Loading...
Docoh

NortonLifeLock (NLOK)

NortonLifeLock Inc. is a global leader in consumer Cyber Safety, protecting and empowering people to live their digital lives safely. It is the consumer's trusted ally in an increasingly complex and connected world.

Company profile

Ticker
NLOK
Exchange
CEO
Vincent Pilette
Employees
Incorporated
Location
Fiscal year end
Former names
SYMANTEC CORP
SEC CIK
Subsidiaries
Blue Coat Systems Holdings LLC • LifeLock, Inc. • NortonLifeLock Canada Corporation • Norton LifeLock Ireland Holdings Unlimited Company • NortonLifeLock Ireland Limited • NortonLifeLock Japan G.K. • NortonLifeLock Japan K.K. • Norton LifeLock Jersey Ltd • NortonLifeLock Security Holdings Inc. • NortonLifeLock Singapore Pte. Limited ...
IRS number
770181864

NLOK stock data

Analyst ratings and price targets

Last 3 months

Calendar

4 Feb 22
20 May 22
1 Apr 23
Quarter (USD) Dec 21 Oct 21 Jul 21 Apr 21
Revenue
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS
Annual (USD) Apr 21 Apr 20 Mar 19 Mar 18
Revenue
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS
Date Owner Security Transaction Code Indirect 10b5-1 $Price #Shares $Value #Remaining
10 May 22 Natalie Marie Derse Common Stock Grant Acquire A No No 0 49,241 0 247,960
10 May 22 Ko Bryan Seuk Common Stock Grant Acquire A No No 0 45,454 0 363,037
2 May 22 Ko Bryan Seuk Common Stock Payment of exercise Dispose F No No 25.39 71,200 1.81M 317,583
2 May 22 Ko Bryan Seuk Common Stock Option exercise Acquire M No No 25.39 150,132 3.81M 388,783
2 May 22 Ko Bryan Seuk RSU Common Stock Grant Acquire A No No 0 150,132 0 150,132
2 May 22 Ko Bryan Seuk RSU Common Stock Option exercise Dispose M No No 0 150,132 0 0
1 May 22 Pilette Vincent Common Stock Payment of exercise Dispose F No No 25.04 23,115 578.8K 938,057
1 May 22 Natalie Marie Derse Common Stock Payment of exercise Dispose F No No 25.04 6,299 157.73K 198,719
0.1% owned by funds/institutions
13F holders Current Prev Q Change
Total holders 1 1
Opened positions 0 0
Closed positions 0 2 EXIT
Increased positions 0 0
Reduced positions 1 0 NEW
13F shares Current Prev Q Change
Total value 11.21M 11.2M +0.1%
Total shares 422.7K 431K -1.9%
Total puts 0 0
Total calls 0 0
Total put/call ratio
Largest owners Shares Value Change
Mn Services Vermogensbeheer B.V. 422.7K $11.21M -1.9%
Largest transactions Shares Bought/sold Change
Mn Services Vermogensbeheer B.V. 422.7K -8.3K -1.9%

Financial report summary

?
Risks
  • The COVID-19 pandemic has affected how we are operating our business, and the duration and extent to which this will impact our future results of operations and overall financial performance remains uncertain.
  • We operate in a highly competitive environment, and our competitors may gain market share in the markets for our solutions.
  • We may need to change our pricing models to compete successfully.
  • If we fail to manage our sales and distribution channels effectively, or if our partners choose not to market and sell our solutions to their customers, our operating results could be adversely affected.
  • Our revenue and operating results depend significantly on our ability to retain our existing customers, convert existing non-paying customers to paying customers, and add new customers.
  • Our acquisitions and divestitures create special risks and challenges that could adversely affect our financial results.
  • We may fail to consummate the Proposed Merger with Avast plc, may not consummate the Proposed Merger on the expected terms, or may not achieve the anticipated benefits.
  • Changes in industry structure and market conditions could lead to charges related to discontinuance of certain of our products or businesses and asset impairments.
  • We are dependent upon Broadcom for certain engineering and threat response services, which are critical to our products and business.
  • Our future success depends on our ability to attract and retain personnel in a competitive marketplace.
  • Our inability to successfully recover from a disaster or other business continuity event could impair our ability to deliver our products and services and harm our business.
  • If we fail to offer high-quality customer support, our customer satisfaction may suffer and have a negative impact on our business and reputation.
  • Our international operations involve risks that could increase our expenses, adversely affect our operating results, and require increased time and attention of our management.
  • Our solutions, systems, websites and the data on these sources may be subject to intentional disruption that could materially harm to our reputation and future sales.
  • Our solutions are complex and operate in a wide variety of environments, systems and configurations, which could result in failures of our solutions to function as designed.
  • Negative publicity regarding our brand, solutions and business could harm our competitive position.
  • We collect, use, disclose, store, or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments.
  • Matters relating to or arising from our completed Audit Committee Investigation, including regulatory investigations and proceedings, litigation matters, and potential additional expenses, may adversely affect our business and results of operations.
  • Our solutions are highly regulated, which could impede our ability to market and provide our solutions or adversely affect our business, financial position, and results of operations.
  • If we do not protect our proprietary information and prevent third parties from making unauthorized use of our products and technology, our financial results could be harmed.
  • From time to time we are a party to lawsuits and investigations, which typically require significant management time and attention and result in significant legal expenses.
  • Third parties claiming that we infringe their proprietary rights could cause us to incur significant legal expenses and prevent us from selling our products.
  • Some of our products contain “open source” software, and any failure to comply with the terms of one or more of these open source licenses could negatively affect our business.
  • There are risks associated with our outstanding and future indebtedness that could adversely affect our financial condition.
  • The elimination of LIBOR after June 2023 may affect our financial results.
  • Our term loan and revolving credit facility agreement impose operating and financial restrictions on us.
  • Fluctuations in our quarterly financial results have affected the trading price of our outstanding securities in the past and could affect the trading price of our outstanding securities in the future.
  • Changes to our effective tax rate could increase our income tax expense and reduce (increase) our net income (loss), cash flows and working capital.
Management Discussion
  • Note: Percentages may not add due to rounding.
  • Net revenues increased $63 million, due to a $40 million increase in sales of our consumer security products and a $23 million increase in sales of our identity and information protection products. This was driven by an increase in our direct customer count year-over-year and revenue attributable to Avira, which was acquired during the fourth quarter of fiscal 2021.
  • Net revenues increased $201 million, due to a $134 million increase in sales of our consumer security products and a $67 million increase in sales of our identity and information protection products. This was driven by an increase in our direct customer count year-over-year and revenue attributable to Avira, which was acquired during the fourth quarter of fiscal 2021.

Content analysis

?
Positive
Negative
Uncertain
Constraining
Legalese
Litigous
Readability
H.S. freshman Good
New words: Antitrust, Apache, deadline, discovered, exploit, exploitation, exploited, Foundation, HSR, library, newly, occupancy, RCE, rendered, repriced, suit, waiting, web
Removed: permanent

Patents

Utility
Employing SNI hostname extraction to populate a reverse DNS listing to protect against potentially malicious domains
17 May 22
Server Name Indication (SNI) hostname extraction to populate a reverse Domain Name System (DNS) listing to protect against potentially malicious domains.
Utility
Systems and methods for securing communications
3 May 22
The disclosed computer-implemented method for securing communications may include (i) establishing an overlay network within a publicly available on-demand cloud computing platform, the overlay network enabling secure communications between devices by maintaining within the overlay network a services mapping table that defines access rights to at least one of shared data or services, and (ii) transferring data, by the overlay network acting as an intermediary, from a first device that has securely connected to the overlay network to a second device that has securely connected to the overlay network, in accordance with the access rights defined in the services mapping table.
Utility
Systems and methods for protecting users
26 Apr 22
The disclosed computer-implemented method for protecting users may include (i) intercepting, through a cloud-based security proxy service, network traffic originating from a mobile application at a mobile device connected to a local area network protected by the cloud-based security proxy service, (ii) detecting, by the cloud-based security proxy service, a threat indicator indicated by the mobile application, and (iii) modifying the network traffic originating from the mobile application at the mobile device by applying, by the cloud-based security proxy service based on detecting the threat indicator indicated by the mobile application, a security policy to protect the local area network from a candidate threat corresponding to the threat indicator.
Utility
Identifying and protecting against surveillance apps installed on client devices
5 Apr 22
Identifying and protecting against malicious apps installed on client devices.
Utility
Systems and methods for restoring applications
29 Mar 22
The disclosed computer-implemented method for restoring applications may include (i) detecting an indication to restore a previous version of an application installed within a mobile operating system environment, (ii) retrieving the previous version of the application from a protected location within the mobile operating system environment where a sandboxing security component stored the previous version of the application, and (iii) executing the previous version of the application within a security sandbox managed by the sandboxing security component.