throbber
Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 1 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 1 of 99
`
`
`
`
`EXHIBIT 4
`
`EXHIBIT 4
`
`
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 2 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 2 of 99
`
`[able of antents
`
`UNITED STATES
`
`SECURITIES AND EXCHANGE COMMISSION
`Washington, 0.0. 20549
`
`FORM 10-K
`
`Annual Report Pursuant to Section 13 or 15ml of the Securities Exchange Act of 1934
`For the Annual Period Ended December 31. 2012
`or
`
`El
`
`Transition Report Pursuant to Section 13 or 15(d} at the Securities Exchange Act of 1934
`For the transition period from
`to
`Commission file number 001 (55662
`
`QUALYS, INC.
`(Exact name of registrant as specified in its charter)
`
`Delaware
`
`{State or other jurisdiction of
`Incorporation or organization)
`
`7741584165
`
`[I.R.S. Employer
`Identification Number]
`
`1600 Bridge Parkway. Redwood City, California 94065
`{Address of principal executive offices, including zip code)
`{650) am ciao
`{Registrant‘s telephone number. including area code)
`
`Securities registered pursuant to section 120:) of the Act:
`
`Common stock, $0.001 par value per share
`
`NASDAQ Stock Market
`
`Title of each class
`
`Name or each exchange on which registered
`
`Securities registered pursuant to section 13l9l of the Act: None
`Indicate by check mark if the registrantis a well-known seasoned issuer. as defined in Rule 406 ofthe Securities Act Yes El No [it
`
`Indicate by check mark if the registrantis not required to file reports pursuant to Section 13 or Section film of the Act. Yes D No IE]
`
`indicate by check mark whetherthe Registrant (1} has filed all reports required to be filed by Section 13 or 15(d) ofthe Securities Exchange Act of 1934
`during the preceding 12 months(or for such shorter period thatthe Registrantwas required to file such reports]. and (2]: has been subject to such filing
`requirements for the past 90 days. Yes IX] No El
`
`Indicate by check mark whetherthe registrant has submitted electronically and posted on its corporate Web site, ifany. every Interactive Data File required to
`be submitted and posted pursuant to Rule 405 of Regulation S—T during the preceding 12 months [or for such shorter period thatthe registrantwas required
`to submitand post such files). Yes [it No El
`
`Indicate by check mark ifdisclosure ofdelinquentfilers pursuant to Item 405 of Regulation 5-K(§229.405 of this chapter) is not contained herein. and will not
`be contained. to the bestof registrant's knowledge. in definitive proxy or information statements incorporated by reference in Part III otthis From 10-K or any
`amendmentto this Form 10-K. til
`
`Indicate by check mark whether the registrant is a large accelerated filer‘ an accelerated filer. a non—accelerated filer‘ or a smaller reporting company. See the
`definitions of‘large accelerated filer," "accelerated titer" and "smaller reporting company" in Rule 12b-2 of the Exchange Act (Check one]:
`
`
`
`
`X
`
`Large accelerated filer
`
`El
`
`Accelerated filer
`
`El
`
`Non-accelerated filer
`(Do notcheck ifa smaller
`reporting company}
`
`Smaller reporting company
`
`El
`
`Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b—2 ofthe Exchange Act). Yes El No [K]
`
`The registrant‘s common stock began trading on the NASDAQ Stock Marketon September 28, 2012. As of December 31 , 2012, the aggregate market value of
`voting shares ofcommon stock held by non-affiliates ofthe registrantwas $216.6 million based on the last reported sale price of the registrant‘s common
`stock on December 31 , 2012. Shares ofcommon stock held by each executive officer and director and by each person who owns 5% or more ofthe
`outstanding common stock have been excluded in that such persons may be deemed to be affiliates. This determination ofafiiliate status is not necessarily a
`conclusive determination for other purposes.
`
`The numberof shares oi the Registrant’s common stock outstanding as of February 26. 2013 was 31541650 shares.
`
`DOCUMENTS INCORPORATED BY REFERENCE
`Portions ofthe registrant's Proxy Statement for its 2013 Annual Meeting of Stockholders are incorporated by reference in Part III ofthis Annual Report on Form
`
`QUALYSOOO30017
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 3 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 3 of 99
`10-K where indicated. Such proxy slalemenlwill he filed wiih ihe Securities and Exchange Commission wiihin 120 days ofihe registrant's fiscal year ended
`December 31‘ 2012.
`
`
`
`QUALYSOOO300‘I 8
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 4 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 4 of 99
`
`Table of Contgnfi
`
`Business
`Risk Factors
`Unresolved Staff Comments
`
`Properties
`Legal Proceedings
`Mine Safety'DisclosureS
`
`Qualys, Inc.
`TABLE OF CONTENTS
`
`PART I
`
`PART II
`
`Market for Registrant's Common Equity. Related Stockholder Matters and Issuer Purchases of Equity Securities
`Selected Financial Data
`Management's Discussion and Analysis of Financial Condition and Results of Operations
`Quantitative and Qualitative Disclosures About Market Risk
`
`Financial Statements and Supplementary Data
`Changes in and Disagreements with Accountants on Accounting and Financial Disclosure
`Controls and Procedures
`Other Information
`
`PART III
`
`Directors. Executive Oflicers-and Corporate. Governance
`Executive Compensation
`Security Ownership of Certain Beneficial Ownersand Management and Related Stockholder Matters
`Certain Relationships and Related Transactions. and Director Independenoe
`Principal Accounting Fees and Services
`
`PART IV
`
`Item 1.
`Item 1A.
`Item 13.
`
`Item 2.
`Item 3.
`Item 4 ..
`
`Item 5.
`Item 6.
`Item F.
`Item 7A.
`
`Item 8.
`Item 9.
`Item 9A.
`Item QB.
`
`Item 10.
`Item 11.
`Item 12.
`Item 13.
`Item 14.
`
`Exhibits and Financial Statement Schedu les
`
`Item 15.
`Signatures
`Exhibit Index
`
`Page
`
`3
`11
`33
`
`33
`33
`33
`
`34
`37
`41
`5?
`
`58
`85
`35
`85
`
`86
`36
`86
`86
`86
`
`8.?
`88
`69
`
`Id
`
`QUALYSOOO30019
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 5 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 5 0f 99
`
`Table gf antenls
`
`Forward-Loom ng Stamments
`
`PART I
`
`ln addition to historical information. this Annual Report on Form 10-K contains “toward-looking” statements within the meaning of the federal
`securities laws. winch statements involve substantial risks and uncertainties. Fonvar’dJooking statements generally relate to future events or our
`future financial or operating performance. in some cases, it is possible to identify toward-looking statements because they contain words such as
`“anticipates. " "believes. " “contemplates, " rcontinue. " “could, " "estimates. " “expects, " ”future. " 'intends, " 'tlkely. " ‘may, " "plans. " ‘potential. " ‘predicts. "
`“projects. " “seek. " "should. " “target” or- ‘Will. " or the negative of these rmrds or other similar terms or expressions that concern our expectations.
`strategy, plans or intentions. Fonvard-ioolting statements contained in this Annual Report on tfl-K include. but are not limited to, statements about:
`
`-
`
`our financial perfonnance, including our revenues, costs, expenditures. growth rates, operating expenses and ability to generate
`positive cash flow to attain and sustain profitability:
`anticipated technology trends. such as the use of cloud solutions,-
`our ability to adapt to changing market conditions;
`economic and financial conditions. including volatility in foreign exchange rates:
`our ability to diversify our sources of revenues:
`the effects of increased competition in our market:
`our ability to effectively manage our growth;
`our anticipated investments in sales and marketing and research and develerment:
`maintaining and expanding our relationships with channel partners;
`our ability to maintain, protect and enhance our brand and intellectual property:
`costs associated with defending intellectual property infringement and other claims:
`our ability to attract and retain qualified employees and key personnel:
`our ability to successfully enter new markets and manage our lntemational expansion; and
`other factors discussed in this Annual Report on Form 10-K in the sections titled ”Risk Factors, " "Management's Discussion and
`Analysis of Financial Condition and Results of Operations " and "Business. "
`
`We have based the forward-looking statements contained in this Annual Report on Form ‘lth primarily on our current expectations and
`projections about future events and trends that we believe may affect our business, financial condition, results of operations and prospects. The
`outcome of the events described in this fonvard-looking statements is subject to risks, uncertainties, assumptions. and other factors including
`those described in Part l, item 1A {Risk Factors) of this Annual Report. Moreover. we operate in a very competitive and rapidly changing
`environment. New risks and uncertainties emerge from time to time. and it is not pessihle for us to predict all risks and uncertainties that could
`have an impact on the toward-looking statements used herein. We cannot provide assurance that the results, events, and circumstances reflected
`in the forward-looking statements will be achieved or occur. and actual results. events or circumstances could differ materially from those
`described in the forward-looking statements.
