S-3ASR
Table of Contents

As filed with the Securities and Exchange Commission on June 3, 2014

Registration No. 333-            

 

 

 

UNITED STATES

SECURITIES AND EXCHANGE COMMISSION

Washington, D.C. 20549

 

 

FORM S-3

REGISTRATION STATEMENT

Under

The Securities Act of 1933

 

 

PALO ALTO NETWORKS, INC.

(Exact name of registrant as specified in its charter)

 

 

 

Delaware   20-2530195
(State or other jurisdiction
of incorporation or organization)
  (I.R.S. Employer
Identification Number)

 

 

4301 Great America Parkway

Santa Clara, California 95054

(408) 753-4000

(Address, including zip code, and telephone number, including area code, of registrant’s principal executive offices)

 

 

Mark D. McLaughlin

President and Chief Executive Officer

Palo Alto Networks, Inc.

4301 Great America Parkway

Santa Clara, California 95054

(408) 753-4000

(Name, address, including zip code, and telephone number, including area code, of agent for service)

 

 

Copies to:

 

Jeffrey D. Saper

Jon C. Avina

Wilson Sonsini Goodrich & Rosati

Professional Corporation

650 Page Mill Road

Palo Alto, CA 94304

(650) 493-9300

 

Jeffrey C. True

General Counsel

Palo Alto Networks, Inc.

4301 Great America Parkway

Santa Clara, California 95054

(408) 753-4000

 

 

Approximate date of commencement of proposed sale to the public: From time to time after the effective date of this Registration Statement.

If the only securities being registered on this Form are being offered pursuant to dividend or interest reinvestment plans, please check the following box.  ¨

If any of the securities being registered on this Form are to be offered on a delayed or continuous basis pursuant to Rule 415 under the Securities Act of 1933, other than securities offered only in connection with dividend or interest reinvestment plans, check the following box.  x

If this Form is filed to register additional securities for an offering pursuant to Rule 462(b) under the Securities Act, please check the following box and list the Securities Act registration statement number of the earlier effective registration statement for the same offering.  ¨

If this Form is a post-effective amendment filed pursuant to Rule 462(c) under the Securities Act, check the following box and list the Securities Act registration statement number of the earlier effective registration statement for the same offering.  ¨

If this Form is a registration statement pursuant to General Instruction I.D. or a post-effective amendment thereto that shall become effective upon filing with the Commission pursuant to Rule 462(e) under the Securities Act, check the following box.  x

If this Form is a post-effective amendment to a registration statement filed pursuant to General Instruction I.D. filed to register additional securities or additional classes of securities pursuant to Rule 413(b) under the Securities Act, check the following box.  ¨

Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act.

 

Large accelerated filer   x    Accelerated filer   ¨
Non-accelerated filer   ¨  (Do not check if a smaller reporting company)    Smaller reporting company   ¨

 

 

CALCULATION OF REGISTRATION FEE

 

 

Title of Each Class of 
Securities to be Registered
  Amount to be
Registered (1)
  Proposed Maximum
Offering Price
Per Share (2)
  Proposed Maximum
Aggregate
Offering Price (2)
  Amount of
Registration Fee

Common stock, par value $0.0001 per share

  1,556,925   $69.30   $107,894,902.50   $13,896.86

 

 

(1) Pursuant to Rule 416(a) of the Securities Act of 1933, as amended, this Registration Statement shall also cover any additional shares of the Registrant’s common stock that become issuable by reason of any stock dividend, stock split, recapitalization or other similar transaction effected without receipt of consideration that increases the number of the Registrant’s outstanding shares of common stock.
(2) Estimated in accordance with Rule 457(c) solely for purposes of calculating the registration fee on the basis of the average of the high and low prices of Registrant’s common stock as reported on the New York Stock Exchange on May 28, 2014.

 

 

 


Table of Contents

PROSPECTUS

1,556,925 SHARES

 

LOGO

Common Stock

 

 

The selling stockholders of Palo Alto Networks, Inc. (“Palo Alto Networks,” “we,” “us” or the “Company”) listed beginning on page 33 may offer and resell up to 1,556,925 shares of our common stock under this prospectus. The selling stockholders acquired these shares from us pursuant to a Share Purchase Agreement dated March 22, 2014, as amended by that certain Amendment No. 1 to the Share Purchase Agreement, dated as of April 9, 2014, by and among the Company, Palo Alto Networks Holding B.V., a company formed under the laws of the Netherlands and a wholly-owned subsidiary of the Company, Palo Alto Networks (Israel) Ltd. (formerly, Cyvera Ltd.), a company formed under the laws of Israel (“Cyvera”), the shareholders of Cyvera and Shareholder Representative Services LLC, as shareholder representative thereunder, in connection with our acquisition of Cyvera. The selling stockholders (which term as used herein includes their respective donees, transferees or other successors in interest) may sell these shares through public or private transactions at market prices prevailing at the time of sale or at negotiated prices. We will not receive any proceeds from the sale of the shares by the selling stockholders.

Our common stock is listed on the New York Stock Exchange under the symbol “PANW.” On June 2, 2014, the last reported sale price for our common stock on the New York Stock Exchange was $73.69 per share.

Investing in our common stock involves risks. See “Risk Factors” beginning on page 3.

Neither the Securities and Exchange Commission nor any state securities commission has approved or disapproved of these securities or determined if this prospectus is truthful or complete. Any representation to the contrary is a criminal offense.

 

 

The date of this prospectus is June 3, 2014.


Table of Contents

TABLE OF CONTENTS

 

     Page  

ABOUT THIS PROSPECTUS

     i   

PROSPECTUS SUMMARY

     1   

RISK FACTORS

     3   

SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS

     31   

USE OF PROCEEDS

     32   

SELLING STOCKHOLDERS

     33   

PLAN OF DISTRIBUTION

     36   

LEGAL MATTERS

     38   

EXPERTS

     38   

WHERE YOU CAN FIND MORE INFORMATION

     38   

INFORMATION INCORPORATED BY REFERENCE

     38   

 

 

ABOUT THIS PROSPECTUS

This prospectus is a part of a registration statement on Form S-3 that we filed with the Securities and Exchange Commission (the “SEC”) utilizing a “shelf” registration process. Under this shelf registration process, the selling stockholders may, from time to time, offer and sell shares of our common stock, as described in this prospectus, in one or more offerings.

You should rely only on the information contained in this prospectus (as supplemented and amended). We have not authorized anyone to provide you with different information. This document may only be used where it is legal to sell these securities. You should not assume that the information contained in this prospectus is accurate as of any date other than its date regardless of the time of delivery of the prospectus or any sale of our common stock.

We urge you to read carefully this prospectus (as supplemented and amended) before deciding whether to purchase any of the shares of common stock being offered.

 

-i-


Table of Contents

PROSPECTUS SUMMARY

This summary highlights selected information contained elsewhere in this prospectus. This summary does not contain all the information that you should consider before investing in our common stock. You should read the following summary together with the more detailed information regarding our company, the common stock being registered hereby, and our financial statements and notes thereto incorporated by reference in this prospectus before deciding whether to purchase shares of our common stock from the selling stockholders.

Overview

We have pioneered the next-generation of enterprise security with our innovative platform that allows enterprises, service providers, and government entities to simultaneously empower and secure their organizations by safely enabling the increasingly complex and rapidly growing number of applications running on their networks and by preventing breaches stemming from targeted cyber attacks. Our enterprise security platform consists of three major elements: our Next-Generation Firewall, our Next-Generation Endpoint Protection, and our Next-Generation Threat Intelligence Cloud. Our Next-Generation Firewall delivers application, user, and content visibility and control, as well as protection against network-based cyber threats integrated within the firewall through our proprietary hardware and software architecture. Our Next-Generation Endpoint Protection protects against cyber attacks that aim to exploit software vulnerabilities on a broad variety of fixed and virtual endpoints. Our Next-Generation Threat Intelligence Cloud provides central intelligence capabilities as well as automation of delivery of preventative measures against cyber attacks.

Our platform offers a number of compelling benefits for our end-customers, including the ability to identify, control, and safely enable applications while offering full prevention of breaches stemming from cyber attacks in real time. We believe our platform also offers superior performance compared to legacy approaches and reduces the total cost of ownership for organizations by simplifying their enterprise security infrastructure and eliminating the need for multiple, stand-alone security appliances and software products. Our products and services can address a broad range of our end-customers’ enterprise security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of endpoints and mobile devices.

Our platform uses an innovative traffic classification engine that identifies network traffic by application, user, and content. As a result, it provides in-depth visibility into all traffic and all applications, at the user level, at all times, and at the full speed of the network in order to control usage, content, risks, and cyber threats. This enables our end-customers to transform their organizations by safely enabling applications through a positive security model with fine-grained policy implementation capabilities and by preventing breaches stemming from cyber attacks.

The network-based element of our platform is delivered in the form of a hardware or virtual appliance and includes a suite of subscription services. The endpoint-based element of our platform is delivered in the form of software. The cloud-based element of our platform is delivered in the form of a service that can be used either in the public cloud or in a private cloud using our dedicated WF-500 appliances. Our subscription services can be easily activated on any of our appliances without requiring additional hardware or processing resources, thereby providing a seamless implementation path for our end-customers. All of our appliances incorporate our PAN-OS operating system and are based on our proprietary identification technologies, application visibility and control (App-ID), user identification (User-ID), and Content-ID, which allow security policies to be defined within the context of applications, users, and content. We deliver these capabilities through an innovative, Single Pass Parallel Processing (SP3) architecture that simultaneously performs multiple identification, security, and networking functions. As a result, our end-customers achieve safe application enablement and prevention of cyber attacks, while maintaining high network performance.

 

 

-1-


Table of Contents

We serve the enterprise network and endpoint security markets, which consists of Firewall, Unified Threat Management (UTM), Web Gateway, Intrusion Detection and Prevention (IDS/IPS), Virtual Private Network (VPN), and Enterprise Endpoint Security technologies.

We sell our platform through a high-touch, channel-fulfilled sales model. Our business is geographically diversified, with 66% of our total revenue from the Americas, 21% from Europe, the Middle East, and Africa (EMEA), and 13% from Asia Pacific and Japan (APAC) for the nine months ended April 30, 2014. As of April 30, 2014, we had over 17,000 end-customers in over 130 countries.

We were incorporated in 2005 as Palo Alto Networks, Inc., a Delaware corporation. Our principal executive offices are located in Santa Clara, California, and our telephone number is (408) 753-4000. Our website is www.paloaltonetworks.com. The information on or accessible through our website is not a part of, and is not incorporated or deemed to be incorporated by reference in, this prospectus. Our office address is 4301 Great American Parkway, Santa Clara, California 95054.

The Shares Offered in this Prospectus

 

Common stock offered by the selling stockholders

1,556,925 shares

 

Our common stock is listed on the New York Stock Exchange under the symbol

PANW

 

Use of proceeds

All of the shares of common stock being offered under this prospectus are being sold by the selling stockholders or their pledgees, donees, transferees or other successors in interest. Accordingly, we will not receive any proceeds from the sale of these shares.

 

 

-2-


Table of Contents

RISK FACTORS

Investing in our common stock involves a high degree of risk. You should carefully consider the risks described below, together with all of the other information included in or incorporated by reference into this prospectus, before making an investment decision. The risks and uncertainties described below are not the only ones we face. Additional risks and uncertainties not presently known to us or that we do not currently believe are important to an investor may also harm our business operations. If any of the events, contingencies, circumstances or conditions described in the following risks actually occurs, our business, financial condition or our results of operations could be seriously harmed. If that happens, the trading price of our common stock could decline and you may lose part or all of the value of any of our shares held by you.

Risks Related to Our Business and Our Industry

Our limited operating history makes it difficult to evaluate our current business and future prospects, and may increase the risk of your investment.

We were founded in 2005 and shipped our first products in 2007. The majority of our revenue growth has occurred since 2009. Our limited operating history makes it difficult to evaluate our current business and our future prospects, including our ability to plan for and model future growth. We have encountered and will continue to encounter risks and difficulties frequently experienced by rapidly growing companies in constantly evolving industries, including the risks described in this prospectus. If we do not address these risks successfully, our business and operating results will be adversely affected, and the market price of our common stock could decline. Further, we have limited historical financial data and we operate in a rapidly evolving market. As such, any predictions about our future revenue and expenses may not be as accurate as they would be if we had a longer operating history or operated in a more predictable market.

Our business and operations have experienced rapid growth in recent periods, and if we do not effectively manage any future growth or are unable to improve our systems and processes, our operating results will be adversely affected.

We have experienced rapid growth and increased demand for our products over the last few years. Our employee headcount and number of end-customers have increased significantly, and we expect to continue to grow our headcount significantly over the next year. For example, from the end of the second quarter of fiscal 2014 to the end of the third quarter of fiscal 2014, our headcount increased from 1,375 to 1,556 employees, and our number of end-customers increased from more than 16,000 to over 17,000. The growth and expansion of our business and product and service offerings places a continuous significant strain on our management, operational, and financial resources. As we have grown, we have increasingly managed more complex deployments of our products and services with larger end-customers. To manage any future growth effectively, we must continue to improve and expand our information technology and financial infrastructure, our operating and administrative systems, and our ability to manage headcount, capital, and processes in an efficient manner.

We may not be able to successfully implement improvements to our systems and processes in an efficient or timely manner, and we may discover deficiencies in our existing systems and processes. We have licensed technology from third parties to help us accomplish this objective. We may experience difficulties in managing improvements to our systems and processes or in connection with third-party software, which could disrupt existing customer relationships, cause us to lose customers, limit us to smaller deployments of our products, or increase our technical support costs. Our failure to improve our systems and processes, or their failure to operate in the intended manner, may result in our inability to manage the growth of our business and to accurately forecast our revenue, expenses, and earnings, or to prevent certain losses. In addition, our systems and processes may not prevent or detect all errors, omissions, or fraud. Our productivity and the quality of our products and services may be adversely affected if we do not integrate and train our new employees quickly and effectively, including employees we acquired in connection with our acquisition of Cyvera Ltd. (“Cyvera”). Any future growth would add complexity to

 

-3-


Table of Contents

our organization and require effective coordination throughout our organization. For example, as a result of growth in our employee headcount, we relocated our corporate headquarters to a larger office space in Santa Clara, California in November 2013. Failure to manage any future growth effectively could result in increased costs, negatively impact our end-customers’ satisfaction with our products and services, and harm our operating results.

Our operating results are likely to vary significantly from period to period and be unpredictable, which could cause the market price of our common stock to decline.

Our operating results, in particular, our revenues, gross margins, operating margins, and operating expenses, have historically varied from period to period, and we expect that this trend will continue as a result of a number of factors, many of which are outside of our control and may be difficult to predict, including:

 

    our ability to attract and retain new end-customers;

 

    the budgeting cycles and purchasing practices of end-customers;

 

    changes in end-customer, distributor or reseller requirements, or market needs;

 

    the cost and potential outcomes of existing and future litigation, which could have a material adverse effect on our business;

 

    changes in the growth rate of the enterprise security market;

 

    the timing and success of new product and service introductions by us or our competitors or any other change in the competitive landscape of our industry, including consolidation among our competitors or end-customers;

 

    changes in mix of our products and services including increases in multi-year subscriptions and support and maintenance;

 

    price competition;

 

    deferral of orders from end-customers in anticipation of new products or product enhancements announced by us or our competitors;

 

    our ability to successfully expand our business domestically and internationally;

 

    the timing and costs related to the development or acquisition of technologies or businesses;

 

    lack of synergy, or the inability to realize expected synergies, resulting from recent acquisitions;

 

    our inability to complete or integrate efficiently any acquisitions that we may undertake;

 

    our ability to increase the size of our distribution channel;

 

    decisions by potential end-customers to purchase enterprise security solutions from larger, more established security vendors or from their primary network equipment vendors;

 

    changes in end-customer attach rates and renewal rates for our services;

 

    timing of revenue recognition and revenue deferrals;

 

    our ability to manage production and manufacturing related costs, global customer service organization costs, inventory excess and obsolescence costs, and warranty costs;

 

    insolvency or credit difficulties confronting our customers, which could adversely affect their ability to purchase or pay for our products and services, or confronting our key suppliers, including our sole source suppliers, which could disrupt our supply chain;

 

    any disruption in our channel or termination of our relationship with important channel partners, including as a result of consolidation among distributors and resellers of enterprise security solutions;

 

    our inability to fulfill our end-customers’ orders due to supply chain delays or events that impact our manufacturers or their suppliers;

 

-4-


Table of Contents
    increased expenses, unforeseen liabilities, or write-downs and any impact on our results of operations from any acquisition consummated;

 

    seasonality or cyclical fluctuations in our markets;

 

    future accounting pronouncements or changes in our accounting policies;

 

    the impact on our overall effective tax rate caused by any reorganization in our corporate structure or any changes in our valuation allowance for domestic deferred assets;

 

    increases or decreases in our expenses caused by fluctuations in foreign currency exchange rates, as an increasing portion of our expenses are incurred and paid in currencies other than the U.S. dollar;

 

    political, economic and social instability, including the political uncertainty in Ukraine, the impact of any current and future sanctions the U.S. or other countries may impose on Russia, and any disruption this may cause to broader global industrial economy; and

 

    general macroeconomic conditions, both domestically and in our foreign markets.

