Company profile

Ticker
NLOK
Exchange
CEO
Vincent Pilette
Employees
Incorporated
Location
Fiscal year end
Former names
Symantec Corp
SEC CIK
IRS number
770181864

NLOK stock data

(
)

Calendar

6 Aug 20
12 Aug 20
3 Apr 21

News

Company financial data Financial data

Quarter (USD) Jul 20 Apr 20 Jan 20 Oct 19
Revenue 614M 614M 618M 608M
Net income 118M 231M 2.85B 785M
Diluted EPS 0.19 0.37 4.4 1.22
Net profit margin 19.22% 37.62% 460% 129%
Operating income 120M 44M 62M 103M
Net change in cash 17M -165M 253M 125M
Cash on hand 500M 483M 648M 395M
Cost of revenue 86M 97M 103M 100M
Annual (USD) Apr 20 Mar 19 Mar 18 Mar 17
Revenue 2.49B 2.46B 4.83B 4.02B
Net income 3.89B 31M 1.14B -106M
Diluted EPS 6.05 0.05 1.7 -0.17
Net profit margin 156% 1.26% 23.54% -2.64%
Operating income 355M 158M -154M -100M
Net change in cash 107M -640M -167M -4.8B
Cash on hand 483M 376M 1.02B 1.18B
Cost of revenue 393M 455M 463M 853M

Financial data from company earnings reports

Date Owner Security Transaction Code 10b5-1 $Price #Shares $Value #Remaining
10 Aug 20 Natalie Marie Derse Common Stock Grant Aquire A No 0 103,912 0 103,912
10 Jul 20 Ko Bryan Seuk Common Stock Grant Aquire A No 0 49,052 0 140,095
10 Jul 20 Pilette Vincent Common Stock Grant Aquire A No 0 166,777 0 757,589
10 Jul 20 Matthew Charles Brown Common Stock Grant Aquire A No 0 36,789 0 114,675
13F holders
Current Prev Q Change
Total holders 2 4 -50.0%
Opened positions 1 1
Closed positions 3 483 -99.4%
Increased positions 0 0
Reduced positions 0 1 EXIT
13F shares
Current Prev Q Change
Total value 0 1.52M EXIT
Total shares 0 59.34K EXIT
Total puts 0 0
Total calls 0 0
Total put/call ratio
Largest owners
Shares Value Change
Proequities 0 $0
IFP Advisors 0 $0
Largest transactions
Shares Bought/sold Change
Twinbeech Capital 0 -57.16K EXIT
Fort 0 -2.18K EXIT
Newfound Research 0 -2 EXIT
Proequities 0 0
IFP Advisors 0 0

Financial report summary

?
Risks
  • RISKS RELATED TO OUR BUSINESS STRATEGY AND INDUSTRY
  • The COVID-19 pandemic has affected how we are operating our business, and the duration and extent to which this will impact our future results of operations and overall financial performance remains uncertain.
  • If we are unable to develop new and enhanced solutions, or if we are unable to continually improve the performance, features, and reliability of our existing solutions, our competitive position may weaken, and our business and operating results could be adversely affected.
  • We operate in a highly competitive environment, and our competitors may gain market share in the markets for our solutions that could adversely affect our business and cause our revenues to decline.
  • We may need to change our pricing models to compete successfully.
  • If we fail to manage our sales and distribution channels effectively, or if our partners choose not to market and sell our solutions to their customers, our operating results could be adversely affected.
  • Our revenue and operating results depend significantly on our ability to retain our existing customers, and add new customers, and any decline in our retention rates or failure to add new customers will harm our future revenue and operating results.
  • Our acquisitions and divestitures create special risks and challenges that could adversely affect our financial results.
  • RISKS RELATED TO THE BROADCOM SALE
  • We may not achieve the intended benefits of the Broadcom sale.
  • Any cost reduction initiatives that we undertake may not deliver the results we expect, and these actions may adversely affect our business.
  • If we are unsuccessful at executing the transition of the Enterprise Security Business assets from the Broadcom sale, our business and results of operations may be adversely affected and our ability to invest in and grow our business could be limited.
  • Changes in industry structure and market conditions could lead to charges related to discontinuance of certain of our products or businesses and asset impairments.
  • RISKS RELATED TO OUR OPERATIONS
  • If we are unable to attract and retain qualified employees, lose key personnel, fail to integrate replacement personnel successfully, or fail to manage our employee base effectively, we may be unable to develop new and enhanced solutions, effectively manage or expand our business, or increase our revenues.
  • Our inability to successfully recover from a disaster or other business continuity event could impair our ability to deliver our products and services and harm our business.
  • RISKS RELATED TO OUR SOLUTIONS
  • Our solutions, systems, and website and the data on these sources may be subject to intentional disruption that could materially harm to our reputation and future sales.
  • We collect, use, disclose, store, or otherwise process personal information, which subjects us to privacy and data security laws and contractual commitments, and our actual or perceived failure to comply with such laws and commitments could harm our business.
  • LEGAL AND COMPLIANCE RISKS
  • Matters relating to or arising from our completed Audit Committee Investigation, including regulatory investigations and proceedings, litigation matters, and potential additional expenses, may adversely affect our business and results of operations.
  • Our solutions are highly regulated, which could impede our ability to market and provide our solutions or adversely affect our business, financial position, and results of operations.
  • If we do not protect our proprietary information and prevent third parties from making unauthorized use of our products and technology, our financial results could be harmed.
  • From time to time we are a party to lawsuits and investigations, which typically require significant management time and attention and result in significant legal expenses, and which could negatively impact our business, financial condition, results of operations, and cash flows.
  • Third parties claiming that we infringe their proprietary rights could cause us to incur significant legal expenses and prevent us from selling our products.
  • RISKS RELATED TO OUR FINANCIAL RESULTS
  • Changes to our effective tax rate could increase our income tax expense and reduce (increase) our net income (loss), cash flows and working capital.
  • RISKS RELATED TO OUR LIQUIDITY AND INDEBTEDNESS
  • We cannot predict our future capital needs, and we may be unable to obtain financing, which could have a material adverse effect on our business, results of operations, and financial condition.
  • Failure to maintain our credit ratings could adversely affect our liquidity, capital position, ability to hedge certain financial risks, borrowing costs, and access to capital markets.
  • There are risks associated with our outstanding and future indebtedness that could adversely affect our financial condition.
  • Our existing credit agreements impose operating and financial restrictions on us.
  • Stock symbol and stockholders of record
  • Repurchases of our equity securities
  • Fiscal calendar and basis of presentation
  • CRITICAL ACCOUNTING POLICIES AND ESTIMATES
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Net revenues by geographic region
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Non-operating income (expense), net
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • Provision for income taxes
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2020 compared to fiscal 2019
  • Fiscal 2019 compared to fiscal 2018
  • LIQUIDITY, CAPITAL RESOURCES AND CASH REQUIREMENTS
  • Sale of equity method investment
  • Divestiture of Enterprise Security business
  • Sale of ID Analytics solutions
  • Cash from operating activities
  • Cash from investing activities
  • Cash from financing activities
  • Foreign currency exchange rate risk
  • a) Evaluation of Disclosure Controls and Procedures
  • b) Management’s Report on Internal Control over Financial Reporting
  • c) Changes in Internal Control over Financial Reporting
  • d) Limitations on Effectiveness of Controls
  • CONSOLIDATED BALANCE SHEETS
  • CONSOLIDATED STATEMENTS OF COMPREHENSIVE INCOME (LOSS)
  • CONSOLIDATED STATEMENTS OF STOCKHOLDERS’ EQUITY
Content analysis ?
Positive
Negative
Uncertain
Constraining
Legalese
Litigous
Readability
H.S. freshman Good
New words: affiliate, aimed, alter, analytical, border, breadth, card, Checkmark, circumstance, closure, compromise, concept, constantly, Deficit, DER, Derse, deteriorate, deterioration, diminished, discovery, discretionary, dissatisfaction, distancing, economy, efficacy, embolden, encounter, error, expert, expertise, facilitate, factor, furniture, guarantee, inadvertent, indirectly, infrequently, isolation, Junior, justified, LockMan, Logo, macroeconomic, malfeasance, malfunction, mediation, membership, minimize, moved, Natalie, National, pandemic, phase, precautionary, Prejudgment, prevail, prolonged, promptly, prospectively, publicly, quality, reactive, rebuild, recession, recipient, remediation, remedy, remote, Restated, restore, Secretary, sequestered, Sequestration, shutdown, signature, situation, small, social, society, sought, subscribed, substitute, tarnish, temporary, transmission, transmit, travel, turn, unavailable, validity, winding, worsening, Writ
Removed: advanced, agreed, alert, Alleviating, amortized, anniversary, appeal, appealed, assume, attempting, automate, begin, broader, buying, capitalized, carrier, cessation, channel, classification, Clearlake, climate, collateralized, comparative, compensatory, component, constrain, Corporation, created, delivered, detect, detection, determinable, determined, DigiCert, disaggregated, discovered, discrete, dispute, downsize, drought, earlier, element, emergence, enabling, expedient, familiar, feature, February, firm, flooding, globe, Group, headcount, hypothetical, implicit, inception, inclusion, insufficient, Integrated, intensity, introduce, introduced, investor, lag, leader, leased, legacy, litigating, maintenance, manufacturer, mobility, motivating, obsolescence, pace, package, Parent, PC, persistent, planned, practical, prepaid, President, private, prominent, purpose, readily, receiving, rehearing, rely, requested, residual, ROU, serve, shift, single, site, stability, sublease, subsequent, supporting, TA, taxpayer, testing, thereto, today, transformation, undetected, unify, unreimbursed, vacate, valuable, velocity, vested, volume, warranty, weakening, world

Patents

GRANT
Utility
Systems and methods for modifying file backups in response to detecting potential ransomware
11 Aug 20
A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process, an anomaly that is potentially indicative of ransomware on a computing device, (2) in response to detecting the anomaly that is potentially indicative of ransomware, storing a backup copy in a separate location from other backup copies, (3) confirming that the anomaly is indicative of ransomware on the computing device, (4) adjusting a backup policy in response to confirming that the anomaly is indicative of ransomware on the computing device, and (5) managing the backup copy based on the adjusted backup policy.
GRANT
Utility
Detecting and preventing execution of a malicious computer application using utility driven graph summarization
11 Aug 20
Utility driven graph summarization for use in detecting and preventing malicious computer application.
GRANT
Utility
Content-based automatic backup of images
28 Jul 20
The content of each specific image file on an endpoint is analyzed.
GRANT
Utility
Systems and methods for categorizing security incidents
21 Jul 20
The disclosed computer-implemented method for categorizing security incidents may include (i) generating, within a training dataset, a feature vector for each of a group of security incidents, the feature vector including features that describe the security incidents and the features including categories that were previously assigned to the security incidents as labels to describe the security incidents, (ii) training a supervised machine learning function on the training dataset such that the supervised machine learning function learns how to predict an assignment of future categories to future security incidents, (iii) assigning a category to a new security incident by applying the supervised machine learning function to a new feature vector that describes the new security incident, and (iv) notifying a client of the new security incident and the category assigned to the new security incident.
GRANT
Utility
Systems and methods for detecting system attacks
21 Jul 20
The disclosed computer-implemented method for detecting system attacks may include (1) receiving, from a detecting system capable of detecting attacks, information that identifies an attack that originated from a compromised client system that is remote from the detecting system, (2) determining that the attack originated from the compromised client system, (3) determining that the compromised client system includes an anti-malware agent, and (4) notifying the anti-malware agent on the compromised client system that the compromised client system performed the attack.