`
`You should not rely on fonvard-looking statements as predictions of future events. Except as required bylaw, neither we nor any other person
`assumes responsibility for the accuracy and completeness of the fonvard—looking statements, and we undertake no obligation to update any
`fomard-looking statements to reflect events or circumstances after the date of such statements.
`
`Qualys. the Qualys logo and QualysGuerd. and other trademarks and service marks of Qualys appearing in this Annual Report on Form “3-K
`are the property of Qualys. This Annual Report on Form 10-K also contains trademarks and trade names of other businesses that are the property
`of their respective holders. We have omitted the ® and T'“ designations, as applicable. for the trademarks used in this Annual Report on Form 10-
`K.
`
`QUALYSOOOSOOEO
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 6 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 6 of 99
`
`lagle gf antents
`
`Item 1 .
`
`Business
`
`Overview
`
`We are a pioneer and leading provider of cloud security and compliance solutions that enable organizations to identify security risks to their
`IT lnfrastmctures. help protect their IT systems and applications from ever-evolving cyber attacks and achieve compliance with internal policies
`and external regulations. Our cloud solutions address the growing security and compliance complexities and risks that are amplified by the
`dissolving boundaries between internal and external IT infrastructures and web environments. the rapid adoption of cloud computing and the
`proliferation of geographically dispersed IT assets. Our integrated suite of security and compliance solutions delivered on our QualysGuard Cloud
`Platform enable our customers to identify their IT assets. collect and analyze large amounts of IT security data. discover and prioritize
`vulnerabilities. recommend remediation actions and verify the implementation of such actions. Organizations use our integrated suite of solutions
`delivered on our QualysGuard Cloud Platform to cost-effectively obtain a unified view of their security and compliance posture across globally-
`distributed IT infrastructures.
`
`IT infrastnictures are more complex and globally-distributed today than ever before, as organizations of all sizes increasingly rely upon
`myriad interconnected information systems and related IT assets. such as servers. databases. web applications, routers. switches. desktops.
`laptops. other physical and virtual infrasthcture. and numerous external networks and cloud services. In this environment. new and evolving
`technologies intended to improve organizations‘ operations can also increase vulnerability to cyber attacks. which can expose sensitive data,
`damage IT and physical infrastructures. and result in serious financial or reputational consequences. In addition, the rapidly increasing amount of
`data and devices in IT environments makes it more difficult to identify and remediate vulnerabilities in a timely manner. The predominant approach
`to IT security has been to implement multiple disparate security products that can be costly and difficult to deploy. integrate and manage and may
`not adequately protect organizations. As a result. we believe there is a large and growing opportunity for comprehensive cloud security and
`compliance solutions.
`
`We designed our QualysGuard Cloud Platform to transform the way organizations secure and protect their IT infrasthctures and applications.
`Our cloud platform offers an integrated suite of solutions that automates the lifecycle of asset discovery. security assessments, and compliance
`management for an organization's IT infrastructure and assets. whether they reside inside the organization. on their network perimeter or in the
`cloud. Since inception, our solutions have been designed to be delivered through the cloud and to be easily and rapidly deployed on a global scale
`across a broad range of industries. enabling faster implementation and lower total cost of ownership than traditional on-premise enterprise software
`products. Our customers, ranging from some of the largest organizations to small businesses, are all served from our globally-distributed cloud
`platform. enabling us to rapidly deliver new solutions. enhancements and security updates.
`
`We were founded and incorporated in December 1999 with a vision of transforming the way organizations secure and protect their IT
`infrastructure and applications and initially launched our first cloud solution. QualysGuard Vulnerabiiity Management. in 2000. This solution has
`provided the substantial majority of our revenues to date. representing 31%.. 90% and 92% of total revenues in 2012. 2011 and 2010. respectively.
`As this solution gained acceptance. we introduced new solutions to help customers manage increasing IT security and compliance requirements.
`In 2006. we added our PCI Compliance solution. and in 2008. we added our Policy Compliance solution. In 2009, we broadened the scope of our
`cloud services by adding Web Application Scanning. We continued our expansion in 2010. launching Malware Detection Service and Qualys
`SECURE Seal for automated protection of websites. On September 28. 2012. our common stock commenced trading on the NASDAQ Stock
`Market under the trading symbol "QLYS." and on October 3, 2012 we closed our initial public offering.
`
`We provide our solutions through a software—as—aservice model. primarily with renewable annual subscriptions. These subscriptions require
`customers to pay a fee in order to access our cloud solutions. We invoice our customers for the entire subscription amount at the start of the
`subscription term. and the invoiced amounts are treated as deferred revenues and are recognized ratably over the term of each subscription.
`Historically. we have experienced significant revenue growth from existing customers as they renew and purchase additional subscriptions.
`Revenues from customers existing at or prior to December 31. 2011 grew $7.8 million to $84.0 million during 2012. We expect this trend to
`continue.
`
`QUALYSOOO3002‘I
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 7 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 7 of 99
`
`[sale of Contents
`
`Our QualysGuard Cloud Platform is currently used by over 6.150 organizations in more than 100 countries. including a majority of each of the
`Forbes Global 100 and Fortune 100. Our revenues increased from $65.4 million in 2010 to $6.2 million in 2011. and reached $91.4 million in 2012.
`We generated net income of $0.8 million in 2010. $2.0 million in 2011, and $2.3 million in 2012. Total assets as of December 31, 2012 and 2011
`were $170.3 million and $68.8 million. respectively.
`
`Our Growth Strategy
`We intend to leverage our innovation and extensive expertise to strengthen our leadership position as a trusted provider of cloud security and
`compliance solutions. The key elements of our growth strategy are:
`-
`Continue to innovate and enhance our cioud piati‘onn and suite of soiutr‘ons. We intend to continue to make significant
`investments in research and development to extend our cloud platform's functionality by developing new security solutions and further
`enhancing our existing suite of solutions. In 2012. we introduced several new solutions on our platform. including our Web Application
`Scanning and Zero-Day Risk Analyzer, and have additional solutions under development.
`
`-
`
`.
`
`.
`
`.
`
`Expand the use of our suite of soiutions by our iarge and diverse customer base. With more than 6,150 customers across many
`industries and geographies. we believe we have a significant opportunity to sell additional solutions to our customers and expand their use
`of our suite of solutions. Since the majority of our customers initially deploy only one of our solutions and in select parts of their IT
`infrastructures our existing customers serve as a strong source of new sales. In this regard, we have significantly expanded our sales
`execution and marketing functions to increase adoption of our newly developed solutions among our existing customers.
`
`Drive new customer growth. We are pursuing new customers by targeting key accounts and expanding our sales and marketing
`organization and network of channel partners. We will continue to seek to make significant investments to encourage organizations to
`replace their existing security products with our cloud solutions.
`
`Broaden our giobai reach. We intend to expand our relationships with key security consulting organizations, managed security service
`providers and value added resellers to accelerate the adoption of our cloud platform. We seek to strengthen existing relationships as well
`as establish new relationships to increase the distribution and market awareness of our cloud platform and target new geographic regions.
