More annual reports from SecureWorks:
2022 ReportPeers and competitors of SecureWorks:
E2open ParentUNITED STATESSECURITIES AND EXCHANGE COMMISSIONWashington, D.C. 20549 FORM 10-K (Mark One) þ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934For the fiscal year ended February 1, 2019oro TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIESEXCHANGE ACT OF 1934For the transition period from to Commission file number: 001-37748SecureWorks Corp.(Exact name of registrant as specified in its charter)Delaware 27-0463349(State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.)One Concourse Parkway NE Suite 500, Atlanta, Georgia 30328(Address of principal executive offices) (Zip Code)Registrant’s telephone number, including area code: (404)327-6339Securities registered pursuant to Section 12(b) of the Act:Title of each class Name of each exchange on which registeredClass A Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC(NASDAQ Global Select Market)Securities registered pursuant to Section 12(g) of the Act: NoneIndicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes o No RIndicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No RIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes R No oIndicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T during thepreceding 12 months (or for such shorter period that the registrant was required to submit such files). Yes R No oIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant’sknowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. RIndicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, smaller reporting company, or an emerging growth company. Seethe definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company,” and “emerging growth company” in Rule 12b-2 of the Exchange Act.Large accelerated filer ¨ Accelerated filer þNon-accelerated filer ¨ Smaller reporting company ¨ Emerging growth company þIf an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financialaccounting standards provided pursuant to Section 13(a) of the Exchange Act. þIndicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes ¨ No þAs of August 3, 2018, the last business day of the registrant’s most recently completed second fiscal quarter, the aggregate market value of the registrant’s common stock held by non-affiliates was approximately $147.3 million (based on the closing price of $12.49 per share of Class A common stock reported on the NASDAQ Global Select Market on that date).As of March 25, 2019, there were 81,276,910 shares of the registrant’s common stock outstanding, consisting of 11,276,910 outstanding shares of Class A common stock and70,000,000 outstanding shares of Class B common stock.DOCUMENTS INCORPORATED BY REFERENCEThe information required by Part III of this report, to the extent not set forth herein, is incorporated by reference from the registrant’s proxy statement relating to the annual meeting ofstockholders in 2019. Such proxy statement will be filed with the Securities and Exchange Commission within 120 days after the end of the fiscal year to which this report relates.TABLE OF CONTENTS PAGE PART I Item 1 Business 4 Item 1A Risk Factors 19 Item 1B Unresolved Staff Comments 39 Item 2 Properties 40 Item 3 Legal Proceedings 40 Item 4 Mine Safety Disclosures 40PART II Item 5 Market for Registrant's Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities 41 Item 6 Selected Financial Data 43 Item 7 Management's Discussion and Analysis of Financial Condition and Results of Operations 44 Item 7A Quantitative and Qualitative Disclosure About Market Risk 62 Item 8 Financial Statements and Supplementary Data 63 Item 9 Changes in and Disagreements With Accountants on Accounting and Financial Disclosure 96 Item 9A Controls and Procedures 96 Item 9B Other Information 96PART III Item 10 Directors, Executive Officers and Corporate Governance 98 Item 11 Executive Compensation 98 Item 12 Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters 98 Item 13 Certain Relationships and Related Transactions, and Director Independence 98 Item 14 Principal Accounting Fees and Services 98PART IV Item 15 Exhibits, Financial Statement Schedules 99 Item 16 Form 10-K Summary 102SIGNATURES 103CAUTIONARY NOTE REGARDING FORWARD-LOOKING STATEMENTSThis report contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the SecuritiesExchange Act of 1934. The words “may,” “will,” “anticipate,” “estimate,” “expect,” “intend,” “plan,” “aim,” “seek” and similar expressions as they relate tous or our management are intended to identify these forward-looking statements. All statements by us regarding our expected financial position, revenues,cash flows and other operating results, business strategy, legal proceedings, and similar matters are forward-looking statements. Our expectations expressed orimplied in these forward-looking statements may not turn out to be correct. Our results could be materially different from our expectations because of variousrisks, including the risks discussed in this report under “Part I – Item 1A – Risk Factors” and in our other periodic and current reports filed with the Securitiesand Exchange Commission. Any forward-looking statement speaks only as of the date as of which such statement is made, and, except as required by law, weundertake no obligation to update any forward-looking statement after the date as of which such statement was made, whether to reflect changes incircumstances or our expectations, the occurrence of unanticipated events, or otherwise.3Except where the context otherwise requires or where otherwise indicated, all references in this report to “Secureworks,” “we.” “us,” “our” and “ourcompany” refer to SecureWorks Corp. and our subsidiaries on a consolidated basis, and all references to “Dell” refer to Dell Inc. and its subsidiaries on aconsolidated basis.Our fiscal year is the 52- or 53-week period ending on the Friday nearest January 31. Our 2019 fiscal year ended on February 1, 2019, our 2018 fiscal yearended on February 2, 2018, and our 2017 fiscal year ended on February 3, 2017.Part IItem 1. BusinessOverviewWe are a leading global cybersecurity company that protects organizations in the digitally connected world. We combine visibility from thousands ofcustomers, machine learning and automation from our industry-leading SecureWorks Counter Threat PlatformTM, and actionable insights from our team ofelite researchers, analysts and consultants to create a powerful network effect that provides increasingly strong protection for our customers.Our mission is to unlock the value of our customers’ security investments by simplifying their complex security operations and amplifying their defenses.Through our vendor-neutral approach, we create integrated and comprehensive solutions by proactively managing the collection of “point” productsdeployed by our customers to address specific security issues and provide supplemental solutions where gaps exist in our customers’ defenses.We have pioneered an integrated approach that delivers a broad portfolio of information security solutions to organizations of varying size and complexity.Our flexible and scalable solutions support the evolving needs of the largest, most sophisticated enterprises staffed with in-house security experts, as well assmall and medium-sized businesses and government agencies with limited in-house capabilities and resources.By aggregating and analyzing data from various sources around the world, our solutions enable organizations to:•prevent security breaches by fortifying their cyber defenses,•detect malicious activity,•respond rapidly to security breaches, and•predict emerging threats.Our solutions leverage the proprietary technologies, processes and extensive expertise and knowledge of the tactics, techniques and procedures of theadversary that we have developed over more than 19 years. Key elements of our strategy include:•maintain and extend our technology leadership,•expand and diversify our customer base,•deepen our existing customer relationships, and•attract and retain top talent.As of February 1, 2019, we served approximately 4,700 customers across 52 countries. Our success in serving our customers has resulted in consistentrecognition of our company as a market leader in managed security services by leading industry research firms.4The fees we charge for our solutions vary based on a number of factors, including the solutions selected, the number of customer devices covered by theselected solutions, and the level of management we provide for the solutions. Approximately 76% of our revenue is derived from subscription-basedsolutions, provided under managed security services, while approximately 24% is derived from professional services engagements. As we respond to theevolving needs of our customers, the relative mix of subscription-based solutions and professional services we provide our customers may fluctuate.Corporate InformationWe are a holding company that conducts operations through our wholly-owned subsidiaries. The mailing address of our principal executive offices is OneConcourse Parkway NE, Suite 500, Atlanta, Georgia 30328. Our telephone number at that address is (404) 327-6339.The predecessor company of SecureWorks Corp. was originally formed as a limited liability company in Georgia in March 1999, and Secureworks wasincorporated in Georgia in May 2009. In February 2011, Secureworks was acquired by Dell Inc. In November 2015, our company reincorporated fromGeorgia to Delaware and, in connection with the reincorporation, changed its name from SecureWorks Holding Corporation to SecureWorks Corp. On April27, 2016, Secureworks completed its initial public offering, or IPO. Upon the closing of the IPO, Dell Technologies Inc., the ultimate parent company of Dell,Inc., owned indirectly through Dell Inc. and Dell Inc.’s subsidiaries no shares of our outstanding Class A common stock and all shares of our outstandingClass B common stock, which as of February 1, 2019 represented approximately 86.4% of our total outstanding shares of common stock and approximately98.5% of the combined voting power of both classes of our outstanding common stock.We maintain a corporate Internet website at www.secureworks.com. We make available free of charge through our website our annual reports on Form 10-K,quarterly reports on Form 10-Q, current reports on Form 8-K, and amendments to those reports, as soon as reasonably practicable after we electronically filethe reports with, or furnish the reports to, the Securities and Exchange Commission. Information appearing on, or that can be accessed through, our website isnot a part of this report.Industry BackgroundIncreasing cybersecurity challenges have created a large and fragmented market for IT security products and services.We believe that many organizations that use the information technology, or IT, security products and services available in the market remain vulnerable tocyber attacks because they rely on a collection of uncoordinated “point” products that address specific security issues but fall short in identifying anddefending against next-generation cyber threats.Organizations of all sizes are using new information technologies to make their businesses more productive and effective.Modern IT infrastructures are growing in complexity and often include a combination of on-premises, cloud and hybrid environments. In addition, theadoption of mobile computing allows access to critical business information from various devices and locations. The widespread adoption of these advancedIT architectures, along with the rapid growth of connected devices and new ways of delivering IT services, enables organizations to benefit from businessapplications that are more powerful and easier to deploy, use and maintain.This rapidly evolving IT environment is increasingly vulnerable to frequent and sophisticated cyber attacks.The evolving landscape of applications, modes of communication and IT architectures makes it increasingly challenging for businesses to protect theircritical business assets from cyber threats. New technologies heighten security risks by increasing the number of ways a threat actor can attack a target bygiving users greater access to important business networks and information and by facilitating the transfer of control of underlying applications andinfrastructure to third-party vendors.Cyber attacks have evolved from computer viruses written by amateur hackers into highly complex and targeted attacks led by highly skilled adversariesintent on stealing information or causing financial and reputational damage.5The economic and reputational impact of attacks, coupled with growing regulatory requirements, makes cybersecurity defense increasingly a priority forsenior management and boards of directors.In the wake of numerous high-profile data breaches, organizations are increasingly aware of the financial and reputational risks associated with IT securityvulnerabilities. We believe that the cybersecurity programs of most organizations do not rival the persistence, tactical skill and technological prowess oftoday’s cyber adversaries. As a result, cyber attacks are successfully breaching organizations’ networks. Security breaches can be highly public and result inreputational damage and legal liability as well as large losses in productivity and revenue. Many organizations are particularly concerned about attacks thatattempt to misappropriate sensitive and valuable business information. Adding to the urgency of the IT security challenge, new regulations and industry-specific compliance requirements direct organizations to design, implement, document and demonstrate controls and processes to maintain the integrity andconfidentiality of information received and stored on their systems.The traditional cybersecurity approach of using numerous point products often fails to detect threats and block attacks.Information systems at many organizations are vulnerable to breach because they rely on a collection of uncoordinated point security products that addresssecurity risks in a piecemeal fashion rather than in a proactive and coordinated manner. An effective cyber defense strategy requires the coordinateddeployment of multiple products and services tailored to an organization’s specific security needs. Point products, however, primarily address security issuesin a reactive manner by employing passive auditing or basic blocking techniques, and often lack the integration and intelligent monitoring capabilities andmanagement within a common framework necessary to provide effective information security throughout an organization.Identifying and hiring qualified security professionals are significant challenges for many organizations.The difficulty in providing effective information security is exacerbated by the highly competitive environment for identifying, hiring and retainingqualified information security professionals.As a result, organizations engage information security services vendors to integrate, monitor and manage their point products to enhance their defensesagainst cyber threats.Because many organizations cannot adequately protect their networks from cyber threats, they are augmenting their IT security strategies to includeinformation security services. By using these services, organizations seek to decrease their vulnerability to security breaches, increase the effectiveness oftheir existing investments in security products and free their own IT staff to focus on other responsibilities.Traditional information security services vendors, however, often fail to satisfy the IT security needs of organizations, causing many of them to seek theadvantages of our solutions.Many organizations lack sufficient internal cybersecurity expertise to keep pace with the rapidly evolving threat landscape. As a result, these organizationsengage the support of information security services providers as part of their IT security strategy. However, traditional information security services offeredby telecommunications providers, security product vendors, large IT outsourcing firms and small regional providers often lack a broad perspective on thethreat landscape, are unable to scale their services to match organizations’ data processing requirements, fail to provide actionable security information, focusonly on a subset of organizations’ security needs or have limited deployment options.Our intelligence-driven information security solutions, as described below, offer an innovative approach to prevent, detect, respond to and predictcybersecurity breaches. We believe that our singular focus on providing a comprehensive portfolio of information security solutions makes us a trustedadvisor and an attractive partner for our customers. This focus enables us to pursue a go-to-market strategy that addresses the diverse needs of our customersaround the world. Our vendor-neutral approach enables our customers to enhance their evolving IT security infrastructure, appliances and best of breedtechnologies with our solutions and capabilities, which together provide our customers with both a comprehensive and highly-effective security defenseposture.6Our SolutionsOur Counter Threat PlatformTM constitutes the core of our intelligence-driven information security solutions and provides our customers with a powerfulintegrated perspective regarding their network environments and security threats. Our integrated suite of solutions includes:▪Managed security, through which we provide our customers global visibility and insight into malicious activity enabling them to detect andeffectively remediate threats quickly ▪Threat intelligence, through which we deliver early warnings of vulnerabilities and threats, along with actionable information to help prevent anyadverse impact ▪Security and risk consulting, through which we advise our customers on a variety of security and risk-related matters, such as how to design andbuild strategic security programs, assess and test security capabilities and meet regulatory requirements▪Incident response, through which we help our customers minimize the impact and duration of security breaches through proactive customerpreparation, rapid containment and thorough event analysis followed by effective remediationAs part of our security and risk consulting solutions, we emphasize cloud security, through which we help customers deliver cloud-based services securely.Our customers may subscribe to our full suite of solutions or elect to subscribe to various combinations of our individual solutions. All of our solutions areenabled by our Counter Threat Platform and our large team of highly-skilled security experts.The key capabilities of our solutions currently include:Global Visibility. We have global visibility into the cyber threat landscape through our approximately 4,200 subscription-based customers across 52countries. We are able to gain near real time insights that enable us to predict, detect and respond to threats quickly and effectively. We also are able toidentify threats originating within a particular geographic area or relating to a particular industry and proactively leverage this threat intelligence to protectother customers against these threats.Scalable Platform with Powerful Network Effects. Our proprietary Counter Threat Platform features a multi-tenant, distributed architecture that enables oursoftware to scale and to provide faster performance while efficiently utilizing its underlying infrastructure. The platform collects, aggregates, correlates andanalyzes as many as 310 billion events daily from our extensive customer base to provide near real time risk assessment and rapid response. As our customerbase increases, our platform is able to analyze more events, and the intelligence derived from these additional events makes the platform more effective. Thisin turn drives broader customer adoption and enhances the value of the solutions to both new and existing customers.Contextual and Predictive Threat Intelligence. Our proprietary and purpose-built technology analyzes and correlates billions of events using advancedanalytical tools and sophisticated algorithms to generate threat intelligence. This intelligence is augmented by our Counter Threat UnitTM research team,which conducts research into threat actors, uncovers new attack techniques, analyzes emerging threats and evaluates the risks posed to our customers.Applying this intelligence across our solutions portfolio provides customers with deeper insights and enriched context regarding tactics, techniques andprocedures employed by those threat actors.Integrated, Vendor-Neutral Approach. Our solutions are designed to monitor alerts, logs and other messages across multiple stages of the threat lifecycle byintegrating a wide array of proprietary and third-party security products. This vendor-neutral approach allows us to aggregate events from a wide range ofsecurity and network devices, applications and endpoints to enhance our understanding of customers’ networks and increase the effectiveness of ourmonitoring solutions.Flexible Solution and Delivery Options. Our intelligence-driven information security solutions are purpose-built to serve a broad array of evolving customerneeds, regardless of a customer’s size or the complexity of its security infrastructure. Our customers may subscribe to any combination of our solutions andalso choose how much control they will maintain over their IT security infrastructure by selecting among our fully managed, co-managed or monitoreddelivery options. Our flexible approach enables customers to tailor our solutions to reduce large and risky investments and costly implementations and toensure quick and easy deployment.7Our Competitive StrengthsWe believe that the following key competitive advantages will allow us to maintain and extend our leadership position in providing intelligence-driveninformation security solutions:A Leader in Intelligence-Driven Information Security Solutions. We are a global leader in providing intelligence-driven information security solutions andbelieve we have become a mission-critical vendor to many of the large enterprises, small and medium-sized businesses and U.S. state and local governmentagencies we serve. We believe our position as a technology and market leader enhances our brand and positions us as a comprehensive solution. During fiscal2018, we were once again positioned in the Leaders quadrant in Gartner’s most recent Magic Quadrant for Managed Security Services Providers (“MSSPs”),Worldwide1 making this the tenth time Secureworks has been recognized in this report.Purpose-Built, Proprietary Technology. At the core of our solutions is the Counter Threat Platform, a proprietary technology platform we have developedduring our 19 years of operations. This platform collects, correlates and analyzes billions of daily events and data points, and generates enriched securityintelligence on threat actor groups and global threat indicators.Specialist Focus and Expertise. We have built our company, technology and culture with a singular focus on protecting our customers by deliveringintelligence-driven information security solutions. We believe this continued focus reinforces our differentiation from other information security servicesvendors, including telecommunications and network providers, IT security product companies, and local and regional information security solutionsproviders.Strong Team Culture. At our company, the fight against sophisticated and malicious cybersecurity threats is a personal one, and we take great pride inhelping our customers protect their critical business data and processes. We dedicate significant resources to ensure that our culture and brand reflect ourfocus on protecting our customers.Seasoned Management Team and Extensive IT Security Expertise. We have a highly experienced and tenured management team with extensive IT securityexpertise and a record of developing successful new technologies and solutions to help protect our customers.Our Growth StrategyOur goal is to be the global leader of intelligence-driven information security solutions. To pursue our strategy, we seek to:Maintain and extend our technology leadership: We intend to enhance our leading intelligence-driven integrated suite of solutions by addingcomplementary solutions that strengthen the security posture of our customers, such as security solutions for cloud-based environments. We intend to meetthis goal by continuing to invest in research and development, increasing our global threat research capabilities and hiring personnel with extensive ITsecurity expertise.Expand and diversify our customer base: We intend to continue to expand and diversify our customer base, both domestically and internationally, byinvesting in our direct sales force, further developing our strategic and distribution relationships, pursuing opportunities across a broad range of industriesand creating new cloud-based solutions. We also intend to continue increasing our geographic footprint to further enhance our deep insight into the globalthreat landscape and our ability to deliver comprehensive threat intelligence to our customers.Deepen our existing customer relationships: We intend to continue leveraging the strong customer relationships and high customer satisfaction from acrossour customer base to sell additional solutions to existing customers. We will continue to invest in our account management, marketing initiatives andcustomer support programs in seeking to achieve high customer renewal rates, help customers realize greater value from their existing solutions andencourage them to expand their use of our solutions over time.1 Gartner Magic Quadrant for Managed Security Services, Worldwide, Toby Bussa, Kelly M. Kavanagh, Sid Deshpande, Pete Shoard, 27 February 2018. This report was previously titled the Magic Quadrant for GlobalMSSPs and Magic Quadrant for MSSPs, North America. Company position as Secureworks in 2018, SecureWorks in 2017 and as Dell SecureWorks from 2015-2011.Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartnerresearch publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,including any warranties of merchantability or fitness for a particular purpose.The Gartner Report described herein, (the “Gartner Reports”) represents research opinion or viewpoints published, as part of a syndicated subscription service, by Gartner, Inc. (“Gartner”), and are not representations of fact.Each Gartner Report speaks as of its original publication date (and not as of the date of this Form 10-K) and the opinions expressed in the Gartner Report are subject to change without notice.8Attract and retain top talent: Our technology leadership, brand, exclusive focus on information security, customer-first culture and robust training anddevelopment program have enabled us to attract and retain highly skilled professionals with a passion for building a career in the information securityindustry. We will continue to invest in attracting and retaining top talent to support and enhance our information security offerings.Our CustomersAs of February 1, 2019, our total customer base was 4,700 customers, including 4,200 subscription customers, across 52 countries. Our customers includedapproximately 30% of the companies in the Fortune 500 in fiscal 2019. We did not have any single customer that represented 10% or more of our annualrevenue in any of our last three fiscal years.We serve customers in a broad range of industries, including the financial services, manufacturing, technology, retail, insurance, utility and healthcaresectors. In fiscal 2019, financial services and manufacturing customers accounted for 26.8% and 20.8%, respectively, of our revenue. No other industriesaccounted for 10% or more of our fiscal 2019 revenue.International revenue, which we define as revenue contracted through non-U.S. entities, represented approximately 22%, 16% and 13% of our total netrevenue in fiscal 2019, fiscal 2018 and fiscal 2017, respectively. For additional information about our non-U.S. revenues and assets, see “Notes toConsolidated Financial Statements—Note 11—Selected Financial Information” in our consolidated financial statements included in this report.Our Technology PlatformWe utilize the key components of our infrastructure described below to deliver our intelligence-driven information solutions to our customers.Counter Threat PlatformOur proprietary Counter Threat Platform was purpose-built to be the foundation of our information security solutions. It has a multi-tenant, distributedarchitecture that enables our software to run on a single platform while providing simultaneous access to multiple users. The platform collects, aggregates,correlates and analyzes billions of daily events (currently as many as 310 billion per day) from our extensive customer base, and uses sophisticatedalgorithms to detect malicious activity and deliver security countermeasures, dynamic intelligence and valuable context regarding the intentions and actionsof cyber adversaries. The timely analysis and routing of this security information enables our solutions to assess risk in near real time and allows us to reportrapidly to our customers worldwide. The platform is highly flexible, permitting us to tailor our solutions to a customer’s unique environment, and can beconfigured to identify specific security events of interest to a particular customer. Our platform was designed to be vendor-neutral. As a result, it canaggregate events from a wide range of security and network devices, applications and endpoints.The platform leverages our intelligence, gained over 19 years of processing and handling events, to provide insight into how attacks are initiated and spreadacross our customers’ networks. The platform also applies security intelligence based on threat indicators continuously gathered by our Counter Threat Unitresearch team through in-depth analysis of the cyber threat environment. This team conducts research into emerging threat actors and new attack tactics, anddevelops countermeasures that we apply to the platform to enable our customers proactively to prevent and detect compromises of their security. Our abilityto see more security incidents along with the applied intelligence acts as an early warning system that enables our security analysts proactively to alertcustomers, apply protections and respond quickly with appropriate context. The more security events we see, the more accurate our protections are and themore accurately we can respond.The Counter Threat Platform is supported by the following proprietary technologies:•Counter Threat Appliance. Our Counter Threat Appliance performs several of the important functions of the Counter Threat Platform. The CounterThreat Appliance is a physical or virtual appliance deployed in a customer’s data center, branch office or cloud environment, or our own data center.This technology supports a wide range of security and network devices, applications and endpoints to collect information on the customerenvironment, perform analytics and report to our counter threat operations centers. The Counter Threat Appliance establishes secure non-intrusivecommunications to transmit data back to our data centers, where the Counter Threat Platform enriches data with our intelligence based on ourintimate knowledge of threats and customer specific intelligence to detect security incidents.9•Foresee. Foresee, our behavioral and self-learning technology, identifies malicious events through the use of machine learning algorithms todetermine the probability and confidence that a particular event or a collection of events is malicious. Foresee learns which events are malicious ornon-malicious based on ongoing feedback from our certified security analysts and applies machine-learning analysis techniques for the discovery ofpreviously unknown threats.