides a central management architecture for thousands of FortiGate physical and virtual appliances.

By combining multiple network security functions in our purpose-built security platform, the FortiGate provides high quality protection capabilities and deployment flexibility while reducing the operational burden and costs associated with managing multiple point products. Through FortiGuard security subscription services, our products enable end-customers to add security functionality as required by their evolving business needs and the changing threat landscape. By purchasing FortiGuard security subscription services, end-customers obtain coverage and access to regular updates for application control, antivirus, IPS, Web filtering and anti-spam functions for their FortiGate appliances. With over 30 models in the FortiGate product line, FortiGate is designed to address security requirements for small- to mid-sized businesses, remote offices, large enterprises, and service providers.

Each FortiGate model runs our FortiOS operating system, and substantially all FortiGate physical appliances include our FortiASIC CP. The significant differences between each model are the performance and scalability targets each model is designed to meet, while the security features and associated services offered are common throughout all models.

The FortiGate-20 through -100 series models are designed for perimeter protection for small- to mid-sized businesses, remote offices of large distributed organizations and as customer premises equipment for service providers. Optional wireless LAN (“WLAN”), integration is available for the FortiGate-20, -40, -60 and -80 models, marketed as FortiWiFi, delivering additional network access and security for wireless environments.

The FortiGate-200 through -800 series models are designed for perimeter deployment in mid-sized to large enterprise networks. These products offer increased capacity and scalability designed to provide high network performance while delivering the same broad security suite as all FortiGate models. Additionally, the FortiGate-300 -600 and -800 models provide hardware modularity, allowing end-customers the flexibility to customize solutions to their requirements.

The FortiGate-1000 through -5000 series models deliver high performance and scalable network security functionality for perimeter, data center and core deployment in large enterprise and service provider networks. Additionally, most of these products provide hardware modularity, allowing end-customers the flexibility to customize solutions to their requirements. Some products within the FortiGate-3000 and -5000 series leverage Advanced Mezzanine Card, or AMC, industry standards for hardware modularization to support the advanced networking requirements of large enterprises and service providers, including high-speed networking, WAN connectivity, and network attached storage connectivity. The FortiGate-3950B platform also leverages our proprietary Fortinet Mezzanine Card (“FMC”), that provides hardware modularity to give end-customers the ability to add additional firewall and/or intrusion prevention performance, or increase the number of interfaces, as their network security needs evolve. The FortiGate-5000 series, including our newly released high performance security blade for firewall, FortiGate-5001C, announced on January 7, 2013, is also compatible with the Advanced Telecommunications Computing Architecture (“ATCA”), standard, resulting in a flexible hardware platform for system modularity. This modularization gives end-customers the ability to deploy an initial FortiGate configuration with room to grow as their network security needs evolve. The inclusion of network load balancing and advanced switching functionality provides additional flexibility in how end-customers utilize the FortiGate modules within the FortiGate chassis. In addition, our FortiGate-5000 series ATCA blades can be utilized in other third-party vendors’ industry standard ATCA chassis, allowing FortiGate platforms to be deployed into a much wider range of network solutions. Our FortiGate-5000 series appliances offer modular, chassis-based architecture based on the ATCA and AMC industry standards. We brand a subset of our FortiGate-3000 and -5000 series products as FortiCarrier to reflect products specifically targeting a subset of service providers. These products add incremental security, networking and management functionality often utilized in service provider deployments.

FortiGate System Virtualization (VDOM)

In addition to providing network and content level security, our FortiOS operating system also offers system virtualization capabilities—the ability to “divide” a security appliance into multiple, separately provisioned and managed instances. This capability is currently deployed in substantially all of our FortiGate products as our virtual domain, or VDOM, feature, where administrators have the ability to segment a single FortiGate appliance platform into multiple FortiGate instances. Network

4

Table of Contents

security system virtualization, using our VDOM feature, provides isolation between each virtual system, giving administrators flexibility in configuration and traffic management capabilities for each virtual instance.

Fortinet Management and Analysis Products

Our FortiManager and FortiAnalyzer physical and virtual products are typically sold in conjunction with a large FortiGate deployment.

FortiManager. Our FortiManager family of products provides a central management solution for our FortiGate products, including the wide variety of network and security features offered within FortiOS. One FortiManager product is capable of effectively managing thousands of FortiGate units, and also provides central management for FortiClient software. FortiManager facilitates the coordination of policy-based provisioning, device configuration and operating system revision management, as well as network security monitoring and device control.

FortiAnalyzer. Our FortiAnalyzer family provides network logging, analyzing, and reporting products that securely aggregate content and log data from our FortiGate devices and other Fortinet products as well as third-party devices to enable network logging, analysis and reporting. Additional functions such as vulnerability assessments and traffic analysis provide additional value for customers seeking to control and monitor their network infrastructure and security policies. A full range of content and log data, including traffic, event, virus, attack, Web content, and email data may be archived, filtered and mined for compliance or historical analysis purposes. Our FortiAnalyzer product family comes with a suite of standard reports as well as the ability to customize reports.

We also offer other physical and virtual appliances and software that protect our end-customers from security threats to other critical areas in the enterprise, such as messaging, Web-based applications and databases, and employees’ computers or mobile devices as discussed above in the business overview.

Services

FortiGuard Security Subscription Services

Security requirements are dynamic due to the constantly changing nature of threats. Our FortiGuard Labs global threat research team, comprised of over 150 professionals, uses automated processes to identify emerging threats, collects threat samples, and replicates, reviews and characterizes attacks. Based on this research, we develop updates for virus signatures, attack definitions, scanning engines, and other security solution components to distribute to end-customers through our FortiGuard global distribution network. Our FortiGuard security subscription services are designed to allow us to quickly deliver new threat detection capabilities to end-customers worldwide as new threats evolve. End-customers purchase FortiGuard security subscription services in advance, typically for a one-year term, to obtain coverage and access to regular updates for application control, antivirus, intrusion prevention, Web filtering, and anti-spam functions for our FortiGate products; antivirus, Web filtering and anti-spam functions for our FortiClient software; antivirus and anti-spam functions for our FortiMail products; vulnerability management for our FortiGate, FortiAnalyzer and FortiScan products, database functions for our FortiDB appliance, and web functions for our FortiWeb appliances. We provide FortiGuard services 24 hours a day, seven days a week.
 
FortiCare Technical Support Services

Our FortiCare services are our technical support services for the software, firmware and hardware in our products. In addition to our standard support service offering, we offer a premium service that offers faster response times and dedicated support oriented towards major accounts.

For our standard technical support offering for our products, channel partners often provide first level support to the end-customer, especially for small and mid-sized end-customers, and we typically provide second and third level support to our end-customers. We also provide knowledge management tools and customer self-help portals to help augment our support capabilities in an efficient and scalable manner. We provide technical support to partners and end-customers 24 hours a day, seven days a week through regional technical support managers located worldwide.

Training Services

We offer training services to our end-customers and channel partners through our training department and authorized training partners. We have also implemented a training certification program to ensure an understanding of our products and services.

5

Table of Contents

Professional Services

We offer professional services to end-customers primarily for large implementations where expert technical resources are required. Our professional services consultants help in the design of deployments of our products and work closely with end-customer engineers, managers and other project team members to implement our products according to design, utilizing network analysis tools, attack simulation software and scripts.

Customers

We sell our security solutions through channel partners to end-customers of various sizes—from small businesses to large enterprises and service providers—and across a variety of industries including telecommunications, government, financial services, retail, education, technology, healthcare and manufacturing. An end-customer deployment may involve one of our appliances or thousands, depending on our end-customers’ size and security requirements. Since our inception through December 31, 2012, we have shipped over 1,100,000 appliances via more than 10,000 channel partners to more than 150,000 end-customers worldwide, including a majority of the 2012 Fortune Global 100. For additional information regarding our sales by customer location, see Note 13 to our consolidated financial statements in Part II, Item 8 of this Annual Report on Form 10-K.

During fiscal 2010 and 2011, no single customer or distributor accounted for 10% or more of total revenue. During fiscal 2012, one distributor, Exclusive Networks Group, accounted for 11% of total revenue.

Sales and Marketing

We primarily sell our products and services directly to distributors that sell to resellers and service providers, that, in turn, sell to our end-customers. In certain cases, we sell directly to government-focused resellers, very large service providers and major systems integrator partners who have large purchasing power and unique customer deployment demands. As of December 31, 2012, our distribution channel program had more than 10,000 channel partners worldwide. We work with many of the world’s leading technology distributors, including Arrow Electronics, Inc., Ingram Micro Inc. and Tech Data Corporation.

We support our channel partners that include distributors and resellers with a team of experienced channel account managers, sales professionals and sales engineers who provide business planning, joint marketing strategy, and pre-sales and operational sales support. Additionally, our sales team often helps drive and support large enterprise and service provider sales through a direct touch model. Our sales professionals and engineers typically work alongside our channel partners and directly engage with end-customers to address their unique security and deployment requirements. Our sales cycle for an initial end-customer purchase typically ranges from three to six months but can be longer especially for large enterprises, service providers and government customers. To support our broadly dispersed global channel and end-customer base, we have sales offices in over 30 countries around the world.

Our marketing strategy is focused on building our brand and driving end-customer demand for our security solutions. We execute this strategy by leveraging a combination of internal marketing professionals and a network of regional and global channel partners. Our internal marketing organization is responsible for branding, product marketing, channel marketing and sales support programs. We focus our resources on programs, tools and activities that can be leveraged by partners worldwide to extend our marketing reach, such as sales tools and collateral, product awards and technical certifications, training, regional seminars and conferences, webinars and various other demand-generation activities.
 
Manufacturing and Suppliers

We outsource the manufacturing of our security appliance products to a variety of contract manufacturers and original design manufacturers. Our current manufacturing partners include Flextronics International Ltd., Micro-Star International Co., Ltd., Adlink Technology, Inc., Senao Networks, Inc., and a number of Taiwan-based manufacturers. We submit purchase orders to our contract manufacturers that describe the type and quantities of our products to be manufactured, the delivery date and other delivery terms. Once our products are manufactured, they are sent to either our headquarters in Sunnyvale, California, or to our logistics partner in Taoyuan City, Taiwan, where accessory packaging and quality-control testing are performed. We believe that outsourcing our manufacturing and a substantial portion of our logistics enables us to conserve capital, better adjust manufacturing volumes to meet changes in demand and more quickly deliver products, while allowing us to focus resources on our core competencies. Our proprietary FortiASICs, which are the key to the performance of our appliances, are fabricated by contract manufacturers in foundries operated by United Microelectronics Corporation (“UMC”) and Taiwan Semiconductor Manufacturing Company Limited (“TSMC”). Faraday Technology Corporation (using UMC’s foundry), Kawasaki Microelectronics America, Inc. (“K-Micro”) (using TSMC’s foundry) and Renesas Electronics Corporation (“Renesas”) (using UMC’s foundry) manufacture our

6

Table of Contents

ASICs on a purchase order basis. Accordingly, they are not obligated to continue to fulfill our supply requirements, and the prices we are charged for the fabrication of our ASICs could be increased on short notice.

The components included in our products are sourced from various suppliers by us or more frequently by our contract manufacturers. Some of the components important to our business, including specific types of central processing units from Intel Corporation (“Intel”), network chips from Broadcom Corporation (“Broadcom”), Marvell Technology Group Ltd. (“Marvell”) and Intel, and solid-state drives (silicon-based storage device) from OCZ Technology Group, Inc. and Samsung Electronics Co., Ltd., are available from a limited or sole source of supply.

We have no long-term contracts related to the manufacturing of our ASICs or other components that guarantee any capacity or pricing terms.

For information regarding the geographical disbursement of our long-lived assets, see Note 13 to our consolidated financial statements in Part II, Item 8 of this Annual Report on Form 10-K.

Research and Development

We focus our research and development efforts on developing new products and systems, and adding new features to existing products and systems. Our development strategy is to identify features, products and systems for both software and hardware that are, or are expected to be, needed by our end-customers. Our success in designing, developing, manufacturing and selling new or enhanced products will depend on a variety of factors, including the identification of market demand for new products, product selection, timely implementation of product design and development, product performance, effective manufacturing and assembly processes and sales and marketing.

As of December 31, 2012, our research and development organization had headcount of 599 people predominantly in Canada, the United States and China. Our research and development expense was $81.1 million in fiscal 2012, $63.6 million in fiscal 2011 and $49.8 million in fiscal 2010.

Intellectual Property

We rely primarily on patent, trademark, copyright and trade secrets laws, confidentiality procedures and contractual provisions to protect our technology. As of December 31, 2012, we had 102 issued U.S. patents, 18 issued Chinese patents, 1 issued Japanese patent, 86 patent applications pending for examination in the United States, and 9 patent applications pending for examination in China. We also license software from third parties for inclusion in our products, including open source software and other software available on commercially reasonable terms.

Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality agreements with our employees, consultants, vendors and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that the steps taken by us will prevent misappropriation of our technology. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States.

Our industry is characterized by the existence of a large number of patents and frequent claims and related litigation regarding patent and other intellectual property rights. From time to time third parties may assert patent, copyright, trademark and other intellectual property rights against us, our channel partners or our end-customers. Successful claims of infringement by a third party could prevent us from distributing certain products or performing certain services or require us to pay substantial damages (including treble damages if we are found to have willfully infringed patents or copyrights), royalties or other fees. Even if third parties may offer a license to their technology, the terms of any offered license may not be acceptable and the failure to obtain a license or the costs associated with any license could cause our business, operating results or financial condition to be materially and adversely affected. We typically indemnify our end-customers, distributors and certain resellers against claims that our products infringe the intellectual property of third parties.

Seasonality

For information regarding seasonality, see the section entitled “—Quarterly Results of Operations—Seasonality, Cyclicality and Quarterly Revenue Trends” in Part II, Item 7 of this Annual Report on Form 10-K.



7

Table of Contents



Competition

The markets for our products are extremely competitive and are characterized by rapid technological change. The principal competitive factors in our markets include the following:
 
product performance, features, effectiveness, interoperability and reliability;
 
technological expertise;
 
price of products and services and total cost of ownership;
 
brand recognition;
 
customer service and support;
 
sales and distribution capabilities;
 
compliance with industry standards and certifications;
 
size and financial stability of operations; and
 
breadth of product line.

Our competitors include networking companies such as Cisco Systems, Inc. (“Cisco”) and Juniper Networks, Inc. (“Juniper”), security vendors such as Check Point Software Technologies Ltd. (“Check Point”), McAfee, Inc. (“McAfee”) (acquired by Intel), SonicWALL, Inc. (“SonicWALL”) (acquired by Dell Inc. (“Dell”)), and Palo Alto Networks, Inc. (“Palo Alto Networks”), and other point solution security vendors.

We believe we compete favorably based on our products’ performance, reliability and breadth, our ability to add and integrate new networking and security features and our technological expertise. Several competitors are significantly larger, have greater financial, technical, marketing, distribution, customer support and other resources, are more established than we are, and have significantly better brand recognition. Some of these larger competitors have substantially broader product offerings and leverage their relationships based on other products or incorporate functionality into existing products in a manner that discourages users from purchasing our products. Based in part on these competitive pressures, we may lower prices or attempt to add incremental features and functionality.

Conditions in our markets could change rapidly and significantly as a result of technological advancements or continuing market consolidation. The development and market acceptance of alternative technologies could decrease the demand for our products or render them obsolete. Our competitors may introduce products that are less costly, provide superior performance or achieve greater market acceptance than our products. In addition, our larger competitors often have broader product lines and market focus, are in a better position to withstand any significant reduction in capital spending by end-customers in these markets, and will therefore not be as susceptible to downturns in a particular market. The above competitive pressures are likely to continue to impact our business. We may not be able to compete successfully in the future, and competition may harm our business.

Employees

As of December 31, 2012, our total headcount was 1,954 people including contractors. We had 599 in research and development, 701 in sales and marketing, 483 in services and support, 39 in manufacturing operations, and 132 in a general and administrative capacity. As of December 31, 2012, our headcount was 469 people in the United States, 648 in Canada, 212 in China, 104 in France, and 521 in other countries.

None of our U.S. employees are represented by a labor union with respect to his or her employment with us; however, our employees in France, Spain and Italy are represented by collective bargaining agreements. We have not experienced any work stoppages, and we consider our relations with our employees to be good.

Available Information


8

Table of Contents

Our web site is located at www.fortinet.com, and our investor relations web site is located at http://investor.fortinet.com. The information posted on our website is not incorporated by reference into this Annual Report on Form 10-K. Our Annual Report on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K and amendments to reports filed or furnished pursuant to Sections 13(a) and 15(d) of the Securities Act, are available free of charge on our investor relations web site as soon as reasonably practicable after we electronically file such material with, or furnish it to, the SEC. You may also access all of our public filings through the SEC’s website at www.sec.gov. Further, a copy of this Annual Report on Form 10-K is located at the SEC’s Public Reference Room at 100 F Street, NE, Washington, D.C. 20549. Information on the operation of the Public Reference Room can be obtained by calling the SEC at 1-800-SEC-0330.

We webcast our earnings calls and certain events we participate in or host with members of the investment community on our investor relations web site. Additionally, we provide notifications of news or announcements regarding our financial performance, including SEC filings, investor events, press and earnings releases, as part of our investor relations web site. The contents of these web sites are not intended to be incorporated by reference into this report or in any other report or document we file.

ITEM 1A.     Risk Factors

Investing in our common stock involves a high degree of risk. You should carefully consider the following risks and all other information contained in this Annual Report on Form 10-K, including our consolidated financial statements and the related notes, before investing in our common stock. The risks and uncertainties described below are not the only ones we face. Additional risks and uncertainties that we are unaware of, or that we currently believe are not material, also may become important factors that affect us. If any of the following risks materialize, our business, financial condition and results of operations could be materially harmed. In that case, the trading price of our common stock could decline, and you may lose some or all of your investment.

Risks Related to Our Business

Our quarterly operating results are likely to vary significantly and be unpredictable.
 