Any one of the factors above, or the cumulative effect of some of the factors referred to above, may result in significant fluctuations in our financial and other operating results. This variability and unpredictability could result in our failure to meet our revenue, margin, or other operating result expectations or those of securities analysts or investors for a particular period. If we fail to meet or exceed such expectations for these or any other reasons, the market price of our common stock could fall substantially, and we could face costly lawsuits, including securities class action suits.

Our revenue growth rate in recent periods may not be indicative of our future performance.

You should not consider our revenue growth rate in recent periods as indicative of our future performance. We have recently experienced revenue growth rates of 48% and 58% in the nine months ended April 30, 2014 and nine months ended April 30, 2013, respectively. You should not rely on our revenue for any prior quarterly or annual periods as any indication of our future revenue or revenue growth. If we are unable to maintain consistent revenue or revenue growth, the market price of our common stock could be volatile, and it may be difficult to achieve and maintain profitability.

We have a history of losses, anticipate increasing our operating expenses in the future, and may not be able to achieve or maintain profitability or maintain or increase cash flow on a consistent basis. If we cannot achieve or maintain profitability or maintain or increase our cash flow, our business, financial condition, and operating results may suffer.

Other than fiscal 2012, we have incurred losses in all fiscal years since our inception. We incurred a net loss of $194.4 million in the first three quarters of fiscal 2014, $29.2 million in fiscal 2013, and $12.5 million in fiscal 2011. As a result, we had an accumulated deficit of $303.7 million at April 30, 2014. We anticipate that our operating expenses will increase substantially in the foreseeable future as we continue to enhance our product and service offerings, broaden our end-customer base, expand our sales channels, expand our operations, hire additional employees, and continue to develop our technology. These efforts may prove more expensive than we currently anticipate, and we may not succeed in increasing our revenues sufficiently, or at all, to offset these higher expenses. Revenue growth may slow or revenue may decline for a number of possible reasons, including slowing demand for our products or services, increasing competition, a decrease in the growth of our overall market, or a failure to capitalize on growth opportunities. Any failure to increase our revenues as we grow our business could prevent us from achieving or maintaining profitability or maintaining or increasing cash flow on a consistent basis. If we are unable to meet these risks and challenges as we encounter them, our business, financial condition, and operating results may suffer.

 

-5-


Table of Contents

If we are unable to sell additional products and services to our end-customers or maintain or increase our installed end-customer base, our future revenue and operating results will be harmed.

Our future success depends, in part, on our ability to expand the deployment of our platform with existing end-customers by selling additional products, to secure other areas of our end-customers’ network and endpoints, and by upselling additional subscription services to provide increasing levels of enterprise security. This may require increasingly sophisticated and costly sales efforts and may not result in additional sales. In addition, the rate at which our end-customers purchase additional products and services depends on a number of factors, including the perceived need for additional enterprise security products and services as well as general economic conditions. If our efforts to sell additional products and services to our end-customers are not successful, our business may suffer.

Further, existing end-customers that purchase our subscriptions have no contractual obligation to renew their contracts after the completion of their initial contract period, which is typically one year, and we cannot accurately predict renewal rates. Our end-customers’ renewal rates may decline or fluctuate as a result of a number of factors, including their satisfaction with our services and our end-customer support, the frequency and severity of subscription outages, our product uptime or latency, and the pricing of our, or competing, services. If our end-customers renew their subscriptions, they may renew for shorter contract lengths or on other terms that are less economically beneficial to us. We have limited historical data with respect to rates of end-customer renewals, so we may not accurately predict future renewal trends. We cannot assure you that our end-customers will renew their subscriptions, and if our end-customers do not renew their agreements or renew on less favorable terms, our revenues may grow more slowly than expected or decline.

We also depend on our installed end-customer base for future support and maintenance revenues. Our support and maintenance agreements are typically one year. If end-customers choose not to continue renewing their support and maintenance or seek to renegotiate the terms of support and maintenance agreements prior to renewing such agreements, our revenue may decline.

We face intense competition in our market, especially from larger, well-established companies, and we may lack sufficient financial or other resources to maintain or improve our competitive position.

The market for enterprise security products is intensely competitive, and we expect competition to increase in the future from established competitors and new market entrants. Our main competitors fall into four categories:

 

    large networking vendors, such as Cisco Systems, Inc. and Juniper Networks, Inc., that incorporate enterprise security features in their products;

 

    large companies, such as Intel Corporation, International Business Machines (IBM), and Hewlett-Packard Company (HP), that have acquired large network and endpoint security specialist vendors in recent years and have the technical and financial resources to bring competitive solutions to the market;

 

    independent security vendors, such as Check Point Software Technologies Ltd. and Fortinet, Inc., that offer network security products, and Symantec, Inc., that offers endpoint security products; and

 

    small and large companies that offer, or have announced plans that they will offer, point solutions that compete with some of the features present in our platform.

Many of our existing competitors have, and some of our potential competitors could have, substantial competitive advantages such as:

 

    greater name recognition and longer operating histories;

 

    larger sales and marketing budgets and resources;

 

    broader distribution and established relationships with distribution partners and end-customers;

 

    greater customer support resources;

 

-6-


Table of Contents
    greater resources to make acquisitions;

 

    lower labor and development costs;

 

    larger and more mature intellectual property portfolios; and

 

    substantially greater financial, technical, and other resources.

In addition, some of our larger competitors have substantially broader and more diverse product offerings and leverage their relationships based on other products or incorporate functionality into existing products to gain business in a manner that discourages users from purchasing our products, including through selling at zero or negative margins, product bundling, or closed technology platforms. Potential end-customers may also prefer to purchase from their existing suppliers rather than a new supplier regardless of product performance or features. These larger competitors often have broader product lines and market focus and may therefore not be as susceptible to downturns in a particular market. Many of our smaller competitors that specialize in providing protection from a single type of enterprise security threat are often able to deliver these specialized enterprise security products to the market more quickly than we can. Conditions in our market could change rapidly and significantly as a result of technological advancements, partnering by our competitors, or continuing market consolidation. New start-up companies that innovate and large competitors that are making significant investments in research and development may invent similar or superior products and technologies that compete with our products and technology. Our current and potential competitors may also establish cooperative relationships among themselves or with third parties that may further enhance their resources.

Some of our competitors have made acquisitions of businesses that may allow them to offer more directly competitive and comprehensive solutions than they had previously offered, such as Intel’s acquisition of McAfee and Stonesoft, Check Point’s acquisition of Nokia’s security appliance business, and Cisco’s acquisition of SourceFire. As a result of such acquisitions, our current or potential competitors might be able to adapt more quickly to new technologies and end-customer needs, devote greater resources to the promotion or sale of their products and services, initiate or withstand substantial price competition, take advantage of acquisition or other opportunities more readily, or develop and expand their product and service offerings more quickly than we do. Due to various reasons, organizations may be more willing to incrementally add solutions to their existing enterprise security infrastructure from competitors than to replace it with our solutions. These competitive pressures in our market or our failure to compete effectively may result in price reductions, fewer orders, reduced revenue and gross margins, and loss of market share. Any failure to meet and address these factors could seriously harm our business and operating results.

If functionality similar to that offered by our products is incorporated into existing network infrastructure products, organizations may decide against adding our appliances to their network, which would have an adverse effect on our business.

Large, well-established providers of networking equipment such as Cisco and Juniper offer, and may continue to introduce, enterprise security features that compete with our products, either in stand-alone security products or as additional features in their network infrastructure products. The inclusion of, or the announcement of an intent to include, functionality perceived to be similar to that offered by our security solutions in networking products that are already generally accepted as necessary components of network architecture may have an adverse effect on our ability to market and sell our products. Furthermore, even if the functionality offered by network infrastructure providers is more limited than our products, a significant number of end-customers may elect to accept such limited functionality in lieu of adding appliances from an additional vendor such as us. Many organizations have invested substantial personnel and financial resources to design and operate their networks and have established deep relationships with other providers of networking products, which may make them reluctant to add new components to their networks, particularly from other vendors such as us. In addition, an organization’s existing vendors or new vendors with a broad product offering may be able to offer concessions that we are not able to match because we currently offer only enterprise security products and have

 

-7-


Table of Contents

fewer resources than many of our competitors. If organizations are reluctant to add additional network infrastructure from new vendors or otherwise decide to work with their existing vendors, our ability to increase our market share and improve our financial condition and operating results will be adversely affected.

Reliance on shipments at the end of the quarter could cause our revenue for the applicable period to fall below expected levels.

As a result of end-customer buying patterns and the efforts of our sales force and channel partners to meet or exceed their sales objectives, we have historically received a substantial portion of sales orders and generated a substantial portion of revenue during the last few weeks of each fiscal quarter. If expected revenue at the end of any fiscal quarter is delayed for any reason, including the failure of anticipated purchase orders to materialize, our logistics partners’ inability to ship products prior to fiscal quarter-end to fulfill purchase orders received near the end of the fiscal quarter, our failure to manage inventory to meet demand, our inability to release new products on schedule, any failure of our systems related to order review and processing, or any delays in shipments based on trade compliance requirements, our revenue for that quarter could fall below our expectations and the estimates of analysts, which could adversely impact our business and results of operations and cause a decline in the market price of our common stock.

If we are unable to hire, retain, train, and motivate qualified personnel and senior management, our business could suffer.

Our future success depends, in part, on our ability to continue to attract and retain highly skilled personnel. The loss of the services of any of our key personnel, the inability to attract or retain qualified personnel, or delays in hiring required personnel, particularly in engineering and sales, may seriously harm our business, financial condition, and operating results. Although we have entered into employment offer letters with our key personnel, these agreements have no specific duration and constitute at-will employment. We are also substantially dependent on the continued service of our existing development personnel because of the complexity of our platform. Additionally, any failure to hire, train, and adequately incentivize our sales personnel could negatively impact our growth. Further, the inability of our recently hired sales personnel to effectively ramp to target productivity levels could negatively impact our operating margins. If we are not effective in managing any leadership transition in our sales organization, our business could be adversely impacted and our operating results and financial condition could be harmed.

Competition for highly skilled personnel is often intense, especially in the San Francisco Bay Area, where we have a substantial presence and need for highly skilled personnel. Additionally, the industry in which we operate generally experiences high employee attrition. We may not be successful in attracting, integrating, or retaining qualified personnel to fulfill our current or future needs. Also, to the extent we hire personnel from competitors, we may be subject to allegations that they have been improperly solicited, that they have divulged proprietary or other confidential information, or that their former employers own their inventions or other work product.

Our future performance also depends on the continued services and continuing contributions of our senior management to execute on our business plan and to identify and pursue new opportunities and product innovations. The loss of services of senior management could significantly delay or prevent the achievement of our development and strategic objectives, which could adversely affect our business, financial condition, and operating results.

Our employees do not have employment arrangements that require them to continue to work for us for any specified period, and therefore, they could terminate their employment with us at any time. We do not maintain key person life insurance policies on any of our employees. The loss of one or more of our key employees or groups could seriously harm our business.

 

-8-


Table of Contents

We rely on third-party channel partners to sell substantially all of our products, and if our partners fail to perform, our ability to sell and distribute our products and services will be limited, and our operating results will be harmed.

Substantially all of our revenue is generated by sales through our channel partners, including distributors and resellers. We provide our sales channel partners with specific training and programs to assist them in selling our products, but there can be no assurance that these steps will be effective. In addition, our channel partners may be unsuccessful in marketing, selling, and supporting our products and services. If we are unable to develop and maintain effective sales incentive programs for our third-party channel partners, we may not be able to incentivize these partners to sell our products to end-customers and, in particular, to large enterprises. These partners may also market, sell, and support products and services that are competitive with ours and may devote more resources to the marketing, sales, and support of such competitive products. These partners may have incentives to promote our competitors’ products to the detriment of our own or may cease selling our products altogether. Our agreements with our channel partners may generally be terminated for any reason by either party with advance notice prior to each annual renewal date. We cannot assure you that we will retain these channel partners or that we will be able to secure additional or replacement channel partners. The loss of one or more of our significant channel partners or a decline in the number or size of orders from them could harm our operating results. In addition, any new sales channel partner requires extensive training and may take several months or more to achieve productivity. Our channel partner sales structure could subject us to lawsuits, potential liability, and reputational harm if, for example, any of our channel partners misrepresent the functionality of our products or services to end-customers or violate laws or our corporate policies. If we fail to effectively manage our existing sales channels, if our channel partners are unsuccessful in fulfilling the orders for our products, or if we are unable to enter into arrangements with, and retain a sufficient number of, high quality channel partners in each of the regions in which we sell products and keep them motivated to sell our products, our ability to sell our products and operating results will be harmed.

Because we depend on third-party manufacturers to build and ship our products, we are susceptible to manufacturing and logistics delays and pricing fluctuations that could prevent us from shipping customer orders on time, if at all, or on a cost-effective basis, which may result in the loss of sales and customers.

We depend on third-party manufacturers, primarily Flextronics International Ltd., our contract manufacturer, as sole source manufacturers for our product lines. Our reliance on these third-party manufacturers reduces our control over the manufacturing process and exposes us to risks, including reduced control over quality assurance, product costs, and product supply and timing, as well as the risk that minerals which originate from the Democratic Republic of the Congo and adjoining countries, or conflict minerals, may be included in our products. Any manufacturing and logistics disruption by these third-party manufacturers could severely impair our ability to fulfill orders. In addition, we are subject to requirements under the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 that require us to diligence, disclose, and report whether or not our products contain conflicts minerals. These requirements could adversely affect the sourcing, availability, and pricing of minerals used in the manufacture of semiconductor devices or other components used in our products. We may also encounter customers who require that all of the components of our products be certified as conflict free. If we are not able to meet this requirement, such customers may choose not to purchase our products, which could adversely impact sales of our products. In addition, we incur additional costs to comply with these disclosure requirements, including costs related to determining the source of any of the relevant minerals and metals used in our products.

These manufacturers typically fulfill our supply requirements on the basis of individual orders. We do not have long term contracts with our third-party manufacturers that guarantee capacity, the continuation of particular pricing terms, or the extension of credit limits. Accordingly, they are not obligated to continue to fulfill our supply requirements, which could result in supply shortages, and the prices we are charged for manufacturing services could be increased on short notice. Our contract with one of our contract manufacturers permits them to terminate the agreement for their convenience, subject to prior notice requirements. If we are required to change contract manufacturers, our ability to meet our scheduled product deliveries to our customers could be adversely

 

-9-


Table of Contents

affected, which could cause the loss of sales to existing or potential customers, delayed revenue or an increase in our costs which could adversely affect our gross margins. Any production interruptions for any reason, such as a natural disaster, epidemic, capacity shortages, or quality problems, at one of our manufacturing partners would negatively affect sales of our product lines manufactured by that manufacturing partner and adversely affect our business and operating results.

Managing the supply of our products and product components is complex. Insufficient supply and inventory may result in lost sales opportunities or delayed revenue, while excess inventory may harm our gross margins.