•Multi-Purpose Logic Engine. Our Multi-Purpose Logic Engine is an analytics engine that leverages our broad visibility into the global threatenvironment and applied intelligence from the Counter Threat Unit to identify security incidents of interest. The engine intelligently analyzesbillions of events into actionable information, providing valuable context to our security analysts to help inform their analysis of the securityincidents and shorten the customer’s response time.•Very Large Database. Our Very Large Database efficiently and cost-effectively collects, correlates, analyzes and stores billions of structured andunstructured data elements, which help us to identify new security threats, provide valuable context to our security analysts and customers andenable Counter Threat Unit researchers to perform historical threat analysis.•Threat Intelligence Management System, or TIMS. We manage structured and unstructured data in TIMS. TIMS collects, correlates and analyzesbillions of data points to catalogue threat actors and generate threat indicators applied to the Counter Threat Platform and across our solutions. Thedata points are sourced from our managed security solutions, malware, social media, honeypots (or traps set to detect or counteract attempts atunauthorized use of information systems), open source intelligence, hunting and incident response engagements, strategic relationships and priorityresearch.•Catalog for Artifact and Signal Extraction, or CASE. CASE is a repository and a set of tools for the dynamic analysis of malware to catalogue itsbehaviors and generate threat indicators. CASE feeds into TIMS threat indicators identified from the analysis of malware.•Attacker Database. Our Counter Threat Unit research team maintains a patented process for generating a proprietary Attacker Database that containsmachine readable threat intelligence we apply to the Counter Threat Platform, iSensorTM, Red CloakTM and third-party security controls.•Portal. Powered by integrated intelligence and analytics tools, the portal delivers near real time information to customer executives, managers andsecurity professionals and provides insights that help customers make better security decisions. It also facilitates near real time communicationbetween customers and our security analysts, measures the effectiveness of a customer’s security profile using asset-based and risk-weightedanalyses, supports regulatory compliance requirements, links threat intelligence from our Counter Threat Unit and enables a visualization of point-in-time, comparative and historical security trends across multiple security metrics. Our portal is accessible via web and mobile applications as wellas via customer applications that leverage our application programming interfaces. Security Operations Center AutomationWe have developed several technologies integrated into the Counter Threat Platform to automate operations within our counter threat operations centers,where our security professionals identify, diagnose and respond to security information.•Threat Analysis Platform. We present threat information to our certified security analysts in a graphical user interface. This interface supports thedelivery of high-quality security analysis of threats targeting or occurring within a customer’s environment. Visualization enables our securityanalysts to detect patterns and to determine in near real time relationships of security incidents within a customer environment and across our entirecustomer base. Our security analysts have access to all data collected from customer environments and human readable threat intelligence from ourCounter Threat Unit to provide them with the context necessary to inform their analysis and to help them determine whether they shouldcommunicate information about a security incident to a customer.•Ticket Management. Our ticket management system is based on Information Technology Infrastructure Library principles and delivers securitymonitoring and device management solutions to customers. A sophisticated and configurable workflow provides incident, change and problemmanagement in a leveraged-service delivery model to enable our counter threat operations centers to handle a higher volume of work with consistentquality.•Management and Monitoring Tools. To effectively manage and monitor our infrastructure at customer sites and our data centers, we rely on a suiteof purpose-built software applications to facilitate the full lifecycle management of all software and configuration deployments and updates,efficient management and troubleshooting, and monitoring of the health and availability of devices.10Other Enabling Technologies•iSensor. Many of our customers use our proprietary network intrusion detection and prevention appliance, the iSensor. The iSensor eliminatesmalicious inbound and outbound traffic in near real time by performing in-line deep packet inspection (which is an examination of packet data asthe data pass through the device for signs of malware, intrusions or other threats) and by applying countermeasures from the Counter Threat Unit.•Red Cloak. Red Cloak, our endpoint threat detection software, allows us to apply our threat intelligence and advanced analytics to the endpoint toreduce the amount of time required to detect a compromise of security and reduce the effort required to respond. Red Cloak also allows us to developstrategic countermeasures that interdict tactics used by threat actors.•Third-Party Technologies. Our intelligence-driven information security solutions are designed to monitor alerts, logs and other messages acrossmultiple stages of the threat lifecycle. In addition to security monitoring, we offer device management for many leading security platforms. Indeploying these solutions, we integrate a wide array of proprietary and third-party security products. Our technology supports firewalls from market-leading vendors, including, but not limited to, Cisco Systems, Inc., Palo Alto Networks, Inc., Check Point Software Technologies Ltd., JuniperNetworks, Inc., Fortinet, Inc. and SonicWall. In addition, we also support intrusion prevention systems from vendors such as Intel Corp. (McAfee),and web application firewalls from vendors such as Imperva, Inc., F5 Networks, Inc. and Citrix Systems, Inc.Further, we maintain alliance partnerships with key technology providers who deliver capabilities we see as valuable in keeping our customers secure. Thesepartnerships involve technology licensing, joint technology development, integration, research cooperation, co-marketing and sell-through arrangements.The principal technologies we license or resell from some of these key technology partners provide our customers with the following capabilities that inmany instances we integrate into our solutions:•Carbon Black – endpoint security•Cisco (Sourcefire) – network security•CrowdStrike – AI-driven and cloud-native endpoint security•Kenna Security – vulnerability management•Lastline – malware detection and protection•TIBCO (LogLogic) – log management•Qualys – vulnerability managementWe license the technologies under agreements that generally have terms ranging from one to five years, subject to renewal in most cases either upon notice ofrenewal or upon failure by us or the provider to give notice of termination to the other party. The provider generally may terminate any license upon advancenotice to us of between 90 and 270 days. The technology partner license agreements generally provide for post-termination support, transition and wind-down periods that are intended to limit any disruption to our business that could result from a license termination. We generally are required under theagreements to make licensing payments in the form of fees or royalties at a discount off the list price, although some agreements also include volume or tieredpricing.Our OfferingsWe offer an integrated suite of intelligence-driven information security solutions. Our customers may subscribe to our full suite of solutions or elect tosubscribe to various combinations of our individual solutions. All of our solutions are enabled by our Counter Threat Platform and our team of highly-skilledsecurity experts.Managed SecurityWe offer a broad range of managed security solutions, including those highlighted below.Security Monitoring. Security appliances, systems and servers generate extensive logs, alerts and other messages every day. This raw information must becontinuously monitored, correlated and analyzed in order to identify security events of actual concern while generating a minimal number of falsely-positiveresults. Our security monitoring solution collects, correlates and analyzes logs, alerts and other messages generated by most leading security technologiesand critical information assets, on a 24/7 basis, to identify anomalies and respond to threats in near real time. This solution functions either on a stand-alonebasis or in concert with customer-owned security information and event management platforms.11Advanced Malware Protection and Detection. Our advanced malware protection and detection solution, or AMPD, provides a layer of defense againstemerging zero-day threats for enterprise and medium-sized organizations, which are threats whose existence is unknown to the targeted organization or thoseresponsible for its security before the first exploitation occurs. AMPD uses next-generation sandboxing technology with full-system emulation to executeand analyze malware within a controlled environment, and draws on our threat intelligence data pool and our expert threat analysis teams. AMPD’scombination of deep intelligence capabilities developed by the Counter Threat Unit and advanced technology permits our customers to see, rapidly analyzeand accurately diagnose previously unknown malware, and to obtain focused guidance that expedites threat remediation.Advanced Endpoint Threat Detection. Advanced endpoint threat detection, or AETD, improves situational awareness and visibility through proprietaryendpoint intelligence developed by the Counter Threat Unit. AETD is a fully managed security solution that monitors the state of endpoints, which includeWindows servers, laptops and desktops, for threat indicators, investigates events to determine their severity, accuracy and context, and quickly escalatescritical events to the customer’s attention indicating that an endpoint may be compromised.Firewall and Next-Generation Firewall Solutions. Firewalls provide critical information necessary to identify and evaluate security events. We provide anarray of firewall solutions ranging from the collection, organization and reporting of firewall information to the full management of a customer’s firewall byour security analysts, including rule-set changes and overall configuration of the device for optimal performance. Our experts hold certifications from leadingvendors and have significant experience with the relevant technologies, enabling us to provide solutions to support market-leading vendors in various typesof environments. Our firewall management solutions ease the adoption of next-generation firewall technology through policy-based control overapplications, users and content, device provisioning and deployment and enable customers to respond immediately to security events.Managed Web Application Firewall Solutions. Web application firewalls are designed specifically to protect applications that deliver critical services viaInternet web protocols. These firewalls block certain connections while permitting others based on the configuration of the firewall in order to ensure thatonly legitimate traffic reaches protected applications. Web application firewalls are increasingly utilized to address various compliance mandates, includingthe Payment Card Industry Data Security Standard, or PCI DSS. Our managed web application firewall solution assists customers with the end-to-endmanagement of these complex devices, from initial configuration and periodic policy changes to patching, updating and full-time monitoring of systemhealth and performance.Managed Network Intrusion Detection System, or IDS, and Intrusion Prevention System, or IPS, Solutions. IDS and IPS technologies can provide a highlyeffective layer of security. We provide a wide range of solutions to enable our customers to realize the benefits from these technologies, and effectivelyidentify threats faster. Our solutions include security monitoring, performance and availability management, device upgrades and patch management, policyand signature management, integration of Counter Threat Unit intelligence and use of our proprietary iSensor device. We manage leading vendors’ IDS andIPS products as well as our iSensor.Vulnerability Management. Our Vulnerability Management solution, which is fully managed and maintained by a dedicated vulnerability management team,encompasses the two solutions described below.•Managed Vulnerability Scanning. A vulnerability scan is designed to alert an organization to potential exposures and vulnerabilities in its network.As part of our solution, we perform internal and external scan audits across network devices, servers, databases and other assets in on-premises andcloud environments.•Managed Web Application Scanning. Applications that deliver services via the web are the lifeblood of business-to-business and business-to-consumer e-commerce. A vulnerability scan can alert an organization to potential exposures and weaknesses in these web-based applications beforea threat actor exploits those weaknesses. Our managed web application scanning solution performs deep and accurate scans of web applications thatare hosted on customer premises or in cloud environments. These scans search for vulnerabilities specific to the web protocols that are foundationalto web applications. Our solution also supports the ability to log into web applications and discover vulnerabilities that may lie behind the loginpage.Log Retention Solutions. We offer comprehensive log aggregation, retention, searching and reporting solutions. Log retention enables our customers tosatisfy various compliance obligations, which require full log retention from critical IT systems to ensure the integrity of confidential data, and to conductforensic investigations. Our log retention solutions provide support for a wide range of sources, allowing the capture and aggregation of millions of logsgenerated every day by critical information assets such as servers, routers, firewalls, databases, applications and other systems of the log retention appliance.12Managed Policy Compliance. To assist customers in improving their security and compliance with regulatory mandates, our managed policy compliancesolution ensures that the configurations of customers’ critical systems are known and tracked and comply with pre-established security guidelines. Oursolution consists of two key components, software that automatically retrieves the configurations of critical systems and compares them to pre-establishedconfiguration targets, and a library of security and compliance-driven configuration checks across three systems. Our solution helps customers establishconfiguration targets, set up the scans, monitor the output and report on the results.Delivery Options for Managed SecurityOur managed security customers can choose how much control they maintain over their IT security infrastructure by selecting among our fully managed, co-managed or monitored solution delivery options. Our solutions are designed to be flexible and scalable to complement the evolving security needs of ourcustomers. Our customers often migrate between the different delivery options in response to their changing needs as well as to the changing threatlandscape.Fully Managed. With our fully managed delivery options, we assume control of a customer’s security technology so the customer can focus on running itsbusiness rather than becoming a security administrator. Customers selecting fully managed delivery obtain all of the benefits of our monitored deliveryoption, including access to our on-demand Counter Threat Platform. In addition, our team of security analysts will monitor and manage a customer’s securitytechnology or selected devices, proactively update that security infrastructure to protect against emerging threats, identify vulnerabilities, ensure that thedevices are properly configured with our latest countermeasures, and block or respond to immediate threats in accordance with the customer’s escalationpolicies. We believe that our fully managed solutions provide customers with increased security protection based on our best practices and security expertiseapplied across our customer base, as well as improved operational efficiency by removing the overhead costs associated with managing security technology.Co-Managed. Customers often deploy our managed solutions on a co-managed basis as an extension of their security personnel. The co-managed deliveryoption enables the customer to retain control over its security infrastructure to the extent that it prefers to do so, and enables its security staff to work with ourexperts as a team while maintaining full access and visibility into the management process. This option is particularly suitable for organizations that alreadypossess in-house security expertise, but that seek to remove the burden of managing devices from their staff so they can focus on more strategic securityinitiatives.Monitored. Customers selecting our monitored solutions obtain access to our on-demand Counter Threat Platform through our web-based portal, plus nearreal time monitoring and analysis by our security analysts of events collected from security and network devices and applications. Our monitored solutionsenhance our customers’ security position by providing them with valuable context from our team of security analysts and comprehensive reporting todemonstrate regulatory compliance. Our ability to see more security incidents across our entire customer base along with our threat intelligence acts as anearly warning system, which benefits customers by proactively alerting them to potential threats, applying protections and helping them respond quickly. Webelieve that the more we see, the more accurate our protections are, and the more accurately we can respond. Through our monitored solutions, we leverageour on-demand Counter Threat Platform to correlate information from many devices and applications, providing security analysts with the context they needto significantly reduce falsely-positive results and alert customers to actual threats against their organizations.In general, our managed delivery options require our security professionals to be directly involved with our customer’s security technology, and as a result,the cost to service these delivery options is generally higher than the cost to service monitored delivery options. Over the last three fiscal years, we havegenerated the majority of our managed security solutions revenue from either fully managed or co-managed delivery options. Our future success depends onour ability to manage efficiently the costs of our security offerings and to price our security solutions in an effective manner.Threat IntelligencePowered by our Counter Threat Unit research team, threat intelligence provides early warnings and actionable intelligence that enables rapid protectionagainst threats and vulnerabilities before they affect an organization. Threat intelligence is applied as part of our managed security offerings, but also may beoffered separately.Global Threat Intelligence. Our global threat intelligence solutions provide proactive, actionable intelligence tailored to an organization’s environment.This intelligence includes clear, concise threat and vulnerability analysis, detailed remediation information and recommendations, consultation with ourthreat experts, on-demand access to extensive threat and vulnerability databases, malware analysis upon request, intelligence feeds and integration with ourother solutions for correlation and unified reporting.13Borderless Threat Monitoring. Our borderless threat monitoring solution delivers organizations with timely and actionable security intelligence thatprovides them with insight into threat activities that may exist beyond the edge of their network. This solution proactively informs organizations of networkthreat indicators that apply to their particular network environment and allows them to manage the threat in accordance with their escalation policies.Malware Code Analysis. Our malware code analysis solution focuses on reverse engineering malicious or unknown code identified in security events in orderto provide an organization with a better understanding of the code’s behavior and its impact on the organization’s systems and information. Using advancedcomputer forensic tools and techniques, our security experts dissect the code to determine its functionality, purpose, composition and source.Enterprise Brand Surveillance. Our enterprise brand surveillance solution offers near real time monitoring of a range of intelligence outlets to identifydeveloping threats from exposure of sensitive data, targeting by threat actors and risks to perception of the customer’s brand. This solution provides ourcustomers with live notifications delivered upon discovery of actionable intelligence. It also provides customers with context regarding potential threats andhelps them to develop informed risk mitigation strategies.Security and Risk ConsultingOur consulting organization provides expertise and analysis to help customers improve their security posture by comprehensively assessing securitycapabilities, designing and building robust security programs, preparing employees against cyber attacks, facilitating regulatory compliance and helpingcustomers identify, prioritize and resolve the vulnerabilities that pose the greatest threat. We offer both project-based and long-term contracts, includingretainer contracts sold together with our managed security solutions. For example, we may enter into a managed security contract bundled together with anincident response retainer.Our team has extensive experience conducting security, compliance and risk engagements across many industries and geographic areas, and under recentregulations and industry standards that impose security mandates. Professional services offered by the team include the following:Technical Testing and Assessments. Our testing and assessment solutions provide customers with the knowledge, expertise and efficiency needed to conductthorough security and risk evaluations of their environments. We offer testing and assessments that address logical, physical, technical and non-technicalthreats in order to identify gaps that create risk, construct a stronger security posture and meet compliance mandates. Our testing and assessments solutionsinclude application security, network security and Red Team testing, which simulates cyber attacks using real-world tactics, techniques and procedures. Security and Governance Program Development. Our security and governance program development solutions provide our customers with security, risk andcompliance expertise to help them develop strategic security and governance programs based on industry and observed best practices. These solutionsinclude internal audit support and the development of corporate information security and computer security incident response security awareness programs.Targeted Threat Hunting. The Targeted Threat Hunting solution uses proprietary technology to search customer networks to identify the presence of securitycompromises and entrenched threat actors operating in a customer’s environment. The solution draws on our threat intelligence and extensive experiencecountering cyber adversaries.Cloud Security. We help customers to deliver cloud-based services securely and to satisfy their compliance requirements. Our cloud security solutionsinclude cloud security strategic consulting, cloud risk assessment, assurance testing of cloud deployments, incident response in cloud environments andcloud security architecture and design.Security Design and Architecture Solutions. Our security design and architecture solutions help customers to clarify their information security priorities andidentify their most vulnerable assets that require security monitoring, as well as to obtain a prioritized roadmap of upgrades to help with budgeting anddetermining resource requirements. Our solutions include security health check solutions, security architecture assessment solutions and security architectureand design consulting.Security Residency Solutions. Our security residency solutions provide customers with security consultants who serve as extended members of their staffeither on-site or remotely to extend and heighten an organization’s security expertise and capabilities. We offer several levels of resident security consultants,including executive, expert and technical consultants tailored to the security expertise and leadership our customers need. Residency solutions often arecombined with managed security solutions in complex enterprise environments to enhance the value customers obtain from our solutions. Consultingresidents align our solutions with the customers’ internal processes, integrate our data feeds into customer applications and14dashboards, and produce customized analytics and reporting. In addition, residents can assist customers with handling the security events identified by ourmanaged security solutions.Incident ResponseIncident response typically is deployed along with security and risk consulting. The professionals who deliver incident response engagements helpcustomers rapidly analyze, contain and remediate security breaches to minimize their duration and impact.Incident Management Proactive Solutions. Through our incident management proactive solutions, our security consultants work with customers to preparethem to respond quickly and effectively to a security incident. In providing these solutions, we feature both incident management risk assessment andresponse plan review and development solutions. Our incident management risk assessment solution evaluates a customer’s ability to detect, resist andrespond to a targeted or advanced threat and is designed to help our customers understand their exposure to these threats, including advanced persistentthreats, or APTs, in order to reduce their risk of compromise. Our response plan review and development solution supports our customers in developing aneffective computer security incident response plan, or CSIRP, based on IT security best practices, incorporating the latest threat intelligence tailored to thecustomer’s specific needs. Incident Response Testing and Capability Analysis. Through real-world simulations, incident response testing and capability analysis tests and evaluates theeffectiveness of an organization’s CSIRP and attack response procedures. We employ tabletop exercises to subject IT teams to simulated threats, such ascyber-crime and APTs. The exercises demonstrate the ways a customer’s systems and network can be breached and the critical actions required during abreach to contain a threat.Emergency Incident Response Solutions. Through our comprehensive range of incident response and management solutions, we seek to ensure thatorganizations experience minimal economic loss and operational disruption when a security incident occurs. We offer an incident response retainer, throughwhich our security experts can provide emergency incident response solutions within minutes of a reported breach. Our security consultants work tominimize the duration and impact of any breach through incident management, surveillance, digital forensic analysis, malware analysis