`
`Selectively pursue technoiogy acquisitions to boister our capabiiities and ieadership position. We may explore acquisitions that
`are complementary to and can expand the functionality of our cloud platform. We may also seek to acquire technology teams to
`supplement our own team and increase the breadth of our cloud security and compliance solutions.
`
`Our Platform
`
`Our QualysGuard Cloud Platform consists of a suite of IT security and compliance solutions that leverage our shared and extensible core
`services and our highly scalable multi-tenant cloud infrastructure.
`
`Our suite of solutions provides security intelligence by automating the life cycle of IT asset discovery. security assessment and compliance
`management. Our core services layer provides a set of advanced shared technologies that are leveraged by our suite of security and compliance
`solutions, which we refer to as our Core Services.
`
`Built on our cloud platform infrastructure, our Core Services provide an integrated framework with proprietary functionalities that act as
`building blocks to enable efficient and scalable delivery of our customer—facing cloud solutions. Our cloud platform‘s infrastructure includes
`integrated services that deliver a highly automated and scalable scanning inirastmcture capable of scanning IT systems and web applications.
`inside and outside corporate firewalls.
`
`The Core Services and infrastructure layers of our cloud platform deliver benefits to our entire suite of security and compliance solutions,
`including:
`
`.
`
`-
`
`Dynamic and interactive user interfaces with configurable report templates to present scan data with a wide range of presentation options
`to match a customer’s needs;
`
`Fast searching of several extensive QualysGuard data sets, including scan results. asset data. scan profiles, users and vulnerabilities:
`
`5
`
`QUALYSOOO30022
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 8 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 8 of 99
`
`[able gf antents
`
`. Asset management technology for hierarchical asset categorization 'via dynamic tagging and role-based customer access management;
`and
`
`.
`
`Distributed scanning platform for global cloud-based environments.
`
`We also provide open application program interfaces. or APIs. and other developer tools that allow third parties to embed our technology into
`their solutions and build applications on our cloud platform.
`
`QuaiysGuard Cloud Suite
`Our suite of solutions, which we refer to as the QualysGuard Cloud Suite. currently includes six solutions: Vulnerability Management. Web
`Application Scanning, Malware Detection Service. Policy Compliance. PCI Compliance and Qualys SECURE Seal. This integrated set of cloud
`solutions enables organizations to:
`
`.
`
`Discover and catalogue information assets inside the organization. on the perimeter, or in the cloud;
`-
`. Manage assets on an ongoing basis to establish a trusted repository for IT system configurations and to maintain hierarchical
`relationships between them:
`Design policies to establish a secure and compliant IT infrasthcture and automate ongoing security and compliance assessments of IT
`systems and applications in accordance with best practices;
`Proactively identify and help flit vulnerabilities to mitigate security risks and achieve compliance:
`.
`- Monitor and measure security and compliance through a unified user interface; and
`.
`Distribute security and compliance reports tailored to differing customer needs. including management personnel, auditors and security
`professionals.
`
`Our customers can subscribe to one or more of our security and compliance solutions based on their initial needs and expand their
`subscriptions over time to new areas within their organization or to additional QualysGuard solutions. We offer two editions of our QualysGuard
`Cloud Suite. the Enterprise edition for large and medium-sized enterprises and the Express edition for small and medium-sized businesses.
`QualysGuard Cloud Suite solutions are described below.
`
`OualysGuard Vulnerability Management
`QualysGuard Vulnerability Management. or QualysGuand ‘thr is an industry leading and award-winning solution that automates network
`auditing and vulnerability management across an organization. including network discovery and mapping, asset management. vulnerability
`reporting. and remediation tracking. Driven by our comprehensive KnowledgeBase of known vulnerabilities. QualysGuard VM enables cost-
`efiective protection against vulnerabilities without substantial resource deployment.
`
`QuaiysGuard Policy Compliance
`
`QualysGuard Policy Compliance. or Qualys Guard PC. allows customers to analyze and collect configuration and access control information
`from their networked devices and web applications and automatically maps this information to intemal policies and external regulations in order to
`document compliance. QualysGuard PC is fully automated and helps reduce custorners' cost of compliance without requiring the use of software
`agents.