Our third-party manufacturers procure components and build our products based on our forecasts, and we generally do not hold inventory for a prolonged period of time. These forecasts are based on estimates of future demand for our products, which are in turn based on historical trends and analyses from our sales and marketing organizations, adjusted for overall market conditions. In order to reduce manufacturing lead times and plan for adequate component supply, from time to time we may issue forecasts for components and products that are non-cancelable and non-returnable.

Our inventory management systems and related supply chain visibility tools may be inadequate to enable us to forecast accurately and effectively manage supply of our products and product components. Supply management remains an increased area of focus as we balance the need to maintain supply levels that are sufficient to ensure competitive lead times against the risk of obsolescence because of rapidly changing technology and end-customer requirements. If we ultimately determine that we have excess supply, we may have to reduce our prices and write-down inventory, which in turn could result in lower gross margins. If our actual component usage and product demand are lower than the forecast we provide to our third-party manufacturers, we accrue for losses on manufacturing commitments in excess of forecasted demand. Alternatively, insufficient supply levels may lead to shortages that result in delayed revenue or loss of sales opportunities altogether as potential end-customers turn to competitors’ products that are readily available. Additionally, any increases in the time required to manufacture our products or ship products could result in supply shortfalls. If we are unable to effectively manage our supply and inventory, our operating results could be adversely affected.

Because some of the key components in our products come from limited sources of supply, we are susceptible to supply shortages or supply changes, which could disrupt or delay our scheduled product deliveries to our customers and may result in the loss of sales and customers.

Our products rely on key components, including integrated circuit components, which our contract manufacturers purchase on our behalf from a limited number of suppliers, including sole source providers. The manufacturing operations of some of our component suppliers are geographically concentrated in Asia and elsewhere, which makes our supply chain vulnerable to regional disruptions. A fire, flood, earthquake, tsunami or other disaster, condition or event such as political instability, civil unrest or a power outage that adversely affects any of these component suppliers’ facilities could significantly affect our ability to obtain the necessary components for our products, which could result in a substantial loss of sales and revenue and a substantial harm to our operating results. Similarly, a localized health risk affecting employees at these facilities, such as the spread of a pandemic influenza, could impair the volume of components that we are able to obtain, which could result in substantial harm to our operating results.

We do not have volume purchase contracts with any of our component suppliers, and they could cease selling to us at any time. In addition, our component suppliers change their selling prices frequently in response to market trends, including industry-wide increases in demand, and because we do not have volume purchase contracts with these suppliers, we are susceptible to price fluctuations related to raw materials and components. If we are unable to pass component price increases along to our customers or maintain stable pricing, our gross margins and operating results could be negatively impacted. If we are unable to obtain a sufficient quantity of these components in a timely manner for any reason, sales of our products could be delayed or halted or we could be forced to expedite shipment of such components or our products at dramatically increased costs, which would

 

-10-


Table of Contents

negatively impact our revenue and gross margins. Additionally, poor quality in any of the sole-sourced components in our products could result in lost sales or lost sales opportunities. If the quality of the components does not meet our or our end-customers’ requirements, if we are unable to obtain components from our existing suppliers on commercially reasonable terms, or if any of our sole source providers cease to remain in business or continue to manufacture such components, we could be forced to redesign our products and qualify new components from alternate suppliers. The resulting stoppage or delay in selling our products and the expense of redesigning our products could result in lost sales opportunities and damage to customer relationships, which would adversely affect our business and operating results.

If we are not successful in executing our strategy to increase sales of our products to new and existing medium and large enterprise end-customers, our operating results may suffer.

Our growth strategy is dependent, in part, upon increasing sales of our products to medium and large enterprises. Sales to these types of end-customers involve risks that may not be present (or that are present to a lesser extent) with sales to smaller entities. These risks include:

 

    competition from larger competitors, such as Cisco, Check Point, and Juniper, that traditionally target larger enterprises, service providers, and government entities and that may have pre-existing relationships or purchase commitments from those end-customers;

 

    increased purchasing power and leverage held by large end-customers in negotiating contractual arrangements with us;

 

    more stringent requirements in our worldwide support service contracts, including stricter support response times and penalties for any failure to meet support requirements; and

 

    longer sales cycles and the associated risk that substantial time and resources may be spent on a potential end-customer that elects not to purchase our products and services.

Large enterprises often undertake a significant evaluation process that results in a lengthy sales cycle, in some cases over 12 months. Although we have a channel sales model, our sales representatives typically engage in direct interaction with our distributors and resellers in connection with sales to larger end-customers. Because these evaluations are often lengthy, with significant size and scope and stringent requirements, we typically provide evaluation products to these end-customers. We may spend substantial time, effort, and money in our sales efforts without being successful in generating any sales. In addition, product purchases by large enterprises are frequently subject to budget constraints, multiple approvals, and unplanned administrative, processing, and other delays. Finally, large enterprises typically have longer implementation cycles, require greater product functionality and scalability and a broader range of services, demand that vendors take on a larger share of risks, sometimes require acceptance provisions that can lead to a delay in revenue recognition, and expect greater payment flexibility from vendors. All of these factors can add further risk to business conducted with these end-customers. If we fail to realize an expected sale from a large end-customer in a particular quarter or at all, our business, operating results, and financial condition could be materially and adversely affected.

We rely on revenue from subscription and support services, which may decline, and because we recognize revenue from subscriptions and support services over the term of the relevant service period, downturns or upturns in sales of these subscription and support services are not immediately reflected in full in our operating results.

Services revenue accounts for a significant portion of our revenue, comprising 43% of total revenue in the nine months ended of April 30, 2014 and 37% of total revenue in the nine months ended of April 30, 2013. Sales of new or renewal subscription and support and maintenance contracts may decline and fluctuate as a result of a number of factors, including end-customers’ level of satisfaction with our products and services, the prices of our products and services, the prices of products and services offered by our competitors, and reductions in our end-customers’ spending levels. If our sales of new or renewal subscription and support and maintenance contracts decline, our

 

-11-


Table of Contents

revenue and revenue growth may decline and our business will suffer. In addition, we recognize subscription and support and maintenance revenue monthly over the term of the relevant service period, which is typically one year and can be up to five years. As a result, much of the subscription and support and maintenance revenue we report each fiscal quarter is the recognition of deferred revenue from subscription and support and maintenance contracts entered into during previous fiscal quarters. Consequently, a decline in new or renewed subscription or support and maintenance contracts in any one fiscal quarter will not be fully or immediately reflected in revenue in that fiscal quarter but will negatively affect our revenue in future fiscal quarters. Accordingly, the effect of significant downturns in new or renewed sales of our subscriptions or support and maintenance is not reflected in full in our operating results until future periods. Also, it is difficult for us to rapidly increase our services revenue through additional service sales in any period, as revenue from new and renewal service contracts must be recognized over the applicable service period. Furthermore, any increase in the average term of services contracts would result in revenue for services contracts being recognized over longer periods of time.

Defects, errors, or vulnerabilities in our products or services or the failure of our products or services to block a virus or prevent a security breach could harm our reputation and adversely impact our results of operations.

Because our products and services are complex, they have contained and may contain design or manufacturing defects or errors that are not detected until after their commercial release and deployment by our end-customers. For example, from time to time, certain of our end-customers have reported defects in our products related to performance, scalability, and compatibility that were not detected before shipping the product. Additionally, defects may cause our products or services to be vulnerable to security attacks, cause them to fail to help secure networks, or temporarily interrupt end-customers’ networking traffic. Because the techniques used by computer hackers to access or sabotage networks change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques and provide a solution in time to protect our end-customers’ networks. Furthermore, as a well-known provider of enterprise security solutions, our networks, products, and services could be targeted by attacks specifically designed to disrupt our business and harm our reputation. In addition, defects or errors in our subscription updates or our products could result in a failure of our services to effectively update end-customers’ hardware products and thereby leave our end-customers vulnerable to attacks. Our data centers and networks may experience technical failures and downtime, may fail to distribute appropriate updates, or may fail to meet the increased requirements of a growing end-customer base, any of which could temporarily or permanently expose our end-customers’ networks, leaving their networks unprotected against the latest security threats.

Any defects, errors or vulnerabilities in our products could result in:

 

    expenditure of significant financial and product development resources in efforts to analyze, correct, eliminate, or work-around errors or defects or to address and eliminate vulnerabilities;

 

    loss of existing or potential end-customers or channel partners;

 

    delayed or lost revenue;

 

    delay or failure to attain market acceptance;

 

    an increase in warranty claims compared with our historical experience, or an increased cost of servicing warranty claims, either of which would adversely affect our gross margins; and

 

    litigation, regulatory inquiries, or investigations that may be costly and harm our reputation.

Our business is subject to the risks of warranty claims, product returns, product liability, and product defects.

Our products are very complex and, despite testing prior to their release, they have contained and may contain undetected defects or errors, especially when first introduced or when new versions are released. Product defects or errors could affect the performance of our products and could delay the development or release of new products or new versions of products, adversely affect our reputation and our end-customers’ willingness to buy products from

 

-12-


Table of Contents

us, and adversely affect market acceptance or perception of our products. Any such errors or delays in releasing new products or new versions of products or allegations of unsatisfactory performance could cause us to lose revenue or market share, increase our service costs, cause us to incur substantial costs in redesigning the products, cause us to lose significant end-customers, subject us to liability for damages, and divert our resources from other tasks, any one of which could materially and adversely affect our business, results of operations, and financial condition. Our products must successfully interoperate with products from other vendors. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. For example, from time to time, certain of our end-customers have experienced temporary delays or interoperability issues when implementing our products in large complex global deployments where our products are required to interoperate with a complex environment of third party products. The occurrence of hardware or software errors, whether or not caused by our products, could delay or reduce market acceptance of our products, and have an adverse effect on our business and financial performance, and any necessary revisions may cause us to incur significant expenses. The occurrence of any such problems could harm our business, financial condition, and results of operations.

The limitation of liability provisions in our standard terms and conditions of sale may not fully or effectively protect us from claims as a result of federal, state, or local laws or ordinances, or unfavorable judicial decisions in the United States or other countries. The sale and support of our products also entails the risk of product liability claims. Although we may be indemnified by our third-party manufacturers for product liability claims arising out of manufacturing defects, because we control the design of our products, we may not be indemnified for product liability claims arising out of design defects. We maintain insurance to protect against certain claims associated with the use of our products, but our insurance coverage may not adequately cover any claim asserted against us. In addition, even claims that ultimately are unsuccessful could result in our expenditure of funds in litigation, divert management’s time and other resources, and harm our reputation.

If the enterprise security market does not continue to adopt our enterprise security platform, our sales will not grow as quickly as anticipated, and the market price of our common stock could decline.

We are seeking to disrupt the enterprise security market with our enterprise security platform. However, organizations that use legacy products and services for their enterprise security needs may believe that these products and services sufficiently achieve their purpose. Organizations may also believe that our products and services only serve the needs of a portion of the enterprise security market. Accordingly, organizations may continue allocating their IT budgets for legacy products and services and may not adopt our enterprise security platform. If the market for enterprise security solutions does not continue to adopt our enterprise security platform, if end-customers do not recognize the value of our platform compared to legacy products and services, or if we are otherwise unable to sell our products and services to organizations, then our revenue may not grow or may decline, which would have a material adverse effect on our operating results and financial condition.

If we do not accurately predict, prepare for, and respond promptly to the rapidly evolving technological and market developments and changing end-customer needs in the enterprise security market, our competitive position and prospects will be harmed.

The enterprise security market is expected to continue to evolve rapidly. Moreover, many of our end-customers operate in markets characterized by rapidly changing technologies and business plans, which require them to add numerous network access points and adapt increasingly complex enterprise networks, incorporating a variety of hardware, software applications, operating systems, and networking protocols. The technology in our products is especially complex because it needs to effectively identify and respond to new and increasingly sophisticated methods of attack, while minimizing the impact on network performance. Additionally, some of our new products and enhancements may require us to develop new hardware architectures that involve complex, expensive, and time-consuming research and development processes. Although the market expects rapid introduction of new products or product enhancements to respond to new threats, the development of these products is difficult and the timetable for commercial release and availability is uncertain as there can be long time periods between releases and availability of new products. We may experience unanticipated delays in the

 

-13-


Table of Contents

availability of new products and services and fail to meet customer expectations for such availability. If we do not quickly respond to the rapidly changing and rigorous needs of our end-customers by developing, releasing, and making available on a timely basis new products and services or enhancements that can respond adequately to new security threats, our competitive position and business prospects will be harmed.

Additionally, the process of developing new technology is complex and uncertain, and if we fail to accurately predict end-customers’ changing needs and emerging technological trends in the enterprise security industry, including the areas of mobility, virtualization, cloud computing, and software defined networks (SDN), our business could be harmed. We must commit significant resources to developing new products before knowing whether our investments will result in products the market will accept. The success of new products depends on several factors, including appropriate new product definition, component costs, timely completion and introduction of these products, differentiation of new products from those of our competitors, and market acceptance of these products. There can be no assurance that we will successfully identify new product opportunities, develop and bring new products to market in a timely manner, or achieve market acceptance of our products, or that products and technologies developed by others will not render our products or technologies obsolete or noncompetitive .

To remain competitive, we must successfully manage product introductions and transitions.

Due to the highly volatile and competitive nature of the industries in which we compete, we must continually introduce new products, services and technologies, and enhance existing products and services. The success of new product introductions depends on a number of factors including, but not limited to, timely and successful product development, market acceptance, our ability to manage the risks associated with new product production ramp-up issues, the availability of application software for new products, the effective management of purchase commitments and inventory in line with anticipated product demand, the availability of products in appropriate quantities and costs to meet anticipated demand, and the risk that new products may have quality or other defects or deficiencies in the early stages of introduction. Accordingly, we cannot determine in advance the ultimate effect of new product introductions and transitions on our business and results of operations.

Our current research and development efforts may not produce successful products or features that result in significant revenue, cost savings or other benefits in the near future, if at all.

Developing our products and related enhancements is expensive. Our investments in research and development may not result in significant design improvements, marketable products or features, or may result in products that are more expensive than anticipated. Additionally, we may not achieve the cost savings or the anticipated performance improvements we expect, and we may take longer to generate revenue, or generate less revenue, than we anticipate. Our future plans include significant investments in research and development and related product opportunities. We believe that we must continue to dedicate a significant amount of resources to our research and development efforts to maintain our competitive position. However, we may not receive significant revenue from these investments in the near future, if at all, or these investments may not yield the expected benefits, either of which could adversely affect our business and operating results.

The sales prices of our products and services may decrease, which may reduce our gross profits and adversely impact our financial results.

The sales prices for our products and services may decline for a variety of reasons, including competitive pricing pressures, discounts, a change in our mix of products and services, anticipation of the introduction of new products or services, or promotional programs. Competition continues to increase in the market segments in which we participate, and we expect competition to further increase in the future, thereby leading to increased pricing pressures. Larger competitors with more diverse product and service offerings may reduce the price of products or services that compete with ours or may bundle them with other products and services. Additionally, although we price our products and services worldwide in U.S. dollars, currency fluctuations in certain countries and regions may negatively impact actual prices that partners and end-customers are willing to pay in those

 

-14-


Table of Contents

countries and regions. Furthermore, we anticipate that the sales prices and gross profits for our products will decrease over product life cycles. We cannot assure you that we will be successful in developing and introducing new offerings with enhanced functionality on a timely basis, or that our product and service offerings, if introduced, will enable us to maintain our prices and gross profits at levels that will allow us to achieve and maintain profitability.

We generate a significant amount of revenue from sales to distributors, resellers, and end-customers outside of the United States, and we are therefore subject to a number of risks associated with international sales and operations.

We have a limited history of marketing, selling, and supporting our products and services internationally. As a result, we must hire and train experienced personnel to staff and manage our foreign operations. To the extent that we experience difficulties in recruiting, training, managing, and retaining an international staff, and specifically staff related to sales management and sales personnel, we may experience difficulties in sales productivity in foreign markets. We also enter into strategic distributor and reseller relationships with companies in certain international markets where we do not have a local presence. If we are not able to maintain successful strategic distributor relationships internationally or recruit additional companies to enter into strategic distributor relationships, our future success in these international markets could be limited. Business practices in the international markets that we serve may differ from those in the United States and may require us in the future to include terms other than our standard terms in customer contracts. To the extent that we may enter into customer contracts in the future that include non-standard terms related to payment, warranties, or performance obligations, our operating results may be adversely impacted.

Additionally, our international sales and operations are subject to a number of risks, including the following:

 

    economic uncertainty around the world, in particular, macroeconomic challenges in Europe;

 

    greater difficulty in enforcing contracts and accounts receivable collection and longer collection periods;

 

    the uncertainty of protection for intellectual property rights in some countries;

 

    greater risk of unexpected changes in regulatory practices, tariffs, and tax laws and treaties;

 

    risks associated with trade restrictions and foreign legal requirements, including the importation, certification, and localization of our products required in foreign countries;

 

    greater risk of a failure of foreign employees, partners, distributors, and resellers to comply with both U.S. and foreign laws, including antitrust regulations, the U.S. Foreign Corrupt Practices Act, the U.K. Bribery Act, U.S. or foreign sanctions regimes and export or import control laws, and any trade regulations ensuring fair trade practices;

 

    heightened risk of unfair or corrupt business practices in certain geographies and of improper or fraudulent sales arrangements that may impact financial results and result in restatements of, or irregularities in, financial statements;

 

    increased expenses incurred in establishing and maintaining office space and equipment for our international operations;

 

    greater difficulty in recruiting local experienced personnel, and the costs and expenses associated with such activities;

 

    management communication and integration problems resulting from cultural and geographic dispersion;

 

    fluctuations in exchange rates between the U.S. dollar and foreign currencies in markets where we do business; and

 

    general economic and political conditions in these foreign markets.

 

-15-


Table of Contents

These factors and other factors could harm our ability to gain future international revenues and, consequently, materially impact our business, operating results, and financial condition. The expansion of our existing international operations and entry into additional international markets will require significant management attention and financial resources. Our failure to successfully manage our international operations and the associated risks effectively could limit the future growth of our business.

We are exposed to the credit and liquidity risk of some of our channel partners and to credit exposure in weakened markets, which could result in material losses.

For the nine months ended of April 30, 2014, three channel partners represented 69% of our total revenue, and as of April 30, 2014, three channel partners represented 66% of our gross accounts receivable. Most of our sales to our channel partners are made on an open credit basis. Although we have programs in place that are designed to monitor and mitigate these risks, we cannot assure you these programs will be effective in reducing our credit risks, especially as we expand our business internationally. If we are unable to adequately control these risks, our business, operating results, and financial condition could be harmed.

A portion of our revenue is generated by sales to government entities, which are subject to a number of challenges and risks.

Sales to U.S. and foreign, federal, state, and local governmental agency end-customers have accounted for an increasingly significant amount of our revenue, and we may in the future increase sales to government entities. Sales to government entities are subject to a number of risks. Selling to government entities can be highly competitive, expensive, and time-consuming, often requiring significant upfront time and expense without any assurance that these efforts will generate a sale. Government certification requirements for products like ours may change, thereby restricting our ability to sell into the federal government sector until we have attained the revised certification. Government demand and payment for our products and services may be impacted by public sector budgetary cycles and funding authorizations, with funding reductions or delays adversely affecting public sector demand for our products and services. For example, spending on enterprise security by various agencies of the U.S. government may be reduced as a result of sequestration, which could adversely impact our business and operating results. In addition, the U.S. Congress may take additional action in 2014 to further reduce federal spending and the deficit which could further impact our business and operating results.

The substantial majority of our sales to date to government entities have been made indirectly through our channel partners. Government entities may have statutory, contractual, or other legal rights to terminate contracts with our distributors and resellers for convenience or due to a default, and any such termination may adversely impact our future operating results. Governments routinely investigate and audit government contractors’ administrative processes, and any unfavorable audit could result in the government refusing to continue buying our products and services, a reduction of revenue or fines or civil or criminal liability if the audit uncovers improper or illegal activities, which could adversely impact our operating results in a material way. Finally, for purchases by the U.S. government, the government may require certain products to be manufactured in the United States and other relatively high cost manufacturing locations, and we may not manufacture all products in locations that meet the requirements of the U.S. government, affecting our ability to sell these products to the U.S. government.

If our products do not interoperate with our end-customers’ infrastructure, sales of our products and services could be negatively affected, which would harm our business.

Our products must interoperate with our end-customers’ existing infrastructure, which often have different specifications, utilize multiple protocol standards, deploy products from multiple vendors, and contain multiple generations of products that have been added over time. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. If we find defects in the hardware, we replace the hardware as part of our normal warranty process. If we find errors in the existing software that create problematic network configurations or settings, as we have in the past, we may have to issue software updates as part of our normal

 

-16-


Table of Contents

maintenance process. Any delays in identifying the sources of problems or in providing necessary modifications to our software or hardware could have a negative impact on our reputation and our end-customers’ satisfaction with our products and services, and our ability to sell products and services could be adversely affected. In addition, government and other end-customers may require our products to comply with certain security or other certifications and standards. If our products are late in achieving or fail to achieve compliance with these certifications and standards, or our competitors achieve compliance with these certifications and standards, we may be disqualified from selling our products to such end-customers, or at a competitive disadvantage, which would harm our business, operating results, and financial condition.

Our ability to sell our products is dependent on the quality of our channel partners’ technical support services, and our channel partners’ failure to offer high quality technical support services could have a material adverse effect on our end-customers’ satisfaction with our products and services, our sales, and our operating results.

Once our products are deployed within our end-customers’ networks, our end-customers depend on our technical support services, as well as the support of our channel partners, to resolve any issues relating to our products. Our channel partners often provide similar technical support for third parties’ products, and may therefore have fewer resources to dedicate to the support of our products. If we or our channel partners do not effectively assist our end-customers in deploying our products, succeed in helping our end-customers quickly resolve post-deployment issues, or provide effective ongoing support, our ability to sell additional products and services to existing end-customers would be adversely affected and our reputation with potential end-customers could be damaged. Many larger enterprise, service provider, and government entity end-customers have more complex networks and require higher levels of support than smaller end-customers. If we or our channel partners fail to meet the requirements of these larger end-customers, it may be more difficult to execute on our strategy to increase our coverage with larger end-customers. Additionally, if our channel partners do not effectively provide support to the satisfaction of our end-customers, we may be required to provide direct support to such end-customers, which would require us to hire additional personnel and to invest in additional resources. It can take several months to recruit, hire, and train qualified technical support employees. We may not be able to hire such resources fast enough to keep up with unexpected demand, particularly when the sales of our products exceed our internal forecasts. To the extent that we or our partners are unsuccessful in hiring, training, and retaining adequate support resources, our and our channel partners’ ability to provide adequate and timely support to our end-customers will be negatively impacted, and our end-customers’ satisfaction with our products and services will be adversely affected. Additionally, to the extent that we may need to rely on our sales engineers to provide post-sales support while we are ramping our support resources, our sales productivity will be negatively impacted, which would harm our revenues. Our or our channel partners failure to provide and maintain high quality support services would have a material adverse effect on our business, financial condition, and operating results.

We may acquire other businesses, which could require significant management attention, disrupt our business, dilute stockholder value, and adversely affect our operating results.

As part of our business strategy, we may acquire or make investments in complementary companies, products, or technologies. For example, in December 2013, we acquired Morta Security, Inc. and, in April 2014, we acquired Cyvera, both cybersecurity companies. However, we have not made any other significant acquisitions to date, and as a result, our ability as an organization to acquire and integrate other companies, products, or technologies in a successful manner is unproven. The identification of suitable acquisition candidates is difficult, and we may not be able to complete such acquisitions on favorable terms, if at all. If we do complete future acquisitions, we may not ultimately strengthen our competitive position or achieve our goals and business strategy, we may be subject to claims or liabilities assumed from an acquired company, product, or technology, and any acquisitions we complete could be viewed negatively by our end-customers, investors, and securities analysts. In addition, if we are unsuccessful at integrating past or future acquisitions, or the technologies associated with such acquisitions, into our company, the revenue and operating results of the combined company could be adversely affected. Any integration process may require significant time and resources, which may disrupt our ongoing business and divert management’s attention, and we may not be able

 

-17-


Table of Contents

to manage the integration process successfully. We may not successfully evaluate or utilize the acquired technology or personnel, realize anticipated synergies from the acquisition, or accurately forecast the financial impact of an acquisition transaction and integration of such acquisition, including accounting charges. We may have to pay cash, incur debt, or issue equity or equity-linked securities to pay for any future acquisitions, each of which could adversely affect our financial condition or the market price of our common stock. The sale of equity or issuance of equity-linked debt to finance any future acquisitions could result in dilution to our stockholders. The incurrence of indebtedness would result in increased fixed obligations and could also include covenants or other restrictions that would impede our ability to manage our operations. The occurrence of any of these risks could harm our business, operating results, and financial condition.

False detection of applications, viruses, spyware, vulnerability exploits, data patterns or URL categories could adversely affect our business.

Our classifications of application type, virus, spyware, vulnerability exploits, data, or URL categories may falsely detect applications, content, or threats that do not actually exist. This risk is heightened by the inclusion of a “heuristics” feature in our products, which attempts to identify applications and other threats not based on any known signatures but based on characteristics or anomalies which indicate that a particular item may be a threat. These false positives may impair the perceived reliability of our products and may therefore adversely impact market acceptance of our products. If our products restrict important files or applications based on falsely identifying them as malware or some other item that should be restricted, this could adversely affect end-customers’ systems and cause material system failures. Any such false identification of important files or applications could result in damage to our reputation, negative publicity, loss of channel partners, end-customers and sales, increased costs to remedy any problem, and costly litigation.

Claims by others that we infringe their proprietary technology or other rights could harm our business.

Companies in the enterprise security industry own large numbers of patents, copyrights, trademarks, domain names, and trade secrets and frequently enter into litigation based on allegations of infringement, misappropriation, or other violations of intellectual property or other rights. As we face increasing competition and gain an increasingly high profile, the possibility of intellectual property rights claims against us grows. Third parties have asserted and may in the future assert claims of infringement of intellectual property rights against us. For example, in December 2011, Juniper Networks, Inc. (“Juniper”), one of our competitors, filed a lawsuit against us alleging patent infringement. In September 2013, we filed a lawsuit against Juniper alleging patent infringement. In May 2014, we entered into a Settlement, Release and Cross-License Agreement (the “settlement agreement”) with Juniper to resolve all pending disputes between Juniper and the company, including dismissal of all pending litigation. Refer to the discussion under “Legal Proceedings” included in our Quarterly Report on Form 10-Q for the quarterly period ended April 30, 2014 for more information related to our intellectual property litigation and settlement with Juniper.

Third parties may also assert such claims against our end-customers or channel partners, whom our standard license and other agreements obligate us to indemnify against claims that our products infringe the intellectual property rights of third parties. Furthermore, we may be unaware of the intellectual property rights of others that may cover some or all of our technology or products. As the number of products and competitors in our market increases and overlaps occur, infringement claims may increase. While we intend to increase the size of our patent portfolio, our competitors and others may now and in the future have significantly larger and more mature patent portfolios than we have. In addition, future litigation may involve patent holding companies or other adverse patent owners who have no relevant product revenue and against whom our own patents may therefore provide little or no deterrence or protection. In addition, we have not registered our trademarks in all of our geographic markets and failure to secure those registrations could adversely affect our ability to enforce and defend our trademark rights. Any claim of infringement by a third party, even those without merit, could cause us to incur substantial costs defending against the claim, could distract our management from our business, and could require us to cease use of such intellectual property. Furthermore, because of the substantial amount of

 

-18-


Table of Contents

discovery required in connection with intellectual property litigation, there is a risk that some of our confidential information could be compromised by disclosure during this type of litigation.

Although third parties may offer a license to their technology or other intellectual property, the terms of any offered license may not be acceptable and the failure to obtain a license or the costs associated with any license could cause our business, financial condition, and operating results to be materially and adversely affected. In addition, some licenses may be non-exclusive, and therefore our competitors may have access to the same technology licensed to us. If a third party does not offer us a license to its technology or other intellectual property on reasonable terms, or at all, we could be enjoined from continued use of such intellectual property. As a result, we may be required to develop alternative, non-infringing technology, which could require significant time (during which we would be unable to continue to offer our affected products or services), effort, and expense and may ultimately not be successful. Furthermore, a successful claimant could secure a judgment or we may agree to a settlement that prevents us from distributing certain products or performing certain services or that requires us to pay substantial damages, royalties, or other fees. Any of these events could seriously harm our business, financial condition, and operating results.

In addition, although we have settled our litigation with Juniper, there is no guarantee that future claims of infringement may not arise between us and Juniper or other third parties. Under the settlement agreement with Juniper, the parties agreed to a mutual dismissal of all pending litigation, a cross-license of the patents in suit for the life of the patents, and an eight-year mutual covenant not to sue for infringement of any other patents. We also agreed to pay Juniper a one-time settlement amount of approximately $175.0 million, consisting of $75.0 million in cash, 1,080,747 shares of our common stock with an approximate value of $70.0 million, and a warrant to purchase 463,177 shares of our common stock with an approximate value of $30.0 million. After the eight-year covenant not to sue period, Juniper could file additional lawsuits against us, asserting patent infringement for other patents that are not subject to the cross-license.

Our proprietary rights may be difficult to enforce or protect, which could enable others to copy or use aspects of our products without compensating us.

We rely and expect to continue to rely on a combination of confidentiality and license agreements with our employees, consultants, and third parties with whom we have relationships, as well as trademark, copyright, patent, and trade secret protection laws, to protect our proprietary rights. We have filed various applications for certain aspects of our intellectual property. Valid patents may not issue from our pending applications, and the claims eventually allowed on any patents may not be sufficiently broad to protect our technology or products. Any issued patents may be challenged, invalidated or circumvented, and any rights granted under these patents may not actually provide adequate defensive protection or competitive advantages to us. Patent applications in the United States are typically not published until 18 months after filing, or, in some cases, not at all, and publications of discoveries in industry-related literature lag behind actual discoveries. We cannot be certain that we were the first to make the inventions claimed in our pending patent applications or that we were the first to file for patent protection, which could prevent our patent applications from issuing as patents or invalidate our patents following issuance. Additionally, the process of obtaining patent protection is expensive and time-consuming, and we may not be able to prosecute all necessary or desirable patent applications at a reasonable cost or in a timely manner. Additional uncertainty may result from changes to patent-related laws enacted in the United States and other jurisdictions, including the recent America Invents Act and changes that may bring into question the validity of certain categories of software patents, and from interpretations of the intellectual property laws of the United States and other countries by applicable courts and agencies. As a result, we may not be able to obtain adequate patent protection or effectively enforce any issued patents.

Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality or license agreements with our employees, consultants, vendors, and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that we have entered into such agreements with all parties who may have or have had access to our confidential information or that the

 

-19-


Table of Contents

agreements we have entered into will not be breached. We cannot guarantee that any of the measures we have taken will prevent misappropriation of our technology. Because we may be an attractive target for computer hackers, we may have a greater risk of unauthorized access to, and misappropriation of, our proprietary information. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States. From time to time, we may need to take legal action to enforce our patents and other intellectual property rights, to protect our trade secrets, to determine the validity and scope of the proprietary rights of others or to defend against claims of infringement or invalidity. Such litigation could result in substantial costs and diversion of resources and could negatively affect our business, operating results, and financial condition. Attempts to enforce our rights against third parties could also provoke these third parties to assert their own intellectual property or other rights against us, or result in a holding that invalidates or narrows the scope of our rights, in whole or in part. If we are unable to protect our proprietary rights (including aspects of our software and products protected other than by patent rights), we may find ourselves at a competitive disadvantage to others who need not incur the additional expense, time, and effort required to create the innovative products that have enabled us to be successful to date. Any of these events would have a material adverse effect on our business, financial condition, and operating results.

Our use of open source software in our products could negatively affect our ability to sell our products and subject us to possible litigation.

Our products contain software modules licensed to us by third-party authors under “open source” licenses. Some open source licenses contain requirements that we make available source code for modifications or derivative works we create based upon the type of open source software we use. If we combine our proprietary software with open source software in a certain manner, we could, under certain open source licenses, be required to release the source code of our proprietary software to the public. This would allow our competitors to create similar products with lower development effort and time and ultimately could result in a loss of product sales for us.

Although we monitor our use of open source software to avoid subjecting our products to conditions we do not intend, the terms of many open source licenses have not been interpreted by United States courts, and there is a risk that these licenses could be construed in a way that could impose unanticipated conditions or restrictions on our ability to commercialize our products. From time to time, there have been claims against companies that distribute or use open source software in their products and services, asserting that open source software infringes the claimants’ intellectual property rights. We could be subject to suits by parties claiming infringement of intellectual property rights in what we believe to be licensed open source software. Moreover, we cannot assure you that our processes for controlling our use of open source software in our products will be effective. If we are held to have breached the terms of an open source software license, we could be required to seek licenses from third parties to continue offering our products on terms that are not economically feasible, to re-engineer our products, to discontinue the sale of our products if re-engineering could not be accomplished on a timely basis, or to make generally available, in source code form, our proprietary code, any of which could adversely affect our business, operating results, and financial condition.

In addition to risks related to license requirements, usage of open source software can lead to greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or assurance of title or controls on origin of the software. In addition, many of the risks associated with usage of open source software, such as the lack of warranties or assurances of title, cannot be eliminated, and could, if not properly addressed, negatively affect our business. We have established processes to help alleviate these risks, including a review process for screening requests from our development organizations for the use of open source software, but we cannot be sure that all open source software is submitted for approval prior to use in our products.

Our failure to adequately protect personal information could have a material adverse effect on our business.

A wide variety of provincial, state, national, and international laws and regulations apply to the collection, use, retention, protection, disclosure, transfer, and other processing of personal data. These data protection and

 

-20-


Table of Contents

privacy-related laws and regulations are evolving and being tested in courts and may result in ever-increasing regulatory and public scrutiny and escalating levels of enforcement and sanctions. Our failure to comply with applicable laws and regulations, or to protect such data, could result in enforcement action against us, including fines, imprisonment of company officials and public censure, claims for damages by end-customers and other affected individuals, damage to our reputation and loss of goodwill (both in relation to existing end-customers and prospective end-customers), any of which could have a material adverse effect on our operations, financial performance, and business. Evolving and changing definitions of personal data and personal information, within the European Union, the United States, and elsewhere, especially relating to classification of IP addresses, machine identification, location data, and other information, may limit or inhibit our ability to operate or expand our business, including limiting strategic partnerships that may involve the sharing of data. Even the perception of privacy concerns, whether or not valid, may harm our reputation and inhibit adoption of our products by current and future end-customers.

A network or data security incident may allow unauthorized access to our network or data, harm our reputation, create additional liability and adversely impact our financial results.

Increasingly, companies are subject to a wide variety of attacks on their networks on an ongoing basis. In addition to traditional computer “hackers,” malicious code (such as viruses and worms), employee theft or misuse, and denial of service attacks, sophisticated nation-state and nation-state supported actors now engage in intrusions and attacks (including advanced persistent threat intrusions), and add to the risks to our internal networks and the information they store and process. Despite significant efforts to create security barriers to such threats, it is virtually impossible for us to entirely mitigate these risks. Any such breach could compromise our networks, creating system disruptions or slowdowns and exploiting security vulnerabilities of our products, and the information stored on our networks could be accessed, publicly disclosed, lost or stolen, which could subject us to liability and cause us financial harm. These breaches may also result in damage to our reputation, negative publicity, loss of channel partners, end-customers and sales, increased costs to remedy any problem, and costly litigation and may therefore adversely impact market acceptance of our products.

We license technology from third parties, and our inability to maintain those licenses could harm our business.

We incorporate technology that we license from third parties, including software, into our products and services. We cannot be certain that our licensors are not infringing the intellectual property rights of third parties or that our licensors have sufficient rights to the licensed intellectual property in all jurisdictions in which we may sell our products. Some of our agreements with our licensors may be terminated for convenience by them. If we are unable to continue to license any of this technology because of intellectual property infringement claims brought by third parties against our licensors or against us, or if we are unable to continue our license agreements or enter into new licenses on commercially reasonable terms, our ability to develop and sell products and services containing that technology would be severely limited, and our business could be harmed. Additionally, if we are unable to license necessary technology from third parties, we may be forced to acquire or develop alternative technology, which we may be unable to do in a commercially feasible manner or at all, and that may require us to use alternative technology of lower quality or performance standards. This would limit and delay our ability to offer new or competitive products and services and increase our costs of production. As a result, our margins, market share, and operating results could be significantly harmed.

Misuse of our products could harm our reputation and divert resources.

Our products may be misused by end-customers or third parties that obtain access to our products. For example, our products could be used to censor private access to certain information on the Internet. Such use of our products for censorship could result in negative press coverage and negatively affect our reputation.

 

-21-


Table of Contents

We are subject to governmental export and import controls that could subject us to liability or impair our ability to compete in international markets.

Because we incorporate encryption technology into our products, certain of our products are subject to U.S. export controls and may be exported outside the U.S. only with the required export license or through an export license exception. If we were to fail to comply with U.S. export licensing requirements, U.S. customs regulations, U.S. economic sanctions, or other laws, we could be subject to substantial civil and criminal penalties, including fines, incarceration for responsible employees and managers, and the possible loss of export or import privileges. Obtaining the necessary export license for a particular sale may be time-consuming and may result in the delay or loss of sales opportunities. Furthermore, U.S. export control laws and economic sanctions prohibit the shipment of certain products to U.S. embargoed or sanctioned countries, governments, and persons. Even though we take precautions to ensure that our channel partners comply with all relevant regulations, any failure by our channel partners to comply with such regulations could have negative consequences for us, including reputational harm, government investigations, and penalties.

In addition, various countries regulate the import of certain encryption technology, including through import permit and license requirements, and have enacted laws that could limit our ability to distribute our products or could limit our end-customers’ ability to implement our products in those countries. Changes in our products or changes in export and import regulations may create delays in the introduction of our products into international markets, prevent our end-customers with international operations from deploying our products globally or, in some cases, prevent or delay the export or import of our products to certain countries, governments, or persons altogether. Any change in export or import regulations, economic sanctions or related legislation, shift in the enforcement or scope of existing regulations, or change in the countries, governments, persons, or technologies targeted by such regulations, could result in decreased use of our products by, or in our decreased ability to export or sell our products to, existing or potential end-customers with international operations. Any decreased use of our products or limitation on our ability to export or sell our products would likely adversely affect our business, financial condition, and operating results.

Our corporate culture has contributed to our success, and if we cannot maintain this culture as we grow, we could lose the innovation, creativity, and teamwork fostered by our culture, and our business may be harmed.

We believe that a critical contributor to our success has been our corporate culture, which we believe fosters innovation, teamwork, passion for customers, and focus on execution, as well as facilitating critical knowledge transfer and knowledge sharing. As we grow and change, we may find it difficult to maintain these important aspects of our corporate culture, which could limit our ability to innovate and operate effectively. Any failure to preserve our culture could also negatively affect our ability to retain and recruit personnel, continue to perform at current levels or execute on our business strategy.

Our financial condition and results of operations could suffer if there is an impairment of goodwill or intangible assets.

As of April 30, 2014, our goodwill and intangible assets were $204.7 million, and we have not recorded any goodwill or intangible assets impairments to date. We evaluate our goodwill for impairment on an annual basis in the fourth quarter of our fiscal year, and whenever events or changes in circumstances indicate the carrying amount of goodwill may not be recoverable. Any excess of the goodwill carrying amount over its implied fair value is recognized as an impairment loss. This would result in incremental expense in the period in which the impairment was determined to have occurred. We cannot accurately predict the amount and timing of an impairment loss and any such impairment would have an adverse effect on our results of operations.

 

-22-


Table of Contents

Our failure to raise additional capital or generate the significant capital necessary to expand our operations and invest in new products could reduce our ability to compete and could harm our business.

We intend to continue to make investments to support our business growth and may require additional funds to respond to business challenges, including the need to develop new features to enhance our platform, improve our operating infrastructure, or acquire complementary businesses and technologies. Accordingly, we may need to engage in equity or debt financings to secure additional funds. If we raise additional equity or equity-linked financing, our stockholders may experience significant dilution of their ownership interests and the market price of our common stock could decline. Furthermore, if we engage in debt financing, the holders of our debt would have priority over the holders of our common stock, and we may be required to accept terms that restrict our ability to incur additional indebtedness. We may also be required to take other actions that would otherwise be in the interests of the debt holders and force us to maintain specified liquidity or other ratios, any of which could harm our business, operating results, and financial condition. We may not be able to obtain additional financing on terms favorable to us, if at all. If we are unable to obtain adequate financing or financing on terms satisfactory to us when we require it, our ability to continue to support our business growth and to respond to business challenges could be significantly impaired, and our business may be adversely affected.

We may not be able to successfully manage the growth of our business if we are unable to improve our internal systems, processes, and controls.

We need to continue to improve our internal systems, processes, and controls to effectively manage our operations and growth. We may not be able to successfully implement improvements to these systems, processes, and controls in an efficient or timely manner. We may not be able to successfully scale improvements to our enterprise resource planning system or implement and scale other systems and processes in a timely or efficient manner or in a manner that does not negatively affect our operating results. In addition, our systems and processes may not prevent or detect all errors, omissions, or fraud. We have licensed technology from third parties to help us improve our internal systems, processes, and controls. The support services available for such third-party technology may be negatively affected by mergers and consolidation in the software industry, and support services for such technology may not be available to us in the future. We may experience difficulties in managing improvements to our systems, processes, and controls or in connection with third-party software, which could impair our ability to provide products or services to our customers in a timely manner, causing us to lose customers, limit us to smaller deployments of our products, or increase our technical support costs.

We recently implemented a corporate structure more closely aligned with the international nature of our business activities, and if we do not achieve increased tax benefits as a result of our corporate structure, our financial condition and results of operations could be adversely affected.

We recently reorganized our corporate structure and intercompany relationships to more closely align with the international nature of our business activities. This corporate structure may allow us to reduce our overall effective tax rate through changes in how we use our intellectual property, international procurement, and sales operations. This corporate structure may also allow us to obtain financial and operational efficiencies. These efforts will require us to incur expenses in the near term for which we may not realize related benefits. If the structure is not accepted by the applicable taxing authorities, changes in domestic and international tax laws negatively impact the structure, including proposed legislation to reform U.S. taxation of international business activities, or we do not operate our business consistent with the structure and applicable tax provisions, we may fail to achieve the reduction in our overall effective tax rate and the other financial and operational efficiencies that we anticipate as a result of the structure and our future financial condition and results of operations may be negatively impacted.

 

-23-


Table of Contents

If our estimates or judgments relating to our critical accounting policies are based on assumptions that change or prove to be incorrect, our operating results could fall below expectations of securities analysts and investors, resulting in a decline in the market price of our common stock.

The preparation of financial statements in conformity with GAAP requires management to make estimates and assumptions that affect the amounts reported in the condensed consolidated financial statements and accompanying notes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances, as provided in the section entitled “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” the results of which form the basis for making judgments about the carrying values of assets, liabilities, equity, revenue, and expenses that are not readily apparent from other sources. Our operating results may be adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions, which could cause our operating results to fall below the expectations of securities analysts and investors, resulting in a decline in the market price of our common stock. Significant assumptions and estimates used in preparing our condensed consolidated financial statements include those related to revenue recognition, share-based compensation, contract manufacturing liabilities, warranties, loss contingencies, income taxes, and, with respect to business combinations, determining purchase price allocation and estimating the fair value of assets acquired and liabilities assumed.

Failure to comply with governmental laws and regulations could harm our business.

Our business is subject to regulation by various federal, state, local, and foreign governmental agencies, including agencies responsible for monitoring and enforcing employment and labor laws, workplace safety, product safety, environmental laws, consumer protection laws, anti-bribery laws, import/export controls, federal securities laws, and tax laws and regulations. In certain jurisdictions, these regulatory requirements may be more stringent than those in the United States. Noncompliance with applicable regulations or requirements could subject us to investigations, sanctions, mandatory product recalls, enforcement actions, disgorgement of profits, fines, damages, civil and criminal penalties, or injunctions. If any governmental sanctions are imposed, or if we do not prevail in any possible civil or criminal litigation resulting from any alleged noncompliance, our business, operating results, and financial condition could be materially adversely affected. In addition, responding to any action will likely result in a significant diversion of management’s attention and resources and an increase in professional fees. Enforcement actions, litigation, and sanctions could harm our business, operating results, and financial condition.

If we fail to comply with environmental requirements, our business, financial condition, operating results, and reputation could be adversely affected.

We are subject to various environmental laws and regulations including laws governing the hazardous material content of our products and laws relating to the collection of and recycling of electrical and electronic equipment. Examples of these laws and regulations include the European Union, or EU, Restriction on the Use of Certain Hazardous Substances in Electrical and Electronic Equipment Directive, or RoHS, and the EU Waste Electrical and Electronic Equipment Directive, or WEEE, as well as the implementing legislation of the EU member states. Similar laws and regulations have been passed or are pending in China, South Korea, Norway, and Japan and may be enacted in other regions, including in the United States, and we are, or may in the future be, subject to these laws and regulations.

The EU RoHS and the similar laws of other jurisdictions limit the content of certain hazardous materials such as lead, mercury, and cadmium in the manufacture of electrical equipment, including our products. Currently, our products comply with the EU RoHS requirements. However, if there are changes to this or other laws (or their interpretation) or if new similar laws are passed in other jurisdictions, we may be required to reengineer our products to use components compatible with these regulations. This reengineering and component substitution could result in additional costs to us or disrupt our operations or logistics.

The WEEE Directive requires electronic goods producers to be responsible for the collection, recycling, and treatment of such products. Changes in interpretation of the directive may cause us to incur costs or have

 

-24-


Table of Contents

additional regulatory requirements to meet in the future in order to comply with this directive, or with any similar laws adopted in other jurisdictions.

We are also subject to environmental laws and regulations governing the management of hazardous materials, which we use in small quantities in our engineering labs. Our failure to comply with past, present, and future similar laws could result in reduced sales of our products, substantial product inventory write-offs, reputational damage, penalties, and other sanctions, any of which could harm our business and financial condition. We also expect that our products will be affected by new environmental laws and regulations on an ongoing basis. To date, our expenditures for environmental compliance have not had a material impact on our results of operations or cash flows, and although we cannot predict the future impact of such laws or regulations, they will likely result in additional costs and may increase penalties associated with violations or require us to change the content of our products or how they are manufactured, which could have a material adverse effect on our business, operating results, and financial condition.

We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and operating results.

Our sales contracts are primarily denominated in U.S. dollars, and therefore, substantially all of our revenue is not subject to foreign currency risk. However, a strengthening of the U.S. dollar could increase the real cost of our products to our end-customers outside of the United States, which could adversely affect our financial condition and operating results. In addition, an increasing portion of our operating expenses is incurred outside the United States, is denominated in foreign currencies, and is subject to fluctuations due to changes in foreign currency exchange rates. If we are not able to successfully hedge against the risks associated with currency fluctuations, our financial condition and operating results could be adversely affected. To date, we have not entered into any hedging transactions in an effort to reduce our exposure to foreign currency exchange risk. While we may decide to enter into hedging transactions in the future, the availability and effectiveness of these hedging transactions may be limited and we may not be able to successfully hedge our exposure, which could adversely affect our financial condition and operating results.

Our business is subject to the risks of earthquakes, fire, power outages, floods, and other catastrophic events, and to interruption by man-made problems such as terrorism.

A significant natural disaster, such as an earthquake, fire, flood, or significant power outage could have a material adverse impact on our business, operating results, and financial condition. Both our corporate headquarters and the location where our products are manufactured are located in the San Francisco Bay Area, a region known for seismic activity. In addition, natural disasters could affect our supply chain, manufacturing vendors, or logistics providers’ ability to provide materials and perform services such as manufacturing products or assisting with shipments on a timely basis. In the event our or our service providers’ information technology systems or manufacturing or logistics abilities are hindered by any of the events discussed above, shipments could be delayed, resulting in missed financial targets, such as revenue and shipment targets, for a particular quarter. In addition, acts of terrorism and other geo-political unrest could cause disruptions in our business or the business of our supply chain, manufacturers, logistics providers, partners, or end-customers or the economy as a whole. Any disruption in the business of our supply chain, manufacturers, logistics providers, partners, or end-customers that impacts sales at the end of a fiscal quarter could have a significant adverse impact on our future quarterly results. All of the aforementioned risks may be further increased if the disaster recovery plans for us and our suppliers prove to be inadequate. To the extent that any of the above should result in delays or cancellations of customer orders, or the delay in the manufacture, deployment, or shipment of our products, our business, financial condition, and operating results would be adversely affected.

 

-25-


Table of Contents

Risks Related to Ownership of Our Common Stock

Our actual operating results may differ significantly from our guidance.

From time to time, we have released, and may continue to release, guidance in our quarterly earnings releases, quarterly earnings conference call, or otherwise, regarding our future performance that represents our management’s estimates as of the date of release. This guidance, which includes forward-looking statements, has been and will be based on projections prepared by our management. These projections are not prepared with a view toward compliance with published guidelines of the American Institute of Certified Public Accountants, and neither our registered public accountants nor any other independent expert or outside party compiles or examines the projections. Accordingly, no such person expresses any opinion or any other form of assurance with respect to the projections.

Projections are based upon a number of assumptions and estimates that, while presented with numerical specificity, are inherently subject to significant business, economic and competitive uncertainties and contingencies, many of which are beyond our control and are based upon specific assumptions with respect to future business decisions, some of which will change. We intend to state possible outcomes as high and low ranges which are intended to provide a sensitivity analysis as variables are changed but are not intended to imply that actual results could not fall outside of the suggested ranges. The principal reason that we release guidance is to provide a basis for our management to discuss our business outlook with analysts and investors. We do not accept any responsibility for any projections or reports published by any such persons.

Guidance is necessarily speculative in nature, and it can be expected that some or all of the assumptions underlying the guidance furnished by us will not materialize or will vary significantly from actual results. Accordingly, our guidance is only an estimate of what management believes is realizable as of the date of release. Actual results will vary from our guidance and the variations may be material. In light of the foregoing, investors are urged not to rely upon our guidance in making an investment decision regarding our common stock.

Any failure to successfully implement our operating strategy or the occurrence of any of the events or circumstances set forth in this “Risk Factors” section in this prospectus could result in the actual operating results being different from our guidance, and the differences may be adverse and material.

The market price of our common stock may be volatile and the value of your investment could decline.

The market price of our common stock has been volatile since our initial public offering (IPO). Since shares of our common stock were sold in our IPO in July 2012 at a price of $42.00 per share, the reported high and low sales prices of our common stock has ranged from $80.84 to $39.08, through May 12, 2014. The market price of our common stock may fluctuate widely in response to various factors, some of which are beyond our control. These factors include:

 

    announcements of new products, services or technologies, commercial relationships, acquisitions or other events by us or our competitors;

 

    price and volume fluctuations in the overall stock market from time to time;

 

    significant volatility in the market price and trading volume of technology companies in general and of companies in our industry;

 

    fluctuations in the trading volume of our shares or the size of our public float;

 

    actual or anticipated changes in our operating results or fluctuations in our operating results;

 

    whether our operating results meet the expectations of securities analysts or investors;

 

    actual or anticipated changes in the expectations of securities analysts or investors;

 

    litigation involving us, our industry, or both;

 

-26-


Table of Contents
    regulatory developments in the United States, foreign countries or both;

 

    major catastrophic events;

 

    sales of large blocks of our stock;

 

    departures of key personnel; or

 

    economic uncertainty around the world, in particular, macroeconomic challenges in Europe.

In addition, if the market for technology stocks or the stock market in general experiences loss of investor confidence, the market price of our common stock could decline for reasons unrelated to our business, operating results, or financial condition. The market price of our common stock might also decline in reaction to events that affect other companies in our industry even if these events do not directly affect us. In the past, following periods of volatility in the market price of a company’s securities, securities class action litigation has often been brought against that company. Securities litigation could result in substantial costs and divert our management’s attention and resources from our business. This could have a material adverse effect on our business, operating results and financial condition.

Substantial future sales of shares of our common stock could cause the market price of our common stock to decline.

The market price of our common stock could decline as a result of substantial sales of our common stock, particularly sales by our directors, executive officers, employees and significant stockholders, a large number of shares of our common stock becoming available for sale, or the perception in the market that holders of a large number of shares intend to sell their shares. As of April 30, 2014, we had outstanding approximately 77,055,000 shares of our common stock.

We have also registered shares of our common stock that we may issue under our employee equity incentive plans. These shares will be able to be sold freely in the public market upon issuance.

In addition, additional shares may be sold through registration statements on Form S-3 that we have agreed to file. As a result of our settlement with Juniper, Juniper will beneficially own approximately 1,544,000 shares of our common stock (including the shares of common stock underlying the warrant to be issued to Juniper). In accordance with the settlement agreement, we have agreed to file a registration statement on Form S-3 to register the resale of the shares held by Juniper no later than the later of (i) June 10, 2014 or (ii) three (3) business days following the date upon which a judgment or stipulation for entry of judgment has been issued by the courts in each pending court proceeding with Juniper (but in any event, no sooner than the date on which the warrant is issued). We have also filed a registration statement on Form S-3 to register the resale of the approximately 1,557,000 shares of common stock issued to certain former shareholders of Cyvera, in connection with our acquisition of Cyvera. Once these registration statements are effective, the shares held by Juniper and the former shareholders of Cyvera may be sold freely in the public market, with Juniper subject to our insider trading policy and other terms described in the settlement agreement. If these additional shares are sold, or if it is perceived that they will be sold, in the public market, the trading price of our common stock could decline.

The issuance of additional stock in connection with financings, acquisitions, investments, our stock incentive plans or otherwise will dilute all other stockholders.

Our amended and restated certificate of incorporation authorizes us to issue up to 1,000,000,000 shares of common stock and up to 100,000,000 shares of preferred stock with such rights and preferences as may be determined by our board of directors. Subject to compliance with applicable rules and regulations, we may issue shares of common stock or securities convertible into shares of our common stock from time to time in connection with a financing, acquisition, investment, our stock incentive plans or otherwise. Any such issuance could result in substantial dilution to our existing stockholders and cause the market price of our common stock to decline.

 

-27-


Table of Contents

We do not intend to pay dividends for the foreseeable future.

We have never declared or paid any dividends on our common stock. We intend to retain any earnings to finance the operation and expansion of our business, and we do not anticipate paying any cash dividends in the future. As a result, you may only receive a return on your investment in our common stock if the market price of our common stock increases.

The requirements of being a public company may strain our resources, divert management’s attention, and affect our ability to attract and retain qualified board members.

As a public company, we are subject to the reporting requirements of the Securities Exchange Act of 1934, as amended, or the Exchange Act, the listing requirements of the New York Stock Exchange, and other applicable securities rules and regulations. Compliance with these rules and regulations will increase our legal and financial compliance costs, make some activities more difficult, time-consuming or costly, and increase demand on our systems and resources. Among other things, the Exchange Act requires that we file annual, quarterly, and current reports with respect to our business and operating results and maintain effective disclosure controls and procedures and internal control over financial reporting. In order to maintain and, if required, improve our disclosure controls and procedures and internal control over financial reporting to meet this standard, significant resources and management oversight may be required. As a result, management’s attention may be diverted from other business concerns, which could harm our business and operating results. Although we have already hired additional employees to comply with these requirements, we may need to hire even more employees in the future, which will increase our costs and expenses.

Because we are no longer an “emerging growth company” as defined in the JOBS Act, we are subject to the independent auditor attestation requirements of Section 404 of the Sarbanes-Oxley Act, enhanced disclosure obligations regarding executive compensation in our periodic reports and proxy statements, and the requirements of holding a nonbinding advisory vote on executive compensation and stockholder approval of any golden parachute payments not previously approved. While we were able to determine in our management’s report for fiscal 2013 that our internal control over financial reporting is effective, as well as provide an unqualified attestation report from our independent registered public accounting firm to that effect, we have and will continue to consume management resources and incur significant expenses for Section 404 compliance on an ongoing basis. In the event that our chief executive officer, chief financial officer, or independent registered public accounting firm determines in the future that our internal control over financial reporting is not effective as defined under Section 404, we could be subject to one or more investigations or enforcement actions by state or federal regulatory agencies, stockholder lawsuits or other adverse actions requiring us to incur defense costs, pay fines, settlements or judgments and causing investor perceptions to be adversely affected and potentially resulting in a decline in the market price of our stock.

In addition, changing laws, regulations, and standards relating to corporate governance and public disclosure, such as continued rulemaking pursuant to the Dodd-Frank Act of 2010 and related rules and regulations regarding the disclosure of conflict minerals that are mandated by the Dodd-Frank Act, are creating uncertainty for public companies, increasing legal and financial compliance costs, and making some activities more time-consuming. These laws, regulations, and standards are subject to varying interpretations, in many cases due to their lack of specificity, and, as a result, their application in practice may evolve over time as new guidance is provided by regulatory and governing bodies. This could result in continuing uncertainty regarding compliance matters and higher costs necessitated by ongoing revisions to disclosure and governance practices. We intend to invest resources to comply with evolving laws, regulations, and standards, and this investment may result in increased general and administrative expense and a diversion of management’s time and attention from revenue-generating activities to compliance activities. If our efforts to comply with new laws, regulations, and standards differ from the activities intended by regulatory or governing bodies, regulatory authorities may initiate legal proceedings against us and our business may be harmed.

We also expect that being a public company and these new rules and regulations will make it more expensive for us to obtain and maintain director and officer liability insurance, and in the future, we may be

 

-28-


Table of Contents

required to accept reduced coverage or incur substantially higher costs to obtain coverage. These factors could also make it more difficult for us to attract and retain qualified members of our board of directors, particularly to serve on our Audit Committee and Compensation Committee, and qualified executive officers.

We are obligated to maintain proper and effective internal control over financial reporting. We may not complete our analysis of our internal control over financial reporting in a timely manner, or this internal control may not be determined to be effective, which may adversely affect investor confidence in our company and, as a result, the value of our common stock.

We are required, pursuant to the Exchange Act, to furnish a report by management on, among other things, the effectiveness of our internal control over financial reporting. This assessment will need to include disclosure of any material weaknesses identified by our management in our internal control over financial reporting, as well as a statement that our auditors have issued an attestation report on our internal controls.

While we were able to determine in our management’s report for fiscal 2013 that our internal control over financial reporting is effective, as well as provide an unqualified attestation report from our independent registered public accounting firm to that effect, we may not be able to complete our evaluation, testing, and any required remediation in a timely fashion or our independent registered public accounting firm may not be able to formally attest to the effectiveness of our internal control over financial reporting in the future. During the evaluation and testing process, if we identify one or more material weaknesses in our internal control over financial reporting that we are unable to remediate before the end of the same fiscal year in which the material weakness is identified, we will be unable to assert that our internal controls are effective. If we are unable to assert that our internal control over financial reporting is effective, or if our auditors are unable to attest to the effectiveness of our internal controls or determine we have a material weakness in our internal controls, we could lose investor confidence in the accuracy and completeness of our financial reports, which would cause the price of our common stock to decline.

If securities or industry analysts do not publish research or reports about our business, or publish inaccurate or unfavorable research reports about our business, our share price and trading volume could decline.

The trading market for our common stock, to some extent, depends on the research and reports that securities or industry analysts publish about us or our business. We do not have any control over these analysts. If one or more of the analysts who cover us should downgrade our shares or change their opinion of our shares, industry sector, or products, our share price would likely decline. If one or more of these analysts should cease coverage of our company or fail to regularly publish reports on us, we could lose visibility in the financial markets, which could cause our share price or trading volume to decline.

Our charter documents and Delaware law could discourage takeover attempts and lead to management entrenchment.

Our amended and restated certificate of incorporation and amended and restated bylaws contain provisions that could delay or prevent a change in control of our company. These provisions could also make it difficult for stockholders to elect directors that are not nominated by the current members of our board of directors or take other corporate actions, including effecting changes in our management. These provisions include:

 

    a classified board of directors with three-year staggered terms, which could delay the ability of stockholders to change the membership of a majority of our board of directors;

 

    the ability of our board of directors to issue shares of preferred stock and to determine the price and other terms of those shares, including preferences and voting rights, without stockholder approval, which could be used to significantly dilute the ownership of a hostile acquiror;

 

    the exclusive right of our board of directors to elect a director to fill a vacancy created by the expansion of our board of directors or the resignation, death or removal of a director, which prevents stockholders from being able to fill vacancies on our board of directors;

 

-29-


Table of Contents
    a prohibition on stockholder action by written consent, which forces stockholder action to be taken at an annual or special meeting of our stockholders;

 

    the requirement that a special meeting of stockholders may be called only by the chairman of our board of directors, our president, our secretary, or a majority vote of our board of directors, which could delay the ability of our stockholders to force consideration of a proposal or to take action, including the removal of directors;

 

    the requirement for the affirmative vote of holders of at least 66 2/3% of the voting power of all of the then outstanding shares of the voting stock, voting together as a single class, to amend the provisions of our amended and restated certificate of incorporation relating to the issuance of preferred stock and management of our business or our amended and restated bylaws, which may inhibit the ability of an acquiror to effect such amendments to facilitate an unsolicited takeover attempt;

 

    the ability of our board of directors, by majority vote, to amend the bylaws, which may allow our board of directors to take additional actions to prevent an unsolicited takeover and inhibit the ability of an acquiror to amend the bylaws to facilitate an unsolicited takeover attempt; and

 

    advance notice procedures with which stockholders must comply to nominate candidates to our board of directors or to propose matters to be acted upon at a stockholders’ meeting, which may discourage or deter a potential acquiror from conducting a solicitation of proxies to elect the acquiror’s own slate of directors or otherwise attempting to obtain control of us.

In addition, as a Delaware corporation, we are subject to Section 203 of the Delaware General Corporation Law. These provisions may prohibit large stockholders, in particular those owning 15% or more of our outstanding voting stock, from merging or combining with us for a certain period of time.

 

-30-


Table of Contents

SPECIAL NOTE REGARDING FORWARD-LOOKING STATEMENTS

This prospectus, including the sections entitled “Prospectus Summary” and “Risk Factors,” contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. The words “believe,” “may,” “will,” “potentially,” “estimate,” “continue,” “anticipate,” “intend,” “could,” “would,” “project,” “plan” “expect,” and similar expressions that convey uncertainty of future events or outcomes are intended to identify forward-looking statements.

These forward-looking statements include, but are not limited to, statements concerning the following:

 

    our ability to maintain an adequate rate of revenue growth;

 

    our business plan and our ability to effectively manage our growth;

 

    trends in revenue, costs of revenue, and gross margin;

 

    trends in our operating expenses, including personnel costs, research and development expense, sales and marketing expense, and general and administrative expense;

 

    our ability to extend our leadership position in next-generation network security;

 

    our ability to timely and effectively scale and adapt our existing technology;

 

    our ability to expand internationally;

 

    the effects of increased competition in our market and our ability to offer differentiated products and compete effectively;

 

    our ability to introduce new subscriptions, renew existing contracts, and increase sales to our existing customer base;

 

    costs associated with defending intellectual property infringement and other claims;

 

    the effects of seasonal trends and macroeconomic conditions on our results of operations;

 

    the adequacy of our current facilities;

 

    the sufficiency of our cash flow from operations with existing cash and cash equivalents to meet our cash needs for at least the next 12 months; and

 

    future acquisitions of, or investments in, complementary companies, products, services, or technologies.