and reverseengineering.Sales and MarketingOur sales and marketing organizations work together closely to drive revenue growth by enhancing market awareness of our solutions, building a strong salespipeline and cultivating customer relationships. We offer managed security and threat intelligence on a subscription basis. We sell these solutions undercontracts with initial terms that typically range from one to three years and, as of February 1, 2019, averaged two years in duration. We provide security andrisk consulting primarily under fixed-price contracts, although we perform some engagements under variable-priced contracts on a time-and-materials basis.SalesWe sell primarily through our direct sales organization, supplemented by sales through our channel partners, including referral agents, regional value-addedresellers and trade associations. Approximately 92% of our revenue in fiscal 2019 was generated through our direct sales force, in some cases in collaborationwith members of Dell’s sales force, with the remaining portion generated through our channel partners. Our direct sales organization consists of insides sales and field sales personnel and solutions architects organized by core customer segments and geography.Our sales strategy varies based on the size of the company and the target point-of-entry into an organization, which is primarily through chief informationsecurity officers or other IT leaders, including security executives, security specialists, compliance officers and IT generalists. Within North America, ourdirect sales organization has separate teams focused on the large enterprises, small and medium-sized businesses, and U.S. state and local governmentagencies. We believe that continued additional investment in our sales staff will contribute to our long-term growth.We believe that our sales process differentiates us in the marketplace for information security solutions. The process typically begins by emphasizing theimportance of educating key IT decision makers within a customer organization with respect to the organization’s information security needs. We deliver atechnical evaluation performed by a team that includes both highly trained sales personnel and security experts. This allows us to tailor the solution design,including the level of service and deployment options, to the organization’s specific security needs and to become its long-term advisor and partner. Atypical large enterprise sales team includes an inside sales team that is responsible for developing sales leads, a direct sales team that is responsible forobtaining new customers and some cross-sales, an enterprise account management team that is responsible for renewals and some cross-sales, and securityengineers who provide technical support to our sales personnel.15Since our acquisition by Dell in February 2011, we have marketed our solutions through Dell’s channel partners as well as through our own and have enteredinto agreements with Dell to preserve, and potentially expand, our existing commercial arrangements with Dell.MarketingOur marketing efforts seek to enhance our brand, expand our market awareness, bring our solutions to market and build a strong sales pipeline. Our marketingteam consists primarily of solutions marketing, field marketing, demand generation and public and industry analyst relations functions. We actively manageour public relations efforts and communicate directly with IT professionals and the media in an effort to promote our information security solutions andcontribute to the business community’s ongoing examination and understanding of information security. We participate in industry trade shows andconferences, drive thought leadership in our industry, host webcasts, conduct online marketing activities and use various other marketing strategies to createawareness of our brand and offerings.Customer Service, Training and SupportCustomer service, training and support are key elements of our commitment to provide superior customer service. We have a comprehensive customer servicetraining and support program to communicate our commitment to customer service and to enhance the value that our customers derive from our solutions. Weprovide extensive education, training and support on the functionality of our solutions, so that our customers are able to fully utilize their benefits. Ourcustomer service training and support team provides dependable and timely resolution of customer security concerns and technical inquiries, and ourcertified security analysts are continuously available to customers for consultation by telephone or e-mail and over the Internet through our portal. Weregularly conduct customer surveys to help us evaluate and develop our existing solutions and other solutions that we believe could enhance our customerrelationships.CompetitionThe market for information security services is very competitive, and we expect competition to continue to increase in the future. Changes in the threatlandscape and the broader IT infrastructure have led to quickly evolving customer requirements for protection from security threats and adversaries.We compete primarily against the following four types of security services and product providers, some of which operate principally in the large enterprisemarket and others in the market for small and medium-sized businesses: ▪global telecommunications and network services providers such as AT&T Inc., BT Group PLC, Verizon Communications Inc. and NTTCommunications Corp.; ▪providers of specialized or niche IT security products and services such as FireEye, Inc., Palo Alto Networks, Inc. and Symantec Corporation; ▪diversified technology companies such as Cisco Systems, Inc., Hewlett Packard Enterprise Company, International Business Machines Corporationand Intel Corporation; and ▪regional information security services providers that compete in the small and medium-sized businesses market with some of the features present inour information security solutions.16We believe that the principal competitive factors in our market include: ▪global visibility into the threat landscape; ▪ability to generate actionable intelligence based on historical data and emerging threats; ▪scalability and overall performance of platform technologies; ▪ability to integrate with, monitor and manage a variety of third-party products; ▪ability to provide a flexible deployment option to cater to specific customer needs; ▪ability to attract and retain high-quality professional staff with information security expertise; ▪brand awareness and reputation; ▪strength of sales and marketing efforts; ▪cost effectiveness; ▪customer service and support; and ▪breadth and richness of threat intelligence, including history of data collection and diversity and geographic scope of customers. We believe that we generally compete favorably with our competitors on the basis of these factors as a result of the architecture, features and performance ofour Counter Threat Platform, the quality of our threat intelligence, the security expertise within our organization, and the ease of integration of our solutionsand platform with other technology infrastructures. However, many of our existing and potential competitors, particularly in the large enterprise market, haveadvantages over us because of their longer operating histories, greater brand name recognition, larger customer bases, more extensive relationships withinlarge commercial enterprises, more mature intellectual property portfolios and greater financial and technical resources.Research and DevelopmentWe invest significant time and resources to maintain, enhance and add new functionality to our Counter Threat Platform and purpose-built technologies thatare critical enablers of our solutions. Our research and development organization is responsible for the design, development and testing of all aspects of oursuite of information security solutions. The members of the organization have deep security and software expertise and work closely with our productmanagement and customer service training and support teams to gain insights into customers’ environments for use in threat research, product developmentand innovations. The organization focuses its research on identifying next-generation threats and adversaries and developing countermeasures, which arecontinuously applied to our platform and used to respond to the rapidly evolving security threat landscape. The majority of our research and developmentteam is based in our offices in Atlanta, Georgia, Providence, Rhode Island, Pittsburgh, Pennsylvania, Edinburgh, Scotland, and Hyderabad, India.We believe that innovation and the timely development of new solutions are essential to meeting the needs of our customers and improving our competitiveposition. Several of the solutions we have released in the past year are the result of our internal processes within our company to identify and solve difficultsecurity issues and use the best ideas to develop new solutions. As our customers move their applications and data into third-party cloud environments, wewill extend and integrate our solutions into these environments globally. In addition, point solutions we develop for customers during security and riskconsulting engagements often are integrated into our portfolio of solutions and made available to our broader customer base.17Intellectual PropertyOur intellectual property is an essential element of our business. To protect our intellectual property rights, we rely on a combination of patent, trademark,copyright, trade secret and other intellectual property laws as well as confidentiality, employee non-disclosure and invention assignment agreements.Our employees and contractors involved in technology development are required to sign agreements acknowledging that all inventions, trade secrets, worksof authorship, developments, processes and other intellectual property rights conceived or reduced to practice by them on our behalf are our property, andassigning to us any ownership that they may claim in those intellectual property rights. We maintain internal policies regarding confidentiality anddisclosure. Our customer and resale contracts prohibit reverse engineering, decompiling and other similar uses of our technologies and require that ourtechnologies be returned to us upon termination of the contract. We also require our vendors and other third parties who have access to our confidentialinformation or proprietary technology to enter into confidentiality agreements with us.Despite our precautions, it may be possible for third parties to obtain and use without our consent intellectual property that we own or otherwise have theright to use. Unauthorized use of our intellectual property by third parties, and the expenses we incur in protecting our intellectual property rights, mayadversely affect our business.Our industry is characterized by the existence of a large number of patents, which leads to frequent claims and related litigation regarding patent and otherintellectual property rights. In particular, large and established companies in the IT security industry have extensive patent portfolios and are regularlyinvolved in both offensive and defensive litigation. From time to time, third parties, including some of these large companies as well as non-practicingentities, may assert patent, copyright, trademark and other intellectual property rights against us, our channel partners or our end-customers, which we areobligated to indemnify against such claims under our standard license and other agreements. Successful claims of infringement by a third party, if any, couldprevent us from performing certain solutions, require us to expend time and money to develop non-infringing solutions, or force us to pay substantialdamages (including, in the United States, treble damages if we are found to have willfully infringed patents), royalties or other fees.Patents and Patent ApplicationsAs of February 1, 2019, we owned 28 issued patents and 23 pending patent applications in the United States and four issued patents and two pending patentapplications outside the United States. The issued patents are currently expected to expire between 2019 and 2037. Although we believe that our patents as awhole are important to our business, we are not substantially dependent on any single patent.We do not know whether any of our patent applications will result in the issuance of a patent or whether the examination process will require us to modify ornarrow our claims, as has happened in the past with respect to certain claims. Any patents that may be issued to us may not provide us with any meaningfulprotection or competitive advantages, or may be contested, circumvented, found unenforceable or invalid, and we may not be able to prevent third partiesfrom infringing them.Trademarks and CopyrightsThe U.S. Patent and Trademark Office has granted us federal registrations for some of our trademarks. Federal registration of trademarks is effective for as longas we continue to use the trademarks and renew our registrations. We also have obtained protection for some of our trademarks, and have pendingapplications for trademark protection, in the European Community and various countries. We may, however, be unable to obtain trademark protection for ourtechnologies and brands, and any trademarks that may be issued in the future may not distinguish our solutions from those of our competitors.We do not generally register any of our works of authorship, including software and source code, with the U.S. Copyright Office, but instead rely on theprotection afforded to such works by U.S. copyright laws, which provide protection to authors of original works whether published or unpublished andwhether registered or unregistered.We have entered into a trademark license agreement with Dell Inc. under which Dell Inc. has granted us a non-exclusive, royalty-free worldwide license to usethe trademark “DELL,” solely in the form of “SECUREWORKS-A DELL COMPANY,” in connection with our business and products, services andadvertising and marketing materials related to our business.18EmployeesAs of February 1, 2019, we employed 2,663 full-time employees in the United States and 21 other countries. None of our employees in the United States arerepresented by a labor organization or the subject of a collective-bargaining agreement. Employees of some of our foreign subsidiaries are represented onworkers’ councils.Executive Officers of SecureworksThe following table sets forth information as of March 28, 2019 concerning our executive officers.Name Age Position Michael R. Cote 58 President and Chief Executive OfficerR. Wayne Jackson 61 Senior Vice President and Chief Financial OfficerEach executive officer is appointed by, and serves at the discretion of, our board of directors.Michael R. Cote has served as our President and Chief Executive Officer since May 2015. He served as our General Manager and as Vice President of Dellfrom our acquisition by Dell in February 2011 through the closing of our initial public offering in April 2016. Before our acquisition by Dell, Mr. Cote hadserved as our Chairman, President and Chief Executive Officer since February 2002.R. Wayne Jackson has served as our Senior Vice President and Chief Financial Officer since July 2015. Before joining us, Mr. Jackson was a partner atPricewaterhouseCoopers LLP, an independent registered public accounting firm, since May 2003. At that firm, Mr. Jackson was the lead engagement partnerfor a number of the firm’s largest clients.Item 1A. Risk FactorsOur business, operating results, financial condition and prospects are subject to a variety of significant risks, many of which are beyond our control. Thefollowing is a description of some of the important risk factors that may cause our actual results in future periods to differ substantially from those wecurrently expect or seek. The risks described below are not the only risks we face. There are additional risks and uncertainties not currently known to us orthat we currently deem to be immaterial that also may materially adversely affect our business, operating results, financial condition or prospects.Risks Related to Our Business and Our IndustryWe have a history of losses and may not achieve or maintain profitability.We incurred net losses of $39.1 million in fiscal 2019, $10.4 million in fiscal 2018 and $31.6 million in fiscal 2017. Any failure to increase our revenue as wegrow our business could prevent us from achieving or maintaining profitability on a consistent basis or at all. We expect our operating expenses to continueto increase as we implement our growth strategy to maintain and extend our technology leadership, expand and diversify our customer base and attract andretain top talent. Our strategic initiatives may be costlier than we expect, and we may not be able to increase our revenue to offset these increased operatingexpenses. Our revenue growth may slow or revenue may decline for a number of reasons, including increased competition, reduced demand for our solutions,a decrease in the growth or size of the information security market or any failure by us to capitalize on growth opportunities. If we are unable to meet theserisks and challenges as we encounter them, our business, financial condition and results of operations may suffer.We must continue to enhance our existing solutions and technologies and develop or acquire new solutions and technologies, or we will lose customersand our competitive position will suffer.Many of our customers operate in markets characterized by rapidly changing technologies, which require them to support a variety of hardware, softwareapplications, operating systems and networks. As their technologies grow more complex, we expect these customers to face new and increasinglysophisticated methods of cyber attack. To maintain or increase our market share, we must continue to adapt and improve our solutions in response to thesechanges without compromising the high service levels demanded by our customers. If we fail to predict accurately or react in a timely manner to the changingneeds of our customers and emerging technological trends, we will lose customers, which will negatively affect our revenue, financial condition and results ofoperations.19The forces behind changes in technology, which we do not control, include:•the establishment by organizations of increasingly complex IT networks that often include a combination of on-premise, cloud and hybridenvironments;•the rapid growth of smart phones, tablets and other mobile devices and the “bring your own device” trend in enterprises;•action by hackers and other threat actors seeking to compromise secure systems;•evolving computer hardware and software standards and capabilities;•changing customer requirements for information technology; and•introductions of new products and services or enhancements to existing products and services by our competitors.Our future growth also depends on our ability to scale our Counter Threat Platform to analyze an ever increasing number of events. As of February 1, 2019,our platform analyzed as many as 310 billion events each day. If the number of events grows to a level that our platform is unable to process effectively, or ifour platform fails to handle automatically an increasing percentage of events or is unable to process a sudden, sharp increase in the number of events, wemight fail to identify network, application and/or endpoint events as significant threat events, which could harm our customers and negatively affect ourbusiness and reputation.We operate in a rapidly evolving market, and if the new solutions and technologies we develop or acquire do not achieve sufficient market acceptance, ourgrowth rates will decline and our business, results of operations and competitive position will suffer.We spend substantial time and money researching and developing new information security solutions and technologies and enhancing the functionality ofour current solutions and technologies to meet the rapidly evolving demands of our customers for information security in our highly competitive industry.For us to realize the benefits from our significant investments in developing and bringing our solutions to market, our new or enhanced solutions mustachieve high levels of market acceptance, which may not occur for many reasons, including as a result of:•delays in introducing new, enhanced or modified solutions that address and respond to innovations in computer technology and customerrequirements;•defects, errors or failures in any of our solutions or delivery of our solutions;•any inability by us to integrate our solutions with the security and network technologies used by our current and prospective customers;•any failure by us to anticipate, address and respond to new and increasingly sophisticated security threats or techniques used by hackers and otherthreat actors;•negative publicity about the performance or effectiveness of our solutions; and•disruptions or delays in the availability and delivery of our solutions.Even if the initial development and commercial introduction of any new solutions or enhancements to our existing solutions are successful, the new orenhanced solutions may not achieve widespread or sustained market acceptance. In such an event, our competitive position may be impaired and our revenueand profitability may be diminished. The negative effect of inadequate market acceptance on our results of operations may be particularly acute because ofthe significant research, development, marketing, sales and other expenses we will have incurred in connection with the new or enhanced solutions.We rely on personnel with extensive information security expertise, and the loss of, or our inability to attract and retain, qualified personnel in the highlycompetitive labor market for such expertise could harm our business. Our future success depends on our ability to identify, attract, retain and motivate qualified personnel. We depend on the continued contributions of MichaelR. Cote, our President and Chief Executive Officer, and our other senior executives, who have extensive information security expertise. The loss of any ofthese executives could harm our business and distract from their operating responsibilities other senior managers engaged to search for their replacements.Our Counter Threat Unit and security analyst teams are staffed with experts in information security, software coding, data science and advanced mathematics.Because there are a limited number of individuals with the education and training necessary to fill these roles, such individuals are in high demand. We faceintense competition in hiring individuals with the requisite expertise, including from companies with greater resources than ours. As a result, we may beunable to attract and retain suitably qualified individuals who are capable of meeting our growing technical, operational and managerial requirements, ormay be required to pay increased compensation to satisfy our staffing needs. Further, if we hire personnel from competitors, we20may be subject to allegations that the new employees were improperly solicited or have divulged proprietary or other confidential information in breach ofagreements with their former employers. Any inability by us to attract and retain the qualified personnel we need to succeed could adversely affect ourcompetitive market position, revenue, financial condition and results of operations.Our quarterly results of operations or other operating measures may fluctuate significantly based on a number of factors that could make our future resultsdifficult to predict.Our results of operations or other operating measures have fluctuated in the past from quarter to quarter. We expect that quarterly fluctuations will continue asa result of a number of factors, many of which are outside of our control and may be difficult to predict, including:• our ability to increase sales to existing customers and to renew contracts with our customers;• delays in deployment of solutions under our customer contracts;• our ability to attract new customers;•interruptions or service outages in our data centers, Cloud providers and other technical infrastructure, other technical difficulties or securitybreaches;• customer budgeting cycles, seasonal buying patterns and purchasing practices;• changes in our pricing policies or those of our competitors;•fluctuations in the demand for our information security solutions and in the growth rate of the information security market generally;• the level of awareness of IT security threats and the market adoption of information security solutions;• the timing of the recognition of revenue and related expenses;• our ability to expand our direct sales force and our strategic and distribution relationships;•our ability to develop in a timely manner new and enhanced information security solutions and technologies that meet customer needs;•our ability to retain, hire and train key personnel, including sales personnel, security analysts, security consultants and members of our securityresearch team;• fluctuations in available cash flow from prepayments for our solutions;•changes in the competitive dynamics of our market, including the launch of new products and services by our competitors;• the effectiveness and efficiency of in-house information security solutions;• our ability to control costs, including our operating and capital expenses;• our ability to keep our proprietary technologies current;• any failure of or technical issues affecting a significant number of our appliances or software;• adverse litigation judgments, settlements or other litigation-related costs;•costs related to the acquisition of businesses, talent, technologies or intellectual property, including potentially significant amortization costs andpossible write-downs;• stock-based compensation expense associated with attracting and retaining personnel; and• general economic conditions, geopolitical events and natural catastrophes.The factors above, individually or in combination, may result in significant fluctuations in our financial and other results of operations from quarter toquarter. As a result of this variability and unpredictability, investors should not unduly rely on our historical results of operations as an indication of futureperformance.We face intense competition, including from larger companies, and may lack sufficient financial or other resources to maintain or improve our competitiveposition.The market for managed security and other information security services is highly competitive, and we expect competition to intensify in the future.Increased competition in our market could result in intensified pricing pressure, reduced profit margins,21increased sales and marketing expenses and a failure to increase, or a loss of, market share. Our competitors vary in size and in the scope and breadth of theproducts and services they offer.Many of our existing and potential competitors, particularly in the large enterprise market, enjoy substantial competitive advantages because of their longeroperating histories, greater brand name recognition, larger customer bases, more extensive customer relationships within large commercial enterprises, moremature intellectual property portfolios and greater financial and technical resources. As a result, they may be able to adapt more quickly than we can to newor emerging technologies and changing opportunities, standards or customer requirements. In addition, several of our competitors have made acquisitions orentered into partnerships or other strategic relationships with one another to offer more comprehensive cybersecurity solutions than each could offerindividually. Mergers, consolidations or alliances among competitors, or acquisitions of our competitors by large companies, may result in more formidablecompetition for us if their security products and services are bundled into sales packages with their widely utilized non-security-related products andservices. For example, large telecommunications companies have chosen to integrate managed security services as a complement to their existingcommunications offerings, a trend which may accelerate in the future. In addition, we expect pricing pressures within the information security market tointensify as a result of action by our larger competitors to reduce the prices of their security monitoring, detection and prevention products and managedsecurity services. If we are unable to maintain or improve our competitive position with respect to our current or future competitors, our failure to do so couldadversely affect our revenue growth and financial condition. Further, if our competitors are able to successfully use artificial intelligence to enhance theability of their solutions to prevent, detect, respond to or predict cybersecurity breaches and comparable technologies developed by us are not implementedsuccessfully, our solutions could be viewed less favorably by potential customers and our revenues and competitive position could be negatively affected.If we are unable to attract new customers, retain existing customers or increase our annual contract values, our revenue growth will be adversely affected.To achieve revenue growth, we must expand our customer base, retain existing customers and increase our annual contract values. In addition to attractingadditional large enterprise and small and medium-sized business customers, our strategy is to continue to pursue non-U.S. customers, government entitycustomers and customers in other industry sectors in which our competitors may have a stronger position. The renewal rates of our existing customers maydecline or fluctuate as a result of a number of factors, including their satisfaction or dissatisfaction with our solutions, the price of our solutions, the prices oravailability of competing solutions and technologies or consolidation within our customer base. If we fail to attract new customers, or our customers do notrenew their contracts for our solutions or renew them on less favorable terms, our revenue may cease to grow or may decline and our business may suffer.Some customers elect not to renew their contracts with us or renew them on less favorable terms, and we may not be able on a consistent basis to increase ourannual contract values by obtaining advantageous contract renewals. We offer managed security and threat intelligence on a subscription basis undercontracts with initial terms that typically range from one to three years and, as of February 1, 2019, averaged two years in duration. Our customers have noobligation to renew their contracts after the expiration of their terms, and we cannot be sure that customer contracts will be renewed on terms favorable to usor at all. The fees we charge for our solutions vary based on a number of factors, including the solutions selected, the number of customer devices covered bythe selected solutions and the level of management we provide for the solutions. Our initial contracts with customers may include amounts for hardware,installation and professional services that may not recur. Further, if a customer renews a contract for a term longer than the preceding term, it may pay usgreater total fees than it paid under the preceding contract, but still pay lower average annual fees, because we generally offer discounted rates in connectionwith longer contract terms. In any of these situations, we would need to sell additional solutions to maintain the same level of annual fees from the customer,but may be unable to do so.We generate a significant portion of our revenue from customers in the financial services industry, and changes within that industry or an unfavorablereview by the federal banking regulatory agencies could reduce demand for our solutions.We derived approximately 27% of our revenue in fiscal 2019 from financial services institutions and expect to continue to derive a substantial portion of ourrevenue from customers in the financial services industry. Any of a variety of changes in that industry could adversely affect our revenue, profitability andfinancial condition. Spending by financial services customers on technology generally has fluctuated, and may continue to fluctuate, based on changes ineconomic conditions and on other factors, such as decisions by customers to reduce or restructure their technology spending in an attempt to improveprofitability. Further, mergers or consolidations of financial institutions could reduce our current and potential customer base, resulting in a smaller marketfor our solutions.22Some of our solutions have been deemed to be mission-critical functions of our financial institution customers that are regulated by one or more memberagencies of the Federal Financial Institutions Examination Council, or the FFIEC. We therefore are subject to examination by the member agencies of theFFIEC. The agencies conduct periodic reviews of our operations to identify existing or potential risks associated with our operations that could adverselyaffect our financial institution customers, evaluate our risk management systems and controls, and determine our compliance with applicable laws that affectthe solutions we provide to financial institutions. Areas of examination include our management of technology, data integrity, information confidentiality,service availability and financial stability. A sufficiently unfavorable review could result in our financial institution customers not being allowed, or notchoosing, to continue using our solutions, which could adversely affect our revenue, financial condition and results of operationsIf we fail to manage our growth effectively, we may be unable to execute our business plan and maintain high levels of customer service, and ouroperations may be disrupted.As our customer base and solutions offerings continue to grow, we will be required to further expand our operations, which could place a strain on ourresources and infrastructure and affect our ability to maintain the quality of our solutions, deploy our solutions, support our customers after deployment andfoster our customer-focused culture. If we are unable to manage our growth, expenses or business effectively, our financial condition, results of operations andprofitability could be adversely affected.As we grow, we must continue to manage efficiently our employees, operations, finances, research and development and capital investments. Ourproductivity, customer-focused culture and the quality of our solutions may be negatively affected if we do not integrate and train our new employees,particularly our sales and account management personnel, quickly and effectively. In addition, we may need to make substantial investments in additional ITinfrastructure to support our growth and will need to maintain or improve our operational, financial and management controls and our reporting procedures,which will require substantial management effort and additional investments in our operations. Further, if we expand our offerings, we may compete moredirectly with security software and service providers that may be better established or have greater resources than we do, our relationships with our channeland strategic partners may be impaired and we may be required to comply with additional industry regulations.Failure to maintain high-quality customer service and support functions could adversely affect our reputation and growth prospects.Once our solutions are deployed within our customers’ networks, our customers depend on our technical and other support services to ensure the security oftheir IT systems. If we fail to hire, train and retain qualified technical support and professional services employees, our ability to satisfy our customers’requirements could be adversely affected, particularly if the demand for our solutions expands more rapidly than our ability to implement our solutions andprovide customer support. The potential for human error in connection with our customer service and support functions or the internal systems and networksthat underpin our ability to provide solutions to our customers, even if promptly discovered and remediated, could disrupt customer operations, cause lossesfor customers or harm our internal operations, lead to regulatory fines or damage our reputation. In addition, if we do not effectively assist our customers todeploy our solutions, resolve post-deployment issues or provide effective ongoing support, our ability to sell additional solutions or subscriptions to existingcustomers could suffer and our reputation with potential customers could be damaged. If we fail to meet the requirements of our existing customers,particularly larger enterprises that may require higher levels of support, it may be more difficult to realize our strategy of selling higher-margin or differenttypes of solutions to those customers.Our results of operations may be adversely affected by service level agreements with some of our customers that require us to provide them with credits forservice failures or inadequacies.We have agreements with some of our customers in which we have committed to provide them our solutions at specified levels. If we are unable to meet thecommitments, we may be obligated to extend service credits to those customers, or could face terminations of the service agreements. Damages for failure tomeet the service levels specified in our service level agreements generally are limited to the fees charged over the previous 12 months, but, if challenged,such limits on damages payable by us may not be upheld, and we may be required to pay damages greater than such fees. Repeated or significant servicefailures or inadequacies could adversely affect our reputation and results of operations.If we are unable to continue the expansion of our sales force, the growth of our business could be harmed.We are substantially dependent on our direct sales force to obtain new customers and increase sales to existing customers, and we believe that our growth willbe constrained if we are not successful in recruiting, training and retaining a sufficient number23of qualified sales personnel. There is significant competition for sales personnel with the deep skills and technical knowledge required to sell our informationsecurity solutions. We may be unable to hire or retain sufficient numbers of qualified individuals in the domestic and international markets in which we dobusiness or plan to do business. Because we seek to grow rapidly, many members of our sales force may be new to our company at any time. Newly hired salespersonnel require extensive training and experience in selling activity before they achieve full productivity. Sales force members that we have hired recentlyor plan to hire may not become productive as quickly as we expect. If we are unable to hire and train a sufficient number of effective sales personnel, or thesales personnel we hire are not successful in obtaining new customers or increasing sales to our existing customer base, our business, results of operations andgrowth prospects will be adversely affected.Our sales cycles are long and unpredictable, and our sales efforts require considerable time and expense, which could adversely affect our results ofoperations.Sales of our information security solutions usually require lengthy sales cycles, which are typically three to nine months, but can exceed 12 months for largercustomers. Sales to our customers can be complex and require us to educate our customers about our technical capabilities and the use and benefits of oursolutions. customers typically undertake a significant evaluation and acceptance process, and their subscription decisions frequently are influenced bybudgetary constraints, technology evaluations, multiple approvals and unplanned administrative, processing and other delays. We spend substantial time,effort and money in our sales efforts without any assurance that our efforts will generate long-term contracts. If we do not realize the sales we expect frompotential customers, our revenue and results of operations could be adversely affected.As we continue to expand sales of our information security solutions to customers located outside the United States, our business increasingly will besusceptible to risks associated with international sales and operations.We have limited experience operating in international jurisdictions compared to our experience operating in the United States. We expect to increase ourpresence internationally through additional relationships with local and regional strategic and distribution partners and potentially through acquisitions ofother companies. International revenue, which we define as revenue contracted through non-U.S. entities, contributed approximately 22% of our totalrevenue in fiscal 2019. Our lack of experience in operating our business outside the United States increases the risk that any international expansion effortswill not be successful. In addition, operating in international markets requires significant management attention and financial resources. The investment andadditional resources required to establish operations and manage growth in other countries may not produce the expected levels of revenue or earnings.Conducting international operations subjects us to risks that include:•the time, resources and expense required for localization of our solutions, including translation of our Internet-based portal interface into otherlanguages, provision of customer support in other languages and creation of localized agreements;•the burdens of complying with a wide variety of international laws, regulations and legal standards, including local data privacy laws, local consumerprotection laws that could regulate permitted pricing and promotion practices, and restrictions on the use, import or export of encryption technologies;•longer accounts receivable payment cycles and difficulties in collecting accounts receivable;•fluctuations in currency exchange rates;•tariffs and trade barriers and other regulatory or contractual limitations on our ability to sell or develop our solutions in some international markets;•difficulties in managing and staffing international operations;•compliance with U.S. laws that apply to operations outside of the United States, including the Foreign Corrupt Practices Act, or FCPA, the Tradingwith the Enemy Act and regulations of the Office of Foreign Assets Control;•potentially adverse tax consequences and compliance costs resulting from the complexities of international tax systems and overlap of different taxregimes;•reduced or varied protection of intellectual property rights in some countries that could expose us to increased risk of infringement of our patents andother intellectual property; and•political, social and economic instability, terrorist attacks and security concerns in general.The occurrence of any of these risks could negatively affect our international business and, consequently, our overall business, results of operations andfinancial condition.24The United Kingdom’s withdrawal from the European Union may adversely impact our operations in the United Kingdom and elsewhere.In June 2016, the United Kingdom, or U.K., held a referendum in which voters approved an exit from the European Union, or EU, commonly referred to as“Brexit,” and in March 2017, notified the EU that it intended to exit as provided in Article 50 of the Treaty on European Union. The terms of the withdrawalare subject to ongoing negotiation that has created significant uncertainty in areas currently regulated by EU law, such as cross border data transfers.Currently, the most immediate impact on our company may be on certain data transfers from the EU to the U.K., which could impose compliance burdens andcause disruptions to our business. Further, trade, immigration and commercial regulation may be modified during a transition period or permanently, andsome of our customers may relocate some or all of their operations to jurisdictions outside of the U.K. in anticipation or as a result of Brexit. Any of theseeffects of Brexit, and others we cannot anticipate, could adversely affect our business, business opportunities and solutions.An inability to expand our key distribution relationships would constrain the growth of our business.We intend to expand our distribution relationships to increase domestic and international sales. Approximately 8% of our revenue in fiscal 2019 wasgenerated through our channel partners, which include referral agents, regional value-added resellers and trade associations. Our strategy is to increase thepercentage of our revenue that we derive from sales through our channel partners. Our inability to maintain or further develop relationships with our currentand prospective distribution partners could reduce sales of our information security solutions and adversely affect our revenue growth and financialcondition.Our agreements with our partners generally are non-exclusive, and our partners may have more established relationships with one or more of our competitors.If our partners do not effectively market and sell our solutions, if they choose to place greater emphasis on their own products or services or those offered byour competitors or if they fail to meet our customers’ needs, our ability to expand our business and sell our solutions may be adversely affected. Our businessalso may suffer from the loss of a substantial number of our partners, the failure to recruit additional partners, any reduction or delay in the sales of oursolutions by our partners, or conflicts between sales by our partners and our direct sales and marketing activities. The gross margins to us from sales by ourpartners generally are lower than gross margins to us from direct sales. In addition, sales by our partners are more likely than direct sales to involvecollectability concerns and may contribute to periodic fluctuations in our results of operations.Our technology alliance partnerships expose us to a range of business risks and uncertainties that could prevent us from realizing the benefits we seek fromthese partnerships.We have entered, and intend to continue to enter, into technology alliance partnerships with third parties to support our future growth plans. Suchrelationships include technology licensing, joint technology development and integration, research cooperation, co-marketing and sell-througharrangements. We face a number of risks relating to our technology alliance partnerships that could prevent us from realizing the benefits we seek from thesepartnerships on a timely basis or at all. Technology alliance partnerships can require significant coordination between the partners and a significantcommitment of time and resources by their technical staffs. In cases where we wish to integrate a partner’s products or services into our solutions, theintegration process may be more difficult than we anticipate, and the risk of integration difficulties, incompatibility and undetected programming errors ordefects may be higher than the risks normally associated with the introduction of new products or services. In addition, we have no assurance that anyparticular relationship will continue for any specific period of time. If we lose a significant technology alliance partner, we could lose the benefit of ourinvestment of time, money and resources in the relationship. Moreover, we could be required to incur significant expenses to develop a new strategic allianceor to formulate and implement an alternative plan to pursue the opportunity that we targeted with the former partner.Real or perceived defects, errors or vulnerabilities in our solutions or the failure or perceived failure of our solutions to prevent or detect a security breachcould harm our reputation, cause us to lose customers and expose us to costly litigation.Our solutions are complex and may contain defects or errors that are not detected until after their adoption by our customers. As a result of such defects, ourcustomers may be vulnerable to cyber attacks, and hackers or other threat actors may misappropriate our customers’ data or other assets or otherwisecompromise their IT systems. In addition, because the techniques used to access or sabotage IT systems and networks change frequently and generally are notrecognized until launched against a target, an advanced attack could emerge that our solutions are unable to detect or prevent. A security breach ofproprietary information could result in significant legal and financial exposure, damage to our reputation and a loss of confidence in the security of oursolutions that could have an adverse effect on our business.25If any of our customers experiences an IT security breach after adopting our solutions, even if our solutions have blocked the theft of any data or providedsome form of remediation, the customer could be disappointed with our solutions and could look to our competitors for alternatives to our solutions. Inaddition, if any enterprise or government entity publicly known to use our solutions is the subject of a publicized cyber attack, some of our other currentcustomers could seek to replace our solutions with those provided by our competitors. Further, our reputation could be damaged if a cyber attack were tooccur through a customer's security or network devices, applications or endpoints that we are not contractually obligated to monitor if there is a perceptionthat Secureworks monitors all the affected customer's devices, applications and endpoints. Any real or perceived defects, errors or vulnerabilities in oursolutions, or any other failure of our solutions to detect an advanced threat, could result in:•expenditure of significant financial and development resources in efforts to analyze, correct, eliminate or work around the cause of any relatedvulnerabilities;•loss of existing or potential customers or channel partners;•delayed or lost revenue;•extension of service credits to affected customers, which would reduce our revenue;•failure to attain or retain market acceptance of our solutions; and•litigation, regulatory inquiries or investigations that may be costly and harm our reputation.Any person that circumvents our security measures could misappropriate the confidential information or other valuable property of our customers or disrupttheir operations. If such an event occurs, affected customers or others may sue us. Defending a lawsuit, regardless of its merit, could be time-consuming andcostly. Because our solutions provide and monitor information security and may protect valuable information, we could face liability claims or claims forbreach of service level agreements. Provisions in our service agreements that limit our exposure to liability claims may not be enforceable in somecircumstances or may not protect us fully against such claims and related costs. Alleviating any of these problems could require significant expenditures byus and result in interruptions to and delays in the delivery of our solutions, which could cause us to lose existing or potential customers and damage ourbusiness and prospects.Cyber attacks or other data security incidents that disrupt our operations or result in the breach or other compromise of proprietary or confidentialinformation about us or our workforce, customers or other third parties could harm our business and expose us to costly regulatory enforcement and otherliability.As a well-known information security solutions provider, we are a high-profile target and our websites, networks, information systems, solutions andtechnologies may be selected for sabotage, disruption or misappropriation by cyber attacks specifically designed to interrupt our business and harm ourreputation. Our solutions frequently involve the collection, filtering and logging of our customers’ information and our enterprise operations involve thecollection, processing, storage and disposition of our own human resources, intellectual property and other information. Criminal or other threat actors mayseek to penetrate our network security and misappropriate or compromise our confidential information or that of our customers or other third parties, createsystem disruptions or cause shutdowns. We may experience breaches or other compromises of our information technology systems. Further, hardware andoperating system software and applications that we produce or procure from third parties may contain defects in design or manufacture, including “bugs” andother problems that could unexpectedly interfere with the operation of such systems.The costs to address the foregoing security problems and security vulnerabilities before or after a cyber incident could be significant. Remediation effortsmay not be successful and could result in interruptions, delays or cessation of service and loss of existing or potential customers that may impede our sales orother critical functions. Breaches of our security measures and the unapproved dissemination of proprietary information or sensitive or confidential dataabout us or our customers or other third parties could expose us, our customers or other third parties affected to a risk of loss or misuse of this information,result in regulatory enforcement, litigation and potential liability for us, damage our brand and reputation or otherwise harm our business. We rely in certainlimited capacities on third-party data management providers and other vendors whose possible security problems and security vulnerabilities may havesimilar effects on us.If our solutions do not interoperate with our customers’ IT infrastructure, our solutions may become less competitive and our results of operations may beharmed.Our solutions must effectively interoperate with each customer’s existing or future IT infrastructure, which often has different specifications, utilizes multipleprotocol standards, deploys products and services from multiple vendors and contains multiple26generations of products and services that have been added over time. As a result, when problems occur in a network, it may be difficult to identify the sourcesof these problems and avoid disruptions when we provide software updates or patches to defend against particular vulnerabilities. Ineffective interoperationcould increase the risk of a successful cyber attack and violations of our service level agreements, which would require us to provide service credits thatwould reduce our revenue.In addition, government entities and other customers may require our solutions to comply with security or other certifications and standards. If our solutionsare late in achieving or fail to achieve compliance with these certifications and standards, or our competitors achieve compliance with these certifications andstandards before we do, we may be disqualified from selling our solutions to such customers or otherwise may be placed at a competitive disadvantage.Loss of our right or ability to use various third-party technologies could result in short-term disruptions to our business.We incorporate some third-party technologies into our solutions and may seek to incorporate additional third-party technologies in the future. Any loss ofour right to use third-party or other technologies could result in delays in producing or delivering our solutions until we identify and integrate equivalenttechnologies. If any of the technologies we license or purchase from others, or functional equivalents of these technologies, are no longer available to us orare no longer offered to us on commercially reasonable terms, we would be required either to redesign our solutions and devices to function withtechnologies available from other parties or to develop these components ourselves, which could result in increased costs or delays in the delivery of oursolutions and in the release of new offerings. We also might have to limit the features available in our current or future solutions. If we fail to maintain orrenegotiate some of our technology agreements with third parties, we could face significant delays and diversion of resources in attempting to license andintegrate other technologies with equivalent functions. Any errors or defects in third-party technologies, any inability to utilize third-party technologies ascontemplated, or any inability to procure and implement suitable replacement technologies could adversely affect our business and results of operations byimpeding delivery of our solutions.Evolving information security and data privacy laws and regulations may result in increased compliance costs, impediments to the development orperformance of our offerings, and monetary or other penalties.Because our solutions process customer data that may contain personal data or other potentially sensitive information, we are or may become subject tofederal, state and foreign laws and regulations regarding the privacy and protection of such customer data. These laws and regulations address a range ofissues, including data privacy, cybersecurity and restrictions or technological requirements regarding the collection, use, storage, protection, retention ortransfer of data. The regulatory framework for data privacy and cybersecurity issues worldwide can vary substantially from jurisdiction to jurisdiction, israpidly evolving and is likely to remain uncertain for the foreseeable future. Foreign privacy and data protection laws and regulations can be more restrictivethan those in the United States. Internationally, most of the jurisdictions in which we operate have established their own data security and privacy legalframeworks with which we or our customers must comply. In addition, the European Council and European Parliament have adopted a data protectionregulation, known as the General Data Protection Regulation, or GDPR, which became effective in May 2018. The GDPR includes operational andgovernance requirements for companies that collect or process personal data of residents of the European Union that differ from or expand upon thosepreviously in place in the European Union. The GDPR also provides for significant penalties for non-compliance. The costs of compliance with, and otherburdens imposed by, these laws and regulations may become substantial and may limit the use and adoption of our offerings, require us to change ourbusiness practices, impede the performance and development of our solutions, or lead to significant fines, penalties or liabilities for noncompliance with suchlaws or regulations.If we are not able to maintain and enhance our brand, our revenue and profitability could be adversely affected.We believe that maintaining and enhancing the Secureworks brand is critical to our relationships with our existing and potential customers, channel partnersand employees and to our revenue growth and profitability. Our brand promotion activities, however, may not be successful. Any successful promotion of ourbrand will depend on our marketing and public relations efforts, our ability to continue to offer high-quality information security solutions and our ability todifferentiate successfully our solutions from the services offered by our competitors.We believe our association with Dell has helped us to build relationships with many of our customers because of Dell’s globally recognized brand and thefavorable market perception of the quality of its products. We have entered into a trademark license agreement with Dell Inc. under which Dell Inc. hasgranted us a non-exclusive, royalty-free worldwide license to use the trademark “DELL,” solely in the form of “SECUREWORKS-A DELL COMPANY,” inconnection with our business and products, services and advertising and marketing materials related to our business. Under the agreement, our use of the Delltrademark in connection with any product, service or otherwise is subject to Dell Inc.’s prior review and written approval, which may be revoked at any time.We must immediately cease use of the licensed trademark generally or in connection with27any product, services or materials upon Dell Inc.’s written request. The agreement is terminable at will by either party, and we must cease all use of the Delltrademark upon any such termination. If we discontinue our association with Dell in the future, our ability to attract new customers may suffer.Extending our brand to new solutions that differ from our current offerings may dilute our brand, particularly if we fail to maintain our quality standards inproviding the new solutions. Moreover, it may be difficult to maintain and enhance our brand in connection with sales through channel partners. Thepromotion of our brand will require us to make substantial expenditures, and we anticipate that the expenditures will increase as the information securitymarket becomes more competitive and as we continue to increase our geographic footprint. Even if our promotional activities yield increased revenue, theincreased revenue may not offset the additional expenses we incur.We may expand through acquisitions of other companies, which could divert our management’s attention from our current business and could result inunforeseen operating difficulties, increased costs and dilution to our stockholders.We may make strategic acquisitions of other companies to supplement our internal growth. We could experience unforeseen operating difficulties inassimilating or integrating the businesses, technologies, services, products, personnel or operations of acquired companies, especially if the key personnel ofany acquired company choose not to work for us. Further, future acquisitions may:•involve our entry into geographic or business markets in which we have little or no experience;•create difficulties in retaining the customers of any acquired business;•result in a delay or reduction of customer sales for both us and the company we acquire because of customer uncertainty about the continuity andeffectiveness of solutions offered by either company; and•disrupt our existing business by diverting resources and significant management attention that otherwise would be focused on developing our existingbusiness.To complete an acquisition, we may be required to use a substantial amount of our cash, sell or use equity securities or incur debt to secure additional funds.If we raise additional funds through issuances of equity or convertible debt securities, our existing stockholders could suffer significant dilution, and any newequity securities we issue could have rights, preferences and privileges senior to those of our Class A common stock. Any debt financing obtained by us inthe future could involve restrictive covenants that will limit our capital-raising activities and operating flexibility. In addition, we may not be able to obtainadditional financing on terms favorable to us or at all, which could limit our ability to engage in acquisitions. We may not realize the anticipated benefits ofany acquisition we are able to complete. An acquisition also may negativelyaffect our results of operations because it may:•expose us to unexpected liabilities;•require us to incur charges and substantial indebtedness or liabilities;•have adverse tax consequences;•result in acquired in-process research and development expenses, or in the future require the amortization, write-down or impairment of amounts relatedto deferred compensation, goodwill and other intangible assets; or•fail to generate a financial return sufficient to offset acquisition costs.Because we recognize revenue ratably over the terms of our managed security and threat intelligence contracts, decreases in sales of these solutions maynot immediately be reflected in our results of operations.In fiscal 2019, approximately 76% of our revenue was derived from subscription-based solutions, attributable to managed security contracts, whileapproximately 24% was derived from professional services engagements. Our subscription contracts typically range from one to three years in duration and,as of February 1, 2019, averaged two years in duration. Revenue related to these contracts generally is recognized ratably over the contract term. As a result,we derive most of our quarterly revenue from contracts we entered into during previous fiscal quarters. A decline in new or renewed contracts and anyrenewals at reduced annual dollar amounts in a particular quarter may not be reflected in any significant manner in our revenue for that quarter, but wouldnegatively affect revenue in future quarters. Accordingly, the effect of significant downturns in contracts may not be fully reflected in our results ofoperations until future periods. As of February 1, 2019, we billed approximately 56% of our recurring revenue in advance. We may not be able to adjust ouroutflows of cash to match any decreases in cash received from prepayments if sales decline. In addition, we may be unable to adjust our cost structure toreflect reduced revenue, which would have a negative effect on our earnings in future periods. Our subscription model also makes it difficult for us to increaseour revenue rapidly through additional sales in any period, as revenue from new customers must be28recognized over the applicable contract term. Accordingly, the effect of significant downturns in sales and market acceptance of our solutions may not befully reflected in our results of operations in the current period, making it more difficult for investors to evaluate our financial performance.If the estimates or judgments relating to our critical accounting policies prove to be incorrect, our reported results of operations may be adversely affected.The preparation of financial statements in conformity with generally accepted accounting principles in the United States of America, or GAAP, requires ourmanagement to make estimates and assumptions that affect the amounts reported in our financial statements and accompanying notes. We base our estimateson historical experience and on various other assumptions that we believe to be reasonable under the circumstances. Our reported results of operations maybe adversely affected if our assumptions change or if actual circumstances differ from those in our assumptions. Significant assumptions and estimates used inpreparing our financial statements include those related to revenue recognition, stock-based compensation and estimates of the amount of loss contingencies.In addition, GAAP is subject to interpretation by the Securities and Exchange Commission, or the SEC, and various other bodies. A change in GAAP orinterpretations of GAAP could have a significant effect on our reported results and may affect our reporting of transactions completed before a change isannounced. Changes to those rules or the interpretation of our current practices may adversely affect our reported financial results or the way in which weconduct our business.We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and results of operations.Our revenue and expenses denominated in foreign currencies are subject to fluctuations due to changes in foreign currency exchange rates. As we expandinternationally in accordance with our growth strategy, we will enter into more sales contracts denominated in foreign currencies and incur incrementaloperating expenses outside the United States. Further, a strengthening of the U.S. dollar could increase the real cost of our solutions and subscriptions to ourcustomers outside the United States, which could adversely affect our non-U.S. sales and results of operations. We do not currently hedge against the risksassociated with currency fluctuations, but, as our international operations grow, we may begin to use foreign exchange forward contracts to partially mitigatethe impact of fluctuations in net monetary assets denominated in foreign currencies. Anysuch hedges may be ineffective to protect us fully against foreign currency risk.Governmental export or import controls could subject us to liability or limit our ability to compete in foreign markets.Our information security solutions and technologies incorporate encryption technology and may be exported outside the United States only if we obtain anexport license or qualify for an export license exception. Compliance with applicable regulatory requirements regarding the export of our solutions andtechnologies may create delays in the introduction of our solutions and technologies in international markets, prevent our customers with internationaloperations from utilizing our solutions and technologies throughout their global systems or prevent the export of our solutions and technologies to somecountries altogether. In addition, various countries regulate the import of our appliance-based technologies and have enacted laws that could limit our abilityto distribute, and our customers’ ability to implement, our technologies in those countries. Any new export or import restrictions, new legislation or shiftingapproaches in the enforcement or scope of existing regulations, or in the countries, persons or technologies targeted by such regulations, could result indecreased use of our solutions and technologies by existing customers with international operations, loss of sales to potential customers with internationaloperations and decreased revenue. If we fail to comply with export and import regulations, we may be denied export privileges, be subjected to fines or otherpenalties or fail to obtain entry for our technologies into other countries.Failure to comply with the Foreign Corrupt Practices Act, and similar laws associated with our current and future international activities, could subject usto penalties and other adverse consequences.In some countries where we currently operate or expect to conduct business in the future, it is common to engage in business practices that are prohibited byU.S. laws and regulations, including the FCPA, regardless of where such behavior occurs. Such laws prohibit improper payments or offers of payments toforeign governments and their officials and political parties by U.S. and other business entities for the purpose of obtaining or retaining business. Althoughwe have implemented policies and procedures to discourage such practices, some of our employees, consultants, sales agents or channel partners, includingthose that may be based in or from countries where practices that violate U.S. laws may be customary, may take actions in violation of our procedures and forwhich we ultimately may be responsible. Violations of the FCPA may result in severe criminal or civil sanctions, including suspension or debarment fromcontracting with government entities in the United States, and could subject us to other liabilities, which could negatively affect our business and financialcondition.29Our disclosure controls and procedures may not prevent or detect all errors or acts of fraud.We are subject to the periodic reporting requirements of the Securities Exchange Act of 1934, or Exchange Act, and are required to maintain effectivedisclosure controls and procedures. Our disclosure controls and procedures are designed to provide reasonable assurance that information required to bedisclosed by us in reports we file with or furnish to the SEC under the Exchange Act is accumulated and communicated to management and is recorded,processed, summarized and reported within the periods specified in SEC rules and forms. Because of the inherent limitations in our control system, however,misstatements due to error or fraud may occur and not be detected. These inherent limitations include the realities that judgments in decision-making can befaulty and that breakdowns can occur because of simple error. In addition, controls can be circumvented by the individual acts of some persons, by collusionof two or more people or by an unauthorized override of the controls.Earthquakes, fires, power outages, floods, terrorist attacks and other catastrophic events could disrupt our business and ability to serve our customers.A significant natural disaster, such as an earthquake, a fire, a flood or a significant power outage, could have a material adverse effect on our business, resultsof operations or financial condition. Although our four counter threat operations centers are designed to be redundant and to offer seamless backup support inan emergency, we rely on two primary data centers and public cloud providers to sustain our operations. While each of these data centers and public cloudproviders are capable of sustaining our operations individually, a simultaneous failure of the centers or public cloud providers could disrupt our ability toserve our customers. In addition, our ability to deliver our solutions as agreed with our customers depends on the ability of our supply chain, manufacturingvendors or logistics providers to deliver products or perform services we have procured from them. If any natural disaster impairs the ability of our vendors orservice providers to support us on a timely basis, our ability to perform our customer engagements may suffer. Acts of terrorism or other geopolitical unrestalso could cause disruptions in our business or the business of our supply chain, manufacturing vendors or logistics providers. The adverse impacts of theserisks may increase if the disaster recovery plans for us and our suppliers prove to be inadequate.Risks Related to Intellectual PropertyWe rely in part on patents to protect our intellectual property rights, and if our patents are ineffective in doing so, third parties may be able to use aspectsof our proprietary technology without compensating us.As of February 1, 2019, we owned 28 issued patents and 23 pending patent applications in the United States and four issued patents and two pending patentapplications outside the United States. Obtaining, maintaining and enforcing our patent rights is costly and time-consuming. Moreover, any failure of ourpatents and patent strategy to protect our intellectual property rights adequately could harm our competitive position. We do not know whether any of ourpending patent applications will result in the issuance of patents or whether the examination process will require us to modify or narrow our claims, and evenif any of our pending patent applications issues, such patents may not provide us with meaningful protection or competitive advantages, and may becircumvented by third parties. Changes in patent laws, implementing regulations or the interpretation of patent laws may diminish the value of our rights. Ourcompetitors may design around technologies we have patented, licensed or developed. In addition, the issuance of a patent does not give us the right topractice the patented invention. Third parties may have blocking patents that could prevent us from marketing our solutions or practicing our own patentedtechnology.Third parties may challenge any patent that we own or license, through adversarial proceedings in the issuing offices or in court proceedings, including as aresponse to any assertion of our patents against them. In any of these proceedings, a court or agency with jurisdiction may find our patents invalid orunenforceable or, even if valid and enforceable, insufficient to provide adequate protection against competing solutions. The standards by which the UnitedStates Patent and Trademark Office and its foreign counterparts grant technology-related patents are not always applied predictably or uniformly. The legalsystems of some countries do not favor the aggressive enforcement of patents, and the laws of other countries may not allow us to protect our inventions withpatents to the same extent as U.S. laws. If any of our patents is challenged, invalidated or circumvented by third parties, and if we do not own or haveexclusive rights to other enforceable patents protecting our solutions or other technologies, competitors and other third parties could market products orservices and use processes that incorporate aspects of our proprietary technology without compensating us, which may have an adverse effect on ourbusiness.30If we are unable to protect, maintain or enforce our non-patented intellectual property rights and proprietary information, our competitive position couldbe harmed and we could be required to incur significant expenses to enforce our rights.Our business relies in part on non-patented intellectual property rights and proprietary information, such as trade secrets, confidential information and know-how, all of which offer only limited protection to our technology. The legal standards relating to the validity, enforceability and scope of protection ofintellectual property rights in the information technology industry are highly uncertain and evolving. Although we regularly enter into non-disclosure andconfidentiality agreements with employees, vendors, customers and other third parties, these agreements may be breached or otherwise fail to preventdisclosure of proprietary or confidential information effectively or to provide an adequate remedy in the event of such unauthorized disclosure. In addition,the existence of our own trade secrets, confidential information and know-how affords no protection against independent discovery or development of suchintellectual property by other persons. If our employees, consultants or contractors use technology or know-how owned by third parties in their work for us,disputes may arise between us and those third parties as to the rights in related inventions. Our ability to police that misappropriation or infringement isuncertain, particularly in other countries. Costly and time-consuming litigation could be necessary to enforce and determine the scope of our proprietaryrights, and failure to maintain trade secret protection could adversely affect our competitive business position.Claims by others that we infringe their proprietary technology could harm our business and financial condition.Third parties could claim that our technologies and the processes underlying our solutions infringe or otherwise violate their proprietary rights. The softwareand technology industries are characterized by the existence of a large number of patents, copyrights, trademarks and trade secrets and by frequent litigation,including by non-practicing entities, based on allegations of infringement or other violations of intellectual property rights, and we expect that such claimsmay increase as competition in the information security market continues to intensify, as we introduce new solutions (including in geographic areas where wecurrently do not operate) and as business-model or product or service overlaps between our competitors and us continue to occur. For example, in fiscal 2016,we settled litigation in which a third party alleged that aspects of our business and solutions infringed and induced the infringement of two of its U.S. patentsrelating to network intrusion and event monitoring technology.To the extent that we achieve greater prominence and market exposure as a public company, we may face a higher risk of being the target of intellectualproperty infringement claims. From time to time, we may receive notices alleging that we have infringed, misappropriated or misused other parties’intellectual property rights. There may be third-party intellectual property rights, including patents and pending patent applications, that cover significantaspects of our technologies, processes or business methods. Any claims of infringement by a third party, even claims without merit, could cause us to incursubstantial defense costs and could distract our management and technical personnel from our business, and there can be no assurance that our technologiesand processes will be able to withstand such claims. Competitors may have the capability to dedicate substantially greater resources to enforce theirintellectual property rights and to defend claims that may be brought against them than we do. Further, a party making such a claim, if successful, couldsecure a judgment that requires us to pay substantial damages, which potentially could include treble damages if we are found to have willfully infringedpatents. A judgment also could include an injunction or other court order that could prevent us from offering our solutions. In addition, we might be requiredto seek a license or enter into royalty arrangements for the use of the infringed intellectual property, which may not be available on commercially reasonableterms or at all. The failure to obtain a license or the costs associated with any license could materially and adversely affect our business, financial conditionand results of operations. If a third party does not offer us a license to its technology or other intellectual property on reasonable terms, we could be precludedfrom continuing to use such intellectual property. Parties with which we currently have license agreements, or with which we may enter into licenseagreements in the future, including Dell, may have the right to terminate such agreements for our material breach or for convenience at any time, which couldaffect our ability to make use of material intellectual property rights. Alternatively, we might be required to develop non-infringing technology, which couldrequire significant effort and expense and ultimately might not be successful.Third parties also may assert infringement claims against our customers relating to our devices or technology. Any of these claims might require us to initiateor defend potentially protracted and costly litigation on their behalf, regardless of the merits of these claims, because under specified conditions we agree toindemnify our customers from claims of infringement of proprietary rights of third parties. If any of these claims were to succeed, we might be forced to paydamages on behalf of our customers, which could adversely affect our profitability and harm our reputation in the industry.31Our use of open source technology could require us in some circumstances to make available source code of our modifications to that technology, whichcould include source code of our proprietary technologies, and also may restrict our ability to commercialize our solutions.Some of our solutions and technologies incorporate software licensed by its authors or other third parties under open source licenses. To the extent that weuse open source software, we face risks arising from the scope and requirements of common open source software licenses. Some of these licenses containrequirements that we make available source code for modifications or derivative works we create based on the open source software, and that we license suchmodifications or derivative works under the terms of a particular open source license or other license granting third parties certain rights of further use. If wecombine our proprietary technology with open source software in a certain manner, we may face claims from time to time from third parties claimingownership of, or demanding release of, the open source software or derivative works that we developed using such software, which could include ourproprietary source code, or otherwise seeking to enforce the terms of the applicable open source license. For example, the GNU General Public License couldsubject certain portions of our proprietary technologies to the requirements of that license, and these, or similar requirements, may have adverse effects on oursale of solutions incorporating such open source software.Our ability to commercialize solutions or technologies incorporating open source software may be restricted because, among other reasons, open sourcelicense terms may be ambiguous and may result in unanticipated or uncertain obligations regarding our solutions, litigation or loss of the right to use thissoftware. The terms of many open source licenses to which we are subject have not been interpreted by courts in the United States or other countries.Therefore, there is a risk that the terms of these licenses will be construed in a manner that imposes unanticipated conditions or restrictions on our ability tocommercialize our solutions, and we could be required to seek licenses from third parties to continue offering our solutions, to re-engineer our technology orto discontinue offering our solutions if re-engineering cannot be accomplished in a commercially reasonable manner. In addition, use of open source softwarecan lead to greater risks than use of third-party commercial software, as open source licensors generally do not provide warranties or controls on the origin ofthe software, and it may be difficult for us to identify accurately the developers of the open source code and determine whether the open source softwareinfringes third-party intellectual property rights. We would be subject to similar risks with respect to software or technologies we acquire that include opensource components. Our need to comply with unanticipated license conditions and restrictions, the need to seek licenses from third parties or any judgmentsrequiring us to provide remedies typically covered by third-party product warranties – each as a result of our use of open source software – could adverselyaffect our business, results of operations and financial condition.Risks Related to Our Relationship with Dell and Dell TechnologiesAs long as Dell Technologies Inc. controls us, the ability of our other stockholders to influence matters requiring stockholder approval will be limited.We became an indirect wholly-owned subsidiary of Dell Inc. and Dell Inc.’s subsidiaries when we were acquired by Dell on February 8, 2011. On October 29,2013, Dell Inc. was acquired in a going-private transaction by Denali Holding Inc., a holding company that changed its name to Dell Technologies Inc., orDell Technologies, in August 2016. Upon the completion of the going-private transaction, we became an indirect wholly-owned subsidiary of DellTechnologies. As of February 1, 2019, the principal beneficial owners of Dell Technologies’ outstanding voting securities were Michael S. Dell, theChairman, Chief Executive Officer and founder of Dell, and investment funds affiliated with Silver Lake Partners, a global private equity firm.As of February 1, 2019, Dell Technologies owned, indirectly through Dell Inc. and Dell Inc.’s subsidiaries, no shares of our outstanding Class A commonstock and all 70,000,000 outstanding shares of our Class B common stock, which represented approximately 86.4% of our total outstanding shares ofcommon stock and approximately 98.5% of the combined voting power of both classes of our outstanding common stock.Our other stockholders will not be able to affect the outcome of any stockholder vote while Dell Technologies controls the majority of the voting power ofour outstanding common stock. Dell Technologies is able to control, directly or indirectly and subject to applicable law, significant matters affecting us,including:•the election and removal of our directors;•amendments to our certificate of incorporation;•determinations with respect to mergers, business combinations, dispositions of assets or other extraordinary corporate transactions; and•agreements that may adversely affect us.32If Dell Technologies does not provide any requisite affirmative vote on matters requiring stockholder approval allowing us to take particular corporateactions when requested, we will not be able to take such actions, and, as a result, our business and our results of operations may be adversely affected.Dell Technologies could have interests that differ from, or conflict with, the interests of our other stockholders, and could cause us to take corporate actionseven if the actions are not in the interest of our company or our other stockholders, or are opposed by our other stockholders. For example, DellTechnologies’ voting control could discourage or prevent a change in control of our company even if some of our other stockholders might favor such atransaction. Even if Dell Technologies were to control less than a majority of the voting power of our outstanding common stock, it may be able to influencethe outcome of significant corporate actions by us for as long as it owns a significant portion of the voting power. If Dell Technologies is acquired orotherwise experiences a change in control, any acquiror or successor will be entitled to exercise Dell Technologies’ voting control with respect to us, andmight do so in a manner that could vary significantly from the manner in which Dell Technologies would have exercised such rights.Our inability to resolve in a manner favorable to us any potential conflicts or disputes that arise between us and Dell or Dell Technologies with respect toour past and ongoing relationships may adversely affect our business and prospects.Potential conflicts or disputes may arise between Dell or Dell Technologies and us in a number of areas relating to our past or ongoing relationships,including:•actual or anticipated variations in our quarterly or annual results of operations;•tax, employee benefit, indemnification and other matters arising from our relationship with Dell;•employee retention and recruiting;•business combinations involving us;•our ability to engage in activities with certain channel, technology or other marketing partners;•sales or dispositions by Dell Technologies of all or any portion of its beneficial ownership interest in us;•the nature, quality and pricing of services Dell has agreed to provide us;•business opportunities that may be attractive to both Dell and us;•Dell’s ability to use and sublicense patents that we