`
`OualysGuard PCI Compliance
`QualysGuard PCI Compliance. or OualysGuard PCI. provides organizations that store cardholder data a cost-effective and highly automated
`solution to verify and document compliance with PCI DSS. QuaiysGuard PCI allows merchants to complete the annual PCI Self-Assessment
`Questionnaire or SAQ. to perform vulnerability scanning for quarteny PCI audits and to meet the demands of PCI for web application security.
`
`QuelysGuard Web Application Scanning
`QualysGuard Web Application Scanning, or QualysGuard WAS. uses the scalability of our cloud platform to allow customers to discover.
`catalog and scan a large number of web applications. QualysGuard WAS scans and analyzes custom web applications and identifies
`vulnerabilities that threaten underlying databases or bypass access controls. These web applications are often the main attack vectors for cyber
`attackers.
`
`
`
`QUALYSOOO30023
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 9 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 9 of 99
`
`[able of antents
`
`QuaiysGuard Maiware Detection Service
`
`QualysGuard Malware Detection Service, or QualysGuard MDS, provides organizations with the ability to scan. identify and remove malware
`infections from their websites. QualysGuard MDS utilizes behavioral and static analysis to provide malware detection to organizations. It provides
`periodic scanning to monitor websites and delivers email alerts to notify customers of infections.
`
`Oueiys Guard Web Application Firewaii
`
`OualysGuard Web Application Firewall, or QualysGuard WAF, currently in beta testing, delivers enterprise~grade web application security
`without the costs, footprint, and complexity associated with appliancebased web application firewall solutions. It is designed to protect web
`applications from attack vectors by enhancing default web application configurations and virtual patching. QualysGuard WAF can improve website
`performance by reducing page load times and optimizing bandwidth.
`
`Quaiys SECURE Searr
`
`OualysGuard SECURE Seal helps organizations demonstrate to their onllne customers that they maintain a proactive security program. This
`solution includes scanning for the presence of malware, network and web application vulnerabilities and for SSL certificate validation. Websites
`that regularly perfon'n these security scans with no critical security issues detected can display a QualysG-uard SECURE Seal on their website to
`demonstrate to visitors that they are proactively securing their websites.
`
`QuaiysGuard Core Services
`
`-
`
`.
`
`-
`
`Our Core Services enable integrated workflows. management and real—time analysis and reporting across all of our IT security and
`compliance solutions. Our Core Services include:
`- Asset Tagging and Management.
`Enables customers to easily identify, categorize and manage large numbers of assets in highly
`dynamic IT environments and automates the process of inventory management and hierarchical organization of IT assets.
`Reporting and Dashboards.
`A highly configurable reporting engine that provides customers with reports and dashboards based on their
`roles and access privileges.
`A configurable workflow engine that enables customers to easily build questionnaires and capture
`Questionnaires and Collaboration.
`existing business processes and workflows to evaluate controls and gather evidence to validate and document compliance.
`Remediation end Worilrflow.
`An integrated workfiow engine that allowe customers to automatically generate helpdesir tickets for
`remediation and to manage compliance exceptions based on customer-defined policies enabling subsequent review, commentary.
`tracking and escalation. This engine automatically distributes remediation tasks to IT administrators upon scan completion. tracks
`remediation progress and closes cpen tickets once patches are applied and remediation is verified in subsequent scans.
`Big Date Correlation and Aneiytics Engine.
`Provides capabilities for indexing, searching and correlating large amounts of security and
`compliance date with other security incidents and third-party security intelligence data. Embedded worirzflows enable customers to quickly
`assess risk and access information for remediation. incident analysis and forensic investigations.
`Aierts and Notifications. Creates email notifications to alert customers of new vulnerabilities, malware infections. scan completion. open
`trouble tickets and system updates.
