Company profile

Ticker
NLOK
Exchange
CEO
Vincent Pilette
Employees
Incorporated in
Location
Fiscal year end
Former names
Symantec Corp
SEC CIK
IRS number
770181864

NLOK stock data

(
)

Calendar

8 Nov 19
21 Nov 19
3 Apr 20

News

Company financial data Financial data

Quarter (USD) Oct 19 Jul 19 Mar 19 Dec 18
Revenue 608M 1.25B 1.19B 1.21B
Net income 785M 26M 34M 65M
Diluted EPS 1.22 0.04 0.05 0.1
Net profit margin 129% 2.09% 2.86% 5.37%
Operating income 103M 157M 107M 169M
Net change in cash 125M -106M 63M -128M
Cash on hand 395M 270M 376M 313M
Cost of revenue 100M 272M 279M 266M
Annual (USD) Mar 19 Mar 18 Mar 17 Apr 16
Revenue 4.73B 4.83B 4.02B 3.6B
Net income 31M 1.14B -106M 2.49B
Diluted EPS 0.05 1.7 -0.17 3.71
Net profit margin 0.66% 23.54% -2.64% 69.11%
Operating income 380M 49M -100M 457M
Net change in cash -640M -167M -4.8B 3.14B
Cash on hand 376M 1.02B 1.18B 5.98B
Cost of revenue 1.05B 1.03B 853M 615M

Financial data from company earnings reports

Financial report summary

?
Risks
  • A decrease in demand for our solutions could adversely affect our financial results.
  • Fluctuations in our quarterly financial results have affected the trading price of our outstanding securities in the past and could affect the trading price of our outstanding securities in the future.
  • Our business depends on customers renewing their arrangements for maintenance, subscriptions, managed security services, and cloud-based (cloud) offerings.
  • If we are unable to develop new and enhanced solutions that achieve widespread market acceptance, or if we are unable to continually improve the performance, features, and reliability of our existing solutions or adapt our business model to keep pace with industry trends, our competitive position may weaken, and our business and operating results could be adversely affected.
  • If we are unable to attract and retain qualified employees, lose key personnel, fail to integrate replacement personnel successfully, or fail to manage our employee base effectively, we may be unable to develop new and enhanced solutions, effectively manage or expand our business, or increase our revenues.
  • We operate in a highly competitive environment, and our competitors may gain market share in the markets for our solutions that could adversely affect our business and cause our revenues to decline.
  • Our cloud offerings present execution and competitive risks.
  • We invest in research and development activities in both the short and long term, and these investments may achieve delayed, or lower than expected, benefits which could harm our operating results.
  • Changes in industry structure and market conditions could lead to charges related to discontinuance of certain of our products or businesses and asset impairments.
  • Matters relating to or arising from our completed Audit Committee Investigation, including regulatory investigations and proceedings, litigation matters, and potential additional expenses, may adversely affect our business and results of operations.
  • We are subject to pending securities class action and stockholder derivative legal proceedings that may adversely affect our business.
  • The delayed filing of some of our periodic SEC reports has made us currently ineligible to use a registration statement on Form S-3 to register the offer and sale of securities, which could adversely affect our ability to raise future capital or complete acquisitions.
  • Our indemnification obligations and limitations of our director and officer liability insurance may have a material adverse effect on our financial condition, results of operations, and cash flows.
  • We may need to change our pricing models to compete successfully.
  • Defects, disruptions or risks related to our cloud offerings could impair our ability to deliver our services and could expose us to liability, damage our brand and reputation, or otherwise negatively impact our business.
  • Our solutions are complex and operate in a wide variety of environments, systems, applications, and configurations, which could result in failures of our solutions to function as designed.
  • Our products, solutions, cloud offerings, systems, and website may be subject to intentional disruption that could adversely impact our reputation and future sales.
  • Our inability to successfully recover from a disaster or other business continuity event could impair our ability to deliver our products and services and harm our business.
  • We collect, use, disclose, store, or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments, and our actual or perceived failure to comply with such laws and commitments could harm our business.
  • Our acquisitions and divestitures create special risks and challenges that could adversely affect our financial results.
  • If we fail to manage our sales and distribution channels effectively, or if our partners choose not to market and sell our solutions to their customers, our operating results could be adversely affected.
  • We face heightened regulation in our Consumer Cyber Safety segment, which could impede our ability to market and provide our solutions or adversely affect our business, financial position, and results of operations.
  • Our international operations involve risks that could increase our expenses, adversely affect our operating results, and require increased time and attention of our management.
  • If we do not protect our proprietary information and prevent third parties from making unauthorized use of our products and technology, our financial results could be harmed.
  • From time to time we are a party to lawsuits and investigations, which typically require significant management time and attention and result in significant legal expenses, and which could negatively impact our business, financial condition, results of operations, and cash flows.
  • Third parties claiming that we infringe their proprietary rights could cause us to incur significant legal expenses and prevent us from selling our products.
  • Changes to our effective tax rate could increase our income tax expense and reduce (increase) our net income (loss).
  • We cannot predict our future capital needs, and we may be unable to obtain financing, which could have a material adverse effect on our business, results of operations, and financial condition.
  • Failure to maintain our credit ratings could adversely affect our liquidity, capital position, ability to hedge certain financial risks, borrowing costs, and access to capital markets.
  • There are risks associated with our outstanding and future indebtedness that could adversely affect our financial condition.
  • Our existing credit agreements impose operating and financial restrictions on us.
  • Some of our products contain “open source” software, and any failure to comply with the terms of one or more of these open source licenses could negatively affect our business.
  • Our contracts with the U.S. government include compliance, audit, and review obligations. Any failure to meet these obligations could result in civil damages and/or penalties being assessed against us by the government.
Management Discussion
  • Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations
  • Please read the following discussion and analysis of our financial condition and results of operations together with our Consolidated Financial Statements and related Notes thereto included under Item 15 of this Annual Report on Form 10-K.
  • Symantec Corporation is a global leader in cyber security. We provide cyber security products, services, and solutions to organizations and individuals worldwide. Founded in 1982, we have operations in more than 45 countries.
Content analysis ?
Positive
Negative
Uncertain
Constraining
Legalese
Litigous
Readability
H.S. freshman Good
New words: al, annum, answer, Arizona, assistance, attendant, attrition, Avila, back, benchmark, Brown, category, comprised, consummation, degree, dismissed, disposition, distinguishable, documentation, EBITDA, fee, focused, ID, illiquidity, Irish, Kapuria, lieu, line, Maker, Matt, morale, NortonLifeLock, overhead, persuading, Pilette, prejudice, ratio, receipt, relocation, remanded, remanding, remeasure, Rick, Samir, stepping, streamlining, succeed, succeeded, summary, therewith, trial, turnover, underutilized, unvested, Vincent
Removed: absence, achieved, added, adequately, allocating, assessed, bank, budget, Central, characterized, CODM, collecting, commensurate, compatibility, consideration, contracting, coordinating, Corrupt, cultural, culturally, custom, deduction, deferral, denominated, deploy, deploying, derive, devoting, dispersed, diverse, domestic, doubtful, earliest, electronic, eligible, email, encryption, enforced, Ensuring, execute, export, faced, file, geographically, harming, heightened, identified, import, ineligible, inflationary, initiate, innovate, instability, installed, integrity, intercompany, labor, longer, military, misappropriation, negotiate, networking, older, organization, periodic, political, production, productive, programming, prohibited, protective, pursuing, ratable, recognizing, reconciliation, refresh, regional, register, registration, renewing, repatriate, responsibility, satisfaction, Seasonal, sensitivity, separately, subscription, sufficiently, summer, supply, tendency, traffic, unallocated, unrest, user, war, web, withhold