have licensed to Dell under a patent license agreement; and•product or technology development or marketing activities that may require consent of Dell or Dell Technologies.The resolution of any potential conflicts or disputes between us and Dell or Dell Technologies over these or other matters may be less favorable to us than theresolution we might achieve if we were dealing with an unaffiliated party.In April 2016, in connection with our IPO, we entered into a shared services agreement, an employee matters agreement, a tax matters agreement, intellectualproperty agreements, real estate-related agreements and commercial agreements with Dell or Dell Technologies, which are of varying durations and may beamended upon agreement of the parties. The terms of these agreements were primarily determined by Dell and Dell Technologies, and therefore may not berepresentative of the terms we could obtain on a stand-alone basis or in negotiations with an unaffiliated third party. For so long as we are controlled by DellTechnologies, we may not be able to negotiate renewals or amendments to these agreements, if required, on terms as favorable to us as those we would be ableto negotiate with an unaffiliated third party.If Dell Technologies, Dell or Dell Technologies’ other affiliates or Silver Lake Partners or its affiliates engage in the same type of business we conduct ortake advantage of business opportunities that might be attractive to us, our ability to operate successfully and expand our business may be hampered.Our certificate of incorporation, or charter, provides that, except as otherwise agreed in writing between us and Dell Technologies, Dell or Dell Technologies’other affiliates (other than us or our controlled affiliates), referred to as the Dell Technologies Entities, have no duty to refrain from:•engaging in the same or similar activities or lines of business as those in which we are engaged;•doing business with any of our customers, customers or vendors; or•employing, or otherwise engaging or soliciting for such purpose, any of our officers, directors or employees.33In addition, under our charter, Silver Lake Partners and its affiliates, referred to as the Silver Lake Entities, have no duty to refrain from any of the foregoingactivities except as otherwise agreed in writing between us and a Silver Lake Entity.Provisions of our charter could result in the Dell Technologies Entities and the Silver Lake Entities having rights to corporate opportunities in which both weand the Dell Technologies Entities or the Silver Lake Entities have an interest. Our charter addresses potential conflicts of interest between our company, onthe one hand, and the Dell Technologies Entities or the Silver Lake Entities and their respective officers and directors who are officers or directors of ourcompany, on the other hand. If any Dell Technologies Entity or Silver Lake Entity is offered, or acquires knowledge of, a potential corporate opportunitysuitable for both it and us, we will have no interest in that opportunity. Our charter also provides that if any of our directors or officers who is also a director orofficer of any Dell Technologies Entity or Silver Lake Entity is offered, or acquires knowledge of, a potential corporate opportunity suitable for both the DellTechnologies Entity or the Silver Lake Entity and us, we will have no interest in that opportunity unless the opportunity is expressly offered to that person inwriting solely in such person’s capacity as our director or officer.Our historical financial information as a subsidiary of Dell before our initial public offering may not be representative of our results as an independentpublic company.The historical financial statements and the related financial information presented in this annual report on Form 10-K for periods before our initial publicoffering do not purport to reflect what our results of operations, financial position, equity or cash flows would have been if we had operated as a stand-alonepublic company during those periods. Such financial statements include allocations for various corporate services Dell has provided to us in the ordinarycourse of our business, including finance, tax, human resources, legal, insurance, IT, procurement and facilities-related services. As a result, those historicalfinancial statements may not be comparable to our financial statements as a stand-alone public company.To preserve Dell Technologies ability to conduct a tax-free distribution of the shares of our Class B common stock that it beneficially owns and its abilityto consolidate with us for tax purposes, we may be prevented from pursuing opportunities to raise capital, acquire other companies or undertake othertransactions, which could hurt our ability to grow.To preserve its ability to effect a future tax-free spin-off of our company, or certain other tax-free transactions involving us, Dell Technologies is required tomaintain “control” of us within the meaning of Section 368(c) of the Internal Revenue Code, which is defined as 80% of the total voting power and 80% ofeach class of nonvoting stock. In addition, to preserve its ability to consolidate with us for tax purposes, Dell Technologies generally is required to maintain80% of the voting power and 80% of the value of our outstanding stock. We have entered into a tax matters agreement with Dell Technologies, that restrictsour ability to issue any stock, issue any instrument that is convertible, exercisable or exchangeable into any of our stock or which may be deemed to beequity for tax purposes, or take any other action that would be reasonably expected to cause Dell Technologies to beneficially own stock in us that, on a fullydiluted basis, does not constitute “control” within the meaning of Section 368(c) of the Internal Revenue Code or to cause a deconsolidation of us for taxpurposes with respect to the Dell Technologies consolidated group. We also have agreed to indemnify Dell Technologies for any breach by us of the taxmatters agreement. As a result, we may be prevented from raising equity capital or pursuing acquisitions or other growth initiatives that involve issuingequity securities as consideration.Our ability to operate our business effectively may suffer if we are unable to establish in a cost-effective manner our own administrative and other supportfunctions in order to operate as a stand-alone company after the expiration of our shared services and other agreements with Dell.As a subsidiary of Dell, we have relied on administrative and other resources of Dell to operate our business. In connection with our IPO, we entered intovarious agreements to retain the ability for varying periods to use these Dell resources. These services may not be sufficient to meet our needs, and if ouragreements with Dell are not renewed by the parties after their initial terms, we may not be able to replace the services at all or obtain them at prices and onterms as favorable as those under our current arrangements with Dell. In such a case, we may need to create our own administrative and other support systemsor contract with third parties to replace Dell’s systems. In addition, we also license certain software from third parties used in support of our operations thatutilize agreements to which Dell is a party and, as a result, enjoy favorable pricing relative to pricing we may otherwise have received had we negotiatedpricing terms separately from Dell. If we no longer are able to utilize the pricing in such agreements, our costs to license such software may increase. Further,we have received informal support from Dell that may not be available under our new agreements, and the level of this informal support may diminish as webecome a more independent company. Any significant performance failures affecting our own administrative systems or Dell’s administrative systems onwhich we rely could result in unexpected costs, adversely affect our results and prevent us from paying our suppliers or employees and performing otheradministrative services on a timely basis.34In connection with our IPO, we entered into agreements with Dell that formalize the process and terms pursuant to which Dell purchases information securitysolutions from us, together with related hardware, and pursuant to which we procure hardware and software from Dell from time to time. These agreementsmay not be renewed after their expiration or, if they are renewed, Dell may not agree to renew them on the existing terms. The expiration or termination ofthese agreements, or their renewal on less favorable terms to us, could result in a loss of business or require us to procure comparable hardware and softwarefrom alternative sources, which could have a material adverse effect on our business, results of operations and financial condition.Risks Related to Ownership of Our Class A Common StockThe price of our Class A common stock may be volatile.The trading prices of the securities of technology companies historically have experienced high levels of volatility, and the trading price of our Class Acommon stock has fluctuated since our IPO and may fluctuate substantially in future periods. The trading price of our Class A common stock could fluctuateas a result of the following factors, among others:•announcements of new products, services or technologies, commercial relationships, acquisitions or other events by us or our competitors;•changes in how customers perceive the effectiveness of our solutions in protecting against advanced cyber attacks;•actual or anticipated variations in our quarterly or annual results of operations;•changes in our financial guidance or estimates by securities analysts;•price and volume fluctuations in the overall stock market from time to time;•significant volatility in the market price and trading volume of technology companies in general and of companies in the information securityindustry in particular;•actual or anticipated changes in the expectations of investors or securities analysts;•fluctuations in the trading volume of our shares or the size of the trading market for our shares held by non-affiliates;•litigation involving us, our industry, or both, including disputes or other developments relating to our ability to patent our processes and technologiesand protect our other proprietary rights;•regulatory developments in the United States and other jurisdictions in which we operate;•general economic and political factors, including market conditions in our industry or the industries of our customers;•major catastrophic events;•sales of large blocks of our Class A common stock; and•additions or departures of key employees.If the market for technology stocks or the stock market in general experiences a loss of investor confidence, the trading price of our Class A common stockcould decline for reasons unrelated to our business, results of operations or financial condition. The market price of our Class A common stock also mightdecline in reaction to events that affect other companies in our industry, even if these events do not directly affect us.In the past, following periods of volatility in the market price of a company’s securities, securities class action litigation has often been brought against thatcompany. If our stock price is volatile, we may become the target of securities litigation, which could cause us to incur substantial costs and divert ourmanagement’s attention and resources from our business.If securities or industry analysts do not publish research or reports about our business, or publish inaccurate or unfavorable research reports about ourbusiness or prospects, the market price of our Class A common stock and trading volume could decline.The trading market for our Class A common stock depends in part on the research and reports that securities or industry analysts publish about us, ourbusiness or our prospects. We do not have any control over these analysts. If one or more of the analysts covering us should downgrade our shares or express achange of opinion regarding our shares, the market price of our Class A common stock could decline. If one or more of these analysts should cease coverageof our company or fail to publish reports on us on a regular basis, we could lose following in the financial markets, which could cause the market price ortrading volume of our Class A common stock to decline.35The dual-class structure of our common stock may adversely affect the trading price of our Class A common stock.Our Class B common stock has ten votes per share and our Class A common stock has one vote per share. The limited ability of holders of our Class Acommon stock to influence matters requiring stockholder approval may adversely affect the market price of our Class A common stock.In addition, in 2017, FTSE Russell and S&P Dow Jones changed their eligibility criteria to exclude new companies with multiple classes of shares of commonstock from being added to certain indices. FTSE Russell instituted a requirement that new and, beginning in September 2022, existing constituents of itsindices have greater than 5% of their voting rights in the hands of public stockholders, whereas S&P Dow Jones announced that companies with multipleshare classes, such as ours, will not be eligible for inclusion in the S&P 500, S&P MidCap 400 and S&P SmallCap 600, which together make up the S&PComposite 1500. Other stock indices might adopt similar requirements in the future. Under the current criteria, our dual-class capital structure makes ourClass A common stock ineligible for inclusion in any of these indices and, as a result, mutual funds, exchange-traded funds and other investment vehiclesthat track these indices will not invest in our stock. It is unclear what effect, if any, exclusion from the indices will have on the valuations of the affectedpublicly-traded companies. It is possible that such policies could depress the valuations of public companies excluded from these indices compared to thoseof other companies that are included.As a “controlled company” under the marketplace rules of the NASDAQ Stock Market, we may rely on exemptions from certain corporate governancerequirements that provide protection to stockholders of companies that are subject to such requirements.As of February 1, 2019, Dell Technologies beneficially owns more than 50% of the combined voting power of both classes of our outstanding shares ofcommon stock. As a result, we are a “controlled company” under the marketplace rules of the NASDAQ Stock Market, or NASDAQ, and eligible to rely onexemptions from NASDAQ corporate governance requirements generally obligating listed companies to maintain:•a board of directors having a majority of independent directors;•a compensation committee composed entirely of independent directors that approves the compensation payable to the company’s chief executiveofficer and other executive officers; and•a nominating committee composed entirely of independent directors that nominates candidates for election to the board of directors, or thatrecommends such candidates for nomination by the board of directors (or obligating the listed company to cause a majority of the board’s independentdirectors to exercise this oversight of director nominations).Although we do not currently rely on the foregoing exemptions from NASDAQ’s corporate governance requirements, we may decide to avail ourselves of oneor more of these exemptions in the future. During any period in which we do so, investors may not have the same protections afforded to stockholders ofcompanies that must comply with all of NASDAQ’s corporate governance requirements. Our status as a controlled company could make our Class A commonstock less attractive to some investors or otherwise adversely affect its trading price.Future sales, or the perception of future sales, of a substantial amount of shares of our Class A common stock could depress the trading price of ourClass A common stock.Sales of a substantial number of shares of our Class A common stock in the public market, or the perception that these sales may occur, could adversely affectthe market price of the Class A common stock at such time, which could make it more difficult for investors to sell their shares of our Class A common stockat a time and price that they consider appropriate, and could impair our ability to raise equity capital or use our Class A common stock as consideration foracquisitions of other businesses, investments or other corporate purposes.As of February 1, 2019, we have outstanding 11,016,076 shares of our Class A common stock and 70,000,000 shares of our Class B common stock. Of theseshares, the 8,000,000 shares of Class A common stock that were sold in our IPO are freely tradeable without restriction or further registration under theSecurities Act of 1933, or Securities Act, unless these shares are held by our “affiliates,” as that term is defined in Rule 144 under the Securities Act, or Rule144. As of February 1, 2019, Dell Technologies owned, indirectly through its subsidiary Dell Inc. and through Dell Inc.’s subsidiaries, no shares of ourClass A common stock and all 70,000,000 outstanding shares of our Class B common stock. The shares of our Class A common stock eligible for resale byour affiliates under Rule 144, subject to the volume limitations and other requirements of Rule 144, include the 70,000,000 shares of Class A common stockissuable upon conversion of the same number of shares of our Class B common stock that are outstanding.36We have entered into a registration rights agreement with Dell Marketing L.P. (the record holder of our Class B common stock), Michael S. Dell, the SusanLieberman Dell Separate Property Trust, MSDC Denali Investors, L.P., MSDC Denali EIV, LLC and the Silver Lake Partners investment funds that own DellTechnologies common stock in which we have granted them and their respective permitted transferees demand and piggyback registration rights with respectto the shares of our Class A common stock and Class B common stock held by them from time to time. In addition, we have entered into a registration rightsagreement with the holders of shares of Class A common stock issued upon conversion of our convertible notes at the closing of our IPO in which we havegranted such holders and their permitted transferees shelf and piggyback registration rights with respect to such shares. Registration of those shares under theSecurities Act would permit the stockholders under each registration rights agreement to sell their shares into the public market.Our issuance of additional capital stock in connection with financings, acquisitions, investments, our stock incentive plans or otherwise will dilute allother stockholders.Our charter authorizes us to issue up to 2,500,000,000 shares of Class A common stock, up to 500,000,000 shares of Class B common stock and up to200,000,000 shares of preferred stock with such rights and preferences as may be determined by our board of directors. Subject to compliance with applicablelaw, we may issue our shares of Class A common stock or securities convertible into our Class A common stock from time to time in connection with afinancing, acquisition, investment, our stock incentive plans or otherwise. We may issue additional shares of Class A common stock from time to time at adiscount to the market price of our Class A common stock at the time of issuance. Any issuance of Class A common stock could result in substantial dilutionto our existing stockholders and cause the market price of our Class A common stock to decline.Provisions in our charter and bylaws and in Delaware law could discourage takeover attempts even if our stockholders might benefit from a change incontrol of our company.Provisions in our charter and bylaws and in Delaware law may discourage, delay or prevent a merger, acquisition or other change in control of our companythat stockholders may favor, including transactions in which stockholders might receive a premium for their shares of Class A common stock. Theseprovisions also could make it more difficult for investors in our Class A common stock to elect directors of their choosing and to cause us to take othercorporate actions they support, including removing or replacing our current management. The charter and bylaw provisions:•provide that our Class B common stock is entitled to ten votes per share, while our Class A common stock is entitled to one vote per share, enablingDell Technologies, as the beneficial owner of all outstanding shares of our Class B common stock, to control the outcome of all matters submitted to avote of our stockholders, including the election of directors;•provide for the classification of the board of directors into three classes, with approximately one-third of the directors to be elected each year;•limit the number of directors constituting the entire board of directors to a maximum of 15 directors, subject to the rights of the holders of anyoutstanding series of preferred stock, and provide that the authorized number of directors at any time will be fixed exclusively by a resolution adoptedby the affirmative vote of the authorized number of directors (without regard to vacancies);•provide that, at such time (if any) as the Dell Technologies Entities beneficially own capital stock representing less than 40% in voting power of thecapital stock entitled to vote generally on the election of directors, any newly-created directorship and any vacancy on the board of directors may befilled only by the affirmative vote of a majority of the remaining directors then in office;•provide that, at such time (if any) as the Dell Technologies Entities beneficially own capital stock representing less than 50% in voting power of thecapital stock entitled to vote generally on the election of directors, directors may be removed only for cause and only by the affirmative vote of theholders of at least a majority in voting power of all outstanding shares of capital stock, voting together as a single class;•provide that a special meeting of stockholders may be called only by our chairman of the board, a majority of the directors then in office or, so long asDell Technologies Entities beneficially own capital stock representing at least 40% in voting power of the capital stock entitled to vote generally onthe election of directors, Dell Technologies;•provide that, at such time (if any) as the Dell Technologies Entities beneficially own capital stock representing less than 50% in voting power of thecapital stock entitled to vote generally on the election of directors, any action required or permitted to be taken by our stockholders at any annual orspecial meeting may not be effected by a written consent in lieu of a meeting unless such action and the taking of such action by written consent havebeen approved in advance by our board of directors;37•establish advance notice procedures for stockholders to make nominations of candidates for election as directors or to present any other business forconsideration at any annual or special stockholder meeting; and•provide authority for the board of directors without stockholder approval to authorize the issuance of up to 200,000,000 shares of preferred stock, inone or more series, with terms and conditions, and having rights, privileges and preferences, to be determined by the board of directors.In addition, we will become subject to Section 203 of the Delaware General Corporation Law at such time (if any) as the Dell Technologies Entities cease toown beneficially capital stock representing at least 10% in voting power of the capital stock entitled to vote generally on the election of directors. Withspecified exceptions, this statute prohibits a Delaware corporation listed on a national securities exchange from engaging in a business combination (asdefined in Section 203) with an interested stockholder (generally a person who, together with its affiliates and associates, owns 15% or more of thecorporation’s voting stock) for a period of three years after the date of the transaction in which the person became an interested stockholder (unless thecorporation’s board of directors approved in advance the transaction in which such person became an interested stockholder).Our charter designates the Court of Chancery of the State of Delaware as the sole and exclusive forum for certain types of actions and proceedings thatmay be initiated by our stockholders, which could limit our stockholders’ ability to obtain a favorable judicial forum for disputes with us or with ourdirectors, our officers or other employees, or our majority stockholder.Our charter provides that, unless we consent in writing to the selection of an alternative forum, the Court of Chancery of the State of Delaware will be theexclusive forum for:•any derivative action or proceeding brought on our behalf;•any action asserting a claim of breach of a fiduciary duty owed by, or other wrongdoing by, any of our directors, officers or other employees, orstockholders to us or our stockholders;•any action asserting a claim arising pursuant to any provision of the Delaware General Corporation Law or as to which the Delaware GeneralCorporation Law confers jurisdiction on the Court of Chancery of the State of Delaware; and•any action asserting a claim governed by the internal affairs doctrine.Any person purchasing or otherwise acquiring any interest in shares of our capital stock is deemed to have received notice of and consented to the foregoingprovisions. This choice of forum provision may limit a stockholder’s ability to bring a claim in a judicial forum that it finds more favorable for disputes withus or with our directors, our officers or other employees, or our other stockholders, including our majority stockholder, which may discourage such lawsuitsagainst us and such other persons. Alternatively, if a court were to find this choice of forum provision inapplicable to, or unenforceable in respect of, one ormore of the specified types of actions or proceedings, we may incur additional costs associated with resolving such matters in other jurisdictions, which couldadversely affect our business, results of operations and financial condition.We do not expect to pay any dividends on our Class A common stock for the foreseeable future.We intend to retain any earnings to finance the operation and expansion of our business, and do not expect to pay any cash dividends on our Class Acommon stock for the foreseeable future. Accordingly, investors must rely on sales of our Class A common stock after price appreciation, which may neveroccur, as the only way to realize any future gains on their investment.We are an “emerging growth company,” and our election to comply with the reduced disclosure requirements as a public company may make our Class Acommon stock less attractive to investors.We have qualified as an “emerging growth company” as defined in the Jumpstart Our Business Startups Act of 2012, or JOBS Act, since we completed ourinitial public offering in April 2016. For so long as we remain an emerging growth company, we are permitted and currently intend to rely on the followingprovisions of the JOBS Act that contain exceptions from disclosure and other requirements that otherwise are applicable to companies that file periodicreports with the SEC. The JOBS Act provisions:•provide an exemption from the auditor attestation requirement in the assessment of our internal control over financial reporting under the Sarbanes-Oxley Act of 2002, or the Sarbanes-Oxley Act;•permit us to include reduced disclosure regarding executive compensation in our SEC filings; and•provide an exemption from the requirement to hold a non-binding advisory vote on executive compensation and stockholder approval of any goldenparachute arrangements not previously approved.38We will remain an emerging growth company until: (a) the first to occur of the last day of the fiscal year (1) which follows the fifth anniversary of thecompletion of our IPO, (2) in which we have total annual gross revenue of at least $1 billion or (3) in which the market value of our capital stock held by non-affiliates was $700 million or more as of the last business day of the preceding second fiscal quarter; or (b) if it occurs before any of the foregoing dates, thedate on which we have issued more than $1 billion in non-convertible debt over a three-year period.Some investors may find our Class A common stock less attractive if we rely on these exemptions, which could result in a less active trading market for ourClass A common stock and higher volatility in our stock price.We incur increased costs as a result of operating as a public company, and our management is required to devote substantial time to compliance with ourpublic company responsibilities and corporate governance practices.As a public company, and particularly after we are no longer an emerging growth company, we will continue to incur significant legal, accounting and otherexpenses that we did not incur as a private company. The Sarbanes-Oxley Act, the Dodd-Frank Wall Street Reform and Consumer Protection Act, the listingrequirements of the NASDAQ Global Select Market and other applicable rules and regulations under the Securities Exchange Act of 1934, or Exchange Act,impose various requirements on public companies. Our management and other personnel must devote a substantial amount of time to compliance with theserequirements. Moreover, these rules and regulations increase our legal and financial compliance costs and make some activities more time-consuming andcostly.We are obligated to develop and maintain proper and effective internal control over financial reporting and any failure to maintain the adequacy of ourinternal controls may adversely affect investor confidence in our company and, as a result, the value of our Class A common