These forward-looking statements are subject to risks, uncertainties and assumptions that are difficult to predict, including those described in “Risk Factors.” Moreover, we operate in a very competitive and rapidly changing environment, and new risks emerge from time to time. It is not possible for our management to predict all risks, nor can we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties, and assumptions, the forward-looking events and circumstances discussed in this prospectus, any prospectus supplement and the information incorporated by reference in this prospectus may not occur, and actual results could differ materially and adversely from those anticipated or implied in the forward-looking statements. We undertake no obligation to revise or publicly release the results of any revision to these forward-looking statements, except as required by law. Given these risks and uncertainties, readers are cautioned not to place undue reliance on such forward-looking statements.

 

-31-


Table of Contents

USE OF PROCEEDS

We will not receive any proceeds from the sale of the common stock by the selling stockholders.

 

-32-


Table of Contents

SELLING STOCKHOLDERS

Up to 1,556,925 shares of common stock are being offered by this prospectus, all of which are being offered for resale for the account of the selling stockholders. Unless otherwise noted below, the shares being offered were issued to the selling stockholders pursuant to the Share Purchase Agreement, dated as of March 22, 2014, as amended by that certain Amendment No. 1 to the Share Purchase Agreement, dated as of April 9, 2014 (as so amended, the “SPA”), by and among the Company, Palo Alto Networks (Israel) Ltd. (formerly, Cyvera Ltd.), a company formed under the laws of Israel (“Cyvera”), Palo Alto Networks Holding B.V., a company formed under the laws of the Netherlands and a wholly-owned subsidiary of the Company, the shareholders of Cyvera and Shareholder Representative Services LLC, as shareholder representative thereunder. The selling stockholders may from time to time offer and sell pursuant to this prospectus any or all of the shares of our common stock being registered. When we refer to the “selling stockholders” in this prospectus, we mean the persons listed in the table below, as well as their donees, pledgees, assignees, transferees, distributees, or other successors in interest.

The table below sets forth certain information known to us, based upon written representations from the selling stockholders, with respect to the beneficial ownership of our shares of common stock held by the selling stockholders as of May 5, 2014, the date of closing of our acquisition of Cyvera, except as described in the notes to such table. Because the selling stockholders may sell, transfer or otherwise dispose of all, some or none of the shares of our common stock covered by this prospectus, we cannot determine the number of such shares that will be sold, transferred or otherwise disposed of by the selling stockholders, or the amount or percentage of shares of our common stock that will be held by the selling stockholders upon termination of any particular offering. See “Plan of Distribution.” For purposes of the table below, we assume that the selling stockholders will sell all their shares of common stock covered by this prospectus.

In the table below, the percentage of shares beneficially owned is based on 77,076,404 shares of our common stock outstanding at May 5, 2014, determined in accordance with Rule 13d-3 under the Exchange Act of 1934, as amended. Under such rule, beneficial ownership includes any shares over which the selling stockholder has sole or shared voting power or investment power and also any shares that the selling stockholder has the right to acquire within 60 days of such date through the exercise of any options or other rights. Except as otherwise indicated, we believe that the selling stockholders have sole voting and investment power with respect to all shares of the common stock shown as beneficially owned by them. The beneficial ownership information presented in this table is not necessarily indicative of beneficial ownership for any other purpose.

 

    Prior to the Offering     Number of
Shares of
Common Stock
Being
Registered for
Resale (1)
    After the Offering  

Name of Selling Stockholder

  Number of
Shares of
Common Stock
Beneficially
Owned
    Percent of
Shares of
Common Stock
Outstanding
      Number of
Shares of
Common Stock
Beneficially
Owned
    Percent of
Shares of
Common Stock
Outstanding
 

Uri David Alter (2)

    299,052        *        299,052        —          *   

Netanel Davidi (3)

    299,052        *        299,052        —          *   

Entities affiliated with Battery Ventures (4)

    282,806        *        282,806        —          *   

Blumberg Capital III L.P. (5)

    213,930        *        213,930        —          *   

EMC Ireland Holdings (6)

    135,510        *        135,510        —          *   

Yadin Kolitz (7)

    90,801        *        90,801        —          *   

Etay Kashtan (8)

    45,651        *        45,651        —          *   

I. Kashtan Electric Materials Ltd. (9)

    45,149        *        45,149        —          *   

Ofir Shalvi (10)

    40,169        *        40,169        —          *   

Yariv Gilat (11)

    26,737        *        26,737        —          *   

Adrian Weller (12)

    26,737        *        26,737        —          *   

Eli Ben-Dor (13)

    26,737        *        26,737        —          *   

Ehud Weinstein (14)

    13,432        *        13,432        —          *   

Moshe Ben Abu (15)

    11,162        *        11,162        —          *   

Total shares of common stock to be registered

    1,556,925        2.02     1,556,925        —          *   

 

* Less than 1%.

 

-33-


Table of Contents
(1) At the closing of the acquisition of Cyvera by the Company as described above, 389,280 of the shares registered hereby were placed into escrow in accordance with the terms and conditions of the SPA and applicable escrow agreement. Depending on whether any of these shares are distributed to us to satisfy indemnity claims under the SPA, these shares may be released to the selling stockholders 24 months after the closing.
(2) Consists of (i) 161,028 shares held by Mr. Alter and (ii) 138,024 shares held by Mr. Alter that have been deposited with ESOP Management and Trust Services Ltd., as trustee, in connection with a Share Trust Agreement entered into in connection with the SPA, of which 95,320 shares are subject to escrow related to the Company’s acquisition of Cyvera. Mr. Alter is an employee of Palo Alto Networks (Israel) Ltd. (formerly Cyvera Ltd.), a wholly-owned subsidiary of the Company. In April 2014, Mr. Alter entered into a hedging transaction with Leumi Private Bank Ltd. consisting of European call and put options, each for 92,000 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 10, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(3) Consists of (i) 161,028 shares held by Mr. Davidi and (ii) 138,024 shares held by Mr. Davidi that have been deposited with ESOP Management and Trust Services Ltd., as trustee, in connection with a Share Trust Agreement entered into in connection with the SPA, of which 95,320 shares are subject to escrow related to the Company’s acquisition of Cyvera. Mr. Davidi is an employee of Palo Alto Networks (Israel) Ltd. (formerly Cyvera Ltd.), a wholly-owned subsidiary of the Company. In April 2014, Mr. Davidi entered into a hedging transaction with Leumi Private Bank Ltd. consisting of European call and put options, each for 92,000 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 10, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(4) Consists of (i) 221,996 shares held by Battery Ventures IX, L.P. (“Battery Ventures IX”), (ii) 2,218 shares held by Battery Investment Partners IX, LLC (“BIP IX”) and (iii) 58,592 shares held in escrow related to the Company’s acquisition of Cyvera, of which 58,012 shares are held by Battery Ventures IX and 580 shares are held by BIP IX. Battery Partners IX, LLC (“BPIX”) is the sole general partner of Battery Ventures IX and sole managing member of BIP IX. BPIX’s investment adviser is Battery Management Corp. (together with BPIX, the “Battery Companies”). The managing members and officers of the Battery Companies are Neeraj Agrawal, Michael Brown, Thomas J. Crotty, Jesse Feldman, Richard D. Frisbie, Kenneth P. Lawler, Roger H. Lee, R. David Tabors, and Scott R. Tobin, who share voting and dispositive power with respect to the shares held by Battery Ventures IX and BIP IX. Each of the foregoing persons disclaims beneficial ownership of these shares except to the extent of his pecuniary interest therein.
(5) Consists of (i) 169,608 shares held by Blumberg Capital III L.P. and (ii) 44,322 shares held in escrow related to the Company’s acquisition of Cyvera. David J. Blumberg, the sole managing member of Blumberg Capital III L.P., has voting and dispositive power with respect to the shares held by Blumberg Capital III L.P.
(6) Consists of (i) 107,436 shares held by EMC Ireland Holdings and (ii) 28,074 shares held in escrow related to the Company’s acquisition of Cyvera. EMC Corporation is the publicly held parent of EMC Ireland Holdings and indirectly through its subsidiaries has voting and dispositive power with respect to the shares held by EMC Ireland Holdings. Carl Eschenbach, a member of the Company’s board of directors, is an affiliate of EMC Ireland Holdings.
(7) Consists of (i) 71,989 shares held by Mr. Kolitz and (ii) 18,812 shares held in escrow related to the Company’s acquisition of Cyvera. In April 2014, Mr. Kolitz entered into a hedging transaction with Leumi Private Bank Ltd. consisting of European call and put options, each for 65,000 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 11, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(8) Consists of (i) 36,193 shares held by Mr. Kashtan and (ii) 9,458 shares held in escrow related to the Company’s acquisition of Cyvera. In April 2014, Mr. Kashtan entered into a hedging transaction with Leumi Private Bank Ltd. consisting of European call and put options, each for 36,193 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 10, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(9) Consists of (i) 35,795 shares held by I. Kashtan Electric Materials Ltd. and (ii) 9,354 shares held in escrow related to the Company’s acquisition of Cyvera. Orania Electric Materials holds a 100% interest in I. Kashtan Electric Materials Ltd. Boaz Kashtan holds 100% interest in Orania Electric Materials and has voting and dispositive power with respect to the shares held by I. Kashtan Electric Materials. In April 2014, I. Kashtan Electric Materials Ltd. entered into a hedging transaction with Leumi Private Bank Ltd. consisting of European call and put options, each for 35,795 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 10, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(10) Consists of (i) 31,849 shares held by Mr. Shalvi and (ii) 8,320 shares held in escrow related to the Company’s acquisition of Cyvera. In April 2014, Mr. Shalvi entered into hedging transactions with J.P. Morgan International Bank Limited, Brussels branch consisting of European call and put options, each for 31,800 shares of the Company’s common stock. Such options may involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 10, 2014, with respect to 23,500 shares of the Company’s common stock, and on the expiration date of April 11, 2016, with respect to 8,300 shares of the Company’s common stock. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(11)

Consists of (i) 21,199 shares held by Mr. Gilat and (ii) 5,538 shares held in escrow related to the Company’s acquisition of Cyvera. In April 2014, Mr. Gilat entered into hedging transactions with Leumi Private Bank Ltd. consisting of European call and put options, each for 26,737 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/

 

-34-


Table of Contents
  or put options if exercised on the expiration date of July 18, 2014, with respect to options related to 21,199 shares of the Company’s common stock, and on the expiration date of April 15, 2016 with respect to options related to 5,538 shares of the Company’s common stock. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on the respective expiration dates.
(12) Consists of (i) 21,199 shares held by Mr. Weller and (ii) 5,538 shares held in escrow related to the Company’s acquisition of Cyvera. In April 2014, Mr. Weller entered into hedging transactions with Leumi Private Bank Ltd. consisting of European call and put options, each for 16,199 shares of the Company’s common stock. Such options will involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 11, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(13) Consists of (i) 21,199 shares held by Mr. Ben-Dor and (ii) 5,538 shares held in escrow related to the Company’s acquisition of Cyvera.
(14) Consists of (i) 10,650 shares held by Mr. Weinstein and (ii) 2,782 shares held in escrow related to the Company’s acquisition of Cyvera. In April 2014, Omasha Investments Partnership, of which the sole partners are Mr. Weinsten and Omasha Investment (2000) Ltd., a company held by Mr. Weinstein, entered into hedging transactions with J.P. Morgan Suisse SA consisting of European call and put options, each for 10,650 shares of the Company’s common stock. Such options may involve delivery of the Company’s shares subject to the call and/or put options if exercised on the expiration date of July 21, 2014. The options may only be exercised (in whole or in part) on the expiration date and will otherwise terminate if not exercised on such date.
(15) Consists of (i) 8,850 shares held by Mr. Ben Abu and (ii) 2,312 shares held in escrow related to the Company’s acquisition of Cyvera. Mr. Ben Abu has previously been a consultant and employee of Palo Alto Networks (Israel) Ltd. (formerly Cyvera Ltd.), a wholly-owned subsidiary of the Company.

 

-35-


Table of Contents

PLAN OF DISTRIBUTION

The selling stockholders may, from time to time, sell any or all of the shares of common stock beneficially owned by them and offered hereby. As used herein, “selling stockholders” includes donees, pledgees, assignees, transferees, distributees, and other successors in interest selling shares received from a named selling stockholder after the date of this prospectus.

The sales may be made on one or more exchanges or in the over-the-counter market or otherwise, at prices and at terms then prevailing or at prices related to the then current market price, or in negotiated transactions.

The selling stockholders may effect such transactions by selling the shares of common stock to or through broker-dealers. The shares of common stock may be sold through broker-dealers by one or more of, or a combination of, the following:

 

    a block trade in which the broker-dealer so engaged will attempt to sell the shares of common stock as agent but may position and resell a portion of the block as principal to facilitate the transaction;

 

    purchases by a broker-dealer as principal and resale by such broker-dealer for its account;

 

    ordinary brokerage transactions and transactions in which the broker solicits purchasers;

 

    short sales;

 

    through the writing or settlement of options or other hedging transactions, whether such options are listed on an options exchange or otherwise; or

 

    in privately negotiated transactions.

The selling stockholders may also sell shares under Rule 144 under the Securities Act of 1933, as amended, (the “Securities Act”) if available, rather than under this prospectus.

The selling stockholders may from time to time pledge or grant a security interest in some or all of the shares of common stock owned by them and offered hereby and, if they default in the performance of their secured obligations, the pledgees or secured parties may offer and sell such shares of common stock from time to time under this prospectus, or under a supplement or amendment to this prospectus under Rule 424(b) or other applicable provision of the Securities Act amending the list of selling stockholders to include the pledgee, transferee or other successors in interest as selling stockholders under this prospectus. The selling stockholders also may transfer the shares of common stock in other circumstances, in which case the transferees or other successors in interest will be the selling beneficial owners for purposes of this prospectus. To the extent required, this prospectus may be amended or supplemented under Rule 424(b) or other applicable provision of the Securities Act from time to time to describe a specific plan of distribution.

In connection with sales of the shares of common stock or otherwise, the selling stockholders may enter into hedging transactions with broker-dealers, which may in turn engage in short sales of the shares of common stock in the course of hedging in positions they assume. The selling stockholders may also sell shares of common stock short and deliver shares of common stock covered by this prospectus to close out short positions and to return borrowed shares in connection with such short sales to broker-dealers that in turn may sell these shares. The selling stockholder may also enter into option or other transactions with broker-dealers or other financial institutions or the creation of one or more derivative securities which require the delivery to such broker-dealer or other financial institution of shares offered by this prospectus, which shares such broker-dealer or other financial institution may resell pursuant to this prospectus (as supplemented or amended to reflect such transaction).

The selling stockholders and any broker-dealers or agents that are involved in selling the shares may be deemed to be “underwriters” within the meaning of the Securities Act in connection with such sales. In such event, any commissions received by such broker-dealers or agents and any profit on the resale of the shares purchased by them may be deemed to be underwriting commissions or discounts under the Securities Act.

 

-36-


Table of Contents

The selling stockholders have informed us that, except as otherwise indicated in the table included in “Selling Stockholders,” none of them have any agreement or understanding, directly or indirectly, with any person to distribute the shares covered by this prospectus. If any selling stockholder notifies us that a material arrangement has been entered into with a broker-dealer for the sale of shares through a block trade, special offering or secondary distribution or a purchase by a broker or dealer, we may be required to file a prospectus supplement pursuant to the applicable rules promulgated under the Securities Act. In addition, upon being notified in writing by a selling stockholder that a donee or pledgee intends to sell more than 500 shares of common stock, we will file a supplement to this prospectus if then required in accordance with applicable securities law. Certain selling stockholders who are entities rather than natural persons may distribute shares to their partners, shareholders, or other owners in normal course, who may in turn sell the shares in the manner listed above.

There can be no assurance that any selling stockholder will sell any or all of the shares of common stock registered pursuant to the shelf registration statement, of which this prospectus forms a part.

We are required to pay all fees and expenses incident to the registration of the shares. We have agreed to indemnify the selling stockholders against certain losses, claims, damages and liabilities, including liabilities under the Securities Act, or the selling stockholders may be entitled to contribution. We may be indemnified by the selling stockholders against civil liabilities, including liabilities under the Securities Act that may arise from written information furnished to us by the selling stockholders specifically for use in this prospectus.

