Attached files

file filename
EX-31.1 - CERTIFICATION OF CEO PURSUANT TO EXCHANGE ACT RULES 13A-14(A) AND 15D-14(A) - FORTINET INCftntex31120101231k.htm
EX-32 - CERTIFICATION OF CEO AND CFO PURSUANT TO EXCHANGE ACT RULES 18 U.S.C. SECTION 1350 - FORTINET INCftntex32120101231k.htm
EX-23.1 - CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM - FORTINET INCftntex23120101231k.htm
EX-31.2 - CERTIFICATION OF CFO PURSUANT TO EXCHANGE ACT RULES 13A-14(A) AND 15D-14(A) - FORTINET INCftntex31220101231k.htm
EX-10.5 - FORMS OF STOCK OPTION AGREEMENT UNDER 2009 EQUITY INCENTIVE PLAN - FORTINET INCftntex10520101231k.htm

 
 
 
 
 
 
 
 
 
 
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
 
 FORM 10-K 
(Mark One)
T
ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year ended December 31, 2010
Or
o
TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
 For the transition period from              to             
Commission file number: 001-34511
______________________________________
 FORTINET, INC.
(Exact name of registrant as specified in its charter)
______________________________________
 
Delaware
77-0560389
(State or other jurisdiction of
incorporation or organization)
(I.R.S. Employer
Identification No.)
1090 Kifer Road
Sunnyvale, California
94086
(Address of principal executive offices)
(Zip Code)
(408) 235-7700
(Registrant’s telephone number, including area code)
 
 Securities registered pursuant to Section 12(b) of the Act: 
Common Stock, $0.001 Par Value
 
The NASDAQ Stock Market LLC
 
 
NASDAQ Global Select Market
(Title of each class)
 
(Name of exchange on which registered)
Securities registered pursuant to Section 12(g) of the Act: None
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.    Yes  o    No  x
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.    Yes  o     No  x
 


Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.    Yes  x    No  o
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§229.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files).    Yes  o     No  o 
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (section 229.405 of this chapter) is not contained herein, and will not be contained, to the best of the registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K.  x
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See the definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act. 
Large accelerated filer
o 
 
 
Accelerated filer
x
Non-accelerated filer
o 
(Do not check if smaller reporting company)
 
Smaller reporting company
o
Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Act).    Yes  o     No  x
The aggregate market value of voting stock held by non-affiliates of the registrant, as of June 30, 2010, the last business day of the registrant’s most recently completed second quarter, was $590,897,232 (based on the closing price for shares of the registrant's common stock as reported by The NASDAQ Global Select Market for the last business day prior to that date). Shares of common stock held by each executive officers, director, and holder of 5% or more of the outstanding common stock have been excluded in that such persons may be deemed to be affiliates. This determination of affiliate status is not necessarily a conclusive determination for other purposes.
As of February 17, 2011, there were 75,231,493 shares of the registrant’s common stock outstanding.
DOCUMENTS INCORPORATED BY REFERENCE
Portions of the registrant’s definitive Proxy Statement relating to its 2011 Annual Meeting of Stockholders are incorporated by reference into Part III of this Annual Report on Form 10-K where indicated. Such Proxy Statement will be filed with the U.S. Securities and Exchange Commission within 120 days after the end of the fiscal year to which this report relates.
 

FORTINET, INC.
ANNUAL REPORT ON FORM 10-K
For the Fiscal Year Ended December 31, 2010
Table of Contents
 
 
 
 
 
 
Page
 
 
 
 
Part I
 
 
 
 
Item 1.
Item 1A.
Item 1B.
Item 2.
Item 3.
Item 4.
Removed and Reserved
 
 
 
 
Part II
 
 
 
 
Item 5.
Item 6.
Item 7.
Item 7A.
Item 8.
Item 9.
Item 9A.
Item 9B.
Other Information
 
 
 
 
Part III
 
 
 
 
Item 10.
Item 11.
Item 12.
Item 13.
Item 14.
 
 
 
 
Part IV
 
 
 
 
Item 15.
 
 
 


Part I
 
ITEM 1.    Business
    
Overview
 
We provide network security solutions that are designed to address the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated information technology (“IT”) threat landscape. Through our products and subscription services, we provide broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises, service providers and government entities worldwide. Our flagship Unified Threat Management ("UTM") solution consists of our FortiGate appliance products that provide a broad array of security and networking functions, including firewall, VPN, antivirus, intrusion prevention, application control, Web filtering, antispam, wireless controller, and WAN acceleration. Our FortiGate appliances, from the FortiGate-50 for small businesses and branch offices to the FortiGate-5000 series for large enterprises and service providers, are based on our proprietary technology platform. This platform includes our FortiASICs, which are specifically designed for accelerated processing of security and networking functions, and our FortiOS operating system, which provides the foundation for all of our security functions. Our FortiGuard security subscription services provide end-customers with access to dynamic updates to our antivirus, application control, intrusion prevention, Web filtering and antispam functionality based on intelligence gathered by our dedicated FortiGuard Labs team. By combining multiple proprietary security and networking functions with our purpose-built FortiASIC and FortiOS, our FortiGate UTM solution delivers broad protection against dynamic security threats while reducing the operational burden and costs associated with managing multiple point products.
 
We complement our FortiGate product line with a family of FortiManager appliances, which enable end-customers to manage the system configuration and security functions of multiple FortiGate appliances from a centralized console, as well as FortiAnalyzer appliances, which enable collection, analysis and archiving of content and log data generated by our products. We also offer other appliances and software that provide additional protection, such as: (i) FortiMail, a family of multi-featured, high performance messaging security appliances, (ii) FortiDB, a family of appliances that provide centrally managed database-specific security, (iii) FortiClient, a software product that provides endpoint security for desktops, laptops and mobile devices and that is primarily used in conjunction with our FortiGate appliances, (iv) FortiWeb, a family of appliances that provide security for Web-based applications, (v) FortiAP, a family of secure wireless access points, (vi) FortiScan, an appliance designed to provide endpoint vulnerability assessment and remediation, (vii) FortiSwitch, a family of Ethernet switches, and (viii) FortiBridge, a family of bypass appliances to help ensure network availability.
 
In October 2010 we began shipping virtual appliances for the FortiGate and FortiManager product lines. The new virtual appliances help secure network infrastructures with the same functionality as the traditional physical appliances in their respective product lines. They can be used in conjunction with traditional Fortinet appliances (such as FortiGate, FortiManager, and FortiAnalyzer) to help ensure the visibility, management, and protection of physical and virtual environments.
 
As of December 31, 2010, we had shipped over 675,000 appliances to more than 5,000 channel partners and 100,000 end-customers worldwide, including a majority of the 2010 Fortune Global 100.
 
We were incorporated in Delaware in November 2000. Our principal executive office is located at 1090 Kifer Road, Sunnyvale, California 94086 and our telephone number at that location is (408) 235-7700.
 
Technology and Architecture
 
Our proprietary FortiASIC, hardware architecture, FortiOS operating system and associated security and networking functions combine to form a platform that integrates security features and enables our products to perform sophisticated security processing for networks with high throughput requirements.
 
FortiASIC
 
Our FortiASIC family of ASICs is comprised of three lines of processors: FortiASIC content processor, or CP, the FortiASIC network processor, or NP, and the FortiASIC system-on-a-chip, or SOC. These custom ASICs are designed to enhance the sophisticated security processing capabilities implemented in software by accelerating the computation-intensive tasks such as firewall policy enforcement or IPS anomaly detection. This architecture provides the flexibility of implementing accelerated processing of new threat detection without requiring a new ASIC release. The FortiASIC CP is currently included in most of our entry-level and all of our mid-range and high-end FortiGate appliances. The FortiASIC NP is currently included in some of our mid-range and high-end FortiGate appliances, delivering further accelerated firewall and VPN performance. The FortiASIC SOC

1


is currently included in our entry-level FortiGate-60C and FortiWiFi-60C appliances.
 
FortiOS
 
FortiOS provides the foundation for the operation of all FortiGate appliances, from the core kernel functions to the security processing feature sets. FortiOS provides multiple layers of security including a hardened kernel layer providing protection for the FortiGate system, a network security layer providing security for end-customers’ network infrastructures, and application content protection providing security for end-customers’ workstations and applications. FortiOS directs the operations of processors and ASICs as well as providing system management functions such as command-line and graphical user interfaces. We make available updates to the FortiOS through our FortiCare support services. FortiOS also enables advanced, integrated routing and switching, allowing end-customers to deploy FortiGate devices within a wide variety of networks, as well as providing a direct replacement solution option for legacy switching and routing equipment. The FortiOS implements a suite of commonly used routing protocols as well as address translation technologies allowing the FortiGate appliance to integrate and operate in a wide variety of network environments. Additional features include Virtual Domain, or VDOM, capabilities and traffic queuing and shaping enabling administrators to set the appropriate configurations and policies that meet their infrastructure needs. FortiOS also provides capabilities for logging of traffic for forensic analysis purposes which are particularly important for regulatory compliance initiatives like PCI DSS. FortiOS’s packet classification, queue disciplines, policy enforcement, congestion management, and other traffic optimization functionality are designed to help control network traffic in order to optimize performance.
 
Our FortiOS incorporates the following seven core security and networking technologies:
 
•    
Firewall. Our firewall technology delivers high performance network and application firewalling, including the ability to enforce policies based on application behavior and content. Our technology identifies traffic patterns independent of port or protocol used, and links them to the use of specific applications, enabling visibility and control over application behavior (explained in more detail below). By coupling application intelligence with firewall technology, the FortiGate platform is able to deliver real-time security with integrated application content level inspection, thereby simplifying security deployments.
 
•    
Virtual Private Network. Our advanced VPN technology provides secure communications between multiple networks and hosts, through both secure socket layer, or SSL, and IPsec VPN technologies, leveraging our custom FortiASIC to provide hardware acceleration for high-performance communications and data privacy.
 
•    
Antivirus. Our antivirus technology provides protection against malware, including viruses, spyware and trojans.
 
•    
Intrusion Prevention System. Our IPS technology provides protection against current and emerging network level threats.
 
•    
Web Filtering. Our Web filtering automation technology works in concert with our research team to collect, analyze and categorize websites to provide real-time protection through website ratings and categorization. Our Web filtering technology is a pro-active defense feature that identifies known locations of malware and blocks access to these malicious sources.
 
•    
Antispam. We employ a variety of antispam techniques to detect and block spam. These techniques include a hosted service performing algorithmic validations of messages against known spam messages, sophisticated reputation service designed to evaluate and track valid email sources and destinations, intelligent image scanning to evaluate the validity of images and dynamic heuristic rules to allow messages to be evaluated based on content within each message.
 
•    
WAN Acceleration. Our storage-enabled and storage-ready FortiGate appliances provide the ability to accelerate network traffic across the wide area network by implementing a combination of application content caching and protocol optimization techniques.
 
In addition to the seven core security and networking functions mentioned above, we also incorporate additional technologies within FortiGate appliances that differentiate our UTM solution, including:
 
•    
Application Control. Our application control technology provides the ability to define granular network-based application policies giving end-customers additional control over application access.
 

2


•    
Data Leakage Prevention (DLP). Our DLP technology provides the ability to define rules based on corporate policies, and consequently detect and prevent confidential data from being distributed outside of the corporate network.
 
•    
Traffic optimization. Our traffic optimization technology combines quality of service techniques with traffic shaping to provide better service to selected network traffic based on customer policies without causing interruptions to other traffic.
 
•    
SSL inspection. Our SSL inspection technology provides the ability to decrypt SSL application content for processing by the FortiOS. The ability to inspect encrypted SSL content enables our customers to ensure protection from malware that would be otherwise hidden from traditional security products, and enforce the full complement of security and networking features available within FortiOS.
 
•    
Vulnerability Management. Our vulnerability management technology enables the FortiGate platform to perform network scans to discover systems on a network, identity vulnerabilities and recommend steps for remediation. The FortiGate devices can store the results of the scans locally, or send the results from multiple FortiGate devices to a central FortiAnalyzer for aggregation and analysis.
 
•    
Wireless Controller. Our wireless controller technology provides the ability to deploy FortiAP wireless access points to create a secure wireless network. FortiAP access points tunnel all wireless traffic to FortiGate or FortiWiFi platforms, enabling end-customers to use a single security platform to manage all wired and wireless network traffic.
 
Products
 
Our core product offerings consist of our FortiGate UTM appliance family, along with our FortiManager central management appliance and FortiAnalyzer central logging and reporting appliance, both of which are typically purchased to complement a large FortiGate deployment.
 
FortiGate
 
Our flagship FortiGate appliances offer a set of security and networking functions, including firewall, VPN, antivirus, intrusion prevention, application controls, Web filtering, antispam and WAN acceleration. All FortiGate appliances are based on our proprietary operating system, FortiOS, and substantially all FortiGate models include our proprietary FortiASICs to accelerate content and network security features implemented within FortiOS. FortiGate appliances can be centrally managed through both embedded Web-based and command line interfaces, as well as through FortiManager which provides a central management architecture for thousands of FortiGate appliances.
 
By combining multiple network security functions in our purpose-built security platform, the FortiGate provides high quality protection capabilities and deployment flexibility while reducing the operational burden and costs associated with managing multiple point products. Through FortiGuard security subscription services, our products enable end-customers to add security functionality as required by their evolving business needs and the changing threat landscape. By purchasing FortiGuard security subscription services, end-customers obtain coverage and access to regular updates for antivirus, application control, IPS, Web filtering and antispam functions for their FortiGate appliances. With over 30 models in the FortiGate product line, FortiGate is designed to address security requirements for small-to-mid sized businesses, remote offices, large enterprises, and service providers.
 
Each FortiGate appliance runs our FortiOS operating system, and substantially all include our FortiASIC CP. The significant differences between each model are the performance and scalability targets each model is designed to meet, while the security features and associated services offered are common throughout all models.
 
The FortiGate-30 through -100 series models are designed for perimeter protection for small- to mid-sized businesses, remote offices of large distributed organizations and as customer premises equipment for service providers. Optional wireless LAN, or WLAN, integration is available for the FortiGate-50, -60 and -80 models, marketed as FortiWiFi, delivering additional network access and security for wireless environments.
 
The FortiGate-200 through -800 series models are designed for perimeter deployment in mid-sized to large enterprise networks. These products offer increased capacity and scalability designed to provide high network performance while delivering the same broad security suite as all FortiGate models. Additionally, the FortiGate-310 and -620 models provide hardware

3


modularity, allowing end-customers the flexibility to customize solutions to their requirements.
 
The FortiGate-1000 through -5000 series models deliver high performance and scalable network security functionality for perimeter, data center and core deployment in large enterprise and service provider networks. Additionally, most of these products provide hardware modularity, allowing end-customers the flexibility to customize solutions to their requirements. Products within the FortiGate-3000 and -5000 series leverage Advanced Mezzanine Card, or AMC, industry standards for hardware modularization to support the advanced networking requirements of large enterprises and service providers, including high-speed networking, WAN connectivity, and network attached storage connectivity. The FortiGate-3950B series also leverages our proprietary Fortinet Mezzanine Card, or FMC, that provides hardware modularity to give end-customers the ability to add additional firewall and/or intrusion prevention performance as their network security needs evolve. The FortiGate-5000 series is also compatible with the Advanced Telecommunications Computing Architecture, or ATCA, standard, resulting in a flexible hardware platform for system modularity. This modularization gives end-customers the ability to deploy an initial FortiGate configuration with room to grow as their network security needs evolve. The inclusion of network load balancing and advanced switching functionality provides additional flexibility in how end-customers utilize the FortiGate modules within the FortiGate chassis. In addition, our FortiGate-5000 series ATCA blades can be utilized in other third-party vendors’ industry standard ATCA chassis, allowing FortiGate platforms to be deployed into a much wider range of network solutions. Our FortiGate-5000 series appliances offer modular, chassis-based architecture based on the ATCA and AMC industry standards. We brand a subset of our FortiGate-3000 and -5000 series products as FortiCarrier to reflect products specifically targeting a subset of service providers. These products add incremental security, networking and management functionality often utilized in service provider deployments.
 
FortiGate System Virtualization (VDOM)
 
In addition to providing network and content level security, FortiOS also offers system virtualization capabilities—the ability to “divide” a security appliance into multiple separately provisioned and managed instances. This capability is currently deployed in substantially all of our FortiGate products as our virtual domain, or VDOM, feature, where administrators have the ability to segment a single FortiGate appliance platform into multiple FortiGate instances. Network security system virtualization, using our VDOM feature, provides isolation between each virtual system, giving administrators flexibility in configuration and traffic management capabilities for each virtual instance.
 
Fortinet Management and Analysis Appliances
 
Our FortiManager and FortiAnalyzer appliances are typically sold in conjunction with a large FortiGate deployment.
 
FortiManager
 
Our FortiManager appliances provide a central management solution for our FortiGate appliances, including the wide variety of network and security features offered within FortiOS. One FortiManager appliance is capable of effectively managing thousands of FortiGate units, and also provides central management for FortiClient software. FortiManager facilitates the coordination of policy-based provisioning, device configuration and operating system revision management, as well as network security monitoring and device control.
 
FortiAnalyzer
 
Our FortiAnalyzer appliances are network logging, analyzing, and reporting appliances that securely aggregate content and log data from our FortiGate devices and other Fortinet products as well as third-party devices to enable network logging, analysis and reporting. Additional functions such as vulnerability assessments and traffic analysis provide additional value for customers seeking to control and monitor their network infrastructure and security policies. A full range of content and log data, including traffic, event, virus, attack, Web content, and email data may be archived, filtered and mined for compliance or historical analysis purposes. The appliance comes with a suite of standard reports as well as the ability to customize reports.
 
Additional Fortinet Solutions
 
We also offer other appliances and software that protect our end-customers from security threats to other critical areas in the enterprise, such as messaging, Web-based applications and databases, and employees’ computers or mobile devices.
 
FortiMail
 
Our FortiMail appliances provide protection against threats conveyed by messaging applications, including blended threats such as a coordinated, single attack comprised of spam, viruses and worms. These systems offer flexibility to support a

4


variety of existing deployments with minimal change to existing infrastructure. The FortiMail systems utilize a customized operating system designed to inspect and clean both inbound and outbound email traffic. FortiMail detects security threats through sophisticated antispam, antivirus and anti-malware engines. Additional functionality designed to eliminate deployment barriers and increase system value includes email routing, system virtualization, and archiving.
 
FortiDB
 
Our FortiDB appliance provides a comprehensive solution for database security assessment, identifying potential vulnerabilities that otherwise could be exploited by attackers. This solution is able to discover databases within a network infrastructure allowing administrators to confirm known databases and identify potentially harmful unknown or unauthorized databases. The ability to evaluate and report on database software and database server vulnerabilities provides the database administrator with a comprehensive list of security concerns and recommended actions to remediate them ensuring a security-hardened database environment.
 
FortiClient
 
Our FortiClient product is an endpoint software solution designed to be used in connection with our FortiGate appliances to provide security features for enterprise computers and mobile devices. The feature set includes personal firewall, IPsec VPN, antivirus, Web filtering, WAN acceleration, DLP and antispam. FortiClient is supported by FortiGuard security subscription services to help ensure endpoints are protected on a real-time basis against current and emerging threats. FortiClient software is available for Microsoft Windows XP, Microsoft Vista, Microsoft Windows Mobile and Symbian operating systems.
 
FortiWeb
 
Our FortiWeb appliances provide Web application firewalls and networking features designed to protect, balance, and accelerate Web applications. The FortiWeb is designed for medium and large enterprises, cloud service providers and consumer Internet and e-commerce companies, and can significantly reduce the deployment time and complexities of introducing Web applications. The FortiWeb applies our industry leading threat research to protect Web application servers, improving the security of confidential information and aiding in legislative and PCI DSS compliance. FortiWeb goes beyond traditional Web application firewalls to provide XML security enforcement, application acceleration, and server load balancing.
 
FortiScan
 
Our FortiScan appliance provides endpoint vulnerability management, inventory (asset and software) industry compliance evaluation, patch management and remediation, auditing and reporting. These tasks are important for enterprises to assess and ensure the defensive capabilities of their endpoints. The ability to provide agent-less and agent-based vulnerability assessment allows for flexibility in deployment with minimal impact on endpoint configurations. Additionally, administrators are able to remediate vulnerabilities found within endpoints from a central location without user participation simplifying security and compliance initiatives.
 
FortiBridge
 
Our FortiBridge bypass appliances ensure availability of network resources in the event of power loss or failure of Fortinet and third-party devices. This function enables organizations that have already deployed high availability security infrastructure (where a system fails over to either an active or standby unit) to provide additional protection of network connectivity. FortiBridge appliances preserve network availability in the event of a power failure or a device malfunction, bypassing the device altogether with a fail-open solution.
 
FortiSwitch
 
Our FortiSwitch Ethernet switches provide Gigabit Ethernet (GbE) switching with 10-Gigabit Ethernet uplinks for large, high-performance network, and power over Ethernet (POE) support for small offices and remote offices that have deployed wireless-enabled devices. These features enable a wide range of network environments to take advantage of Fortinet's high-speed, low latency switching technology.
 
FortiAP
 
Our FortiAP wireless access points provide secure WiFi client access. FortiAPs tunnel all wireless traffic to a FortiGate or FortiWiFi via the integrated wireless controller technology in FortiOS. FortiGate or FortiWiFi platforms provide centralized

5


management of multiple FortiAP access points. This product allows organizations to deploy a broad, integrated security solution for all wireless and wired traffic.
Services
 
FortiGuard Security Subscription Services
 
Security requirements are dynamic due to the constantly changing nature of threats. Using automated processes, our FortiGuard Labs team, comprised of over 100 professionals, identifies emerging threats, collects threat samples, and replicates, reviews and characterizes attacks. Based on this research, we develop updates for virus signatures, attack definitions, scanning engines, and other security solution components to distribute to end-customers through our FortiGuard global distribution network. Our FortiGuard security subscription services are designed to allow us to quickly deliver new threat detection capabilities to end-customers worldwide as new threats evolve. End-customers purchase FortiGuard security subscription services in advance, typically for a one-year term, to obtain coverage and access to regular updates for antivirus, application control, intrusion prevention, Web filtering, and antispam functions for our FortiGate appliances; antivirus, Web filtering and antispam functions for our FortiClient software; antivirus and antispam functions for our FortiMail appliances; vulnerability management for our FortiAnalyzer and FortiScan appliances, database functions for our FortiDB appliance, and web functions for our FortiWeb appliances. We provide FortiGuard services 24 hours a day, seven days a week.
 
FortiCare Technical Support Services
 
Our FortiCare services are our technical support services for the software, firmware and hardware in our products. In addition to our standard support service offering, we offer a premium service that offers faster response times and dedicated support oriented towards major accounts.
 
For our standard technical support offering for our products, channel partners often provide first level support to the end-customer, especially for small and mid-sized end-customers, and we typically provide second and third level support to our end-customers. We also provide knowledge management tools and customer self-help portals to help augment our support capabilities in an efficient and scalable manner. We provide technical support to partners and end-customers 24 hours a day, seven days a week through regional technical support managers located worldwide.
 
Training Services
 
We offer training services to our end-customers and channel partners, through our training department and authorized training partners. We have also implemented a training certification program to ensure an understanding of our products and services. As of December 31, 2010, more than 20,000 individuals have participated in our training programs.
 
Professional Services
 
We offer professional services to end-customers primarily for large implementations where expert technical resources are required. Our professional services consultants help in the design of deployments of our products and work closely with end-customer engineers, managers and other project team members to implement our products according to design, utilizing network analysis tools, attack simulation software and scripts.
 
Customers
 
We sell our security solutions through channel partners to end-customers of various sizes—from small businesses to large enterprises and service providers—and across a variety of industries including telecommunications, government, financial services, retail, education, technology, healthcare and manufacturing. An end-customer deployment may involve one of our appliances or thousands, depending on our end-customers’ size and security requirements. As of December 31, 2010, we had shipped over 675,000 appliances to more than 5,000 channel partners and 100,000 end-customers worldwide, including a majority of the 2010 Fortune Global 100.
 
During fiscal 2009 and 2008, one channel partner, Alternative Technology, Inc., a subsidiary of Arrow Electronics, Inc., accounted for approximately 12% of total revenue. During fiscal 2010, no single customer accounted for more than 10% of total revenue.
 

6


Sales and Marketing
 
We primarily sell our products and services directly to distributors who sell to resellers and service providers, who, in turn, sell to our end-customers. In certain cases, we sell directly to government focused resellers, very large service providers and major systems integrator partners who have large purchasing power and unique customer deployment demands. As of December 31, 2010, our distribution channel program had more than 5,000 channel partners worldwide. We work with many of the world’s leading technology distributors, including Arrow Electronics, Inc., Ingram Micro Inc. and Tech Data Corporation.
 
We support our channel partners with a team of experienced channel account managers, sales professionals and sales engineers who provide business planning, joint marketing strategy, and pre-sales and operational sales support. Additionally, our sales team often helps drive and support large enterprise and service provider sales through a direct touch model. Our sales professionals and engineers typically work alongside our channel partners and directly engage with end-customers to address their unique security and deployment requirements. Our sales cycle for an initial end-customer purchase typically ranges from three to six months but can be longer especially for large enterprises, service providers and government customers. To support our broadly dispersed global channel and end-customer base, we have sales offices in over 30 countries around the world.
 
Our marketing strategy is focused on building our brand and driving end-customer demand for our security solutions. We execute this strategy by leveraging a combination of internal marketing professionals and a network of regional and global channel partners. Our internal marketing organization is responsible for branding, product marketing, channel marketing and sales support programs. We focus our resources on programs, tools and activities that can be leveraged by partners worldwide to extend our marketing reach, such as sales tools and collateral, product awards and technical certifications, training, regional seminars and conferences, webinars and various other demand-generation activities.
 
Manufacturing and Suppliers
 
We outsource the manufacturing of our security appliance products to a variety of contract manufacturers and original design manufacturers. Our current manufacturing partners include Flextronics International Ltd., Micro Star International, Ltd., Creation Technologies, Inc. and a number of additional Taiwan-based manufacturers. We submit purchase orders to our contract manufacturers that describe the type and quantities of our products to be manufactured, the delivery date and other delivery terms. Once our products are manufactured, they are sent to either our headquarters in Sunnyvale, California, or to our logistics partner in Taoyuan City, Taiwan, where accessory packaging and quality-control testing are performed. We use one third-party logistics provider that accounted for a material portion of our shipments in fiscal 2009 and in fiscal 2010. We believe that outsourcing our manufacturing and a substantial portion of our logistics enables us to conserve capital, better adjust manufacturing volumes to meet changes in demand and more quickly deliver products, while allowing us to focus resources on our core competencies. Our proprietary FortiASIC, which is the key to the performance of our appliances, is fabricated by contract manufacturers in foundries operated by UMC and TSMC. Faraday (using UMC’s foundry) and K-Micro (using TSMC’s foundry) manufacture our ASICs on a purchase order basis. Accordingly, they are not obligated to continue to fulfill our supply requirements, and the prices we are charged for the fabrication of our ASICs could be increased on short notice.
 
The components included in our products are sourced from various suppliers by us or more frequently by our contract manufacturers. Some of the components important to our business, including central processing units from Intel, AMD, RMI and VIA and network chips from Broadcom, Marvell and Intel, are available from a limited or sole source of supply.
 
We have no long-term contracts related to the manufacturing of our ASICs or other components that guarantee any capacity or pricing terms.
 
Research and Development
 
We focus our research and development efforts on developing new products and systems, and adding new features to existing products and systems. Our development strategy is to identify features, products and systems for both software and hardware that are, or are expected to be, needed by our end-customers. Our success in designing, developing, manufacturing and selling new or enhanced products will depend on a variety of factors, including the identification of market demand for new products, product selection, timely implementation of product design and development, product performance, effective manufacturing and assembly processes and sales and marketing.
 
As of December 31, 2010, our research and development organization had headcount of 428 people predominantly in Canada, China, and the United States. Our research and development expense in fiscal 2010 was $49.8 million, in fiscal 2009 was $42.2 million and in fiscal 2008 was $37.0 million.
 

7


Intellectual Property
 
We rely primarily on patent, trademark, copyright and trade secrets laws, confidentiality procedures and contractual provisions to protect our technology. As of December 31, 2010, we had 55 issued U.S. patents, 11 issued Chinese patents, 1 issued Japanese patent, 94 patent applications pending for examination in the United States and 19 patent applications pending for examination in China. We also license software from third parties for integration into our products, including open source software and other software available on commercially reasonable terms.
 
Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality agreements with our employees, consultants, vendors and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that the steps taken by us will prevent misappropriation of our technology. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States.
 
Our industry is characterized by the existence of a large number of patents and frequent claims and related litigation regarding patent and other intellectual property rights. In particular, leading companies in the networking industry have extensive patent portfolios. From time-to-time, third parties, including certain of these leading companies, have asserted and may assert patent, copyright, trademark and other intellectual property rights against us, our channel partners or our end-customers. Successful claims of infringement by a third party could prevent us from distributing certain products or performing certain services or require us to pay substantial damages (including treble damages if we are found to have willfully infringed patents or copyrights), royalties or other fees. Even if third parties may offer a license to their technology, the terms of any offered license may not be acceptable and the failure to obtain a license or the costs associated with any license could cause our business, operating results or financial condition to be materially and adversely affected. We typically indemnify our end-customers, distributors and certain resellers against claims that our products infringe the intellectual property of third parties.
 
Competition
 
The markets for our products are extremely competitive and are characterized by rapid technological change. The principal competitive factors in our markets include the following:
 
product performance, features, effectiveness, interoperability and reliability;
 
technological expertise;
 
price of products and services and total cost of ownership;
 
brand recognition;
 
customer service and support;
 
sales and distribution capabilities;
 
compliance with industry standards and certifications;
 
size and financial stability of operations; and
 
breadth of product line.
 
Our competitors include networking companies such as Cisco Systems, Inc., and Juniper Networks, Inc., security vendors such as Check Point Software Technologies Ltd., McAfee Inc. (pending acquisition by Intel, Inc.), and SonicWALL, Inc. (acquired by Thoma Bravo), and other point solution security vendors.
 
We believe we compete favorably based on our products’ performance, reliability and breadth, and our ability to add and integrate new networking and security features and based on our technological expertise. Several competitors are significantly larger, have greater financial, technical, marketing, distribution, customer support and other resources, are more established than we are, and have significantly better brand recognition. Some of these larger competitors have substantially broader product offerings and leverage their relationships based on other products or incorporate functionality into existing products in a manner that discourages users from purchasing our products. Based in part on these competitive pressures, we may lower prices or attempt

8


to add incremental features and functionality.
 
Conditions in our markets could change rapidly and significantly as a result of technological advancements or continuing market consolidation. The development and market acceptance of alternative technologies could decrease the demand for our products or render them obsolete. Our competitors may introduce products that are less costly, provide superior performance or achieve greater market acceptance than our products. In addition, our larger competitors often have broader product lines and market focus, are in a better position to withstand any significant reduction in capital spending by end-customers in these markets, and will therefore not be as susceptible to downturns in a particular market. The above competitive pressures are likely to continue to impact our business. We may not be able to compete successfully in the future, and competition may harm our business.
 
Employees
 
As of December 31, 2010, our total headcount was 1,336 people including payrolled contractors. We had 428 in research and development, 486 in sales and marketing, 283 in services and support, 31 in manufacturing operations, and 108 in a general and administrative capacity. As of December 31, 2010, our headcount was 314 people in the United States, 430 in Canada, 83 in France, 216 in China and 293 in other countries.
 
None of our U.S. employees are represented by a labor union with respect to his or her employment with us; however, our employees in France, Spain and Italy are represented by collective bargaining agreements. We have not experienced any work stoppages, and we consider our relations with our employees to be good.
 
Available Information
 
Our web site is located at www.fortinet.com, and our investor relations web site is located at http://investor.fortinet.com. The information posted on our website is not incorporated into this Annual Report on Form 10-K. Our Annual Report on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K and amendments to reports filed or furnished pursuant to Sections 13(a) and 15(d) of the Securities Exchange Act of 1934, as amended, are available free of charge on our investor relations web site as soon as reasonably practicable after we electronically file such material with, or furnish it to, the SEC. You may also access all of our public filings through the SEC’s website at www.sec.gov. Further, a copy of this Annual Report on Form 10-K is located at the SEC’s Public Reference Room at 100 F Street, NE, Washington, D.C. 20549. Information on the operation of the Public Reference Room can be obtained by calling the SEC at 1-800-SEC-0330.
 
We webcast our earnings calls and certain events we participate in or host with members of the investment community on our investor relations web site. Additionally, we provide notifications of news or announcements regarding our financial performance, including SEC filings, investor events, press and earnings releases, as part of our investor relations web site. The contents of these web sites are not intended to be incorporated by reference into this report or in any other report or document we file.
 
ITEM 1A.     Risk Factors
 
Investing in our common stock involves a high degree of risk. You should carefully consider the following risks and all other information contained in this 10-K, including our consolidated financial statements and the related notes, before investing in our common stock. The risks and uncertainties described below are not the only ones we face. Additional risks and uncertainties that we are unaware of, or that we currently believe are not material, also may become important factors that affect us. If any of the following risks materialize, our business, financial condition and results of operations could be materially harmed. In that case, the trading price of our common stock could decline, and you may lose some or all of your investment.
 
Risks Related to Our Business
 
Our quarterly operating results are likely to vary significantly and be unpredictable.
 
Our operating results have historically varied from period to period, and we expect that they will continue to do so as a result of a number of factors, many of which are outside of our control and may be difficult to predict, including:
 
•    
the level of demand for our products and services;
 
•    
the timing of channel partner and end-customer orders;
 

9


•    
the timing of shipments, which may depend on many factors such as inventory levels and logistics, our ability to ship new products on schedule and accurately forecast inventory requirements, and potential delays in the manufacturing process;
 
•    
the mix of products sold, the mix of revenue between products and services and the degree to which products and services are bundled and sold together for a package price;
 
•    
the budgeting cycles and purchasing practices of our channel partners and end-customers;
 
•    
seasonal buying patterns of our end-customers;
 
•    
the timing of revenue recognition for our sales, which may be affected by both the mix of sales by our “sell-in” versus our “sell-through” channel partners, and by the extent to which we bring on new distributors;
 
•    
the accuracy and timing of point of sale reporting by our sell-through distributors, which impacts our ability to recognize revenue;
 
•    
the level of perceived threats to network security, which may fluctuate from period to period;
 
•    
changes in end-customer, distributor or reseller requirements or market needs;
 
•    
changes in the growth rate of the network security or UTM markets;
 
•    
the timing and success of new product and service introductions by us or our competitors or any other change in the competitive landscape of our industry, including consolidation among our competitors or end-customers;
 
•    
deferral of orders from end-customers in anticipation of new products or product enhancements announced by us or our competitors;
 
•    
decisions by potential end-customers to purchase network security solutions from larger, more established security vendors or from their primary network equipment vendors;
 
•    
price competition;
 
•    
changes in customer renewal rates for our services;
 
•    
changes in the length of services contracts sold;
 
•    
insolvency or credit difficulties confronting our customers, affecting their ability to purchase or pay for our products and services;
 
•    
any disruption in our channel or termination of our relationship with important channel partners;
 
•    
insolvency or credit difficulties confronting our key suppliers, which could disrupt our supply chain;
 
•    
general economic conditions, both domestically and in our foreign markets;
 
•    
future accounting pronouncements or changes in our accounting policies; and
 
•    
increases or decreases in our expenses caused by fluctuations in foreign currency exchange rates, as a significant portion of our expenses are incurred and paid in currencies other than the U.S. dollar.
 
Any one of the factors above or the cumulative effect of some of the factors referred to above may result in significant fluctuations in our quarterly financial and other operating results, including fluctuations in our key metrics. This variability and unpredictability could result in our failing to meet our internal operating plan or the expectations of securities analysts or investors for any period. If we fail to meet or exceed such expectations for these or any other reasons, the market price of our shares could fall substantially and we could face costly lawsuits, including securities class action suits. In addition, a significant percentage of our operating expenses are fixed in nature and based on forecasted revenue trends. Accordingly, in the event of

10


revenue shortfalls, we are generally unable to mitigate the negative impact on margins in the short term.
 
Reliance on a concentration of shipments at the end of the quarter could cause our revenue to fall below expected levels.
 
As a result of customer-buying patterns and the efforts of our sales force and channel partners to meet or exceed quarterly quotas, historically we have received a substantial portion of a quarter's sales orders and generated a substantial portion of a quarter's revenue during the last two weeks or last days of the quarter. If expected revenue at the end of any quarter is delayed for any reason, including the failure of anticipated purchase orders to materialize, our or our logistics partners' inability to ship products prior to quarter-end to fulfill purchase orders received near the end of the quarter, our failure to manage inventory to meet demand, our inability to release new products on schedule, any failure of our systems related to order review and processing, or any delays in shipments based on trade compliance requirements, our revenue for that quarter could fall below our expectations or those of securities analysts and investors, resulting in a decline in our stock price.
 
We rely significantly on revenue from subscription and support services which may decline, and, because we recognize revenue from subscriptions and support services over the term of the relevant service period, downturns or upturns in sales are not immediately reflected in full in our operating results.
 
Services revenue accounts for a significant portion of our revenue, comprising 53.0% of total revenue for fiscal 2010, 55.2% of total revenue for fiscal 2009, and 49.7% of total revenue for fiscal 2008. Sales of new or renewal subscription and services contracts may decline and fluctuate as a result of a number of factors, including end-customers' level of satisfaction with our products and services, the prices of our products and services, the prices of products and services offered by our competitors or reductions in our customers' spending levels. If our sales of new or renewal subscription and services contracts decline, our revenue and revenue growth may decline and our business will suffer. In addition we recognize subscription and service revenue monthly over the term of the relevant service period, which is typically one year but has been as long as five years. As a result, much of the revenue we report each quarter is the recognition of deferred revenue from subscription and services contracts entered into during previous quarters. Consequently, a decline in new or renewed subscription or service contracts in any one quarter will not be fully reflected in revenue in that quarter, but will negatively affect our revenue in future quarters. Accordingly, the effect of significant downturns in new or renewed sales of our subscriptions or services is not reflected in full in our results of operations until future periods. Our subscription and service revenue also makes it difficult for us to rapidly increase our revenue through additional service sales in any period, as revenue from new and renewal service contracts must be recognized over the applicable service period. Furthermore increases in the average term of services contracts would result in revenue for services contracts being recognized over longer periods of time.
 
Managing inventory of our products and product components is complex. Insufficient inventory may result in lost sales opportunities or delayed revenue, while excess inventory may harm our gross margins.
 
Our channel partners may increase orders during periods of product shortages, cancel orders if their inventory is too high, return product or take advantage of price protection (if any), or delay orders in anticipation of new products. They also may adjust their orders in response to the supply of our products and the products of our competitors that are available to them and in response to seasonal fluctuations in end-customer demand. Furthermore if the time required to manufacture certain products or ship products increases for any reason, this could result in inventory shortfalls. Management of our inventory is further complicated by the significant number of different products and models that we sell.
 
In addition, for those channel partners that have rights of return, inventory held by such channel partners affects our results of operations. Our inventory management systems and related supply chain visibility tools may be inadequate to enable us to effectively manage inventory. Inventory management remains an area of focus as we balance the need to maintain inventory levels that are sufficient to ensure competitive lead times against the risk of inventory obsolescence because of rapidly changing technology and customer requirements. If we ultimately determine that we have excess inventory, we may have to reduce our prices and write-down inventory, which in turn could result in lower gross margins. Alternatively, insufficient inventory levels, which we experienced in the fourth quarter of fiscal 2009, may lead to shortages that result in delayed revenue or loss of sales opportunities altogether as potential end-customers turn to competitors' products that are readily available. If we are unable to effectively manage our inventory and that of our distribution partners, our results of operations could be adversely affected.
 
We rely on third-party channel partners to generate substantially all of our revenue. If our partners fail to perform, our ability to sell our products and services will be limited, and, if we fail to optimize our channel partner model going forward, our operating results will be harmed.
 
Substantially all of our revenue is generated through sales by our channel partners, which include distributors and

11


resellers. We depend upon our channel partners to generate sales opportunities and manage the sales process. To the extent our channel partners are unsuccessful in selling our products, or we are unable to enter into arrangements with, and retain a sufficient number of high quality channel partners in each of the regions in which we sell products, and keep them motivated to sell our products, our ability to sell our products and operating results will be harmed. The termination of our relationship with any significant channel partner may also adversely impact our sales and operating results.
 
We provide sales channel partners with specific programs to assist them in selling our products, but there can be no assurance that these programs will be effective. In addition, our channel partners may be unsuccessful in marketing, selling and supporting our products and services. Our channel partners generally do not have minimum purchase requirements. They may also market, sell and support products and services that are competitive with ours, and may devote more resources to the marketing, sales and support of such products. They may have incentives to promote our competitors' products to the detriment of our own. They may cease selling our products altogether. We cannot assure you that we will retain these channel partners or that we will be able to secure additional or replacement partners. The loss of one or more of our significant channel partners or the failure to obtain and ship a number of large orders each quarter through them could harm our operating results. In addition, any new sales channel partner will require extensive training and may take several months or more to achieve productivity. Our channel partner sales structure could subject us to lawsuits, potential liability and reputational harm if, for example, any of our channel partners misrepresent the functionality of our products or services to end-customers or our channel partners violate laws or our corporate policies. If we fail to manage existing sales channels, our business will be seriously harmed.
 
If we are not successful in continuing to execute our strategy to increase our sales to larger end-customers, our results of operations may suffer.
 
An important part of our growth strategy is to increase sales of our products to large enterprises, service providers and government entities. Sales to enterprises, service providers and government entities involve risks that may not be present (or that are present to a lesser extent) with sales to small-to-mid-sized entities. These risks include:
 
•    
increased competition from larger competitors, such as Cisco Systems, Inc., Check Point Software Technologies Ltd., McAfee, Inc. (pending acquisition by Intel, Inc.), and Juniper Networks, Inc., that traditionally target enterprises, service providers and government entities and that may already have purchase commitments from those end-customers;
 
•    
increased purchasing power and leverage held by large end-customers in negotiating contractual arrangements with us;
 
•    
more stringent requirements in our support service contracts, including stricter support response times, and increased penalties for any failure to meet support requirements; and
 
•    
longer sales cycles and the associated risk that substantial time and resources may be spent on a potential end-customer who elects not to purchase our products and services.
 
Large enterprises, service providers and government entities often undertake a significant evaluation process that results in a lengthy sales cycle, in some cases over 12 months. Although we have a channel sales model, our sales representatives typically engage in direct interaction with our distributors and resellers in connection with sales to larger end-customers. Due to the lengthy nature, the size and scope, and stringent requirements of these evaluations, we typically provide evaluation products to these customers. We may spend substantial time, effort and money in our sales efforts without being successful in producing any sales. If we are unsuccessful in converting these evaluations into sales, we may experience an increased inventory of used products and potentially increased write-offs. In addition, product purchases by enterprises, service providers and government entities are frequently subject to budget constraints, multiple approvals, and unplanned administrative, processing and other delays. Finally, enterprise, service providers and government entities typically have longer implementation cycles; require greater product functionality and scalability and a broader range of services, including design services; demand that vendors take on a larger share of risks; sometimes require acceptance provisions that can lead to a delay in revenue recognition; and expect greater payment flexibility from vendors. All these factors can add further risk to business conducted with these customers. If sales expected from a large end-customer for a particular quarter are not realized in that quarter or at all, our business, operating results and financial condition could be materially and adversely affected.
 
The average sales prices of our products may decrease, which may reduce our gross profits and adversely impact our financial results and the trading price of our common stock.
 
The average sales prices for our products may decline for a variety of reasons, including competitive pricing pressures,

12


discounts we offer, a change in our mix of products, anticipation of the introduction of new products or promotional programs. Competition continues to increase in the market segments in which we participate and we expect competition to further increase in the future, thereby leading to increased pricing pressures. Larger competitors with more diverse product offerings may reduce the price of products that compete with ours in order to promote the sale of other products or may bundle them with other products. Additionally, although we price our products and services worldwide in U.S. dollars, currency fluctuations in certain countries and regions may negatively impact actual prices that partners and customers are willing to pay in those countries and regions. Furthermore, we anticipate that the average sales prices and gross profits for our products will decrease over product life cycles. We cannot assure you that we will be successful in developing and introducing new offerings with enhanced functionality on a timely basis, or that our product offerings, if introduced, will enable us to maintain our prices and gross profits at levels that will allow us to maintain profitability.
 
Defects or vulnerabilities in our products or services, the failure of our products or services to prevent a virus or security breach, or misuse of our products could harm our reputation and divert resources.
 
Because our products and services are complex, they have contained and may contain defects or errors that are not detected until after their commercial release and deployment by our customers. Defects or vulnerabilities may impede or block network traffic or cause our products or services to be vulnerable to electronic break-ins or cause them to fail to help secure networks. Because the techniques used by computer hackers to access or sabotage networks change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques. In addition, defects or errors in our FortiGuard subscription updates or our FortiGate appliances could result in a failure of our FortiGuard services to effectively update end-customers' FortiGate appliances and thereby leave customers vulnerable to attacks. Furthermore, our solutions may also fail to detect or prevent viruses, worms or similar threats due to a number of reasons such as the evolving nature of such threats and the continual emergence of new threats that we may fail to add to our FortiGuard databases in time to protect our end-customers' networks. Our FortiGuard or FortiCare data centers and networks may also experience technical failures and downtime, and may fail to distribute appropriate updates, or fail to meet the increased requirements of a growing customer base. Any such technical failure, downtime, or failures in general may temporarily or permanently expose our end-customers' networks, leaving their networks unprotected against the latest security threats.
 
An actual or perceived security breach or infection of the network of one of our end-customers, regardless of whether the breach is attributable to the failure of our products or services to prevent the security breach, could adversely affect the market's perception of our security products. We may not be able to correct any security flaws or vulnerabilities promptly, or at all. Our products may also be misused by end-customers or third parties who obtain access to our products. For example, our products could be used to censor private access to certain information on the Internet. Such use of our products for censorship could result in negative press coverage and negatively affect our reputation, even if we take reasonable measures to prevent any improper shipment of our products or if our products are provided by an unauthorized third-party. Any defects, errors or vulnerabilities in our products, or misuse of our products, could result in:
 
•    
expenditure of significant financial and product development resources in efforts to analyze, correct, eliminate or work-around errors or defects or to address and eliminate vulnerabilities;
 
•    
loss of existing or potential end-customers or channel partners;
 
•    
delayed or lost revenue;
 
•    
delay or failure to attain market acceptance;
 
•    
negative publicity, which will harm our reputation; and
 
•    
litigation, regulatory inquiries or investigations that may be costly and harm our reputation.
 
Our business and operations have experienced rapid growth, and if we do not appropriately manage any future growth, or are unable to improve our systems and processes, our operating results will be negatively affected.
 
We have a high volume business that has grown over the last several years. We rely heavily on information technology systems to help manage critical functions such as order processing, revenue recognition, financial forecasts, inventory and supply chain management and trade compliance reviews. However, we have been slow to adopt and implement certain automated functions, like Electronic Data Interchange, which could have a negative impact on our business. For example, a large part of our order processing relies on the manual processing of emails internally and from our customers. Combined with the fact that we may receive a majority of our orders in the last few weeks of any given quarter, a significant interruption in our

13


email service or other systems could result in delayed order fulfillment and decreased revenue for that quarter. To manage any future growth effectively, we must continue to improve and expand our information technology and financial infrastructure, operating and administrative systems and controls, and continue to manage headcount, capital and processes in an efficient manner. We may not be able to successfully implement improvements to these systems and processes in a timely or efficient manner. In addition, our systems and processes may not prevent or detect all errors, omissions or fraud. Our failure to improve our systems and processes, or their failure to operate in the intended manner, may result in our inability to manage the growth of our business and to accurately forecast our revenue, expenses and earnings, or to prevent certain losses. Our productivity and the quality of our products and services may be adversely affected if we do not integrate and train our new employees quickly and effectively. Any future growth would add complexity to our organization and require effective coordination throughout our organization. Failure to manage any future growth effectively could result in increased costs and harm our results of operations.
 
We have a history of losses and may not maintain profitability, and our revenue growth may not continue.
 
We have incurred net losses in most fiscal years since our inception, including net losses of $21.8 million in fiscal 2007, $5.3 million in fiscal 2006, $14.2 million in fiscal 2005 and $59.0 million in fiscal 2004. As a result, we had an accumulated deficit of $18.7 million at December 31, 2010. Although we were profitable in fiscal 2008, 2009 and 2010, we may not be able to sustain profitability in future periods if we fail to increase revenue or deferred revenue, manage our cost structure, or are subject to unanticipated liabilities. Revenue growth may slow or revenue may decline for a number of possible reasons, including slowing demand for our products or services, increasing competition, a decrease in the growth of our overall market, or if we fail for any reason to continue to capitalize on growth opportunities. Any failure by us to maintain profitability and continue our revenue growth could cause the price of our common stock to materially decline.
 
If our estimates or judgments relating to our critical accounting policies are based on assumptions that change or prove to be incorrect, our operating results could fall below expectations of securities analysts and investors, resulting in a decline in our stock price.
 
The preparation of financial statements in conformity with generally accepted accounting principles requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances, as provided in “Management's Discussion and Analysis of Financial Condition and Results of Operations” in this Form 10-K, the results of which form the basis for making judgments about the carrying values of assets and liabilities that are not readily apparent from other sources. Our operating results may be adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions, which could cause our operating results to fall below the expectations of securities analysts and investors, resulting in a decline in our stock price. Significant assumptions and estimates used in preparing our consolidated financial statements include those related to revenue recognition, stock-based compensation, valuation of inventory, warranty liabilities, and accounting for income taxes.
 
We offer retroactive price protection to certain of our major distributors, and if we fail to balance their inventory with end-customer demand for our products, our allowance for price protection may be inadequate, which could adversely affect our results of operations.
 
We provide certain of our major distributors with price protection rights for inventories of our products held by them. If we reduce the list price of our products, certain distributors receive refunds or credits from us that reduce the price of such products held in their inventory based upon the new list price. Future credits for price protection will depend on the percentage of our price reductions for the products in inventory and our ability to manage the levels of our major distributors' inventories. If future price protection adjustments are higher than expected, our future results of operations could be materially and adversely affected.
 
If we are unable to hire, retain and motivate qualified personnel, our business will suffer.
 
Our future success depends, in part, on our ability to continue to attract and retain highly skilled personnel. The loss of the services of any of our key personnel, the inability to attract or retain qualified personnel, or delays in hiring required personnel, particularly in engineering and sales, may seriously harm our business, financial condition and results of operations. We have experienced turnover in our management-level personnel. None of our key employees has an employment agreement for a specific term, and any of our employees may terminate their employment at any time. Our ability to continue to attract and retain highly skilled personnel will be critical to our future success. Competition for highly skilled personnel is frequently intense, especially in the locations where we have a substantial presence and need for highly-skilled personnel: the San Francisco Bay Area, Vancouver, Canada and Beijing, China. A large portion of our employee base is substantially vested in significant stock option grants, and the ability to exercise those options and sell their stock may result in a larger than normal

14


turnover rate. We may not be successful in attracting, assimilating or retaining qualified personnel to fulfill our current or future needs. Also, to the extent we hire personnel from competitors, we may be subject to allegations that they have been improperly solicited or divulged proprietary or other confidential information.
 
We are dependent on the continued services and performance of our senior management, the loss of any of whom could adversely affect our business, operating results and financial condition.
 
Our future performance depends on the continued services and continuing contributions of our senior management to execute on our business plan, and to identify and pursue new opportunities and product innovations. The loss of services of senior management, particularly Ken Xie, our Co-founder, President and Chief Executive Officer, Michael Xie, our Co-founder, Vice President of Engineering and Chief Technical Officer, and Ken Goldman, our Vice President and Chief Financial Officer, could significantly delay or prevent the achievement of our development and strategic objectives. In addition, key personnel may be distracted by activities unrelated to our business. The loss of the services, or distraction, of our senior management for any reason could adversely affect our business, financial condition and results of operations.
 
Adverse economic conditions or reduced information technology spending may adversely impact our business.
 
Our business depends on the overall demand for information technology and on the economic health of our current and prospective customers. In addition, the purchase of our products is often discretionary and may involve a significant commitment of capital and other resources. Weak global economic conditions, weak economic conditions in certain geographies, or a reduction in information technology spending regardless of macro-economic conditions, could adversely impact our business, financial condition and results of operations in a number of ways, including longer sales cycles, lower prices for our products and services, higher default rates among our distributors, reduced unit sales and lower or no growth.
 
Because we depend on several third-party manufacturers to build our products, we are susceptible to manufacturing delays that could prevent us from shipping customer orders on time, if at all, and may result in the loss of sales and customers.
 
We outsource the manufacturing of our security appliance products to a variety of contract manufacturing partners and original design manufacturing partners.
 
Our reliance on our third-party manufacturers reduces our control over the manufacturing process, exposing us to risks, including reduced control over quality assurance, product costs and product supply and timing. Any manufacturing disruption by our third-party manufacturers could impair our ability to fulfill orders. If we are unable to manage our relationships with these third-party manufacturers effectively, or if these third-party manufacturers experience delays, increased manufacturing lead-times, disruptions, capacity constraints or quality control problems in their manufacturing operations, or fail to meet our future requirements for timely delivery, our ability to ship products to our customers could be impaired and our business would be seriously harmed.
 
These manufacturers fulfill our supply requirements on the basis of individual purchase orders. We have no long-term contracts or arrangements with certain of our third-party manufacturers that guarantee capacity, the continuation of particular payment terms or the extension of credit limits. Accordingly, they are not obligated to continue to fulfill our supply requirements, and the prices we are charged for manufacturing services could be increased on short notice. If we are required to change third-party manufacturers, our ability to meet our scheduled product deliveries to our customers would be adversely affected, which could cause the loss of sales and existing or potential customers, delayed revenue or an increase in our costs which could adversely affect our gross margins. Our individual product lines are generally manufactured by only one manufacturing partner. Any production interruptions for any reason, such as a natural disaster, epidemic, capacity shortages, or quality problems, at one of our manufacturing partners would severely affect sales of our product lines manufactured by that manufacturing partner.
 
Our proprietary FortiASIC, which is the key to the performance of our appliances, is fabricated by contract manufacturers in foundries operated by UMC and Taiwan Semiconductor Manufacturing Corporation, or TSMC. Faraday (using UMC's foundry) and K-Micro (using TSMC's foundry) manufacture our ASICs on a purchase order basis, and these foundries do not guarantee any capacity and could reject orders from either Faraday or K-Micro or try to increase pricing. Accordingly, the foundries are not obligated to continue to fulfill our supply requirements, and due to the long lead time that a new foundry would require, we could suffer temporary or long term inventory shortages of our FortiASIC as well as increased costs. Our suppliers may also prioritize orders by other companies that order higher volumes of products. If any of these suppliers materially delays its supply of ASICs or specific product models to us, or requires us to find an alternate supplier and we are not able to do so on a timely and reasonable basis, or if these foundries materially increase their prices for fabrication of our ASICs or specific product models, our business would be harmed.

15


 
In addition, our reliance on third-party manufacturers and foundries limits our control over environmental regulatory requirements such as the hazardous substance content of our products and therefore our ability to ensure compliance with the EU RoHS and other similar laws. See “If we fail to comply with environmental requirements, our business, financial condition, operating results and reputation could be adversely affected” for information on the effects of the failure to comply with these laws.
 
Because some of the key components in our products come from limited sources of supply, we are susceptible to supply shortages or supply changes, which could disrupt or delay our scheduled product deliveries to our customers and may result in the loss of sales and customers.
 
We and our contract manufacturers currently purchase several key parts and components used in the manufacture of our products from limited sources of supply. We are therefore subject to the risk of shortages in the supply of these components and the risk that component suppliers discontinue or modify components used in our products. We have faced component shortages in the past. Certain of our limited source components for particular appliances and suppliers of those components include: specific types of central processing units from Intel Corporation, Advanced Micro Devices, Inc., RMI Corporation and VIA Technologies, Inc. and network chips from Broadcom Corporation, Marvell Technology Group Ltd. and Intel. The introduction by component suppliers of new versions of their products, particularly if not anticipated by us or our contract manufacturers, could require us to expend significant resources to incorporate these new components into our products. In addition, if these suppliers were to discontinue production of a necessary part or component, we would be required to expend significant resources and time in locating and integrating replacement parts or components from another vendor. Qualifying additional suppliers for limited source parts or components can be time-consuming and expensive.
 
Our manufacturing partners have experienced increasing lead times for the purchase of components incorporated into our products. Our reliance on a limited number of suppliers involves several additional risks, including:
 
•    
a potential inability to obtain an adequate supply of required parts or components when required;
 
•    
financial or other difficulties faced by our suppliers;
 
•    
infringement or misappropriation of our intellectual property;
 
•    
price increases;
 
•    
failure of a component to meet environmental or other regulatory requirements;
 
•    
failure to meet delivery obligations in a timely fashion; and
 
•    
failure in component quality.
 
The occurrence of any of these would be disruptive to us and could seriously harm our business. Any interruption or delay in the supply of any of these parts or components, or the inability to obtain these parts or components from alternate sources at acceptable prices and within a reasonable amount of time, would harm our ability to meet our scheduled product deliveries to our distributors, resellers and end-customers. This could harm our relationships with our channel partners and end-customers and could cause delays in shipment of our products and adversely affect our results of operations.
 
We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and results of operations.
 
Our sales contracts are primarily denominated in U.S. dollars and therefore substantially all of our revenue is not subject to foreign currency risk. However, a strengthening of the U.S. dollar could increase the real cost of our products to our customers outside of the United States, which could adversely affect our financial condition and results of operations. In addition, a majority of our operating expenses are incurred outside the United States, are denominated in foreign currencies, and are subject to fluctuations due to changes in foreign currency exchange rates, particularly changes in the Euro and Canadian dollar. Although we have been hedging currency exposures relating to certain balance sheet accounts and have recently entered into cashflow hedges relating to certain operating expenses incurred outside of the United States, if we stop hedging against any of these risks or if our attempts to hedge against these currency exposures are not successful, our financial condition and results of operations could be adversely affected.
 

16


We generate a majority of revenue from sales to distributors, resellers and end-customers outside of the United States, and we are therefore subject to a number of risks associated with international sales and operations.
 
We market and sell our products throughout the world and have established sales offices in many parts of the world. Therefore, we are subject to risks associated with having worldwide operations. We are also subject to a number of risks typically associated with international sales and operations, including:
 
•    
economic or political instability in foreign markets;
 
•    
greater difficulty in enforcing contracts, accounts receivable collection and longer collection periods;
 
•    
changes in regulatory requirements;
 
•    
difficulties and costs of staffing and managing foreign operations;
 
•    
the uncertainty of protection for intellectual property rights in some countries;
 
•    
costs of compliance with foreign policies, laws and regulations and the risks and costs of non-compliance with such policies, laws and regulations;
 
•    
costs of complying with U.S. laws and regulations for foreign operations, including the Foreign Corrupt Practices Act, import and export control laws, tariffs, trade barriers, and economic sanctions;
 
•    
other regulatory or contractual limitations on our ability to sell our products in certain foreign markets, and the risks and costs of non-compliance;
 
•    
heightened risks of unfair or corrupt business practices in certain geographies and of improper or fraudulent sales arrangements that may impact financial results and result in restatements of financial statements and irregularities in financial statements;
 
•    
the potential for political unrest, terrorism, hostilities or war;
 
•    
management communication and integration problems resulting from cultural differences and geographic dispersion; and
 
•    
multiple and possibly overlapping tax structures.
 
Product and service sales may be subject to foreign governmental regulations, which vary substantially from country to country. Further, we may be unable to keep up-to-date with changes in government requirements as they change from time to time. Failure to comply with these regulations could result in adverse affects to our business. In many foreign countries it is common for others to engage in business practices that are prohibited by our internal policies and procedures or U.S. regulations applicable to us. Although we implemented policies and procedures designed to ensure compliance with these laws and policies, there can be no assurance that all of our employees, contractors, channel partners and agents will comply with these laws and policies. Violations of laws or key control policies by our employees, contractors, channel partners or agents could result in delays in revenue recognition, financial reporting misstatements, fines, penalties, or the prohibition of the importation or exportation of our products and services and could have a material adverse effect on our business and results of operations.
 
We are subject to governmental export and import controls that could subject us to liability or impair our ability to compete in international markets.
 
Certain of our products are subject to U.S. export controls and may be exported outside the U.S. only with the required export license or through an export license exception, because we incorporate encryption technology into our products. If we were to fail to comply with U.S. export licensing, U.S. Customs regulations, U.S. economic sanctions and other laws, we could be subject to substantial civil and criminal penalties, including fines for the company and incarceration for responsible employees and managers, and the possible loss of export or import privileges. In addition, if our channel partners fail to obtain appropriate import, export or re-export licenses or permits, we may also be adversely affected, through reputational harm and penalties. Obtaining the necessary export license for a particular sale may be time-consuming, and may result in the delay or loss of sales opportunities.

17


 
Furthermore, U.S. export control laws and economic sanctions prohibit the shipment of certain products to U.S. embargoed or sanctioned countries, governments and persons. Even though we take precautions to prevent our product from being shipped to U.S. sanctions targets, our products could be shipped to those targets by our channel partners, despite such precautions. Any such shipment could have negative consequences including government investigations and penalties and in reputational harm. In addition, various countries regulate the import of certain encryption technology, including import permitting/licensing requirements, and have enacted laws that could limit our ability to distribute our products or could limit our customers' ability to implement our products in those countries. Changes in our products or changes in export and import regulations may create delays in the introduction of our products in international markets, prevent our customers with international operations from deploying our products globally or, in some cases, prevent the export or import of our products to certain countries, governments or persons altogether. Any change in export or import regulations, economic sanctions or related legislation, shift in the enforcement or scope of existing regulations, or change in the countries, governments, persons or technologies targeted by such regulations, could result in decreased use of our products by, or in our decreased ability to export or sell our products to, existing or potential customers with international operations. Any decreased use of our products or limitation on our ability to export or sell our products would likely adversely affect our business, financial condition and results of operations.
 