stock.We are required, pursuant to Section 404 of the Sarbanes-Oxley Act, or Section 404, to furnish a report by our management on, among other matters, theeffectiveness of our internal control over financial reporting. Our independent registered public accounting firm will not be required to attest to theeffectiveness of our internal control over financial reporting until our first annual report required to be filed with the SEC following the date we are no longeran emerging growth company. We are required to disclose significant changes made in our internal control procedures on a quarterly basis. Our compliancewith Section 404 requires that we incur substantial accounting expense and expend significant management efforts.During the evaluation and testing process of our internal controls, if we identify one or more material weaknesses in our internal control over financialreporting, we will be unable to assert that our internal control over financial reporting is effective. We may experience material weaknesses or significantdeficiencies in our internal control over financial reporting. Any failure to maintain internal control over financial reporting could severely inhibit our abilityto report accurately our financial condition or results of operations. If we are unable to conclude that our internal control over financial reporting is effective,or if our independent registered public accounting firm determines we have a material weakness in our internal control over financial reporting, we could loseinvestor confidence in the accuracy and completeness of our financial reports, the market price of our Class A common stock could decline, and we could besubject to sanctions or investigations by the SEC or other regulatory authorities. Failure to remedy any material weakness in our internal control overfinancial reporting, or to implement or maintain other effective control systems required of public companies, also could restrict our future access to thecapital markets.Item 1B. Unresolved Staff CommentsNone.39Item 2. PropertiesAs of February 1, 2019, our facilities consisted of our corporate headquarters, four counter threat operations centers, two primary data centers, and variousother Dell facilities housing our research and development, marketing and sales functions, and administrative and IT operations support. We either leasethese facilities or have the right to use them pursuant to service agreements, either with Dell or with other third parties. As of February 1, 2019, we did notown any facilities. Our corporate headquarters, as well as one of our counter threat operations centers and one of our data centers, is located in Atlanta, Georgia, where we leasefacilities of approximately 141,229 square feet. As of February 1, 2019, we leased or licensed facilities for our other counter threat operations centers in thefollowing locations: Chicago, Illinois; Providence, Rhode Island; and Edinburgh, Scotland. Our employees also operate out of a number of Dell facilitiesaround the globe pursuant to arrangements with Dell. For information about our facility leases, see “Notes to Consolidated Financial Statements—Note 7—Commitments and Contingencies—Purchase Obligations and Lease Commitments” in our consolidated financial statements included in this report.As we expand, we intend to lease or license additional sites, either from Dell or other third parties, for counter threat operations centers, sales offices and otherfunctions. We believe that suitable additional facilities will be available on commercially reasonable terms to accommodate the foreseeable expansion of ouroperations.Item 3. Legal ProceedingsFrom time to time, we are a party to or otherwise subject to legal proceedings that arise in the ordinary course of our business. As of February 1, 2019, we werenot subject to any material pending legal proceedings.Item 4. Mine Safety DisclosuresNot applicable.40Part IIItem 5. Market for Registrant's Common Equity, Related Stockholder Matters and Issuer Purchases of Equity SecuritiesMarket for Class A Common StockOur Class A common stock is listed and traded on the NASDAQ Global Select Market under the symbol “SCWX.” There is no public market for our Class Bcommon stock.HoldersAs of March 25, 2019, there were nine holders of record of our Class A common stock and one holder of record of our Class B common stock, which is anindirect wholly-owned subsidiary of Dell Technologies. The number of record holders does not include individuals or entities that beneficially own shares ofClass A common stock, but whose shares are held of record by a broker, bank or other nominee.DividendsSubsequent to the listing of our Class A common stock on the NASDAQ Global Select Market, we have not declared or paid dividends on our common stock.We do not anticipate declaring or paying any cash dividends on our common stock in the foreseeable future. We currently intend to retain all available fundsand any future earnings to support our operations and finance the growth and development of our business. Any future determination related to our dividendpolicy will be made at the discretion of our board of directors and will depend upon, among other factors, our results of operations, financial condition,capital requirements, contractual restrictions, business prospects and other factors our board of directors may deem relevant.Purchases of Equity SecuritiesOn September 27, 2018, the Company announced a stock repurchase program under which the Company is authorized to repurchase up to $15 million of itsClass A common stock through September 30, 2019. The following table presents information with respect to purchases of Class A common stock by theCompany during the three months ended February 1, 2019.PeriodTotal Number of SharesPurchasedAverage Price Paid perShareTotal Number of SharesPurchased as Part ofPublicly AnnouncedProgramsDollar Value of Sharesthat May Yet BePurchased UnderPublicly AnnouncedProgramsNovember 3, 2018 through November 30, 201832,398$15.0832,398$13,445,442December 1, 2018 through December 28, 2018271,66115.97271,6619,108,268December 29, 2018 through February 1, 2019444,22117.20444,2211,468,798Total748,280$16.66748,280$1,468,798On March 26, 2019, our board of directors expanded our stock repurchase program to authorize the repurchase of up to an additional $15 million of Class Acommon stock from time to time through May 1, 2020.Use of Proceeds from Initial Public Offering of Class A Common StockProceeds from the Company's April 2016 IPO, net of fees and transaction costs, were approximately $99.6 million. There wasno material change in the use, or planned use, of proceeds from our IPO as described in the prospectus for the offering. As of February 1, 2019, the Company'stotal cash and cash equivalents balances were $129.6 million, which represented cash generated from the normal course of business operations subsequent tothe application of the net IPO proceeds. The Company used the net IPO proceeds for working capital and other general corporate purposes, which includedfinancing our growth, developing new solutions and enhancements to our current solutions and funding capital expenditures..41Stock Performance GraphThe following graph compares the cumulative total return on the Class A common stock for the period from April 22, 2016, the date on which the Class Acommon stock began trading on the NASDAQ Global Select Market, through February 1, 2019 with the total return over the same period on the NasdaqComposite Index and the PureFunds ISE Cyber Security ETF Index. The graph assumes that $100 was invested on April 22, 2016 in the Class A commonstock and in each of the foregoing indices and assumes reinvestment of dividends, if any. The comparisons in the graph are based on historical data and arenot necessarily indicative of the future price performance of the Class A common stock. April 22, 2016 February 3,2017 February 2,2018 February 1,2019Secureworks $100.00 $75.64 $67.43 $165.07NASDAQ Composite 100.00 115.50 147.59 148.05PureFunds ISE Cyber Security ETF 100.00 121.21 137.94 161.01This performance graph shall not be deemed to be incorporated by reference by means of any general statement incorporating by reference this annual reporton Form 10 K into any filing under the Securities Act of 1933 or the Securities Exchange Act of 1934, except to the extent that Secureworks specificallyincorporates such information by reference, and shall not otherwise be deemed filed under such Acts.42Item 6. Selected Financial Data The following table presents our selected financial data as derived from audited financial statements as of February 1, 2019 and February 2, 2018 and for thethree years ended February 1, 2019 included in this report and our audited financial statements as of February 3, 2017, January 29, 2016 and January 31,2015 and for the years ended January 29, 2016 and January 31, 2015 not included in this report. The selected financial data presented below should be readin conjunction with our audited financial statements and accompanying notes and with “Management’s Discussion and Analysis of Financial Condition andResults of Operations.” Our financial information may not be indicative of our future performance and does not necessarily reflect what our financial positionand results of operations would have been if we had operated as a stand-alone public company during the periods presented. Fiscal Year Ended February 1,2019 February 2,2018* February 3,2017* January 29,2016 January 30,2015 (in thousands, except per share data)Results of Operations: Net revenue $518,709 $467,930 $432,751 $339,522 $262,130Gross margin $272,592 $242,846 $220,262 $155,713 $117,284Operating expenses $321,324 $312,827 $276,141 $261,721 $178,377Operating loss $(48,732) $(69,981) $(55,879) $(106,008) $(61,093)Net loss $(39,101) $(10,417) $(31,641) $(72,381) $(38,490)Share and Per Share Data Net loss per share - basic and diluted $(0.48) $(0.13) $(0.41) $(1.03) $(0.55)Weighted average shares outstanding - basic and diluted 80,710 80,280 77,635 70,000 70,000* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606. February 1,2019 February 2,2018* February 3,2017* January 29,2016 January 30,2015 (in thousands)Balance Sheet: Cash and cash equivalents $129,592 $101,539 $116,595 $33,422 $6,669Accounts receivable $141,344 $157,764 $113,546 $116,357 $70,907Total assets $1,036,159 $1,057,081 $1,047,544 $917,785 $862,737Short-term deferred revenue $157,865 $137,697 $117,999 $109,467 $82,188Short-term convertible notes $— $— $— $27,993 $—Long-term deferred revenue $16,064 $14,948 $14,752 $18,352 $11,040Total stockholder's equity $692,707 $731,090 $725,455 $588,456 $606,926* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.43Item 7. Management's Discussion and Analysis of Financial Condition and Results of OperationsThis management’s discussion and analysis is based upon the financial statements of Secureworks which have been prepared in accordance withaccounting principles generally accepted in the United States, or GAAP, and should be read in conjunction with our consolidated financial statements andrelated notes included in this report. In addition to historical financial information, the following discussion contains forward-looking statements thatreflect our plans, estimates and beliefs. Our actual results could differ materially from those discussed or implied in our forward-looking statements. Factorsthat could cause or contribute to these differences include those discussed in “Risk Factors.”Our fiscal year is the 52- or 53-week period ending on the Friday nearest January 31. We refer to our fiscal years ended February 1, 2019, February 2,2018, and February 3, 2017 as fiscal 2019, fiscal 2018, and fiscal 2017, respectively. Fiscal 2019 and fiscal 2018 each included 52 weeks, while fiscal2017 included 53 weeks, with the extra week included in the fourth quarter. All percentage amounts and ratios presented in this management’s discussionand analysis were calculated using the underlying data in thousands. Unless otherwise indicated, all changes identified for the current-period resultsrepresent comparisons to results for the prior corresponding fiscal periods.Except where the context otherwise requires or where otherwise indicated, all references to “Secureworks” “we,” “us,” “our” and “our company” in thismanagement’s discussion and analysis refer to SecureWorks Corp. and our subsidiaries on a consolidated basis, all references to “Dell” refer to Dell Inc.and its subsidiaries on a consolidated basis and all references to “Dell Technologies” refer to Dell Technologies Inc., the ultimate parent company of DellInc.OverviewWe are a leading global cybersecurity company that protects organizations in the digitally connected world. We combine visibility from thousands ofcustomers, machine learning and automation from our industry-leading SecureWorks Counter Threat PlatformTM, and actionable insights from our team ofelite researchers, analysts and consultants to create a powerful network effect that provides increasingly strong protection for our customers.Our mission is to unlock the value of our customers’ security investments by simplifying their complex security operations and amplifying their defenses.Through our vendor-neutral approach, we create integrated and comprehensive solutions by proactively managing the collection of “point” productsdeployed by our customers to address specific security issues and provide supplemental solutions where gaps exist in our customers’ defenses. We customizethe right level of security for each customer's unique situation, which evolves as the customer's organization grows and changes.We have pioneered an integrated approach that delivers a broad portfolio of information security solutions to organizations of varying size and complexity.Our flexible and scalable solutions support the evolving needs of the largest, most sophisticated enterprises staffed with in-house security experts, as well assmall and medium-sized businesses and government agencies with limited in-house capabilities and resources.By aggregating and analyzing data from various sources around the world, our solutions enable organizations to:•prevent security breaches by fortifying their cyber defenses,•detect malicious activity,•respond rapidly to security breaches, and•predict emerging threats.Our solutions leverage the proprietary technologies, processes and extensive expertise in the information security industry, which we have developed overmore than 19 years. Key elements of our strategy include:•maintain and extend our technology leadership,•expand and diversify our customer base,•deepen our existing customer relationships, and•attract and retain top talent.44From April 2009 to February 1, 2019, the number of events processed by our technology platform increased from five billion to as many as 310 billion eventsper day. Further, our customer base has grown to approximately 4,200 subscription-based customers as of February 1, 2019. This significant growth hasrequired continual investment in our business, resulting in net losses. We believe these investments are critical to our success, although they may continue toimpact our near-term profitability.Key Factors Affecting Our PerformanceWe believe that our future success will depend on many factors, including the adoption of our solutions by organizations, continued investment in ourCounter Threat Platform and threat intelligence research, our introduction of new solutions, our ability to increase sales of our solutions to new and existingcustomers and our ability to attract and retain top talent. Although these areas present significant opportunities, they also present risks that we must manageto ensure our future success. For additional information about these risks, refer to “Risk Factors” in this report. We operate in a highly competitive industryand face, among other competitive challenges, pricing pressures within the information security market as a result of action by our larger competitors toreduce the prices of their security monitoring, detection and prevention products, as well as their managed security services. We must continue to efficientlymanage our investments and effectively execute our strategy to succeed. If we are unable to address these challenges, our business could be adverselyaffected.Adoption of Intelligence-Driven Solution Strategy. The evolving landscape of applications, modes of communication and IT architectures makes itincreasingly challenging for organizations of all sizes to protect their critical business assets, including proprietary information, from cyber threats. Newtechnologies heighten security risks by increasing the number of ways a threat actor can attack a target, by giving users greater access to important businessnetworks and information and by facilitating the transfer of control of underlying applications and infrastructure to third-party vendors. An effective cyberdefense strategy requires the coordinated deployment of multiple products and services tailored to an organization’s specific security needs. Our integratedsuite of solutions is designed to facilitate the successful implementation of such a strategy, but continuous investment in, and adaptation of, our technologywill be required as the threat landscape continues to evolve rapidly. The degree to which prospective and current customers recognize the mission-criticalnature of our intelligence-driven information security solutions, and subsequently allocate budget dollars to our solutions, will affect our future financialresults.Investment in Our Platform and Threat Intelligence Research. Our Counter Threat Platform constitutes the core of our intelligence-driven informationsecurity solutions. It provides our customers with an integrated perspective and intelligence regarding their network environments and security threats. Theplatform is augmented by our Counter Threat Unit research team, which conducts exclusive research into threat actors, uncovers new attack techniques,analyzes emerging threats and evaluates the risks posed to our customers. Our performance is significantly dependent on the investments we make in ourresearch and development efforts, and on our ability to be at the forefront of threat intelligence research, and to adapt our platform to new technologies aswell as to changes in existing technologies. This is an area in which we will continue to invest, while leveraging a flexible staffing model to align withsolutions development. We believe that investment in our platform will contribute to long-term revenue growth, but it may continue to adversely affect ournear-term profitability.Introduction of New Information Security Solutions. Our performance is significantly dependent on our ability to continue to innovate and introduce newinformation security solutions that protect our customers from an expanding array of cybersecurity threats. We continue to invest in solutions innovation andleadership, including hiring top technical talent and focusing on core technology innovation. In addition, we will continue to evaluate and utilize third-partyproprietary technologies, where appropriate, for the continuous development of complementary offerings. We cannot be certain that we will realize increasedrevenue from our solutions development initiatives. We believe that our investment in solutions development will contribute to long-term revenue growth,but it may continue to adversely affect our near-term profitability.Investments in Expanding Our Customer Base and Deepening Our Customer Relationships. To support future sales, we will need to continue to devoteresources to the development of our global sales force. We have made and plan to continue to make significant investments in expanding our sales teams anddistribution programs with our channel partners and increasing awareness of our brand. Any investments we make in our sales and marketing operations willoccur before we realize any benefits from such investments. Therefore, it may be difficult for us to determine if we are efficiently allocating our resources inthis area. The investments we have made, or intend to make, to strengthen our sales and marketing efforts may not result in an increase in revenue or animprovement in our results of operations. Although we believe our investment in sales and marketing will help us improve our results of operations in thelong term, the resulting increase in operating expenses attributable to these sales and marketing functions may continue to adversely affect our profitabilityin the near term. The continued growth of our business also depends in part on our ability to sell additional solutions to our existing customers. As45our customers realize the benefits of the solutions they previously purchased, our portfolio of solutions provides us with a significant opportunity to expandthese relationships.Investment in Our People. The difficulty in providing effective information security is exacerbated by the highly competitive environment for identifying,hiring and retaining qualified information security professionals. Our technology leadership, brand, exclusive focus on information security, customer-firstculture, and robust training and development program have enabled us to attract and retain highly-talented professionals with a passion for building a careerin the information security industry. These professionals are led by a highly experienced and tenured management team with extensive IT security expertiseand a record of developing successful new technologies and solutions to help protect our customers. We will continue to invest in attracting and retainingtop talent to support and enhance our information security offerings.Key Operating MetricsIn recent years, we have experienced broad growth across our portfolio of intelligence-driven information security solutions being provided to all sizes ofcustomers. We have achieved much of this growth by providing solutions to large enterprise customers, which generate substantially more average revenuethan our small and medium-sized business, or SMB, customers, and by continually expanding the volume and breadth of the security solutions that weprovide to all customers. Execution of this strategy has resulted in steady growth in our average revenue per customer. This growth has required continuousinvestment in our business, resulting in net losses. We believe these investments are critical to our success, although they may continue to impact ourprofitability.We believe the operating metrics described below provide further insight into the long-term value of our subscription agreements and our ability to maintainand grow our customer relationships. Relevant key operating metrics are presented below as of the dates indicated and for the annual periods then ended: February 1, 2019 February 2, 2018 February 3, 2017Subscription customer base4,200 4,400 4,400Total customer base4,700 5,000 4,900Monthly recurring revenue (in millions)$36.2 $35.3 $31.6Annual recurring revenue (in millions)$434.1 $423.0 $378.7Average subscription revenue per customer (in thousands)$103.3 $95.6 $86.4Revenue retention rate89% 96% 98%Subscription Customer Base. We define our subscription customer base as the number of customers who subscribe to our managed security solutions as of aparticular date. We believe that growing our existing customer base and our ability to grow our average subscription revenue per customer representsignificant future revenue opportunities for us.Total Customer Base. We define our total customer base as the number of customers that subscribe to our managed security solutions as well as customers thatbuy professional and other services from us, as of a particular date.The increase in our average subscription revenue per customer is primarily related to the persistence of cyber threats and the results of our sales and marketingefforts to increase the awareness of our solutions. Additionally, our customer composition of both enterprise and SMB companies provides us with anopportunity to expand our professional services revenue. As of February 1, 2019, February 2, 2018, and February 3, 2017, approximately 50%, 44%, and49%, respectively, of our professional services customers subscribed to our managed security solutions.Monthly Recurring Revenue. We define monthly recurring revenue as the monthly value of our subscription contracts as of a particular date. Because we usemonthly recurring revenue as a leading indicator of future revenue, we include operational backlog. We define operational backlog as the monthly recurringrevenue associated with pending contracts, which are contracts that have been sold but for which the service period has not yet commenced. Our increase inmonthly recurring revenue has been driven primarily by our continuing ability to expand our offerings and sell additional solutions to existing customers.Overall, we expect monthly recurring revenue to continue to grow as we retain and expand our customer base, and as our customers extend the use of oursolutions over time.46Revenue Retention Rate. Our revenue retention rate is an important measure of our success in retaining and growing revenue from our subscription-basedcustomers. To calculate our revenue retention rate for any period, we compare the monthly recurring revenue excluding operational backlog of oursubscription-based customer base at the beginning of the fiscal year, which we call our base recurring revenue, to the monthly recurring revenue excludingoperational backlog from that same cohort of customers at the end of the period, which we call our retained recurring revenue. By dividing the retainedrecurring revenue by the base recurring revenue, we measure our success in retaining and growing installed revenue from the specific cohort of customers weserved at the beginning of the period. Our calculation includes the positive revenue impacts of selling and installing additional solutions to this cohort ofcustomers and the negative revenue impacts of customer or service attrition during the period. However, the calculation does not include the positive impacton revenue from sales of solutions to any customers acquired during the period. Our revenue retention rates may decline or increase from period to period as aresult of several factors, including timing of the installation of solutions contracted in prior periods, customer satisfaction with our solutions, the price of oursolutions, the prices or availability of competing solutions and changing technologies, and consolidation within our customer base.Non-GAAP Financial MeasuresWe use supplemental measures of our performance, which are derived from our financial information, but which are not presented in our financial statementsprepared in accordance with generally accepted accounting principles in the United States of America, referred to as GAAP. Non-GAAP financial measurespresented in this management's discussion and analysis include non-GAAP revenue, non-GAAP gross margin, non-GAAP research and developmentexpenses, non-GAAP sales and marketing expenses, non-GAAP general and administrative expenses, non-GAAP operating income (loss), non-GAAP netincome (loss), non-GAAP earnings (loss) per share and adjusted EBITDA. We use non-GAAP financial measures to supplement financial informationpresented on a GAAP basis. We believe these non-GAAP financial measures provide useful information to help evaluate our operating results by facilitatingan enhanced understanding of our operating performance and enabling more meaningful period-to-period comparisons.In particular, we have excluded the impact of certain purchase accounting adjustments related to a change in the basis of deferred revenue for the acquisitionof Dell by Dell Technologies in fiscal 2014. We believe it is useful to exclude such purchase accounting adjustments related to the foregoing transactions asthis deferred revenue generally results from multi-year service contracts under which deferred revenue is established upon sale and revenue is recognized overthe term of the contract. Pursuant to the fair value provisions applicable to the accounting for business combinations, GAAP requires this deferred revenue tobe recorded at its fair value, which is typically less than the book value. In presenting non-GAAP earnings, we add back the reduction in revenue that resultsfrom this revaluation on the expectation that a significant majority of these service contracts will be renewed in the future and therefore the revaluation is nothelpful in predicting our ongoing revenue trends. We believe that this non-GAAP financial adjustment is useful to investors because it allows investors to (1)evaluate the effectiveness of the methodology and information used by management in its financial and operational decision-making, and (2) compare pastand future reports of financial results of our company as the revenue reduction related to acquired deferred revenue will not recur when related servicecontracts are renewed in future periods.There are limitations to the use of the non-GAAP financial measures presented in this management’s discussion and analysis. Our non-GAAP financialmeasures may not be comparable to similarly titled measures of other companies. Other companies, including companies in our industry, may calculate non-GAAP financial measures differently than we do, limiting the usefulness of those measures for comparative purposes.Non-GAAP revenue, non-GAAP gross margin, non-GAAP research and development expenses, non-GAAP sales and marketing expenses, non-GAAP generaland administrative expenses, non-GAAP operating income (loss), non-GAAP net income (loss), non-GAAP earnings (loss) per share and adjusted EBITDA, asdefined by us, exclude the items described in the reconciliation below. As the excluded items can have a material impact on earnings, our managementcompensates for this limitation by relying primarily on GAAP results and using non-GAAP financial measures supplementally. The non-GAAP financialmeasures are not meant to be considered as indicators of performance in isolation from or as a substitute for revenue, gross margin, research and developmentexpenses, sales and marketing expenses, general and administrative expenses, operating loss or net loss prepared in accordance with GAAP, and should beread only in conjunction with financial information presented on a GAAP basis.47Reconciliation of Non-GAAP Financial MeasuresThe table below presents a reconciliation of each non-GAAP financial measure to its most directly comparable GAAP financial measure. We encourage you toreview the reconciliations in conjunction with the presentation of the non-GAAP financial measures for each of the periods presented. In future fiscal periods,we may exclude such items and may incur income and expenses similar to these excluded items. Accordingly, the exclusion of these items and other similaritems in our non-GAAP presentation should not be interpreted as implying that these items are non-recurring, infrequent or unusual.The following is a summary of the items excluded from the most comparable GAAP financial measures to calculate our non-GAAP financial measures:•Impact of Purchase Accounting. The impact of purchase accounting consists primarily of purchase accounting adjustments related to a change in thebasis of deferred revenue related to the acquisition of Dell by Dell Technologies in fiscal 2014.