Docoh
Loading...

NLOK NortonLifeLock

NortonLifeLock, Inc. engages in the provision of security, storage, and systems management solutions. It operates through Enterprise Security and Consumer Digital Safety segments. The Enterprise Security segment focuses on the provision of solutions to protect organizations so they can securely conduct business while leveraging new platforms and data. The Consumer Digital Safety segment provides solutions to protect information, devices, networks and the identities of consumers. The company was founded by Gary Hendrix in April 1982 and is headquartered in Tempe, AZ.

Company profile

Ticker
NLOK
Exchange
CEO
Vincent Pilette
Employees
Incorporated
Location
Fiscal year end
Former names
SYMANTEC CORP
SEC CIK
IRS number
770181864

NLOK stock data

(
)

Calendar

5 Feb 21
18 Apr 21
2 Apr 22
Quarter (USD)
Jan 21 Oct 20 Jul 20 Apr 20
Revenue
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS
Annual (USD)
Apr 20 Mar 19 Mar 18 Mar 17
Revenue
Cost of revenue
Operating income
Operating margin
Net income
Net profit margin
Cash on hand
Change in cash
Diluted EPS

Financial data from company earnings reports.

Cash burn rate (estimated) Burn method: Change in cash Burn method: Operating income/loss Burn method: FCF (opex + capex)
Last Q Avg 4Q Last Q Avg 4Q Last Q Avg 4Q
Cash on hand (at last report) 1.05B 1.05B 1.05B 1.05B 1.05B 1.05B
Cash burn (monthly) (positive/no burn) 966.92M (positive/no burn) (positive/no burn) (positive/no burn) 118M
Cash used (since last report) n/a 3.49B n/a n/a n/a 425.46M
Cash remaining n/a -2.44B n/a n/a n/a 620.54M
Runway (months of cash) n/a -2.5 n/a n/a n/a 5.3

Beta Read what these cash burn values mean

Date Owner Security Transaction Code Indirect 10b5-1 $Price #Shares $Value #Remaining
16 Feb 21 Natalie Marie Derse Common Stock Sell Dispose S No No 21.48 1,286 27.62K 103,912
16 Feb 21 Feld Peter A Common Stock, $0.01 Par Value Other Aquire J Yes No 22.9506 274,186 6.29M 3,508,523
16 Feb 21 Feld Peter A Forward Purchase Contract Common Stock, $0.01 Par Value Other Dispose J Yes No 22.9506 1 22.95 0
19 Jan 21 Emily Heath Common Stock Grant Aquire A No No 0 2,543 0 2,543

Data for the last complete 13F reporting period. To see the most recent changes to ownership, click the ownership history button above.

13F holders
Current Prev Q Change
Total holders 0 0
Opened positions 0 0
Closed positions 0 0
Increased positions 0 0
Reduced positions 0 0
13F shares
Current Prev Q Change
Total value 0 0
Total shares 0 0
Total puts 0 0
Total calls 0 0
Total put/call ratio
Largest owners
Shares Value Change
Largest transactions
Shares Bought/sold Change

Financial report summary

?
Risks
  • RISKS RELATED TO OUR BUSINESS STRATEGY AND INDUSTRY
  • The COVID-19 pandemic has affected how we are operating our business, and the duration and extent to which this will impact our future results of operations and overall financial performance remains uncertain.
  • If we are unable to develop new and enhanced solutions, or if we are unable to continually improve the performance, features, and reliability of our existing solutions, our competitive position may weaken, and our business and operating results could be adversely affected.
  • We operate in a highly competitive environment, and our competitors may gain market share in the markets for our solutions that could adversely affect our business and cause our revenues to decline.
  • We may need to change our pricing models to compete successfully.
  • If we fail to manage our sales and distribution channels effectively, or if our partners choose not to market and sell our solutions to their customers, our operating results could be adversely affected.
  • Our revenue and operating results depend significantly on our ability to retain our existing customers, and add new customers, and any decline in our retention rates or failure to add new customers will harm our future revenue and operating results.
  • Our acquisitions and divestitures create special risks and challenges that could adversely affect our financial results.
  • RISKS RELATED TO THE BROADCOM SALE
  • We may not achieve the intended benefits of the Broadcom sale.
  • Any cost reduction initiatives that we undertake may not deliver the results we expect, and these actions may adversely affect our business.
  • If we are unsuccessful at executing the transition of the Enterprise Security Business assets from the Broadcom sale, our business and results of operations may be adversely affected and our ability to invest in and grow our business could be limited.
  • Changes in industry structure and market conditions could lead to charges related to discontinuance of certain of our products or businesses and asset impairments.
  • RISKS RELATED TO OUR OPERATIONS
  • If we are unable to attract and retain qualified employees, lose key personnel, fail to integrate replacement personnel successfully, or fail to manage our employee base effectively, we may be unable to develop new and enhanced solutions, effectively manage or expand our business, or increase our revenues.
  • Our inability to successfully recover from a disaster or other business continuity event could impair our ability to deliver our products and services and harm our business.
  • RISKS RELATED TO OUR SOLUTIONS
  • Our solutions, systems, and website and the data on these sources may be subject to intentional disruption that could materially harm to our reputation and future sales.
  • We collect, use, disclose, store, or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments, and our actual or perceived failure to comply with such laws and commitments could harm our business.
  • LEGAL AND COMPLIANCE RISKS
  • Matters relating to or arising from our completed Audit Committee Investigation, including regulatory investigations and proceedings, litigation matters, and potential additional expenses, may adversely affect our business and results of operations.
  • Our solutions are highly regulated, which could impede our ability to market and provide our solutions or adversely affect our business, financial position, and results of operations.
  • If we do not protect our proprietary information and prevent third parties from making unauthorized use of our products and technology, our financial results could be harmed.
  • From time to time we are a party to lawsuits and investigations, which typically require significant management time and attention and result in significant legal expenses, and which could negatively impact our business, financial condition, results of operations, and cash flows.
  • Third parties claiming that we infringe their proprietary rights could cause us to incur significant legal expenses and prevent us from selling our products.
  • RISKS RELATED TO OUR FINANCIAL RESULTS
  • Changes to our effective tax rate could increase our income tax expense and reduce (increase) our net income (loss), cash flows and working capital.
  • RISKS RELATED TO OUR LIQUIDITY AND INDEBTEDNESS
  • We cannot predict our future capital needs, and we may be unable to obtain financing, which could have a material adverse effect on our business, results of operations, and financial condition.
  • Failure to maintain our credit ratings could adversely affect our liquidity, capital position, ability to hedge certain financial risks, borrowing costs, and access to capital markets.
  • There are risks associated with our outstanding and future indebtedness that could adversely affect our financial condition.
  • Our existing credit agreements impose operating and financial restrictions on us.
  • Stock symbol and stockholders of record
  • Repurchases of our equity securities
  • Fiscal calendar and basis of presentation
  • CRITICAL ACCOUNTING POLICIES AND ESTIMATES
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Net revenues by geographic region
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Non-operating income (expense), net
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Provision for income taxes
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • LIQUIDITY, CAPITAL RESOURCES AND CASH REQUIREMENTS
  • Sale of equity method investment
  • Divestiture of Enterprise Security business
  • Sale of ID Analytics solutions
  • Cash from operating activities
  • Cash from investing activities
  • Cash from financing activities
  • Foreign currency exchange rate risk
  • a) Evaluation of Disclosure Controls and Procedures
  • b) Management’s Report on Internal Control over Financial Reporting
  • c) Changes in Internal Control over Financial Reporting
  • d) Limitations on Effectiveness of Controls
  • CONSOLIDATED BALANCE SHEETS
  • CONSOLIDATED STATEMENTS OF COMPREHENSIVE INCOME (LOSS)
  • CONSOLIDATED STATEMENTS OF STOCKHOLDERS’ EQUITY
Content analysis
?
Positive
Negative
Uncertain
Constraining
Legalese
Litigous
Readability
H.S. freshman Good
New words: actor, ally, Alpaca, attack, Avira, coupled, CPRA, cybersecurity, empowering, GmbH, HoldCo, live, passed, portfolio, redacted, TopCo, translation, vaccination
Removed: APRU, branded, Ireland, opt, organized, sharing, Singapore, stronger, week

Patents

GRANT
Utility
Systems and methods for performing micro-segmenting
6 Apr 21
The disclosed computer-implemented method for performing micro-segmenting may include (i) identifying at least a portion of a device, (ii) measuring a variance value that indicates a level of variance in terms of websites accessed by the portion of the device over a period of time, and (iii) locking, in response to determining that the variance value satisfies a threshold level of simplicity, the portion of the device by applying a security profile to the portion of the device that limits the portion of the device to accessing a set of websites that is defined in terms of the websites accessed by the portion of the device over the period of time.
GRANT
Utility
Systems and methods for recovering an infected endpoint
6 Apr 21
The disclosed computer-implemented method for recovering an infected endpoint may include receiving an acoustic signal having an embedded command for executing a security application at the infected endpoint, decoding the acoustic signal to obtain the embedded command, and executing the embedded command to start a security application at the infected endpoint, where the security application is operable to mitigate the infected endpoint.
GRANT
Utility
Using security app injection and multi-device licensing to recover device facing denial of access caused by malware infection
30 Mar 21
A mobile computing device is infected by malware which blocks access to the infected device by an authorized user.
GRANT
Utility
Systems and methods for virtual boundary enforcement using network filters
30 Mar 21
The disclosed computer-implemented method for virtual boundary enforcement using network filters may include (i) applying a network filter to network traffic associated with a target computing device, (ii) analyzing data generated by the network filter, (iii) identifying, based on an analysis of the data, a potential violation of a virtual boundary associated with the target computing device, and (iv) in response to identifying the potential violation, performing a security action to enforce the virtual boundary associated with the target computing device.
GRANT
Utility
Systems and methods for system recovery from a system user interface process malfunction
30 Mar 21
The disclosed computer-implemented method for system recovery from a system user interface process malfunction may include (i) determining that a system user interface (UI) process is executing on the computing device, (ii) determining that a message indicating a malfunction of the system UI process is displayed on the computing device, (iii) identifying a mobile application that was executing on the computing device at a time of the malfunction of the system UI process, and (iv) in response to identifying the mobile application that was executing at the time of the malfunction of the system UI process, performing a security action for recovery from the malfunction of the system UI process.