Our operating results have historically varied from period to period, and we expect that they will continue to do so as a result of a number of factors, many of which are outside of our control and may be difficult to predict, including:
 
the level of demand for our products and services;
 
the timing of channel partner and end-customer orders;
 
the timing of shipments, which may depend on many factors such as inventory levels and logistics, our ability to ship new products on schedule and to accurately forecast inventory requirements, and potential delays in the manufacturing process;

inventory imbalances, such as those related to new products and the end of life of existing products;
 
the mix of products sold, the mix of revenue between products and services and the degree to which products and services are bundled and sold together for a package price;

the budgeting cycles and purchasing practices of our channel partners and end-customers;
 
seasonal buying patterns of our end-customers;
 
the timing of revenue recognition for our sales, which may be affected by both the mix of sales by our “sell-in” versus our “sell-through” channel partners, and by the extent to which we bring on new distributors;
 
the accuracy and timing of point of sale reporting by our sell-through distributors, which impacts our ability to recognize revenue;
 
the level of perceived threats to network security, which may fluctuate from period to period;
 
changes in end-customer, distributor or reseller requirements or market needs;
 

9

Table of Contents

changes in the growth rate of the network security or UTM markets;
 
the timing and success of new product and service introductions by us or our competitors or any other change in the competitive landscape of our industry, including consolidation among our competitors or end-customers;
 
deferral of orders from end-customers in anticipation of new products or product enhancements announced by us or our competitors;
 
increases or decreases in our expenses caused by fluctuations in foreign currency exchange rates, as a significant portion of our expenses are incurred and paid in currencies other than the U.S. dollar;
 
decisions by potential end-customers to purchase network security solutions from larger, more established security vendors or from their primary network equipment vendors;
 
price competition, and increased competitiveness in general in our market;
 
changes in customer renewal rates for our services;
 
changes in the payment terms of services contracts or the length of services contracts sold;

increased expenses and any impact on results of operations from any acquisition consummated;
 
insolvency or credit difficulties confronting our customers, affecting their ability to purchase or pay for our products and services;
 
disruptions in our channel or termination of our relationship with important channel partners;
 
insolvency or credit difficulties confronting our key suppliers, which could disrupt our supply chain;
 
general economic conditions, both in our domestic and foreign markets; and
 
future accounting pronouncements or changes in our accounting policies.

Any one of the factors above or the cumulative effect of some of the factors referred to above may result in significant fluctuations in our quarterly financial and other operating results, including fluctuations in our key metrics. This variability and unpredictability could result in our failing to meet our internal operating plan or the expectations of securities analysts or investors for any period. If we fail to meet or exceed such expectations for these or any other reasons, the market price of our shares could fall substantially and we could face costly lawsuits, including securities class action suits. In addition, a significant percentage of our operating expenses are fixed in nature and based on forecasted revenue trends. Accordingly, in the event of revenue shortfalls, we are generally unable to mitigate the negative impact on margins in the short term.

Our billings and revenue growth may slow or may not continue.
 
Billings and revenue growth may slow or decline for a number of reasons, including a slowdown in demand for our products or services, an increase in competition, a decrease in the growth of our overall market, softness in demand in certain geographies, or if we fail for any reason to continue to capitalize on growth opportunities. We may not be able to sustain profitability in future periods if we fail to increase billings, revenue or deferred revenue, do not appropriately manage our cost structure, or encounter unanticipated liabilities. Any failure by us to maintain profitability and continue our billings and revenue growth could cause the price of our common stock to materially decline.
 
Reliance on a concentration of shipments at the end of the quarter could cause our revenue to fall below expected levels.
 
As a result of customer-buying patterns and the efforts of our sales force and channel partners to meet or exceed quarterly quotas, we have historically received a substantial portion of each quarter’s sales orders and generated a substantial portion of each quarter’s revenue during the last two weeks of the quarter. For example, on average over the past eight quarters, our shipments during the last two weeks of each quarter accounted for approximately 35% of aggregate billings for each quarter. If expected revenue at the end of any quarter is delayed for any reason, including the failure of anticipated purchase orders to materialize, our logistics partners’ inability to ship products prior to quarter-end to fulfill purchase orders received

10

Table of Contents

near the end of the quarter, our failure to manage inventory to meet demand, our inability to release new products on schedule, any failure of our systems related to order review and processing, or any delays in shipments based on trade compliance requirements, our revenue for that quarter could fall below our expectations or those of securities analysts and investors, resulting in a decline in our stock price.

We rely significantly on revenue from subscription and support services which may decline, and because we recognize revenue from subscription and support services over the term of the relevant service period, downturns or upturns in sales of subscription and support services are not immediately reflected in full in our operating results.

Our subscription and support services revenue has historically accounted for a significant percentage of our total revenue. Sales of new or renewal subscription and support services contracts may decline and fluctuate as a result of a number of factors, including end-customers’ level of satisfaction with our products and services, the prices of our products and services, the prices of products and services offered by our competitors or reductions in our customers’ spending levels. If our sales of new or renewal subscription and support services contracts decline, our revenue and revenue growth may decline and our business will suffer. In addition, in the event significant customers require payment terms for subscription or support services in arrears or for shorter periods of time than annually, such as monthly or quarterly, this may negatively impact subscription and support billing. Furthermore, we recognize subscription and support services revenue monthly over the term of the relevant service period, which is typically one year but has been as long as five years. As a result, much of the subscription and support services revenue we report each quarter is the recognition of deferred revenue from subscription and support services contracts entered into during previous quarters. Consequently, a decline in new or renewed subscription or support services contracts in any one quarter will not be fully reflected in revenue in that quarter but will negatively affect our revenue in future quarters. Accordingly, the effect of significant downturns in new or renewed sales of our subscriptions or support services is not reflected in full in our statements of operations until future periods. Our subscription and support services revenue also makes it difficult for us to rapidly increase our revenue through additional service sales in any period, as revenue from new and renewal services contracts must be recognized over the applicable service period.

Managing inventory of our products and product components is complex. Insufficient inventory may result in lost sales opportunities or delayed revenue, while excess inventory may harm our gross margins.

Managing our inventory is complex. Our channel partners may increase orders during periods of product shortages, cancel orders if their inventory is too high, return products or take advantage of price protection (if any is available to the particular partner), or delay orders in anticipation of new products. They also may adjust their orders in response to the supply of our products and the products of our competitors that are available to them and in response to seasonal fluctuations in end-customer demand. Furthermore, if the time required to manufacture certain products or ship products increases for any reason, this could result in inventory shortfalls. Management of our inventory is further complicated by the significant number of different products and models that we sell.
 
In addition, for those channel partners that have rights of return, inventory held by such channel partners affects our results of operations. Our inventory management systems and related supply chain visibility tools may be inadequate to enable us to effectively manage inventory. Inventory management remains an area of focus as we balance the need to maintain inventory levels that are sufficient to ensure competitive lead times against the risk of inventory obsolescence because of rapidly changing technology and customer requirements. If we ultimately determine that we have excess inventory, we may have to reduce our prices and write-down inventory, which in turn could result in lower gross margins. Alternatively, insufficient inventory levels may lead to shortages that result in delayed revenue or loss of sales opportunities altogether as potential end-customers turn to competitors’ products that are readily available. For example, we have experienced inventory shortages in the past, for instance, based on more demand for certain products than we had forecasted. If we are unable to effectively manage our inventory and that of our channel partners, our results of operations could be adversely affected.
 
We rely on third-party channel partners to generate substantially all of our revenue. If our partners fail to perform, our ability to sell our products and services will be limited, and if we fail to optimize our channel partner model going forward, our operating results will be harmed.
 
Substantially all of our revenue is generated through sales by our channel partners, which include distributors and resellers. We depend upon our channel partners to generate sales opportunities and manage the sales process. To the extent our channel partners are unsuccessful in selling our products, or we are unable to enter into arrangements with, and retain, a sufficient number of high quality channel partners in each of the regions in which we sell products, and keep them motivated to sell our products, our ability to sell our products and operating results will be harmed. The termination of our relationship with any significant channel partner may adversely impact our sales and operating results.
 

11

Table of Contents

We provide sales channel partners with specific programs to assist them in selling our products, but there can be no assurance that these programs will be effective. In addition, our channel partners may be unsuccessful in marketing, selling and supporting our products and services. Our channel partners generally do not have minimum purchase requirements. They may also market, sell and support products and services that are competitive with ours, and may devote more resources to the marketing, sales and support of such products. They may also have incentives to promote our competitors’ products to the detriment of our own. They may cease selling our products altogether. We cannot assure you that we will retain these channel partners or that we will be able to secure additional or replacement partners or that existing channel partners will continue to perform. The loss of one or more of our significant channel partners or the failure to obtain and ship a number of large orders each quarter through them could harm our operating results. In addition, any new sales channel partner will require extensive training and may take several months or more to achieve productivity. Our channel partner sales structure could subject us to lawsuits, potential liability and reputational harm if, for example, any of our channel partners misrepresent the functionality of our products or services to end-customers or our channel partners violate laws or our corporate policies. If we fail to optimize our channel partner model or fail to manage existing sales channels, our business will be seriously harmed.
 
If we are not successful in continuing to execute our strategy to increase our sales to larger end-customers, our results of operations may suffer.
 
An important part of our growth strategy is to increase sales of our products to large enterprises, service providers and governmental entities. Sales to enterprises, service providers and governmental entities involve risks that may not be present (or that are present to a lesser extent) with sales to small-to-mid-sized entities. These risks include:
 
increased competition from competitors, such as Cisco, Check Point, McAfee (acquired by Intel), Palo Alto Networks, and Juniper, that traditionally target enterprises, service providers and governmental entities and that may already have purchase commitments from those end-customers;
 
increased purchasing power and leverage held by large end-customers in negotiating contractual arrangements;
 
more stringent requirements in our support service contracts, including stricter support response times, and increased penalties for any failure to meet support requirements; and

longer sales cycles and the associated risk that substantial time and resources may be spent on a potential end-customer that elects not to purchase our products and services.
 
Large enterprises, service providers and governmental entities often undertake a significant evaluation process that results in a lengthy sales cycle, in some cases over 12 months. Although we have a channel sales model, our sales representatives typically engage in direct interaction with our distributors and resellers in connection with sales to larger end-customers. Due to the lengthy nature, the size and scope, and stringent requirements of these evaluations, we typically provide evaluation products to these customers. We may spend substantial time, effort and money in our sales efforts without being successful in producing any sales. If we are unsuccessful in converting these evaluations into sales, we may experience an increased inventory of used products and potentially increased write-offs. In addition, product purchases by enterprises, service providers and governmental entities are frequently subject to budget constraints, multiple approvals, and unplanned administrative, processing and other delays. Finally, enterprises, service providers and governmental entities typically have longer implementation cycles, require greater product functionality and scalability and a broader range of services, including design services, demand that vendors take on a larger share of risks, sometimes require acceptance provisions that can lead to a delay in revenue recognition, and expect greater payment flexibility from vendors. All these factors can add further risk to business conducted with these customers. If sales expected from a large end-customer for a particular quarter are not realized in that quarter or at all, our business, operating results and financial condition could be materially and adversely affected.
 
The average sales prices of our products may decrease, which may reduce our gross profits and adversely impact our financial results and the trading price of our common stock.
 
The average sales prices for our products may decline for a variety of reasons, including competitive pricing pressures, discounts we offer, a change in our mix of products, anticipation of the introduction of new products or promotional programs. Competition continues to increase in the market segments in which we participate, and we expect competition to further increase in the future, thereby leading to increased pricing pressures. Larger competitors with more diverse product offerings may reduce the price of products that compete with ours in order to promote the sale of other products or may bundle them with other products. Additionally, although we price our products and services worldwide in U.S. dollars, currency fluctuations in certain countries and regions may negatively impact actual prices that partners and customers are willing to pay in those

12

Table of Contents

countries and regions. Furthermore, we anticipate that the average sales prices and gross profits for our products will decrease over product life cycles. We cannot assure you that we will be successful in developing and introducing new offerings with enhanced functionality on a timely basis, or that our product offerings, if introduced, will enable us to maintain our prices and gross profits at levels that will allow us to maintain profitability.
 
Actual, possible or perceived defects or vulnerabilities in our products or services, the failure of our products or services to prevent a virus or security breach, or misuse of our products could harm our reputation and divert resources.
 
Because our products and services are complex, they have contained and may contain defects or errors that are not detected until after their commercial release and deployment by our customers. Defects or vulnerabilities may impede or block network traffic or cause our products or services to be vulnerable to electronic break-ins or cause them to fail to help secure networks. Because the techniques used by computer hackers to access or sabotage networks change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques. In addition, defects or errors in our FortiGuard subscription updates or our FortiGate appliances could result in a failure of our FortiGuard services to effectively update end-customers’ FortiGate appliances and thereby leave customers vulnerable to attacks. Furthermore, our solutions may also fail to detect or prevent viruses, worms or similar threats due to a number of reasons such as the evolving nature of such threats and the continual emergence of new threats that we may fail to add to our FortiGuard databases in time to protect our end-customers’ networks. Our FortiGuard or FortiCare data centers and networks may also experience technical failures and downtime, and may fail to distribute appropriate updates, or fail to meet the increased requirements of a growing customer base. Any such technical failure, downtime, or failures in general may temporarily or permanently expose our end-customers’ networks, leaving their networks unprotected against the latest security threats.
 
An actual, possible or perceived security breach or infection of the network of one of our end-customers, regardless of whether the breach is attributable to the failure of our products or services to prevent the security breach, could adversely affect the market’s perception of our security products and services. We may not be able to correct any security flaws or vulnerabilities promptly, or at all. Our products may also be misused by end-customers or third parties who obtain access to our products. For example, our products could be used to censor private access to certain information on the Internet. Such use of our products for censorship could result in negative press coverage and negatively affect our reputation, even if we take reasonable measures to prevent any improper shipment of our products or if our products are provided by an unauthorized third-party. Any actual, possible, or perceived defects, errors or vulnerabilities in our products, or misuse of our products, could result in:
 
expenditure of significant financial and product development resources in efforts to analyze, correct, eliminate or work-around errors or defects or to address and eliminate vulnerabilities;
 
loss of existing or potential end-customers or channel partners;
 
delayed or lost revenue;
 
delay or failure to attain market acceptance;
 
negative publicity, which will harm our reputation; and
 
litigation, regulatory inquiries or investigations that may be costly and harm our reputation.
 
Our business and operations have experienced significant growth, and if we do not appropriately manage any future growth, or are unable to improve our systems and processes, our operating results will be negatively affected.
 
We have a high volume business that has grown over the last several years. We rely heavily on information technology systems to help manage critical functions such as order processing, revenue recognition, financial forecasts, inventory and supply chain management and trade compliance reviews. However, we have been slow to adopt and implement certain automated functions, like Electronic Data Interchange, which could have a negative impact on our business. For example, a large part of our order processing relies on the manual processing of emails internally and from our customers. Combined with the fact that we may receive a majority of our orders in the last few weeks of any given quarter, a significant interruption in our email service or other systems could result in delayed order fulfillment and decreased revenue for that quarter. To manage any future growth effectively, we must continue to improve and expand our information technology and financial infrastructure, operating and administrative systems and controls, and continue to manage headcount, capital and processes in an efficient manner. We may not be able to successfully implement improvements to these systems and processes in a timely or efficient manner. For example, we are in the early stages of considering upgrading our enterprise resource planning system and any such

13

Table of Contents

change may cause disruption and additional cost. In addition, our systems and processes may not prevent or detect all errors, omissions or fraud. Our failure to improve our systems and processes, or their failure to operate in the intended manner, may result in our inability to manage the growth of our business and to accurately forecast our revenue, expenses and earnings, or to prevent certain losses. Our productivity and the quality of our products and services may be adversely affected if we do not integrate and train our new employees quickly and effectively. Any future growth would add complexity to our organization and require effective coordination throughout our organization. Failure to manage any future growth effectively could result in increased costs and harm our results of operations.
 
If our estimates or judgments relating to our critical accounting policies are based on assumptions that change or prove to be incorrect, our operating results could fall below expectations of securities analysts and investors, resulting in a decline in our stock price.
 
The preparation of financial statements in conformity with generally accepted accounting principles requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances, as provided in “Management’s Discussion and Analysis of Financial Condition and Results of Operations” in this Annual Report on Form 10-K, the results of which form the basis for making judgments about the carrying values of assets and liabilities that are not readily apparent from other sources. Our operating results may be adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions, which could cause our operating results to fall below the expectations of securities analysts and investors, resulting in a decline in our stock price. Significant assumptions and estimates used in preparing our consolidated financial statements include those related to revenue recognition, stock-based compensation expense, valuation of inventory, warranty liabilities, and accounting for income taxes.

We offer retroactive price protection to certain of our major distributors, and if we fail to balance their inventory with end-customer demand for our products, our allowance for price protection may be inadequate, which could adversely affect our results of operations.

We provide certain of our major distributors with price protection rights for inventories of our products held by them. If we reduce the list price of our products, certain distributors receive refunds or credits from us that reduce the price of such products held in their inventory based upon the new list price. Future credits for price protection will depend on the percentage of our price reductions for the products in inventory and our ability to manage the levels of our major distributors’ inventories. If future price protection adjustments are higher than expected, our future results of operations could be materially and adversely affected.
 
If we are unable to hire, retain and motivate qualified personnel, our business will suffer.
 
Our future success depends, in part, on our ability to continue to attract and retain highly skilled personnel. The loss of the services of any of our key personnel, the inability to attract or retain qualified personnel, or delays in hiring required personnel, particularly in engineering and sales, may seriously harm our business, financial condition and results of operations. From time to time, we have experienced turnover in our management-level personnel, including the recent resignation of our Vice President of Sales for Americas. None of our key employees has an employment agreement for a specific term, and any of our employees may terminate their employment at any time. Our ability to continue to attract and retain highly skilled personnel will be critical to our future success. Competition for highly-skilled personnel is frequently intense, especially in the locations where we have a substantial presence and need for highly-skilled personnel: the San Francisco Bay Area, Vancouver, Canada and Beijing, China. We may not be successful in attracting, assimilating or retaining qualified personnel to fulfill our current or future needs. Also, to the extent we hire personnel from competitors, we may be subject to allegations that they have been improperly solicited or divulged proprietary or other confidential information.
 
We are dependent on the continued services and performance of our senior management, the loss of any of whom could adversely affect our business, operating results and financial condition.
 
Our future performance depends on the continued services and continuing contributions of our senior management to execute on our business plan, and to identify and pursue new opportunities and product innovations. Ken Goldman, our former Vice President and Chief Financial Officer, resigned from his position in October 2012. The loss of services of other members of senior management, particularly Ken Xie, our Co-founder, President and Chief Executive Officer and Michael Xie, our Co-founder, Vice President of Engineering and Chief Technology Officer, and any of our senior sales leaders, could significantly delay or prevent the achievement of our development and strategic objectives. In addition, key personnel may be distracted by activities unrelated to our business. The loss of the services, or distraction, of our senior management for any reason could adversely affect our business, financial condition and results of operations.

