Business description of A10-NETWORKS-INC from last 10-k form

FORWARDLOOKING STATEMENTS
This Annual Report on Form 10-K contains forwardlooking statements made pursuant to the provisions of Section 21E of the Securities Exchange Act of 1934. These forwardlooking statements are based on management's current expectations and beliefs, including estimates and projections about our industry. The following discussion and analysis contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. The words “believe,” “may,” “will,” “potentially,” “estimate,” “continue,” “anticipate,” “intend,” “could,” “would,” “project,” “plan” “expect,” and similar expressions that convey uncertainty of future events or outcomes are intended to identify forward-looking statements.
These forward-looking statements include, but are not limited to, statements concerning the following:
These forward-looking statements are subject to a number of risks, uncertainties, and assumptions, including those described in Item 1A Risk Factors and elsewhere in this Annual Report on Form 10-K. Moreover, we operate in a very competitive and rapidly changing environment, and new risks emerge from time to time. It is not possible for our management to predict all risks, nor can we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties, and assumptions, the forward-looking events and circumstances discussed in this Annual Report on Form 10-K may not occur and actual results could differ materially and adversely from those anticipated or implied in the forward-looking statements.
The forward-looking statements in this report speak only as of the time they are made and do not necessarily reflect our outlook at any other point in time. We undertake no obligation to update publicly any forward-looking statements, whether as a result of new information, future event, or for any other reason. However, readers should carefully review the risk factors set forth in other reports or documents we file from time to time with the Securities and Exchange Commission.
As used herein, “A10 Networks,” the “Company,” “we,” “our,” and similar terms include A10 Networks, Inc. and its subsidiaries, unless the context indicates otherwise.
PART I.
BUSINESS
Overview
We are a leading provider of advanced application networking technologies. Our solutions enable enterprises, service providers, Web giants and government organizations to accelerate, secure and optimize the performance of their data center applications and networks. Our products are built on our Advanced Core Operating System, or ACOS which is designed to enable our products to deliver substantially greater performance and security relative to prior generation application networking products. Our software based ACOS architecture also provides the flexibility that enables us to expand our business to offer additional products to solve a growing array of networking and security challenges arising from increased Internet cloud and mobile computing.
We currently offer three software based advanced application networking solutions. These are Application Delivery Controllers, or ADCs, to optimize data center performance; Carrier Grade Networking products, or CGN, to provide address and protocol translation services for service provider networks; and a Distributed Denial of Service Threat Protection System, or TPS, for network-wide security protection. We deliver these solutions both on optimized hardware appliances and as virtual appliances across our Thunder Series and AX Series product families.
Our ACOS platform architecture is optimized for modern 64-bit computer processors, or CPUs, which increasingly have multiple parallel processing cores that operate within a single CPU for higher efficiency and performance scalability. In order to maximize the capabilities of these increasingly dense multi-core CPUs, ACOS implements a proprietary shared memory architecture that provides all cores with simultaneous access to common memory. This shared memory architecture enables our products to utilize these multi-core CPUs efficiently and scale performance with increasing CPU cores. As a result, we believe our ACOS application networking platform enables us to provide our end-customers with products that can deliver superior price performance benefits over products that lack these capabilities. ACOS’ high performance design enables our products to address a wide range of today’s performance-driven networking challenges. For example, we have expanded our products’ capabilities to defend against the rising volume of large scale, sophisticated cyber security threats, such as Distributed Denial of Service, or DDoS, and other increasingly sophisticated high volume network attacks. The flexible software design of ACOS enables our end-customers to deploy our products across a number of new models for Information Technology ("IT") operations, such as managed hosting of their network by a third party provider and Internet cloud-based applications and networks.
We sell our products globally to service providers and enterprises that depend on data center applications and networks to generate revenue and manage operations efficiently. Our high-touch sales force engages directly or through indirect distribution channels with our end-customers. We believe that a high-touch, customer-focused selling process is important before, during and after the sale of our products to maximize our sales success. Product fulfillment is generally done through our original equipment manufacturers or distribution channel partners.
For the years ended December 31, 2012, 2013 and 2014, our total revenue was $120.1 million, $141.7 million and $179.5 million, representing a compound annual growth rate of approximately 22% from 2012 to 2014. Our total revenue grew 18% from 2012 to 2013 and 27% from 2013 to 2014. For the years ended December 31, 2012, 2013 and 2014, our gross margin was 80%, 76% and 76%. We generated a net loss of $90.2 million, $27.1 million and $34.7 million for the years ended December 31, 2012, 2013 and 2014. Our net loss in 2012 and 2013 was affected by the settlement of, and legal expenses related to, our litigation with Brocade Communications Systems, Inc.
Trends Driving Continued Evolution of Application Networking
Commercial damage and customer dissatisfaction from poor website, data center application and network performance can have a lasting negative impact well beyond the expenses related directly to the downtime. To optimize data center application and network performance and avoid unforeseen downtime, organizations deploy application networking technology to ensure the performance and security of data center resources. These organizations must simultaneously address significant networking industry trends such as:
Increased Adoption of Cloud Computing Applications. As organizations move their business critical applications to the cloud, they need application networking solutions optimized for cloud computing that can scale with the performance demands and security expectations of this growth.
Increased Network Complexity Due to Virtualization and Software Defined Networking Adoption. Application networking technologies need to adapt to software-oriented data center architectures, including virtualization and Software Defined Networking, or SDN.
Rapid Growth of Internet-Connected Devices and the Exhaustion of the Existing IP Address Space. The rapid growth of mobile and other Internet-connected devices has overwhelmed the current Internet Protocol addressing scheme, IPv4. To support this rapid growth of Internet-connected devices, application networking technology will play an increasingly significant role in managing two Internet connection standards simultaneously, extending the viability of IPv4 and enabling end-customers to move to the IPv6 standard.
Increasing Risk from Cyber Security Threats. Cybercriminals, foreign military intelligence organizations and amateur hackers are targeting the data centers of organizations of every type. Authentication, application security and encryption are necessary but insufficient defenses against increasingly sophisticated attacks. In one particular cyber threat, a DDoS attack, the perpetrator attempts to render the target network unavailable for its intended purpose by orchestrating coordinated attacks from massive worldwide networks of compromised computers, called botnets. DDoS attacks have become more frequent and sophisticated and can easily overwhelm an inadequately protected target network. As these and other types of attacks have become more frequent and sophisticated, organizations increasingly rely on application networking technologies for defense.
Exponential Growth in Data Center Speeds. Organizations are enhancing the performance of their networks by increasing the data traffic speeds of their data center networks from the 1 and 10 Gigabit Ethernet rates in use over the last ten years to 40 Gigabit Ethernet currently and are now evolving to 100 Gigabit Ethernet. Organizations require high performance application networking technology to ensure data center application and network performance and security are maintained despite rapidly escalating data rates.
Need for Next-Generation High Performance Application Networking
In order to address these increasingly complex network challenges, a new generation of application-aware networking solutions is needed in order to look deeply into application content, modify content for performance optimization or security purposes, and forward the traffic at rapidly escalating network data rates. Next-generation application networking solutions require: