FTNT - 2011.10K
Table of Contents

 
 
 
 
 
 
 
 
 
 
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
 
 FORM 10-K 
(Mark One)
T
ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended December 31, 2011
Or
o
TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
 For the transition period from              to             
Commission file number: 001-34511
______________________________________
 FORTINET, INC.
(Exact name of registrant as specified in its charter)
______________________________________

Delaware
77-0560389
(State or other jurisdiction of
incorporation or organization)
(I.R.S. Employer
Identification No.)
1090 Kifer Road
Sunnyvale, California
94086
(Address of principal executive offices)
(Zip Code)
(408) 235-7700
(Registrant’s telephone number, including area code)
 
 Securities registered pursuant to Section 12(b) of the Act: 
Common Stock, $0.001 Par Value
 
The NASDAQ Stock Market LLC
 
 
NASDAQ Global Select Market
(Title of each class)
 
(Name of exchange on which registered)
Securities registered pursuant to Section 12(g) of the Act: None
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.    Yes  x    No  o
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.    Yes  o No  x



Table of Contents

Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.    Yes  x    No  o
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§229.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files).    Yes  x  No  o 
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (section 229.405 of this chapter) is not contained herein, and will not be contained, to the best of the registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.  o
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act. 
Large accelerated filer
x
 
 
Accelerated filer
o
Non-accelerated filer
o 
(Do not check if smaller reporting company)
 
Smaller reporting company
o
Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Act).    Yes  o     No  x
The aggregate market value of voting stock held by non-affiliates of the registrant, as of June 30, 2011, the last business day of the registrant’s most recently completed second quarter, was $2,977,981,761 (based on the closing price for shares of the registrant's common stock as reported by The NASDAQ Global Select Market for the last business day prior to that date). Shares of common stock held by each executive officers, director, and holder of 5% or more of the outstanding common stock have been excluded in that such persons may be deemed to be affiliates. This determination of affiliate status is not necessarily a conclusive determination for other purposes.
As of February 17, 2012, there were 156,363,007 shares of the registrant’s common stock outstanding.
DOCUMENTS INCORPORATED BY REFERENCE
Portions of the registrant’s definitive Proxy Statement relating to its 2012 Annual Meeting of Stockholders are incorporated by reference into Part III of this Annual Report on Form 10-K where indicated. Such Proxy Statement will be filed with the U.S. Securities and Exchange Commission within 120 days after the end of the fiscal year to which this report relates.




FORTINET, INC.
ANNUAL REPORT ON FORM 10-K
For the Fiscal Year Ended December 31, 2011
Table of Contents
 
 
 
 
 
 
Page
 
 
 
 
Part I
 
 
 
 
Item 1.
Item 1A.
Item 1B.
Item 2.
Item 3.
Item 4.
 
 
 
 
Part II
 
 
 
 
Item 5.
Item 6.
Item 7.
Item 7A.
Item 8.
Item 9.
Item 9A.
Item 9B.
 
 
 
 
Part III
 
 
 
 
Item 10.
Item 11.
Item 12.
Item 13.
Item 14.
 
 
 
 
Part IV
 
 
 
 
Item 15.


 


Table of Contents

Part I

ITEM 1.    Business
    
Overview

We provide network security solutions that are designed to address the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated information technology (“IT”) threat landscape. Through our products and subscription services, we provide broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises, service providers and governmental entities worldwide. Our flagship Unified Threat Management ("UTM") solution consists of our FortiGate physical and virtual appliance products that provide a broad array of security and networking functions, including firewall, VPN, application control, antivirus, intrusion prevention, Web filtering, vulnerability management, antispam, wireless controller, and WAN acceleration. Our FortiGate appliances, from the FortiGate-40 for small businesses and branch offices to the FortiGate-5000 series for large enterprises and service providers, are based on our proprietary technology platform. This platform includes our FortiASICs, which are specifically designed for accelerated processing of security and networking functions, and our FortiOS operating system, which provides the foundation for all of our security functions. Our FortiGuard security subscription services provide end-customers with access to dynamic updates to our application control, antivirus, intrusion prevention, Web filtering and antispam functionality based on intelligence gathered by our dedicated FortiGuard Labs team. By combining multiple proprietary security and networking functions with our purpose-built FortiASIC and FortiOS, our FortiGate UTM solution delivers broad protection against dynamic security threats while reducing the operational burden and costs associated with managing multiple point products.

We complement our FortiGate product line with the FortiManager product family, which enables end-customers to manage the system configuration and security functions of multiple FortiGate devices from a centralized console, as well as the FortiAnalyzer product family, which enables collection, analysis and archiving of content and log data generated by our products. We also offer other product lines that provide additional protection, such as: (i) FortiAP, secure wireless access points, (ii) FortiWeb, security for Web-based applications, (iii) FortiMail, multi-featured, high performance messaging security, (iv) FortiDB, centrally managed database-specific security, (v) FortiClient, endpoint security for desktops, laptops and mobile devices and that is primarily used in conjunction with our FortiGate appliances, (vi) FortiScan, endpoint vulnerability assessment and remediation, (vii) FortiSwitch, Ethernet switches, (viii) FortiBridge, bypass appliances to help ensure network availability, (ix) FortiAuthenticator, scalable secure authentication for enterprise networks, (x) FortiBalancer, optimizing the availability and performance of mobile, cloud, and enterprise applications, (xi) FortiCache, reducing the cost of and impact of cached internet content, and (xii) FortiDNS, providing secure DNS caching.

Additionally, we offer virtual appliances for the FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, and FortiScan product lines. These virtual appliances help secure network infrastructures with the same functionality as the traditional physical appliances in their respective product lines. They can be used in conjunction with traditional Fortinet appliances (such as FortiGate, FortiManager, and FortiAnalyzer) to help ensure the visibility, management, and protection of physical and virtual environments.

As of December 31, 2011, we had shipped over 850,000 appliances via more than 10,000 channel partners to more than 125,000 end-customers worldwide, including a majority of the 2011 Fortune Global 100.

We were incorporated in Delaware in November 2000. Our principal executive office is located at 1090 Kifer Road, Sunnyvale, California 94086 and our telephone number at that location is (408) 235-7700.

Technology and Architecture

Our proprietary FortiASIC hardware architecture, FortiOS operating system and associated security and networking functions combine to form a platform that integrates security features and enables our products to perform sophisticated security processing for networks with high throughput requirements.

FortiASIC

Our FortiASIC family of Application-Specific Integrated Circuits, or ASICs, is comprised of three lines of processors: FortiASIC content processor, or CP, the FortiASIC network processor, or NP, and the FortiASIC system-on-a-chip, or SOC. These custom ASICs are designed to enhance the sophisticated security processing capabilities implemented in software by accelerating the computation-intensive tasks such as firewall policy enforcement or IPS anomaly detection. This architecture provides the flexibility of implementing accelerated processing of new threat detection without requiring a new ASIC release. The FortiASIC

1

Table of Contents

CP is currently included in most of our entry-level and all of our mid-range and high-end FortiGate appliances. The FortiASIC NP is currently included in some of our mid-range and high-end FortiGate appliances, delivering further accelerated firewall and VPN performance. The FortiASIC SOC is currently included in our entry-level FortiGate-20 and -40 product families.
 
FortiOS

Our FortiOS operating system provides the foundation for the operation of all FortiGate appliances, from the core kernel functions to the security processing feature sets. FortiOS provides multiple layers of security including a hardened kernel layer providing protection for the FortiGate system, a network security layer providing security for end-customers’ network infrastructures, and application content protection providing security for end-customers’ workstations and applications. FortiOS directs the operations of processors and ASICs as well as providing system management functions such as command-line and graphical user interfaces. We make available updates to the FortiOS through our FortiCare support services. FortiOS also enables advanced, integrated routing and switching, allowing end-customers to deploy FortiGate devices within a wide variety of networks, as well as providing a direct replacement solution option for legacy switching and routing equipment. The FortiOS implements a suite of commonly used routing protocols as well as address translation technologies, allowing the FortiGate appliance to integrate and operate in a wide variety of network environments. Additional features include Virtual Domain, or VDOM, capabilities and traffic queuing and shaping, enabling administrators to set the appropriate configurations and policies that meet their infrastructure needs. FortiOS also provides capabilities for logging of traffic for forensic analysis purposes which are particularly important for regulatory compliance initiatives like PCI DSS. FortiOS’s packet classification, queue disciplines, policy enforcement, congestion management, and other traffic optimization functionality are designed to help control network traffic in order to optimize performance.

Our FortiOS incorporates the following eight core security and networking technologies:
 
Firewall. Our firewall technology delivers high performance network and application firewalling, including the ability to enforce policies based on application behavior and content. Our technology identifies traffic patterns independent of port or protocol used, and links them to the use of specific applications, enabling visibility and control over application behavior (explained in more detail below). By coupling application intelligence with firewall technology, the FortiGate platform is able to deliver real-time security with integrated application content level inspection, thereby simplifying security deployments.
 
Virtual Private Network. Our advanced VPN technology provides secure communications between multiple networks and hosts, through both secure socket layer, or SSL, and IPsec VPN technologies, leveraging our custom FortiASIC to provide hardware acceleration for high-performance communications and data privacy.

Application Control. Our application control technology allows our end customers to define granular network-based application policies in over 1,800 applications, providing additional visibility and control over application access, user behavior within applications, and application content.
 
Antivirus. Our antivirus technology provides protection against malware, including viruses, spyware and trojans.
 
Intrusion Prevention System. Our IPS technology provides protection against current and emerging network level threats.
 
Web Filtering. Our Web filtering automation technology works in concert with our research team to collect, analyze and categorize websites to provide real-time protection through website ratings and categorization. Our Web filtering technology is a pro-active defense feature that identifies known locations of malware and blocks access to these malicious sources.
 
Antispam. We employ a variety of antispam techniques to detect and block spam. These techniques include a hosted service performing algorithmic validations of messages against known spam messages, sophisticated reputation service designed to evaluate and track valid email sources and destinations, intelligent image scanning to evaluate the validity of images and dynamic heuristic rules to allow messages to be evaluated based on content within each message.
 
WAN Acceleration. Our storage-enabled and storage-ready FortiGate appliances provide the ability to accelerate network traffic across the wide area network by implementing a combination of application content caching and protocol optimization techniques.


2

Table of Contents

In addition to the eight core security and networking functions mentioned above, we also incorporate additional technologies within FortiGate appliances that differentiate our UTM solution, including:

Data Leakage Prevention (DLP). Our DLP technology provides the ability to define rules based on corporate policies, and consequently detect and help prevent confidential data from being distributed outside of the corporate network.
 
Traffic optimization. Our traffic optimization technology combines quality of service techniques with traffic shaping to provide better service to selected network traffic based on customer policies without causing interruptions to other traffic.
 
SSL inspection. Our SSL inspection technology provides the ability to decrypt SSL application content for processing by the FortiOS. The ability to inspect encrypted SSL content enables our customers to ensure protection from malware that would be otherwise hidden from traditional security products, and enforce the full complement of security and networking features available within FortiOS.

Vulnerability Management. Our vulnerability management technology enables the FortiGate platform to perform network scans to discover systems on a network, identity vulnerabilities and recommend steps for remediation. The FortiGate devices can store the results of the scans locally, or send the results from multiple FortiGate devices to a central FortiAnalyzer for aggregation and analysis.

Wireless Controller. Our wireless controller technology provides the ability to deploy FortiAP wireless access points to create a secure wireless network. FortiAP access points tunnel all wireless traffic to FortiGate or FortiWiFi platforms, enabling end-customers to use a single security platform to manage all wired and wireless network traffic.

Products

Our core product offerings consist of our FortiGate UTM product family, along with our FortiManager central management and FortiAnalyzer central logging and reporting product families, both of which are typically purchased to complement a large FortiGate deployment.

FortiGate

Our flagship FortiGate physical and virtual appliances offer a broad set of security and networking functions, including firewall, VPN, application control, antivirus, intrusion prevention, Web filtering, antispam and WAN acceleration. All FortiGate models are based on our proprietary operating system, FortiOS, and substantially all FortiGate physical appliances include our proprietary FortiASICs to accelerate content and network security features implemented within FortiOS. FortiGate platforms can be centrally managed through both embedded Web-based and command line interfaces, as well as through FortiManager which provides a central management architecture for thousands of FortiGate physical and virtual appliances.

By combining multiple network security functions in our purpose-built security platform, the FortiGate provides high quality protection capabilities and deployment flexibility while reducing the operational burden and costs associated with managing multiple point products. Through FortiGuard security subscription services, our products enable end-customers to add security functionality as required by their evolving business needs and the changing threat landscape. By purchasing FortiGuard security subscription services, end-customers obtain coverage and access to regular updates for application control, antivirus, IPS, Web filtering and antispam functions for their FortiGate appliances. With over 30 models in the FortiGate product line, FortiGate is designed to address security requirements for small-to-mid sized businesses, remote offices, large enterprises, and service providers.

Each FortiGate model runs our FortiOS operating system, and substantially all FortiGate physical appliances include our FortiASIC CP. The significant differences between each model are the performance and scalability targets each model is designed to meet, while the security features and associated services offered are common throughout all models.

The FortiGate-20 through -100 series models are designed for perimeter protection for small- to mid-sized businesses, remote offices of large distributed organizations and as customer premises equipment for service providers. Optional wireless LAN, or WLAN, integration is available for the FortiGate-20, -40, -60 and -80 models, marketed as FortiWiFi, delivering additional network access and security for wireless environments.


3

Table of Contents

The FortiGate-200 through -800 series models are designed for perimeter deployment in mid-sized to large enterprise networks. These products offer increased capacity and scalability designed to provide high network performance while delivering the same broad security suite as all FortiGate models. Additionally, the FortiGate-310 and -620 models provide hardware modularity, allowing end-customers the flexibility to customize solutions to their requirements.

The FortiGate-1000 through -5000 series models deliver high performance and scalable network security functionality for perimeter, data center and core deployment in large enterprise and service provider networks. Additionally, most of these products provide hardware modularity, allowing end-customers the flexibility to customize solutions to their requirements. Some products within the FortiGate-3000 and -5000 series leverage Advanced Mezzanine Card, or AMC, industry standards for hardware modularization to support the advanced networking requirements of large enterprises and service providers, including high-speed networking, WAN connectivity, and network attached storage connectivity. The FortiGate-3950B platform also leverages our proprietary Fortinet Mezzanine Card, or FMC, that provides hardware modularity to give end-customers the ability to add additional firewall and/or intrusion prevention performance, or increase the number of interfaces, as their network security needs evolve. The FortiGate-5000 series is also compatible with the Advanced Telecommunications Computing Architecture, or ATCA, standard, resulting in a flexible hardware platform for system modularity. This modularization gives end-customers the ability to deploy an initial FortiGate configuration with room to grow as their network security needs evolve. The inclusion of network load balancing and advanced switching functionality provides additional flexibility in how end-customers utilize the FortiGate modules within the FortiGate chassis. In addition, our FortiGate-5000 series ATCA blades can be utilized in other third-party vendors’ industry standard ATCA chassis, allowing FortiGate platforms to be deployed into a much wider range of network solutions. Our FortiGate-5000 series appliances offer modular, chassis-based architecture based on the ATCA and AMC industry standards. We brand a subset of our FortiGate-3000 and -5000 series products as FortiCarrier to reflect products specifically targeting a subset of service providers. These products add incremental security, networking and management functionality often utilized in service provider deployments.

FortiGate System Virtualization (VDOM)

In addition to providing network and content level security, our FortiOS operating system also offers system virtualization capabilities—the ability to “divide” a security appliance into multiple, separately provisioned and managed instances. This capability is currently deployed in substantially all of our FortiGate products as our virtual domain, or VDOM, feature, where administrators have the ability to segment a single FortiGate appliance platform into multiple FortiGate instances. Network security system virtualization, using our VDOM feature, provides isolation between each virtual system, giving administrators flexibility in configuration and traffic management capabilities for each virtual instance.

Fortinet Management and Analysis Products

Our FortiManager and FortiAnalyzer physical and virtual products are typically sold in conjunction with a large FortiGate deployment.

FortiManager

Our FortiManager family of products provides a central management solution for our FortiGate products, including the wide variety of network and security features offered within FortiOS. One FortiManager product is capable of effectively managing thousands of FortiGate units, and also provides central management for FortiClient software. FortiManager facilitates the coordination of policy-based provisioning, device configuration and operating system revision management, as well as network security monitoring and device control.

FortiAnalyzer

Our FortiAnalyzer family provides network logging, analyzing, and reporting products that securely aggregate content and log data from our FortiGate devices and other Fortinet products as well as third-party devices to enable network logging, analysis and reporting. Additional functions such as vulnerability assessments and traffic analysis provide additional value for customers seeking to control and monitor their network infrastructure and security policies. A full range of content and log data, including traffic, event, virus, attack, Web content, and email data may be archived, filtered and mined for compliance or historical analysis purposes. Our FortiAnalyzer product family comes with a suite of standard reports as well as the ability to customize reports.

We also offer other physical and virtual appliances and software that protect our end-customers from security threats to other critical areas in the enterprise, such as messaging, Web-based applications and databases, and employees’ computers or mobile devices as discussed above in the business overview.

4

Table of Contents


Services

FortiGuard Security Subscription Services

Security requirements are dynamic due to the constantly changing nature of threats. Our FortiGuard Labs global threat research team, comprised of over 125 professionals, uses automated processes to identify emerging threats, collects threat samples, and replicates, reviews and characterizes attacks. Based on this research, we develop updates for virus signatures, attack definitions, scanning engines, and other security solution components to distribute to end-customers through our FortiGuard global distribution network. Our FortiGuard security subscription services are designed to allow us to quickly deliver new threat detection capabilities to end-customers worldwide as new threats evolve. End-customers purchase FortiGuard security subscription services in advance, typically for a one-year term, to obtain coverage and access to regular updates for application control, antivirus, intrusion prevention, Web filtering, and antispam functions for our FortiGate products; antivirus, Web filtering and antispam functions for our FortiClient software; antivirus and antispam functions for our FortiMail products; vulnerability management for our FortiGate, FortiAnalyzer and FortiScan products, database functions for our FortiDB appliance, and web functions for our FortiWeb appliances. We provide FortiGuard services 24 hours a day, seven days a week.
 
FortiCare Technical Support Services

Our FortiCare services are our technical support services for the software, firmware and hardware in our products. In addition to our standard support service offering, we offer a premium service that offers faster response times and dedicated support oriented towards major accounts.

For our standard technical support offering for our products, channel partners often provide first level support to the end-customer, especially for small and mid-sized end-customers, and we typically provide second and third level support to our end-customers. We also provide knowledge management tools and customer self-help portals to help augment our support capabilities in an efficient and scalable manner. We provide technical support to partners and end-customers 24 hours a day, seven days a week through regional technical support managers located worldwide.

Training Services

We offer training services to our end-customers and channel partners through our training department and authorized training partners. We have also implemented a training certification program to ensure an understanding of our products and services. As of December 31, 2011, more than 20,000 individuals have participated in our training programs.

Professional Services

We offer professional services to end-customers primarily for large implementations where expert technical resources are required. Our professional services consultants help in the design of deployments of our products and work closely with end-customer engineers, managers and other project team members to implement our products according to design, utilizing network analysis tools, attack simulation software and scripts.