If we fail to comply with environmental requirements, our business, financial condition, operating results and reputation could be adversely affected.
 
We are subject to various environmental laws and regulations including laws governing the hazardous material content of our products and laws relating to the recycling of electrical and electronic equipment. The laws and regulations to which we are subject include the European Union, or EU, RoHS and the EU Waste Electrical and Electronic Equipment (WEEE) Directive as well as the implementing legislation of the EU member states. Similar laws and regulations have been passed or are pending in China, South Korea, Norway and Japan and may be enacted in other regions, including in the United States and we are, or may in the future be, subject to these laws and regulations.
 
The EU RoHS and the similar laws of other jurisdictions ban the use of certain hazardous materials such as lead, mercury and cadmium in the manufacture of electrical equipment, including our products. We have incurred costs to comply with these laws, including research and development costs, costs associated with assuring the supply of compliant components and costs associated with writing off noncompliant inventory. We expect to incur more of these costs in the future. With respect to the EU RoHS, we and our competitors rely on an exemption for lead in network infrastructure equipment. It is possible this exemption will be revoked in the near future. If revoked, if there are other changes to these laws (or their interpretation) or if new similar laws are passed in other jurisdictions, we may be required to reengineer our products to use components compatible with these regulations. This reengineering and component substitution could result in additional costs to us or disrupt our operations or logistics.
 
The EU has also adopted the WEEE Directive, which requires electronic goods producers to be responsible for the collection, recycling and treatment of such products. Although currently our EU International channel partners are responsible for the requirements of this directive as the importer of record in most of the European countries in which we sell our products, changes in interpretation of the regulations may cause us to incur costs or have additional regulatory requirements in the future to meet in order to comply with this directive, or with any similar laws adopted in other jurisdictions.
 
Our failure to comply with these and future environmental rules and regulations could result in reduced sales of our products, increased costs, substantial product inventory write-offs, reputational damage, penalties and other sanctions.
 
A portion of our revenue is generated by sales to government entities, which are subject to a number of challenges and risks.
 
Sales to U.S. and foreign federal, state and local governmental agency end-customers have accounted for a portion of our revenue in past periods, and we may in the future increase sales to government entities. Sales into government entities are subject to a number of risks. Selling to government entities can be highly competitive, expensive and time consuming, often requiring significant upfront time and expense without any assurance that we will win a sale. Government demand and payment for our products and services may be impacted by public sector budgetary cycles and funding authorizations, with funding reductions or delays adversely affecting public sector demand for our products. Most of our sales to government entities have been made indirectly through our distribution channel. Government entities may have contractual or other legal rights to terminate contracts with our distributors and resellers for convenience or due to a default, and any such termination may adversely impact our future results of operations. For example, if the distributor receives a significant portion of its revenue from sales to such governmental entity, the financial health of the distributor could be substantially harmed, which could negatively affect our future sales to such distributor. Governments routinely investigate and audit government contractors'

18


administrative processes, and any unfavorable audit could result in the government refusing to continue buying our products and services, a reduction of revenue or fines or civil or criminal liability if the audit uncovers improper or illegal activities. Any such penalties could adversely impact our results of operations in a material way. Finally, for purchases by the U.S. government, the government may require certain products to be manufactured in the United States and other high cost manufacturing locations, and we may not manufacture all products in locations that meet the requirements of the U.S. government.
 
False detection of viruses or security breaches or false identification of spam or spyware could adversely affect our business.
 
Our antivirus and our intrusion prevention services may falsely detect viruses or other threats that do not actually exist. This risk is heightened by the inclusion of a “heuristics” feature in our products, which attempts to identify viruses and other threats not based on any known signatures but based on characteristics or anomalies that may indicate that a particular item is a threat. When our end-customers enable the heuristics feature in our products, the risk of falsely identifying viruses and other threats significantly increases. These false positives, while typical in the industry, may impair the perceived reliability of our products and may therefore adversely impact market acceptance of our products. Also, our antispam and antispyware services may falsely identify emails or programs as unwanted spam or potentially unwanted programs, or alternatively fail to properly identify unwanted emails or programs, particularly as spam emails or spyware are often designed to circumvent antispam or spyware products. Parties whose emails or programs are blocked by our products may seek redress against us for labeling them as spammers or spyware, or for interfering with their business. In addition, false identification of emails or programs as unwanted spam or potentially unwanted programs may reduce the adoption of our products. If our system restricts important files or applications based on falsely identifying them as malware or some other item that should be restricted, this could adversely affect end-customers' systems and cause material system failures. Any such false identification of important files or applications could result in negative publicity, loss of end-customers and sales, increased costs to remedy any problem, and costly litigation.
 
If our internal network system is compromised by computer hackers, public perception of our products and services will be harmed.
 
We will not succeed unless the marketplace is confident that we provide effective network security protection. Because we provide network security products, we may be a more attractive target for attacks by computer hackers. Although we have not experienced significant damages from unauthorized access by a third-party of our internal network, if an actual or perceived breach of network security occurs in our internal systems it could adversely affect the market perception of our products and services. In addition, such a security breach could impair our ability to operate our business, including our ability to provide subscription and support services to our end-customers. If this happens, our revenue could decline and our business could suffer.
 
Our ability to sell our products is dependent on the quality of our technical support services, and our failure to offer high quality technical support services would have a material adverse effect on our sales and results of operations.
 
Once our products are deployed within our end-customers' networks, our end-customers depend on our technical support services, as well as the support of our channel partners, to resolve any issues relating to our products. If we or our channel partners do not effectively assist our customers in deploying our products, succeed in helping our customers quickly resolve post-deployment issues, and provide effective ongoing support, our ability to sell additional products and services to existing customers would be adversely affected and our reputation with potential customers could be damaged. Many enterprise, service provider and government entity end-customers require higher levels of support than smaller end-customers. If we fail to meet the requirements of the larger end-customers, it may be more difficult to execute on our strategy to increase our penetration with larger end-customers.
 
As a result, our failure to maintain high quality support services would have a material adverse effect on our business, financial condition and results of operations.
 
Changes in our provision for income taxes or adverse outcomes resulting from examination of our income tax returns could adversely affect our results.
 
Our provision for income taxes is subject to volatility and could be adversely affected by several factors, many of which are outside of our control, including:
 
•    
earnings being lower than anticipated in countries that have lower tax rates and higher than anticipated in countries that have higher tax rates;

19


 
•    
changes in the valuation of our deferred tax assets and liabilities;
 
•    
expiration of, or lapses in the research and development tax credit laws;
 
•    
transfer pricing adjustments including the effect of acquisitions on our intercompany research and development and legal structure;
 
•    
an increase in non-deductible expenses for tax purposes, including certain stock-based compensation expense, write-offs of acquired in-process research and development, and impairment of goodwill;
 
•    
tax costs related to intercompany realignments;
 
•    
tax assessments resulting from income tax audits or any related tax interest or penalties that could significantly affect our income tax provision for the period in which the settlement take place;
 
•    
a change in our decision to indefinitely reinvest foreign earnings;
 
•    
changes in accounting principles; or
 
•    
changes in tax laws and regulations including possible changes in the United States to the taxation of earnings of our foreign subsidiaries, and the deductibility of expenses attributable to foreign income, or the foreign tax credit rules, or changes to the United States income tax rate, which would necessitate a revaluation of our deferred tax assets and liabilities.
 
Significant judgment is required to determine the recognition and measurement attribute prescribed in ASC 740-10 (formerly referred to as Statement of Financial Accounting Standards (SFAS) Interpretation No. 48, Accounting for Uncertainty in Income Taxes-an interpretation of SFAS No. 109 (FIN 48)). In addition, ASC 740-10 applies to all income tax positions, including the potential recovery of previously paid taxes, which if settled unfavorably could adversely impact our provision for income taxes or additional paid-in capital. Further, as a result of certain of our ongoing employment and capital investment actions and commitments, our income in certain countries is subject to reduced tax rates and in some cases is wholly exempt from tax. Our failure to meet these commitments could adversely impact our provision for income taxes. In addition, we are subject to the continuous examination of our income tax returns by the Internal Revenue Service and other tax authorities. We regularly assess the likelihood of adverse outcomes resulting from these examinations to determine the adequacy of our provision for income taxes. There can be no assurance that the outcomes from these continuous examinations will not have an adverse effect on our results of operations.
 
Although we released our entire valuation allowance in fiscal 2009, we may in the future be required to establish a new valuation allowance. We will continue to assess the need for a valuation allowance on the deferred tax asset by evaluating both positive and negative evidence that may exist.
 
We are currently under audit by the Canada Revenue Agency for fiscal years 2006-2009 associated with our international transactions. The California Franchise Tax Board has notified us of their intent to examine our fiscal 2008 and 2009 California tax returns. The scope of the California Franchise Tax Board examinations is unclear at this time.
 
If the ultimate determination of income taxes assessed under the current Canadian or California audits or under audits being conducted, or to be conducted, in any of the other tax jurisdictions in which we operate results in an amount in excess of the tax provision we have recorded or reserved for, our operating results, cash flows and financial condition could be adversely affected.
 
Forecasting our estimated annual effective tax rate is complex and subject to uncertainty, and there may be material differences between our forecasted and actual tax rates.
 
Forecasts of our income tax position and effective tax rate are complex and subject to uncertainty because our income tax position for each year combines the effects of a mix of profits earned and losses incurred by us in various tax jurisdictions with a broad range of income tax rates, as well as changes in the valuation of deferred tax assets and liabilities, the impact of various accounting rules and changes to these rules and tax laws, the results of examinations by various tax authorities, and the impact of any acquisition, business combination or other reorganization or financing transaction. To forecast our global tax rate, we estimate our pre-tax profits and losses by jurisdiction and forecast our tax expense by jurisdiction. If the mix of profits and

20


losses, our ability to use tax credits, or effective tax rates by jurisdiction is different than those estimated, our actual tax rate could be materially different than forecasted, which could have a material impact on our results of business, financial condition and results of operations.
 
As a multinational corporation, we conduct our business in many countries and are subject to taxation in many jurisdictions. The taxation of our business is subject to the application of multiple and sometimes conflicting tax laws and regulations as well as multinational tax conventions. Our effective tax rate is highly dependent upon the geographic distribution of our worldwide earnings or losses, the tax regulations and tax holidays in each geographic region, the availability of tax credits and carryforwards, and the effectiveness of our tax planning strategies. The application of tax laws and regulations is subject to legal and factual interpretation, judgment and uncertainty. Tax laws themselves are subject to change as a result of changes in fiscal policy, changes in legislation, and the evolution of regulations and court rulings. Consequently, taxing authorities may impose tax assessments or judgments against us that could materially impact our tax liability and/or our effective income tax rate.
 
In addition, we may be subject to examination of our income tax returns by the Internal Revenue Service and other tax authorities. If tax authorities challenge the relative mix of U.S. and international income, our future effective income tax rates could be adversely affected. While we regularly assess the likelihood of adverse outcomes from such examinations and the adequacy of our provision for income taxes, there can be no assurance that such provision is sufficient and that a determination by a tax authority will not have an adverse effect on our business, financial condition and results of operations.
 
Our inability to acquire and integrate other businesses, products or technologies could seriously harm our competitive position.
 
In order to remain competitive, we may seek to acquire additional businesses, products, or technologies and intellectual property, such as patents. If we identify an appropriate acquisition candidate, we may not be successful in negotiating the terms of the acquisition, financing the acquisition, or effectively integrating the acquired business, product, technology or intellectual property into our existing business and operations. We may have difficulty incorporating acquired technologies, intellectual property or products with our existing product lines and maintaining uniform standards, controls, procedures and policies. Our due diligence may fail to identify all of the problems, liabilities or other shortcomings or challenges of an acquired business, product or technology, including issues with intellectual property, product quality or product architecture, regulatory compliance practices, revenue recognition or other accounting practices or employee or customer issues. In addition, any acquisitions we are able to complete may not be accretive to earnings and may not result in any synergies or other benefits we had expected to achieve, which could result in write-offs that could be substantial. Further, completing a potential acquisition and integrating acquired businesses, products, technologies or intellectual property will significantly divert management time and resources.
 
Our business is subject to the risks of warranty claims, product returns, product liability and product defects.
 
Our products are very complex and, despite testing prior to their release, have contained and may contain undetected defects or errors, especially when first introduced or when new versions are released. For example, one of our high-end product models has been experiencing a defect in limited deployments. Product errors have affected the performance of our products and could delay the development or release of new products or new versions of products, adversely affect our reputation and our end-customers' willingness to buy products from us, and adversely affect market acceptance or perception of our products. Any such errors or delays in releasing new products or new versions of products or allegations of unsatisfactory performance could cause us to lose revenue or market share, increase our service costs, cause us to incur substantial costs in redesigning the products, cause us to lose significant end-customers, subject us to liability for damages and divert our resources from other tasks, any one of which could materially and adversely affect our business, results of operations and financial condition. Our products must successfully interoperate with products from other vendors. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. The occurrence of hardware and software errors, whether or not caused by our products, could delay or reduce market acceptance of our products, and have an adverse effect on our business and financial performance, and any necessary revisions may cause us to incur significant expenses. The occurrence of any such problems could harm our business, financial condition and results of operations.
 
Although we have limitation of liability provisions in our standard terms and conditions of sale, they may not fully or effectively protect us from claims as a result of federal, state or local laws or ordinances or unfavorable judicial decisions in the United States or other countries. The sale and support of our products also entail the risk of product liability claims. We maintain insurance to protect against certain claims associated with the use of our products, but our insurance coverage may not adequately cover any claim asserted against us. In addition, even claims that ultimately are unsuccessful could result in our expenditure of funds in litigation and divert management's time and other resources.

21


 
Our business is subject to the risks of earthquakes, fire, power outages, floods and other catastrophic events, and to interruption by manmade problems such as terrorism.
 
A significant natural disaster, such as an earthquake, fire, a flood, or significant power outage could have a material adverse impact on our business, operating results and financial condition. Our corporate headquarters are located in the San Francisco Bay Area, a region known for seismic activity. In addition, natural disasters could affect our manufacturing vendors or logistics providers' ability to perform services such as manufacturing products on a timely basis and assisting with shipments on a timely basis. For example, our primary international logistics provider is located in Taiwan which is an area known for typhoons. In the event our or our service providers' information technology systems or manufacturing or logistics abilities are hindered by any of the events discussed above, shipments could be delayed, resulting in missing financial targets, such as revenue and shipment targets, for a particular quarter. In addition, acts of terrorism and other geo-political unrest could cause disruptions in our business or the business of our manufacturers, logistics providers, partners, or end-customers or the economy as a whole. Given our typical concentration of sales at each quarter end, any disruption in the business of our manufacturers, logistics providers, partners or end-customers that impacts sales at the end of our quarter could have a significant adverse impact on our quarterly results. All of the aforementioned risks may be augmented if the disaster recovery plans for us and our suppliers prove to be inadequate. To the extent that any of the above results in delays or cancellations of customer orders, or the delay in the manufacture, deployment or shipment of our products, our business, financial condition and results of operations would be adversely affected.
 
Risks Related to Our Industry
 
The network security market is rapidly evolving and the complex technology incorporated in our products makes them difficult to develop. If we do not accurately predict, prepare for and respond promptly to technological and market developments and changing end-customer needs, our competitive position and prospects will be harmed.
 
The network security market is expected to continue to evolve rapidly. Moreover, many of our end-customers operate in markets characterized by rapidly changing technologies and business plans, which require them to add numerous network access points and adapt increasingly complex enterprise networks, incorporating a variety of hardware, software applications, operating systems and networking protocols. In addition, computer hackers and others who try to attack networks employ increasingly sophisticated techniques to gain access to and attack systems and networks. The technology in our products is especially complex because it needs to effectively identify and respond to new and increasingly sophisticated methods of attack, while minimizing the impact on network performance. Additionally, some of our new products and enhancements may require us to develop new hardware architectures and ASICs that involve complex, expensive and time consuming research and development processes. Although the market expects rapid introduction of new products or product enhancements to respond to new threats, the development of these products is difficult and the timetable for commercial release and availability is uncertain and there can be long time periods between releases and availability of new products. We have in the past and may in the future experience unanticipated delays in the availability of new products and services and fail to meet previously announced timetables for such availability. For example, in the first quarter of fiscal 2009, we released a new model within our FortiGate product line and, after its initial release, we detected errors in the product that required us to redesign certain aspects of the product which delayed the availability of the product for one quarter and delayed our recognition of revenue from large orders that included such product until the following quarter when the product became available. If we do not quickly respond to the rapidly changing and rigorous needs of our end-customers by developing and releasing and making available on a timely basis new products and services or enhancements that can respond adequately to new security threats, our competitive position and business prospects will be harmed.
 
Our URL database for our Web filtering service may fail to keep pace with the rapid growth of URLs and may not categorize websites in accordance with our end-customers' expectations.
 
The success of our Web filtering service depends on the breadth and accuracy of our URL database. Although our URL database currently catalogs millions of unique URLs, it contains only a portion of the URLs for all of the websites that are available on the Internet. In addition, the total number of URLs and software applications is growing rapidly, and we expect this rapid growth to continue in the future. Accordingly, we must identify and categorize content for our security risk categories at an extremely rapid rate. Our database and technologies may not be able to keep pace with the growth in the number of websites, especially the growing amount of content utilizing foreign languages and the increasing sophistication of malicious code and the delivery mechanisms associated with spyware, phishing and other hazards associated with the Internet. Further, the ongoing evolution of the Internet and computing environments will require us to continually improve the functionality, features and reliability of our Web filtering function. Any failure of our databases to keep pace with the rapid growth and technological change of the Internet will impair the market acceptance of our products, which in turn will harm our business,

22


financial condition and results of operations.
 
In addition, our Web filtering service may not be successful in accurately categorizing Internet and application content to meet our end-customers' expectations. We rely upon a combination of automated filtering technology and human review to categorize websites and software applications in our proprietary databases. Our end-customers may not agree with our determinations that particular URLs should be included or not included in specific categories of our databases. In addition, it is possible that our filtering processes may place material that is objectionable or that presents a security risk in categories that are generally unrestricted by our users' Internet and computer access policies, which could result in such material not being blocked from the network. Conversely, we may miscategorize websites such that access is denied to websites containing information that is important or valuable to our customers. Any miscategorization could result in customer dissatisfaction and harm our reputation. Any failure to effectively categorize and filter websites according to our end-customers' and channel partners' expectations will impair the growth of our business.
 
If our new products and product enhancements do not achieve sufficient market acceptance, our results of operations and competitive position will suffer.
 
We spend substantial amounts of time and money to research and develop new products and enhanced versions of our existing products to incorporate additional features, improved functionality or other enhancements in order to meet our customers' rapidly evolving demands for network security in our highly competitive industry. When we develop a new product or an enhanced version of an existing product, we typically incur expenses and expend resources upfront to market, promote and sell the new offering. Therefore, when we develop and introduce new or enhanced products, they must achieve high levels of market acceptance in order to justify the amount of our investment in developing and bringing them to market.
 
Our new products or product enhancements could fail to attain sufficient market acceptance for many reasons, including:
 
•    
delays in releasing our new products or enhancements to the market;
 
•    
failure to accurately predict market demand in terms of product functionality and to supply products that meet this demand in a timely fashion;
 
•    
failure of our sales force and partners to focus on selling new products;
 
•    
inability to interoperate effectively with the networks or applications of our prospective end-customers;
 
•    
inability to protect against new types of attacks or techniques used by hackers;
 
•    
defects, errors or failures;
 
•    
negative publicity about their performance or effectiveness;
 
•    
introduction or anticipated introduction of competing products by our competitors;
 
•    
poor business conditions for our end-customers, causing them to delay IT purchases;
 
•    
easing of regulatory requirements around security; and
 
•    
reluctance of customers to purchase products incorporating open source software.
 
If our new products or enhancements do not achieve adequate acceptance in the market, our competitive position will be impaired, our revenue will be diminished and the effect on our operating results may be particularly acute because of the significant research, development, marketing, sales and other expenses we incurred in connection with the new product or enhancement.
 
Unless we continue to develop better market awareness of our company and our products, our revenue may not continue to grow.
 
We are a relatively new entrant in the network security market and we believe that we have not yet established sufficient market awareness of our participation in that market. Market awareness of our capabilities and products is essential to

23


our continued growth and our success in all of our markets, particularly for the large enterprise, service provider and government entities markets. If our marketing programs are not successful in creating market awareness of our company and products, our business, financial condition and results of operations will be adversely affected, and we will not be able to achieve sustained growth.
 
Demand for Unified Threat Management products may be limited by market perception that UTM products are inferior to network security solutions from multiple vendors.
 