We may restrict or suspend offers and sales or other dispositions of the shares under the shelf registration statement, of which this prospectus forms a part, at any time from and after the effective date of the shelf registration statement, subject to certain terms and conditions. In the event of such restriction or suspension, the selling stockholders will not be able to offer or sell or otherwise dispose of the shares of common stock under the shelf registration statement.

None of the selling stockholders intends to use any means of distributing or delivering the prospectus other than by hand or the mails, and none of the selling stockholders intends to use any forms of prospectus other than printed prospectuses.

Once sold under the shelf registration statement, of which this prospectus forms a part, the shares of common stock will be freely tradeable in the hands of persons other than our affiliates.

 

-37-


Table of Contents

LEGAL MATTERS

The validity of the shares of common stock offered by this prospectus has been passed upon for us by Wilson Sonsini Goodrich & Rosati, Professional Corporation, Palo Alto, California.

EXPERTS

The consolidated financial statements of Palo Alto Networks, Inc. appearing in our Annual Report on Form 10-K for the year ended July 31, 2013, and the effectiveness of internal control over financial reporting as of July 31, 2013 have been audited by Ernst & Young LLP, independent registered public accounting firm, as set forth in their reports thereon, included therein, and incorporated herein by reference. Such consolidated financial statements are incorporated herein by reference in reliance upon such reports given on the authority of such firm as experts in accounting and auditing.

WHERE YOU CAN FIND MORE INFORMATION

We file annual, quarterly and special reports, proxy statements and other information with the Securities and Exchange Commission (the “SEC”). You may read and copy any document we file at the SEC’s Public Reference Room in Washington, D.C., located at 100 F Street, N.E. Please call the SEC at 1-800-SEC-0330 for further information on the Public Reference Room. Our SEC filings are also available to the public over the Internet from the SEC’s website at www.sec.gov, or our website at www.paloaltonetworks.com. The information on or accessible through our website is not a part of, and is not incorporated or deemed to be incorporated by reference in, this prospectus.

This prospectus constitutes a part of a registration statement on Form S-3 we filed with the SEC under the Securities Act of 1933, as amended. This prospectus, filed as part of the registration statement, does not contain all of the information set forth in the registration statement, certain parts of which are omitted in accordance with the rules and regulations of the SEC. For further information with respect to us, reference is hereby made to the registration statement. The registration statement may be inspected at the public reference facilities maintained by the SEC at the addresses set forth above or at the SEC’s website described above.

INFORMATION INCORPORATED BY REFERENCE

The SEC allows us to “incorporate by reference” the information we file with it, which means that we can disclose important information to you by referring you to those documents. The information incorporated by reference is an important part of this prospectus, and information that we file later with the SEC will automatically update and supersede this information. We incorporate by reference the documents listed below and any future filings made with the SEC under Sections 13(a), 13(c), 14, or 15(d) of the Securities Exchange Act of 1934 subsequent to the date of this registration statement until the selling stockholders listed herein sell all of the shares of our common stock registered under this prospectus (other than, in each case, documents or information deemed to have been furnished and not filed with the SEC pursuant to Item 2.02 or Item 7.01 of Form 8-K or as otherwise permitted by SEC rules):

 

  1. our Annual Report on Form 10-K for the fiscal year ended July 31, 2013, filed with the SEC on September 25, 2013;

 

  2. our Quarterly Report on Form 10-Q for the quarterly period ended October 31, 2013, filed with the SEC on December 5, 2013, for the quarterly period ended January 31, 2014, filed with the SEC on February 24, 2014 and for the quarterly period ended April 30, 2014, filed with the SEC on June 3, 2014;

 

  3. the information specifically incorporated by reference into the Annual Report from our Definitive Proxy Statement on Schedule 14A, filed with the SEC on October 30, 2013;

 

-38-


Table of Contents
  4. our Current Reports on Form 8-K, filed with the SEC on September 30, 2013, December 12, 2013, March 13, 2014, March 24, 2014, April 11, 2014, and May 28, 2014, except to the extent that information therein is furnished and not filed with the SEC; and

 

  5. the description of our common stock in our Registration Statement on Form 8-A, filed with the SEC on July 9, 2012.

For the purposes of this prospectus, any statement contained in a document incorporated or deemed to be incorporated by reference herein shall be deemed to be modified or superseded to the extent that a statement contained herein or in any other subsequently filed document which also is or is deemed to be incorporated by reference herein modifies or supersedes such statement. Any such statement so modified or superseded shall not be deemed, except as so modified or superseded, to constitute a part of this prospectus.

Documents incorporated by reference are available from us, without charge, excluding all exhibits unless specifically incorporated by reference in the documents. You may obtain documents incorporated by reference in this prospectus by writing to us at the following address or by calling us at the telephone number listed below:

Palo Alto Networks, Inc.

4301 Great America Parkway

Santa Clara, CA 95054

Attn: Secretary

 

-39-


Table of Contents

1,556,925 SHARES

 

LOGO

Common Stock

 

 

PROSPECTUS

June 3, 2014

 

 

 

 


Table of Contents

PART II

INFORMATION NOT REQUIRED IN PROSPECTUS

 

ITEM 14. OTHER EXPENSES OF ISSUANCE AND DISTRIBUTION.

The Registrant will pay all reasonable expenses incident to the registration of the shares other than any commissions and discounts of underwriters, dealers or agents. Such expenses are set forth in the following table. All of the amounts shown are estimates except the SEC registration fee.

 

     Amount to
be paid
 

SEC registration fee

   $ 13,897   

Printing fees

     5,200   

Legal fees and expenses

     40,000   

Accounting fees and expenses

     15,000   
  

 

 

 

Total

   $ 74,097   
  

 

 

 

 

ITEM 15. INDEMNIFICATION OF DIRECTORS AND OFFICERS.

Section 145 of the Delaware General Corporation Law authorizes a corporation’s board of directors to grant, and authorizes a court to award, indemnity to officers, directors, and other corporate agents.

As permitted by Section 102(b)(7) of the Delaware General Corporation Law, the Registrant’s amended and restated certificate of incorporation includes provisions that eliminate the personal liability of its directors and officers for monetary damages for breach of their fiduciary duty as directors and officers.

In addition, as permitted by Section 145 of the Delaware General Corporation Law, the amended and restated certificate of incorporation and amended and restated bylaws of the Registrant provide that:

The Registrant shall indemnify its directors and officers for serving the Registrant in those capacities or for serving other business enterprises at the Registrant’s request, to the fullest extent permitted by Delaware law. Delaware law provides that a corporation may indemnify such person if such person acted in good faith and in a manner such person reasonably believed to be in or not opposed to the best interests of the Registrant and, with respect to any criminal proceeding, had no reasonable cause to believe such person’s conduct was unlawful.

The Registrant may, in its discretion, indemnify employees and agents in those circumstances where indemnification is permitted by applicable law.

The Registrant is required to advance expenses, as incurred, to its directors and officers in connection with defending a proceeding, except that such director or officer shall undertake to repay such advances if it is ultimately determined that such person is not entitled to indemnification.

The Registrant is not obligated pursuant to the amended and restated bylaws to indemnify a person with respect to proceedings initiated by that person, except with respect to proceedings authorized by the Registrant’s board of directors or brought to enforce a right to indemnification.

The rights conferred in the amended and restated certificate of incorporation and amended and restated bylaws are not exclusive, and the Registrant is authorized to enter into indemnification agreements with its directors, officers, employees, and agents and to obtain insurance to indemnify such persons.

The Registrant may not retroactively amend the bylaw provisions to reduce its indemnification obligations to directors, officers, employees, and agents.

 

II-1


Table of Contents

The Registrant’s policy is to enter into separate indemnification agreements with each of its directors and officers that provide the maximum indemnity allowed to directors and executive officers by Section 145 of the Delaware General Corporation Law and also to provide for certain additional procedural protections. The Registrant also maintains directors and officers insurance to insure such persons against certain liabilities.

These indemnification provisions and the indemnification agreements entered into between the Registrant and its officers and directors may be sufficiently broad to permit indemnification of the Registrant’s officers and directors for liabilities (including reimbursement of expenses incurred) arising under the Securities Act.

 

ITEM 16. EXHIBITS.

See “Exhibit Index” following the signature pages.

 

ITEM 17. UNDERTAKINGS.

A. The undersigned Registrant hereby undertakes:

(1) To file, during any period in which offers or sales are being made, a post-effective amendment to this registration statement:

(i) To include any prospectus required by Section 10(a)(3) of the Securities Act of 1933;

(ii) To reflect in the prospectus any facts or events arising after the effective date of the registration statement (or the most recent post-effective amendment thereof) which, individually or in the aggregate, represent a fundamental change in the information set forth in the registration statement. Notwithstanding the foregoing, any increase or decrease in volume of securities offered (if the total dollar value of securities offered would not exceed that which was registered) and any deviation from the low or high end of the estimated maximum offering range may be reflected in the form of prospectus filed with the Commission pursuant to Rule 424(b) if, in the aggregate, the changes in volume and price represent no more than a 20% change in the maximum aggregate offering price set forth in the “Calculation of Registration Fee” table in the effective registration statement;

(iii) To include any material information with respect to the plan of distribution not previously disclosed in the registration statement or any material change to such information in the registration statement.

provided, however, that paragraphs (1)(i), (1)(ii) and (1)(iii) do not apply if the information required to be included in a post-effective amendment by those paragraphs is contained in reports filed with or furnished to the Commission by the Registrant pursuant to Section 13 or Section 15(d) of the Securities Exchange Act of 1934 that are incorporated by reference in the registration statement, or is contained in a form of prospectus filed pursuant to Rule 424(b) that is part of the registration statement.

(2) That, for the purpose of determining any liability under the Securities Act of 1933, each such post-effective amendment shall be deemed to be a new registration statement relating to the securities offered therein, and the offering of such securities at that time shall be deemed to be the initial bona fide offering thereof.

(3) To remove from registration by means of a post-effective amendment any of the securities being registered which remain unsold at the termination of the offering.

(4) That, for the purpose of determining liability under the Securities Act of 1933 to any purchaser:

(i) Each prospectus filed by the registrant pursuant to Rule 424(b)(3) shall be deemed to be part of the registration statement as of the date the filed prospectus was deemed part of and included in the registration statement; and

(ii) Each prospectus required to be filed pursuant to Rule 424(b)(2), (b)(5), or (b)(7) as part of a registration statement in reliance on Rule 430B relating to an offering made pursuant to Rule 415(a)(1)(i),

 

II-2


Table of Contents

(vii), or (x) for the purpose of providing the information required by section 10(a) of the Securities Act of 1933 shall be deemed to be part of and included in the registration statement as of the earlier of the date such form of prospectus is first used after effectiveness or the date of the first contract of sale of securities in the offering described in the prospectus. As provided in Rule 430B, for liability purposes of the issuer and any person that is at the date an underwriter, such date shall be deemed to be a new effective date of the registration statement relating to the securities in the registration statement to which that prospectus relates, and the offering of such securities at that time shall be deemed to be the initial bona fide offering thereof. Provided, however, that no statement made in a registration statement or prospectus that is part of the registration statement or made in a document incorporated or deemed incorporated by reference into the registration statement or prospectus that is part of the registration statement will, as to a purchaser with a time of contract of sale prior to such effective date, supersede or modify any statement that was made in the registration statement or prospectus that was part of the registration statement or made in any such document immediately prior to such effective date.

B. The undersigned Registrant hereby undertakes that, for purposes of determining any liability under the Securities Act of 1933, each filing of the Registrant’s annual report pursuant to Section 13(a) or Section 15(d) of the Securities Exchange Act of 1934 (and, where applicable, each filing of an employee benefit plan’s annual report pursuant to Section 15(d) of the Securities Exchange Act of 1934) that is incorporated by reference in the registration statement shall be deemed to be a new registration statement relating to the securities offered therein, and the offering of such securities at that time shall be deemed to be the initial bona fide offering thereof.

C. Insofar as indemnification for liabilities arising under the Securities Act of 1933 may be permitted to directors, officers and controlling persons of the Registrant pursuant to the foregoing provisions, or otherwise, the Registrant has been advised that in the opinion of the Securities and Exchange Commission such indemnification is against public policy as expressed in the Act and is, therefore, unenforceable. In the event that a claim for indemnification against such liabilities (other than the payment by the Registrant of expenses incurred or paid by a director, officer or controlling person of the Registrant in the successful defense of any action, suit or proceeding) is asserted by such director, officer or controlling person in connection with the securities being registered, the Registrant will, unless in the opinion of its counsel the matter has been settled by controlling precedent, submit to a court of appropriate jurisdiction the question whether such indemnification by it is against public policy as expressed in the Act and will be governed by the final adjudication of such issue.

 

II-3


Table of Contents

SIGNATURES

Pursuant to the requirements of the Securities Act of 1933, as amended, the Registrant certifies that it has reasonable grounds to believe that it meets all of the requirements for filing on Form S-3 and has duly caused this Registration Statement to be signed on its behalf by the undersigned, thereunto duly authorized, in the City of Santa Clara, State of California, on June 3, 2014.

 

Palo Alto Networks, Inc.
By:   /s/ Mark D. McLaughlin
  Mark D. McLaughlin
  Chief Executive Officer and President

POWER OF ATTORNEY

KNOW ALL PERSONS BY THESE PRESENT, that each person whose signature appears below hereby constitutes and appoints Mark D. McLaughlin and Steffan C. Tomlinson, and each of them, as his or her true and lawful attorney in fact and agent with full power of substitution and resubstitution, for him or her and in his or her name, place or stead, in any and all capacities, to sign any and all amendments to this Registration Statement on Form S-3 (including post effective amendments), and to file the same, with all exhibits thereto and other documents in connection therewith, with the Securities and Exchange Commission, granting unto said attorney in fact, proxy and agent full power and authority to do and perform each and every act and thing requisite and necessary to be done in connection therewith, as fully for all intents and purposes as he or she might or could do in person, hereby ratifying and confirming all that said attorney in fact, proxy and agent, or his substitute, may lawfully do or cause to be done by virtue hereof.

Pursuant to the requirements of the Securities Act of 1933, this Registration Statement on Form S-3 has been signed by the following persons in the capacities and on the dates indicated.

 

Signature

  

Title

 

Date

/s/ Mark D. McLaughlin

Mark D. McLaughlin

   Chief Executive Officer, President and Director (Principal Executive Officer)   June 3, 2014

/s/ Steffan C. Tomlinson

Steffan C. Tomlinson

  

Chief Financial Officer

(Principal Financial & Accounting Officer)

  June 3, 2014

/s/ Nir Zuk

Nir Zuk

   Chief Technical Officer and Director   June 3, 2014

/s/ Asheem Chadna

Asheem Chandna

   Director   June 3, 2014

/s/ John M. Donovan

John M. Donovan

   Director   June 3, 2014

/s/ Carl Eschenbach

Carl Eschenbach

   Director   June 3, 2014

 

II-4


Table of Contents

Signature

  

Title

 

Date

/s/ James J. Goetz

James J. Goetz

   Director   June 3, 2014

/s/ Charles J. Robel

Charles J. Robel

   Director   June 3, 2014

/s/ Daniel J. Warmenhoven

Daniel J. Warmenhoven

   Director   June 3, 2014

 

II-5


Table of Contents

EXHIBIT INDEX

 

Exhibit
Number

 

Description of Document

  3.1(1)   Amended and Restated Certificate of Incorporation of the Registrant.
  3.2(2)   Amended and Restated Bylaws of the Registrant.
  5.1*   Opinion of Wilson Sonsini Goodrich & Rosati, Professional Corporation
23.1*   Consent of Independent Registered Public Accounting Firm
23.2   Consent of Wilson Sonsini Goodrich & Rosati, Professional Corporation (contained in Exhibit 5.1 hereto)
24.1   Power of Attorney (contained on signature page hereto)

 

* Filed herewith
(1) Incorporated by reference from the Registrant’s Annual Report on Form 10-K as filed with the SEC on October 4, 2012.
(2) Incorporated by reference from the Registrant’s Annual Report on Form 10-K as filed with the SEC on October 4, 2012.

 

II-6