14

Table of Contents


Adverse economic conditions or reduced information technology spending may adversely impact our business.
 
Our business depends on the overall demand for information technology and on the economic health of our current and prospective customers. In addition, the purchase of our products is often discretionary and may involve a significant commitment of capital and other resources. Weak global economic conditions, weak economic conditions in certain geographies, or a reduction in information technology spending regardless of macro-economic conditions, could adversely impact our business, financial condition and results of operations in a number of ways, including longer sales cycles, lower prices for our products and services, higher default rates among our distributors, reduced unit sales and lower or no growth.

Because we depend on several third-party manufacturers to build our products, we are susceptible to manufacturing delays that could prevent us from shipping customer orders on time, if at all, and may result in the loss of sales and customers, and third-party manufacturing cost increases could result in lower gross margins.

We outsource the manufacturing of our security appliance products to a variety of contract manufacturing partners and original design manufacturing partners.
 
Our reliance on our third-party manufacturers reduces our control over the manufacturing process, exposing us to risks, including reduced control over quality assurance, product costs and product supply and timing. Any manufacturing disruption by our third-party manufacturers could impair our ability to fulfill orders. If we are unable to manage our relationships with these third-party manufacturers effectively, or if these third-party manufacturers experience delays, increased manufacturing lead-times, disruptions, capacity constraints or quality control problems in their manufacturing operations, or fail to meet our future requirements for timely delivery, our ability to ship products to our customers could be impaired and our business would be seriously harmed.
 
These manufacturers fulfill our supply requirements on the basis of individual purchase orders. We have no long-term contracts or arrangements with certain of our third-party manufacturers that guarantee capacity, the continuation of particular payment terms or the extension of credit limits. Accordingly, they are not obligated to continue to fulfill our supply requirements, and the prices we are charged for manufacturing services could be increased on short notice. If we are required to change third-party manufacturers, our ability to meet our scheduled product deliveries to our customers would be adversely affected, which could cause the loss of sales and existing or potential customers, delayed revenue or an increase in our costs which could adversely affect our gross margins. Our individual product lines are generally manufactured by only one manufacturing partner. Any production interruptions for any reason, such as a natural disaster, epidemic, capacity shortages, or quality problems, at one of our manufacturing partners would severely affect sales of our product lines manufactured by that manufacturing partner. Furthermore manufacturing cost increases for any reason could result in lower gross margins.
 
Our proprietary FortiASIC, which is the key to the performance of our appliances, is fabricated by contract manufacturers in foundries operated by UMC and TSMC. Faraday Technology Corporation (using UMC’s foundry), K-Micro (using TSMC’s foundry) and Renesas (using UMC’s foundry) manufacture our ASICs on a purchase order basis, and these foundries do not guarantee any capacity and could reject orders from Faraday, K-Micro or Renesas or try to increase pricing. Accordingly, the foundries are not obligated to continue to fulfill our supply requirements, and due to the long lead time that a new foundry would require, we could suffer temporary or long term inventory shortages of our FortiASIC as well as increased costs. Our suppliers may also prioritize orders by other companies that order higher volumes of products. If any of these suppliers materially delays its supply of ASICs or specific product models to us, or requires us to find an alternate supplier and we are not able to do so on a timely and reasonable basis, or if these foundries materially increase their prices for fabrication of our ASICs or specific product models, our business would be harmed.
 
In addition, our reliance on third-party manufacturers and foundries limits our control over environmental regulatory requirements such as the hazardous substance content of our products and therefore our ability to ensure compliance with the European Union’s (“EU”) Restriction of Hazardous Substances Directive (“RoHS”) and other similar laws. It also exposes us to the risk that certain minerals and metals that originated in the Democratic Republic of Congo or an adjoining country, known as “conflict minerals,” are contained within our products.  Under the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, the SEC adopted new disclosure requirements for public companies using conflict minerals in their products. Under these rules, we are required to perform due diligence, disclose and report our efforts to prevent the sourcing of such conflict minerals. As a result of these new rules, we expect to incur additional costs to comply with the disclosure requirements, including costs related to determining the source of any of the conflict minerals that may be used in our products.  Moreover, the implementation of these new requirements could adversely affect the sourcing, availability, and pricing of materials used in the manufacture of our products.


15

Table of Contents

Because some of the key components in our products come from limited sources of supply, we are susceptible to supply shortages, long lead times for components, and supply changes, each of which could disrupt or delay our scheduled product deliveries to our customers, result in inventory shortage, and may result in the loss of sales and customers, and increased component costs may result in lower gross margins.
 
We and our contract manufacturers currently purchase several key parts and components used in the manufacture of our products from limited sources of supply. We are therefore subject to the risk of shortages and long lead times in the supply of these components and the risk that component suppliers discontinue or modify components used in our products. We have in the past experienced, and are currently experiencing, shortages and long lead times for certain components. Certain of our limited source components for particular appliances and suppliers of those components include: specific types of central processing units from Intel, Advanced Micro Devices, Inc., RMI/Netlogic Corporation and VIA Technologies, Inc., network chips from Broadcom, Marvell and Intel, and hard drives from Western Digital Technologies, Inc. The introduction by component suppliers of new versions of their products, particularly if not anticipated by us or our contract manufacturers, could require us to expend significant resources to incorporate these new components into our products. In addition, if these suppliers were to discontinue production of a necessary part or component, we would be required to expend significant resources and time in locating and integrating replacement parts or components from another vendor. Qualifying additional suppliers for limited source parts or components can be time-consuming and expensive.
 
Our manufacturing partners have experienced long lead times for the purchase of components incorporated into our products. Lead times for components may be adversely impacted by factors outside of our control, such as natural disasters and other factors. Our reliance on a limited number of suppliers involves several additional risks, including:

a potential inability to obtain an adequate supply of required parts or components when required;
 
financial or other difficulties faced by our suppliers;
 
infringement or misappropriation of our intellectual property;
 
price increases;
 
failure of a component to meet environmental or other regulatory requirements;
 
failure to meet delivery obligations in a timely fashion; and
 
failure in component quality.
 
The occurrence of any of these would be disruptive to us and could seriously harm our business. Any interruption or delay in the supply of any of these parts or components, or the inability to obtain these parts or components from alternate sources at acceptable prices and within a reasonable amount of time, would harm our ability to meet our scheduled product deliveries to our distributors, resellers and end-customers. This could harm our relationships with our channel partners and end-customers and could cause delays in shipment of our products and adversely affect our results of operations. In addition, increased component costs could result in lower gross margins.
 
We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and results of operations.
 
A majority of our operating expenses is incurred outside the United States. These expenses are denominated in foreign currencies and are subject to fluctuations due to changes in foreign currency exchange rates, particularly changes in the Euro and Canadian dollar (“CAD”) . For example, during the second and third quarters of 2011, we were affected by the weakening of the U.S. dollar against the CAD and the Euro (“EUR”), which caused our operating expenses to increase. Although we have been hedging currency exposures relating to certain balance sheet accounts and have periodically entered into cash flow hedges relating to certain operating expenses incurred outside of the United States, if we stop hedging against any of these risks or if our attempts to hedge against these currency exposures are not successful, our financial condition and results of operations could be adversely affected. In addition, our sales contracts are primarily denominated in U.S. dollars and therefore substantially all of our revenue is not subject to foreign currency risk. However, a strengthening of the U.S. dollar could increase the real cost of our products to our customers outside of the United States, which could also adversely affect our financial condition and results of operations. 


16

Table of Contents

We generate a majority of revenue from sales to distributors, resellers and end-customers outside of the United States, and we are therefore subject to a number of risks associated with international sales and operations.
 
We market and sell our products throughout the world and have established sales offices in many parts of the world. Therefore, we are subject to risks associated with having worldwide operations. We are also subject to a number of risks typically associated with international sales and operations, including:
 
economic or political instability in foreign markets;
 
greater difficulty in enforcing contracts, accounts receivable collection and longer collection periods;
 
changes in regulatory requirements;
 
difficulties and costs of staffing and managing foreign operations;
 
the uncertainty of protection for intellectual property rights in some countries;
 
costs of compliance with foreign policies, laws and regulations and the risks and costs of non-compliance with such policies, laws and regulations;
 
costs of complying with U.S. laws and regulations for foreign operations, including the Foreign Corrupt Practices Act, import and export control laws, tariffs, trade barriers, and economic sanctions;
 
other regulatory or contractual limitations on our ability to sell our products in certain foreign markets, and the risks and costs of non-compliance;
 
heightened risks of unfair or corrupt business practices in certain geographies and of improper or fraudulent sales arrangements that may impact financial results and result in restatements of financial statements and irregularities in financial statements;
 
the potential for political unrest, terrorism, hostilities or war;
 
management communication and integration problems resulting from cultural differences and geographic dispersion; and
 
multiple and possibly overlapping tax structures.
 
Product and service sales may be subject to foreign governmental regulations, which vary substantially from country to country. Further, we may be unable to keep up-to-date with changes in government requirements as they change from time to time. Failure to comply with these regulations could result in adverse effects to our business. In many foreign countries it is common for others to engage in business practices that are prohibited by our internal policies and procedures or U.S. regulations applicable to us. Although we implemented policies and procedures designed to ensure compliance with these laws and policies, there can be no assurance that all of our employees, contractors, channel partners and agents will comply with these laws and policies. Violations of laws or key control policies by our employees, contractors, channel partners or agents could result in delays in revenue recognition, financial reporting misstatements, fines, penalties, or the prohibition of the importation or exportation of our products and services and could have a material adverse effect on our business and results of operations.
 
We are subject to governmental export and import controls that could subject us to liability or impair our ability to compete in international markets.
 
Because we incorporate encryption technology into our products, certain of our products are subject to U.S. export controls and may be exported outside the U.S. only with the required export license or through an export license exception. If we were to fail to comply with U.S. export licensing, U.S. Customs regulations and import regulations, U.S. economic sanctions and other countries’ import and export laws, we could be subject to substantial civil and criminal penalties, including fines for the company and incarceration for responsible employees and managers, and the possible loss of export or import privileges. In addition, if our channel partners fail to obtain appropriate import, export or re-export licenses or permits, we may also be adversely affected through reputational harm and penalties. Obtaining the necessary export license for a particular sale may be time-consuming and may result in the delay or loss of sales opportunities.

17

Table of Contents

 
Furthermore, U.S. export control laws and economic sanctions prohibit the shipment of certain products to U.S. embargoed or sanctioned countries, governments and persons. Even though we take precautions to prevent our product from being shipped to U.S. sanctions targets, our products could be shipped to those targets by our channel partners, despite such precautions. Any such shipment could have negative consequences including government investigations and penalties and reputational harm. In addition, various countries regulate the import of certain encryption technology, including import permitting/licensing requirements, and have enacted laws that could limit our ability to distribute our products or could limit our customers’ ability to implement our products in those countries. Changes in our products or changes in export and import regulations may create delays in the introduction of our products in international markets, prevent our customers with international operations from deploying our products globally or, in some cases, prevent the export or import of our products to certain countries, governments or persons altogether. Any change in export or import regulations, economic sanctions or related legislation, shift in the enforcement or scope of existing regulations, or change in the countries, governments, persons or technologies targeted by such regulations, could result in decreased use of our products by, or in our decreased ability to export or sell our products to, existing or potential customers with international operations. Any decreased use of our products or limitation on our ability to export or sell our products would likely adversely affect our business, financial condition and results of operations.
 
If we fail to comply with environmental requirements, our business, financial condition, operating results and reputation could be adversely affected.
 
We are subject to various environmental laws and regulations including laws governing the hazardous material content of our products and laws relating to the recycling of electrical and electronic equipment. The laws and regulations to which we are subject include the EU, RoHS and the EU Waste Electrical and Electronic Equipment Directive (“WEEE Directive”) as well as the implementing legislation of the EU member states. Similar laws and regulations have been passed or are pending in China, South Korea, Norway and Japan and may be enacted in other regions, including in the United States, and we are, or may in the future be, subject to these laws and regulations.
 
The EU RoHS and the similar laws of other jurisdictions ban the use of certain hazardous materials such as lead, mercury and cadmium in the manufacture of electrical equipment, including our products. We have incurred costs to comply with these laws, including research and development costs, costs associated with assuring the supply of compliant components and costs associated with writing off noncompliant inventory. We expect to incur more of these costs in the future. With respect to the EU RoHS, we and our competitors rely on an exemption for lead in network infrastructure equipment. It is possible this exemption will be revoked in the near future. If this exemption is revoked, if there are other changes to these laws (or their interpretation) or if new similar laws are passed in other jurisdictions, we may be required to reengineer our products to use components compatible with these regulations. This reengineering and component substitution could result in additional costs to us or disrupt our operations or logistics.
 
The EU has also adopted the WEEE Directive, which requires electronic goods producers to be responsible for the collection, recycling and treatment of such products. Although currently our EU international channel partners are responsible for the requirements of this directive as the importer of record in most of the European countries in which we sell our products, changes in interpretation of the regulations may cause us to incur costs or have additional regulatory requirements in the future to meet in order to comply with this directive, or with any similar laws adopted in other jurisdictions.
 
Our failure to comply with these and future environmental rules and regulations could result in reduced sales of our products, increased costs, substantial product inventory write-offs, reputational damage, penalties and other sanctions.
 
A portion of our revenue is generated by sales to governmental entities, which are subject to a number of challenges and risks.
 
Sales to U.S. and foreign federal, state and local governmental agency end-customers have accounted for a portion of our revenue in past periods, and we may in the future increase sales to governmental entities. Sales to governmental entities are subject to a number of risks. Selling to governmental entities can be highly competitive, expensive and time consuming, often requiring significant upfront time and expense without any assurance that we will win a sale.

Government demand, sales, and payment for our products and services may be negatively impacted by numerous factors and requirements unique to selling to government agencies, such as:

public sector budgetary cycles,


18

Table of Contents

funding authorizations and requirements unique to government agencies, with funding or purchasing reductions or delays adversely affecting public sector demand for our products,

geopolitical matters, and

rules and regulations applicable to certain government sales.

The rules and regulations applicable to government sales may also negatively impact sales to non-governmental entities. To date we have had limited traction in sales to U.S. federal government agencies, and any future sales to governmental entities is uncertain. All of our sales to governmental entities have been made indirectly through our distribution channel. Governmental entities may have contractual or other legal rights to terminate contracts with our distributors and resellers for convenience or due to a default, and any such termination may adversely impact our future results of operations. For example, if the distributor receives a significant portion of its revenue from sales to such governmental entity, the financial health of the distributor could be substantially harmed, which could negatively affect our future sales to such distributor. Governments routinely investigate and audit government contractors’ administrative processes, and any unfavorable audit could result in the government refusing to continue buying our products and services, a reduction of revenue or fines or civil or criminal liability if the audit uncovers improper or illegal activities. Any such penalties could adversely impact our results of operations in a material way. Finally, purchases by the U.S. government may require certain products to be manufactured in the United States and other high cost manufacturing locations, and we may not manufacture all products in locations that meet the requirements of the U.S. government.
 
False detection of viruses or security breaches or false identification of spam or spyware could adversely affect our business.
 
Our antivirus and our intrusion prevention services may falsely detect viruses or other threats that do not actually exist. This risk is heightened by the inclusion of a “heuristics” feature in our products, which attempts to identify viruses and other threats not based on any known signatures but based on characteristics or anomalies that may indicate that a particular item is a threat. When our end-customers enable the heuristics feature in our products, the risk of falsely identifying viruses and other threats significantly increases. These false positives, while typical in the industry, may impair the perceived reliability of our products and may therefore adversely impact market acceptance of our products. Also, our anti-spam and antispyware services may falsely identify emails or programs as unwanted spam or potentially unwanted programs, or alternatively fail to properly identify unwanted emails or programs, particularly as spam emails or spyware are often designed to circumvent anti-spam or spyware products. Parties whose emails or programs are blocked by our products may seek redress against us for labeling them as spammers or spyware, or for interfering with their business. In addition, false identification of emails or programs as unwanted spam or potentially unwanted programs may reduce the adoption of our products. If our system restricts important files or applications based on falsely identifying them as malware or some other item that should be restricted, this could adversely affect end-customers’ systems and cause material system failures. Any such false identification of important files or applications could result in negative publicity, loss of end-customers and sales, increased costs to remedy any problem, and costly litigation.
 
If our internal network system is compromised by computer hackers, public perception of our products and services will be harmed.
 
We will not succeed unless the marketplace is confident that we provide effective network security protection. Because we provide network security products, we may be a more attractive target for attacks by computer hackers. Although we have not experienced significant damages from unauthorized access by a third party of our internal network, if an actual or perceived breach of network security occurs in our internal systems it could adversely affect the market perception of our products and services. In addition, such a security breach could impair our ability to operate our business, including our ability to provide subscription and support services to our end-customers. If this happens, our revenue could decline and our business could suffer.
 
Our ability to sell our products is dependent on the quality of our technical support services, and our failure to offer high quality technical support services would have a material adverse effect on our sales and results of operations.
 
Once our products are deployed within our end-customers’ networks, our end-customers depend on our technical support services, as well as the support of our channel partners, to resolve any issues relating to our products. If we or our channel partners do not effectively assist our customers in deploying our products, succeed in helping our customers quickly resolve post-deployment issues, and provide effective ongoing support, our ability to sell additional products and services to existing customers would be adversely affected and our reputation with potential customers could be damaged. Many enterprise, service provider and governmental entity end-customers require higher levels of support than smaller end-

19

Table of Contents

customers. If we fail to meet the requirements of the larger end-customers, it may be more difficult to execute on our strategy to increase our penetration with larger end-customers.
 
As a result, our failure to maintain high quality support services would have a material adverse effect on our business, financial condition and results of operations.
 
Changes in our provision for income taxes or adverse outcomes resulting from examination of our income tax returns could adversely affect our results.
 