Sales of most of our products depend on increased demand for UTM products. If the UTM market fails to grow as we anticipate, our business will be seriously harmed. Target customers may view UTM “all-in-one” solutions as inferior to security solutions from multiple vendors because of, among other things, their perception that UTM products provide security functions from only a single vendor and do not allow users to choose “best-of-breed” defenses from among the wide range of dedicated security applications available. Target customers might also perceive that, by combining multiple security functions into a single platform, UTM solutions create a “single point of failure” in their networks, which means that an error, vulnerability or failure of the UTM product may place the entire network at risk. In addition, the market perception that UTM solutions may be suitable only for small and medium sized businesses because UTM lacks the performance capabilities and functionality of other solutions may harm our sales to large enterprise, service provider, and government entity end-customers. If the foregoing concerns and perceptions become prevalent, even if there is no factual basis for these concerns and perceptions, or if other issues arise with the UTM market in general, demand for UTM products could be severely limited, which would limit our growth and harm our business, financial condition and results of operations. Further a successful and publicized targeted attack against us or another well known UTM vendor exposing a “single point of failure” could significantly increase these concerns and perceptions and may harm our business and results of operations.
 
We face intense competition in our market, especially from larger, better-known companies, and we may lack sufficient financial or other resources to maintain or improve our competitive position.
 
The market for network security products is intensely competitive and we expect competition to intensify in the future. Our competitors include networking companies such as Cisco Systems, Inc. and Juniper Networks, Inc., security vendors such as Check Point Software Technologies Ltd., McAfee, Inc. (pending acquisition by Intel, Inc.), and SonicWALL, Inc. (acquired by Thoma Bravo), and other point solution security vendors.
 
Many of our existing and potential competitors enjoy substantial competitive advantages such as:
 
•    
greater name recognition and longer operating histories;
 
•    
larger sales and marketing budgets and resources;
 
•    
broader distribution and established relationships with distribution partners and end-customers;
 
•    
access to larger customer bases;
 
•    
greater customer support resources;
 
•    
greater resources to make acquisitions;
 
•    
lower labor and development costs; and
 
•    
substantially greater financial, technical and other resources.
 
In addition, some of our larger competitors have substantially broader product offerings and leverage their relationships based on other products or incorporate functionality into existing products in a manner that discourages users from purchasing our products. These larger competitors often have broader product lines and market focus, are in a better position to withstand any significant reduction in capital spending by end-customers in these markets, and will therefore not be as susceptible to downturns in a particular market. Also, many of our smaller competitors that specialize in providing protection from a single type of network security threat are often able to deliver these specialized network security products to the market more quickly than we can. Some of our smaller competitors are using third-party chips designed to accelerate performance. Conditions in our markets could change rapidly and significantly as a result of technological advancements or continuing market consolidation. Our current and potential competitors may also establish cooperative relationships among themselves or with third parties that may further enhance their resources. In addition, current or potential competitors may be acquired by

24


third parties with greater available resources, such as Juniper's acquisition of NetScreen Technologies, Inc., Intel's pending acquisition of McAfee and Check Point's acquisition of Nokia's security appliance business. As a result of such acquisitions, our current or potential competitors might be able to adapt more quickly to new technologies and customer needs, devote greater resources to the promotion or sale of their products and services, initiate or withstand substantial price competition, take advantage of acquisition or other opportunities more readily or develop and expand their product and service offerings more quickly than we do. In addition, our competitors may bundle products and services competitive with ours with other products and services. Customers may accept these bundled products and services rather than separately purchasing our products and services. Due to budget constraints or economic downturns, organizations may be more willing to incrementally add solutions to their existing network security infrastructure from competitors than to replace it with our solutions. These competitive pressures in our market or our failure to compete effectively may result in price reductions, fewer customer orders, reduced revenue and gross margins and loss of market share.
 
If functionality similar to that offered by our products is incorporated into existing network infrastructure products, organizations may decide against adding our appliances to their network, which would have an adverse effect on our business.
 
Large, well-established providers of networking equipment such as Cisco Systems, Inc. and Juniper Networks, Inc. offer, and may continue to introduce, network security features that compete with our products, either in stand-alone security products or as additional features in their network infrastructure products. The inclusion of, or the announcement of an intent to include, functionality perceived to be similar to that offered by our security solutions in networking products that are already generally accepted as necessary components of network architecture may have an adverse effect on our ability to market and sell our products. Furthermore, even if the functionality offered by network infrastructure providers is more limited than our products, a significant number of customers may elect to accept such limited functionality in lieu of adding appliances from an additional vendor such as us. Many organizations have invested substantial personnel and financial resources to design and operate their networks and have established deep relationships with other providers of networking products, which may make them reluctant to add new components to their networks, particularly from other vendors such as us. In addition, an organization's existing vendors or new vendors with a broad product offering may be able to offer concessions that we are not able to match because we currently offer only network security products and have fewer resources than many of our competitors. If organizations are reluctant to add additional network infrastructure from new vendors or otherwise decide to work with their existing vendors, our business, financial condition and results of operations will be adversely affected.
 
Risks Related to Intellectual Property
 
Our proprietary rights may be difficult to enforce, which could enable others to copy or use aspects of our products without compensating us.
 
We rely primarily on patent, trademark, copyright and trade secrets laws, confidentiality procedures and contractual provisions to protect our technology. We purchased most of our issued U.S. patents and many of our pending U.S. patent applications from other entities. Valid patents may not issue from our pending applications, and the claims eventually allowed on any patents may not be sufficiently broad to protect our technology or products. Any issued patents may be challenged, invalidated or circumvented, and any rights granted under these patents may not actually provide adequate defensive protection or competitive advantages to us. Patent applications in the United States are typically not published until 18 months after filing, or, in some cases, not at all, and publications of discoveries in industry-related literature lag behind actual discoveries. We cannot be certain that we were the first to make the inventions claimed in our pending patent applications or that we were the first to file for patent protection. Additionally, the process of obtaining patent protection is expensive and time-consuming, and we may not be able to prosecute all necessary or desirable patent applications at a reasonable cost or in a timely manner. In addition, recent changes to the patent laws in the United States may bring into question the validity of certain software patents. As a result, we may not be able to obtain adequate patent protection or effectively enforce our issued patents.
 
Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy aspects of our products or obtain and use information that we regard as proprietary. We generally enter into confidentiality or license agreements with our employees, consultants, vendors and customers, and generally limit access to and distribution of our proprietary information. However, we cannot assure you that the steps taken by us will prevent misappropriation of our technology. Policing unauthorized use of our technology or products is difficult. In addition, the laws of some foreign countries do not protect our proprietary rights to as great an extent as the laws of the United States, and many foreign countries do not enforce these laws as diligently as government agencies and private parties in the United States. From time-to-time, legal action by us may be necessary to enforce our patents and other intellectual property rights, to protect our trade secrets, to determine the validity and scope of the proprietary rights of others or to defend against claims of infringement or invalidity. Such litigation could result in substantial costs and diversion of resources and could negatively affect our business, operating results and

25


financial condition. If we are unable to protect our proprietary rights (including aspects of our software and products protected other than by patent rights), we may find ourselves at a competitive disadvantage to others who need not incur the additional expense, time and effort required to create the innovative products that have enabled us to be successful to date.
 
Our products contain third-party open source software components, and failure to comply with the terms of the underlying open source software licenses could restrict our ability to sell our products.
 
Our products contain software modules licensed to us by third-party authors under “open source” licenses, including the GNU Public License (GPL), the GNU Lesser Public License (LGPL), the BSD License, the Apache License and others. From time-to-time, there have been claims against companies that distribute or use open source software in their products and services, asserting that open source software infringes the claimants' intellectual property rights. We could be subject to suits by parties claiming infringement of intellectual property rights in what we believe to be licensed open source software. Use and distribution of open source software may entail greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or other contractual protections regarding infringement claims or the quality of the code. Some open source licenses contain requirements that we make available source code for modifications or derivative works we create based upon the type of open source software we use. If we combine our proprietary software with open source software in a certain manner, we could, under certain open source licenses, be required to release the source code of our proprietary software to the public. This would allow our competitors to create similar products with lower development effort and time and ultimately could result in a loss of product sales for us.
 
Although we monitor our use of open source software to avoid subjecting our products to conditions we do not intend, the terms of many open source licenses have not been interpreted by United States courts, and there is a risk that these licenses could be construed in a way that could impose unanticipated conditions or restrictions on our ability to commercialize our products. In this event, we could be required to seek licenses from third parties to continue offering our products, to make generally available, in source code form, our proprietary code, to re-engineer our products, or to discontinue the sale of our products if re-engineering could not be accomplished on a timely basis, any of which could adversely affect our business, operating results and financial condition.
 
Claims by others that we infringe their proprietary technology could harm our business.
 
Patent and other intellectual property disputes are common in the network security industry. Third parties have asserted and may in the future assert claims of infringement of intellectual property rights against us. They may also assert such claims against our end-customers or channel partners whom we typically indemnify against claims that our products infringe the intellectual property rights of third parties. As the number of products and competitors in our market increases and overlaps occur, infringement claims may increase. Any claim of infringement by a third-party, even those without merit, could cause us to incur substantial costs defending against the claim and could distract our management from our business. In addition, future litigation may involve patent holding companies or other adverse patent owners who have no relevant product revenue and against whom our own patents may therefore provide little or no deterrence or protection.
 
Although third parties may offer a license to their technology, the terms of any offered license may not be acceptable and the failure to obtain a license or the costs associated with any license could cause our business, financial condition and results of operations to be materially and adversely affected. In addition, some licenses may be non-exclusive, and therefore our competitors may have access to the same technology licensed to us.
 
Alternatively, we may be required to develop non-infringing technology, which could require significant time, effort and expense and may ultimately not be successful. Furthermore, a successful claimant could secure a judgment or we may agree to a settlement that prevents us from distributing certain products or performing certain services or that requires us to pay substantial damages (including treble damages if we are found to have willfully infringed such claimant's patents or copyrights), royalties or other fees. Any of these events could seriously harm our business, financial condition and results of operations.
 
We have been involved in patent disputes in the past, are currently involved in several patent disputes, and likely will be involved in additional disputes in the future. In May 2004, Trend Micro Incorporated filed a complaint against us alleging that we infringed a Trend Micro patent related to antivirus software. The International Trade Commission, or ITC, subsequently instituted an investigation which resulted in an exclusion order and a cease and desist order prohibiting us from selling a broad array of our products in the United States. In January 2006, we settled the lawsuit with Trend Micro, and subsequently the ITC terminated its action and rescinded the orders. Pursuant to the settlement and license agreement, we initially paid Trend Micro $15.0 million. The settlement and license agreement provides for additional quarterly royalty payments, not expected to exceed 1% of our total revenue each quarter, through 2015. In November 2008, we filed a complaint against Trend Micro in the United

26


States District Court for the Northern District of California alleging, among other claims, that the patents that are the basis for the ongoing royalty payments are invalid and consequently that we have no contractual obligation to pay the royalties. Trend Micro moved to dismiss the case, and, in June 2009, the court dismissed the case without prejudice on procedural grounds, and we appealed the dismissal in July 2009. Based on the dispute, we ceased paying royalties under the settlement and license agreement. In August 2009, Trend Micro filed a complaint against us in the Superior Court of the State of California for Santa Clara County alleging breach of contract and seeking a declaratory judgment that we are obligated to make certain royalty payments to Trend Micro. In December 2009, we withdrew our appeal of the June 2009 dismissal by the United States District Court for the Northern District of California and filed a new complaint against Trend Micro in the United States District Court for the Northern District of California alleging, among other claims, that the patents that are the basis for the ongoing royalty payments are invalid and consequently that we have no contractual obligation to pay the royalties. In February 2010, Trend Micro filed demurrers in the state Superior Court action regarding Fortinet's affirmative defenses that Fortinet has no obligation to pay royalties because the Trend Micro patents are invalid or unenforceable. In March 2010, Trend Micro filed a motion to dismiss our new complaint that we filed in the United States District Court for the Northern District of California. In May 2010, the state Superior Court denied Trend Micro's demurrer in its entirety. Also in May 2010, the United States District Court for the Northern District of California denied Trend Micro's motion to dismiss without prejudice and stayed the action before that court pending the conclusion of the state Superior Court action. In January 2011, in response to petitions for re-examination we filed with the U.S. Patent and Trademark Office ("PTO"), the PTO issued an initial office action that Trend Micro's patents at issue were invalid. In January 2011, we filed a motion to stay the Superior Court case pending final resolution at the PTO. Our motion to stay is currently pending. At this stage it is not possible to predict the outcome. An adverse outcome in this dispute could result in accelerated royalty payments and additional damages.
 
As discussed in "Item 3-Legal Proceedings," from time to time we are subject to lawsuits claiming patent infringement and there are lawsuits claiming patent infringement currently pending. If we are unsuccessful in defending any such claims, our operating results and financial condition and results may be materially and adversely affected. For example, we may be required to pay substantial damages and could be prevented from selling certain of our products. In addition to the lawsuits described in "Legal Proceedings," several other non-practicing patent holding companies have sent us letters proposing that we license certain of their patents, and, given this and the proliferation of lawsuits in our industry and other similar industries by both non-practicing entities and operating entities, we expect that we will be sued for patent infringement in the future, regardless of the merits of any such lawsuits. The cost to defend such lawsuits and any adverse result in such lawsuits could have a material adverse effect on our results of operations and financial condition.
 
We rely on the availability of third-party licenses.
 
Many of our products include software or other intellectual property licensed from third parties. It may be necessary in the future to renew licenses relating to various aspects of these products or to seek new licenses for existing or new products. There can be no assurance that the necessary licenses would be available on acceptable terms, if at all. The inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, or the need to engage in litigation regarding these matters, could result in delays in product releases until equivalent technology can be identified, licensed or developed, if at all, and integrated into our products and may have a material adverse effect on our business, operating results, and financial condition. Moreover, the inclusion in our products of software or other intellectual property licensed from third parties on a nonexclusive basis could limit our ability to differentiate our products from those of our competitors.
 
Risks Related to Ownership of our Common Stock
 
As a public company, we are subject to compliance initiatives that will require substantial time from our management and result in significantly increased costs that may adversely affect our operating results and financial condition.
 
The Sarbanes-Oxley Act of 2002, the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, as well as other rules implemented by the SEC and The NASDAQ Stock Market, impose various requirements on public companies, including requiring changes in corporate governance practices. These and proposed corporate governance laws and regulations under consideration may further increase our compliance costs. If compliance with these various legal and regulatory requirements diverts our management's attention from other business concerns, it could have a material adverse effect on our business, financial condition and results of operations. The Sarbanes-Oxley Act requires, among other things, that we assess the effectiveness of our internal control over financial reporting annually and disclosure controls and procedures quarterly. We completed our evaluation of our internal controls over financial reporting for fiscal 2010 as required by Section 404 of the Sarbanes-Oxley Act of 2002. Although our assessment, testing and evaluation resulted in our conclusion that as of December 31, 2010, our internal controls over financial reporting were effective, we cannot predict the outcome of our testing in future periods. If our internal controls or disclosure controls are ineffective in future periods, our business and reputation could be harmed. We may incur additional expenses and commitment of management's time in connection with further evaluations, both

27


of which could materially increase our operating expenses and accordingly reduce our operating results.
 
Changes in financial accounting standards may cause adverse unexpected fluctuations and affect our reported results of operations.
 
A change in accounting standards or practices and varying interpretations of existing accounting pronouncements, such as changes to standards related to revenue recognition recently adopted by the FASB, the increased use of fair value measure, the recent proposed change to revenue recognition, lease accounting, financial instrument accounting standards, and the potential requirement that U.S. registrants prepare financial statements in accordance with International Financial Reporting Standards (“IFRS”), could have a significant effect on our reported financial results or the way we conduct our business.
 
If securities or industry analysts stop publishing research or publish inaccurate or unfavorable research about our business, our stock price and trading volume could decline.
 
The trading market for our common stock will depend in part on the research and reports that securities or industry analysts publish about us or our business. If we do not maintain adequate research coverage or if one or more of the analysts who covers us downgrades our stock or publishes inaccurate or unfavorable research about our business, our stock price would likely decline. If one or more of these analysts ceases coverage of our company or fails to publish reports on us regularly, demand for our stock could decrease, which could cause our stock price and trading volume to decline.
 
The trading price of our common stock is likely to be volatile.
 
The market price of our common stock is subject to wide fluctuations in response to, among other things, the risk factors described in this periodic report, and other factors such as rumors or fluctuations in the valuation of companies perceived by investors to be comparable to us.
 
Furthermore, the stock markets have experienced price and volume fluctuations that have affected and continue to affect the market prices of equity securities of many companies. These fluctuations often have been unrelated or disproportionate to the operating performance of those companies. These broad market and industry fluctuations, as well as general economic, political, and market conditions, such as recessions, interest rate changes or international currency fluctuations, may negatively affect the market price of our common stock.
 
In the past, many companies that have experienced volatility in the market price of their stock have been subject to securities class action litigation. We may be the target of this type of litigation in the future. Securities litigation against us could result in substantial costs and divert our management's attention from other business concerns, which could seriously harm our business.
 
Our failure to raise additional capital or generate the significant capital necessary to expand our operations and invest in new products could reduce our ability to compete and could harm our business.
 
We expect that our existing cash and cash equivalents will be sufficient to meet our anticipated cash needs for at least the next twelve months. After that, we may need to raise additional funds, and we may not be able to obtain additional debt or equity financing on favorable terms, if at all. If we raise additional equity financing, our stockholders may experience significant dilution of their ownership interests and the per-share value of our common stock could decline. Furthermore, if we engage in debt financing, the holders of debt would have priority over the holders of common stock and we may be required to accept terms that restrict our ability to incur additional indebtedness. We may also be required to take other actions that would otherwise be in the interests of the stockholders and force us to maintain specified liquidity or other ratios, any of which could harm our business, operating results and financial condition. If we need additional capital and cannot raise it on acceptable terms, we may not be able to, among other things:
 
•    
develop or enhance our products and services;
 
•    
continue to expand our sales and marketing and research and development organizations;
 
•    
acquire complementary technologies, products or businesses;
 
•    
expand operations, in the United States or internationally;
 
•    
hire, train and retain employees; or

28


 
•    
respond to competitive pressures or unanticipated working capital requirements.
 
Our failure to do any of these things could seriously harm our business, financial condition and results of operations.
 
Concentration of ownership among our existing executive officers, directors and their affiliates may prevent new investors from influencing significant corporate decisions.
 
As of February 17, 2011, our executive officers, directors and their affiliates beneficially owned, in the aggregate, approximately 21.1% of our outstanding common stock. As a result, these stockholders are able to exercise a significant level of control over all matters requiring stockholder approval, including the election of directors, amendment of our certificate of incorporation and approval of significant corporate transactions. This control could have the effect of delaying or preventing a change of control of our company or changes in management and will make the approval of certain transactions difficult or impossible without the support of these stockholders.
 
Anti-takeover provisions contained in our certificate of incorporation and bylaws, as well as provisions of Delaware law, could impair a takeover attempt.
 
Our certificate of incorporation, bylaws and Delaware law contain provisions that could have the effect of rendering more difficult, delaying or preventing an acquisition deemed undesirable by our board of directors. Our corporate governance documents include provisions:
 
•    
creating a classified board of directors whose members serve staggered three-year terms;
 
•    
authorizing “blank check” preferred stock, which could be issued by the board without stockholder approval and may contain voting, liquidation, dividend and other rights superior to our common stock;
 
•    
limiting the liability of, and providing indemnification to, our directors and officers;
 
•    
limiting the ability of our stockholders to call and bring business before special meetings;
 
•    
requiring advance notice of stockholder proposals for business to be conducted at meetings of our stockholders and for nominations of candidates for election to our board of directors;
 
•    
controlling the procedures for the conduct and scheduling of board and stockholder meetings; and
 
•    
providing the board of directors with the express power to postpone previously scheduled annual meetings and to cancel previously scheduled special meetings.
 
These provisions, alone or together, could delay or prevent hostile takeovers and changes in control or changes in our management.
 
As a Delaware corporation, we are also subject to provisions of Delaware law, including Section 203 of the Delaware General Corporation law, which prevents some stockholders holding more than 15% of our outstanding common stock from engaging in certain business combinations without approval of the holders of a substantial majority of all of our outstanding common stock.
 
Any provision of our certificate of incorporation or bylaws or Delaware law that has the effect of delaying or deterring a change in control could limit the opportunity for our stockholders to receive a premium for their shares of our common stock, and could also affect the price that some investors are willing to pay for our common stock.
 
ITEM 1B.     Unresolved Staff Comments
 
Not applicable.
 
ITEM 2.     Properties
 
Our corporate headquarters are located at 1090 Kifer Road, Sunnyvale, California in an office consisting of approximately 107,000 square feet. The lease for this office expires in September 2013. We sublease approximately 23,000

29


square feet of this space pursuant to a sublease that expires in December 2011.
 