Customers

We sell our security solutions through channel partners to end-customers of various sizes—from small businesses to large enterprises and service providers—and across a variety of industries including telecommunications, government, financial services, retail, education, technology, healthcare and manufacturing. An end-customer deployment may involve one of our appliances or thousands, depending on our end-customers’ size and security requirements. As of December 31, 2011, we had shipped over 850,000 appliances via more than 10,000 channel partners to more than 125,000 end-customers worldwide, including a majority of the 2011 Fortune Global 100. For additional information regarding our sales by customer location, see Note 15 to our Consolidated Financial Statements in Part II, Item 8 of this Annual Report on Form 10-K.

During fiscal 2009, one channel partner, Alternative Technology, Inc., a subsidiary of Arrow Electronics, Inc., accounted for approximately 12% of total revenue. During fiscal 2010 and 2011, no single customer accounted for more than 10% of total revenue.


5

Table of Contents

Sales and Marketing

We primarily sell our products and services directly to distributors that sell to resellers and service providers, that, in turn, sell to our end-customers. In certain cases, we sell directly to government focused resellers, very large service providers and major systems integrator partners who have large purchasing power and unique customer deployment demands. As of December 31, 2011, our distribution channel program had more than 10,000 channel partners worldwide. We work with many of the world’s leading technology distributors, including Arrow Electronics, Inc., Ingram Micro Inc. and Tech Data Corporation.

We support our channel partners with a team of experienced channel account managers, sales professionals and sales engineers who provide business planning, joint marketing strategy, and pre-sales and operational sales support. Additionally, our sales team often helps drive and support large enterprise and service provider sales through a direct touch model. Our sales professionals and engineers typically work alongside our channel partners and directly engage with end-customers to address their unique security and deployment requirements. Our sales cycle for an initial end-customer purchase typically ranges from three to six months but can be longer especially for large enterprises, service providers and government customers. To support our broadly dispersed global channel and end-customer base, we have sales offices in over 30 countries around the world.

Our marketing strategy is focused on building our brand and driving end-customer demand for our security solutions. We execute this strategy by leveraging a combination of internal marketing professionals and a network of regional and global channel partners. Our internal marketing organization is responsible for branding, product marketing, channel marketing and sales support programs. We focus our resources on programs, tools and activities that can be leveraged by partners worldwide to extend our marketing reach, such as sales tools and collateral, product awards and technical certifications, training, regional seminars and conferences, webinars and various other demand-generation activities.
 
Manufacturing and Suppliers

We outsource the manufacturing of our security appliance products to a variety of contract manufacturers and original design manufacturers. Our current manufacturing partners include Flextronics International Ltd., Micro Star International, Ltd., Creation Technologies, Inc. and a number of Taiwan-based manufacturers. We submit purchase orders to our contract manufacturers that describe the type and quantities of our products to be manufactured, the delivery date and other delivery terms. Once our products are manufactured, they are sent to either our headquarters in Sunnyvale, California, or to our logistics partner in Taoyuan City, Taiwan, where accessory packaging and quality-control testing are performed. We believe that outsourcing our manufacturing and a substantial portion of our logistics enables us to conserve capital, better adjust manufacturing volumes to meet changes in demand and more quickly deliver products, while allowing us to focus resources on our core competencies. Our proprietary FortiASICs, which are the key to the performance of our appliances, is fabricated by contract manufacturers in foundries operated by UMC and TSMC. Faraday (using UMC’s foundry), K-Micro (using TSMC’s foundry) and Renesas (using UMC's foundry) manufacture our ASICs on a purchase order basis. Accordingly, they are not obligated to continue to fulfill our supply requirements, and the prices we are charged for the fabrication of our ASICs could be increased on short notice.

The components included in our products are sourced from various suppliers by us or more frequently by our contract manufacturers. Some of the components important to our business, including specific types of central processing units from Intel, AMD, RMI/NetLogic and VIA and network chips from Broadcom, Marvell and Intel, and hard drives from Western Digital Technologies, are available from a limited or sole source of supply.

We have no long-term contracts related to the manufacturing of our ASICs or other components that guarantee any capacity or pricing terms.

For information regarding the geographical disbursement of our long-lived assets, see Note 15 to our Consolidated Financial Statements in Part II, Item 8 of this Annual Report on Form 10-K.

Research and Development

We focus our research and development efforts on developing new products and systems, and adding new features to existing products and systems. Our development strategy is to identify features, products and systems for both software and hardware that are, or are expected to be, needed by our end-customers. Our success in designing, developing, manufacturing and selling new or enhanced products will depend on a variety of factors, including the identification of market demand for new products, product selection, timely implementation of product design and development, product performance, effective manufacturing and assembly processes and sales and marketing.

As of December 31, 2011, our research and development organization had headcount of 497 people predominantly in

6

Table of Contents

Canada, the United States and China. Our research and development expense was $63.6 million in fiscal 2011, $49.8 million in fiscal 2010 and $42.2 million in fiscal 2009.

Intellectual Property

We rely primarily on patent, trademark, copyright and trade secrets laws, confidentiality procedures and contractual provisions to protect our technology. As of December 31, 2011, we had 76 issued U.S. patents, 12 issued Chinese patents, 1 issued Japanese patent, 96 patent applications pending for examination in the United States and 20 patent applications pending for examination in China. We also license software from third parties for inclusion in our products, including open source software and other software available on commercially reasonable terms.

Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality agreements with our employees, consultants, vendors and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that the steps taken by us will prevent misappropriation of our technology. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States.

Our industry is characterized by the existence of a large number of patents and frequent claims and related litigation regarding patent and other intellectual property rights. In particular, leading companies in the networking industry have extensive patent portfolios. From time-to-time, third parties, including certain of these leading companies, have asserted and may assert patent, copyright, trademark and other intellectual property rights against us, our channel partners or our end-customers. Successful claims of infringement by a third party could prevent us from distributing certain products or performing certain services or require us to pay substantial damages (including treble damages if we are found to have willfully infringed patents or copyrights), royalties or other fees. Even if third parties may offer a license to their technology, the terms of any offered license may not be acceptable and the failure to obtain a license or the costs associated with any license could cause our business, operating results or financial condition to be materially and adversely affected. We typically indemnify our end-customers, distributors and certain resellers against claims that our products infringe the intellectual property of third parties.

Competition

The markets for our products are extremely competitive and are characterized by rapid technological change. The principal competitive factors in our markets include the following:
 
product performance, features, effectiveness, interoperability and reliability;
 
technological expertise;
 
price of products and services and total cost of ownership;
 
brand recognition;
 
customer service and support;
 
sales and distribution capabilities;
 
compliance with industry standards and certifications;
 
size and financial stability of operations; and
 
breadth of product line.

Our competitors include networking companies such as Cisco Systems, Inc., Juniper Networks, Inc., and security vendors such as Check Point Software Technologies Ltd., McAfee Inc. (acquired by Intel Corporation), and SonicWALL, Inc. (acquired by Thoma Bravo), Palo Alto Networks, and other point solution security vendors.

We believe we compete favorably based on our products’ performance, reliability and breadth, our ability to add and integrate new networking and security features and our technological expertise. Several competitors are significantly larger, have greater financial, technical, marketing, distribution, customer support and other resources, are more established than we are, and

7

Table of Contents

have significantly better brand recognition. Some of these larger competitors have substantially broader product offerings and leverage their relationships based on other products or incorporate functionality into existing products in a manner that discourages users from purchasing our products. Based in part on these competitive pressures, we may lower prices or attempt to add incremental features and functionality.

Conditions in our markets could change rapidly and significantly as a result of technological advancements or continuing market consolidation. The development and market acceptance of alternative technologies could decrease the demand for our products or render them obsolete. Our competitors may introduce products that are less costly, provide superior performance or achieve greater market acceptance than our products. In addition, our larger competitors often have broader product lines and market focus, are in a better position to withstand any significant reduction in capital spending by end-customers in these markets, and will therefore not be as susceptible to downturns in a particular market. The above competitive pressures are likely to continue to impact our business. We may not be able to compete successfully in the future, and competition may harm our business.

Employees

As of December 31, 2011, our total headcount was 1,583 people including payrolled contractors. We had 497 in research and development, 593 in sales and marketing, 352 in services and support, 29 in manufacturing operations, and 112 in a general and administrative capacity. As of December 31, 2011, our headcount was 387 people in the United States, 555 in Canada, 89 in France, 192 in China and 360 in other countries.

None of our U.S. employees are represented by a labor union with respect to his or her employment with us; however, our employees in France, Spain and Italy are represented by collective bargaining agreements. We have not experienced any work stoppages, and we consider our relations with our employees to be good.

Available Information

Our web site is located at www.fortinet.com, and our investor relations web site is located at http://investor.fortinet.com. The information posted on our website is not incorporated into this Annual Report on Form 10-K. Our Annual Report on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K and amendments to reports filed or furnished pursuant to Sections 13(a) and 15(d) of the Securities Exchange Act of 1934, as amended, are available free of charge on our investor relations web site as soon as reasonably practicable after we electronically file such material with, or furnish it to, the SEC. You may also access all of our public filings through the SEC’s website at www.sec.gov. Further, a copy of this Annual Report on Form 10-K is located at the SEC’s Public Reference Room at 100 F Street, NE, Washington, D.C. 20549. Information on the operation of the Public Reference Room can be obtained by calling the SEC at 1-800-SEC-0330.

We webcast our earnings calls and certain events we participate in or host with members of the investment community on our investor relations web site. Additionally, we provide notifications of news or announcements regarding our financial performance, including SEC filings, investor events, press and earnings releases, as part of our investor relations web site. The contents of these web sites are not intended to be incorporated by reference into this report or in any other report or document we file.

ITEM 1A.     Risk Factors

Investing in our common stock involves a high degree of risk. You should carefully consider the following risks and all other information contained in this 10-K, including our consolidated financial statements and the related notes, before investing in our common stock. The risks and uncertainties described below are not the only ones we face. Additional risks and uncertainties that we are unaware of, or that we currently believe are not material, also may become important factors that affect us. If any of the following risks materialize, our business, financial condition and results of operations could be materially harmed. In that case, the trading price of our common stock could decline, and you may lose some or all of your investment.

Risks Related to Our Business

Our quarterly operating results are likely to vary significantly and be unpredictable.
 
Our operating results have historically varied from period to period, and we expect that they will continue to do so as a result of a number of factors, many of which are outside of our control and may be difficult to predict, including:
 
the level of demand for our products and services;

8

Table of Contents

 
the timing of channel partner and end-customer orders;
 
the timing of shipments, which may depend on many factors such as inventory levels and logistics, our ability to ship new products on schedule and accurately forecast inventory requirements, and potential delays in the manufacturing process;

inventory imbalances, such as those related to new products and the end of life of existing products;
 
the mix of products sold, the mix of revenue between products and services and the degree to which products and services are bundled and sold together for a package price;

the budgeting cycles and purchasing practices of our channel partners and end-customers;
 
seasonal buying patterns of our end-customers;
 
the timing of revenue recognition for our sales, which may be affected by both the mix of sales by our “sell-in” versus our “sell-through” channel partners, and by the extent to which we bring on new distributors;
 
the accuracy and timing of point of sale reporting by our sell-through distributors, which impacts our ability to recognize revenue;
 
the level of perceived threats to network security, which may fluctuate from period to period;
 
changes in end-customer, distributor or reseller requirements or market needs;
 
changes in the growth rate of the network security or UTM markets;
 
the timing and success of new product and service introductions by us or our competitors or any other change in the competitive landscape of our industry, including consolidation among our competitors or end-customers;
 
deferral of orders from end-customers in anticipation of new products or product enhancements announced by us or our competitors;
 
increases or decreases in our expenses caused by fluctuations in foreign currency exchange rates, as a significant portion of our expenses are incurred and paid in currencies other than the U.S. dollar;
 
decisions by potential end-customers to purchase network security solutions from larger, more established security vendors or from their primary network equipment vendors;
 
price competition;
 
changes in customer renewal rates for our services;
 
changes in the length of services contracts sold;
 
insolvency or credit difficulties confronting our customers, affecting their ability to purchase or pay for our products and services;
 
disruptions in our channel or termination of our relationship with important channel partners;
 
insolvency or credit difficulties confronting our key suppliers, which could disrupt our supply chain;
 
general economic conditions, both domestically and in our foreign markets; and
 
future accounting pronouncements or changes in our accounting policies.

Any one of the factors above or the cumulative effect of some of the factors referred to above may result in significant

9

Table of Contents

fluctuations in our quarterly financial and other operating results, including fluctuations in our key metrics. This variability and unpredictability could result in our failing to meet our internal operating plan or the expectations of securities analysts or investors for any period. If we fail to meet or exceed such expectations for these or any other reasons, the market price of our shares could fall substantially and we could face costly lawsuits, including securities class action suits. In addition, a significant percentage of our operating expenses are fixed in nature and based on forecasted revenue trends. Accordingly, in the event of revenue shortfalls, we are generally unable to mitigate the negative impact on margins in the short term.

Our billings and revenue growth may slow or may not continue.
 
We may not be able to sustain profitability in future periods if we fail to increase billings, revenue or deferred revenue, do not appropriately manage our cost structure, or encounter unanticipated liabilities. Billings and revenue growth may slow or decline for a number of reasons, including a slow down in demand for our products or services, an increase in competition, a decrease in the growth of our overall market, softness in demand in certain geographies, or if we fail for any reason to continue to capitalize on growth opportunities. Any failure by us to maintain profitability and continue our billings and revenue growth could cause the price of our common stock to materially decline.
 
Reliance on a concentration of shipments at the end of the quarter could cause our revenue to fall below expected levels.
 
As a result of customer-buying patterns and the efforts of our sales force and channel partners to meet or exceed quarterly quotas, we have historically received a substantial portion of each quarter's sales orders and generated a substantial portion of each quarter's revenue during the last two weeks of the quarter. If expected revenue at the end of any quarter is delayed for any reason, including the failure of anticipated purchase orders to materialize, or our logistics partners' inability to ship products prior to quarter-end to fulfill purchase orders received near the end of the quarter, our failure to manage inventory to meet demand, our inability to release new products on schedule, any failure of our systems related to order review and processing, or any delays in shipments based on trade compliance requirements, our revenue for that quarter could fall below our expectations or those of securities analysts and investors, resulting in a decline in our stock price.

We rely significantly on revenue from subscription and support services which may decline, and because we recognize revenue from subscriptions and support services over the term of the relevant service period, downturns or upturns in sales are not immediately reflected in full in our operating results.

Our services revenue has historically accounted for a significant percentage of our total revenue. Sales of new or renewal subscription and services contracts may decline and fluctuate as a result of a number of factors, including end-customers' level of satisfaction with our products and services, the prices of our products and services, the prices of products and services offered by our competitors or reductions in our customers' spending levels. If our sales of new or renewal subscription and services contracts decline, our revenue and revenue growth may decline and our business will suffer. In addition, we recognize subscription and service revenue monthly over the term of the relevant service period, which is typically one year but has been as long as five years. As a result, much of the revenue we report each quarter is the recognition of deferred revenue from subscription and services contracts entered into during previous quarters. Consequently, a decline in new or renewed subscription or service contracts in any one quarter will not be fully reflected in revenue in that quarter but will negatively affect our revenue in future quarters. Accordingly, the effect of significant downturns in new or renewed sales of our subscriptions or services is not reflected in full in our results of operations until future periods. Our subscription and service revenue also makes it difficult for us to rapidly increase our revenue through additional service sales in any period, as revenue from new and renewal service contracts must be recognized over the applicable service period. Furthermore increases in the average term of services contracts would result in revenue for services contracts being recognized over longer periods of time.

Managing inventory of our products and product components is complex. Insufficient inventory may result in lost sales opportunities or delayed revenue, while excess inventory may harm our gross margins.

Our channel partners may increase orders during periods of product shortages, cancel orders if their inventory is too high, return product or take advantage of price protection (if any), or delay orders in anticipation of new products. They also may adjust their orders in response to the supply of our products and the products of our competitors that are available to them and in response to seasonal fluctuations in end-customer demand. Furthermore, if the time required to manufacture certain products or ship products increases for any reason, this could result in inventory shortfalls. Management of our inventory is further complicated by the significant number of different products and models that we sell.
 
In addition, for those channel partners that have rights of return, inventory held by such channel partners affects our results of operations. Our inventory management systems and related supply chain visibility tools may be inadequate to enable us to effectively manage inventory. Inventory management remains an area of focus as we balance the need to maintain

10

Table of Contents

inventory levels that are sufficient to ensure competitive lead times against the risk of inventory obsolescence because of rapidly changing technology and customer requirements. If we ultimately determine that we have excess inventory, we may have to reduce our prices and write-down inventory, which in turn could result in lower gross margins. Alternatively, insufficient inventory levels may lead to shortages that result in delayed revenue or loss of sales opportunities altogether as potential end-customers turn to competitors' products that are readily available. For example, we experienced inventory shortages in the third quarter of 2011, based largely on more demand for certain products than we had forecast. If we are unable to effectively manage our inventory and that of our distribution partners, our results of operations could be adversely affected.
 
We rely on third-party channel partners to generate substantially all of our revenue. If our partners fail to perform, our ability to sell our products and services will be limited, and if we fail to optimize our channel partner model going forward, our operating results will be harmed.
 
Substantially all of our revenue is generated through sales by our channel partners, which include distributors and resellers. We depend upon our channel partners to generate sales opportunities and manage the sales process. To the extent our channel partners are unsuccessful in selling our products, or we are unable to enter into arrangements with, and retain, a sufficient number of high quality channel partners in each of the regions in which we sell products, and keep them motivated to sell our products, our ability to sell our products and operating results will be harmed. The termination of our relationship with any significant channel partner may adversely impact our sales and operating results.
 
We provide sales channel partners with specific programs to assist them in selling our products, but there can be no assurance that these programs will be effective. In addition, our channel partners may be unsuccessful in marketing, selling and supporting our products and services. Our channel partners generally do not have minimum purchase requirements. They may also market, sell and support products and services that are competitive with ours, and may devote more resources to the marketing, sales and support of such products. They may have incentives to promote our competitors' products to the detriment of our own. They may cease selling our products altogether. We cannot assure you that we will retain these channel partners or that we will be able to secure additional or replacement partners. The loss of one or more of our significant channel partners or the failure to obtain and ship a number of large orders each quarter through them could harm our operating results. In addition, any new sales channel partner will require extensive training and may take several months or more to achieve productivity. Our channel partner sales structure could subject us to lawsuits, potential liability and reputational harm if, for example, any of our channel partners misrepresent the functionality of our products or services to end-customers or our channel partners violate laws or our corporate policies. If we fail to optimize our channel partner model or fail to manage existing sales channels, our business will be seriously harmed.
 
If we are not successful in continuing to execute our strategy to increase our sales to larger end-customers, our results of operations may suffer.
 
An important part of our growth strategy is to increase sales of our products to large enterprises, service providers and governmental entities. Sales to enterprises, service providers and governmental entities involve risks that may not be present (or that are present to a lesser extent) with sales to small-to-mid-sized entities. These risks include:
 
increased competition from larger competitors, such as Cisco Systems, Inc., Check Point Software Technologies Ltd., McAfee, Inc. (acquired by Intel Corporation), Juniper Networks, Inc., that traditionally target enterprises, service providers and governmental entities and that may already have purchase commitments from those end-customers;
 
increased purchasing power and leverage held by large end-customers in negotiating contractual arrangements;
 
more stringent requirements in our support service contracts, including stricter support response times, and increased penalties for any failure to meet support requirements; and

longer sales cycles and the associated risk that substantial time and resources may be spent on a potential end-customer that elects not to purchase our products and services.
 
Large enterprises, service providers and governmental entities often undertake a significant evaluation process that results in a lengthy sales cycle, in some cases over 12 months. Although we have a channel sales model, our sales representatives typically engage in direct interaction with our distributors and resellers in connection with sales to larger end-customers. Due to the lengthy nature, the size and scope, and stringent requirements of these evaluations, we typically provide evaluation products to these customers. We may spend substantial time, effort and money in our sales efforts without being

11

Table of Contents

successful in producing any sales. If we are unsuccessful in converting these evaluations into sales, we may experience an increased inventory of used products and potentially increased write-offs. In addition, product purchases by enterprises, service providers and governmental entities are frequently subject to budget constraints, multiple approvals, and unplanned administrative, processing and other delays. Finally, enterprise, service providers and governmental entities typically have longer implementation cycles, require greater product functionality and scalability and a broader range of services, including design services, demand that vendors take on a larger share of risks, sometimes require acceptance provisions that can lead to a delay in revenue recognition, and expect greater payment flexibility from vendors. All these factors can add further risk to business conducted with these customers. If sales expected from a large end-customer for a particular quarter are not realized in that quarter or at all, our business, operating results and financial condition could be materially and adversely affected.
 
The average sales prices of our products may decrease, which may reduce our gross profits and adversely impact our financial results and the trading price of our common stock.
 
The average sales prices for our products may decline for a variety of reasons, including competitive pricing pressures, discounts we offer, a change in our mix of products, anticipation of the introduction of new products or promotional programs. Competition continues to increase in the market segments in which we participate, and we expect competition to further increase in the future, thereby leading to increased pricing pressures. Larger competitors with more diverse product offerings may reduce the price of products that compete with ours in order to promote the sale of other products or may bundle them with other products. Additionally, although we price our products and services worldwide in U.S. dollars, currency fluctuations in certain countries and regions may negatively impact actual prices that partners and customers are willing to pay in those countries and regions. Furthermore, we anticipate that the average sales prices and gross profits for our products will decrease over product life cycles. We cannot assure you that we will be successful in developing and introducing new offerings with enhanced functionality on a timely basis, or that our product offerings, if introduced, will enable us to maintain our prices and gross profits at levels that will allow us to maintain profitability.
 
Defects or vulnerabilities in our products or services, the failure of our products or services to prevent a virus or security breach, or misuse of our products could harm our reputation and divert resources.
 
Because our products and services are complex, they have contained and may contain defects or errors that are not detected until after their commercial release and deployment by our customers. Defects or vulnerabilities may impede or block network traffic or cause our products or services to be vulnerable to electronic break-ins or cause them to fail to help secure networks. Because the techniques used by computer hackers to access or sabotage networks change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques. In addition, defects or errors in our FortiGuard subscription updates or our FortiGate appliances could result in a failure of our FortiGuard services to effectively update end-customers' FortiGate appliances and thereby leave customers vulnerable to attacks. Furthermore, our solutions may also fail to detect or prevent viruses, worms or similar threats due to a number of reasons such as the evolving nature of such threats and the continual emergence of new threats that we may fail to add to our FortiGuard databases in time to protect our end-customers' networks. Our FortiGuard or FortiCare data centers and networks may also experience technical failures and downtime, and may fail to distribute appropriate updates, or fail to meet the increased requirements of a growing customer base. Any such technical failure, downtime, or failures in general may temporarily or permanently expose our end-customers' networks, leaving their networks unprotected against the latest security threats.
 
An actual or perceived security breach or infection of the network of one of our end-customers, regardless of whether the breach is attributable to the failure of our products or services to prevent the security breach, could adversely affect the market's perception of our security products. We may not be able to correct any security flaws or vulnerabilities promptly, or at all. Our products may also be misused by end-customers or third parties who obtain access to our products. For example, our products could be used to censor private access to certain information on the Internet. Such use of our products for censorship could result in negative press coverage and negatively affect our reputation, even if we take reasonable measures to prevent any improper shipment of our products or if our products are provided by an unauthorized third-party. Any defects, errors or vulnerabilities in our products, or misuse of our products, could result in:
 
expenditure of significant financial and product development resources in efforts to analyze, correct, eliminate or work-around errors or defects or to address and eliminate vulnerabilities;
 
loss of existing or potential end-customers or channel partners;
 
delayed or lost revenue;
 
delay or failure to attain market acceptance;

12

Table of Contents

 
negative publicity, which will harm our reputation; and
 
litigation, regulatory inquiries or investigations that may be costly and harm our reputation.
 
Our business and operations have experienced rapid growth, and if we do not appropriately manage any future growth, or are unable to improve our systems and processes, our operating results will be negatively affected.
 
We have a high volume business that has grown over the last several years. We rely heavily on information technology systems to help manage critical functions such as order processing, revenue recognition, financial forecasts, inventory and supply chain management and trade compliance reviews. However, we have been slow to adopt and implement certain automated functions, like Electronic Data Interchange, which could have a negative impact on our business. For example, a large part of our order processing relies on the manual processing of emails internally and from our customers. Combined with the fact that we may receive a majority of our orders in the last few weeks of any given quarter, a significant interruption in our email service or other systems could result in delayed order fulfillment and decreased revenue for that quarter. To manage any future growth effectively, we must continue to improve and expand our information technology and financial infrastructure, operating and administrative systems and controls, and continue to manage headcount, capital and processes in an efficient manner. We may not be able to successfully implement improvements to these systems and processes in a timely or efficient manner. In addition, our systems and processes may not prevent or detect all errors, omissions or fraud. Our failure to improve our systems and processes, or their failure to operate in the intended manner, may result in our inability to manage the growth of our business and to accurately forecast our revenue, expenses and earnings, or to prevent certain losses. Our productivity and the quality of our products and services may be adversely affected if we do not integrate and train our new employees quickly and effectively. Any future growth would add complexity to our organization and require effective coordination throughout our organization. Failure to manage any future growth effectively could result in increased costs and harm our results of operations.
 
If our estimates or judgments relating to our critical accounting policies are based on assumptions that change or prove to be incorrect, our operating results could fall below expectations of securities analysts and investors, resulting in a decline in our stock price.
 
The preparation of financial statements in conformity with generally accepted accounting principles requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances, as provided in “Management's Discussion and Analysis of Financial Condition and Results of Operations” in this Form 10-K, the results of which form the basis for making judgments about the carrying values of assets and liabilities that are not readily apparent from other sources. Our operating results may be adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions, which could cause our operating results to fall below the expectations of securities analysts and investors, resulting in a decline in our stock price. Significant assumptions and estimates used in preparing our consolidated financial statements include those related to revenue recognition, stock-based compensation, valuation of inventory, warranty liabilities, and accounting for income taxes.

We offer retroactive price protection to certain of our major distributors, and if we fail to balance their inventory with end-customer demand for our products, our allowance for price protection may be inadequate, which could adversely affect our results of operations.

We provide certain of our major distributors with price protection rights for inventories of our products held by them. If we reduce the list price of our products, certain distributors receive refunds or credits from us that reduce the price of such products held in their inventory based upon the new list price. Future credits for price protection will depend on the percentage of our price reductions for the products in inventory and our ability to manage the levels of our major distributors' inventories. If future price protection adjustments are higher than expected, our future results of operations could be materially and adversely affected.
 
If we are unable to hire, retain and motivate qualified personnel, our business will suffer.
 
Our future success depends, in part, on our ability to continue to attract and retain highly skilled personnel. The loss of the services of any of our key personnel, the inability to attract or retain qualified personnel, or delays in hiring required personnel, particularly in engineering and sales, may seriously harm our business, financial condition and results of operations. From time to time, we have experienced turnover in our management-level personnel. None of our key employees has an employment agreement for a specific term, and any of our employees may terminate their employment at any time. Our ability to continue to attract and retain highly skilled personnel will be critical to our future success. Competition for highly skilled

13

Table of Contents

personnel is frequently intense, especially in the locations where we have a substantial presence and need for highly-skilled personnel: the San Francisco Bay Area, Vancouver, Canada and Beijing, China. A large portion of our employee base is substantially vested in significant stock option grants, and the ability to exercise those options and sell their stock may result in a larger than normal turnover rate. We may not be successful in attracting, assimilating or retaining qualified personnel to fulfill our current or future needs. Also, to the extent we hire personnel from competitors, we may be subject to allegations that they have been improperly solicited or divulged proprietary or other confidential information.
 
We are dependent on the continued services and performance of our senior management, the loss of any of whom could adversely affect our business, operating results and financial condition.
 
Our future performance depends on the continued services and continuing contributions of our senior management to execute on our business plan, and to identify and pursue new opportunities and product innovations. The loss of services of senior management, particularly Ken Xie, our Co-founder, President and Chief Executive Officer, Michael Xie, our Co-founder, Vice President of Engineering and Chief Technical Officer, and Ken Goldman, our Vice President and Chief Financial Officer, could significantly delay or prevent the achievement of our development and strategic objectives. In addition, key personnel may be distracted by activities unrelated to our business. The loss of the services, or distraction, of our senior management for any reason could adversely affect our business, financial condition and results of operations.
 
Adverse economic conditions or reduced information technology spending may adversely impact our business.
 
Our business depends on the overall demand for information technology and on the economic health of our current and prospective customers. In addition, the purchase of our products is often discretionary and may involve a significant commitment of capital and other resources. Weak global economic conditions, weak economic conditions in certain geographies, or a reduction in information technology spending regardless of macro-economic conditions, could adversely impact our business, financial condition and results of operations in a number of ways, including longer sales cycles, lower prices for our products and services, higher default rates among our distributors, reduced unit sales and lower or no growth.

Because we depend on several third-party manufacturers to build our products, we are susceptible to manufacturing delays that could prevent us from shipping customer orders on time, if at all, and may result in the loss of sales and customers.
 
We outsource the manufacturing of our security appliance products to a variety of contract manufacturing partners and original design manufacturing partners.
 
Our reliance on our third-party manufacturers reduces our control over the manufacturing process, exposing us to risks, including reduced control over quality assurance, product costs and product supply and timing. Any manufacturing disruption by our third-party manufacturers could impair our ability to fulfill orders. If we are unable to manage our relationships with these third-party manufacturers effectively, or if these third-party manufacturers experience delays, increased manufacturing lead-times, disruptions, capacity constraints or quality control problems in their manufacturing operations, or fail to meet our future requirements for timely delivery, our ability to ship products to our customers could be impaired and our business would be seriously harmed.
 
These manufacturers fulfill our supply requirements on the basis of individual purchase orders. We have no long-term contracts or arrangements with certain of our third-party manufacturers that guarantee capacity, the continuation of particular payment terms or the extension of credit limits. Accordingly, they are not obligated to continue to fulfill our supply requirements, and the prices we are charged for manufacturing services could be increased on short notice. If we are required to change third-party manufacturers, our ability to meet our scheduled product deliveries to our customers would be adversely affected, which could cause the loss of sales and existing or potential customers, delayed revenue or an increase in our costs which could adversely affect our gross margins. Our individual product lines are generally manufactured by only one manufacturing partner. Any production interruptions for any reason, such as a natural disaster, epidemic, capacity shortages, or quality problems, at one of our manufacturing partners would severely affect sales of our product lines manufactured by that manufacturing partner.
 
Our proprietary FortiASIC, which is the key to the performance of our appliances, is fabricated by contract manufacturers in foundries operated by UMC and Taiwan Semiconductor Manufacturing Corporation, or TSMC. Faraday (using UMC's foundry), K-Micro (using TSMC's foundry) and Renesas (using UMC's foundry) manufacture our ASICs on a purchase order basis, and these foundries do not guarantee any capacity and could reject orders from Faraday, K-Micro or Renesas or try to increase pricing. Accordingly, the foundries are not obligated to continue to fulfill our supply requirements, and due to the long lead time that a new foundry would require, we could suffer temporary or long term inventory shortages of our FortiASIC as well as increased costs. Our suppliers may also prioritize orders by other companies that order higher

14

Table of Contents

volumes of products. If any of these suppliers materially delays its supply of ASICs or specific product models to us, or requires us to find an alternate supplier and we are not able to do so on a timely and reasonable basis, or if these foundries materially increase their prices for fabrication of our ASICs or specific product models, our business would be harmed.
 
In addition, our reliance on third-party manufacturers and foundries limits our control over environmental regulatory requirements such as the hazardous substance content of our products and therefore our ability to ensure compliance with the EU RoHS and other similar laws.
 
Because some of the key components in our products come from limited sources of supply, we are susceptible to supply shortages, long lead times for components, and supply changes, each of which could disrupt or delay our scheduled product deliveries to our customers, result in inventory shortage, and may result in the loss of sales and customers.
 
We and our contract manufacturers currently purchase several key parts and components used in the manufacture of our products from limited sources of supply. We are therefore subject to the risk of shortages and long lead times in the supply of these components and the risk that component suppliers discontinue or modify components used in our products. We have in the past experienced, and are currently experiencing, shortages and long lead times for certain components. Certain of our limited source components for particular appliances and suppliers of those components include: specific types of central processing units from Intel Corporation, Advanced Micro Devices, Inc., RMI/Netlogic Corporation and VIA Technologies, Inc., network chips from Broadcom Corporation, Marvell Technology Group Ltd. and Intel, and hard drives from Western Digital Technologies, Inc. The introduction by component suppliers of new versions of their products, particularly if not anticipated by us or our contract manufacturers, could require us to expend significant resources to incorporate these new components into our products. In addition, if these suppliers were to discontinue production of a necessary part or component, we would be required to expend significant resources and time in locating and integrating replacement parts or components from another vendor. Qualifying additional suppliers for limited source parts or components can be time-consuming and expensive.
 
Our manufacturing partners have experienced long lead times for the purchase of components incorporated into our products. Lead times for components may be adversely impacted by factors outside of our control, such as natural disasters and other factors. For example, lead times for some components are currently being extended by the impact of flooding in Thailand on certain suppliers. Our reliance on a limited number of suppliers involves several additional risks, including:

a potential inability to obtain an adequate supply of required parts or components when required;
 
financial or other difficulties faced by our suppliers;
 
infringement or misappropriation of our intellectual property;
 
price increases;
 
failure of a component to meet environmental or other regulatory requirements;
 
failure to meet delivery obligations in a timely fashion; and
 
failure in component quality.
 
The occurrence of any of these would be disruptive to us and could seriously harm our business. Any interruption or delay in the supply of any of these parts or components, or the inability to obtain these parts or components from alternate sources at acceptable prices and within a reasonable amount of time, would harm our ability to meet our scheduled product deliveries to our distributors, resellers and end-customers. This could harm our relationships with our channel partners and end-customers and could cause delays in shipment of our products and adversely affect our results of operations.
 
We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and results of operations.
 
A majority of our operating expenses is incurred outside the United States. These expenses are denominated in foreign currencies and are subject to fluctuations due to changes in foreign currency exchange rates, particularly changes in the Euro and Canadian dollar. For example, during the second and third quarters of 2011, we were impacted by the weakening of the dollar against the Canadian dollar and the Euro, which caused our operating expenses to increase. Although we have been hedging currency exposures relating to certain balance sheet accounts and have periodically entered into cash flow hedges relating to certain operating expenses incurred outside of the United States, if we stop hedging against any of these risks or if

15

Table of Contents

our attempts to hedge against these currency exposures are not successful, our financial condition and results of operations could be adversely affected. In addition, our sales contracts are primarily denominated in U.S. dollars and therefore substantially all of our revenue is not subject to foreign currency risk. However, a strengthening of the U.S. dollar could increase the real cost of our products to our customers outside of the United States, which could adversely affect our financial condition and results of operations. 

We generate a majority of revenue from sales to distributors, resellers and end-customers outside of the United States, and we are therefore subject to a number of risks associated with international sales and operations.
 
We market and sell our products throughout the world and have established sales offices in many parts of the world. Therefore, we are subject to risks associated with having worldwide operations. We are also subject to a number of risks typically associated with international sales and operations, including:
 
economic or political instability in foreign markets;
 
greater difficulty in enforcing contracts, accounts receivable collection and longer collection periods;
 
changes in regulatory requirements;
 
difficulties and costs of staffing and managing foreign operations;
 
the uncertainty of protection for intellectual property rights in some countries;
 
costs of compliance with foreign policies, laws and regulations and the risks and costs of non-compliance with such policies, laws and regulations;
 
costs of complying with U.S. laws and regulations for foreign operations, including the Foreign Corrupt Practices Act, import and export control laws, tariffs, trade barriers, and economic sanctions;
 
other regulatory or contractual limitations on our ability to sell our products in certain foreign markets, and the risks and costs of non-compliance;
 
heightened risks of unfair or corrupt business practices in certain geographies and of improper or fraudulent sales arrangements that may impact financial results and result in restatements of financial statements and irregularities in financial statements;
 
the potential for political unrest, terrorism, hostilities or war;
 
management communication and integration problems resulting from cultural differences and geographic dispersion; and
 
multiple and possibly overlapping tax structures.
 
Product and service sales may be subject to foreign governmental regulations, which vary substantially from country to country. Further, we may be unable to keep up-to-date with changes in government requirements as they change from time to time. Failure to comply with these regulations could result in adverse effects to our business. In many foreign countries it is common for others to engage in business practices that are prohibited by our internal policies and procedures or U.S. regulations applicable to us. Although we implemented policies and procedures designed to ensure compliance with these laws and policies, there can be no assurance that all of our employees, contractors, channel partners and agents will comply with these laws and policies. Violations of laws or key control policies by our employees, contractors, channel partners or agents could result in delays in revenue recognition, financial reporting misstatements, fines, penalties, or the prohibition of the importation or exportation of our products and services and could have a material adverse effect on our business and results of operations.
 
We are subject to governmental export and import controls that could subject us to liability or impair our ability to compete in international markets.
 
Because we incorporate encryption technology into our products, certain of our products are subject to U.S. export controls and may be exported outside the U.S. only with the required export license or through an export license exception. If

16

Table of Contents

we were to fail to comply with U.S. export licensing, U.S. Customs regulations, U.S. economic sanctions and other laws, we could be subject to substantial civil and criminal penalties, including fines for the company and incarceration for responsible employees and managers, and the possible loss of export or import privileges. In addition, if our channel partners fail to obtain appropriate import, export or re-export licenses or permits, we may also be adversely affected through reputational harm and penalties. Obtaining the necessary export license for a particular sale may be time-consuming and may result in the delay or loss of sales opportunities.
 
Furthermore, U.S. export control laws and economic sanctions prohibit the shipment of certain products to U.S. embargoed or sanctioned countries, governments and persons. Even though we take precautions to prevent our product from being shipped to U.S. sanctions targets, our products could be shipped to those targets by our channel partners, despite such precautions. Any such shipment could have negative consequences including government investigations and penalties and reputational harm. In addition, various countries regulate the import of certain encryption technology, including import permitting/licensing requirements, and have enacted laws that could limit our ability to distribute our products or could limit our customers' ability to implement our products in those countries. Changes in our products or changes in export and import regulations may create delays in the introduction of our products in international markets, prevent our customers with international operations from deploying our products globally or, in some cases, prevent the export or import of our products to certain countries, governments or persons altogether. Any change in export or import regulations, economic sanctions or related legislation, shift in the enforcement or scope of existing regulations, or change in the countries, governments, persons or technologies targeted by such regulations, could result in decreased use of our products by, or in our decreased ability to export or sell our products to, existing or potential customers with international operations. Any decreased use of our products or limitation on our ability to export or sell our products would likely adversely affect our business, financial condition and results of operations.
 
If we fail to comply with environmental requirements, our business, financial condition, operating results and reputation could be adversely affected.
 
We are subject to various environmental laws and regulations including laws governing the hazardous material content of our products and laws relating to the recycling of electrical and electronic equipment. The laws and regulations to which we are subject include the European Union, or EU, RoHS and the EU Waste Electrical and Electronic Equipment (WEEE) Directive as well as the implementing legislation of the EU member states. Similar laws and regulations have been passed or are pending in China, South Korea, Norway and Japan and may be enacted in other regions, including in the United States, and we are, or may in the future be, subject to these laws and regulations.
 
The EU RoHS and the similar laws of other jurisdictions ban the use of certain hazardous materials such as lead, mercury and cadmium in the manufacture of electrical equipment, including our products. We have incurred costs to comply with these laws, including research and development costs, costs associated with assuring the supply of compliant components and costs associated with writing off noncompliant inventory. We expect to incur more of these costs in the future. With respect to the EU RoHS, we and our competitors rely on an exemption for lead in network infrastructure equipment. It is possible this exemption will be revoked in the near future. If this exemption is revoked, if there are other changes to these laws (or their interpretation) or if new similar laws are passed in other jurisdictions, we may be required to reengineer our products to use components compatible with these regulations. This reengineering and component substitution could result in additional costs to us or disrupt our operations or logistics.
 
The EU has also adopted the WEEE Directive, which requires electronic goods producers to be responsible for the collection, recycling and treatment of such products. Although currently our EU International channel partners are responsible for the requirements of this directive as the importer of record in most of the European countries in which we sell our products, changes in interpretation of the regulations may cause us to incur costs or have additional regulatory requirements in the future to meet in order to comply with this directive, or with any similar laws adopted in other jurisdictions.
 
Our failure to comply with these and future environmental rules and regulations could result in reduced sales of our products, increased costs, substantial product inventory write-offs, reputational damage, penalties and other sanctions.
 
A portion of our revenue is generated by sales to governmental entities, which are subject to a number of challenges and risks.
 
Sales to U.S. and foreign federal, state and local governmental agency end-customers have accounted for a portion of our revenue in past periods, and we may in the future increase sales to governmental entities. Sales to governmental entities are subject to a number of risks. Selling to governmental entities can be highly competitive, expensive and time consuming, often requiring significant upfront time and expense without any assurance that we will win a sale. Government demand and payment

17

Table of Contents

for our products and services may be negatively impacted by numerous factors and requirements unique to selling to government agencies, such as public sector budgetary cycles and funding authorizations and requirements unique to government agencies, with funding or purchasing reductions or delays adversely affecting public sector demand for our products. To date we have had limited traction in sales to U.S. federal government agencies, and any future sales to governmental entities is uncertain. All of our sales to governmental entities have been made indirectly through our distribution channel. Governmental entities may have contractual or other legal rights to terminate contracts with our distributors and resellers for convenience or due to a default, and any such termination may adversely impact our future results of operations. For example, if the distributor receives a significant portion of its revenue from sales to such governmental entity, the financial health of the distributor could be substantially harmed, which could negatively affect our future sales to such distributor. Governments routinely investigate and audit government contractors' administrative processes, and any unfavorable audit could result in the government refusing to continue buying our products and services, a reduction of revenue or fines or civil or criminal liability if the audit uncovers improper or illegal activities. Any such penalties could adversely impact our results of operations in a material way. Finally, purchases by the U.S. government may require certain products to be manufactured in the United States and other high cost manufacturing locations, and we may not manufacture all products in locations that meet the requirements of the U.S. government.
 
False detection of viruses or security breaches or false identification of spam or spyware could adversely affect our business.
 
Our antivirus and our intrusion prevention services may falsely detect viruses or other threats that do not actually exist. This risk is heightened by the inclusion of a “heuristics” feature in our products, which attempts to identify viruses and other threats not based on any known signatures but based on characteristics or anomalies that may indicate that a particular item is a threat. When our end-customers enable the heuristics feature in our products, the risk of falsely identifying viruses and other threats significantly increases. These false positives, while typical in the industry, may impair the perceived reliability of our products and may therefore adversely impact market acceptance of our products. Also, our antispam and antispyware services may falsely identify emails or programs as unwanted spam or potentially unwanted programs, or alternatively fail to properly identify unwanted emails or programs, particularly as spam emails or spyware are often designed to circumvent antispam or spyware products. Parties whose emails or programs are blocked by our products may seek redress against us for labeling them as spammers or spyware, or for interfering with their business. In addition, false identification of emails or programs as unwanted spam or potentially unwanted programs may reduce the adoption of our products. If our system restricts important files or applications based on falsely identifying them as malware or some other item that should be restricted, this could adversely affect end-customers' systems and cause material system failures. Any such false identification of important files or applications could result in negative publicity, loss of end-customers and sales, increased costs to remedy any problem, and costly litigation.
 
If our internal network system is compromised by computer hackers, public perception of our products and services will be harmed.
 
We will not succeed unless the marketplace is confident that we provide effective network security protection. Because we provide network security products, we may be a more attractive target for attacks by computer hackers. Although we have not experienced significant damages from unauthorized access by a third-party of our internal network, if an actual or perceived breach of network security occurs in our internal systems it could adversely affect the market perception of our products and services. In addition, such a security breach could impair our ability to operate our business, including our ability to provide subscription and support services to our end-customers. If this happens, our revenue could decline and our business could suffer.
 
Our ability to sell our products is dependent on the quality of our technical support services, and our failure to offer high quality technical support services would have a material adverse effect on our sales and results of operations.
 
Once our products are deployed within our end-customers' networks, our end-customers depend on our technical support services, as well as the support of our channel partners, to resolve any issues relating to our products. If we or our channel partners do not effectively assist our customers in deploying our products, succeed in helping our customers quickly resolve post-deployment issues, and provide effective ongoing support, our ability to sell additional products and services to existing customers would be adversely affected and our reputation with potential customers could be damaged. Many enterprise, service provider and governmental entity end-customers require higher levels of support than smaller end-customers. If we fail to meet the requirements of the larger end-customers, it may be more difficult to execute on our strategy to increase our penetration with larger end-customers.
 
As a result, our failure to maintain high quality support services would have a material adverse effect on our business, financial condition and results of operations.

18

Table of Contents

 
Changes in our provision for income taxes or adverse outcomes resulting from examination of our income tax returns could adversely affect our results.
 
Our provision for income taxes is subject to volatility and could be adversely affected by several factors, many of which are outside of our control, including:
 
earnings being lower than anticipated in countries that have lower tax rates and higher than anticipated in countries that have higher tax rates;
 
changes in the valuation of our deferred tax assets and liabilities;
 
expiration of, or lapses in the research and development tax credit laws;
 
transfer pricing adjustments including the effect of acquisitions on our intercompany research and development and legal structure;
 
an increase in non-deductible expenses for tax purposes, including certain stock-based compensation expense, write-offs of acquired in-process research and development, and impairment of goodwill;
 
tax costs related to intercompany realignments;
 
tax assessments resulting from income tax audits or any related tax interest or penalties that could significantly affect our income tax provision for the period in which the settlement takes place;
 
a change in our decision to indefinitely reinvest foreign earnings;
 
changes in accounting principles; or
 
changes in tax laws and regulations including possible changes in the United States to the taxation of earnings of our foreign subsidiaries, and the deductibility of expenses attributable to foreign income, or the foreign tax credit rules, or changes to the United States income tax rate, which would necessitate a revaluation of our deferred tax assets and liabilities.
 
Significant judgment is required to determine the recognition and measurement attribute prescribed in Accounting Standards Codification ("ASC") 740-10. In addition, ASC 740-10 applies to all income tax positions, including the potential recovery of previously paid taxes, which if settled unfavorably could adversely impact our provision for income taxes or additional paid-in capital. Further, as a result of certain of our ongoing employment and capital investment actions and commitments, our income in certain countries is subject to reduced tax rates and in some cases is wholly exempt from tax. Our failure to meet these commitments could adversely impact our provision for income taxes. In addition, we are subject to the continuous examination of our income tax returns by the Internal Revenue Service and other tax authorities. We regularly assess the likelihood of adverse outcomes resulting from these examinations to determine the adequacy of our provision for income taxes. There can be no assurance that the outcomes from these continuous examinations will not have an adverse effect on our results of operations.

Although we released our entire valuation allowance in fiscal 2009, we may in the future be required to establish a new valuation allowance. We will continue to assess the need for a valuation allowance on the deferred tax asset by evaluating both positive and negative evidence that may exist.
 
Forecasting our estimated annual effective tax rate is complex and subject to uncertainty, and there may be material differences between our forecasted and actual tax rates.
 
Forecasts of our income tax position and effective tax rate are complex and subject to uncertainty because our income tax position for each year combines the effects of a mix of profits earned and losses incurred by us in various tax jurisdictions with a broad range of income tax rates, as well as changes in the valuation of deferred tax assets and liabilities, the impact of various accounting rules and changes to these rules and tax laws, the results of examinations by various tax authorities, and the impact of any acquisition, business combination or other reorganization or financing transaction. To forecast our global tax rate, we estimate our pre-tax profits and losses by jurisdiction and forecast our tax expense by jurisdiction. If the mix of profits and losses, our ability to use tax credits, or effective tax rates by jurisdiction is different than those estimated, our actual tax rate

19

Table of Contents

could be materially different than forecasted, which could have a material impact on our results of business, financial condition and results of operations.
 
As a multinational corporation, we conduct our business in many countries and are subject to taxation in many jurisdictions. The taxation of our business is subject to the application of multiple and sometimes conflicting tax laws and regulations as well as multinational tax conventions. Our effective tax rate is highly dependent upon the geographic distribution of our worldwide earnings or losses, the tax regulations and tax holidays in each geographic region, the availability of tax credits and carryforwards, and the effectiveness of our tax planning strategies. The application of tax laws and regulations is subject to legal and factual interpretation, judgment and uncertainty. Tax laws themselves are subject to change as a result of changes in fiscal policy, changes in legislation, and the evolution of regulations and court rulings. Consequently, taxing authorities may impose tax assessments or judgments against us that could materially impact our tax liability and/or our effective income tax rate.
 
In addition, we may be subject to examination of our income tax returns by the Internal Revenue Service and other tax authorities. If tax authorities challenge the relative mix of U.S. and international income, our future effective income tax rates could be adversely affected. While we regularly assess the likelihood of adverse outcomes from such examinations and the adequacy of our provision for income taxes, there can be no assurance that such provision is sufficient and that a determination by a tax authority will not have an adverse effect on our business, financial condition and results of operations.
 
Our inability to acquire and integrate other businesses, products or technologies could seriously harm our competitive position.
 
In order to remain competitive, we may seek to acquire additional businesses, products, or technologies and intellectual property, such as patents. If we identify an appropriate acquisition candidate, we may not be successful in negotiating the terms of the acquisition, financing the acquisition, or effectively integrating the acquired business, product, technology or intellectual property into our existing business and operations. We may have difficulty incorporating acquired technologies, intellectual property or products with our existing product lines and maintaining uniform standards, controls, procedures and policies. Our due diligence may fail to identify all of the problems, liabilities or other shortcomings or challenges of an acquired business, product or technology, including issues with intellectual property, product quality or product architecture, regulatory compliance practices, revenue recognition or other accounting practices or employee or customer issues. In addition, any acquisitions we are able to complete may not be accretive to earnings and may not result in any synergies or other benefits we had expected to achieve, which could result in write-offs that could be substantial. Further, completing a potential acquisition and integrating acquired businesses, products, technologies or intellectual property will significantly divert management time and resources.

Our business is subject to the risks of warranty claims, product returns, product liability and product defects.
 
Our products are very complex and, despite testing prior to their release, have contained and may contain undetected defects or errors, especially when first introduced or when new versions are released. For example, one of our high-end product models experienced a defect in limited deployments. Product errors have affected the performance of our products and could delay the development or release of new products or new versions of products, adversely affect our reputation and our end-customers' willingness to buy products from us, and adversely affect market acceptance or perception of our products. Any such errors or delays in releasing new products or new versions of products or allegations of unsatisfactory performance could cause us to lose revenue or market share, increase our service costs, cause us to incur substantial costs in redesigning the products, cause us to lose significant end-customers, subject us to liability for damages and divert our resources from other tasks, any one of which could materially and adversely affect our business, results of operations and financial condition. Our products must successfully interoperate with products from other vendors. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. The occurrence of hardware and software errors, whether or not caused by our products, could delay or reduce market acceptance of our products, and have an adverse effect on our business and financial performance, and any necessary revisions may cause us to incur significant expenses. The occurrence of any such problems could harm our business, financial condition and results of operations.
 
Although we have limitation of liability provisions in our standard terms and conditions of sale, they may not fully or effectively protect us from claims as a result of federal, state or local laws or ordinances or unfavorable judicial decisions in the United States or other countries. The sale and support of our products also entail the risk of product liability claims. We maintain insurance to protect against certain claims associated with the use of our products, but our insurance coverage may not adequately cover any claim asserted against us. In addition, even claims that ultimately are unsuccessful could result in our expenditure of funds in litigation and divert management's time and other resources.
 

20

Table of Contents

Our business is subject to the risks of earthquakes, fire, power outages, floods and other catastrophic events, and to interruption by manmade problems such as civil unrest and terrorism.
 
A significant natural disaster, such as an earthquake, fire, a flood, or significant power outage could have a material adverse impact on our business, operating results and financial condition. Our corporate headquarters are located in the San Francisco Bay Area, a region known for seismic activity. In addition, natural disasters could affect our manufacturing vendors or logistics providers' ability to perform services such as obtaining product components and manufacturing products on a timely basis and assisting with shipments on a timely basis. In the event our or our service providers' information technology systems or manufacturing or logistics abilities are hindered by any of the events discussed above, shipments could be delayed, resulting in missing financial targets, such as revenue and shipment targets, for a particular quarter. In addition, regional instability, acts of terrorism and other geo-political unrest could cause disruptions in our business or the business of our manufacturers, logistics providers, partners, or end-customers or the economy as a whole. Given our typical concentration of sales at each quarter end, any disruption in the business of our manufacturers, logistics providers, partners or end-customers that impacts sales at the end of our quarter could have a significant adverse impact on our quarterly results. All of the aforementioned risks may be augmented if the disaster recovery plans for us and our suppliers prove to be inadequate. To the extent that any of the above results in delays or cancellations of customer orders, or the delay in the manufacture, deployment or shipment of our products, our business, financial condition and results of operations would be adversely affected.

Risks Related to Our Industry

The network security market is rapidly evolving and the complex technology incorporated in our products makes them difficult to develop. If we do not accurately predict, prepare for and respond promptly to technological and market developments and changing end-customer needs, our competitive position and prospects will be harmed.
 
The network security market is expected to continue to evolve rapidly. Moreover, many of our end-customers operate in markets characterized by rapidly changing technologies and business plans, which require them to add numerous network access points and adapt increasingly complex enterprise networks, incorporating a variety of hardware, software applications, operating systems and networking protocols. In addition, computer hackers and others who try to attack networks employ increasingly sophisticated techniques to gain access to and attack systems and networks. The technology in our products is especially complex because it needs to effectively identify and respond to new and increasingly sophisticated methods of attack, while minimizing the impact on network performance. Additionally, some of our new products and enhancements may require us to develop new hardware architectures and ASICs that involve complex, expensive and time consuming research and development processes. Although the market expects rapid introduction of new products or product enhancements to respond to new threats, the development of these products is difficult and the timetable for commercial release and availability is uncertain and there can be long time periods between releases and availability of new products. We have in the past and may in the future experience unanticipated delays in the availability of new products and services and fail to meet previously announced timetables for such availability. If we do not quickly respond to the rapidly changing and rigorous needs of our end-customers by developing and releasing and making available on a timely basis new products and services or enhancements that can respond adequately to new security threats, our competitive position and business prospects will be harmed.
 
Our URL database for our Web filtering service may fail to keep pace with the rapid growth of URLs and may not categorize websites in accordance with our end-customers' expectations.
 
The success of our Web filtering service depends on the breadth and accuracy of our URL database. Although our URL database currently catalogs millions of unique URLs, it contains only a portion of the URLs for all of the websites that are available on the Internet. In addition, the total number of URLs and software applications is growing rapidly, and we expect this rapid growth to continue in the future. Accordingly, we must identify and categorize content for our security risk categories at an extremely rapid rate. Our database and technologies may not be able to keep pace with the growth in the number of websites, especially the growing amount of content utilizing foreign languages and the increasing sophistication of malicious code and the delivery mechanisms associated with spyware, phishing and other hazards associated with the Internet. Further, the ongoing evolution of the Internet and computing environments will require us to continually improve the functionality, features and reliability of our Web filtering function. Any failure of our databases to keep pace with the rapid growth and technological change of the Internet will impair the market acceptance of our products, which in turn will harm our business, financial condition and results of operations.
 
In addition, our Web filtering service may not be successful in accurately categorizing Internet and application content to meet our end-customers' expectations. We rely upon a combination of automated filtering technology and human review to categorize websites and software applications in our proprietary databases. Our end-customers may not agree with our determinations that particular URLs should be included or not included in specific categories of our databases. In addition, it is

21

Table of Contents

possible that our filtering processes may place material that is objectionable or that presents a security risk in categories that are generally unrestricted by our users' Internet and computer access policies, which could result in such material not being blocked from the network. Conversely, we may miscategorize websites such that access is denied to websites containing information that is important or valuable to our customers. Any miscategorization could result in customer dissatisfaction and harm our reputation. Any failure to effectively categorize and filter websites according to our end-customers' and channel partners' expectations will impair the growth of our business.
 
If our new products and product enhancements do not achieve sufficient market acceptance, our results of operations and competitive position will suffer.
 
We spend substantial amounts of time and money to research and develop new products and enhanced versions of our existing products to incorporate additional features, improved functionality or other enhancements in order to meet our customers' rapidly evolving demands for network security in our highly competitive industry. When we develop a new product or an enhanced version of an existing product, we typically incur expenses and expend resources upfront to market, promote and sell the new offering. Therefore, when we develop and introduce new or enhanced products, they must achieve high levels of market acceptance in order to justify the amount of our investment in developing and bringing them to market.
 
Our new products or product enhancements could fail to attain sufficient market acceptance for many reasons, including:
 
delays in releasing our new products or enhancements to the market;
 
failure to accurately predict market demand in terms of product functionality and to supply products that meet this demand in a timely fashion;
 
failure of our sales force and partners to focus on selling new products;
 
inability to interoperate effectively with the networks or applications of our prospective end-customers;
 
inability to protect against new types of attacks or techniques used by hackers;
 
defects, errors or failures;
 
negative publicity about their performance or effectiveness;
 
introduction or anticipated introduction of competing products by our competitors;
 
poor business conditions for our end-customers, causing them to delay IT purchases;
 
easing of regulatory requirements around security; and
 
reluctance of customers to purchase products incorporating open source software.
 
If our new products or enhancements do not achieve adequate acceptance in the market, our competitive position will be impaired, our revenue will be diminished and the effect on our operating results may be particularly acute because of the significant research, development, marketing, sales and other expenses we incurred in connection with the new product or enhancement.
 
Unless we continue to develop better market awareness of our company and our products, our revenue may not continue to grow.

We are a relatively new entrant in the network security market, and we believe that we have not yet established sufficient market awareness of our participation in that market. Market awareness of our capabilities and products is essential to our continued growth and our success in all of our markets, particularly for the large enterprise, service provider and governmental entities markets. If our marketing programs are not successful in creating market awareness of our company and products, our business, financial condition and results of operations will be adversely affected, and we will not be able to achieve sustained growth.
 
Demand for Unified Threat Management products may be limited by market perception that UTM products are inferior to

22

Table of Contents

network security solutions from multiple vendors.
 
Sales of most of our products depend on increased demand for UTM products. If the UTM market fails to grow as we anticipate, our business will be seriously harmed. Target customers may view UTM “all-in-one” solutions as inferior to security solutions from multiple vendors because of, among other things, their perception that UTM products provide security functions from only a single vendor and do not allow users to choose “best-of-breed” defenses from among the wide range of dedicated security applications available. Target customers might also perceive that, by combining multiple security functions into a single platform, UTM solutions create a “single point of failure” in their networks, which means that an error, vulnerability or failure of the UTM product may place the entire network at risk. In addition, the market perception that UTM solutions may be suitable only for small and medium sized businesses because UTM lacks the performance capabilities and functionality of other solutions may harm our sales to large enterprise, service provider, and governmental entity end-customers. If the foregoing concerns and perceptions become prevalent, even if there is no factual basis for these concerns and perceptions, or if other issues arise with the UTM market in general, demand for UTM products could be severely limited, which would limit our growth and harm our business, financial condition and results of operations. Further a successful and publicized targeted attack against us or another well known UTM vendor exposing a “single point of failure” could significantly increase these concerns and perceptions and may harm our business and results of operations.
 
We face intense competition in our market, especially from larger, better-known companies, and we may lack sufficient financial or other resources to maintain or improve our competitive position.
 
The market for network security products is intensely competitive, and we expect competition to intensify in the future. Our competitors include networking companies such as Cisco Systems, Inc., Juniper Networks, Inc., and security vendors such as Check Point Software Technologies Ltd., McAfee, Inc. (acquired by Intel Corporation), and SonicWALL, Inc. (acquired by Thoma Bravo), Palo Alto Networks, and other point solution security vendors.
 
Many of our existing and potential competitors enjoy substantial competitive advantages such as:
 
greater name recognition and longer operating histories;
 
larger sales and marketing budgets and resources;
 
broader distribution and established relationships with distribution partners and end-customers;
 
access to larger customer bases;
 
greater customer support resources;
 
greater resources to make acquisitions;
 
lower labor and development costs; and
 
substantially greater financial, technical and other resources.
 
In addition, some of our larger competitors have substantially broader product offerings and leverage their relationships based on other products or incorporate functionality into existing products in a manner that discourages users from purchasing our products. These larger competitors often have broader product lines and market focus and are in a better position to withstand any significant reduction in capital spending by end-customers in these markets. Therefore, these competitors will not be as susceptible to downturns in a particular market. Also, many of our smaller competitors that specialize in providing protection from a single type of network security threat are often able to deliver these specialized network security products to the market more quickly than we can. Some of our smaller competitors are using third-party chips designed to accelerate performance. Conditions in our markets could change rapidly and significantly as a result of technological advancements or continuing market consolidation. Our current and potential competitors may also establish cooperative relationships among themselves or with third parties that may further enhance their resources. In addition, current or potential competitors may be acquired by third parties with greater available resources, such as Juniper's acquisition of NetScreen Technologies, Inc., Intel's acquisition of McAfee and Check Point's acquisition of Nokia's security appliance business. As a result of such acquisitions, our current or potential competitors might be able to adapt more quickly to new technologies and customer needs, devote greater resources to the promotion or sale of their products and services, initiate or withstand substantial price competition, take advantage of acquisition or other opportunities more readily or develop and expand their product and service offerings more quickly than we do. In addition, our competitors may bundle products and services

23

Table of Contents

competitive with ours with other products and services. Customers may accept these bundled products and services rather than separately purchasing our products and services. Due to budget constraints or economic downturns, organizations may be more willing to incrementally add solutions to their existing network security infrastructure from competitors than to replace it with our solutions. These competitive pressures in our market or our failure to compete effectively may result in price reductions, fewer customer orders, reduced revenue and gross margins and loss of market share.
 
If functionality similar to that offered by our products is incorporated into existing network infrastructure products, organizations may decide against adding our appliances to their network, which would have an adverse effect on our business.
 
Large, well-established providers of networking equipment such as Cisco Systems, Inc. and Juniper Networks, Inc. offer, and may continue to introduce, network security features that compete with our products, either in stand-alone security products or as additional features in their network infrastructure products. The inclusion of, or the announcement of an intent to include, functionality perceived to be similar to that offered by our security solutions in networking products that are already generally accepted as necessary components of network architecture may have an adverse effect on our ability to market and sell our products. Furthermore, even if the functionality offered by network infrastructure providers is more limited than our products, a significant number of customers may elect to accept such limited functionality in lieu of adding appliances from an additional vendor such as us. Many organizations have invested substantial personnel and financial resources to design and operate their networks and have established deep relationships with other providers of networking products, which may make them reluctant to add new components to their networks, particularly from other vendors such as us. In addition, an organization's existing vendors or new vendors with a broad product offering may be able to offer concessions that we are not able to match because we currently offer only network security products and have fewer resources than many of our competitors. If organizations are reluctant to add additional network infrastructure from new vendors or otherwise decide to work with their existing vendors, our business, financial condition and results of operations will be adversely affected.

Risks Related to Intellectual Property

Our proprietary rights may be difficult to enforce, which could enable others to copy or use aspects of our products without compensating us.
 
We rely primarily on patent, trademark, copyright and trade secrets laws, confidentiality procedures and contractual provisions to protect our technology. Valid patents may not issue from our pending applications, and the claims eventually allowed on any patents may not be sufficiently broad to protect our technology or products. Any issued patents may be challenged, invalidated or circumvented, and any rights granted under these patents may not actually provide adequate defensive protection or competitive advantages to us. Patent applications in the United States are typically not published until at least 18 months after filing, or, in some cases, not at all, and publications of discoveries in industry-related literature lag behind actual discoveries. We cannot be certain that we were the first to make the inventions claimed in our pending patent applications or that we were the first to file for patent protection. Additionally, the process of obtaining patent protection is expensive and time-consuming, and we may not be able to prosecute all necessary or desirable patent applications at a reasonable cost or in a timely manner. In addition, recent changes to the patent laws in the United States may bring into question the validity of certain software patents. As a result, we may not be able to obtain adequate patent protection or effectively enforce our issued patents.
 
Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality or license agreements with our employees, consultants, vendors and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that the steps taken by us will prevent misappropriation of our technology. Policing unauthorized use of our technology or products is difficult. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States. From time-to-time, legal action by us may be necessary to enforce our patents and other intellectual property rights, to protect our trade secrets, to determine the validity and scope of the proprietary rights of others or to defend against claims of infringement or invalidity. Such litigation could result in substantial costs and diversion of resources and could negatively affect our business, operating results and financial condition. If we are unable to protect our proprietary rights (including aspects of our software and products protected other than by patent rights), we may find ourselves at a competitive disadvantage to others who need not incur the additional expense, time and effort required to create the innovative products that have enabled us to be successful to date.
 
Our products contain third-party open source software components, and failure to comply with the terms of the underlying open source software licenses could restrict our ability to sell our products.

24

Table of Contents

 
Our products contain software modules licensed to us by third-party authors under “open source” licenses, including the GNU Public License (GPL), the GNU Lesser Public License (LGPL), the BSD License, the Apache License and others. From time-to-time, there have been claims against companies that distribute or use open source software in their products and services, asserting that open source software infringes the claimants' intellectual property rights. We could be subject to suits by parties claiming infringement of intellectual property rights in what we believe to be licensed open source software. Use and distribution of open source software may entail greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or other contractual protections regarding infringement claims or the quality of the code. Some open source licenses contain requirements that we make available source code for modifications or derivative works we create based upon the type of open source software we use. If we combine our proprietary software with open source software in a certain manner, we could, under certain open source licenses, be required to release the source code of our proprietary software to the public. This would allow our competitors to create similar products with lower development effort and time and ultimately could result in a loss of product sales for us.
 
Although we monitor our use of open source software to avoid subjecting our products to conditions we do not intend, the terms of many open source licenses have not been interpreted by United States courts, and there is a risk that these licenses could be construed in a way that could impose unanticipated conditions or restrictions on our ability to commercialize our products. In this event, we could be required to seek licenses from third parties to continue offering our products, to make generally available, in source code form, our proprietary code, to re-engineer our products, or to discontinue the sale of our products if re-engineering could not be accomplished on a timely basis, any of which could adversely affect our business, operating results and financial condition.
 
Claims by others that we infringe their proprietary technology or other litigation matters could harm our business.
 
Patent and other intellectual property disputes are common in the network security industry. Third parties have asserted and may in the future assert claims of infringement of intellectual property rights against us. They may also assert such claims against our end-customers or channel partners whom we typically indemnify against claims that our products infringe the intellectual property rights of third parties. As the number of products and competitors in our market increases and overlaps occur, infringement claims may increase. Any claim of infringement by a third-party, even those without merit, could cause us to incur substantial costs defending against the claim and could distract our management from our business. In addition, future litigation may involve patent holding companies or other adverse patent owners who have no relevant product revenue and against whom our own patents may therefore provide little or no deterrence or protection.
 
Although third parties may offer a license to their technology, the terms of any offered license may not be acceptable, and the failure to obtain a license or the costs associated with any license could cause our business, financial condition and results of operations to be materially and adversely affected. In addition, some licenses may be non-exclusive, and therefore our competitors may have access to the same technology licensed to us.
 
Alternatively, we may be required to develop non-infringing technology, which could require significant time, effort and expense and may ultimately not be successful. Furthermore, a successful claimant could secure a judgment or we may agree to a settlement that prevents us from distributing certain products or performing certain services or that requires us to pay substantial damages (including treble damages if we are found to have willfully infringed such claimant's patents or copyrights), royalties or other fees. Any of these events could seriously harm our business, financial condition and results of operations.
 
We have been involved in patent disputes in the past, are currently involved in several patent disputes, and likely will be involved in additional disputes in the future. In May 2004, Trend Micro Incorporated filed a complaint against us alleging that we infringed a Trend Micro patent related to antivirus software. The International Trade Commission, or ITC, subsequently instituted an investigation which resulted in an exclusion order and a cease and desist order prohibiting us from selling a broad array of our products in the United States. In January 2006, we settled the lawsuit with Trend Micro, and subsequently the ITC terminated its action and rescinded the orders. Pursuant to the settlement and license agreement, we initially paid Trend Micro $15.0 million. The settlement and license agreement provides for additional quarterly royalty payments. We had a subsequent dispute with Trend Micro regarding the royalty payments and in December 2011, we entered into a settlement agreement with Trend Micro resolving the dispute for a one-time payment of $9.0 million. The settlement agreement includes a fully-paid license to the patents subject to the prior patent license agreement, with no continuing obligation to pay royalties for those patents.

As discussed in "Item 3-Legal Proceedings," from time to time we are subject to lawsuits claiming patent infringement, and there are lawsuits claiming patent infringement currently pending. We are also subject to other litigation in

25

Table of Contents

addition to patent infringement claims. If we are unsuccessful in defending any such claims, our operating results and financial condition and results may be materially and adversely affected. For example, we may be required to pay substantial damages and could be prevented from selling certain of our products. In addition to the lawsuits described in "Legal Proceedings," several other non-practicing patent holding companies have sent us letters proposing that we license certain of their patents, and given this and the proliferation of lawsuits in our industry and other similar industries by both non-practicing entities and operating entities, we expect that we will be sued for patent infringement in the future, regardless of the merits of any such lawsuits. The cost to defend such lawsuits and any adverse result in such lawsuits could have a material adverse effect on our results of operations and financial condition.
 
We rely on the availability of third-party licenses.
 
Many of our products include software or other intellectual property licensed from third parties. It may be necessary in the future to renew licenses relating to various aspects of these products or to seek new licenses for existing or new products. There can be no assurance that the necessary licenses would be available on acceptable terms, if at all. The inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, or the need to engage in litigation regarding these matters, could result in delays in product releases until equivalent technology can be identified, licensed or developed, if at all, and integrated into our products and may have a material adverse effect on our business, operating results, and financial condition. Moreover, the inclusion in our products of software or other intellectual property licensed from third parties on a nonexclusive basis could limit our ability to differentiate our products from those of our competitors.

Risks Related to Ownership of our Common Stock

As a public company, we are subject to compliance initiatives that will require substantial time from our management and result in significantly increased costs that may adversely affect our operating results and financial condition.
 
The Sarbanes-Oxley Act of 2002, the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, as well as other rules implemented by the SEC and The NASDAQ Stock Market, impose various requirements on public companies, including requiring changes in corporate governance practices. These and proposed corporate governance laws and regulations under consideration may further increase our compliance costs. If compliance with these various legal and regulatory requirements diverts our management's attention from other business concerns, it could have a material adverse effect on our business, financial condition and results of operations. The Sarbanes-Oxley Act requires, among other things, that we assess the effectiveness of our internal control over financial reporting annually and disclosure controls and procedures quarterly. We completed our evaluation of our internal controls over financial reporting for fiscal 2011 as required by Section 404 of the Sarbanes-Oxley Act of 2002. Although our assessment, testing and evaluation resulted in our conclusion that as of December 31, 2011, our internal controls over financial reporting were effective, we cannot predict the outcome of our testing in 2012 or future periods. If our internal controls or disclosure controls are ineffective in future periods, our business and reputation could be harmed. We may incur additional expenses and commitment of management's time in connection with further evaluations, both of which could materially increase our operating expenses and accordingly reduce our operating results.
 
Changes in financial accounting standards may cause adverse unexpected fluctuations and affect our reported results of operations.
 
A change in accounting standards or practices and varying interpretations of existing accounting pronouncements, such as changes to standards related to revenue recognition adopted by the Financial Accounting Standards Board ("FASB") that went effective January 1, 2011, the increased use of fair value measure, the recent proposed change to revenue recognition, lease accounting, financial instrument accounting standards, and the potential requirement that U.S. registrants prepare financial statements in accordance with International Financial Reporting Standards (“IFRS”), could have a significant effect on our reported financial results or the way we conduct our business. Effective January 1, 2011, we started reporting revenue recognition based on the new revenue standards issued by the FASB. If we do not ensure that our systems and processes for revenue recognition are aligned with the new standards, we could encounter difficulties generating quarterly and annual financial statements in a timely manner, which would have an adverse effect on our business and our ability to meet our reporting obligations.
If securities or industry analysts stop publishing research or publish inaccurate or unfavorable research about our business, our stock price and trading volume could decline.
 
The trading market for our common stock will depend in part on the research and reports that securities or industry analysts publish about us or our business. If we do not maintain adequate research coverage or if one or more of the analysts who covers us downgrades our stock or publishes inaccurate or unfavorable research about our business, our stock price would

26

Table of Contents

likely decline. If one or more of these analysts ceases coverage of our company or fails to publish reports on us regularly, demand for our stock could decrease, which could cause our stock price and trading volume to decline.
 
The trading price of our common stock is likely to be volatile.
 
The market price of our common stock is subject to wide fluctuations in response to, among other things, the risk factors described in this periodic report, and other factors such as rumors or fluctuations in the valuation of companies perceived by investors to be comparable to us.
 
Furthermore, the stock markets have experienced price and volume fluctuations that have affected and continue to affect the market prices of equity securities of many companies. These fluctuations often have been unrelated or disproportionate to the operating performance of those companies. These broad market and industry fluctuations, as well as general economic, political, and market conditions, such as recessions, interest rate changes or international currency fluctuations, may negatively affect the market price of our common stock.
 
In the past, many companies that have experienced volatility in the market price of their stock have been subject to securities class action litigation. We may be the target of this type of litigation in the future. Securities litigation against us could result in substantial costs and divert our management's attention from other business concerns, which could seriously harm our business.
 
Our failure to raise additional capital or generate the significant capital necessary to expand our operations and invest in new products could reduce our ability to compete and could harm our business.
 
We expect that our existing cash and cash equivalents will be sufficient to meet our anticipated cash needs for at least the next 12 months. After that, we may need to raise additional funds, and we may not be able to obtain additional debt or equity financing on favorable terms, if at all. If we raise additional equity financing, our stockholders may experience significant dilution of their ownership interests and the per-share value of our common stock could decline. Furthermore, if we engage in debt financing, the holders of debt would have priority over the holders of common stock and we may be required to accept terms that restrict our ability to incur additional indebtedness. We may also be required to take other actions that would otherwise be in the interests of the stockholders and force us to maintain specified liquidity or other ratios, any of which could harm our business, operating results and financial condition. If we need additional capital and cannot raise it on acceptable terms, we may not be able to, among other things:
 
develop or enhance our products and services;
 
continue to expand our sales and marketing and research and development organizations;
 
acquire complementary technologies, products or businesses;
 
expand operations, in the United States or internationally;
 
hire, train and retain employees; or
 
respond to competitive pressures or unanticipated working capital requirements.
 
Our failure to do any of these things could seriously harm our business, financial condition and results of operations.

Concentration of ownership among our existing executive officers, directors and their affiliates may prevent new investors from influencing significant corporate decisions.

As of February 17, 2012, our executive officers, directors and their affiliates beneficially owned, in the aggregate, approximately 17.2% of our outstanding common stock. As a result, these stockholders are able to exercise a significant level of control over all matters requiring stockholder approval, including the election of directors, amendment of our certificate of incorporation and approval of significant corporate transactions. This control could have the effect of delaying or preventing a change of control of our company or changes in management and will make the approval of certain transactions difficult or impossible without the support of these stockholders.
 
Anti-takeover provisions contained in our certificate of incorporation and bylaws, as well as provisions of Delaware law, could impair a takeover attempt.

27

Table of Contents

 
Our certificate of incorporation, bylaws and Delaware law contain provisions that could have the effect of rendering more difficult, delaying or preventing an acquisition deemed undesirable by our board of directors. Our corporate governance documents include provisions:
 
creating a classified board of directors whose members serve staggered three-year terms;
 
authorizing “blank check” preferred stock, which could be issued by the board without stockholder approval and may contain voting, liquidation, dividend and other rights superior to our common stock;
 
limiting the liability of, and providing indemnification to, our directors and officers;
 
limiting the ability of our stockholders to call and bring business before special meetings;
 
requiring advance notice of stockholder proposals for business to be conducted at meetings of our stockholders and for nominations of candidates for election to our board of directors;
 
controlling the procedures for the conduct and scheduling of board and stockholder meetings; and
 
providing the board of directors with the express power to postpone previously scheduled annual meetings and to cancel previously scheduled special meetings.
 
These provisions, alone or together, could delay or prevent hostile takeovers and changes in control or changes in our management.
 
As a Delaware corporation, we are also subject to provisions of Delaware law, including Section 203 of the Delaware General Corporation law, which prevents some stockholders holding more than 15.0% of our outstanding common stock from engaging in certain business combinations without approval of the holders of a substantial majority of all of our outstanding common stock.
 
Any provision of our certificate of incorporation or bylaws or Delaware law that has the effect of delaying or deterring a change in control could limit the opportunity for our stockholders to receive a premium for their shares of our common stock, and could also affect the price that some investors are willing to pay for our common stock.


ITEM 1B.     Unresolved Staff Comments

Not applicable.

28

Table of Contents


ITEM 2.     Properties

Our corporate headquarters are located at 1090 Kifer Road, Sunnyvale, California in an office consisting of approximately 107,000 square feet. The lease for this office expires in September 2013. 

In addition to our headquarters, we lease approximately 14,000 square feet of data center space and a total of approximately 72,000 square feet of office space in several buildings in Burnaby, Canada under various leases that expire between March 2012 and July 2015; approximately 16,000 square feet of office space in Ottawa, Canada under a lease that expires in February 2015; approximately 19,000 square feet of office space in Sophia, France under a lease that expires in December 2013; and approximately 26,000 square feet of office space in Beijing, China under a lease that expires in August 2012. We also lease sales and support offices in Australia, Austria, Belgium, Egypt, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Korea, Malaysia, Mexico, the Netherlands, New Zealand, Philippines, Poland, Russia, Saudi Arabia, Singapore, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, United Arab Emirates, and the United Kingdom. We believe that our existing properties are in good condition and are sufficient and suitable for the conduct of our business.


29

Table of Contents

ITEM 3.     Legal Proceedings

In August 2009, Trend Micro filed a complaint against us in the Superior Court of the State of California for Santa Clara County alleging breach of contract and seeking a declaratory judgment that we are obligated to make certain royalty payments to Trend Micro pursuant to a settlement and license agreement entered into in January 2006. In December 2011, we entered into a settlement agreement with Trend Micro resolving the dispute for a one-time payment to Trend Micro of $9.0 million. The settlement agreement includes a fully paid license to the patents subject to the prior patent license agreement with no continuing obligation to pay royalties for those patents.
 
In August 2009, Enhanced Security Research, LLC and Security Research Holdings LLC (collectively “ESR”), a non-practicing entity, filed a complaint against us in the United States District Court for the District of Delaware alleging infringement by us and other defendants of two patents. The plaintiffs are claiming unspecified damages and requesting an injunction against the alleged infringement. In June 2010, the Court granted our motion to stay pending the outcome of reexamination proceedings on both asserted patents. The U.S. Patent and Trademark Office ("PTO") rejected all of the claims of the patents in the suit and ESR has appealed this result to the Board of Patent Appeals and Interferences (“BPAI”). We have determined that, as of this time, there is not a reasonable possibility that a loss may be incurred. 
 
In April 2010, an individual, a former stockholder of Fortinet, filed a class action lawsuit against us claiming unspecified damages in the California Superior Court for the County of Los Angeles alleging violation of various California Corporations Code sections and related tort claims alleging misrepresentation and breach of fiduciary duty regarding the 2009 repurchase by Fortinet of shares of its stock while we were a privately-held company. The plaintiff is claiming unspecified damages. In September 2010, the Court granted our motion to transfer the case to the California Superior Court for Santa Clara County and the plaintiff has filed an amended complaint in the Superior Court to add individual defendants, among other amendments. Currently the case is in the early stages, and we have determined that, as of this time, there is not a reasonable possibility that a loss may be incurred.

In July 2010, Network Protection Sciences, LLC ("NPS"), a non-practicing entity, filed a complaint in the United States District Court for the Eastern District of Texas alleging patent infringement by us and other defendants. NPS is claiming unspecified damages, including treble damages for willful infringement and requests an injunction against such alleged infringement. In December 2011, the United States District Court for the Eastern District of Texas ordered the case to be transferred to the Northern District of California.

ITEM 4.     Mine Safety Disclosure

Not applicable.


Part II

ITEM 5.
Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities

Our common stock is traded on The NASDAQ Global Select Market under the symbol “FTNT.” The following table sets forth, for the time periods indicated, the high and low closing sales price of our common stock, adjusted to reflect the two-for-one split effective June 1, 2011, as reported on The NASDAQ Global Select Market.
 
2011
 
2010
 
High ($)
 
Low ($)
 
High ($)
 
Low ($)
Fourth Quarter
25.76

 
16.53

 
16.73

 
12.04

Third Quarter
28.17

 
16.25

 
12.61

 
8.00

Second Quarter
27.29

 
18.94

 
9.32

 
7.50

First Quarter
22.08

 
16.55

 
10.06

 
7.85


Holders of Record

As of February 17, 2012, there were 105 holders of record of our common stock. A substantially greater number of holders of our common stock are “street name” or beneficial holders, whose shares are held by banks, brokers and other

30

Table of Contents

financial institutions.

Dividends

We have never declared or paid cash dividends on our capital stock. We intend to retain all available funds and any future earnings to support the operation of and to finance the growth and development of our business. We do not anticipate paying any cash dividends in the foreseeable future. Any future determination to declare cash dividends will be made at the discretion of our board of directors and will depend on our financial condition, operating results, capital requirements, general business conditions and other factors that our board of directors may deem relevant.

Stock Performance Graph

This performance graph shall not be deemed “filed” for purposes of Section 18 of the Securities Exchange Act of 1934, as amended (the "Exchange Act"), or incorporated by reference into any filing of Fortinet under the Securities Act of 1933, as amended, or the Exchange Act, except as shall be expressly set forth by specific reference in such filing.

The following graph shows a comparison from November 18, 2009 through December 31, 2011, of the cumulative total return for our common stock, the NASDAQ Composite Index, and the NASDAQ Computer Index. Such returns are based on historical results and are not intended to suggest future performance. Data for The NASDAQ Composite Index and The NASDAQ Computer Index assume reinvestment of dividends. We have never declared or paid cash dividends on our capital stock nor do we anticipate paying any such cash dividends in the foreseeable future.

COMPARISON OF CUMULATIVE TOTAL RETURN*
Among Fortinet, Inc., The NASDAQ Composite Index and
The NASDAQ Computer Index


 
11/09
 
12/09
 
03/10
 
06/10
 
09/10
 
12/10
 
03/11
 
06/11
 
09/11
 
12/11
Fortinet, Inc.
$
100

 
$
106

 
$
106

 
$
99

 
$
150

 
$
195

 
$
266

 
$
328

 
$
202

 
$
263

NASDAQ Composite
$
100

 
$
106

 
$
112

 
$
98

 
$
110

 
$
124

 
$
130

 
$
129

 
$
113

 
$
121

NASDAQ Computer
$
100

 
$
107

 
$
110

 
$
98

 
$
111

 
$
127

 
$
131

 
$
128

 
$
118

 
$
127


_______________________
* $100 invested on 11/18/09 in stock or index, including reinvestment of dividends.
 


31

Table of Contents


Sales of Unregistered Securities

None.


Purchases of Equity Securities by the Issuer and Affiliated Purchasers

None.


32

Table of Contents

ITEM 6.     Selected Financial Data

You should read the following selected consolidated historical financial data below in conjunction with the section titled “Management’s Discussion and Analysis of Financial Condition and Results of Operations” and the consolidated financial statements, related notes and other financial information included elsewhere in this Annual Report on Form 10-K. The selected financial data in this section is not intended to replace the financial statements and is qualified in its entirety by the consolidated financial statements and related notes thereto included elsewhere in this Annual Report on Form 10-K.

We made the decision in the first quarter of 2009 to change our financial reporting periods from a fiscal to calendar basis. This change was implemented in the third quarter of 2009 upon completion of required system changes. Accordingly, commencing in the third quarter of fiscal 2009, we began operating and reporting financial results on a calendar quarter and year basis. Our third quarter of fiscal 2009 ended on September 30, 2009, and our fiscal year 2009 ended on December 31, 2009. This transition had the effect of increasing the number of days in our twelve months ended December 31, 2009 by four days. Prior to the third quarter of fiscal 2009, our interim fiscal quarters ended on the Sunday closest to March 31, June 30 and September 30 of each year.



33

Table of Contents

 
Fiscal Year (1)
 
2011
 
2010
 
2009
 
2008
 
2007
 
($ amounts in 000's, except per share amounts)
Consolidated Statement of Operations Data:
 
 
 
 
 
 
 
 
 
Revenue:
 
 
 
 
 
 
 
 
 
Product
197,408

 
135,140

 
98,686

 
94,587

 
70,131

Services
220,268

 
172,046

 
139,172

 
105,292

 
74,152

Ratable and other revenue
15,900

 
17,510

 
14,257

 
11,912

 
11,083

Total revenue
433,576

 
324,696

 
252,115

 
211,791

 
155,366

Cost of revenue:
 
 
 
 
 
 
 
 
 
Product (2)
73,201

 
51,944

 
42,166

 
41,397

 
35,948

Services (2)
35,486

 
26,967

 
22,265

 
19,441

 
15,941

Ratable and other revenue
4,911

 
6,295

 
5,544

 
4,634

 
4,763

Total cost of revenue
113,598

 
85,206

 
69,975

 
65,472

 
56,652

Gross profit
 
 
 
 
 
 
 
 
 
Product
124,207

 
83,196

 
56,520

 
53,190

 
34,183

Services
184,782

 
145,079

 
116,907

 
85,851

 
58,211

Ratable and other revenue
10,989

 
11,215

 
8,713

 
7,278

 
6,320

Total gross profit
319,978

 
239,490

 
182,140

 
146,319

 
98,714

Operating expenses:
 
 
 
 
 
 
 
 
 
Research and development (2)
63,577

 
49,801

 
42,195

 
37,035

 
27,588

Sales and marketing (2)
145,532

 
111,968

 
96,291

 
87,717

 
72,159

General and administrative (2)
21,965

 
22,380

 
18,320

 
16,640

 
20,544

Total operating expenses
231,074

 
184,149

 
156,806

 
141,392

 
120,291

Operating income (loss)
88,904

 
55,341

 
25,334

 
4,927

 
(21,577
)
Interest income
3,523

 
1,815

 
1,981

 
2,614

 
3,507

Other income (expense), net
(354
)
 
(815
)
 
198

 
1,710

 
(1,991
)
Income (loss) before income taxes
92,073

 
56,341

 
27,513

 
9,251

 
(20,061
)
Provision for (benefit from) income taxes
29,581

 
15,096

 
(32,666
)
 
1,888

 
1,781

Net income (loss)
62,492

 
41,245

 
60,179

 
7,363

 
(21,842
)
Net income (loss) per share :
 
 
 
 
 
 
 
 
 
Basic
0.41

 
0.29

 
0.97

 
0.18

 
(0.57
)
Diluted
0.38

 
0.26

 
0.39

 
0.14

 
(0.57
)
Weighted-average shares outstanding:
 
 
 
 
 
 
 
 
 
Basic
152,581

 
140,726

 
52,668

 
40,034

 
38,552

Diluted
163,781

 
156,406

 
130,438

 
53,284

 
38,552

________________________
(1)
Our fiscal years ended on December 31, 2011December 31, 2010December 31, 2009, December 28, 2008 and December 30, 2007.

34

Table of Contents

(2)
Includes stock-based compensation expense as follows:

 
 
Fiscal Year
 
2011
 
2010
 
2009
 
2008
 
2007
 
($ amounts in 000's)
Cost of product revenue
183

 
101

 
102

 
67

 
553

Cost of services revenue
1,790

 
929

 
658

 
400

 
416

Research and development
4,691

 
2,339

 
1,963

 
1,049

 
1,452

Sales and marketing
9,325

 
3,810

 
3,020

 
2,512

 
3,928

General and administrative
3,026

 
2,136

 
1,718

 
1,271

 
2,983

Total stock-based compensation
19,015

 
9,315

 
7,461

 
5,299

 
9,332


 
As of Fiscal Year End
2011
 
2010
 
2009
 
2008
 
2007
($ amounts in 000's)
Consolidated Balance Sheet Data:
 
 
 
 
 
 
 
 
 
Cash, cash equivalents and investments
538,688

 
387,460

 
260,314

 
124,190

 
90,161

Working capital
256,706

 
201,776

 
161,652

 
38,193

 
12,862

Total assets
734,747

 
545,422

 
387,213

 
199,105

 
145,192

Convertible preferred stock

 

 

 
94,368

 
94,368

Common stock including treasury stock and additional paid-in capital
314,187

 
249,000

 
201,340

 
20,854

 
13,438

Total stockholders’ equity (deficit)
358,354

 
232,454

 
142,452

 
(5,229
)
 
(18,925
)


35

Table of Contents

ITEM 7.     Management’s Discussion and Analysis of Financial Condition and Results of Operations

In addition to historical information, this Annual Report on Form 10-K contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements include, among other things, statements concerning our expectations regarding:
 
variability in sales in certain product categories from year to year and between quarters;
 
continued sales into large enterprises;

mix of billings between products and services;
 
the significance of stock compensation as an expense;
 
the proportion of our revenue that consists of our product and service revenues and future trends with respect to service revenue as we renew existing services contracts and expand our customer base;
 
the impact of our product innovation strategy;
 
trends in revenue, costs of revenue, and gross margin;
 
trends in our operating expenses, including personnel costs, research and development expense, sales and marketing expense and general and administrative expense;

our effective tax rate;

our ability to generate taxable income and realize the tax benefits associated with our deferred tax assets;

the impact of seasonality on our business; and
 
the sufficiency of our existing cash and investments to meet our cash needs for at least the next 12 months;

as well as other statements regarding our future operations, financial condition and prospects and business strategies. These forward-looking statements are subject to certain risks and uncertainties that could cause our actual results to differ materially from those reflected in the forward-looking statements. Factors that could cause or contribute to such differences include, but are not limited to, those discussed in this Annual Report on Form 10-K and, in particular, the risks discussed under the heading “Risk Factors” in Item 1A of this Annual Report on Form 10-K and those discussed in other documents we file with the Securities and Exchange Commission. We undertake no obligation to revise or publicly release the results of any revision to these forward-looking statements. Given these risks and uncertainties, readers are cautioned not to place undue reliance on such forward-looking statements.

Business Overview

We provide network security solutions, which enable broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises, service providers and governmental entities worldwide. As of December 31, 2011, we had shipped over 850,000 appliances via more than 10,000 channel partners to more than 125,000 end-customers worldwide, including a majority of the 2011 Fortune Global 100.

Our core UTM product line of FortiGate physical and virtual appliances ships with a set of security and networking capabilities, including firewall, VPN, application control, antivirus, intrusion prevention, Web filtering, antispam and WAN acceleration functionality. We derive a substantial majority of product sales from our FortiGate appliances, which range from the FortiGate-20, designed for small businesses, to the FortiGate-5000 series for large enterprises, telecommunications carriers, and service providers. Our UTM solution also includes our FortiGuard security subscription services, which end-customers can subscribe to in order to obtain access to dynamic updates to the application control, antivirus, intrusion prevention, Web filtering, vulnerability management and antispam functionality included in our appliances. End-customers can also choose to purchase FortiCare technical support services for our products. End-customers also often use FortiManager and FortiAnalyzer products in conjunction with a FortiGate deployment to provide centralized management, analysis and reporting capabilities. We complement our core FortiGate product line with other appliances and software that offer additional protection from security threats to other critical areas of the enterprise, such as messaging, Web application firewalls, databases, employee

36

Table of Contents

computers and mobile devices. Sales of these complementary products have grown in recent quarters, although these products still represent less than 10.0% of our total revenue. During fiscal 2011, we expanded and enhanced our FortiGate UTM and FortiAP secure wireless access product lines, as well as introduced software-based virtual appliances for many of our FortiGate and FortiManager product lines, which help secure the end-customer's cloud-based network infrastructures with the same functionality as the traditional physical appliance in their respective product lines.

Fiscal 2011 was our second full year as a public company, following our initial public offering in November 2009. We believe the greater visibility and brand recognition derived from being a public company, combined with success in selling to the enterprise and service provider customers and new product introductions, served as contributors to the growth in our business during fiscal 2011. Sales of FortiGate products have generally been balanced across entry-level (FortiGate-20 to -100 series), mid-range (FortiGate-200 to -800 series) and high-end (FortiGate-1000 to -5000 series) models with each product category representing approximately one-third of FortiGate sales, with some degree of variability from year to year and between quarters. During fiscal 2011 we executed well against our strategy to grow the high-end segment of our business, consisting of sales to large enterprises, service providers and telecommunications companies. The percentage of our FortiGate related billings from the high-end category increased to 36.9% in fiscal 2011 from 34.3% in fiscal 2010, while the entry-level category decreased from 35.0% to 32.1%, and the mid-range category remained relatively flat over the same period. This shift towards the high-end category positively impacted results in fiscal 2011.

We also believe continued product innovation has strengthened our technology advantage as evidenced by the earlier introduction of several noteworthy new FortiGate appliance models such as the FG-60C, FG-3040B, FG-3950B and FG-5001B. During fiscal 2011 we also made a significant investment in our sales force to expand our global presence both geographically as well as by industry segment. We believe these factors have allowed us to penetrate into larger enterprise and service provider accounts as evidenced by the increase in the number of deals involving sales greater than $100,000.

Billings (a non-GAAP financial measure that we define as total revenue plus the change in deferred revenue) were $475.8 million in fiscal 2011, an increase of 26.7% compared to fiscal 2010. Total revenue was $433.6 million for fiscal 2011, an increase of 33.5% compared to fiscal 2010. Revenue for fiscal 2011 includes approximately $20.0 million, or 4.6%, positive impact related to the adoption of the new revenue recognition rules, as described in our "Summary of Significant Accounting Policies included in - Footnote 1 of our Consolidated Financial Statements." The increase in revenue resulting from our adoption of the new revenue recognition rules was attributable to both using "best estimated sale price" in our allocation of arrangement consideration when we did not have vendor-specific objective evidence ("VSOE"), and being able to recognize upon shipment certain product revenue, which would have been deferred under the previous revenue recognition rules. Product revenue was $197.4 million, an increase of 46.1% compared to fiscal 2010, and a greater percentage of total revenue (45.5% in fiscal 2011, compared to 41.6% in fiscal 2010). Introduction of new products, including some non-FortiGate products, was one factor in the growth of our product revenue. Services revenue in fiscal 2011 was $220.3 million, an increase of 28.0% compared to fiscal 2010. Services revenue is important to our future revenue and profitability as it provides a source of recurring revenue for us, representing 50.8% and 53.0% of total revenue for fiscal 2011 and 2010, respectively. Ratable and other revenue in fiscal 2011 was $15.9 million, a decrease of 9.2% compared to fiscal 2010, primarily due to the decline in ratable revenue amortization due to the new revenue recognition rules.

We are a global, geographically diversified business, with 60.2% of our total revenue generated outside the United States, Canada and Other Americas ("Americas") regions in fiscal 2011. Our operating results were driven by strong performance across all geographies. For fiscal 2011, Americas generated $172.5 million, or 39.8%, of our total revenue, representing an increase of 39.2% from fiscal 2010. Europe, Middle East and Africa ("EMEA") generated $152.4 million, or 35.1%, of our total revenue during fiscal 2011, representing an increase of 25.3% from fiscal 2010. Asia Pacific and Japan ("APAC") generated $108.7 million, or 25.1%, of our total revenue during fiscal 2011, representing an increase of 37.4% from fiscal 2010.

In fiscal 2011, our total operating expenses were $231.1 million, an increase of 25.5% compared to fiscal 2010. The 33.5% increase in revenues compared to the 25.5% increase in operating expenses in fiscal 2011 (as discussed under "Results of Operations" below) demonstrates the leverage that we achieved from the efficiencies in our business operations during the past year. Despite the negative impact of foreign currency fluctuations experienced during fiscal 2011, operating expenses as a percentage of revenue decreased to 53.4% from 56.7% during fiscal 2010. We are also experiencing improvements in productivity and efficiencies in our overall headcount as our annualized fiscal 2011 revenue per employee, defined as annual revenue divided by average headcount, reached $297,000, up from $254,000 for fiscal 2010. Headcount increased from 1,336 at the end of fiscal 2010 to 1,583 at the end of fiscal 2011, as our pace of hiring increased during fiscal 2011, particularly in sales and marketing and research and development.

Our Business Model

37

Table of Contents


Our sales strategy is based on a distribution model whereby we primarily sell our products and services directly to distributors who sell to resellers and service providers, who, in turn, sell to our end-customers. In certain cases, we sell directly to government-focused resellers, large service providers and major systems integrators, who have significant purchasing power and unique customer deployment requirements. Typically, FortiGuard security subscription services and FortiCare technical support services are purchased along with our physical and virtual appliances. We invoice at the time of our sale for the total price of the products and subscription and support services, and the invoice generally becomes payable within 30 to 90 days. We generally recognize product revenue up-front based on the allocated revenue value and defer revenue for the sale of new and renewal subscription and support services contracts. We recognize the related services revenue over the service period, which is typically one year from the date the end-customer registers for these services (the date on which the services can first be used by the customer), although it can be as long as five years. Sales of new and renewal services increase our deferred revenue balance, which contributes significantly to our positive cash flow from operations.

Key Metrics

We monitor the key financial metrics set forth below to help us evaluate growth trends, establish budgets, measure the effectiveness of our sales and marketing efforts, and assess operational efficiencies. Our total deferred revenue increased by $42.2 million from $252.6 million at December 31, 2010 to $294.8 million at December 31, 2011. Revenue recognized plus the change in deferred revenue from the beginning to the end of the period is a useful metric that management identifies as billings. Billings for services drive deferred revenue, which is an important indicator of the health and visibility of our business, and has historically represented a majority of the revenue that we recognize in a typical quarter. We also ended fiscal 2011 with $538.7 million in cash, cash equivalents and investments and have had positive cash flow from operations every fiscal year since 2005. We discuss revenue, gross margin, and the components of operating income and margin below under “Components of Operating Results,” and we discuss our cash, cash equivalents, and investments under “Liquidity and Capital Resources.” Deferred revenue and cash provided by operating activities are discussed immediately below the following table.
 
 
Fiscal Year or as of Fiscal Year End
 
2011
 
2010
 
2009
 
($ amounts in 000's)
Revenue
433,576

 
324,696

 
252,115

Gross margin
73.8
%
 
73.8
%
 
72.2
%
Operating income (1)
88,904

 
55,341

 
25,334

Operating margin
20.5
%
 
17.0
%
 
10.0
%
Total deferred revenue
294,833

 
252,631

 
201,930

Increase in total deferred revenue
42,202

 
50,701

 
30,313

Cash, cash equivalents and investments
538,687

 
387,460

 
260,314

Cash provided by operating activities
132,842

 
103,383

 
61,971

Free cash flow (2)
135,218

 
99,607

 
57,382

___________________
 
 
 
 
 
(1) Includes:
 
 
 
 
 
Stock-based compensation expense:
19,015

 
9,315

 
7,461

Non-cash asset acquisition related write-offs:

 

 
2,387

Patent settlement income
1,911

 

 

 
 
 
 
 
 
(2) See below for definition of free cash flow.
    
Deferred revenue. Our deferred revenue consists of amounts that have been invoiced but that have not yet been recognized as revenue. The majority of our deferred revenue balance consists of the unamortized portion of services revenue from subscription and support service contracts. We monitor our deferred revenue balance because it represents a significant portion of revenue to be recognized in future periods. The following table reflects the calculation of billings as discussed above.


38

Table of Contents

 
Fiscal Year
2011
2010
2009
($ amounts in 000's)
Billings:
 
 
 
 
 
Revenue
433,576

 
324,696

 
252,115

Increase in deferred revenue
42,202

 
50,701

 
30,313

Total billings (Non-GAAP)
475,778

 
375,397

 
282,428


Cash provided by operating activities. We monitor cash provided by operating activities as a measure of our overall business performance. Our cash provided by operating activities is driven in large part by advance payments for both new and renewal contracts for subscription and support services. Monitoring cash provided by operating activities enables us to analyze our financial performance without the non-cash effects of certain items such as depreciation, amortization and stock-based compensation expenses, thereby allowing us to better understand and manage the cash needs of our business. Free cash flow, an alternative non-GAAP financial measure of liquidity, is defined as net cash provided by operating activities less capital expenditures.

 
Fiscal Year
2011
2010
2009
($ amounts in 000's)
Cash Flow:
 
 
 
 
 
Net cash provided by operating activities
132,842

 
103,383

 
61,971

Less purchases of property and equipment
(3,624
)
 
(3,776
)
 
(4,589
)
Free cash flow (Non-GAAP)
129,218

 
99,607

 
57,382

Net cash provided by (used in) investing activities
(166,826
)
 
(283,710
)
 
13,757

Net cash provided by financing activities
39,797

 
34,019

 
78,049



Other Non-GAAP Financial Measures

To supplement our consolidated financial statements presented in accordance with U.S. GAAP, we consider certain financial measures that are not prepared in accordance with GAAP, including non-GAAP gross margin, non-GAAP operating income and non-GAAP operating margin, non-GAAP operating expenses, non-GAAP net income and non-GAAP free cash flow. These non-GAAP financial measures are not based on any standardized methodology prescribed by GAAP and are not necessarily comparable to similar measures presented by other companies.

We use these non-GAAP financial measures internally in analyzing our financial results and believe they are useful to investors, as a supplement to GAAP measures, in evaluating our ongoing operational performance and enhancing an overall understanding of our past financial performance, as they help illustrate underlying trends in our business that could otherwise be masked by the effect of the expenses that we exclude in these non-GAAP financial measures. Furthermore, we use many of these measures to establish budgets and operational goals for managing our business and evaluating our performance. We also believe that the use of these non-GAAP financial measures provides an additional tool for investors to use in comparing our recurring core business operating results over multiple periods with other companies in our industry, many of which present similar non-GAAP financial measures to investors.

These non-GAAP financial measures should not be considered in isolation from, or as a substitute for, financial information prepared in accordance with GAAP. There are a number of limitations related to the use of these non-GAAP financial measures versus the nearest GAAP equivalent of these financial measures. First, these non-GAAP financial measures exclude certain recurring charges including, but not limited to, stock-based compensation expense, asset acquisition related write-offs, and patent settlements. Stock-based compensation has been, and will continue to be for the foreseeable future, a significant recurring expense in our business and is an important part of our employees' overall compensation. Second, the expenses that we exclude in our calculation of these non-GAAP financial measures may differ from the expenses, if any, that our peer companies may exclude when they report their results of operations. We compensate for these limitations by providing the nearest GAAP equivalents of these non-GAAP financial measures and describing these GAAP equivalents in our Results of Operations below.


39

Table of Contents

Non-GAAP gross margin is gross profit as reported on our consolidated statements of operations, excluding the impact of stock-based compensation expense, which is a non-cash charge. Non-GAAP income from operations is operating income, as reported on our consolidated statements of operations, excluding the impact of stock-based compensation expense, asset acquisition related write-offs, and the income we received from a patent settlement. Non-GAAP operating margin is non-GAAP operating income divided by revenue. The following table reconciles GAAP gross profit, operating income, and operating margin to non-GAAP gross profit, non-GAAP operating income, and non-GAAP operating margin for fiscal 2011, 2010 and 2009.

 
Fiscal Year
2011
 
2010
 
2009
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
($ amounts in 000's)
Total revenue
433,576

 
 
 
324,696

 
 
 
252,115

 
 
GAAP gross profit and margin
319,978

 
73.8

 
239,490

 
73.8
 
182,140

 
72.2
Stock-based compensation expense
1,973

 
0.5

 
1,030

 
0.3
 
760

 
0.3
Non-cash asset acquisition related write-offs

 

 

 
 
2,387

 
0.9
Non-GAAP gross profit and margin
321,951

 
74.3

 
240,520

 
74.1
 
185,287

 
73.4
GAAP operating income and margin
88,904

 
20.5

 
55,341

 
17.0
 
25,334

 
10.0
Stock-based compensation expense:
 
 
 
 
 
 
 
 
 
 
 
Cost of revenue
1,973

 
0.4

 
1,030

 
0.3
 
760

 
0.3
Research and development
4,691

 
1.1

 
2,339

 
0.9
 
1,963

 
0.8
Sales and marketing
9,325

 
2.2

 
3,810

 
1.2
 
3,020

 
1.2
General and administrative
3,026

 
0.6

 
2,136

 
0.4
 
1,718

 
0.7
Total stock-based compensation
19,015

 
4.3

 
9,315

 
2.8
 
7,461

 
3.0
Non-cash asset acquisition related write-offs

 

 

 
 
2,387

 
0.9
Patent settlements
(1,911
)
 
(0.4
)
 

 
 

 
Non-GAAP operating income and margin
106,008

 
24.4

 
64,656

 
19.8
 
35,182

 
13.9

























40

Table of Contents

Non-GAAP operating expenses exclude the impact of stock-based compensation expense and the impact of the patent settlements. The following table reconciles GAAP operating expenses to non-GAAP operating expenses for fiscal 2011, 2010 and 2009.

 
Fiscal Year
2011
 
2010
 
2009
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
($ amounts in 000's)
Operating Expenses:
 
 
 
 
 
 
 
 
 
 
 
Research and development expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP research and development expenses
63,577

 
14.7

 
49,801

 
15.3

 
42,195

 
16.7

Stock-based compensation
(4,691
)
 
(1.1
)
 
(2,339
)
 
(0.9
)
 
(1,963
)
 
(0.8
)
Non-GAAP research and development expenses
58,886

 
13.6

 
47,462

 
14.4

 
40,232

 
15.9

Sales and marketing expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP sales and marketing expenses
145,532

 
33.6

 
111,968

 
34.5

 
96,291

 
38.2

Stock-based compensation
(9,325
)
 
(2.2
)
 
(3,810
)
 
(1.2
)
 
(3,020
)
 
(1.2
)
Non-GAAP sales and marketing expenses
136,207

 
31.4

 
108,158

 
33.3

 
93,271

 
37.0

General and administrative expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP general and administrative expenses
21,965

 
5.1

 
22,380

 
6.9

 
18,320

 
7.3

Stock-based compensation
(3,026
)
 
(0.6
)
 
(2,136
)
 
(0.4
)
 
(1,718
)
 
(0.7
)
Patent settlements
1,911

 
0.4

 

 

 

 

Non-GAAP general and administrative expenses
20,850

 
4.9

 
20,244

 
6.5

 
16,602

 
6.6

Total operating expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP operating expenses
231,074

 
53.4

 
184,149

 
56.7

 
156,806

 
62.2

Stock-based compensation
(17,042
)
 
(3.9
)
 
(8,285
)
 
(2.5
)
 
(6,701
)
 
(2.7
)
Patent settlements
1,911

 
0.4

 

 

 

 

Non-GAAP operating expenses
215,943

 
49.9

 
175,864

 
54.2

 
150,105

 
59.5


Non-GAAP net income is net income, as reported in our consolidated statements of operations, excluding the impact of stock-based compensation expense, asset acquisition related write-offs, and patent settlements. The following table reconciles GAAP net income as reported on our consolidated statements of operations to non-GAAP net income for fiscal 2011, 2010 and 2009.
 
Fiscal Year
2011
2010
2009
($ and share amounts in 000's, except per share amounts)
Net Income:
 
 
 
 
 
GAAP net income
62,492

 
41,245

 
60,179

Stock-based compensation expense (1)
19,015

 
9,315

 
7,461

Non-cash asset acquisition related write-offs (1)

 

 
2,387

Patent settlements (2)
(1,911
)
 

 

Provision for income taxes (3)
29,581

 
15,096

 
(32,666
)
Non-GAAP income before provision for income taxes
109,177

 
65,656

 
37,361

Tax effects related to non-GAAP adjustments (4)
(36,028
)
 
(21,010
)
 
(6,877
)
Non-GAAP net income
73,149

 
44,646

 
30,484

Non-GAAP net income per share - diluted
0.45

 
0.29

 
0.23

Shares used in per share calculation - diluted
163,781

 
156,406

 
130,438


41

Table of Contents

____________________
(1)
Stock-based compensation expense and non-cash asset acquisition related write-offs are added back to GAAP net income to reconcile to non-GAAP income before taxes.
(2)
The patent settlement income is removed from GAAP net income to reconcile to non-GAAP income before taxes.
(3)
Provision for income taxes is our GAAP provision that must be added to GAAP net income to reconcile to non-GAAP income before taxes. The provision for fiscal 2009 included a $37.8 million tax benefit from the reversal of our valuation allowance.
(4)
We used a 33% effective tax rate in fiscal 2011 to calculate non-GAAP net income for fiscal 2011. The 33% and 32% effective tax rates for fiscal 2011 and fiscal 2010, respectively, both reflect the exclusion of GAAP based stock option benefits, as well as the reinstated Federal R&D Credit.

Components of Operating Results

Revenue

We derive our revenue from sales of our products and subscription and support services. In fiscal 2011, we recognized our revenue in accordance with the guidance in ASC 985-605-25 which is discussed in further detail in “—Critical Accounting Policies and Estimates—Revenue Recognition” below. According to ASC 985-605-25, revenue is recognized when persuasive evidence of an arrangement exists, delivery has occurred, the price is fixed or determinable and collection is probable.

Our total revenue is comprised of the following:
 
Product revenue. Product revenue is generated from sales of our appliances and software. The substantial majority of our product revenue has been generated by our FortiGate line of appliances, and we do not expect this to change in the foreseeable future. Product revenue also includes revenue derived from sales of FortiManager, FortiAnalyzer, FortiSwitch, FortiMail, FortiDB, FortiWeb, FortiAP, FortiScan, FortiCarrier, FortiBalancer, FortiCache, FortiBridge, and FortiAuthenticator appliances, and our FortiClient and virtual domain, or VDOM, software. Additionally, we generate revenue from the TalkSwitch line of telephony products. We recognize product revenue on sales to distributors that have no general right of return and direct sales to end-customers upon shipment, once all other revenue recognition criteria have been met. We also recognize revenue upon sell-through for distributor agreements that allow for rights of return. Such returns are estimated and recorded as a reduction to revenue. As a percentage of total revenue, we expect our product revenue may vary from quarter-to-quarter based on seasonal and cyclical factors discussed below under “—Quarterly Results of Operations” but generally may remain at relatively comparable levels or decline modestly over time, as services revenue becomes a larger portion of our business as our customers renew existing services contracts and we expand our customer base.

Services revenue. Services revenue is generated primarily from FortiCare technical support services for software updates, maintenance releases and patches, Internet access to technical content, telephone and Internet access to technical support personnel and hardware support, and FortiGuard security subscription services related to application control, antivirus, intrusion prevention, Web filtering, antispam and vulnerability management updates. We recognize revenue from subscription and support services over the service performance period. Our typical contractual support and subscription term is one year from the date of registration, although we do offer multi-year support and subscription contracts. We also generate a small portion of our revenue from professional services and training services, and we recognize this revenue as the services are provided. As a percentage of total revenue, we expect our services revenue to remain at comparable levels or increase as our customers renew existing service contracts and we expand our customer base. Our services revenue growth rate depends significantly on the growth of our customer base and the renewal of service contracts by our current customers.
 
Ratable and other revenue. Ratable and other revenue is generated from sales of our products and services in cases where the fair value of the services being provided cannot be separated from the value of the entire sale. In these cases, the value of the entire sale is deferred and recognized ratably over the service performance period. See “—Critical Accounting Policies and Estimates—Revenue Recognition.” Ratable and other revenue was formerly referred to as Ratable product and services revenue. In 2011, this category includes a $2.6 million sale of previously-acquired patents during the third quarter of fiscal 2011. In fiscal 2011 and 2010, ratable and other revenue represented approximately 4% and 5% of total revenue, respectively. Over time we expect this category to continue to decline due to the new revenue recognition rules, which allow us to use best estimate of selling price ("BESP") in our allocation of arrangement consideration when we do not have VSOE.

Our total cost of revenue is comprised of the following:


42

Table of Contents

Cost of product revenue. A substantial majority of the cost of product revenue consists of third-party manufacturing costs. Our cost of product revenue also includes product testing costs, write-offs for excess and obsolete inventory, royalty payments, amortization and any impairment of applicable acquired intangible assets, warranty costs, shipping and allocated facilities costs, stock-based compensation costs, and personnel costs associated with logistics and quality control. Personnel costs include cash-based personnel costs such as salaries, benefits and bonuses. Royalties reflect amounts related to the Trend Micro litigation, which was settled in December 2011, as discussed in “Item 3 - Legal Proceedings.”

Cost of services revenue. Cost of services revenue is primarily comprised of cash-based personnel costs associated with our FortiGuard Labs team and our technical support, professional services and training teams, as well as depreciation, supplies, data center, data communications, facility-related costs and stock-based compensation costs. We expect our cost of services revenue will increase as we continue to invest in subscription and support services to meet the needs of our growing customer base.

Cost of ratable and other revenue. Cost of ratable and other revenue is comprised primarily of deferred product costs and services-related costs.

Gross profit. Gross profit as a percentage of revenue, or gross margin, has been and will continue to be affected by a variety of factors, including the average sales price of our products, any excess inventory write-offs, manufacturing costs, the mix of products sold and the mix of revenue between products and services. We believe our overall gross margin for the near term will remain at comparable levels compared to that achieved in fiscal 2011.

Services revenue has historically increased as a percentage of total revenue since inception, and this trend has had a positive effect on our total gross margin given the higher services gross margins compared to product gross margins. We generally maintained consistent services gross margins in fiscal 2011 and fiscal 2010.
 
Operating expenses. Our operating expenses consist of research and development, sales and marketing and general and administrative expenses. Personnel costs are the most significant component of operating expenses and consist of cash-based personnel costs such as salaries, benefits, bonuses and, with regard to the sales and marketing expense, and sales commissions. They also include non-cash charges, specifically, stock-based compensation. We expect personnel costs to continue to increase in absolute dollars as we hire new employees.

Research and development. Research and development expense consists primarily of cash-based personnel costs. Additional research and development expenses include ASIC and system prototypes and certification-related expenses, depreciation of capital equipment, facility-related expenses and stock-based compensation expenses. The majority of our research and development is focused on both software development and the ongoing development of our hardware platform. We record all research and development expenses as incurred, except for capital equipment which is depreciated over time. Our development teams are primarily located in Canada, China, and the United States. We expect our spending for research and development to increase in absolute dollars but remain comparable as a percentage of total revenue compared to fiscal 2011 results.

Sales and marketing. Sales and marketing expense is the largest component of our operating expenses and primarily consists of cash-based personnel costs including salary, benefits and commissions. Additional sales and marketing expenses include stock-based compensation, promotional and other marketing expenses, travel, depreciation of capital equipment and facility-related expenses. We intend to hire additional personnel focused on sales and marketing and expand our sales and marketing efforts worldwide in order to increase our presence in new geographic markets and enterprise verticals, add new customers and increase penetration within our existing customer base. Accordingly, we expect sales and marketing expenses to increase in absolute dollars and to continue to be our largest operating expense but remain comparable as a percentage of total revenue compared to fiscal 2011 results.

General and administrative. General and administrative expense consists of cash-based personnel costs as well as professional fees, stock-based compensation, depreciation of capital equipment and software, and facility-related expenses. General and administrative personnel include our executive, finance, human resources, information technology and legal organizations. Our professional fees principally consist of outside legal, auditing, accounting, information technology and other consulting costs. We expect that general and administrative expense will increase in absolute dollars as we hire additional personnel, make improvements to our information technology infrastructure, and defend our intellectual property, but remain

43

Table of Contents

comparable as a percentage of total revenue compared to fiscal 2011 results, barring unforeseen litigation.

Interest income. Interest income consists of income earned on our cash, cash equivalents and investments. We have historically invested our cash in money market funds, commercial paper, corporate debt securities, municipal bonds, term deposits, and U.S. government and agency debt securities.

Other income (expense), net. Other income (expense), net consists primarily of foreign exchange and related hedging gains and losses. Foreign exchange gains and losses relate to foreign currency exchange re-measurement. The hedging gains and losses are related to our settled balance sheet hedges.

Provision for (benefit from) income taxes. We are subject to tax in the United States as well as other tax jurisdictions or countries in which we conduct business. Earnings from our non-U.S. activities are subject to income taxes in the local country which are generally lower than U.S. tax rates, and may be subject to current U.S. income taxes. Our effective tax rates differ from the U.S. statutory rate primarily due to foreign income subject to different tax rates than the U.S., research and development tax credits, withholding taxes, nondeductible compensation and expenses and adjustments related to our intercompany transfer pricing.

The income tax provision for fiscal 2011 was comprised primarily of domestic income taxes, foreign income taxes and withholding taxes. The 2011 effective tax rate was impacted by the inclusion of stock option benefits, which affected the transfer pricing calculations between some of our foreign subsidiaries as well as the reinstated U.S. Federal Research and Development Tax Credit. The income tax provision for fiscal 2009 reflected a tax benefit related to the release of the valuation allowance, which resulted in the recognition of deferred tax assets. As a result of fully reversing our valuation allowance, we expect that our effective tax rate will approximate the U.S. federal statutory tax rates plus the impact of state taxes, research and development tax credits (when applicable), withholding tax, nondeductible compensation and adjustments related to intercompany transfer pricing.

Critical Accounting Policies and Estimates

Our discussion and analysis of our financial condition and results of operations are based upon our financial statements, which have been prepared in accordance with U.S. GAAP. These principles require us to make estimates and judgments that affect the reported amounts of assets, liabilities, revenue and expenses, cash flow and related disclosure of contingent assets and liabilities. Our estimates include those related to revenue recognition, stock-based compensation, valuation of inventory, warranty liabilities and accounting for income taxes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances. Actual results may differ from these estimates. To the extent that there are material differences between these estimates and our actual results, our future financial statements will be affected.

We believe that of our significant accounting policies, which are described in Note 1 to the financial statements included in this 10-K, the following accounting policies involve a greater degree of judgment and complexity. Accordingly, we believe these are the most critical to fully understand and evaluate our financial condition and results of operations.

Revenue Recognition

In October 2009, the FASB amended the ASC as summarized in Accounting Standards Update ("ASU") No. 2009-14, Software (Topic 985): Certain Revenue Arrangements That Include Software Elements, and ASU No. 2009-13, Revenue Recognition (Topic 605): Multiple-Deliverable Revenue Arrangements. ASU 2009-14 amends industry specific revenue accounting guidance for software and software related transactions to exclude from its scope tangible products containing software components and non-software components that function together to deliver the product's essential functionality. ASU 2009-13 amends the accounting for multiple-element arrangements to provide guidance on how the deliverables in an arrangement should be separated and eliminates the use of the residual method. ASU 2009-13 also requires an entity to allocate revenue using the relative selling price method. The standard establishes a hierarchy of evidence to determine the stand-alone selling price of a deliverable based on VSOE, third-party evidence ("TPE"), and the BESP. If VSOE is available, it would be used to determine the selling price of a deliverable. If VSOE is not available, the entity would determine whether TPE is available. If so, TPE must be used to determine the selling price. If TPE is not available, then the BESP would be used.

For all transactions originating or materially modified after December 31, 2010, we recognize revenue in accordance with ASU 2009-13. Certain arrangements with multiple deliverables may continue to have software deliverables that are subject to ASC 985-605 along with non-software deliverables that are subject to the ASU 2009-13. When a sales arrangement contains multiple elements, such as hardware appliances, software, customer support services, and/or professional services, we

44

Table of Contents

allocate revenue to each element based on the aforementioned selling price hierarchy. In multiple element arrangements where software is more-than-incidental, revenue is allocated to each separate unit of accounting for each of the non-software deliverables and to the software deliverables as a group using the relative selling prices of each of the deliverables in the arrangement based on the selling price hierarchy in ASU 2009-13.
 
VSOE of fair value for elements of an arrangement is based upon the normal pricing and discounting practices for those services when sold separately. In determining VSOE, we require that a substantial majority of the selling prices for a service fall within a reasonably narrow pricing range, generally evidenced by a substantial majority of such historical stand-alone transactions falling within a reasonably narrow range of the median rates. In addition, we consider major segments, geographies, customer classifications, and other variables in determining VSOE.
 
We are typically not able to determine TPE for our products or services. TPE is determined based on competitor prices for similar deliverables when sold separately. Generally, our go-to-market strategy differs from that of our peers and our offerings contain a significant level of differentiation such that the comparable pricing of products with similar functionality cannot be obtained. Furthermore, we are unable to reliably determine what similar competitor products' selling prices are on a stand-alone basis.
 
For our hardware appliances we use BESP as our selling price. For our support and services, we generally use VSOE as our selling price. When we are unable to establish a selling price using VSOE for our support and services, we use BESP in our allocation of arrangement consideration. The objective of BESP is to determine the price at which we would transact a sale if the product or service were sold on a stand-alone basis. We determine BESP for a product or service by considering multiple factors including, but not limited to, cost of products, gross margin objectives, pricing practices, geographies, customer classes and distribution channels. We review our BESP estimates on a quarterly basis to coincide with our VSOE review process.
 
We derive revenue from sales of products, including appliances and software, and services, including subscription, support and other services. Our appliances include operating system software that is integrated into the appliance hardware and is deemed essential to its functionality. As a result, we account for revenue in accordance with ASC 985-605 and all related interpretations. See “—Summary of Significant Accounting Policies in the notes to the consolidated financial statements” for a discussion of new revenue recognition standards that we adopted in fiscal 2011.

Revenue can be recognized when all of the following criteria have been met:
 
Persuasive evidence of an arrangement exists. Binding contracts or purchase orders are generally used to determine the existence of an arrangement.
 
Delivery has occurred. Delivery occurs when we fulfill an order and title and risk of loss has been transferred or upon delivery of the service contract registration code.

The fee is fixed or determinable. We assess whether the fee is fixed or determinable based on the payment terms associated with the transaction. In the event payment terms differ from our standard business practices, the fees are deemed to be not fixed or determinable and revenue is recognized when the payments become due, provided the remaining criteria for revenue recognition have been met.
 
Collectability is probable. We assess collectability based primarily on creditworthiness as determined by credit checks and analysis, as well as payment history. Payment terms generally range from 30 to 90 days from invoice date.

For arrangements which include end-customer acceptance criteria, revenue is recognized upon acceptance. We recognize product revenue on sales to distributors that have no general right of return and direct sales to end-customers upon shipment, once all other revenue recognition criteria have been met. We also recognize revenue upon sell-through for distributor agreements that allow for rights of return. Such returns are estimated and recorded as a reduction to revenue. Substantially all of our products have been sold in combination with services, which consist of subscriptions and/or support. Subscription services provide access to our antivirus, intrusion prevention, web filtering, and anti-spam functionality. Support services include rights to unspecified software upgrades, maintenance releases and patches, telephone and Internet access to technical support personnel, and hardware support.


The subscription and support services start on the date the customer registers the appliance. The customer is then entitled to service for the stated contractual period beginning on the registration date.
 

45

Table of Contents

We offer certain sales incentives to channel partners. We reduce revenue for estimates of sales returns and allowances. Additionally, in limited circumstances, we allow our customers to return our products, subject to varying limitations, for a refund within a reasonably short period of time from the date of purchase. We estimate and record reserves for sales incentives and sales returns based on historical experience.

At December 31, 2011, our allowance for sales returns was $2.4 million compared to $2.0 million at December 31, 2010. If our allowance for sales returns had increased by 10.0%, or $0.2 million, our net revenue would have decreased by $0.2 million in fiscal 2011.

Stock-Based Compensation

Employees. We have accounted for stock-based awards to employees in accordance with ASC 718, which requires compensation expense related to share-based transactions, including employee stock options, to be measured and recognized in the financial statements based on a determination of the fair value of the stock options. The grant date fair value is determined using the Black-Scholes-Merton (“Black-Scholes”) pricing model. For all employee stock options, we recognize expense over the requisite service period using the straight-line method. Our option pricing model requires the input of highly subjective assumptions, including the expected stock price volatility, expected term, and forfeiture rate. Any changes in these highly subjective assumptions could significantly impact stock-based compensation expense.

Employee Stock Purchase Plan. We apply ASC 718 to stock purchase rights, which requires compensation expense related to share-based transactions, including stock purchase rights under our employee stock purchase plan ("ESPP"), to be measured and recognized in the financial statements based on fair value. The grant date fair value is determined using the Black-Scholes-Merton (“Black-Scholes”) pricing model. Our ESPP provides for consecutive six-month offering periods, with the first offering period having commenced on August 15, 2011 and ended on February 14, 2012.

Valuation of Inventory

Inventory is recorded at the lower of cost (using the first-in, first-out method) or market, after we give appropriate consideration to obsolescence and inventory in excess of anticipated future demand. In assessing the ultimate recoverability of inventory, we are required to make estimates regarding future customer demand, the timing of new product introductions, economic trends and market conditions. If the actual product demand is significantly lower than forecasted, we could be required to record additional inventory write-downs which would be charged to cost of product revenue. Any write-downs could have an adverse impact on our gross margins and profitability.

Warranty Liabilities

We generally provide a one-year warranty on hardware products and a 90-day warranty on software. A provision for estimated future costs related to warranty activities is charged to cost of product revenue based upon historical product failure rates and historical costs incurred in correcting product failures. If we experience an increase in warranty claims compared with our historical experience, or if the cost of servicing warranty claims is greater than expected, our gross margin could be adversely affected.

Accounting for Income Taxes

We record income taxes using the asset and liability method, which requires the recognition of deferred tax assets and liabilities for the expected future tax consequences of events that have been recognized in our financial statements or tax returns. In estimating future tax consequences, generally all expected future events other than enactments or changes in the tax law or rates are considered. Valuation allowances are provided when necessary to reduce deferred tax assets to the amount expected to be realized.

We operate in various tax jurisdictions and are subject to audit by various tax authorities. We provide for tax contingencies whenever it is deemed more likely than not that a tax asset has been impaired or a tax liability has been incurred for events such as tax claims or changes in tax laws. Tax contingencies are based upon their technical merits, relevant tax law and the specific facts and circumstances as of each reporting period. Changes in facts and circumstances could result in material changes to the amounts recorded for such tax contingencies.

We account for uncertain tax positions in accordance with ASC 740-10, which defines the confidence level that a tax position must meet in order to be recognized in the financial statements. ASC 740-10 requires that the tax effects of a position be recognized only if it is “more likely than not” to be sustained based solely on its technical merits as of the reporting date. We

46

Table of Contents

consider many factors when evaluating and estimating our tax positions and tax benefits, which may require periodic adjustments and which may not accurately anticipate actual outcomes.

As part of the process of preparing our consolidated financial statements, we are required to estimate our taxes in each of the jurisdictions in which we operate. We estimate actual current tax exposure together with assessing temporary differences resulting from differing treatment of items, such as accruals and allowances not currently deductible for tax purposes. These differences result in deferred tax assets, which are included in our consolidated balance sheets. In general, deferred tax assets represent future tax benefits to be received when certain expenses previously recognized in our consolidated statements of operations become deductible expenses under applicable income tax laws, or loss or credit carryforwards are utilized.

In assessing the realizability of deferred tax assets, management considers whether it is more likely than not that some portion or all of the deferred tax assets will be realized. The ultimate realization of deferred tax assets is dependent upon the generation of future taxable income during the periods in which those temporary differences become deductible. During the fourth quarter of fiscal 2009 we concluded that it was more likely than not that we would be able to realize the benefit of our deferred tax assets in the future. We based this conclusion on historical and projected operating performance, as well as our expectation that our operations will generate sufficient taxable income in future periods to realize the tax benefits associated with the deferred tax assets. As a result, we released all of the valuation allowance on our net deferred tax assets. We will continue to assess the need for a valuation allowance on the deferred tax asset by evaluating both positive and negative evidence that may exist. Any adjustment to the net deferred tax asset valuation allowance would be recorded in the income statement for the period that the adjustment is determined to be required.

We make estimates and judgments about our future taxable income that are based on assumptions that are consistent with our plans and estimates. Should the actual amounts differ from our estimates, the amount of our tax expense and liabilities could be materially impacted.

Results of Operations

The following tables set forth our results of operations for the periods presented and as a percentage of our total revenue for those periods. The period-to-period comparison of financial results is not necessarily indicative of financial results to be achieved in future periods.


47

Table of Contents

 
Fiscal Year
 
2011
 
2010
 
2009 (1)
 
($ amounts in 000's)
Consolidated Statement of Operations Data:
 
 
 
 
 
Revenue
 
 
 
 
 
Product
197,408

 
135,140

 
98,686

Services
220,268

 
172,046

 
139,172

Ratable and other revenue
15,900

 
17,510

 
14,257

Total revenue
433,576

 
324,696

 
252,115

Cost of revenue
 
 
 
 
 
Product
73,201

 
51,944

 
42,166

Services
35,486

 
26,967

 
22,265

Ratable and other revenue
4,911

 
6,295

 
5,544

Total cost of revenues
113,598

 
85,206

 
69,975

Gross profit
 
 
 
 
 
Product
124,207

 
83,196

 
56,520

Services
184,782

 
145,079

 
116,907

Ratable and other revenue
10,989

 
11,215

 
8,713

Total gross profit
319,978

 
239,490

 
182,140

Operating expenses
 
 
 
 
 
Research and development
63,577

 
49,801

 
42,195

Sales and marketing
145,532

 
111,968

 
96,291

General and administrative
21,965

 
22,380

 
18,320

Total operating expenses
231,074

 
184,149

 
156,806

Operating income
88,904

 
55,341

 
25,334

Interest income
3,523

 
1,815

 
1,981

Other income (expense), net
(354
)
 
(815
)
 
198

Income before income taxes
92,073

 
56,341

 
27,513

Provision for (benefit from) income taxes
29,581

 
15,096

 
(32,666
)
Net income
62,492

 
41,245

 
60,179

____________________
(1)
Commencing in the third quarter of fiscal 2009, we began operating and reporting financial results on a calendar quarter and year basis. This change in period end had the effect of increasing the number of days in fiscal 2009 by four days.


48

Table of Contents

 
Fiscal Year
2011
 
2010
 
2009
(as % of revenue)
Revenue
 
 
 
 
 
Product
45.5

 
41.6

 
39.1

Services
50.8

 
53.0

 
55.2

Ratable and other revenue
3.7

 
5.4

 
5.7

Total revenue
100.0

 
100.0

 
100.0

Total cost of revenue
26.2

 
26.2

 
27.8

Total gross profit
73.8

 
73.8

 
72.2

Operating expenses
 
 
 
 
 
Research and development
14.7

 
15.3

 
16.7

Sales and marketing
33.6

 
34.6

 
38.2

General and administrative
5.1

 
6.9

 
7.3

Total operating expenses
53.4

 
56.8

 
62.2

Operating income
20.5

 
17.0

 
10.0

Interest income
0.8

 
0.7

 
0.8

Other income (expense), net
(0.1
)
 
(0.2
)
 
0.1

Income before provision for income taxes
21.2

 
17.5

 
10.9

Provision for (benefit from) income taxes
6.8

 
4.6

 
(13.0
)
Net income
14.4

 
12.9

 
23.9


Fiscal Years 2011 and 2010

Revenue
 
 
Fiscal Year
 
 
 
 
2011
 
2010
 
 
 
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
$ Change
 
% Change
($ amounts in 000's)
Revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
197,408

 
45.5
 
135,140

 
41.6
 
62,268

 
46.1

Services
220,268

 
50.8
 
172,046

 
53.0
 
48,222

 
28.0

Ratable and other revenue
15,900

 
3.7
 
17,510

 
5.4
 
(1,610
)
 
(9.2
)
Total revenue
433,576

 
100.0
 
324,696

 
100.0
 
108,880

 
33.5

Revenue by Geography:
 
 
 
 
 
 
 
 
 
 
 
Americas
172,494

 
39.8
 
123,961

 
38.2
 
48,533

 
39.2

EMEA
152,385

 
35.1
 
121,604

 
37.5
 
30,781

 
25.3

APAC
108,697

 
25.1
 
79,131

 
24.3
 
29,566

 
37.4

Total revenue
433,576

 
100.0
 
324,696

 
100.0
 
108,880

 
33.5


Total revenue increased $108.9 million, or 33.5%, in fiscal 2011 compared to fiscal 2010. The adoption of the new revenue recognition rules, described in Note 1of our Consolidated Financial Statements in Part II, Item 8 of this Annual Report on Form 10-K, contributed $20.0 million of the increase, primarily with respect to product revenue. The Americas and APAC regions contributed the largest portion of our revenue growth on a percentage basis. Product revenue increased $62.3 million, or 46.1%, compared to fiscal 2010. The increase in product revenue was primarily driven by greater sales volume and higher average sales prices in our FortiGate product family due to increased demand for our high-end products from enterprise and service provider customers. The impact of adopting the new revenue recognition rules referenced above also contributed to the increase in product revenue. Services revenue increased $48.2 million, or 28.0%, in fiscal 2011 compared to fiscal 2010 due to the recognition of revenue from our increased focus on contract renewals and our growing deferred revenue balance consisting of subscription and support contracts sold to a larger customer base. Ratable and other revenue was $4.2 million lower due to the impact of no longer deferring ratable revenue as a result of the above-mentioned adoption of new revenue recognition rules,

49

Table of Contents

offset by a $2.6 million sale of previously-acquired patents.

Cost of revenue and gross margin
 
 
Fiscal Year
 
 
 
 
2011
 
2010
 
$ Change
 
% Change
($ amounts in 000's)
Cost of revenue:
 
 
 
 
 
 
 
Product
73,201

 
51,944

 
21,257

 
40.9

Services
35,486

 
26,967