Our provision for income taxes is subject to volatility and could be adversely affected by several factors, many of which are outside of our control, including:
 
earnings being lower than anticipated in countries that have lower tax rates and higher than anticipated in countries that have higher tax rates;
 
changes in the valuation of our deferred tax assets and liabilities;
 
expiration of, or lapses in the research and development tax credit laws;
 
transfer pricing adjustments including the effect of acquisitions on our intercompany research and development and legal structure;
 
an increase in non-deductible expenses for tax purposes, including certain stock-based compensation expense, write-offs of acquired in-process research and development, and impairment of goodwill;

a decrease in the stock option exercises by our employees in some of our foreign subsidiaries that can cause an adverse transfer pricing adjustment;
 
tax costs related to intercompany realignments;
 
tax assessments resulting from income tax audits or any related tax interest or penalties that could significantly affect our income tax provision for the period in which the settlement takes place;
 
a change in our decision to indefinitely reinvest foreign earnings;
 
changes in accounting principles; or
 
changes in tax laws and regulations including possible changes in the United States to the taxation of earnings of our foreign subsidiaries, and the deductibility of expenses attributable to foreign income, or the foreign tax credit rules, or changes to the U.S. income tax rate, which would necessitate a revaluation of our deferred tax assets and liabilities.
 
Significant judgment is required to determine the recognition and measurement attribute prescribed in the Financial Accounting Standards Board (“FASB”) standard. In addition, the standard applies to all income tax positions, including the potential recovery of previously paid taxes, which if settled unfavorably could adversely impact our provision for income taxes or additional paid-in capital. Further, as a result of certain of our ongoing employment and capital investment actions and commitments, our income in certain foreign countries is subject to reduced tax rates and in some cases is wholly exempt from tax. Our failure to meet these commitments could adversely impact our provision for income taxes. In addition, we are subject to the continuous examination of our income tax returns by the Internal Revenue Service (“IRS”) and other tax authorities. We regularly assess the likelihood of adverse outcomes resulting from these examinations to determine the adequacy of our provision for income taxes. There can be no assurance that the outcomes from these continuous examinations will not have an adverse effect on our results of operations.

Although we currently do not have a valuation allowance, we may in the future be required to establish one. We will continue to assess the need for a valuation allowance on the deferred tax asset by evaluating both positive and negative evidence that may exist.
 
Forecasting our estimated annual effective tax rate is complex and subject to uncertainty, and there may be material differences between our forecasted and actual tax rates.

20

Table of Contents

 
Forecasts of our income tax position and effective tax rate are complex and subject to uncertainty because our income tax position for each year combines the effects of a mix of profits earned and losses incurred by us in various tax jurisdictions with a broad range of income tax rates, as well as changes in the valuation of deferred tax assets and liabilities, the impact of various accounting rules and changes to these rules and tax laws, the results of examinations by various tax authorities, and the impact of any acquisition, business combination or other reorganization or financing transaction. To forecast our global tax rate, we estimate our pre-tax profits and losses by jurisdiction and forecast our tax expense by jurisdiction. If the mix of profits and losses, our ability to use tax credits, or effective tax rates by jurisdiction is different than those estimated, our actual tax rate could be materially different than forecasted, which could have a material impact on our results of business, financial condition and results of operations.
 
As a multinational corporation, we conduct our business in many countries and are subject to taxation in many jurisdictions. The taxation of our business is subject to the application of multiple and sometimes conflicting tax laws and regulations as well as multinational tax conventions. Our effective tax rate is highly dependent upon the geographic distribution of our worldwide earnings or losses, the tax regulations and tax holidays in each geographic region, the availability of tax credits and carryforwards, and the effectiveness of our tax planning strategies. The application of tax laws and regulations is subject to legal and factual interpretation, judgment and uncertainty. Tax laws themselves are subject to change as a result of changes in fiscal policy, changes in legislation, and the evolution of regulations and court rulings. Consequently, taxing authorities may impose tax assessments or judgments against us that could materially impact our tax liability and/or our effective income tax rate.
 
In addition, we may be subject to examination of our income tax returns by the IRS and other tax authorities. If tax authorities challenge the relative mix of U.S. and international income, our future effective income tax rates could be adversely affected. While we regularly assess the likelihood of adverse outcomes from such examinations and the adequacy of our provision for income taxes, there can be no assurance that such provision is sufficient and that a determination by a tax authority will not have an adverse effect on our business, financial condition and results of operations.

Our inability to acquire and integrate other businesses, products or technologies could seriously harm our competitive position.
 
In order to remain competitive, we may seek to acquire additional businesses, products, or technologies and intellectual property, such as patents. If we identify an appropriate acquisition candidate, we may not be successful in negotiating the terms of the acquisition, financing the acquisition, or effectively integrating the acquired business, product, technology or intellectual property into our existing business and operations. We may have difficulty incorporating acquired technologies, intellectual property or products with our existing product lines and maintaining uniform standards, controls, procedures and policies. Our due diligence may fail to identify all of the problems, liabilities or other shortcomings or challenges of an acquired business, product or technology, including issues with intellectual property, product quality or product architecture, regulatory compliance practices, revenue recognition or other accounting practices or employee or customer issues. In addition, any acquisitions we are able to complete may not be accretive to earnings and may not result in any synergies or other benefits we had expected to achieve, which could result in write-offs that could be substantial. Acquisitions during a quarter may result in increased operating expenses and adversely affect our results of operations for that period or future periods compared to the results that we have previously forecasted or achieved. Further, completing a potential acquisition and integrating acquired businesses, products, technologies or intellectual property could significantly divert management time and resources.

Our business is subject to the risks of warranty claims, product returns, product liability and product defects.
 
Our products are very complex and, despite testing prior to their release, have contained and may contain undetected defects or errors, especially when first introduced or when new versions are released. Product errors have affected the performance of our products and could delay the development or release of new products or new versions of products, adversely affect our reputation and our end-customers’ willingness to buy products from us, and adversely affect market acceptance or perception of our products. Any such errors or delays in releasing new products or new versions of products or allegations of unsatisfactory performance could cause us to lose revenue or market share, increase our service costs, cause us to incur substantial costs in redesigning the products, cause us to lose significant end-customers, subject us to liability for damages and divert our resources from other tasks, any one of which could materially and adversely affect our business, results of operations and financial condition. Our products must successfully interoperate with products from other vendors. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. The occurrence of hardware and software errors, whether or not caused by our products, could delay or reduce market acceptance of our products, and have an adverse effect on our business and financial performance, and any necessary revisions may cause us to incur

21

Table of Contents

significant expenses. The occurrence of any such problems could harm our business, financial condition and results of operations.
 
Although we have limitation of liability provisions in our standard terms and conditions of sale, they may not fully or effectively protect us from claims as a result of federal, state or local laws or ordinances or unfavorable judicial decisions in the United States or other countries. The sale and support of our products also entail the risk of product liability claims. We maintain insurance to protect against certain claims associated with the use of our products, but our insurance coverage may not adequately cover any claim asserted against us. In addition, even claims that ultimately are unsuccessful could result in our expenditure of funds in litigation and divert management’s time and other resources.
 
Our business is subject to the risks of earthquakes, fire, power outages, floods and other catastrophic events, and to interruption by manmade problems such as civil unrest and terrorism.
 
A significant natural disaster, such as an earthquake, fire, a flood, or significant power outage could have a material adverse impact on our business, operating results and financial condition. Our corporate headquarters are located in the San Francisco Bay Area, a region known for seismic activity. In addition, natural disasters could affect our manufacturing vendors, suppliers or logistics providers’ ability to perform services such as obtaining product components and manufacturing products on a timely basis and assisting with shipments on a timely basis. In the event our or our service providers’ information technology systems or manufacturing or logistics abilities are hindered by any of the events discussed above, shipments could be delayed, resulting in missing financial targets, such as revenue and shipment targets, for a particular quarter. In addition, regional instability, acts of terrorism and other geo-political unrest could cause disruptions in our business or the business of our manufacturers, logistics providers, partners, or end-customers or the economy as a whole. Given our typical concentration of sales at each quarter end, any disruption in the business of our manufacturers, logistics providers, partners or end-customers that impacts sales at the end of our quarter could have a significant adverse impact on our quarterly results. All of the aforementioned risks may be augmented if the disaster recovery plans for us and our suppliers prove to be inadequate. To the extent that any of the above results in delays or cancellations of customer orders, or the delay in the manufacture, deployment or shipment of our products, our business, financial condition and results of operations would be adversely affected.

Risks Related to Our Industry

The network security market is rapidly evolving and the complex technology incorporated in our products makes them difficult to develop. If we do not accurately predict, prepare for and respond promptly to technological and market developments and changing end-customer needs, our competitive position and prospects will be harmed.
 
The network security market is expected to continue to evolve rapidly. Moreover, many of our end-customers operate in markets characterized by rapidly changing technologies and business plans, which require them to add numerous network access points and adapt increasingly complex enterprise networks, incorporating a variety of hardware, software applications, operating systems and networking protocols. In addition, computer hackers and others who try to attack networks employ increasingly sophisticated techniques to gain access to and attack systems and networks. The technology in our products is especially complex because it needs to effectively identify and respond to new and increasingly sophisticated methods of attack, while minimizing the impact on network performance. Additionally, some of our new products and enhancements may require us to develop new hardware architectures and ASICs that involve complex, expensive and time consuming research and development processes. Although the market expects rapid introduction of new products or product enhancements to respond to new threats, the development of these products is difficult and the timetable for commercial release and availability is uncertain and there can be long time periods between releases and availability of new products. We have in the past and may in the future experience unanticipated delays in the availability of new products and services and fail to meet previously announced timetables for such availability. If we do not quickly respond to the rapidly changing and rigorous needs of our end-customers by developing and releasing and making available on a timely basis new products and services or enhancements that can respond adequately to new security threats, our competitive position and business prospects will be harmed.
 
Our URL database for our Web filtering service may fail to keep pace with the rapid growth of URLs and may not categorize websites in accordance with our end-customers expectations.
 
The success of our Web filtering service depends on the breadth and accuracy of our URL database. Although our URL database currently catalogs millions of unique URLs, it contains only a portion of the URLs for all of the websites that are available on the Internet. In addition, the total number of URLs and software applications is growing rapidly, and we expect this rapid growth to continue in the future. Accordingly, we must identify and categorize content for our security risk categories at an extremely rapid rate. Our database and technologies may not be able to keep pace with the growth in the number of websites, especially the growing amount of content utilizing foreign languages and the increasing sophistication of malicious

22

Table of Contents

code and the delivery mechanisms associated with spyware, phishing and other hazards associated with the Internet. Further, the ongoing evolution of the Internet and computing environments will require us to continually improve the functionality, features and reliability of our Web filtering function. Any failure of our databases to keep pace with the rapid growth and technological change of the Internet will impair the market acceptance of our products, which in turn will harm our business, financial condition and results of operations.
 
In addition, our Web filtering service may not be successful in accurately categorizing Internet and application content to meet our end-customers’ expectations. We rely upon a combination of automated filtering technology and human review to categorize websites and software applications in our proprietary databases. Our end-customers may not agree with our determinations that particular URLs should be included or not included in specific categories of our databases. In addition, it is possible that our filtering processes may place material that is objectionable or that presents a security risk in categories that are generally unrestricted by our customers’ Internet and computer access policies, which could result in such material not being blocked from the network. Conversely, we may miscategorize websites such that access is denied to websites containing information that is important or valuable to our customers. Any miscategorization could result in customer dissatisfaction and harm our reputation. Any failure to effectively categorize and filter websites according to our end-customers’ and channel partners’ expectations will impair the growth of our business.
 
If our new products and product enhancements do not achieve sufficient market acceptance, our results of operations and competitive position will suffer.
 
We spend substantial amounts of time and money to research and develop new products and enhanced versions of our existing products to incorporate additional features, improved functionality or other enhancements in order to meet our customers’ rapidly evolving demands for network security in our highly competitive industry. When we develop a new product or an enhanced version of an existing product, we typically incur expenses and expend resources upfront to market, promote and sell the new offering. Therefore, when we develop and introduce new or enhanced products, they must achieve high levels of market acceptance in order to justify the amount of our investment in developing and bringing them to market.
 
Our new products or product enhancements could fail to attain sufficient market acceptance for many reasons, including:
 
delays in releasing our new products or enhancements to the market;
 
failure to accurately predict market demand in terms of product functionality and to supply products that meet this demand in a timely fashion;
 
failure of our sales force and partners to focus on selling new products;
 
inability to interoperate effectively with the networks or applications of our prospective end-customers;
 
inability to protect against new types of attacks or techniques used by hackers;
 
defects, vulnerabilities, errors or failures or any perceived possible defects, vulnerabilities, errors or failures;
 
negative publicity about their performance or effectiveness;
 
introduction or anticipated introduction of competing products by our competitors;
 
poor business conditions for our end-customers, causing them to delay IT purchases;
 
easing of regulatory requirements around security; and
 
reluctance of customers to purchase products incorporating open source software.
 
If our new products or enhancements do not achieve adequate acceptance in the market, our competitive position will be impaired, our revenue will be diminished and the effect on our operating results may be particularly acute because of the significant research, development, marketing, sales and other expenses we incurred in connection with the new product or enhancement.
 

23

Table of Contents

Unless we continue to develop better market awareness of our company and our products, our revenue may not continue to grow.

Increased market awareness of our capabilities and products is essential to our continued growth and our success in all of our markets, particularly for the large enterprise, service provider and governmental entities markets. We have historically had relatively low spending on certain marketing activities, and, if our marketing programs are not successful in creating market awareness of our company and products, our business, financial condition and results of operations will be adversely affected, and we will not be able to achieve sustained growth.
 
Demand for UTM products may be limited by market perception that UTM products are inferior to network security solutions from multiple vendors.
 
Sales of most of our products depend on increased demand for UTM products. If the UTM market fails to grow as we anticipate, our business will be seriously harmed. Target customers may view UTM “all-in-one” solutions as inferior to security solutions from multiple vendors because of, among other things, their perception that UTM products provide security functions from only a single vendor and do not allow users to choose “best-of-breed” defenses from among the wide range of dedicated security applications available. Target customers might also perceive that, by combining multiple security functions into a single platform, UTM solutions create a “single point of failure” in their networks, which means that an error, vulnerability or failure of the UTM product may place the entire network at risk. In addition, the market perception that UTM solutions may be suitable only for small and medium sized businesses because UTM lacks the performance capabilities and functionality of other solutions may harm our sales to large enterprise, service provider, and governmental entity end-customers. If the foregoing concerns and perceptions become prevalent, even if there is no factual basis for these concerns and perceptions, or if other issues arise with the UTM market in general, demand for UTM products could be severely limited, which would limit our growth and harm our business, financial condition and results of operations. Further a successful and publicized targeted attack against us or another well known UTM vendor exposing a “single point of failure” could significantly increase these concerns and perceptions and may harm our business and results of operations.
 
We face intense competition in our market and we may lack sufficient financial or other resources to maintain or improve our competitive position.
 
The market for network security products is intensely competitive, and we expect competition to intensify in the future. Our competitors include networking companies such as Cisco and Juniper, security vendors such as Check Point, McAfee (acquired by Intel), SonicWALL (acquired by Dell) and Palo Alto Networks, and other point solution security vendors.
 
Many of our existing and potential competitors enjoy substantial competitive advantages such as:
 
greater name recognition and longer operating histories;
 
larger sales and marketing budgets and resources;
 
broader distribution and established relationships with distribution partners and end-customers;
 
access to larger customer bases;
 
greater customer support resources;
 
greater resources to make acquisitions;
 
lower labor and development costs; and
 
substantially greater financial, technical and other resources.
 
In addition, some of our larger competitors have substantially broader product offerings and leverage their relationships based on other products or incorporate functionality into existing products in a manner that discourages users from purchasing our products. These larger competitors often have broader product lines and market focus and are in a better position to withstand any significant reduction in capital spending by end-customers in these markets. Therefore, these competitors will not be as susceptible to downturns in a particular market. Also, many of our smaller competitors that specialize in providing protection from a single type of network security threat are often able to deliver these specialized network security products to the market more quickly than we can. Some of our smaller competitors are using third-party chips designed to

24

Table of Contents

accelerate performance. Conditions in our markets could change rapidly and significantly as a result of technological advancements or continuing market consolidation. Our current and potential competitors may also establish cooperative relationships among themselves or with third parties that may further enhance their resources. In addition, current or potential competitors may be acquired by third parties with greater available resources, such as Juniper’s acquisition of NetScreen Technologies Inc., Intel’s acquisition of McAfee, Check Point’s acquisition of Nokia Corporations’ security appliance business and Dell’s acquisition of SonicWALL. As a result of such acquisitions, our current or potential competitors might be able to adapt more quickly to new technologies and customer needs, devote greater resources to the promotion or sale of their products and services, initiate or withstand substantial price competition, take advantage of acquisition or other opportunities more readily or develop and expand their product and service offerings more quickly than we do. In addition, our competitors may bundle products and services competitive with ours with other products and services. Customers may accept these bundled products and services rather than separately purchasing our products and services. Due to budget constraints or economic downturns, organizations may be more willing to incrementally add solutions to their existing network security infrastructure from competitors than to replace it with our solutions. These competitive pressures in our market or our failure to compete effectively may result in price reductions, fewer customer orders, reduced revenue and gross margins and loss of market share.
 
If functionality similar to that offered by our products is incorporated into existing network infrastructure products, organizations may decide against adding our appliances to their network, which would have an adverse effect on our business.
 
Large, well-established providers of networking equipment such as Cisco and Juniper offer, and may continue to introduce, network security features that compete with our products, either in stand-alone security products or as additional features in their network infrastructure products. The inclusion of, or the announcement of an intent to include, functionality perceived to be similar to that offered by our security solutions in networking products that are already generally accepted as necessary components of network architecture may have an adverse effect on our ability to market and sell our products. Furthermore, even if the functionality offered by network infrastructure providers is more limited than our products, a significant number of customers may elect to accept such limited functionality in lieu of adding appliances from an additional vendor such as us. Many organizations have invested substantial personnel and financial resources to design and operate their networks and have established deep relationships with other providers of networking products, which may make them reluctant to add new components to their networks, particularly from other vendors such as us. In addition, an organization’s existing vendors or new vendors with a broad product offering may be able to offer concessions that we are not able to match because we currently offer only network security products and have fewer resources than many of our competitors. If organizations are reluctant to add additional network infrastructure from new vendors or otherwise decide to work with their existing vendors, our business, financial condition and results of operations will be adversely affected.

Risks Related to Intellectual Property

Our proprietary rights may be difficult to enforce, which could enable others to copy or use aspects of our products without compensating us.
 
We rely primarily on patent, trademark, copyright and trade secrets laws, confidentiality procedures and contractual provisions to protect our technology. Valid patents may not issue from our pending applications, and the claims eventually allowed on any patents may not be sufficiently broad to protect our technology or products. Any issued patents may be challenged, invalidated or circumvented, and any rights granted under these patents may not actually provide adequate defensive protection or competitive advantages to us. Patent applications in the United States are typically not published until at least 18 months after filing, or, in some cases, not at all, and publications of discoveries in industry-related literature lag behind actual discoveries. We cannot be certain that we were the first to make the inventions claimed in our pending patent applications or that we were the first to file for patent protection. Additionally, the process of obtaining patent protection is expensive and time-consuming, and we may not be able to prosecute all necessary or desirable patent applications at a reasonable cost or in a timely manner. In addition, recent changes to the patent laws in the United States may bring into question the validity of certain software patents and may make it more difficult and costly to prosecute patent applications. As a result, we may not be able to obtain adequate patent protection or effectively enforce our issued patents.
 
Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality or license agreements with our employees, consultants, vendors and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that the steps taken by us will prevent misappropriation of our technology. Policing unauthorized use of our technology or products is difficult. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States. From time to time, legal action by us

25

Table of Contents

may be necessary to enforce our patents and other intellectual property rights, to protect our trade secrets, to determine the validity and scope of the proprietary rights of others or to defend against claims of infringement or invalidity. Such litigation could result in substantial costs and diversion of resources and could negatively affect our business, operating results and financial condition. If we are unable to protect our proprietary rights (including aspects of our software and products protected other than by patent rights), we may find ourselves at a competitive disadvantage to others who need not incur the additional expense, time and effort required to create the innovative products that have enabled us to be successful to date.
 
Our products contain third-party open source software components, and failure to comply with the terms of the underlying open source software licenses could restrict our ability to sell our products.
 
Our products contain software modules licensed to us by third-party authors under “open source” licenses, including the GNU Public License, the GNU Lesser Public License (LGPL), the BSD License, the Apache License and others. From time to time, there have been claims against companies that distribute or use open source software in their products and services, asserting that open source software infringes the claimants’ intellectual property rights. We could be subject to suits by parties claiming infringement of intellectual property rights in what we believe to be licensed open source software. Use and distribution of open source software may entail greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or other contractual protections regarding infringement claims or the quality of the code. Some open source licenses contain requirements that we make available source code for modifications or derivative works we create based upon the type of open source software we use. If we combine our proprietary software with open source software in a certain manner, we could, under certain open source licenses, be required to release the source code of our proprietary software to the public. This would allow our competitors to create similar products with lower development effort and time and ultimately could result in a loss of product sales for us.
 
Although we monitor our use of open source software to avoid subjecting our products to conditions we do not intend, the terms of many open source licenses have not been interpreted by United States courts, and there is a risk that these licenses could be construed in a way that could impose unanticipated conditions or restrictions on our ability to commercialize our products. In this event, we could be required to seek licenses from third parties to continue offering our products, to make generally available, in source code form, our proprietary code, to re-engineer our products, or to discontinue the sale of our products if re-engineering could not be accomplished on a timely basis, any of which could adversely affect our business, operating results and financial condition.
 
Claims by others that we infringe their proprietary technology or other litigation matters could harm our business.
 
Patent and other intellectual property disputes are common in the network security industry. Third parties have asserted and may in the future assert claims of infringement of intellectual property rights against us. They may also assert such claims against our end-customers or channel partners whom we typically indemnify against claims that our products infringe the intellectual property rights of third parties. As the number of products and competitors in our market increases and overlaps occur, infringement claims may increase. Any claim of infringement by a third-party, even those without merit, could cause us to incur substantial costs defending against the claim and could distract our management from our business. In addition, litigation may involve patent holding companies or other adverse patent owners who have no relevant product revenue and against whom our own patents may therefore provide little or no deterrence or protection.
 
Although third parties may offer a license to their technology, the terms of any offered license may not be acceptable, and the failure to obtain a license or the costs associated with any license could cause our business, financial condition and results of operations to be materially and adversely affected. In addition, some licenses may be non-exclusive, and therefore our competitors may have access to the same technology licensed to us.
 
Alternatively, we may be required to develop non-infringing technology, which could require significant time, effort and expense and may ultimately not be successful. Furthermore, a successful claimant could secure a judgment or we may agree to a settlement that prevents us from distributing certain products or performing certain services or that requires us to pay substantial damages (including treble damages if we are found to have willfully infringed such claimant’s patents or copyrights), royalties or other fees. Any of these events could seriously harm our business, financial condition and results of operations.

From time to time we are subject to lawsuits claiming patent infringement, and there are lawsuits claiming patent infringement currently pending, as discussed in the section entitled “Legal Proceedings” in Part I, Item 3 of this Annual Report on Form 10-K. We are also subject to other litigation in addition to patent infringement claims, such as employment-related litigation and disputes, general commercial litigation, and other forms of litigation and disputes, including stockholder litigation. If we are unsuccessful in defending any such claims, our operating results and financial condition and results may be

26

Table of Contents

materially and adversely affected. For example, we may be required to pay substantial damages and could be prevented from selling certain of our products. Litigation, with or without merit, could negatively impact our business, reputation, and sales in a material fashion. In addition to the lawsuits described in “Legal Proceedings,” several other non-practicing patent holding companies have sent us letters proposing that we license certain of their patents, and given this and the proliferation of lawsuits in our industry and other similar industries by both non-practicing entities and operating entities, we expect that we will be sued for patent infringement in the future, regardless of the merits of any such lawsuits. The cost to defend such lawsuits and any adverse result in such lawsuits could have a material adverse effect on our results of operations and financial condition.
 
We rely on the availability of third-party licenses.
 
Many of our products include software or other intellectual property licensed from third parties. It may be necessary in the future to renew licenses relating to various aspects of these products or to seek new licenses for existing or new products. There can be no assurance that the necessary licenses would be available on acceptable terms, if at all. The inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, or the need to engage in litigation regarding these matters, could result in delays in product releases until equivalent technology can be identified, licensed or developed, if at all, and integrated into our products and may have a material adverse effect on our business, operating results, and financial condition. Moreover, the inclusion in our products of software or other intellectual property licensed from third parties on a nonexclusive basis could limit our ability to differentiate our products from those of our competitors.

Risks Related to Ownership of our Common Stock

As a public company, we are subject to compliance initiatives that will require substantial time from our management and result in significantly increased costs that may adversely affect our operating results and financial condition.
 
The Sarbanes-Oxley Act of 2002, the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, as well as other rules implemented by the SEC and The NASDAQ Stock Market, impose various requirements on public companies, including requiring changes in corporate governance practices. These and proposed corporate governance laws and regulations under consideration may further increase our compliance costs. If compliance with these various legal and regulatory requirements diverts our management’s attention from other business concerns, it could have a material adverse effect on our business, financial condition and results of operations. The Sarbanes-Oxley Act requires, among other things, that we assess the effectiveness of our internal control over financial reporting annually and disclosure controls and procedures quarterly. We completed our evaluation of our internal controls over financial reporting for fiscal 2012 as required by Section 404 of the Sarbanes-Oxley Act of 2002. Although our assessment, testing and evaluation resulted in our conclusion that as of December 31, 2012, our internal controls over financial reporting were effective, we cannot predict the outcome of our testing in 2013 or future periods. If our internal controls or disclosure controls are ineffective in future periods, our business and reputation could be harmed. We may incur additional expenses and commitment of management’s time in connection with further evaluations, both of which could materially increase our operating expenses and accordingly reduce our operating results.
 
Changes in financial accounting standards may cause adverse unexpected fluctuations and affect our reported results of operations.
 
A change in accounting standards or practices and varying interpretations of existing accounting pronouncements, such as changes to standards related to the increased use of fair value measure, financial instruments, and the potential requirement that U.S. registrants prepare financial statements in accordance with International Financial Reporting Standards (“IFRS”), could have a significant effect on our reported financial results or the way we conduct our business. If we do not ensure that our systems and processes are aligned with the new standards, we could encounter difficulties generating quarterly and annual financial statements in a timely manner, which would have an adverse effect on our business and our ability to meet our reporting obligations.
If securities or industry analysts stop publishing research or publish inaccurate or unfavorable research about our business, our stock price and trading volume could decline.
 
The trading market for our common stock will depend in part on the research and reports that securities or industry analysts publish about us or our business. If we do not maintain adequate research coverage or if one or more of the analysts who covers us downgrades our stock or publishes inaccurate or unfavorable research about our business, our stock price would likely decline. If one or more of these analysts ceases coverage of our company or fails to publish reports on us regularly, demand for our stock could decrease, which could cause our stock price and trading volume to decline.
 

27

Table of Contents

The trading price of our common stock is likely to be volatile.
 
The market price of our common stock is subject to wide fluctuations in response to, among other things, the risk factors described in this periodic report, and other factors such as rumors or fluctuations in the valuation of companies perceived by investors to be comparable to us. For example, in the year ended December 31, 2012, the price of our common stock ranged from $17.81 to $28.44.
 
Furthermore, the stock markets have experienced price and volume fluctuations that have affected and continue to affect the market prices of equity securities of many companies. These fluctuations often have been unrelated or disproportionate to the operating performance of those companies. These broad market and industry fluctuations, as well as general economic, political, and market conditions, such as recessions, interest rate changes or international currency fluctuations, may negatively affect the market price of our common stock.
 
In the past, many companies that have experienced volatility in the market price of their stock have been subject to securities class action litigation. We may be the target of this type of litigation in the future. Securities litigation against us could result in substantial costs and divert our management’s attention from other business concerns, which could seriously harm our business.
 
Our failure to raise additional capital or generate the significant capital necessary to expand our operations and invest in new products could reduce our ability to compete and could harm our business.
 
We expect that our existing cash and cash equivalents will be sufficient to meet our anticipated cash needs for at least the next 12 months. If we need to raise additional funds in the future, we may not be able to obtain additional debt or equity financing on favorable terms, if at all. If we raise additional equity financing, our stockholders may experience significant dilution of their ownership interests and the per-share value of our common stock could decline. Furthermore, if we engage in debt financing, the holders of debt would have priority over the holders of common stock and we may be required to accept terms that restrict our ability to incur additional indebtedness. We may also be required to take other actions that would otherwise be in the interests of the stockholders and force us to maintain specified liquidity or other ratios, any of which could harm our business, operating results and financial condition. If we need additional capital and cannot raise it on acceptable terms, we may not be able to, among other things:
 
develop or enhance our products and services;
 
continue to expand our sales and marketing and research and development organizations;
 
acquire complementary technologies, products or businesses;
 
expand operations, in the United States or internationally;
 
hire, train and retain employees; or
 
respond to competitive pressures or unanticipated working capital requirements.
 
Our failure to do any of these things could seriously harm our business, financial condition and results of operations.
 
Anti-takeover provisions contained in our certificate of incorporation and bylaws, as well as provisions of Delaware law, could impair a takeover attempt.
 
Our certificate of incorporation, bylaws and Delaware law contain provisions that could have the effect of rendering more difficult, delaying or preventing an acquisition deemed undesirable by our board of directors. Our corporate governance documents include provisions:
 
providing for a classified board of directors whose members serve staggered three-year terms;
 
authorizing “blank check” preferred stock, which could be issued by the board without stockholder approval and may contain voting, liquidation, dividend and other rights superior to our common stock;
 
limiting the liability of, and providing indemnification to, our directors and officers;
 

28

Table of Contents

limiting the ability of our stockholders to call and bring business before special meetings;
 
requiring advance notice of stockholder proposals for business to be conducted at meetings of our stockholders and for nominations of candidates for election to our board of directors;
 
controlling the procedures for the conduct and scheduling of board and stockholder meetings; and
 
providing the board of directors with the express power to postpone previously scheduled annual meetings and to cancel previously scheduled special meetings.
 
These provisions, alone or together, could delay or prevent hostile takeovers and changes in control or changes in our management.
 
As a Delaware corporation, we are also subject to provisions of Delaware law, including Section 203 of the Delaware General Corporation law, which prevents some stockholders holding more than 15% of our outstanding common stock from engaging in certain business combinations without approval of the holders of a substantial majority of all of our outstanding common stock.
 
Any provision of our certificate of incorporation or bylaws or Delaware law that has the effect of delaying or deterring a change in control could limit the opportunity for our stockholders to receive a premium for their shares of our common stock, and could also affect the price that some investors are willing to pay for our common stock.
ITEM 1B.     Unresolved Staff Comments

Not applicable.

ITEM 2.     Properties

Our corporate headquarters are located at 1090 Kifer Road, Sunnyvale, California in an office consisting of approximately 107,000 square feet. The lease for this office expires in September 2013.  In August 2012, we purchased real property including land and buildings comprising 441,265 and 164,099 square feet, respectively, in Sunnyvale, California, for approximately $14.5 million. We are in the process of evaluating uses for this property.

In addition to our headquarters, we lease approximately 14,000 square feet of data center space and a total of approximately 71,000 square feet of office space in two buildings in Burnaby, Canada under various leases that expire July 2015, approximately 24,000 square feet of office space in Ottawa, Canada under a lease that expires in February 2015, approximately 19,000 square feet of office space in Sophia, France under a lease that expires in December 2013, and approximately 26,000 square feet of office space in Beijing, China under a lease that expires in August 2013. We also lease sales and support offices in Australia, Austria, Belgium, Egypt, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Korea, Malaysia, Mexico, the Netherlands, New Zealand, Philippines, Poland, Russia, Saudi Arabia, Singapore, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, United Arab Emirates, and the United Kingdom. We believe that our existing properties are sufficient and suitable for the conduct of our business.

ITEM 3.     Legal Proceedings

In August 2009, Enhanced Security Research, LLC and Security Research Holdings LLC (collectively “ESR”), a non-practicing entity, filed a complaint against us in the United States District Court for the District of Delaware alleging infringement by us and other defendants of two patents. The plaintiffs are claiming unspecified damages and requesting an injunction against the alleged infringement. In June 2010, the Court granted our motion to stay pending the outcome of reexamination proceedings in the U.S. Patent and Trademark Office (“PTO”) on both asserted patents. The PTO rejected all of the claims of the patents in the suit and ESR appealed this result to the Board of Patent Appeals and Interferences (“BPAI”). In August 2012, the BPAI completed its review of both reexamination proceedings, and, after the BPAI’s review, all claims of the asserted ESR patents remain rejected. In October 2012, ESR filed an additional appeal of the BPAI decision with the United States Court of Appeal for the Federal Circuit. That appeal is still pending.
 
In April 2010, an individual, a former stockholder of Fortinet, filed a class action lawsuit against us claiming unspecified damages in the California Superior Court for the County of Los Angeles alleging violation of various California Corporations Code sections and related tort claims alleging misrepresentation and breach of fiduciary duty regarding the 2009 repurchase by Fortinet of shares of its stock while we were a privately-held company. In September 2010, the Court granted our

29

Table of Contents

motion to transfer the case to the California Superior Court for Santa Clara County and the plaintiff has filed several amended complaints in the Superior Court to add individual defendants, among other amendments. The Superior Court set a trial date for December 2012, but we settled this matter and paid $1.0 million in November 2012, and the settlement was approved by the court. 

In July 2010, Network Protection Sciences, LLC (“NPS”), a non-practicing entity, filed a complaint in the United States District Court for the Eastern District of Texas alleging patent infringement by us and other defendants. NPS is claiming unspecified damages, including treble damages for willful infringement, and requests an injunction against such alleged infringement. In December 2011, the United States District Court for the Eastern District of Texas ordered the case to be transferred to the Northern District of California. In June 2012, the United States District Court for the Northern District of California dismissed the other defendants for misjoinder, and the case is proceeding with Fortinet as the sole defendant. This case is currently scheduled for a jury trial starting in September 2013.

In June 2012, we received a letter from SRI International (“SRI”) claiming that we infringed certain SRI patents. Subsequently, we filed a complaint in the United States District Court for the Northern District of California seeking declaratory relief and a judgment that the SRI patents were invalid, unenforceable and not infringed by any of our products or services. The case is proceeding in District Court.

We do not currently believe that any of the foregoing litigation matters will have a material adverse effect on our business.

ITEM 4.     Mine Safety Disclosure

Not applicable.

Part II

ITEM 5.
Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities

Our common stock is traded on The NASDAQ Global Select Market under the symbol “FTNT.” The following table sets forth, for the time periods indicated, the high and low closing sales price of our common stock, adjusted to reflect the two-for-one split effective June 1, 2011, as reported on The NASDAQ Global Select Market.
 
2012
 
2011
 
High ($)
 
Low ($)
 
High ($)
 
Low ($)
Fourth Quarter
24.80

 
17.81

 
25.76

 
16.53

Third Quarter
27.68

 
20.93

 
28.17

 
16.25

Second Quarter
28.44

 
20.41

 
27.29

 
18.94

First Quarter
27.83

 
19.90

 
22.08

 
16.55


Holders of Record

As of February 20, 2013, there were 81 holders of record of our common stock. A substantially greater number of holders of our common stock are “street name” or beneficial holders, whose shares are held by banks, brokers and other financial institutions.

Dividends

We have never declared or paid cash dividends on our capital stock. We intend to retain all available funds and any future earnings to support the operation of and to finance the growth and development of our business. We do not anticipate paying any cash dividends in the foreseeable future. Any future determination to declare cash dividends will be made at the discretion of our board of directors and will depend on our financial condition, operating results, capital requirements, general business conditions and other factors that our board of directors may deem relevant.

Stock Performance Graph


30

Table of Contents

This performance graph shall not be deemed “filed” for purposes of Section 18 of the Exchange Act, or incorporated by reference into any filing of Fortinet under the Securities Act of 1933, as amended (the “Securities Act), or the Exchange Act, except as shall be expressly set forth by specific reference in such filing.

The following graph shows a comparison from November 18, 2009 through December 31, 2012, of the cumulative total return for our common stock, the NASDAQ Composite Index, and the NASDAQ Computer Index. Such returns are based on historical results and are not intended to suggest future performance. Data for The NASDAQ Composite Index and The NASDAQ Computer Index assume reinvestment of dividends. We have never declared or paid cash dividends on our capital stock nor do we anticipate paying any such cash dividends in the foreseeable future.

COMPARISON OF CUMULATIVE TOTAL RETURN*
Among Fortinet, Inc., The NASDAQ Composite Index and
The NASDAQ Computer Index


 
11/09
 
12/09
 
03/10
 
06/10
 
09/10
 
12/10
 
03/11
 
06/11
 
09/11
 
12/11
 
03/12
 
06/12
 
09/12
 
12/12
Fortinet, Inc.
$
100

 
$
106

 
$
106

 
$
99

 
$
150

 
$
195

 
$
266

 
$
328

 
$
202

 
$
263

 
$
333

 
$
279

 
$
290

 
$
253

NASDAQ Composite
$
100

 
$
106

 
$
112

 
$
98

 
$
110

 
$
124

 
$
130

 
$
129

 
$
113

 
$
121

 
$
144

 
$
137

 
$
145

 
$
141

NASDAQ Computer
$
100

 
$
107

 
$
110

 
$
98

 
$
111

 
$
127

 
$
131

 
$
128

 
$
118

 
$
127

 
$
157

 
$
145

 
$
154

 
$
143


_______________________
* $100 invested on 11/18/09 in stock or index, including reinvestment of dividends.
 
Sales of Unregistered Securities

None.

Purchases of Equity Securities by the Issuer and Affiliated Purchasers

None.


31

Table of Contents

ITEM 6.     Selected Financial Data

You should read the following selected consolidated historical financial data below in conjunction with the section titled “Management’s Discussion and Analysis of Financial Condition and Results of Operations” and the consolidated financial statements, related notes and other financial information included elsewhere in this Annual Report on Form 10-K. The selected financial data in this section is not intended to replace the financial statements and is qualified in its entirety by the consolidated financial statements and related notes thereto included elsewhere in this Annual Report on Form 10-K.

We made the decision in the first quarter of fiscal 2009 to change our financial reporting periods from a fiscal to calendar basis. This change was implemented in the third quarter of fiscal 2009 upon completion of required system changes. Accordingly, commencing in the third quarter of fiscal 2009, we began operating and reporting financial results on a calendar quarter and year basis. Our third quarter of fiscal 2009 ended on September 30, 2009, and our fiscal year 2009 ended on December 31, 2009. This transition had the effect of increasing the number of days in our twelve months ended December 31, 2009 by four days. Prior to the third quarter of fiscal 2009, our interim fiscal quarters ended on the Sunday closest to March 31, June 30 and September 30 of each year.

 
Fiscal Year (1)
 
2012
 
2011
 
2010
 
2009
 
2008
 
($ amounts in 000’s, except per share amounts)
Consolidated Statement of Operations Data:
 
 
 
 
 
 
 
 
 
Total revenue
533,639

 
433,576

 
324,696

 
252,115

 
211,791

Operating income
100,475

 
88,904

 
55,341

 
25,334

 
4,927

Net income
66,836

 
62,492

 
41,245

 
60,179

 
7,363

Net income per share :
 
 
 
 
 
 
 
 
 
Basic
0.42

 
0.41

 
0.29

 
0.97

 
0.18

Diluted
0.40

 
0.38

 
0.26

 
0.39

 
0.14

Weighted-average shares outstanding:
 
 
 
 
 
 
 
 
 
Basic
158,074

 
152,581

 
140,726

 
52,668

 
40,034

Diluted
166,329

 
163,781

 
156,406

 
130,438

 
53,284

________________________
(1)
Our fiscal years ended on December 31, 2012December 31, 2011December 31, 2010, December 31, 2009 and December 28, 2008.


 
As of Fiscal Year End
2012
 
2011
 
2010
 
2009
 
2008
($ amounts in 000’s)
Consolidated Balance Sheet Data:
 
 
 
 
 
 
 
 
 
Cash, cash equivalents and investments
739,586

 
538,687

 
387,460

 
260,314

 
124,190

Total assets
975,497

 
734,747

 
545,422

 
387,213

 
199,105

Convertible preferred stock

 

 

 

 
94,368

Total stockholders’ equity (deficit)
510,934

 
358,354

 
232,454

 
142,452

 
(5,229
)

ITEM 7.     Management’s Discussion and Analysis of Financial Condition and Results of Operations

In addition to historical information, this Annual Report on Form 10-K contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act. These statements include, among other things, statements concerning our expectations regarding:
 
variability in sales in certain product categories from year to year and between quarters;

expected impact of sales of certain products;
 
continued sales into large enterprises and service providers;

32

Table of Contents


mix of billings between products and services;

mix of service sales containing multi-year support and subscription contracts;
 
the significance of stock-based compensation as an expense;
 
the proportion of our revenue that consists of our product and service revenues and future trends with respect to services revenue as we renew existing services contracts and expand our customer base;
 
the impact of our product innovation strategy;
 
trends in revenue, costs of revenue, and gross margin;
 
trends in our operating expenses, including personnel costs, research and development expense, sales and marketing expense and general and administrative expense;

our effective tax rate; and
 
the sufficiency of our existing cash and investments to meet our cash needs for at least the next 12 months;

as well as other statements regarding our future operations, financial condition and prospects and business strategies. These forward-looking statements are subject to certain risks and uncertainties that could cause our actual results to differ materially from those reflected in the forward-looking statements. Factors that could cause or contribute to such differences include, but are not limited to, those discussed in this Annual Report on Form 10-K and, in particular, the risks discussed under the heading “Risk Factors” in Part I, Item 1A of this Annual Report on Form 10-K and those discussed in other documents we file with the SEC. We undertake no obligation to revise or publicly release the results of any revision to these forward-looking statements. Given these risks and uncertainties, readers are cautioned not to place undue reliance on such forward-looking statements.

Business Overview

We provide network security solutions, which enable broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises, service providers and governmental entities worldwide. Since inception through December 31, 2012, we had shipped over 1,100,000 appliances via more than 10,000 channel partners to more than 150,000 end-customers worldwide, including a majority of the 2012 Fortune Global 100.

Our core UTM/NGFW product line of FortiGate physical and virtual appliances ships with a set of security and networking capabilities, including firewall, VPN, application control, antivirus, intrusion prevention, Web filtering, anti-spam and WAN acceleration functionality. We derive a substantial majority of product sales from our FortiGate appliances, which range from the FortiGate-20, designed for small businesses, to the FortiGate-5000 series for large enterprises, telecommunications carriers, and service providers. Our UTM/NGFW solution also includes our FortiGuard security subscription services, which end-customers can subscribe to in order to obtain access to dynamic updates to intrusion prevention, application control, antivirus, Web filtering, vulnerability management and anti-spam functionality included in our appliances. End-customers can also choose to purchase FortiCare technical support services for our products. End-customers also often use FortiManager and FortiAnalyzer products in conjunction with a FortiGate deployment to provide centralized management, analysis and reporting capabilities. We complement our core FortiGate product line with other appliances and software that offer additional protection from security threats to other critical areas of the enterprise, such as messaging, Web application firewalls, databases, protection against denial of service attacks (DDoS) and endpoint security for employee computers and mobile devices. Sales of these complementary products have grown in recent quarters, although these products still represent less than 10% of our total revenue. During fiscal 2012, we announced our new FortiOS 5.0 operating system. FortiOS 5.0 is our fifth generation security operating system, and this release brings more than 150 new features to our FortiGate product line. In addition, we announced version 5.0 operating systems for our FortiManager, FortiAnalyzer, and FortiClient products, to address the need for increasingly sophisticated management and analysis of the network infrastructure and endpoint devices in various environments. During fiscal 2012, we also announced our new FortiASIC-SoC2 processor. FortiASIC-SoC2 is our second-generation processor that combines general purpose processing power with Fortinets custom technology to provide hardware-accelerated network security performance for our FortiGate appliances. It provides more than double the general processing capacity than its predecessor. During fiscal 2012, we expanded and enhanced our FortiGate UTM/NGFW and FortiAP secure wireless access product lines. We also introduced software-based virtual appliances for many

33

Table of Contents

of our FortiGate and FortiManager product lines, which help secure the end-customer’s cloud-based network infrastructures with the same functionality as the traditional physical appliance in their respective product lines.

Financial Highlights

We recorded total revenue of $533.6 million in fiscal 2012. This represents an increase of 23% in fiscal 2012, compared to fiscal 2011. Revenue included $3.7 million and $2.6 million from the sales of previously-acquired patents in fiscal 2012 and 2011, respectively. Product revenue was $248.9 million, an increase of 26% in fiscal 2012, compared to fiscal 2011. Services revenue was $274.0 million in fiscal 2012, an increase of 24% in fiscal 2012, compared to fiscal 2011.

We generated cash flows from operating activities of $183.9 million in fiscal 2012, an increase of 38% compared to fiscal 2011.

Cash, cash equivalents and investments were $739.6 million as of December 31, 2012, an increase of $200.9 million from December 31, 2011.

Deferred revenue was $363.2 million as of December 31, 2012, an increase of $68.4 million from December 31, 2011.

Fiscal 2012 was our third full year as a public company, following our initial public offering in November 2009. We believe the greater visibility and brand recognition derived from being a public company, combined with success in selling to enterprise and service provider customers and new product introductions, served as contributors to the growth in our business during fiscal 2012.

We continue to invest in research and development to strengthen our technology leadership position and believe continued product innovation has strengthened our technology advantage and resulted in market share gains, as evidenced by the recent introduction of several noteworthy new FortiGate appliance models, such as the FG-100D, FG-800C, FG-3240C and FG-5101C. During fiscal 2012, we also made a significant investment in sales and marketing to increase brand awareness and grow our global sales force and distribution channels to grow our global presence both geographically and by industry segment. As a result, we experienced increased deal volumes driven by traction in enterprise data center deployments and large enterprise deals, with particular strength in the retail, financial and telecommunication sectors.

The number of deals involving sales greater than $100,000 was 718 in fiscal 2012, compared to 560 in fiscal 2011. The number of deals involving sales greater than $250,000 was 241 in fiscal 2012, compared to 167 in fiscal 2011. The number of deals of involving sales greater than $500,000 was 81 in fiscal 2012, compared to 57 in fiscal 2011. We expect some variability in this metric, and remain focused on investing in our sales and research and development resources in order to expand our reach into new high-growth verticals and emerging markets, and meet increasing customer expectations about the quality and functionality of our products, as we continue to sell to large customers, such as enterprise and service providers. While we have experienced some success selling into certain vertical customer segments, such as service providers and enterprise, we have experienced less traction selling into other verticals such as the U.S. federal government and there can be no assurance we will be successful selling into certain vertical customer segments.

Sales of FortiGate products have generally been balanced across entry-level (FortiGate-20 to -100 series), mid-range (FortiGate-200 to -800 series) and high-end (FortiGate-1000 to -5000 series) models with each product category representing approximately one-third of FortiGate sales, with some degree of variability from year to year and between quarters over the three-year period ended December 31, 2012. The percentage of our FortiGate related billings from the mid-range category increased from 31% in fiscal 2011 to 33% in fiscal 2012, while the high-end category decreased from 37% to 35%, while the entry-level category remained flat year over year. See “—Key Metrics” below for more information on billings and “—Other Non-GAAP Financial Measures” for a discussion of the limitations of non-GAAP financial measures.

In fiscal 2012, operating expenses increased by 24% compared to fiscal 2011. The increase was primarily driven by additional headcount to support our growth as we continued to invest in the development of new products and expand our sales coverage. We also incurred $1.3 million of litigation settlement expense in fiscal 2012. Of this amount, we recorded $1.0 million as a general and administrative expense and $0.3 million as a sales and marketing expense. These increases were partially offset by favorable foreign currency exchange rates compared to fiscal 2011. We also experienced improvements in productivity and efficiencies in our overall headcount as our annualized fiscal 2012 revenue per employee, defined as annual revenue divided by average headcount, reached $303,000, up from $297,000 for fiscal 2011. Headcount increased to 1,954 as of December 31, 2012 from 1,583 as of December 31, 2011. Our accelerated pace of hiring continued in fiscal 2012, particularly in support, sales and marketing and research and development.

34

Table of Contents


Our Business Model

Our sales strategy is based on a distribution model whereby we primarily sell our products and services directly to distributors who sell to resellers and service providers, who, in turn, sell to our end-customers. In certain cases, we sell directly to government-focused resellers, large service providers and major systems integrators, who have significant purchasing power and unique customer deployment requirements. Typically, FortiGuard security subscription services and FortiCare technical support services are purchased along with our physical and virtual appliances. We invoice at the time of our sale for the total price of the products and subscription and support services, and the invoice generally becomes payable within 30 to 90 days. We generally recognize product revenue up-front based on the allocated revenue value and defer revenue for the sale of new and renewal subscription and support services contracts. We recognize the related services revenue over the service period, which is typically one year from the date the end-customer registers for these services (the date on which the services can first be used by the customer), although it can be as long as five years. Sales of new and renewal services increase our deferred revenue balance, which contributes significantly to our positive cash flow from operations.

Key Metrics

We monitor the key financial metrics set forth below to help us evaluate growth trends, establish budgets, measure the effectiveness of our sales and marketing efforts, and assess operational efficiencies. Our total deferred revenue increased by $68.4 million from $294.8 million as of December 31, 2011 to $363.2 million as of December 31, 2012. Revenue recognized plus the change in deferred revenue from the beginning to the end of the period is a useful metric that management identifies as billings. Billings for services drive deferred revenue, which is an important indicator of the health and visibility of our business, and has historically represented a majority of the revenue that we recognize in a typical quarter. We ended fiscal 2012 with $739.6 million in cash, cash equivalents and investments and have had positive cash flow from operations every fiscal year since 2005. We discuss revenue, gross margin, and the components of operating income and margin below under “—Components of Operating Results,” and we discuss our cash, cash equivalents, and investments under “—Liquidity and Capital Resources.” Deferred revenue and cash flow from operations are discussed immediately below the following table.
 
 
Fiscal Year or as of Fiscal Year End
 
2012
 
2011
 
2010
 
($ amounts in 000’s)
Revenue
533,639

 
433,576

 
324,696

Gross margin
72
%
 
74
%
 
74
%
Operating income (1)
100,475

 
88,904

 
55,341

Operating margin
19
%
 
21
%
 
17
%
Total deferred revenue
363,185

 
294,833

 
252,631

Increase in total deferred revenue
68,352

 
42,202

 
50,701

Cash, cash equivalents and investments
739,586

 
538,687

 
387,460

Cash provided by operating activities
183,866

 
132,842

 
103,383

Free cash flow (2)
161,783

 
135,218

 
99,607

___________________
 
 
 
 
 
(1) Includes:
 
 
 
 
 
Stock-based compensation expense
30,690

 
19,015

 
9,315

Patent settlement income
1,912

 
1,911

 

 
 
 
 
 
 
(2) See “ —Cash flow from operations” below for a definition of free cash flow.
    
Deferred revenue. Our deferred revenue consists of amounts that have been invoiced but that have not yet been recognized as revenue. The majority of our deferred revenue balance consists of the unamortized portion of services revenue from subscription and support service contracts. We monitor our deferred revenue balance because it represents a significant portion of revenue to be recognized in future periods. We define billings as revenue recognized during a period plus the change in deferred revenue from the beginning to the end of the period. The following table reflects the calculation of billings as discussed in the paragraph above. For a discussion of the limitations of non-GAAP financial measures, see “—Other Non-GAAP Financial Measures” below.


35

Table of Contents

 
Fiscal Year
2012
2011
2010
($ amounts in 000’s)
Billings:
 
 
 
 
 
Revenue
533,639

 
433,576

 
324,696

Increase in deferred revenue
68,352

 
42,202

 
50,701

Total billings (Non-GAAP)
601,991

 
475,778

 
375,397


Cash flow from operations. We monitor cash flow from operations as a measure of our overall business performance. Our cash flow from operations is driven in large part by advance payments for both new and renewal contracts for subscription and support services, consistent with our billings for the period. Monitoring cash flow from operations and free cash flow enables us to analyze our financial performance excluding the non-cash effects of certain items such as depreciation, amortization and stock-based compensation expenses, thereby allowing us to better understand and manage the cash needs of our business. Free cash flow, an alternative non-GAAP financial measure of liquidity, is defined as net cash provided by operating activities less capital expenditures. For a discussion of the limitations of non-GAAP financial measures, see “—Other Non-GAAP Financial Measures” below.

 
Fiscal Year
2012
2011
2010
($ amounts in 000’s)
Free Cash Flow:
 
 
 
 
 
Net cash provided by operating activities
183,866

 
132,842

 
103,383

Less purchases of property and equipment
(22,083
)
 
(3,624
)
 
(3,776
)
Free cash flow (Non-GAAP)
161,783

 
129,218

 
99,607



Other Non-GAAP Financial Measures

To supplement our consolidated financial statements presented in accordance with U.S. generally accepted accounting principles (“U.S. GAAP”), we consider certain financial measures that are not prepared in accordance with U.S. GAAP, including billings and free cash flow discussed above as well as non-GAAP gross margin, non-GAAP operating income, non-GAAP operating margin, non-GAAP operating expenses, and non-GAAP net income. These non-GAAP financial measures are not based on any standardized methodology prescribed by GAAP and are not necessarily comparable to similar measures presented by other companies.

We use these non-GAAP financial measures internally in analyzing our financial results and believe they are useful to investors, as a supplement to GAAP measures, in evaluating our ongoing operational performance and enhancing an overall understanding of our past financial performance, as they help illustrate underlying trends in our business that could otherwise be masked by the effect of the expenses that we exclude in these non-GAAP financial measures. Furthermore, we use many of these measures to establish budgets and operational goals for managing our business and evaluating our performance. We also believe that the use of these non-GAAP financial measures provides an additional tool for investors to use in comparing our recurring core business operating results over multiple periods with other companies in our industry, many of which present similar non-GAAP financial measures to investors.

These non-GAAP financial measures should not be considered in isolation from, or as a substitute for, financial information prepared in accordance with GAAP. There are a number of limitations related to the use of these non-GAAP financial measures versus the nearest GAAP equivalent of these financial measures. First, these non-GAAP financial measures exclude certain recurring, non-cash charges such as stock-based compensation expense, offset by patent settlement income. Stock-based compensation expense has been, and will continue to be for the foreseeable future, a significant recurring expense in our business and is an important part of our employees’ overall compensation. Second, the expenses that we exclude in our calculation of these non-GAAP financial measures may differ from the expenses, if any, that our peer companies may exclude when they report their results of operations. We compensate for these limitations by providing the nearest GAAP equivalents of these non-GAAP financial measures and describing these GAAP equivalents in the section entitled “—Results of Operations” below.


36

Table of Contents

Non-GAAP gross margin is gross margin as reported on our consolidated statements of operations, excluding the impact of stock-based compensation expense, which is a non-cash charge. Non-GAAP operating income is operating income, as reported on our consolidated statements of operations, excluding the impact of stock-based compensation expense and the income we received from a patent settlement. Non-GAAP operating margin is non-GAAP operating income divided by revenue. The following tables reconcile GAAP gross margin, operating income, and operating margin to non-GAAP gross margin, non-GAAP operating income, and non-GAAP operating margin for fiscal 2012, 2011 and 2010.

 
Fiscal Year
2012
 
2011
 
2010
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
($ amounts in 000’s)
Total revenue
533,639

 
 
 
433,576

 
 
 
324,696

 
 
GAAP gross profit and margin
386,219

 
72

 
319,978

 
74

 
239,490

 
74
Stock-based compensation expense
4,069

 
1

 
1,973

 

 
1,030

 
Non-GAAP gross profit and margin
390,288

 
73

 
321,951

 
74

 
240,520

 
74
GAAP operating income and margin
100,475

 
19

 
88,904

 
21

 
55,341

 
17
Stock-based compensation expense:
 
 
 
 
 
 
 
 
 
 
 
Cost of revenue
4,069

 
1

 
1,973

 

 
1,030

 
Research and development
9,226

 
1

 
4,691

 
1

 
2,339

 
1
Sales and marketing
12,793

 
2

 
9,325

 
3

 
3,810

 
1
General and administrative
4,602

 
1

 
3,026

 

 
2,136

 
1
Total stock-based compensation expense
30,690

 
5

 
19,015

 
4

 
9,315

 
3
Patent settlement income
(1,912
)
 

 
(1,911
)
 
(1
)
 

 
Non-GAAP operating income and margin
129,253

 
24

 
106,008

 
24

 
64,656

 
20

Non-GAAP operating expenses exclude the impact of stock-based compensation expense and the income from a patent settlement. The following tables reconcile GAAP operating expenses to non-GAAP operating expenses for fiscal 2012, 2011 and 2010.


37

Table of Contents

 
Fiscal Year
2012
 
2011
 
2010
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
($ amounts in 000’s)
Operating Expenses:
 
 
 
 
 
 
 
 
 
 
 
Research and development expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP research and development expenses
81,078

 
15

 
63,577

 
15

 
49,801

 
15

Stock-based compensation expense
(9,226
)
 
(1
)
 
(4,691
)
 
(1
)
 
(2,339
)
 
(1
)
Non-GAAP research and development expenses
71,852

 
14

 
58,886

 
14

 
47,462

 
14

Sales and marketing expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP sales and marketing expenses
179,155

 
33

 
145,532

 
34

 
111,968

 
34

Stock-based compensation expense
(12,793
)
 
(2
)
 
(9,325
)
 
(3
)
 
(3,810
)
 
(1
)
Non-GAAP sales and marketing expenses
166,362

 
31

 
136,207

 
31

 
108,158

 
33

General and administrative expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP general and administrative expenses
25,511

 
5

 
21,965

 
4

 
22,380

 
8

Stock-based compensation expense
(4,602
)
 
(1
)
 
(3,026
)
 

 
(2,136
)
 
(1
)
Patent settlement income
1,912

 

 
1,911

 
1

 

 

Non-GAAP general and administrative expenses
22,821

 
4

 
20,850

 
5

 
20,244

 
7

Total operating expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP operating expenses
285,744

 
53

 
231,074

 
53

 
184,149

 
57

Stock-based compensation expense
(26,621
)
 
(4
)
 
(17,042
)
 
(4
)
 
(8,285
)
 
(3
)
Patent settlement income
1,912

 

 
1,911

 
1

 

 

Non-GAAP operating expenses
261,035

 
49

 
215,943

 
50

 
175,864

 
54


Non-GAAP net income is net income, as reported in our consolidated statements of operations, excluding the impact of stock-based compensation expense and income from a patent settlement. The following tables reconcile GAAP net income as reported on our consolidated statements of operations to non-GAAP net income for fiscal 2012, 2011 and 2010.

 
Fiscal Year
2012
2011
2010
($ and share amounts in 000’s, except per share amounts)
Net Income:
 
 
 
 
 
GAAP net income
66,836

 
62,492

 
41,245

Stock-based compensation expense (1)
30,690

 
19,015

 
9,315

Patent settlement income (2)
(1,912
)
 
(1,911
)
 

Provision for income taxes (3)
38,160

 
29,581

 
15,096

Non-GAAP income before provision for income taxes
133,774

 
109,177

 
65,656

Tax adjustment (4)
(45,483
)
 
(36,028
)
 
(21,010
)
Non-GAAP net income
88,291

 
73,149

 
44,646

Non-GAAP net income per share—diluted
0.53

 
0.45

 
0.29

Shares used in per share calculation—diluted
166,329

 
163,781

 
156,406

____________________
(1)
Stock-based compensation expense is added back to GAAP net income to reconcile to non-GAAP income before taxes.
(2)
The patent settlement income is removed from GAAP net income to reconcile to non-GAAP income before taxes.
(3)
Provision for income taxes is our GAAP provision that must be added to GAAP net income to reconcile to non-GAAP income before taxes.

38

Table of Contents

(4)
Non-GAAP financial information is adjusted to achieve the overall effective tax rates of 34%, 33%, and 32%, on a pro forma basis, which could differ from the GAAP tax rate, for fiscal 2012, 2011, and 2010, respectively.

Components of Operating Results

Revenue

We derive our revenue from sales of our products and subscription and support services. In fiscal 2011, we recognized our revenue in accordance with the new revenue recognition accounting guidance which is discussed in further detail in “—Critical Accounting Policies and Estimates—Revenue Recognition” below. According to the new accounting standards, revenue is recognized when persuasive evidence of an arrangement exists, delivery has occurred, the price is fixed or determinable and collection is probable.

Our total revenue is comprised of the following:
 
Product revenue. Product revenue is generated from sales of our appliances. The substantial majority of our product revenue has been generated by our FortiGate line of appliances, and we do not expect this to change in the foreseeable future. Product revenue also includes revenue derived from sales of FortiManager, FortiAnalyzer, FortiSwitch, FortiMail, FortiDB, FortiWeb, FortiAP, FortiScan, FortiCarrier, FortiBalancer, FortiCache, FortiVoice, FortiBridge, FortiDDoS, FortiDNS, and FortiAuthenticator appliances, and our FortiClient and virtual domain, or VDOM, software. For arrangements which include end-customer acceptance criteria, revenue is recognized upon acceptance. We recognize product revenue on sales to distributors that have no general right of return and direct sales to end-customers upon shipment, once all other revenue recognition criteria have been met. Certain distributors that stock our products are granted stock rotation rights as well as rebates for sales of our products. The arrangement fee for this group of distributors is not fixed and determinable when products are shipped and revenue is therefore deferred and recognized upon sell-through. As a percentage of total revenue, we expect our product revenue may vary from quarter-to-quarter based on seasonal and cyclical factors discussed below under “—Quarterly Results of Operations” but generally may remain at relatively comparable levels or decline modestly over time, as services revenue becomes a larger portion of our business as our customers renew existing services contracts and we expand our customer base.


Services revenue. Services revenue is generated primarily from FortiCare technical support services for software updates, maintenance releases and patches, Internet access to technical content, telephone and Internet access to technical support personnel and hardware support, and FortiGuard security subscription services related to application control, antivirus, intrusion prevention, Web filtering, anti-spam and vulnerability management updates. We recognize revenue from subscription and support services over the service performance period. Our typical contractual support and subscription term is one year from the date of registration, although we do offer multi-year support and subscription contracts. We also generate a small portion of our revenue from professional services and training services, and we recognize this revenue as the services are provided. As a percentage of total revenue, we expect our services revenue to remain at comparable levels or increase as our customers renew existing service contracts and we expand our customer base. Our services revenue growth rate depends significantly on the growth of our customer base and the renewal of service contracts by our current customers.
 
Ratable and other revenue. Ratable and other revenue is generated from sales of our products and services in cases where the fair value of the services being provided cannot be separated from the value of the entire sale. In these cases, the value of the entire sale is deferred and recognized ratably over the service performance period. See “—Critical Accounting Policies and Estimates—Revenue Recognition.” Ratable and other revenue was formerly referred to as Ratable product and services revenue. In fiscal 2012 and 2011, this category includes a $3.7 million and a $2.6 million sale of previously-acquired patents, respectively. In fiscal 2012 and 2011, ratable and other revenue represented 2% and 4% of total revenue, respectively. Over time we expect this category to continue to decline due to the current revenue recognition rules, which allow us to use best estimate of selling price (“BESP”) in our allocation of arrangement consideration when vendor-specific objective evidence (“VSOE”) is not available.

Our total cost of revenue is comprised of the following:

Cost of product revenue. A substantial majority of the cost of product revenue consists of third-party manufacturing costs. Our cost of product revenue also includes product testing costs, write-offs for excess

39

Table of Contents

and obsolete inventory, royalty payments, amortization and any impairment of applicable acquired intangible assets, warranty costs, shipping and allocated facilities costs, stock-based compensation expense, and personnel costs associated with logistics and quality control. Personnel costs include cash-based personnel costs such as salaries, benefits and bonuses. Royalties reflect amounts related to the litigation with Trend Micro Incorporated, which was settled in December 2011.

Cost of services revenue. Cost of services revenue is primarily comprised of cash-based personnel costs associated with our FortiGuard Labs team and our technical support, professional services and training teams, as well as depreciation, supplies, data center, data communications, facility-related costs and stock-based compensation expense. We expect our cost of services revenue will increase in absolute dollars but remain comparable as a percentage of revenue as we continue to invest in subscription and support services to meet the needs of our growing customer base and service levels expected by our enterprise customers.

Cost of ratable and other revenue. Cost of ratable and other revenue is comprised primarily of deferred product costs and services-related costs.

Gross profit. Gross profit as a percentage of revenue, or gross margin, has been and will continue to be affected by a variety of factors, including the average sales price of our products, any excess inventory write-offs, product costs, the mix of products sold and the mix of revenue between products and services. We believe our overall gross margin for the near term will remain at levels comparable to that achieved in fiscal 2012.

Services revenue has historically increased as a percentage of total revenue since inception, and this trend has had a positive effect on our total gross margin given the higher services gross margins compared to product gross margins. During fiscal 2012 service margins decreased slightly from fiscal 2011 as we made the decision to invest in support services infrastructure that will allow us to both expand our base of enterprise customers and to support future growth and higher service levels to our existing enterprise customers.
 
Operating expenses. Our operating expenses consist of research and development, sales and marketing and general and administrative expenses. Personnel costs are the most significant component of operating expenses and consist of cash-based personnel costs such as salaries, benefits, bonuses, and sales commissions. They also include non-cash charges, specifically, stock-based compensation expense. We expect personnel costs to continue to increase in absolute dollars as we hire new employees.

Research and development. Research and development expense consists primarily of cash-based personnel costs. Additional research and development expenses include ASIC and system prototypes and certification-related expenses, depreciation of capital equipment, facility-related expenses and stock-based compensation expenses. The majority of our research and development is focused on both software development and the ongoing development of our hardware platform. We record all research and development expenses as incurred, except for capital equipment which is depreciated over time. Our development teams are primarily located in Canada, China, and the United States.

Sales and marketing. Sales and marketing expense is the largest component of our operating expenses and primarily consists of cash-based personnel costs including salary, benefits and commissions. Additional sales and marketing expenses include stock-based compensation expense, promotional and other marketing expenses, travel, depreciation of capital equipment and facility-related expenses. We intend to hire additional personnel focused on sales and marketing and expand our sales and marketing efforts worldwide in order to increase our presence in new geographic markets and enterprise verticals, add new customers and increase penetration within our existing customer base.

General and administrative. General and administrative expense consists of cash-based personnel costs as well as professional fees, stock-based compensation expense, depreciation of capital equipment and software, and facility-related expenses. General and administrative personnel include our executive, finance, human resources, information technology and legal organizations. Our professional fees principally consist of outside legal, auditing, accounting, information technology and other consulting costs.

Interest income. Interest income consists of income earned on our cash, cash equivalents and investments. We have historically invested our cash in money market funds, commercial paper, corporate debt securities, municipal bonds, certificates of deposit and term deposits, and U.S. government and agency debt securities.


40

Table of Contents

Other expense, net. Other expense, net consists primarily of foreign exchange and related hedging gains and losses. Foreign exchange gains and losses relate to foreign currency exchange re-measurement. The hedging gains and losses are related to our settled balance sheet hedges.

Provision for income taxes. We are subject to tax in the United States as well as other tax jurisdictions or countries in which we conduct business. Earnings from our non-U.S. activities are subject to income taxes in the local country which are generally lower than U.S. tax rates, and may be subject to U.S. income taxes. Our effective tax rate differs from the U.S. statutory rate primarily due to foreign income subject to different tax rates than the U.S., research and development tax credits, withholding taxes, nondeductible stock-based compensation expense and adjustments related to our intercompany transfer pricing.

The income tax provision for fiscal 2012 was comprised primarily of domestic income taxes, foreign income taxes and withholding taxes. Our effective tax rate approximates the U.S. federal statutory tax rates plus the impact of state taxes, research and development tax credits (when applicable), withholding tax, nondeductible stock-based compensation expense, foreign income subject to lower tax than the U.S., and adjustments related to intercompany transfer pricing.

Critical Accounting Policies and Estimates

Our discussion and analysis of our financial condition and results of operations are based upon our financial statements, which have been prepared in accordance with U.S. GAAP. These principles require us to make estimates and judgments that affect the reported amounts of assets, liabilities, revenue and expenses, cash flow and related disclosure of contingent assets and liabilities. Our estimates include those related to revenue recognition, stock-based compensation expense, valuation of inventory, warranty liabilities and accounting for income taxes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances. Actual results may differ from these estimates. To the extent that there are material differences between these estimates and our actual results, our future financial statements will be affected.

We believe that of our significant accounting policies, which are described in Note 1 to our consolidated financial statements included in Part II, Item 8 of this Annual Report on Form 10-K, the following accounting policies involve a greater degree of judgment and complexity. Accordingly, we believe these are the most critical to fully understand and evaluate our financial condition and results of operations.

Revenue Recognition

In October 2009, the FASB amended the accounting standards for multiple deliverable revenue arrangements to provide guidance on how the deliverables in an arrangement should be separated and eliminates the use of the residual method. The new accounting standards also require an entity to allocate revenue using the relative selling price method. The new accounting standards establish a hierarchy of evidence to determine the stand-alone selling price of a deliverable based on VSOE, third party evidence (“TPE”), and the BESP. If VSOE is available, it would be used to determine the selling price of a deliverable. If VSOE is not available, the entity would determine whether TPE is available. If so, TPE must be used to determine the selling price. If TPE is not available, then the BESP would be used. The new accounting standards amended industry specific revenue accounting guidance for software and software related transactions to exclude from its scope tangible products containing software components and non-software components that function together to deliver the product’s essential functionality.
 
This guidance did not generally change the units of accounting for our revenue transactions. Most non-software products and services qualify as separate units of accounting because they have value to the customer on a standalone basis and our revenue arrangements generally do not include a right of return relative to delivered products.
 
The majority of our products are hardware appliances containing software components that function together to provide the essential functionality of the product. Therefore, our hardware appliances are considered non-software deliverables and are no longer within the scope of industry-specific software revenue recognition guidance.

Our product revenue also includes software products that may operate on the hardware appliances, but are not considered essential to the functionality of the hardware and continue to be subject to the industry-specific software revenue recognition guidance. Certain of our software, when sold with our appliances, is considered essential to its functionality and as a result is no longer accounted for under industry-specific software revenue recognition guidance. However, this same software, if sold separately, is accounted for under industry-specific software revenue recognition guidance.
 

41

Table of Contents

For all transactions originating or materially modified after December 31, 2010, we recognize revenue in accordance with the new accounting standards. Certain arrangements with multiple deliverables may continue to have software deliverables that are subject to industry-specific software revenue recognition guidance, along with non-software deliverables that are subject to the new accounting standards. When a sales arrangement contains multiple elements, such as hardware appliances, software, customer support services, and/or professional services, we allocate revenue to each element based on the aforementioned selling price hierarchy. In multiple element arrangements where software is more-than-incidental, revenue is allocated to each separate unit of accounting for each of the non-software deliverables and to the software deliverables as a group using the relative selling prices of each of the deliverables in the arrangement based on the selling price hierarchy in the new revenue recognition accounting guidance.
     
VSOE of fair value for elements of an arrangement is based upon the normal pricing and discounting practices for those services when sold separately. In determining VSOE, we require that a substantial majority of the selling prices for a service fall within a reasonably narrow pricing range, generally evidenced by a substantial majority of such historical stand-alone transactions falling within a reasonably narrow range of the median rates. In addition, we consider major segments, geographies, customer classifications, and other variables in determining VSOE.

We are typically not able to determine TPE for our products or services. TPE is determined based on competitor prices for similar deliverables when sold separately. Generally, our go-to-market strategy differs from that of our peers and our offerings contain a significant level of differentiation such that the comparable pricing of products with similar functionality cannot be obtained. Furthermore, we are unable to reliably determine what similar competitor products’ selling prices are on a stand-alone basis.

For our hardware appliances, we use BESP as our selling price. For our support and other services, we generally use VSOE as our selling price. When we are unable to establish a selling price using VSOE for our support and other services, we use BESP in our allocation of arrangement consideration. The objective of BESP is to determine the price at which we would transact a sale if the product or service were sold on a stand-alone basis. We determine BESP for a product or service by considering multiple factors including, but not limited to, cost of products, gross margin objectives, pricing practices, geographies, customer classes and distribution channels. We review our BESP estimates on a quarterly basis to coincide with our VSOE review process.

We recognize revenue for our software sales based on industry-specific software revenue recognition guidance. Under industry-specific software revenue recognition guidance, we use the residual method to recognize revenue when a product agreement includes one or more elements to be delivered and VSOE of fair value for all undelivered elements exists. If evidence of the fair value of one or more undelivered elements does not exist, all revenue is generally deferred and recognized when delivery of those elements occurs or when fair value can be established. When the undelivered element for which we do not have VSOE of fair value is support, revenue for the entire arrangement is recognized ratably over the support period.

We derive revenue from sales of products, including appliances and software, and services, including subscription, support and other services. Our appliances include operating system software that is integrated into the appliance hardware and is deemed essential to its functionality. As a result, we account for revenue in accordance with the new revenue recognition accounting guidance and all related interpretations.

Revenue is recognized when all of the following criteria have been met:
 
Persuasive evidence of an arrangement exists. Binding contracts or purchase orders are generally used to determine the existence of an arrangement.
 
Delivery has occurred. Delivery occurs when we fulfill an order and title and risk of loss has been transferred or upon delivery of the service contract registration code.
 
The fee is fixed or determinable. We assess whether the fee is fixed or determinable based on the payment terms associated with the transaction. In the event payment terms differ from our standard business practices, the fees are deemed to be not fixed or determinable and revenue is recognized when the payments become due, provided the remaining criteria for revenue recognition have been met.

Collectability is probable. We assess collectability based primarily on creditworthiness as determined by credit checks and analysis, as well as payment history. Payment terms generally range from 30 to 90 days from invoice date.
  

42

Table of Contents


For arrangements which include end-customer acceptance criteria, revenue is recognized upon acceptance. We recognize product revenue on sales to distributors that have no general right of return and direct sales to end-customers upon shipment, once all other revenue recognition criteria have been met. Certain distributors that stock our products are granted stock rotation rights as well as rebates for sales of our products. The arrangement fee for this group of distributors is not fixed and determinable when products are shipped and revenue is therefore deferred and recognized upon sell-through. Substantially all of our products have been sold in combination with services, which consist of subscriptions and/or support. Subscription services provide access to our antivirus, intrusion prevention, web filtering, and anti-spam functionality. Support services include rights to unspecified software upgrades, maintenance releases and patches, telephone and Internet access to technical support personnel, and hardware support.

The subscription and support services start on the date the customer registers the appliance. The customer is then entitled to service for the stated contractual period beginning on the registration date.
 
We offer certain sales incentives to channel partners. We reduce revenue for estimates of sales returns and allowances. Additionally, in limited circumstances we may permit end-customers, distributors and resellers to return our products, subject to varying limitations, for a refund within a reasonably short period from the date of purchase. We estimate and record reserves for sales incentives and sales returns based on historical experience.

As of December 31, 2012, our allowance for sales returns was $2.3 million compared to $2.4 million as of December 31, 2011. If our allowance for sales returns had increased by 10%, or $0.2 million, our net revenue would have decreased by $0.2 million in fiscal 2012.

Stock-Based Compensation Expense

Employees Stock Options. We estimate the fair value of employee stock options using the Black-Scholes-Merton (“Black-Scholes”) pricing model. For all employee stock options, we recognize expense over the requisite service period using the straight-line method. Our option pricing model requires the input of highly subjective assumptions, including the expected stock price volatility, expected term, and forfeiture rate. Any changes in these highly subjective assumptions could significantly impact stock-based compensation expense.

Employee Stock Purchase Plan. We estimate the fair value of the rights to acquire stock under our employee stock purchase plan (“ESPP”) using the Black-Scholes pricing model. Our ESPP provides for consecutive six-month offering periods and we use our own historical volatility data in the valuation of ESPP shares.

Restricted Stock Units. We account for the fair value of restricted stock units (“RSUs”) awarded to employees and members of our board of directors using the closing market price of our common stock on the date of grant. RSUs are payable in shares of our common stock as the periodic vesting requirements are satisfied. RSUs will vest over a four-year period from the date of grant if the employees, non-employees, or directors, as applicable, remain with us for the duration of the vesting period.

Valuation of Inventory

Inventory is recorded at the lower of cost (using the first-in, first-out method) or market, after we give appropriate consideration to obsolescence and inventory in excess of anticipated future demand. In assessing the ultimate recoverability of inventory, we are required to make estimates regarding future customer demand, the timing of new product introductions, economic trends and market conditions. If the actual product demand is significantly lower than forecasted, we could be required to record additional inventory write-downs which would be charged to cost of product revenue. Any write-downs could have an adverse impact on our gross margins and profitability.

Warranty Liabilities

We generally provide a one-year warranty on hardware products and a 90-day warranty on software. A provision for estimated future costs related to warranty activities is charged to cost of product revenue based upon historical product failure rates and historical costs incurred in correcting product failures. If we experience an increase in warranty claims compared with our historical experience, or if the cost of servicing warranty claims is greater than expected, our gross margin could be adversely affected.

Accounting for Income Taxes

43

Table of Contents


We record income taxes using the asset and liability method, which requires the recognition of deferred tax assets and liabilities for the expected future tax consequences of events that have been recognized in our financial statements or tax returns. In estimating future tax consequences, generally all expected future events other than enactments or changes in the tax law or rates are considered. Valuation allowances are provided when necessary to reduce deferred tax assets to the amount expected to be realized.

We operate in various tax jurisdictions and are subject to audit by various tax authorities. We provide for tax contingencies whenever it is deemed more likely than not that a tax asset has been impaired or a tax liability has been incurred for events such as tax claims or changes in tax laws. Tax contingencies are based upon their technical merits, relevant tax law and the specific facts and circumstances as of each reporting period. Changes in facts and circumstances could result in material changes to the amounts recorded for such tax contingencies.

We account for uncertain tax positions in accordance with U.S. GAAP, which defines the confidence level that a tax position must meet in order to be recognized in the financial statements. The tax effects of a position are recognized only if it is “more likely than not” to be sustained based solely on its technical merits as of the reporting date. We consider many factors when evaluating and estimating our tax positions and tax benefits, which may require periodic adjustments and which may not accurately anticipate actual outcomes.

As part of the process of preparing our consolidated financial statements, we are required to estimate our taxes in each of the jurisdictions in which we operate. We estimate actual current tax exposure together with assessing temporary differences resulting from differing treatment of items, such as accruals and allowances not currently deductible for tax purposes. These differences result in deferred tax assets, which are included in our consolidated balance sheets. In general, deferred tax assets represent future tax benefits to be received when certain expenses previously recognized in our consolidated statements of operations become deductible expenses under applicable income tax laws, or loss or credit carryforwards are utilized.

In assessing the realizability of deferred tax assets, management considers whether it is more likely than not that some portion or all of the deferred tax assets will be realized. The ultimate realization of deferred tax assets is dependent upon the generation of future taxable income during the periods in which those temporary differences become deductible. We continue to assess the need for a valuation allowance on the deferred tax assets by evaluating both positive and negative evidence that may exist. Any adjustment to the net deferred tax asset valuation allowance would be recorded in the income statement for the period that the adjustment is determined to be required.

We make estimates and judgments about our future taxable income that are based on assumptions that are consistent with our plans and estimates. Should the actual amounts differ from our estimates, the amount of our tax expense and liabilities could be materially impacted.

Results of Operations

The following tables set forth our results of operations for the periods presented and as a percentage of our total revenue for those periods. The period-to-period comparison of financial results is not necessarily indicative of financial results to be achieved in future periods.


44

Table of Contents

 
Fiscal Year
 
2012
 
2011
 
2010
 
($ amounts in 000’s)
Consolidated Statement of Operations Data:
 
 
 
 
 
Revenue:
 
 
 
 
 
Product
248,948

 
197,408

 
135,140

Services
274,043

 
220,268

 
172,046

Ratable and other revenue
10,648

 
15,900

 
17,510

Total revenue
533,639

 
433,576

 
324,696

Cost of revenue
 
 
 
 
 
Product
93,971

 
73,201

 
51,944

Services
50,682

 
35,486

 
26,967

Ratable and other revenue
2,767

 
4,911

 
6,295

Total cost of revenues
147,420

 
113,598

 
85,206

Gross profit:
 
 
 
 
 
Product
154,977

 
124,207

 
83,196

Services
223,361

 
184,782

 
145,079

Ratable and other revenue
7,881

 
10,989

 
11,215

Total gross profit
386,219

 
319,978

 
239,490

Operating expenses:
 
 
 
 
 
Research and development
81,078

 
63,577

 
49,801

Sales and marketing
179,155

 
145,532

 
111,968

General and administrative
25,511

 
21,965

 
22,380

Total operating expenses
285,744

 
231,074

 
184,149

Operating income
100,475

 
88,904

 
55,341

Interest income
5,006

 
3,523

 
1,815

Other expense, net
(485
)
 
(354
)
 
(815
)
Income before income taxes
104,996

 
92,073

 
56,341

Provision for income taxes
38,160

 
29,581

 
15,096

Net income
66,836

 
62,492

 
41,245




45

Table of Contents

 
Fiscal Year
2012
 
2011
 
2010
(as % of revenue)
Revenue:
 
 
 
 
 
Product
47

 
45

 
42

Services
51

 
51

 
53

Ratable and other revenue
2

 
4

 
5

Total revenue
100

 
100

 
100

Total cost of revenue
28

 
26

 
26

Total gross profit
72

 
74

 
74

Operating expenses:
 
 
 
 
 
Research and development
15

 
15

 
15

Sales and marketing
33

 
34

 
34

General and administrative
5

 
4

 
8

Total operating expenses
53

 
53

 
57

Operating income
19

 
21

 
17

Interest income
1

 
1

 
1

Other expense, net

 

 

Income before income taxes
20

 
22

 
18

Provision for income taxes
7

 
7

 
5

Net income
13

 
15

 
13


Fiscal Years 2012 and 2011

Revenue
 
 
Fiscal Year
 
 
 
 
2012
 
2011
 
 
 
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Change
 
% Change
($ amounts in 000’s)
Revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
248,948

 
47
 
197,408

 
45
 
51,540

 
26

Services
274,043

 
51
 
220,268

 
51
 
53,775

 
24

Ratable and other revenue
10,648

 
2
 
15,900

 
4
 
(5,252
)
 
(33
)
Total revenue
533,639

 
100
 
433,576

 
100
 
100,063

 
23

Revenue by geography:
 
 
 
 
 
 
 
 
 
 
 
Americas
217,056

 
41
 
172,494

 
40
 
44,562

 
26

Europe, Middle East and Africa (“EMEA”)
184,175

 
35
 
152,385

 
35
 
31,790

 
21

Asia Pacific and Japan (“APAC”)
132,408

 
24
 
108,697

 
25
 
23,711

 
22

Total revenue
533,639

 
100
 
433,576

 
100
 
100,063

 
23


Total revenue increased by $100.1 million, or 23%, in fiscal 2012 compared to fiscal 2011. The Americas region contributed the largest portion of our revenue growth on a percentage basis, while the EMEA and APAC regions both demonstrated growth of over 20%. Product revenue increased by $51.5 million, or 26%, compared to fiscal 2011. The increase in product revenue was primarily driven by greater sales volume in our FortiGate product family due to increased demand across all product categories from our entry-level and mid-range products for smaller enterprises and branch deployments to our high-end products for large enterprise and service provider customers. Services revenue increased by $53.8 million, or 24%, in fiscal 2012 compared to fiscal 2011 due to the recognition of revenue from our growing deferred revenue balance consisting of subscription and support contracts sold to a larger customer base. The decrease in ratable and other revenue of $5.3 million was primarily due to the continuing decline in amortization of ratable revenue. Ratable and other revenue for fiscal

46

Table of Contents

2012 included a $3.7 million sale of previously-acquired patents, which was an increase from a $2.6 million sale of previously-acquired patents in fiscal 2011. Excluding the decline in ratable and other revenue, product and services revenue combined together increased by 25% compared to fiscal 2011.

Cost of revenue and gross margin
 
 
Fiscal Year
 
 
 
 
2012
 
2011
 
Change
 
% Change
($ amounts in 000’s)
Cost of revenue:
 
 
 
 
 
 
 
Product
93,971

 
73,201

 
20,770

 
28

Services
50,682

 
35,486

 
15,196

 
43

Ratable and other revenue
2,767

 
4,911

 
(2,144
)
 
(44
)
Total cost of revenue
147,420

 
113,598

 
33,822

 
30

Gross margin (%):
 
 
 
 
 
 
 
Product
62.3

 
62.9

 
(0.6
)
 
 
Services
81.5

 
83.9

 
(2.4
)
 
 
Ratable and other revenue
74.0

 
69.1

 
4.9

 
 
Total gross margin
72.4

 
73.8

 
(1.4
)
 
 

Total gross margin decreased by 1.4 percentage points in fiscal 2012 compared to fiscal 2011, as both product and services gross margins declined. Product gross margin decreased by 0.6 percentage points in fiscal 2012 compared to fiscal 2011 primarily related to a higher quantity of mid-range products purchased by a large retail customer with lower than average gross margins. We also experienced the impact from cost increases related to higher material costs incurred to support higher density storage requirements for our recent release of FortioOS 5.0, our next generation operating system. From time to time, we have experienced sales of previously reserved inventory. During fiscal 2012, we experienced a positive impact to gross margin of 0.2 percentage points due to the sale of fully reserved inventory compared to a positive impact to gross margin of 0.4 percentage points in the prior year. Services gross margin decreased by 2.4 percentage points during fiscal 2012 primarily due to our continued investments in our technical support organization to accommodate our expanding customer base and higher service level expectations from our enterprise customers. In addition, we experienced growth in our professional consulting services which have lower gross margins than our support and subscription businesses. Cost of services revenue increased by $15.2 million primarily due to an $8.6 million increase in cash-based personnel costs related to headcount increases, a $1.9 million increase in stock-based compensation expense, a $1.8 million increase in costs associated with extended support contracts, a $0.7 million increase in occupancy-related costs, a $0.5 million increase in professional services expenses, a $0.5 million increase in travel expenses, and a $1.1 million increase in depreciation and other expenses.

Operating expenses
 
 
Fiscal Year
 
Change
 
% Change
2012
 
2011
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
($ amounts in 000’s)
Operating expenses:
 
 
 
 
 
 
 
 
 
 
 
Research and development
81,078

 
15
 
63,577

 
15
 
17,501

 
28
Sales and marketing
179,155

 
33
 
145,532

 
34
 
33,623

 
23
General and administrative
25,511

 
5
 
21,965

 
4
 
3,546

 
16
Total operating expenses
285,744

 
53
 
231,074

 
53
 
54,670

 
24

Research and development expense

Research and development expense increased by $17.5 million, or 28%, in fiscal 2012 compared to fiscal 2011 primarily due to an increase of $9.3 million in cash-based personnel costs as a result of increased headcount to support the development of new products and continued enhancements of our existing products. In addition, we incurred higher stock-

47

Table of Contents

based compensation expense of $4.5 million, product development expenses of $1.2 million, depreciation expense of $0.9 million, supplies expense of $0.6 million, occupancy-related costs of $0.4 million, and other expenses of $0.5 million. The increase in research and development expense was partially offset by a 2% year-over-year increase in the U.S. dollar exchange rate against the CAD, as a majority of our research and development personnel are located in Canada. We intend to continue to invest in our research and development organization but expect research and development expense as a percentage of revenue to remain at comparable levels in fiscal 2013.

Sales and marketing expense

Sales and marketing expense increased by $33.6 million, or 23%, in fiscal 2012 compared to fiscal 2011, primarily due to an increase of $21.6 million in cash-based personnel costs as we continued to increase our sales headcount in order to expand our global footprint. In addition, we incurred increases in stock-based compensation expense of $3.5 million, marketing-related expenses of $3.2 million, depreciation expenses of $1.6 million, occupancy-related costs of $0.7 million, travel expenses of $1.0 million, supplies expense of $0.4 million, and other expenses of $1.2 million. As a percentage of revenue, sales and marketing expenses remained flat as we accelerated the investment in our sales force during the past year to support future growth. The increase in sales and marketing expense was partially offset by a 9% year-over-year increase in the U.S. dollar exchange rate against the Euro. We intend to continue to make investments in our sales resources and infrastructure, which are critical to support sustainable growth but expect sales and marketing expense as a percentage of revenue to remain at comparable levels in fiscal 2013.

General and administrative expense

General and administrative expense increased by $3.5 million, or 16%, in fiscal 2012 compared to fiscal 2011. Stock-based compensation expense increased by $1.6 million and cash-based personnel costs increased by $0.7 million. In addition, we incurred $1.0 million of litigation settlement expense. We expect general and administrative expense as a percentage of revenue to remain at comparable levels in fiscal 2013.

Interest income and other expense, net
 
 
Fiscal Year
 
 
 
 
2012
 
2011
 
Change
 
% Change
($ amounts in 000’s)
Interest income
5,006

 
3,523

 
1,483

 
42
Other expense, net
(485
)
 
(354
)
 
(131
)
 
37

The $1.5 million increase in interest income in fiscal 2012 compared to fiscal 2011 was primarily due to interest earned on higher invested balances of cash, cash equivalents and investments. The change in other expense, net, for fiscal 2012 when compared to fiscal 2011, was the result of higher foreign exchange losses.

Provision for income taxes
 
 
Fiscal Year
 
Change
 
% Change
2012
 
2011
 
($ amounts in 000’s)
Provision for income taxes
38,160

 
29,581

 
8,579

 
29
Effective tax rate (%)
36

 
32

 
4

 
 
Our effective tax rate was 36% for fiscal 2012, compared with an effective tax rate of 32% for fiscal 2011. The provision for income taxes for fiscal 2012 was comprised primarily of federal, state and foreign income taxes as well as the inclusion of stock option benefits, which affected the transfer pricing calculations between some of our foreign subsidiaries. The 2011 effective tax rate was impacted by the inclusion of stock option benefits, which affected the transfer pricing calculations between some of our foreign subsidiaries, as well as research and development tax credit. The increase in the provision for income taxes for fiscal 2012 compared to fiscal 2011 was primarily due to an increase in profits subject to U.S. tax, a decrease in stock option benefits, and their corresponding impact on the transfer pricing calculations between some of our foreign subsidiaries, and the reduction in U.S. Federal Research and Development Tax Credit that was reinstated in fiscal 2013, but not recognized in fiscal 2012.

48

Table of Contents


During January 2013, the U.S. Federal Research and Development Tax Credit was reinstated retroactively to fiscal 2012. The U.S. Federal Research and Development Tax Credit benefit will be recorded in the first quarter of fiscal 2013, which is the period of enactment. The State of California will be conducting an audit of our income tax returns for fiscal 2010 and fiscal 2011. We do not currently expect a material impact on our results of operations to arise from this audit that would have a detrimental impact on our income tax liability.

Fiscal Years 2011 and 2010

Revenue
 
 
Fiscal Year
 
Change
 
% Change
2011
 
2010
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
($ amounts in 000’s)
Revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
197,408

 
45
 
135,140

 
42
 
62,268

 
46

Services
220,268

 
51
 
172,046

 
53
 
48,222

 
28

Ratable and other revenue
15,900

 
4
 
17,510

 
5
 
(1,610
)
 
(9
)
Total revenue
433,576

 
100
 
324,696

 
100
 
108,880

</