In addition to our headquarters, we lease approximately 14,000 square feet of data center space and a total of approximately 69,000 square feet of office space in several buildings in Burnaby, Canada under various leases that expire between January 2012 and July 2015, approximately 16,000 square feet of office space in Ottawa, Canada under a lease that expires in February 2014, approximately 19,000 square feet of office space in Sophia, France under a lease that expires in December 2013, and approximately 26,000 square feet of office space in Beijing, China under a lease that expires in August 2011. We also lease sales and support offices in Australia, Austria, Belgium, Egypt, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Korea, Malaysia, Mexico, the Netherlands, New Zealand, Philippines, Poland, Russia, Saudi Arabia, Singapore, Spain, Sweden, Switzerland, Taiwan, Thailand, United Arab Emirates, and the United Kingdom. We believe that our existing properties are in good condition and are sufficient and suitable for the conduct of our business.
 

30


ITEM 3.     Legal Proceedings
 
In August 2009, Trend Micro Incorporated (“Trend Micro”) filed a complaint against us in the Superior Court of the State of California for Santa Clara County alleging breach of contract and seeking a declaratory judgment that we are obligated to make certain royalty payments to Trend Micro pursuant to a settlement and license agreement entered into in January 2006. We maintain that the patents that are the basis for the royalty payments are invalid and consequently that we have no contractual obligation to pay the royalties. We filed an action in the Northern District of California that is stayed pending the resolution of the state court action. We have continued to accrue expense based on the quarterly royalties provided for in the settlement and license agreement. In January 2011, in response to petitions for re-examination we filed with the U.S. Patent and Trademark Office (“PTO”), the PTO issued an initial office action that the Trend Micro patents allegedly forming the basis for the royalty payments are invalid. In January 2011, we filed a motion to stay the state court case pending final resolution at the PTO. Our motion to stay is currently pending.
 
In January 2009, we filed a complaint against Palo Alto Networks, Inc. (“PAN”) in the United States District Court for the Northern District of California alleging, among other claims, patent infringement. In November 2010, we filed a second complaint against PAN in the United States District Court for the Northern District of California alleging infringement of three additional patents. On January 20, 2011, we entered into a settlement and patent license agreement with PAN pursuant to which we agreed to license certain asserted patents and certain related patents in return for an up-front payment by PAN and ongoing quarterly payments over three years. The parties also agreed upon a three year covenant not to sue for patent related claims.
 
In August 2009, Enhanced Security Research, LLC and Security Research Holdings LLC (collectively “ESR”), a non-practicing entity, filed a complaint against us in the United States District Court for the District of Delaware alleging infringement by us and other defendants of two patents. In June 2010, the Court granted our motion to stay pending the outcome of reexamination proceedings on both asserted patents. There is a related action that was dismissed by the Court, and that dismissal has been appealed by ESR to the Federal Circuit.
 
In July 2010, Network Protection Sciences, LLC, a non-practicing entity, filed a complaint in the United States District Court for the Eastern District of Texas alleging patent infringement by us and other defendants. Currently the case is in the early stages.
 
In September 2010, WordCheck Tech, LLC ("WordCheck"), a non-practicing entity, filed a complaint in the United States District Court for the Eastern District of Texas alleging patent infringement by us and numerous other defendants. In January 2011, we entered a settlement and license agreement with WordCheck pursuant to which WordCheck dismissed the litigation against us in return for an immaterial payment by us to WordCheck.
 
In April 2010, an individual, a former stockholder of Fortinet, filed a class action lawsuit against us in the Superior Court of the State of California for the County of Los Angeles alleging violation of various California Corporations' Code sections and related tort claims alleging misrepresentation and breach of fiduciary duty regarding the 2009 repurchase by Fortinet of shares of its stock while we were a privately-held company. In September 2010, the Court granted our motion to transfer the case to the California Superior Court for Santa Clara County.
 
In addition to the above matters, we are subject to other litigation in the ordinary course of business. The results of legal proceedings cannot be predicted with certainty. If we do not prevail in any of these legal matters, our operating results may be materially affected. At this time, we are unable to estimate the financial impact these actions will likely have on us.
 
ITEM 4.     (Removed and Reserved)
 
Part II
 
ITEM 5.     Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities
 
Our common stock is traded on The NASDAQ Global Select Market under the symbol “FTNT” since our initial public offering on November 18, 2009. Prior to that time, there was no public market of our common stock. The following table sets forth, for the time periods indicated, the high and low closing sales price of our common stock as reported on The NASDAQ Global Select Market.

31


 
High ($)
 
Low ($)
Fourth Quarter 2010
33.46
 
 
24.08
 
Third Quarter 2010
25.21
 
 
16.00
 
Second Quarter 2010
18.63
 
 
15.00
 
First Quarter 2010
20.11
 
 
15.69
 
Fourth Quarter 2009 (from November 18, 2009)
18.36
 
 
16.55
 
 
Holders of Record
 
As of February 17, 2011, there were 131 holders of record of our common stock. A substantially greater number of holders of our common stock are “street name” or beneficial holders, whose shares are held by banks, brokers and other financial institutions.
 
Dividends
 
We have never declared or paid cash dividends on our capital stock. We intend to retain all available funds and any future earnings to support the operation of and to finance the growth and development of our business. We do not anticipate paying any cash dividends in the foreseeable future. Any future determination to declare cash dividends will be made at the discretion of our board of directors and will depend on our financial condition, operating results, capital requirements, general business conditions and other factors that our board of directors may deem relevant.
 
Stock Performance Graph
 
This performance graph shall not be deemed “filed” for purposes of Section 18 of the Securities Exchange Act of 1934, as amended (the "Exchange Act"), or incorporated by reference into any filing of Fortinet under the Securities Act of 1933, as amended, or the Exchange Act, except as shall be expressly set forth by specific reference in such filing.
 
The following graph shows a comparison from November 18, 2009 through December 31, 2010, of the cumulative total return for our common stock, the NASDAQ Composite Index, and the NASDAQ Computer Index. Such returns are based on historical results and are not intended to suggest future performance. Data for The NASDAQ Composite Index and The NASDAQ Computer Index assume reinvestment of dividends. We have never declared or paid cash dividends on our capital stock nor do we anticipate paying any such cash dividends in the foreseeable future.

32


 
COMPARISON OF CUMULATIVE TOTAL RETURN*
Among Fortinet, Inc., The NASDAQ Composite Index and
The NASDAQ Computer Index
 
 
_______________________
* $100 invested on 11/18/09 in stock or index, including reinvestment of dividends.
 
Sales of Unregistered Securities
 
In October 2010, we issued 83,546 shares of our common stock in connection with a net exercise of a warrant to purchase 120,000 shares of our common stock with an exercise price of $7.47 per share.  We believe this transaction was exempt from the registration requirements of the Securities Act of 1933, as amended, in reliance on Section 4(2) thereof, as a transaction by an issuer not involving a public offering.
 
Purchases of Equity Securities by the Issuer and Affiliated Purchasers
 
None.
 

33


ITEM 6.     Selected Financial Data
 
You should read the following selected consolidated historical financial data below in conjunction with the section titled “Management’s Discussion and Analysis of Financial Condition and Results of Operations” and the consolidated financial statements, related notes and other financial information included elsewhere in this Annual Report on Form 10-K. The selected financial data in this section is not intended to replace the financial statements and is qualified in its entirety by the consolidated financial statements and related notes thereto included elsewhere in this Annual Report on Form 10-K.
 
We made the decision in the first quarter of 2009 to change our financial reporting periods from a fiscal to calendar basis. This change was implemented in the third quarter of 2009 upon completion of required system changes. Accordingly, commencing in the third quarter of fiscal 2009, we began operating and reporting financial results on a calendar quarter and year basis. Our third quarter of fiscal 2009 ended on September 30, 2009, and our fiscal year 2009 ended on December 31, 2009. This transition had the effect of increasing the number of days in our twelve months ended December 31, 2009 by four days. In 2005, we adopted a fiscal year that ends on the Sunday closest to December 31 of each year. Our 2006, 2007 and 2008 fiscal years ended on December 31, 2006, December 30, 2007 and December 28, 2008, respectively. Prior to the third quarter of fiscal 2009, our interim fiscal quarters ended on the Sunday closest to March 31, June 30 and September 30 of each year.
 
 

34


 
Fiscal Year (1)
 
2010
 
2009
 
2008
 
2007
 
2006
 
($ amounts in 000's, except per share amounts)
Consolidated Statement of Operations Data:
 
 
 
 
 
 
 
 
 
Revenue:
 
 
 
 
 
 
 
 
 
Product
135,140
 
 
98,686
 
 
94,587
 
 
70,131
 
 
59,469
 
Services
172,046
 
 
139,172
 
 
105,292
 
 
74,152
 
 
39,590
 
Ratable product and services
17,510
 
 
14,257
 
 
11,912
 
 
11,083
 
 
24,407
 
Total revenue
324,696
 
 
252,115
 
 
211,791
 
 
155,366
 
 
123,466
 
Cost of revenue:
 
 
 
 
 
 
 
 
 
Product (2)
51,944
 
 
42,166
 
 
41,397
 
 
35,948
 
 
24,166
 
Services (2)
26,967
 
 
22,265
 
 
19,441
 
 
15,941
 
 
9,496
 
Ratable product and services
6,295
 
 
5,544
 
 
4,634
 
 
4,763
 
 
7,302
 
Total cost of revenue
85,206
 
 
69,975
 
 
65,472
 
 
56,652
 
 
40,964
 
Gross profit
 
 
 
 
 
 
 
 
 
Product
83,196
 
 
56,520
 
 
53,190
 
 
34,183
 
 
35,303
 
Services
145,079
 
 
116,907
 
 
85,851
 
 
58,211
 
 
30,094
 
Ratable product and services
11,215
 
 
8,713
 
 
7,278
 
 
6,320
 
 
17,105
 
Total gross profit
239,490
 
 
182,140
 
 
146,319
 
 
98,714
 
 
82,502
 
Operating expenses:
 
 
 
 
 
 
 
 
 
Research and development (2)
49,801
 
 
42,195
 
 
37,035
 
 
27,588
 
 
21,446
 
Sales and marketing (2)
111,968
 
 
96,291
 
 
87,717
 
 
72,159
 
 
54,056
 
General and administrative (2)
22,380
 
 
18,320
 
 
16,640
 
 
20,544
 
 
12,997
 
Total operating expenses
184,149
 
 
156,806
 
 
141,392
 
 
120,291
 
 
88,499
 
Operating income (loss)
55,341
 
 
25,334
 
 
4,927
 
 
(21,577
)
 
(5,997
)
Interest income
1,815
 
 
1,981
 
 
2,614
 
 
3,507
 
 
2,376
 
Other income (expense), net
(815
)
 
198
 
 
1,710
 
 
(1,991
)
 
(503
)
Income (loss) before income taxes
56,341
 
 
27,513
 
 
9,251
 
 
(20,061
)
 
(4,124
)
Provision for (benefit from) income taxes
15,096
 
 
(32,666
)
 
1,888
 
 
1,781
 
 
1,220
 
Net income (loss)
41,245
 
 
60,179
 
 
7,363
 
 
(21,842
)
 
(5,344
)
Net income (loss) per share (3) :
 
 
 
 
 
 
 
 
 
Basic
0.59
 
 
1.93
 
 
0.02
 
 
(1.13
)
 
(0.28
)
Diluted
0.53
 
 
0.78
 
 
0.02
 
 
(1.13
)
 
(0.28
)
Weighted-average shares outstanding:
 
 
 
 
 
 
 
 
 
Basic
70,363
 
 
26,334
 
 
20,017
 
 
19,276
 
 
18,861
 
Diluted
78,203
 
 
65,219
 
 
26,642
 
 
19,276
 
 
18,861
 
________________________
(1)    
Our fiscal years ended on December 31, 2010December 31, 2009December 28, 2008, December 30, 2007 and December 31, 2006.

35


(2)    
Includes stock-based compensation expense as follows:
 
 
 
Fiscal Year
 
2010
 
2009
 
2008
 
2007
 
2006
 
($ amounts in 000's)
Cost of product revenue
101
 
 
102
 
 
67
 
 
553
 
 
99
 
Cost of services revenue
929
 
 
658
 
 
400
 
 
416
 
 
52
 
Research and development
2,339
 
 
1,963
 
 
1,049
 
 
1,452
 
 
135
 
Sales and marketing
3,810
 
 
3,020
 
 
2,512
 
 
3,928
 
 
354
 
General and administrative
2,136
 
 
1,718
 
 
1,271
 
 
2,983
 
 
414
 
Total stock-based compensation
9,315
 
 
7,461
 
 
5,299
 
 
9,332
 
 
1,054
 
 
(3)    
Amounts related to 2008 have been corrected. See Note 7 to Consolidated Financial Statements.
 
 
As of Fiscal Year End
2010
 
2009
 
2008
 
2007
 
2006
($ amounts in 000's)
Consolidated Balance Sheet Data:
 
 
 
 
 
 
 
 
 
Cash, cash equivalents and investments
387,460
 
 
260,314
 
 
124,190
 
 
90,161
 
 
64,041
 
Working capital
201,776
 
 
161,652
 
 
38,193
 
 
12,862
 
 
12,399
 
Total assets
545,422
 
 
387,213
 
 
199,105
 
 
145,192
 
 
109,311
 
Convertible preferred stock
 
 
 
 
94,368
 
 
94,368
 
 
94,368
 
Common stock including treasury stock and additional paid-in capital
249,000
 
 
201,340
 
 
20,854
 
 
13,438
 
 
4,087
 
Total stockholders’ equity (deficit)
232,454
 
 
142,452
 
 
(5,229
)
 
(18,925
)
 
(7,217
)
 

36


ITEM 7.     Management’s Discussion and Analysis of Financial Condition and Results of Operations
 
In addition to historical information, this Annual Report on Form 10-K contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements include, among other things, statements concerning our expectations regarding:
 
•    
the continued realization of efficiency gains in our sales and marketing organization as well as efficiency gains in our overall headcount measured by revenue per employee;
 
•    
growth in our high-end business and further penetration in certain verticals;
 
•    
the significance of stock compensation as an expense;
 
•    
the proportion of our revenue that consists of our product and service revenues and future trends with respect to service revenue as we renew existing services contracts and expands our customer base;
 
•    
our royalty payments to Trend Micro;
 
•    
the impact of our product innovation strategy;
 
•    
trends in product revenues, costs of services revenue, service gross margin and overall gross margin;
 
•    
trends in our operating expenses, including personnel costs, research and development expense, sales and marketing expense and general and administrative expense;
 
•    
investments in research and development and sales and marketing staff to address market opportunities and to position ourselves for future growth;
 
•    
the impact of seasonality on our business;
 
•    
the sufficiency of our existing cash and cash equivalents to meet our cash needs for at least the next 12 months; and
 
•    
the impact of inflation and foreign currency exchange rates;
 
as well as other statements regarding our future operations, financial condition and prospects and business strategies. These forward-looking statements are subject to certain risks and uncertainties that could cause our actual results to differ materially from those reflected in the forward-looking statements. Factors that could cause or contribute to such differences include, but are not limited to, those discussed in this Annual Report on Form 10-K and, in particular, the risks discussed under the heading “Risk Factors” in Item 1A of this Annual Report on Form 10-K and those discussed in other documents we file with the Securities and Exchange Commission. We undertake no obligation to revise or publicly release the results of any revision to these forward-looking statements. Given these risks and uncertainties, readers are cautioned not to place undue reliance on such forward-looking statements.
 
Business Overview
 
We provide network security solutions, which enable broad, integrated and high performance protection against dynamic security threats while simplifying the IT security infrastructure for enterprises, service providers and government entities worldwide. As of December 31, 2010, we had shipped over 675,000 appliances to more than 5,000 channel partners and to more than 100,000 end-customers worldwide, including a majority of the 2010 Fortune Global 100.
 
Our core UTM product line of FortiGate appliances ships with a set of security and networking capabilities, including firewall, VPN, antivirus, intrusion prevention, application control, Web filtering, antispam and WAN acceleration functionality. We derive a substantial majority of product sales from our FortiGate appliances, which range from the FortiGate-30, designed for small businesses and branch offices, to the FortiGate-5000 series for large enterprises and service providers. Our UTM solution also includes our FortiGuard security subscription services, which end-customers can subscribe to in order to obtain access to dynamic updates to the antivirus, intrusion prevention, Web filtering and antispam functionality included in our appliances. End-customers can also choose to purchase FortiCare technical support services for our products. We complement our core FortiGate product line with other appliances and software that offer additional protection from

37


security threats to other critical areas of the enterprise, such as messaging, Web-based traffic and databases, and employee computers or handheld devices. Sales of these complimentary products have grown in recent quarters, although these products still represent less than 10% of our total revenue. During the fourth quarter of fiscal 2010, we began shipping virtual appliances for our FortiGate and FortiManager product lines, which help secure the end-customer's "cloud-based" network infrastructures with the same functionality as the traditional physical appliance in their respective product lines.
 
Fiscal 2010 was our first full year as a public company, following our initial public offering in November 2009. We believe the greater visibility and brand recognition derived from being a public company, combined with success in selling to the enterprise and service provider customers and new product introductions, served as contributors to the acceleration in our business during fiscal 2010. Sales of FortiGate products have generally been balanced across entry-level (FortiGate-30 to -100 series), mid-range (FortiGate-200 to -800 series) and high-end (FortiGate-1000 to -5000 series) models with each product category representing approximately one-third of FortiGate sales, with some degree of variability from year to year and between quarters. During fiscal 2010 we executed well against our strategy to grow the high-end segment of our business, consisting of sales to large enterprises, service providers and telecommunications companies. The percentage of our FortiGate related billings from the high-end category increased to 34% in fiscal 2010 from 30% in fiscal 2009, while the entry-level category decreased from 38% to 35%, and the mid-range category remained relatively flat over the same period.
 
We also believe continued product innovation has strengthened our technology advantage as evidenced by the introduction of several noteworthy new FortiGate appliance models such as the FG-60C, FG-3040B, and FG-3950B. During fiscal 2010 we also made a significant investment in our salesforce to expand our global presence both geographically as well as by industry segment. We believe these factors have allowed us to penetrate into larger enterprise and service provider accounts as evidenced by the increase in the number of deals involving sales greater than $100,000 and a substantial increase in the number of deals greater than $250,000 and $500,000 compared to fiscal 2009.
 
Continuing to grow our enterprise and high-end business will remain a strategic priority in fiscal 2011, as we continue to focus on further penetrating the financial services, healthcare, federal government and service provider verticals, which tend to purchase our mid-range and high-end products. Though we are a global, geographically diversified business, with 62% of our total revenue generated outside of the Americas region in fiscal 2010, we see opportunities to further expand our geographic presence across all regions. We intend to continue to invest in sales and research and development staff to address these opportunities.
 
Billings, a non-GAAP financial measure that we define as total revenue plus the change in deferred revenue (further described under "Non-GAAP Financial Measures"), were $375.4 million, an increase of 33% compared to fiscal 2009. Total revenue was $324.7 million for fiscal 2010, an increase of 29% compared to fiscal 2009. Product revenue was $135.1 million, an increase of 37% compared to fiscal 2009, and a greater percentage of total revenue (42% in fiscal 2010, compared to 39% in fiscal 2009). A factor in the product revenue growth was the introduction of new products over the past year, including some non-FortiGate products. Services revenue in fiscal 2010 was $172.0 million, an increase of 24% compared to fiscal 2009. Services revenue is important to our future revenue and profitability as it provides a source of recurring revenue for us, representing 53% and 55% of total revenue for fiscal 2010 and 2009, respectively. Ratable product and services revenue in fiscal 2010 was $17.5 million, an increase of 23% compared to fiscal 2009.
 
For fiscal 2010, $124.0 million, or 38%, of our total revenue was generated from the Americas, representing an increase of 34% from fiscal 2009. Europe, Middle East and Africa ("EMEA") generated $121.6 million, or 38%, of our total revenue during fiscal 2010, representing an increase of 27% from fiscal 2009. Asia Pacific and Japan ("APAC") generated $79.1 million, or 24%, of our total revenue during fiscal 2010, representing an increase of 24% from fiscal 2009.
 
In fiscal 2010, we experienced increased leverage from our prior investments in our sales and marketing organization, combined with our continued focus on effectively managing related expenses, as evidenced by the fact that sales and marketing expenses increased 16% from fiscal 2009, while our revenue increased 29% from fiscal 2009 (as discussed under "Results of Operations" below). We are also seeing improvements in productivity and efficiencies in our overall headcount as our annualized fiscal 2010 revenue per employee, defined as revenue divided by average headcount, reached $254,000, up from $217,000 for fiscal 2009. Although headcount increased during fiscal 2010 from 1,223 at the end of fiscal 2009 to 1,336, our pace of hiring was slower than originally targeted for fiscal 2010, as it was a challenge to hire qualified sales and technical staff as quickly as we had anticipated due in part to the competitive landscape, the degree of specialized security expertise required, and increased turnover as the business climate improved within our industry.
 