Patents

GRANT
Utility
Systems and methods for chaining virtual private networks
29 Oct 19
The disclosed computer-implemented method for chaining virtual private networks may include (i) establishing a virtual private network client that routes network traffic to a virtual private network, (ii) establishing an additional virtual private network client that routes the network traffic to an additional virtual private network, (iii) configuring the virtual private network client for split routing such that the virtual private network client routes different ranges of incoming network traffic to respective different network addresses, (iv) configuring the additional virtual private network client to route all incoming network traffic according to a default route, and (v) chaining the virtual private network client and the additional virtual private network client such that they process incoming network traffic in series.
GRANT
Utility
Systems and methods for reporting the attempted transmission of sensitive information
29 Oct 19
The disclosed computer-implemented method for reporting the attempted transmission of sensitive information may include (1) identifying an attempt by at least one software program running on a computing device to transmit data to one or more intended recipients, (2) determining that the data of the attempted transmission includes sensitive information, (3) identifying an intended recipient of the attempted transmission, and (4) notifying a user of the computing device both that the attempted transmission includes sensitive information and of the intended recipient of the attempted transmission.
GRANT
Utility
Systems and methods for securing push authentications
29 Oct 19
The disclosed computer-implemented method for securing push authentications may include (i) receiving, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, (ii) forwarding, by the security service, the push authentication to the client device of the user, (iii) receiving, by the security service, a response to the push authentication from the client device of the user, and (iv) forwarding, by the security service, the response to the push authentication from the client device of the user to the security service relying party.
GRANT
Utility
Systems and methods for enforcing access-control policies in an arbitrary physical space
29 Oct 19
The disclosed computer-implemented method for enforcing access-control policies in an arbitrary physical space may include (i) identifying a collection of devices that are located within a predetermined physical space, (ii) determining the physical location of each device in the collection of devices, (iii) establishing, based on the collection of devices, (a) a list of controlled devices that are subject to an access-control policy and (b) a list of monitoring devices that are capable of monitoring user activity within a physical proximity, (iv) matching each controlled device with at least one monitoring device that is capable of monitoring user activity within physical proximity to the controlled device, and (v) monitoring, for each controlled device and by each monitoring device matched to the controlled device, user activity within proximity to the controlled device.
GRANT
Utility
Systems and methods for managing wireless-network deauthentication attacks
29 Oct 19
The disclosed computer-implemented method for managing wireless-network deauthentication attacks may include (1) detecting, at the wireless access point, a deauthentication signal, transmitted over a wireless network that is managed at least in part by the wireless access point, that prompts a target computing device to disconnect from the wireless network, (2) determining both that the deauthentication signal is directed to the target computing device and that the deauthentication signal was not initiated by the wireless access point, (3) determining, based at least in part on the determination that the deauthentication signal was not initiated by the wireless access point, that the deauthentication signal represents an illegitimate deauthentication signal, and (4) performing, in response to determining that the deauthentication signal represents an illegitimate deauthentication signal, a security action to mitigate effects of the illegitimate deauthentication signal on the target computing device.