`
`'
`
`-
`
`QuaiysGuard Cloud infrastrucurre
`Our infrastructure layer, which we refer to as our lniras'tructure, includes the data, data processing capabilities. software and hardware
`infrastructure and infrastructure management capabilities that provide the foundation for our cloud platform and allow us to automatically scale our
`lnirastmcture and Core Services to scan millions of lF's. Each Infrastmcture service is described below:
`
`-
`
`Scaiabie Capacity. We have designed a modular and scalable infrastructure that leverages virtualization and cloud technologies. This
`allows our operations team to dynamically allocate additional capacity on-demand across our entire QualysGuarcl Cloud Platform to
`address the growth and scalability of our solutions.
`
`QUALYSOOO30024
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 10 of 99
`Case 4:18-cv-07229—YGR Document 100-4 Filed 09/04/20 Page 10 of 99
`
`[able gi‘ antents
`
`-
`

`
`Built on top of our secure data storage model. this engine indexes petabytes of data and uses this
`Big Data Indexing and Storage.
`information in real~time to execute tags or rules to dynamically update IT assets‘ properties. which are used in various workfiows for
`scanning, reporting and remediation.
`OuaiysGuard Knowledge-Base. QualysGuard relies on our comprehensive repository. which we refer to as our KnowledgeBase. of known
`vulnerabilities and compliance controls for a wide range of devices. technologies and applications that powers our security and compliance
`scanning technology. We update our KnowledgeBase daily with signatures for new vulnerabilities. control checks. validated fixes and
`improvements.
`
`- Managed Scanner Appir’ances. As part of our cloud platform. we host and operate a large number of globally distributed physical scanner
`appliances that our customers use to scan their externally facing systems and web applications. To scan intemal IT assets. customers
`can also deploy our scanners. which are available on a subscription basis as physical appliances or downloadable virtual images, within
`their internal networks. Our scanner appliances self-update daily in a transparent manner using our automated and proprietary scan
`management technology. These scanner appliances allow us to scale our cloud platform to scan netvvorked devices and web applications
`across organizations networks around the world.
`
`Our Customers
`
`We market and sell our solutions to enterprises . govemment entities and to small and medium size businesses across a broad range of
`industries. including education, financial services, government. healthoare. insurance, manufacturing. media, retail. technology and utilities. As of
`December 31. 2012. we had over 6.150 customers in more than 100 countries, including a majority of each or" the Forbes Global 100 and Fortune
`100. In each of 2012. 2011 and 2010. no one customer accounted for more than 10% of our revenues. In 2012. 2011 and 2010. approximately
`68%. 67% and 67%. respectively. of our revenues were derived from customers in the United States. We sell our solutions to enterprises and
`government entities primarily through our field sales force and to small and medium-sized businesses through our inside sales force. We generate
`a significant portion of sales through our channel partners. including managed service providers. value-added resellers and consulting firms in the
`United States and intemationally.
`
`Sales and Marketing
`Sate-s
`
`We market and sell our IT security and compliance solutions to customers directly through our sales teams as well as indirectly through our
`network of channel partners.
`
`Our global sales force is organized into a field sales team. which focuses on enterprises. generally including organizations with more than
`4,000 employees. and an inside sales team. which focuses on small to medium businesses. which generally include organizations with less than
`4,000 employees. Both our field and inside sales teams are divided into three geographic regions. including the Americas: Europe, Middle East
`and Africa; and Asia-Pacific. We also further segment each of our sales teams into groups that focus on adding new customers or expanding
`relationships with existing customem.
`
`Our channel partners maintain relationships with their customers throughout the territories in which they operate and provide their customers
`with services and third«party solutions to help meet those customers‘ evolving security and compliance requirements. As such. these partners
`offer our IT security and compliance solutions in conjunction with one or more of their own products or services and act as a conduit through which
`we can connect with these prospective customers to offer our solutions. Our channel partners include security consulting organizations. managed
`service providers and resellers. such as Computacenter UK Ltd. Dell Inc.. FishNet Security. Inc. Insight Technologies. Inc.. Symantec
`Corporation and Verizon Communications Inc.
`
`QUALYSOOO3OOZ5
`
`

`

`Case 4:18-cv-07229-YGR Document 100-4 Filed 09/04/20 Page 11 of 99
`Case

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket