Company profile

Ticker
NLOK
Exchange
CEO
Vincent Pilette
Employees
Incorporated
Location
Fiscal year end
Former names
SYMANTEC CORP
SEC CIK
IRS number
770181864

NLOK stock data

(
)

Calendar

6 Aug 20
27 Sep 20
3 Apr 21

News

Quarter (USD) Jul 20 Jan 20 Oct 19 Jul 19
Revenue
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS
Annual (USD) Apr 20 Mar 19 Mar 18 Mar 17
Revenue
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS

Financial data from company earnings reports.

Date Owner Security Transaction Code 10b5-1 $Price #Shares $Value #Remaining
10 Sep 20 Silver Lake 2.00% Convertible Senior Notes due 2022 Common Stock Sell Dispose S No 299516944.43 - 250M -
10 Sep 20 Humphrey David 2.000% Convertible Senior Notes due 2022 Common Stock Sell Dispose S No 439950473.12 367,216,000 161556.85T -
17 Aug 20 Matthew Charles Brown Common Stock Sell Dispose S No 22.94 531 12.18K 114,675
11 Aug 20 Matthew Charles Brown Common Stock Sell Dispose S No 22.627 31,598 714.97K 83,077
10 Aug 20 Natalie Marie Derse Common Stock Grant Aquire A No 0 103,912 0 103,912
0.0% owned by funds/institutions
13F holders
Current Prev Q Change
Total holders 1 2 -50.0%
Opened positions 1 1
Closed positions 2 3 -33.3%
Increased positions 0 0
Reduced positions 0 0
13F shares
Current Prev Q Change
Total value 5K 0 NEW
Total shares 250 0 NEW
Total puts 0 0
Total calls 0 0
Total put/call ratio
Largest owners
Shares Value Change
Edge Wealth Management 250 $5K NEW
Largest transactions
Shares Bought/sold Change
Edge Wealth Management 250 +250 NEW
Proequities 0 0
IFP Advisors 0 0

Financial report summary

?
Risks
  • RISKS RELATED TO OUR BUSINESS STRATEGY AND INDUSTRY
  • The COVID-19 pandemic has affected how we are operating our business, and the duration and extent to which this will impact our future results of operations and overall financial performance remains uncertain.
  • If we are unable to develop new and enhanced solutions, or if we are unable to continually improve the performance, features, and reliability of our existing solutions, our competitive position may weaken, and our business and operating results could be adversely affected.
  • We operate in a highly competitive environment, and our competitors may gain market share in the markets for our solutions that could adversely affect our business and cause our revenues to decline.
  • We may need to change our pricing models to compete successfully.
  • If we fail to manage our sales and distribution channels effectively, or if our partners choose not to market and sell our solutions to their customers, our operating results could be adversely affected.
  • Our revenue and operating results depend significantly on our ability to retain our existing customers, and add new customers, and any decline in our retention rates or failure to add new customers will harm our future revenue and operating results.
  • Our acquisitions and divestitures create special risks and challenges that could adversely affect our financial results.
  • RISKS RELATED TO THE BROADCOM SALE
  • We may not achieve the intended benefits of the Broadcom sale.
  • Any cost reduction initiatives that we undertake may not deliver the results we expect, and these actions may adversely affect our business.
  • If we are unsuccessful at executing the transition of the Enterprise Security Business assets from the Broadcom sale, our business and results of operations may be adversely affected and our ability to invest in and grow our business could be limited.
  • Changes in industry structure and market conditions could lead to charges related to discontinuance of certain of our products or businesses and asset impairments.
  • RISKS RELATED TO OUR OPERATIONS
  • If we are unable to attract and retain qualified employees, lose key personnel, fail to integrate replacement personnel successfully, or fail to manage our employee base effectively, we may be unable to develop new and enhanced solutions, effectively manage or expand our business, or increase our revenues.
  • Our inability to successfully recover from a disaster or other business continuity event could impair our ability to deliver our products and services and harm our business.
  • RISKS RELATED TO OUR SOLUTIONS
  • Our solutions, systems, and website and the data on these sources may be subject to intentional disruption that could materially harm to our reputation and future sales.
  • We collect, use, disclose, store, or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments, and our actual or perceived failure to comply with such laws and commitments could harm our business.
  • LEGAL AND COMPLIANCE RISKS
  • Matters relating to or arising from our completed Audit Committee Investigation, including regulatory investigations and proceedings, litigation matters, and potential additional expenses, may adversely affect our business and results of operations.
  • Our solutions are highly regulated, which could impede our ability to market and provide our solutions or adversely affect our business, financial position, and results of operations.
  • If we do not protect our proprietary information and prevent third parties from making unauthorized use of our products and technology, our financial results could be harmed.
  • From time to time we are a party to lawsuits and investigations, which typically require significant management time and attention and result in significant legal expenses, and which could negatively impact our business, financial condition, results of operations, and cash flows.
  • Third parties claiming that we infringe their proprietary rights could cause us to incur significant legal expenses and prevent us from selling our products.
  • RISKS RELATED TO OUR FINANCIAL RESULTS
  • Changes to our effective tax rate could increase our income tax expense and reduce (increase) our net income (loss), cash flows and working capital.
  • RISKS RELATED TO OUR LIQUIDITY AND INDEBTEDNESS
  • We cannot predict our future capital needs, and we may be unable to obtain financing, which could have a material adverse effect on our business, results of operations, and financial condition.
  • Failure to maintain our credit ratings could adversely affect our liquidity, capital position, ability to hedge certain financial risks, borrowing costs, and access to capital markets.
  • There are risks associated with our outstanding and future indebtedness that could adversely affect our financial condition.
  • Our existing credit agreements impose operating and financial restrictions on us.
  • Stock symbol and stockholders of record
  • Repurchases of our equity securities
  • Fiscal calendar and basis of presentation
  • CRITICAL ACCOUNTING POLICIES AND ESTIMATES
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Net revenues by geographic region
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Non-operating income (expense), net
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Provision for income taxes
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • LIQUIDITY, CAPITAL RESOURCES AND CASH REQUIREMENTS
  • Sale of equity method investment
  • Divestiture of Enterprise Security business
  • Sale of ID Analytics solutions
  • Cash from operating activities
  • Cash from investing activities
  • Cash from financing activities
  • Foreign currency exchange rate risk
  • a) Evaluation of Disclosure Controls and Procedures
  • b) Management’s Report on Internal Control over Financial Reporting
  • c) Changes in Internal Control over Financial Reporting
  • d) Limitations on Effectiveness of Controls
  • CONSOLIDATED BALANCE SHEETS
  • CONSOLIDATED STATEMENTS OF COMPREHENSIVE INCOME (LOSS)
  • CONSOLIDATED STATEMENTS OF STOCKHOLDERS’ EQUITY
Content analysis ?
Positive
Negative
Uncertain
Constraining
Legalese
Litigous
Readability
H.S. freshman Good
New words: affiliate, aimed, alter, analytical, border, breadth, card, Checkmark, circumstance, closure, compromise, concept, constantly, Deficit, DER, Derse, deteriorate, deterioration, diminished, discovery, discretionary, dissatisfaction, distancing, economy, efficacy, embolden, encounter, error, expert, expertise, facilitate, factor, furniture, guarantee, inadvertent, indirectly, infrequently, isolation, Junior, justified, LockMan, Logo, macroeconomic, malfeasance, malfunction, mediation, membership, minimize, moved, Natalie, National, pandemic, phase, precautionary, Prejudgment, prevail, prolonged, promptly, prospectively, publicly, quality, reactive, rebuild, recession, recipient, remediation, remedy, remote, Restated, restore, Secretary, sequestered, Sequestration, shutdown, signature, situation, small, social, society, sought, subscribed, substitute, tarnish, temporary, transmission, transmit, travel, turn, unavailable, validity, winding, worsening, Writ
Removed: advanced, agreed, alert, Alleviating, amortized, anniversary, appeal, appealed, assume, attempting, automate, begin, broader, buying, capitalized, carrier, cessation, channel, classification, Clearlake, climate, collateralized, comparative, compensatory, component, constrain, Corporation, created, delivered, detect, detection, determinable, determined, DigiCert, disaggregated, discovered, discrete, dispute, downsize, drought, earlier, element, emergence, enabling, expedient, familiar, feature, February, firm, flooding, globe, Group, headcount, hypothetical, implicit, inception, inclusion, insufficient, Integrated, intensity, introduce, introduced, investor, lag, leader, leased, legacy, litigating, maintenance, manufacturer, mobility, motivating, obsolescence, pace, package, Parent, PC, persistent, planned, practical, prepaid, President, private, prominent, purpose, readily, receiving, rehearing, rely, requested, residual, ROU, serve, shift, single, site, stability, sublease, subsequent, supporting, TA, taxpayer, testing, thereto, today, transformation, undetected, unify, unreimbursed, vacate, valuable, velocity, vested, volume, warranty, weakening, world

Patents

GRANT
Utility
Systems and methods for preventing sensitive information exposure based on a surrounding audience
22 Sep 20
The disclosed computer-implemented method for preventing sensitive information exposure based on a surrounding audience may include (1) detecting, from one or more communication devices, surrounding audience data associated with an audience presentation on a presentation device, the audience presentation including sensitive information and non-sensitive information, (2) determining an audience profile based on the surrounding audience data, the audience profile identifying one or more unintended audience members in the surrounding audience, (3) assigning an information exposure policy to the audience presentation based on the audience profile, and (4) performing a security action to enforce the information exposure policy on the presentation device such that the sensitive information is prevented from being exposed to the surrounding audience during the audience presentation.
GRANT
Utility
Systems and methods for controlling access
22 Sep 20
The disclosed computer-implemented method for controlling access may include (i) installing on a personal mobile device a mobile device application that enforces an authorization security policy for protected premises, (ii) checking, by the mobile device application and in response to installing the mobile device application, whether the personal mobile device satisfies a condition of the authorization security policy, (iii) granting authorization for the personal mobile device to function as an access card based on a result of checking whether the personal mobile device satisfies the condition of the authorization security policy, and (iv) enforcing an additional access security policy on the personal mobile device after granting authorization for the personal mobile device to function as the access card.
GRANT
Utility
Identifying evidence of attacks by analyzing log text
22 Sep 20
Log text is encoded into a low dimensional feature vector.
GRANT
Utility
Detecting and preventing phishing phone calls through verified attribute analysis
15 Sep 20
A method for detecting and preventing phishing phone calls through verified attribute analysis is described.
GRANT
Utility
Systems and methods for identifying unsolicited communications on a computing device
15 Sep 20
The disclosed computer-implemented method for identifying unsolicited communications on a computing device may include a computing device receiving a communication from an unrecognized phone number; obtaining the unrecognized phone number from the communication; obtaining classification data associated with the unrecognized phone number based on categories of other computing devices contacted by the unrecognized phone number; obtaining a category associated with a phone number of the computing device; determining that the communication is an unsolicited communication based on the classification data and the category associated with the phone number of the computing device; and in response to determining that the communication is unsolicited, performing a security action to manage interactions with the communication from the unrecognized phone number.