Our Business Model
 
Our sales strategy is based on a distribution model whereby we primarily sell our products and services directly to

38


distributors who sell to resellers and service providers, who, in turn, sell to our end-customers. In certain cases, we sell directly to government-focused resellers, large service providers and major systems integrators, who have significant purchasing power and unique customer deployment requirements. Typically, FortiGuard security subscription services and FortiCare technical support services are purchased along with our appliances. We invoice at the time of our sale for the total price of the products and subscription and support services, and the invoice generally becomes payable within 30 to 90 days. We generally recognize product revenue up-front but defer revenue for the sale of new and renewal subscription and support services contracts. We recognize the related services revenue over the service period, which is typically one year from the date the end-customer registers for these services (the date on which the services can first be used by the customer); although, it could be longer as we are experiencing growth in sales of multi-year support and subscription contracts. Sales of new and renewal services increase our deferred revenue balance, which contributes significantly to our positive cash flow from operations.
 
Key Metrics
 
We monitor the key financial metrics set forth below to help us evaluate growth trends, establish budgets, measure the effectiveness of our sales and marketing efforts and assess operational efficiencies. Our total deferred revenue increased by $50.7 million from $201.9 million at December 31, 2009 to $252.6 million at December 31, 2010. Revenue recognized plus the change in deferred revenue from the beginning to the end of the period is a useful metric that management identifies as billings. Billings for services drive deferred revenue, which is an important indicator of the health and visibility of our business, and has historically represented a majority of the revenue that we recognize in a typical quarter. We also ended fiscal 2010 with $387.5 million in cash, cash equivalents and investments and have had positive cash flow from operations every fiscal year since 2005. We discuss revenue, gross margin, and the components of operating income and margin below under “Components of Operating Results,” and we discuss our cash, cash equivalents, and investments under “Liquidity and Capital Resources.” Deferred revenue and cash flow from operations are discussed immediately below the following table.
 
 
Fiscal Year or as of Fiscal Year End
 
2010
 
2009 (3)
 
2008
 
($ amounts in 000's)
Revenue
324,696
 
 
252,115
 
 
211,791
 
Gross margin
73.8
%
 
72.2
%
 
69.1
%
Operating income (1)
55,341
 
 
25,334
 
 
4,927
 
Operating margin
17.0
%
 
10.0
%
 
2.3
%
Total deferred revenue
252,631
 
 
201,930
 
 
171,617
 
Increase in total deferred revenue
50,701
 
 
30,313
 
 
40,362
 
Cash, cash equivalents and investments
387,460
 
 
260,314
 
 
124,190
 
Cash provided by operating activities
103,383
 
 
61,971
 
 
37,686
 
Free cash flow (2)
99,607
 
 
57,382
 
 
34,888
 
___________________
 
 
 
 
 
(1) Includes:
 
 
 
 
 
Stock-based compensation expense:
9,315
 
 
7,461
 
 
5,299
 
Non-cash asset acquisition related write-offs:
 
 
2,387
 
 
 
The non-cash acquisition related write-offs are expenses for intangible assets that have no future value.
 
 
 
 
 
 
(2) Free cash flow is a non-GAAP financial measure, which we define as cash flow from operations minus capital expenditures, as further
        described below.
 
(3) Commencing in the third quarter of fiscal 2009, we began operating and reporting financial results on a calendar quarter and year basis.
       Our third quarter of fiscal 2009 ended on September 30, 2009, and our fiscal 2009 ended on December 31, 2009. The impact of the reporting
       period change had the effect of increasing the number of days in the 12 month period ended December 31, 2009 by four days.
    
Deferred revenue. Our deferred revenue consists of amounts that have been invoiced but that have not yet been recognized as revenue. The majority of our deferred revenue balance consists of the unamortized portion of services revenue from subscription and support service contracts. We monitor our deferred revenue balance because it represents a significant portion of revenue to be recognized in future periods.
 
Cash provided by operating activities. We monitor cash provided by operating activities as a measure of our overall business performance. Our cash provided by operating activities is driven in large part by advance payments for both new and

39


renewal contracts for subscription and support services. Monitoring cash provided by operating activities enables us to analyze our financial performance without the non-cash effects of certain items such as depreciation, amortization and stock-based compensation expenses, thereby allowing us to better understand and manage the cash needs of our business. Our cash provided by operating activities was $103.4 million in fiscal 2010, $62.0 million in fiscal 2009, and $37.7 million in fiscal 2008. In fiscal 2010, free cash flow (a non-GAAP financial measure, described under "Non-GAAP Financial Measures" below) was $99.6 million, compared to $57.4 million in fiscal 2009 and $34.9 million in fiscal 2008.
 
Non-GAAP Financial Measures
 
To supplement our consolidated financial statements presented in accordance with U.S. GAAP, we consider certain financial measures that are not prepared in accordance with GAAP, including non-GAAP gross margin, non-GAAP income from operations and non-GAAP operating margin, non-GAAP operating expenses, non-GAAP net income and non-GAAP free cash flow. These non-GAAP financial measures are not based on any standardized methodology prescribed by GAAP and are not necessarily comparable to similar measures presented by other companies. Non-GAAP gross margin is gross margin as reported on our consolidated statements of operations, excluding the impact of stock-based compensation expense, which is a non-cash charge, and for fiscal 2009 only, non-cash asset acquisition related write-offs. Non-GAAP income from operations is operating income, as reported on our consolidated statements of operations, excluding the impact of stock-based compensation expense and for fiscal 2009 only, non-cash asset acquisition related write-offs. The non-cash asset acquisition related write-offs that we exclude from our fiscal 2009 non-GAAP financial measures are charges for intangible assets that have no future value, but these charges do not include amortization related to the intangible assets that provide an ongoing benefit to our recurring operations. Non-GAAP operating margin is non-GAAP income from operations divided by revenue. Non-GAAP operating expenses exclude the impact of stock-based compensation expense. Non-GAAP net income is net income plus stock-based compensation expense and non-cash asset acquisition related write-offs, less the related tax effects. Free cash flow, an alternative non-GAAP measure of liquidity, is defined as net cash provided by operating activities less capital expenditures.
 
We use these non-GAAP financial measures internally in analyzing our financial results and believe they are useful to investors, as a supplement to GAAP measures, in evaluating our ongoing operational performance and enhancing an overall understanding of our past financial performance, as they help illustrate underlying trends in our business that could otherwise be masked by the effect of the expenses that we exclude in these non-GAAP financial measures. Furthermore, we use many of these measures to establish budgets and operational goals for managing our business and evaluating our performance. We also believe that the use of these non-GAAP financial measures provides an additional tool for investors to use in comparing our recurring core business operating results over multiple periods with other companies in our industry, many of which present similar non-GAAP financial measures to investors.
 
These non-GAAP financial measures should not be considered in isolation from, or as a substitute for, financial information prepared in accordance with GAAP. There are a number of limitations related to the use of these non-GAAP financial measures versus the nearest GAAP equivalent of these financial measures. First, these non-GAAP financial measures exclude certain recurring, non-cash charges, namely, stock-based compensation expense. Stock-based compensation has been, and will continue to be for the foreseeable future, a significant recurring expense in our business and is an important part of our employees' compensation that reflects their performance. Second, the expenses that we exclude in our calculation of these non-GAAP financial measures may differ from the expenses, if any, that our peer companies may exclude when they report their results of operations. We compensate for these limitations by providing the nearest GAAP equivalents of these non-GAAP financial measures and describing these GAAP equivalents in our Results of Operations below.
 
The following tables reconcile GAAP gross margin, income from operations, operating margin, certain operating expenses and net income as reported on our consolidated statements of operations to non-GAAP gross margin, non-GAAP income from operations, non-GAAP operating margin, certain non-GAAP operating expenses and non-GAAP net income for fiscal 2010, 2009 and 2008. For fiscal 2010, both GAAP and non-GAAP results below include approximately $1.3 million of payroll tax expense resulting from the exercise of employee stock options during the year. Payroll tax expense associated with stock option exercises during fiscal 2009 and 2008 was immaterial.
 
 

40


 
Fiscal Year
2010
 
2009
 
2008
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
($ amounts in 000's)
Total revenue
324,696
 
 
 
 
252,115
 
 
 
 
211,791
 
 
 
GAAP gross profit and margin
239,490
 
 
73.8
 
182,140
 
 
72.2
 
146,319
 
 
69.1
Stock-based compensation expense
1,030
 
 
0.3
 
760
 
 
0.3
 
467
 
 
0.2
Non-cash asset acquisition related write-offs
 
 
 
2,387
 
 
0.9
 
 
 
Non-GAAP gross profit and margin
240,520
 
 
74.1
 
185,287
 
 
73.4
 
146,786
 
 
69.3
GAAP income from operations and margin
55,341
 
 
17.0
 
25,334
 
 
10.0
 
4,927
 
 
2.3
Stock-based compensation expense:
 
 
 
 
 
 
 
 
 
 
 
Cost of revenue
1,030
 
 
0.3
 
760
 
 
0.3
 
467
 
 
0.2
Research and development
2,339
 
 
0.9
 
1,963
 
 
0.8
 
1,049
 
 
0.5
Sales and marketing
3,810
 
 
1.2
 
3,020
 
 
1.2
 
2,512
 
 
1.2
General and administrative
2,136
 
 
0.4
 
1,718
 
 
0.7
 
1,271
 
 
0.6
Total stock-based compensation
9,315
 
 
2.8
 
7,461
 
 
3.0
 
5,299
 
 
2.5
Non-cash asset acquisition related write-offs
 
 
 
2,387
 
 
0.9
 
 
 
Non-GAAP income from operations and margin
64,656
 
 
19.8
 
35,182
 
 
13.9
 
10,226
 
 
4.8
 
 
Fiscal Year
2010
 
2009
 
2008
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
($ amounts in 000's)
Operating Expenses:
 
 
 
 
 
 
 
 
 
 
 
Research and development expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP research and development expenses
49,801
 
 
15.3
 
 
42,195
 
 
16.7
 
 
37,035
 
 
17.5
 
Stock-based compensation
(2,339
)
 
(0.9
)
 
(1,963
)
 
(0.8
)
 
(1,049
)
 
(0.5
)
Non-GAAP research and development expenses
47,462
 
 
14.4
 
 
40,232
 
 
15.9
 
 
35,986
 
 
17.0
 
Sales and marketing expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP sales and marketing expenses
111,968
 
 
34.5
 
 
96,291
 
 
38.2
 
 
87,717
 
 
41.4
 
Stock-based compensation
(3,810
)
 
(1.2
)
 
(3,020
)
 
(1.2
)
 
(2,512
)
 
(1.2
)
Non-GAAP sales and marketing expenses
108,158
 
 
33.3
 
 
93,271
 
 
37.0
 
 
85,205
 
 
40.2
 
General and administrative expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP general and administrative expenses
22,380
 
 
6.9
 
 
18,320
 
 
7.3
 
 
16,640
 
 
7.9
 
Stock-based compensation
(2,136
)
 
(0.4
)
 
(1,718
)
 
(0.7
)
 
(1,271
)
 
(0.6
)
Non-GAAP general and administrative expenses
20,244
 
 
6.5
 
 
16,602
 
 
6.6
 
 
15,369
 
 
7.3
 
Total operating expenses:
 
 
 
 
 
 
 
 
 
 
 
GAAP operating expenses
184,149
 
 
56.7
 
 
156,806
 
 
62.2
 
 
141,392
 
 
66.8
 
Stock-based compensation
(8,285
)
 
(2.5
)
 
(6,701
)
 
(2.7
)
 
(4,832
)
 
(2.3
)
Non-GAAP operating expenses
175,864
 
 
54.2
 
 
150,105
 
 
59.5
 
 
136,560
 
 
64.5
 
 

41


 
Fiscal Year
2010
2009
2008
($ and share amounts in 000's, except per share amounts)
Net Income:
 
 
 
 
 
GAAP net income
41,245
 
 
60,179
 
 
7,363
 
Stock-based compensation expense (1)
9,315
 
 
7,461
 
 
5,299
 
Non-cash asset acquisition related write-offs (1)
 
 
2,387
 
 
 
Provision for income taxes (2)
15,096
 
 
(32,666
)
 
1,888
 
Non-GAAP income before provision for income taxes
65,656
 
 
37,361
 
 
14,550
 
Tax effects related to non-GAAP adjustments (3)
(21,010
)
 
(6,877
)
 
(2,948
)
Non-GAAP net income
44,646
 
 
30,484
 
 
11,602
 
Non-GAAP net income per share - diluted
0.57
 
 
0.47
 
 
0.17
 
Shares used in per share calculation - diluted
78,203
 
 
65,219
 
 
67,122
 
____________________
(1)    Stock-based compensation expense and non-cash asset acquisition related write-offs are added back to GAAP net income to reconcile to non-GAAP income before taxes.
(2)    Provision for income taxes is our GAAP provision that must be added to GAAP net income to reconcile to non-GAAP income before taxes. The provision for fiscal 2009 included a $37.8 million tax benefit from the reversal of our valuation allowance.
(3)    We used a 32% effective tax rate in fiscal 2010 to calculate non-GAAP net income for fiscal 2010. The 32% effective tax rate reflects the exclusion of GAAP based stock option benefits, as well as the reinstated Federal R&D Credit. Our effective tax rate for fiscal 2009 was 18% which reflects only our foreign tax provision as our US operations had net operating losses to offset any taxable income.
 
 
Fiscal Year
2010
2009
2008
($ amounts in 000's)
Billings:
 
 
 
 
 
Revenue
324,696
 
 
252,115
 
 
211,791
 
Increase in deferred revenue
50,701
 
 
30,313
 
 
40,363
 
Total billings (Non-GAAP)
375,397
 
 
282,428
 
 
252,154
 
 
 
Fiscal Year
2010
2009
2008
($ amounts in 000's)
Cash Flow:
 
 
 
 
 
Net cash provided by operating activities
103,383
 
 
61,971
 
 
37,686
 
Less purchases of property and equipment
(3,776
)
 
(4,589
)
 
(2,798
)
Free cash flow (Non-GAAP)
99,607
 
 
57,382
 
 
34,888
 
Net cash provided by (used in) investing activities
(283,710
)
 
13,757
 
 
(53,706
)
Net cash provided by financing activities
34,019
 
 
78,049
 
 
2,117
 
 
Components of Operating Results
 
Revenue
 
We derive our revenue from sales of our products and subscription and support services. In fiscal 2010, we recognized our revenue in accordance with the guidance in ASC 985-605-25 (formerly referred to as Statement of Position, or SOP 97-2, Software Revenue Recognition and SOP 98-9, Modification of SOP 97-2, Software Revenue Recognition, With Respect to Certain Transactions) which is discussed in further detail in “—Critical Accounting Policies and Estimates—Revenue Recognition” below. According to ASC 985-605-25, revenue is recognized when persuasive evidence of an arrangement exists, delivery has occurred, the price is fixed or determinable and collection is probable.
 
Our total revenue is comprised of the following:
 
•    
Product revenue. Product revenue is generated from sales of our appliances and software. The substantial

42


majority of our product revenue has been generated by our FortiGate line of appliances and we do not expect this to change in the foreseeable future. Product revenue also includes revenue derived from sales of FortiManager and, FortiAnalyzer, as well as some of our other products. We generally recognize revenue for products sold to distributors under the “sell-in” method upon shipment to the distributor and, for “sell-through” distributors, upon sale to their end-customer. As a percentage of total revenue, we expect our product revenue may vary from quarter-to-quarter based on seasonal and cyclical factors discussed below under “—Quarterly Results of Operations” but generally may remain at relatively comparable levels.
 
•    
Services revenue. Services revenue is generated primarily from FortiCare technical support services for software updates, maintenance releases and patches, Internet access to technical content, telephone and Internet access to technical support personnel, and FortiGuard security subscription services related to antivirus, intrusion prevention, Web filtering and antispam updates. We recognize revenue from subscription and support services over the service performance period. Our typical contractual support and subscription term is one year from the date of registration. We also generate a small portion of our revenue from professional services and training services and we recognize this revenue upon completion of the project. As a percentage of total revenue, we expect our services revenue to remain at relatively comparable levels.
 
•    
Ratable product and services revenue. Ratable product and services revenue is generated from sales of our products and services in cases where the fair value of the services being provided cannot be segregated from the value of the entire sale. In these cases, the value of the entire sale is deferred and recognized ratably over the life of the service performance period. See “—Critical Accounting Policies and Estimates—Revenue Recognition.” In fiscal 2009 and 2010, ratable product and service revenue represented approximately 5% to 6% of total revenue.
 
Our total cost of revenue is comprised of the following:
 
•    
Cost of product revenue. A substantial majority of the cost of product revenue consists of third-party manufacturing costs. Our cost of product revenue also includes product testing costs, write-offs for excess and obsolete inventory, royalty payments, amortization and any impairment of applicable acquired intangible assets, warranty costs, shipping and allocated facilities costs, stock-based compensation costs, and personnel costs associated with logistics and quality control. Personnel costs include cash-based personnel costs such as salaries, benefits and bonuses. Royalties reflect amounts related to Trend Micro since 2006, which Trend Micro claims are owed through 2015, as discussed in “Item 3 - Legal Proceedings.” For fiscal 2009 and 2010, this royalty represented approximately 1% of total revenue and we do not expect this percentage to increase substantially in the foreseeable future.
 
•    
Cost of services revenue. Cost of services revenue is primarily comprised of cash-based personnel costs associated with our FortiGuard Labs team and our technical support, professional services and training teams, as well as depreciation, supplies, data center, data communications, facility-related costs and stock-based compensation costs. We expect our cost of services revenue will increase as we continue to invest in subscription and support services to meet the needs of our growing customer base.
 
•    
Cost of ratable product and services revenue. Cost of ratable product and services revenue is comprised primarily of deferred product costs and services-related costs.
 
Gross profit. Gross profit as a percentage of revenue, or gross margin, has been and will continue to be affected by a variety of factors, including the average sales price of our products, any excess inventory write-offs, manufacturing costs, the mix of products sold and the mix of revenue between products and services. We believe our overall gross margin for the near term will remain at comparable levels or decline modestly compared to that achieved in fiscal 2010.
 
Services revenue has historically increased as a percentage of total revenue since inception, and this trend has had a positive effect on our total gross margin given the higher services gross margins compared to product gross margins. We have generally maintained consistent services gross margins in fiscal 2009 and fiscal 2010.
 
Operating expenses. Our operating expenses consist of research and development, sales and marketing and general and administrative expenses. Personnel costs are the most significant component of operating expenses and consist of cash-based personnel costs such as salaries, benefits, bonuses and, with regard to the sales and marketing expense, sales commissions. They also include non-cash charges, specifically, stock-based compensation. We expect personnel costs to continue to increase in absolute dollars as we hire new employees.
 

43


•    
Research and development. Research and development expense consists primarily of cash-based personnel costs. Additional research and development expenses include ASIC and system prototypes and certification-related expenses, depreciation of capital equipment, facility-related expenses and stock-based compensation expenses. The majority of our research and development is focused on both software development and the ongoing development of our hardware platform. We record all research and development expenses as incurred, except for capital equipment which is depreciated over time. Our development teams are primarily located in Canada, China, and the United States. We expect our spending for research and development to increase in absolute dollars and may increase modestly as a percentage of total revenue compared to fiscal 2010 results.
 
•    
Sales and marketing. Sales and marketing expense is the largest component of our operating expenses and primarily consists of cash-based personnel costs including salary, benefits and commissions. Additional sales and marketing expenses include stock-based compensation, promotional and other marketing expenses, travel, depreciation of capital equipment and facility-related expenses. We intend to hire additional personnel focused on sales and marketing and expand our sales and marketing efforts worldwide in order to increase our presence in new geographic markets and enterprise verticals, add new customers and increase penetration within our existing customer base. Accordingly, we expect sales and marketing expenses to increase in absolute dollars and to continue to be our largest operating expense.
 
•    
General and administrative. General and administrative expense consists of cash-based personnel costs as well as professional fees, stock-based compensation, depreciation of capital equipment and software, and facility-related expenses. General and administrative personnel include our executive, finance, human resources, information technology and legal organizations. Our professional fees principally consist of outside legal, auditing, accounting, information technology and other consulting costs. We expect that general and administrative expense will increase in absolute dollars as we hire additional personnel, make improvements to our information technology infrastructure, and defend our intellectual property.
 
Interest income. Interest income consists of income earned on our cash, cash equivalents and investments. We have historically invested our cash in money market funds, commercial paper, corporate debt securities and U.S. government debt securities.
 
Other income (expense), net. Other income (expense), net consists primarily of foreign exchange and related hedging gains and losses. Foreign exchange gains and losses relate to foreign currency exchange re-measurement. The hedging gains and losses are related to our settled balance sheet hedges.
 
Provision for income taxes. We are subject to tax in the United States as well as other tax jurisdictions or countries in which we conduct business. Earnings from our non-U.S. activities are subject to income taxes in the local country which are generally lower than U.S. tax rates, and may be subject to current U.S. income taxes. Our effective tax rates differ from the U.S. statutory rate primarily due to foreign income subject to different tax rates than the U.S., research and development tax credits (particularly the recently reinstated U.S. Federal Research and Development Tax Credit), withholding taxes, nondeductible compensation and expenses and adjustments related to our intercompany transfer pricing.
 
The income tax provision for fiscal 2010 was comprised primarily of domestic income taxes, foreign income taxes and withholding taxes. The 2010 effective tax rate was impacted by the inclusion of stock option benefits, which affected the transfer pricing calculations between some of our foreign subsidiaries as well as the reinstated U.S. Federal Research and Development Tax Credit. The income tax provision for fiscal 2009 reflected a tax benefit related to the release of the valuation allowance, which resulted in the recognition of deferred tax assets. For periods beginning in 2010, as a result of fully reversing our valuation allowance, we expect that our effective tax rate will approximate the U.S. federal statutory tax rates plus the impact of state taxes, research and development tax credits (when applicable), withholding tax, nondeductible compensation and adjustments related to intercompany transfer pricing.
 
Critical Accounting Policies and Estimates
 
Our discussion and analysis of our financial condition and results of operations are based upon our financial statements, which have been prepared in accordance with U.S. GAAP. These principles require us to make estimates and judgments that affect the reported amounts of assets, liabilities, revenue and expenses, cash flow and related disclosure of contingent assets and liabilities. Our estimates include those related to revenue recognition, stock-based compensation, valuation of inventory, warranty liabilities and accounting for income taxes. We base our estimates on historical experience and on various other assumptions that we believe to be reasonable under the circumstances. Actual results may differ from these

44


estimates. To the extent that there are material differences between these estimates and our actual results, our future financial statements will be affected.
 
We believe that of our significant accounting policies, which are described in Note 1 to the financial statements included in this 10-K, the following accounting policies involve a greater degree of judgment and complexity. Accordingly, we believe these are the most critical to fully understand and evaluate our financial condition and results of operations.
 
Revenue Recognition
 
We derive revenue from sales of products, including appliances and software, and services, including subscription, support and other services. Our appliances include operating system software that is integrated into the appliance hardware and is deemed essential to its functionality. As a result, we account for revenue in accordance with ASC 985-605 and all related interpretations. See “—Recent Accounting Pronouncements in the notes to the consolidated financial statements” for a discussion of new revenue recognition standards that we will be required to adopt for fiscal 2011. We are still assessing the impact of the new standards and have not reflected in this annual report any impact such standards may have on our consolidated financial statements.
 
No revenue can be recognized until all of the following criteria have been met:
 
•    
Persuasive evidence of an arrangement exists. Binding contracts or purchase orders are generally used to determine the existence of an arrangement.
 
•    
Delivery has occurred. Delivery occurs when we fulfill an order and title and risk of loss has been transferred or upon delivery of the service contract registration code.
 
•    
The fee is fixed or determinable. We assess whether the fee is fixed or determinable based on the payment terms associated with the transaction. In the event payment terms differ from our standard business practices, the fees are deemed to be not fixed or determinable and revenue is recognized when the payments become due, provided the remaining criteria for revenue recognition have been met.
 
•    
Collectability is probable. We assess collectability based primarily on creditworthiness as determined by credit checks and analysis, as well as payment history. Payment terms generally range from 30 to 90 days from invoice date.
 
For arrangements that include customer acceptance criteria, no revenue is recognized prior to acceptance. We recognize product revenue on sales to distributors that have no rights of return and end-customers upon shipment of the appliance, once all other revenue recognition criteria have been met. We also make sales through distributors under agreements that allow for rights of return. We recognize product revenue on sales made through such distributors upon sale by the distributor to the end-customer, at which time rights of return generally lapse. Substantially all of our products have been sold in combination with subscription or support services. Subscription services provide access to our antivirus, intrusion prevention, Web filtering, and antispam functionality. Support services include rights to unspecified software upgrades, maintenance releases and patches, telephone and Internet access to technical support personnel, and hardware support.
 
We commence our subscription and support services on the date the customer registers the appliance. The customer is then entitled to service for the stated contractual period beginning on the registration date.
 
We use the residual method to recognize revenue when an arrangement includes one or more elements to be delivered at a future date and vendor-specific objective evidence ("VSOE") of the fair value of all undelivered elements exists. Under the residual method, the fair value of the undelivered elements is deferred and the remaining portion of the contract fee is recognized as product revenue. In cases where VSOE of fair value of the undelivered elements does not exist, typically for subscription and support services, revenue for the entire arrangement is recognized ratably over the performance period of the undelivered elements. Revenue related to these arrangements is included in ratable product and services revenue in the accompanying consolidated statements of operations. VSOE of fair value for elements of an arrangement is based upon the pricing for those services when sold separately. Revenue for professional services and training is recognized upon completion of the related services.
 
We offer certain sales incentives to channel partners. Additionally, in limited circumstances we may permit end-customers, distributors and resellers to return our products, subject to varying limitations, for a refund within a reasonably short period from the date of purchase. We reduce revenue for estimates of sales returns and allowances. We estimate and record reserves for these sales incentives and sales returns based on our historical experience. In each accounting period, we must

45


make judgments and estimates of sales incentives and potential future sales returns related to current period revenue. These estimates affect our net revenue line item on our consolidated statement of operations and affect our net accounts receivable, deferred revenue or accrued liabilities line items on our consolidated balance sheet. Historically, there have been no significant adjustments to these estimates related to prior periods.
 
At December 31, 2010, our allowance for sales returns was $2.0 million compared to $5.0 million at December 31, 2009. The decrease was the result of improved efficiency in processing sales incentives through the system at period end. If our allowance for sales returns was to increase by 10%, or $0.2 million, our net revenue would decrease by $0.2 million for fiscal 2010.
 
Stock-Based Compensation
 
Employees. We have accounted for stock-based awards to employees in accordance with ASC 718 (SFAS 123R), which requires compensation expense related to share-based transactions, including employee stock options, to be measured and recognized in the financial statements based on a determination of the fair value of the stock options. The grant date fair value is determined using the Black-Scholes-Merton (“Black-Scholes”) pricing model. For all employee stock options, we recognize expense over the requisite service period using the straight-line method. Our option pricing model requires the input of highly subjective assumptions, including the expected stock price volatility, expected term, and forfeiture rate. Any changes in these highly subjective assumptions significantly impact stock-based compensation expense.
 
Non-employees. During fiscal 2010, 2009 and 2008 we issued to non-employees in exchange for services, options to purchase shares of common stock. These options vest over periods of up to 48 months, and in accordance with ASC 505-50 (formerly referred to as Emerging Issues Task Force (EITF) Issue No. 96-18), we accounted for these options as variable awards. The options were valued using the Black-Scholes option pricing model.
 
Valuation of Inventory
 
Inventory is recorded at the lower of cost (using the first-in, first-out method) or market, after we give appropriate consideration to obsolescence and inventory in excess of anticipated future demand. In assessing the ultimate recoverability of inventory, we are required to make estimates regarding future customer demand, the timing of new product introductions, economic trends and market conditions. If the actual product demand is significantly lower than forecasted, we could be required to record additional inventory write-downs which would be charged to cost of product revenue. Any write-downs could have an adverse impact on our gross margins and profitability.
 
Warranty Liabilities
 
We generally provide a one-year warranty on hardware products and a 90-day warranty on software. A provision for estimated future costs related to warranty activities is charged to cost of product revenue based upon historical product failure rates and historical costs incurred in correcting product failures. If we experience an increase in warranty claims compared with our historical experience, or if the cost of servicing warranty claims is greater than expected, our gross margin could be adversely affected.
 
Accounting for Income Taxes
 
We record income taxes using the asset and liability method, which requires the recognition of deferred tax assets and liabilities for the expected future tax consequences of events that have been recognized in our financial statements or tax returns. In estimating future tax consequences, generally all expected future events other than enactments or changes in the tax law or rates are considered. Valuation allowances are provided when necessary to reduce deferred tax assets to the amount expected to be realized.
 
We operate in various tax jurisdictions and are subject to audit by various tax authorities. We provide for tax contingencies whenever it is deemed more likely than not that a tax asset has been impaired or a tax liability has been incurred for events such as tax claims or changes in tax laws. Tax contingencies are based upon their technical merits, relevant tax law and the specific facts and circumstances as of each reporting period. Changes in facts and circumstances could result in material changes to the amounts recorded for such tax contingencies.
 
We account for uncertain tax positions in accordance with ASC 740-10 (FIN 48), which defines the confidence level that a tax position must meet in order to be recognized in the financial statements. ASC 740-10 requires that the tax effects of a position be recognized only if it is “more likely than not” to be sustained based solely on its technical merits as of the reporting

46


date. We consider many factors when evaluating and estimating our tax positions and tax benefits, which may require periodic adjustments and which may not accurately anticipate actual outcomes.
 
As part of the process of preparing our consolidated financial statements, we are required to estimate our taxes in each of the jurisdictions in which we operate. We estimate actual current tax exposure together with assessing temporary differences resulting from differing treatment of items, such as accruals and allowances not currently deductible for tax purposes. These differences result in deferred tax assets, which are included in our consolidated balance sheets. In general, deferred tax assets represent future tax benefits to be received when certain expenses previously recognized in our consolidated statements of operations become deductible expenses under applicable income tax laws, or loss or credit carryforwards are utilized.
 
In assessing the realizability of deferred tax assets, management considers whether it is more likely than not that some portion or all of the deferred tax assets will be realized. The ultimate realization of deferred tax assets is dependent upon the generation of future taxable income during the periods in which those temporary differences become deductible. During the fourth quarter of fiscal 2009 we concluded that it was more likely than not that we would be able to realize the benefit of our deferred tax assets in the future. We based this conclusion on historical and projected operating performance, as well as our expectation that our operations will generate sufficient taxable income in future periods to realize the tax benefits associated with the deferred tax assets. As a result, we released all of the valuation allowance on our net deferred tax assets. We will continue to assess the need for a valuation allowance on the deferred tax asset by evaluating both positive and negative evidence that may exist. Any adjustment to the net deferred tax asset valuation allowance would be recorded in the income statement for the period that the adjustment is determined to be required.
 
We make estimates and judgments about our future taxable income that are based on assumptions that are consistent with our plans and estimates. Should the actual amounts differ from our estimates, the amount of our tax expense and liabilities could be materially impacted.
 
Results of Operations
 
The following tables set forth our results of operations for the periods presented and as a percentage of our total revenue for those periods. The period-to-period comparison of financial results is not necessarily indicative of financial results to be achieved in future periods.
 

47


 
Fiscal Year (1)
 
2010
 
2009 (2)
 
2008
 
($ amounts in 000's)
Consolidated Statement of Operations Data:
 
 
 
 
 
Revenue
 
 
 
 
 
Product
135,140
 
 
98,686
 
 
94,587
 
Services
172,046
 
 
139,172
 
 
105,292
 
Ratable product and services
17,510
 
 
14,257
 
 
11,912
 
Total revenue
324,696
 
 
252,115
 
 
211,791
 
Cost of revenue
 
 
 
 
 
Product
51,944
 
 
42,166
 
 
41,397
 
Services
26,967
 
 
22,265
 
 
19,441
 
Ratable product and services
6,295
 
 
5,544
 
 
4,634
 
Total cost of revenues
85,206
 
 
69,975
 
 
65,472
 
Gross profit
 
 
 
 
 
Product
83,196
 
 
56,520
 
 
53,190
 
Services
145,079
 
 
116,907
 
 
85,851
 
Ratable product and services
11,215
 
 
8,713
 
 
7,278
 
Total gross profit
239,490
 
 
182,140
 
 
146,319
 
Operating expenses
 
 
 
 
 
Research and development
49,801
 
 
42,195
 
 
37,035
 
Sales and marketing
111,968
 
 
96,291
 
 
87,717
 
General and administrative
22,380
 
 
18,320
 
 
16,640
 
Total operating expenses
184,149
 
 
156,806
 
 
141,392
 
Operating income
55,341
 
 
25,334
 
 
4,927
 
Interest income
1,815
 
 
1,981
 
 
2,614
 
Other income (expense), net
(815
)
 
198
 
 
1,710
 
Income before income taxes
56,341
 
 
27,513
 
 
9,251
 
Provision for (benefit from) income taxes
15,096
 
 
(32,666
)
 
1,888
 
Net income
41,245
 
 
60,179
 
 
7,363
 
____________________
(1)    
Our fiscal years ended on December 31, 2010, December 31, 2009 and December 28, 2008.
(2)    
Commencing in the third quarter of fiscal 2009, we began operating and reporting financial results on a calendar quarter and year basis. This change in period end had the effect of increasing the number of days in fiscal 2009 by four days.
 

48


 
Fiscal Year
2010
 
2009
 
2008
(as % of revenue)
Revenue
 
 
 
 
 
Product
41.6
 
 
39.1
 
 
44.7
Services
53.0
 
 
55.2
 
 
49.7
Ratable product and services
5.4
 
 
5.7
 
 
5.6
Total revenue
100.0
 
 
100.0
 
 
100.0
Total cost of revenue
26.2
 
 
27.8
 
 
30.9
Total gross profit
73.8
 
 
72.2
 
 
69.1
Operating expenses
 
 
 
 
 
Research and development
15.3
 
 
16.7
 
 
17.5
Sales and marketing
34.6
 
 
38.2
 
 
41.4
General and administrative
6.9
 
 
7.3
 
 
7.9
Total operating expenses
56.8
 
 
62.2
 
 
66.8
Operating income
17.0
 
 
10.0
 
 
2.3
Interest income
0.7
 
 
0.8
 
 
1.3
Other income (expense), net
(0.2
)
 
0.1
 
 
0.8
Income before provision for income taxes
17.5
 
 
10.9
 
 
4.4
Provision for (benefit from) income taxes
4.6
 
 
(13.0
)
 
0.9
Net income
12.9
 
 
23.9
 
 
3.5
 
Fiscal Years 2010 and 2009
 
Revenue
 
 
Fiscal Year
 
 
 
 
2010
 
2009
 
 
 
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
$ Change
 
% Change
($ amounts in 000's)
Revenue:
 
 
 
 
 
 
 
 
 
 
 
Product
135,140
 
 
41.6
 
98,686
 
 
39.1
 
36,454
 
 
36.9
Services
172,046
 
 
53.0
 
139,172
 
 
55.2
 
32,874
 
 
23.6
Ratable product and services
17,510
 
 
5.4
 
14,257
 
 
5.7
 
3,253
 
 
22.8
Total revenue
324,696
 
 
100.0
 
252,115
 
 
100.0
 
72,581
 
 
28.8
Revenue by Geography:
 
 
 
 
 
 
 
 
 
 
 
Americas
123,961
 
 
38.2
 
92,621
 
 
36.7
 
31,340
 
 
33.8
EMEA
121,604
 
 
37.5
 
95,886
 
 
38.1
 
25,718
 
 
26.8
APAC
79,131
 
 
24.3
 
63,608
 
 
25.2
 
15,523
 
 
24.4
Total revenue
324,696
 
 
100.0
 
252,115
 
 
100.0
 
72,581
 
 
28.8
 
Total revenue increased $72.6 million, or 28.8%, in fiscal 2010 compared to fiscal 2009. The Americas region contributed the largest portion of this growth. Product revenue increased $36.5 million, or 36.9%, compared to fiscal 2009. The increase in product revenue was primarily driven by higher product sales volume across all regions. When looking at the mix of product revenue, there was a greater mix of our high-end products due to increased sales to enterprise and service provider customers as evidenced by a 79% increase in the number of $500,000+ deals in fiscal 2010 compared to fiscal 2009. Services revenue increased $32.9 million, or 23.6%, in fiscal 2010 compared to fiscal 2009 due to the recognition of revenue from our growing deferred revenue balance consisting of subscription and support contracts sold to a larger customer base and our increased focus on contract renewals. The growth in services revenue tends to lag growth in billings and product revenue due to amortization of revenue over the service period. The growth in ratable product and services revenue was due to a slight decrease in the weighted-average service period as a result of a decrease in the average contractual term of support contracts for arrangements in which we recognized product and services revenue ratably.

49


 
Cost of revenue and gross margin
 
 
Fiscal Year
 
 
 
 
2010
 
2009
 
$ Change
 
% Change
($ amounts in 000's)
Cost of revenue:
 
 
 
 
 
 
 
Product
51,944
 
 
42,166
 
 
9,778
 
 
23.2
Services
26,967
 
 
22,265
 
 
4,702
 
 
21.1
Ratable product and services
6,295
 
 
5,544
 
 
751
 
 
13.5
Total cost of revenue
85,206
 
 
69,975
 
 
15,231
 
 
21.8
Gross margin (%):
 
 
 
 
 
 
 
Product
61.6
 
 
57.3
 
 
4.3
 
 
 
Services
84.3
 
 
84.0
 
 
0.3
 
 
 
Ratable product and services
64.0
 
 
61.1
 
 
2.9
 
 
 
Total gross margin
73.8
 
 
72.2
 
 
1.6
 
 
 
 
Total gross margin increased 1.6 percentage points in fiscal 2010 primarily due to improved product margins in fiscal 2010 compared to fiscal 2009. Product gross margin increased 4.3 percentage points in fiscal 2010 compared to fiscal 2009 primarily due to a greater mix of our high-end products and the absence of asset acquisition related write-offs compared to a $2.4 million write-off in fiscal 2009. From time to time, we have experienced sales of previously reserved inventory. During fiscal 2010, we experienced a positive impact of 0.7 percentage points due to the sale of fully reserved inventory compared to a positive impact of 1.1 percentage points in fiscal 2009. Services gross margin was relatively flat as we continued to make investments in our Americas support, professional services and FortiGuard global security research organizations. Services cost increased by $4.7 million primarily due to a $2.9 million increase in cash-based personnel costs related to headcount increases. Travel, depreciation and other expenses increased a combined $0.8 million. In addition, occupancy-related costs increased $0.7 million and stock-based compensation increased $0.3 million. Ratable product and services gross margin increased 2.9 percentage points as a result of leverage achieved from cost reductions with respect to overhead.
 
Operating Expenses
 
 
Fiscal Year
 
$ Change
 
% Change
2010
 
2009
 
Amount ($)
 
% of
Revenue
 
Amount ($)
 
% of
Revenue
 
($ amounts in 000's)
Operating expenses:
 
 
 
 
 
 
 
 
 
 
 
Research and development
49,801
 
 
15.3
 
42,195
 
 
16.7
 
7,606
 
 
18.0
Sales and marketing
111,968
 
 
34.5
 
96,291
 
 
38.2
 
15,677
 
 
16.3
General and administrative
22,380
 
 
6.9
 
18,320
 
 
7.3
 
4,060
 
 
22.2
Total operating expenses
184,149
 
 
56.7
 
156,806
 
 
62.2
 
27,343
 
 
17.4
 
Research and development expense
 
Research and development expense increased $7.6 million, or 18.0%, in fiscal 2010 compared to fiscal 2009 primarily due to an increase of $5.2 million in cash-based personnel costs as a result of increased headcount to support continued enhancements of our products, higher occupancy-related costs of $1.7 million due to a move into a new office facility in Vancouver with significantly increased square footage, plus early termination and moving costs, an increase of $0.4 million in stock-based compensation expense, and an increase of $0.3 million in product development related expenses, such as non-recurring engineering (NRE), testing and certifications. A 10% increase in the Canadian dollar exchange rate against the US dollar also significantly contributed to the increase in research and development expenses.
 

50


Sales and marketing expense
 
Sales and marketing expense increased $15.7 million, or 16.3%, in fiscal 2010 compared to fiscal 2009 as we continued to increase our sales headcount in order to expand our global footprint. The increase consisted of cash-based personnel costs of $14.5 million as a result of increased headcount, a $1.3 million increase in travel as a result of our overall sales growth of 29% and particularly sales growth in the Americas of 34%, a $0.8 million increase in stock-based compensation expense, and a $0.2 million increase in professional services. These increases were partially offset by a $1.1 million decrease in marketing-related expenses. As a percentage of revenue, sales and marketing expenses decreased 3.7 percentage points due to the leverage we are achieving from the investment in our salesforce during the past year, as evidenced by revenue growth of 29% exceeding sales and marketing expenses growth of 16%.
 
General and administrative expense
 
In fiscal 2010, general and administrative expense increased $4.1 million, or 22.2%, compared to fiscal 2009. The increase was primarily due to a $1.8 million increase in legal expenses to support various patent litigation matters and a $0.6 million increase in accounting-related expenses due to being a public company. In addition, cash-based personnel costs increased $1.3 million and stock-based compensation expense increased $0.4 million.
 
Interest income and other income (expense), net
 
 
Fiscal Year
 
 
 
 
2010