•Amortization of Intangible Assets. Amortization of intangible assets consists of amortization of customer relationships and acquired technology. Inconnection with the acquisition of Dell by Dell Technologies in fiscal 2014, all of our tangible and intangible assets and liabilities were accountedfor and recognized at fair value on the transaction date. Accordingly, amortization of intangible assets consists of amortization associated withintangible assets recognized in connection with this transaction.•Stock-based Compensation Expense. Non-cash stock-based compensation expense relates to both the Dell Technologies and Secureworks equityplans. We exclude such expense when assessing the effectiveness of our operating performance since stock-based compensation does not necessarilycorrelate with the underlying operating performance of the business.•Other. Other includes professional fees incurred by us in connection with our IPO. We are excluding this expense for the purpose of calculating thenon-GAAP financial measures presented below because we believe the item is outside our ordinary course of business and does not contribute to ameaningful evaluation of our current operating performance or comparisons to our past operating performance.•Impact of Tax Cuts and Jobs Act. The impact of the Tax Cuts and Jobs Act relates to final tax provision impacts of complying with the U.S. taxreform that was enacted in December 2017, recorded in fiscal 2019, as well as the provisional tax benefit of $27.0 million that was recorded in thefourth quarter of fiscal 2018. For additional information, see “Notes to Consolidated Financial Statements—Note 10—Income and Other Taxes” inour consolidated financial statements included in this report.•Aggregate Adjustment for Income Taxes. The aggregate adjustment for income taxes is the estimated combined income tax effect for the adjustmentsmentioned above. The tax effects are determined based on the tax jurisdictions where the above items were incurred. Fiscal Year Ended February 1,2019 February 2,2018* February 3,2017*GAAP revenue$518,709 $467,930 $432,751Impact of purchase accounting— 584 884Non-GAAP revenue$518,709 $468,514 $433,635 GAAP gross margin$272,592 $242,846 $220,262Amortization of intangibles13,642 13,642 13,642Impact of purchase accounting— 624 1,160Stock-based compensation expense780 891 462Non-GAAP gross margin$287,014 $258,003 $235,526 GAAP research and development expenses$87,608 $80,164 $71,030Stock-based compensation expense(4,133) (3,261) (2,033)Non-GAAP research and development expenses$83,475 $76,903 $68,997 48GAAP sales and marketing expenses$141,818 $139,937 $118,235Stock-based compensation expense(2,652) (735) (1,068)Non-GAAP sales and marketing expenses$139,166 $139,202 $117,167 GAAP general and administrative expenses$91,898 $92,726 $86,876Amortization of intangibles(14,094) (14,095) (14,094)Impact of purchase accounting— (1,025) (886)Stock-based compensation expense(11,805) (8,903) (5,320)Other— — (1,164)Non-GAAP general and administrative expenses$65,999 $68,703 $65,412 GAAP operating income (loss)$(48,732) $(69,981) $(55,879)Amortization of intangibles27,736 27,737 27,736Impact of purchase accounting— 1,649 2,046Stock-based compensation expense19,370 13,790 8,883Other— — 1,164Non-GAAP operating income (loss)$(1,626) $(26,805) $(16,050) GAAP net income (loss)$(39,101) $(10,417) $(31,641)Amortization of intangibles27,736 27,737 27,736Impact of purchase accounting— 1,649 2,046Stock-based compensation expense19,370 13,790 8,883Impact of Tax Cuts and Jobs Act4,325 (34,993) —Other— — 1,164Aggregate adjustment for income taxes(10,978) (15,129) (16,113)Non-GAAP net income (loss)$1,352 $(17,363) $(7,925) GAAP earnings (loss) per share$(0.48) $(0.13) $(0.41)Amortization of intangibles0.34 0.35 0.36Impact of purchase accounting— 0.02 0.03Stock-based compensation expense0.24 0.17 0.11Impact of Tax Cuts and Jobs Act0.05 (0.44) —Other— — 0.01Aggregate adjustment for income taxes(0.13) (0.19) (0.21)Non-GAAP earnings (loss) per share *$0.02 $(0.22) $(0.10)* Sum of reconciling items may differ from total due to rounding of individual components GAAP net income (loss)$(39,101) $(10,417) $(31,641)Interest and other, net(2,778) 2,735 (2,490)Income tax benefit(6,853) (62,299) (21,748)Depreciation and amortization41,207 42,171 39,425Stock-based compensation expense19,370 13,790 8,883Impact of purchase accounting— 584 884Other— — 1,164Adjusted EBITDA$11,845 $(13,436) $(5,523)* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.49Our Relationship with Dell and Dell TechnologiesOn February 8, 2011, we were acquired by Dell Inc. On October 29, 2013, Dell was acquired by Dell Technologies Inc. (formerly known as Denali HoldingInc.), a parent holding corporation. For the purposes of the accompanying financial statements, we elected to utilize pushdown accounting for the acquisitionof Dell by Dell Technologies. On April 27, 2016, we completed our IPO, as further described below. Upon the closing of our IPO, Dell Technologies owned,indirectly through Dell Inc. and Dell Inc.’s subsidiaries, no shares of our outstanding Class A common stock and all shares of our outstanding Class Bcommon stock, which as of February 1, 2019 represented approximately 86.4% of our total outstanding shares of common stock and approximately 98.5% ofthe combined voting power of both classes of our outstanding common stock. Since acquiring us in 2011, Dell has provided us with various corporate services in the ordinary course of business, including finance, tax, human resources,legal, insurance, IT, procurement and facilities-related services. Dell also has provided us with the services of a number of its executives and employees.Through the first two quarters of fiscal 2016, the costs of such services were allocated to us based on the most relevant allocation method to the serviceprovided, primarily based on relative percentage of total net sales, relative percentage of headcount, or specific identification. We believe the basis on whichthe expenses were allocated to be a reasonable reflection of the utilization of services provided to or the benefit received by us during the periods presented.Beginning in the third quarter of fiscal 2016, the costs of these services have been charged in accordance with a shared services agreement that went intoeffect on August 1, 2015, the effective date of our carve-out from Dell. For more information regarding the allocated costs and related party transactions, see“Notes to Consolidated Financial Statements—Note 12—Related Party Transactions” in our consolidated financial statements included in this report. During the periods presented in the financial statements, Secureworks did not file separate federal tax returns, as Secureworks was generally included in thetax grouping of other Dell entities within the respective entity’s tax jurisdiction. The income tax benefit has been calculated using the separate returnmethod, modified to apply the benefits for loss approach. Under the benefits for loss approach, net operating losses or other tax attributes are characterized asrealized or as realizable by Secureworks when those attributes are utilized or expected to be utilized by other members of the Dell consolidated group. Formore information, see “Notes to Consolidated Financial Statements—Note 10—Income and Other Taxes” in our consolidated financial statements includedin this report.As a subsidiary of Dell, we have participated in various commercial arrangements with Dell, under which, for example, we provide information securitysolutions to third-party customers with which Dell has contracted to provide our solutions, procure hardware, software and services from Dell, and sell oursolutions through Dell in the United States and some international jurisdictions. In connection with our IPO, effective August 1, 2015, we entered intoagreements with Dell that govern these commercial arrangements. The commercial agreements set the terms and conditions for transactions between Dell andus, while our shared services agreement with Dell sets the terms and conditions for certain administrative functions that continue to be provided by Dell.These agreements generally are effective for up to one to three years and include extension and cancellation options. To the extent that we choose to or arerequired to transition away from the corporate services currently provided by Dell, we may incur additional non-recurring transition costs to establish ourown stand-alone corporate functions. As of February 1, 2019, we have established a substantial portion of our stand-alone corporate functions.Initial Public OfferingOn April 27, 2016, we completed our IPO in which we issued and sold 8,000,000 shares of Class A common stock at a price to the public of $14.00 per share.We received net proceeds of $99.6 million from the sale of shares of Class A common stock after deducting $12.4 million of underwriting discounts andcommissions and unpaid offering expenses payable by us.50Components of Results of OperationsRevenueWe sell managed security solutions and threat intelligence solutions on a subscription basis and various professional services, including security and riskconsulting and incident response solutions. Our managed security subscription contracts typically range from one to three years and, as of February 1, 2019,averaged approximately two years in duration. The revenue for these deliverables is recognized ratably over the contract term, beginning on the date onwhich service is made available to customers. Professional services customers typically purchase solutions pursuant to customized contracts that are shorterin duration. In general, these contracts have terms of less than one year. Professional services consist primarily of fixed-fee and retainer-based contracts.Revenue from these engagements is recognized using an input method over the contract term.The fees we charge for our solutions vary based on a number of factors, including the solutions selected, the number of customer devices covered by theselected solutions, and the level of management we provide for the solutions. In fiscal 2019, approximately 76% of our revenue was derived fromsubscription-based solutions, provided under managed security services, while approximately 24% was derived from professional services engagements. Aswe respond to the evolving needs of our customers, the relative mix of subscription-based solutions and professional services we provide our customers mayfluctuate. International revenue, which we define as revenue contracted through non-U.S. entities, represented approximately 22%, 16% and 13% of our totalnet revenue in fiscal 2019, fiscal 2018, and fiscal 2017, respectively. Although our international customers are located primarily in Europe, Asia Pacific andCanada, we provided managed security services to customers across 52 countries as of February 1, 2019.Over all of the periods presented in this report, our pricing strategy for our various offerings was relatively consistent, and accordingly did not significantlyaffect our revenue growth. However, we may adjust our pricing to remain competitive and support our strategic initiatives.During the second quarter of fiscal 2019, a significant portion of the contract with Bank of America, N.A., a large customer, was amended and extended fortwo more years. We expect that, during the term of the extended contract, the mix of services will be different from the mix in prior periods and the total valueof services may be lower than in prior periods.Gross MarginWe operate in a challenging business environment, where the complexity as well as the number of cyber attacks are constantly increasing. Accordingly,initiatives to drive the efficiency of our Counter Threat Platform and the continued training and development of our employees are critical to our long-termsuccess. Gross margin has been and will continue to be affected by these factors as well as others, including the mix of solutions sold, the mix between largeand small customers, timing of revenue recognition and the extent to which we expand our counter threat operations centers.Cost of revenue consists primarily of personnel expenses, including salaries, benefits and performance-based compensation for employees who maintain ourCounter Threat Platform and provide solutions to our customers, as well as perform other critical functions. Also included in cost of revenue are theamortization of equipment and costs associated with hardware provided to customers as part of their subscription services, amortization of technologylicensing fees, fees paid to contractors who supplement or support our solutions, maintenance fees and overhead allocations. As our business grows, the costof revenue associated with our solutions may fluctuate.We operate in a high-growth industry and have experienced significant revenue growth. Accordingly, we expect our gross margin to increase in absolutedollars. We continue to invest in initiatives to drive the efficiency of our business to increase gross margin as a percentage of total revenue. However, as webalance revenue growth and efficiency initiatives, gross margin as a percentage of total revenue may fluctuate from period to period.51Operating Costs and ExpensesOur operating costs and expenses consist of research and development expenses, sales and marketing expenses and general and administrative expenses.•Research and Development, or R&D, Expenses. Research and development expenses include compensation and related expenses for the continueddevelopment of our solutions offerings, including a portion of expenses related to our Counter Threat Unit research team, which focuses on theidentification of system vulnerabilities, data forensics and malware analysis. R&D expenses also encompass expenses related to the development ofprototypes of new solutions offerings and allocated overhead. Our solutions offerings have generally been developed internally. We operate in acompetitive and highly technical industry. Therefore, to maintain and extend our technology leadership, we intend to continue to invest in our R&Defforts by hiring more personnel to enhance our existing security solutions and to add complementary solutions.•Sales and Marketing, or S&M, Expenses. Sales and marketing expenses include salaries, sales commissions and performance-based compensationbenefits and related expenses for our S&M personnel, travel and entertainment, marketing and advertising programs (including lead generation),customer advocacy events, and other brand-building expenses, as well as allocated overhead.•General and Administrative, or G&A, Expenses. General and administrative expenses include primarily the costs of human resources and recruiting,finance and accounting, legal support, information management and information security systems, facilities management, corporate development andother administrative functions, and are partially offset by allocations of information technology and facilities costs to other functions.As we continue to grow our business, both domestically and internationally, we will invest in our sales capability, which will increase our sales andmarketing expenses in absolute dollars. In addition, we expect to incur additional costs as we increase our G&A functions to further support stand-alonepublic company requirements.Interest and Other, NetInterest and other, net consists primarily of the effect of exchange rates on our foreign currency-denominated asset and liability balances and interest incomeearned on our cash and cash equivalents. All foreign currency transaction adjustments are recorded as foreign currency gains (losses) in the ConsolidatedStatements of Operations. To date, we have had minimal interest income.Income Tax Expense (Benefit)Our effective tax benefit rate was 14.9%, 85.7% and 40.7% for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017, respectively.The change in effective tax rate from fiscal 2018 to fiscal 2019 was primarily attributable to the reduction in the federal statutory rate and certain otherprovisions related to the Tax Cuts and Jobs Act of 2017, or Tax Cuts and Jobs Act, and non-deductible stock-based compensation expense in fiscal 2019. Thechange in effective tax rate from fiscal 2017 to fiscal 2018 was primarily attributable to the impact of the Tax Cuts and Jobs Act on the blended federalstatutory rate and the required adjustment of our deferred tax assets and liabilities for the new lower federal rate as of the end of fiscal 2018.We calculate a provision for income taxes using the asset and liability method, under which deferred tax assets and liabilities are recognized by identifyingthe temporary differences arising from the different treatment of items for tax and accounting purposes. We provide valuation allowances for deferred taxassets, where appropriate. We file U.S. federal returns on a consolidated basis with Dell and we expect to continue doing so until such time (if any) as we aredeconsolidated for tax purposes with respect to the Dell consolidated group. According to the terms of the tax matters agreement between Dell Technologiesand us that went into effect on August 1, 2015, Dell Technologies will reimburse us for any amounts by which our tax assets reduce the amount of taxliability owed by the Dell group on an unconsolidated basis. For a further discussion of income tax matters, see “Notes to Consolidated Financial Statements—Note 10—Income and Other Taxes" in our consolidated financial statements included in this report.52Results of OperationsFiscal 2019 Compared to Fiscal 2018The following table summarizes our key performance indicators for the fiscal years ended February 1, 2019 and February 2, 2018. Fiscal Year Ended February 1, 2019February 2, 2018* $% ofRevenue%Change$ % ofRevenue (in thousands, except percentages)Net revenue $518,709100.0 %10.9 %$467,930 100.0 %Cost of revenue $246,11747.4 %9.3 %$225,084 48.1 %Total gross margin $272,59252.6 %12.2 %$242,846 51.9 %Operating expenses $321,32461.9 %2.7 %$312,827 66.9 %Operating income (loss) $(48,732)(9.4)%(30.4)%$(69,981) (15.0)%Net income (loss) $(39,101)(7.5)%275.4 %$(10,417) (2.2)% Other Financial Information (1) Non-GAAP revenue $518,709 100.0 % 10.7 % $468,514 100.0 %Non-GAAP gross margin $287,014 55.3 % 11.2 % $258,003 55.1 %Non-GAAP operating expenses $288,640 55.6 % 1.3 % $284,808 60.8 %Non-GAAP operating income (loss) $(1,626) (0.3)% (93.9)% $(26,805) (5.7)%Non-GAAP net income (loss) $1,352 0.3 % (107.8)% $(17,363) (3.7)%Adjusted EBITDA $11,845 2.3 % (188.2)% $(13,436) (2.9)%_____________________(1) See "Non-GAAP Financial Measures" and "Reconciliation of Non-GAAP Financial Measures" for more information about these non-GAAP financial measures, including ourreasons for including the measures, material limitations with respect to the usefulness of the measures, and a reconciliation of each non-GAAP financial measure to the most directlycomparable GAAP financial measure. Non-GAAP financial measures as a percentage of revenue are calculated based on non-GAAP revenue.*Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.RevenueNet revenue, which we refer to as revenue, increased $50.8 million, or 10.9%, in fiscal 2019, compared with fiscal 2018. On a non-GAAP basis, revenueincreased $50.2 million, or 10.7%, in fiscal 2019. This revenue increase resulted primarily from revenue generated by subscription-based solutions, whichrepresented approximately 76% of revenue in fiscal 2019. Our existing customers continued to increase their contracted subscriptions for our solutions, withaverage revenue per customer increasing 8% in fiscal 2019. Professional services revenue increased to 24% of total revenue in fiscal 2019 from 22% of totalrevenue in fiscal 2018.We primarily generate revenue from sales in the United States. However, international revenue, which we define as revenue contracted through non-U.S.entities, increased to $115.1 million in fiscal 2019, from $76.8 million in fiscal 2018. Currently, our international customers are primarily located in Europe,Asia/Pacific, and Canada. We are focused on continuing to grow our international customer base in future periods.Gross MarginOur total gross margin increased $29.7 million, or 12.2%, in fiscal 2019. This increase was mainly due to the increase in revenue for fiscal 2019. The grossmargin percentage increased 70 basis points to 52.6% in fiscal 2019. The increase in gross margin percentage was mainly driven by efficiencies as wecontinue to leverage our global service delivery model, and was partially offset by the impact of the growth in professional services revenue, which has loweraverage gross margins.Gross margin on a GAAP basis includes amortization of intangible assets, purchase accounting adjustments and stock-based compensation. On a non-GAAPbasis, excluding these adjustments, gross margin increased $29.0 million, or 11.2%, in fiscal 2019.53Operating ExpensesThe following table presents information regarding our operating expenses during the fiscal years ended February 1, 2019 and February 2, 2018. Fiscal Year Ended February 1, 2019 February 2, 2018* Dollars % ofRevenue %Change Dollars % ofRevenue (in thousands, except percentages)Operating expenses: Research and development$87,608 16.9% 9.3 % $80,164 17.1%Sales and marketing141,818 27.3% 1.3 % 139,937 29.9%General and administrative91,898 17.7% (0.9)% 92,726 19.8%Total operating expenses$321,324 61.9% 2.7 % $312,827 66.9% Other Financial Information Non-GAAP research and development$83,475 16.1% 8.5 % $76,903 16.4%Non-GAAP sales and marketing139,166 26.8% — % 139,202 29.7%Non-GAAP general and administrative65,999 12.7% (3.9)% 68,703 14.7%Non-GAAP operating expenses (1)$288,640 55.6% 1.3 % $284,808 60.8% (1)See “"Non-GAAP Financial Measures" and "Reconciliation of Non-GAAP Financial Measures” for a reconciliation of each non-GAAP financial measure to the most directlycomparable GAAP financial measure.*Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.Research and Development Expenses. R&D expenses increased $7.4 million, or 9.3%, in fiscal 2019. The increases in R&D expenses was primarilyattributable to increased compensation and benefits associated with additional development resources for the continued advancement of our solutionsofferings as well as the development of a new application framework. As a percentage of revenue, R&D expenses decreased 20 basis points to 16.9% in fiscal2019. On a non-GAAP basis, R&D expenses as a percentage of revenue decreased 30 basis points to 16.1% in fiscal 2019.Sales and Marketing Expenses. S&M expenses increased $1.9 million, or 1.3%, in fiscal 2019. As a percentage of revenue, S&M expenses decreased 260basis points to 27.3% in fiscal 2019. On a non-GAAP basis, S&M expenses as a percentage of revenue decreased 290 basis points to 26.8% for fiscal 2019.The decreases in S&M expenses as a percentage of revenue were primarily attributable to increased productivity per sales representative, lower headcount, adecrease in commission expense, and greater leverage on the overall cost base as revenue increased.General and Administrative Expenses. G&A expenses decreased $0.8 million, or 0.9%, in fiscal 2019. As a percentage of revenue, G&A expenses decreased210 basis points to 17.7% in fiscal 2019 as a result of operating efficiencies and economies of scale. On a non-GAAP basis, G&A expenses as a percentage ofrevenue decreased 200 basis points to 12.7% in fiscal 2019. The decreases in G&A expenses as a percentage of revenue were primarily attributable to lowerheadcount as well as a decrease in the use of outside consulting services. In fiscal 2019, we did not incur the G&A expenses for consulting and otherprofessional services that we incurred in fiscal 2018 associated with our implementation of a new enterprise resource planning (ERP) system.Operating Income (Loss)Our operating income (loss) decreased to $(49) million for fiscal 2019 from $(70) million in fiscal 2018. As a percentage of revenue, our operating income(loss) decreased to 9.4% in fiscal 2019. Operating income (loss) on a GAAP basis includes amortization of intangible assets, purchase accounting adjustmentsand stock-based compensation expense. On a non-GAAP basis, excluding these charges, our operating income (loss) as a percentage of revenue improved to0.3% in fiscal 2019. The increases in both GAAP and non-GAAP operating income (loss) on a dollar basis and as a percentage of revenue were primarilyattributable to improved operating leverage resulting from our continued growth, which was partially offset by research and development investments in ourbusiness, including the addition of personnel.54Interest and Other, NetInterest and other income was $2.8 million in fiscal 2019 compared with an expense of $2.7 million in fiscal 2018. The change primarily reflected the effectsof foreign currency transactions and related exchange rate fluctuations.Net Income (Loss)Our net (loss) of $(39.1) million increased $28.7 million, or 275.4%, in fiscal 2019. The increase in our net loss was attributable to the decreased tax benefitin fiscal 2019 compared with fiscal 2018 related to the Tax Cuts and Jobs Act, which more than offset improved operating results. Net income (loss) on a non-GAAP basis was $1.4 million, an increase of $18.7 million, or 107.8%, from fiscal 2018. The improvement in non-GAAP net income (loss) was attributable toour increased operating leverage as the business grows.Fiscal 2018 Compared to Fiscal 2017The following table summarizes our key performance indicators for the fiscal years ended February 2, 2018 and February 3, 2017. Fiscal Year Ended February 2, 2018* February 3, 2017* $ % ofRevenue %Change $ % ofRevenue (in thousands, except percentages)Net revenue $467,930 100.0 % 8.1 % $432,751 100.0 %Cost of revenue $225,084 48.1 % 5.9 % $212,489 49.1 %Total gross margin $242,846 51.9 % 10.3 % $220,262 50.9 %Operating expenses $312,827 66.9 % 13.3 % $276,141 63.8 %Operating income (loss) $(69,981) (15.0)% 25.2 % $(55,879) (12.9)%Net income (loss) $(10,417) (2.2)% (67.1)% $(31,641) (7.3)% Other Financial Information (1) Non-GAAP revenue $468,514 100.0 % 8.0 % $433,635 100.0 %Non-GAAP gross margin $258,003 55.1 % 9.5 % $235,526 54.3 %Non-GAAP operating expenses $284,808 60.8 % 13.2 % $251,576 58.0 %Non-GAAP operating income (loss) $(26,805) (5.7)% 67.0 % $(16,050) (3.7)%Non-GAAP net income (loss) $(17,363) (3.7)% 119.1 % $(7,925) (1.8)%Adjusted EBITDA $(13,436) (2.9)% 143.3 % $(5,523) (1.3)%_____________________(1) See "Non-GAAP Financial Measures" and "Reconciliation of Non-GAAP Financial Measures" for reconciliation of each non-GAAP financial measure to the most directlycomparable GAAP financial measure. Non-GAAP financial measures as a percentage of revenue are calculated based on non-GAAP revenue.*Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.RevenueRevenue increased $35.2 million, or 8.1%, for fiscal 2018, which has 52 weeks, compared to fiscal 2017, which had 53 weeks. Adjusting for the additionalweek in fiscal 2017, revenue would have been $423.8 million, resulting in an increase of $44.1 million, or 10.4%. On a non-GAAP basis, revenue increased$34.9 million, or 8.0%, in fiscal 2018. Adjusting for the additional week in fiscal 2017, non-GAAP revenue would have been $424.7 million, resulting in anincrease of approximately $43.8 million, or 10.3%.This revenue increase resulted primarily from revenue generated by subscription-based solutions, which represented approximately 78% of revenue in fiscal2018. The number of customers subscribing to such solutions was approximately the same as in fiscal 2017, while existing customers continued to increasetheir purchases of our solutions. Average recurring revenue per customer increased 10.7% in fiscal 2018. Professional services revenue increased to 22% oftotal revenue in fiscal 2018 from 20% of total revenue in fiscal 2017. International revenue increased to $76.8 million in fiscal 2018, from $55.2 million infiscal 2017.55Gross MarginOur total gross margin increased $22.6 million, or 10.3%, in fiscal 2018. Adjusting for the additional week in fiscal 2017, gross margin increased $27.9million, or 13.0%. This increase was mainly due to the increase in revenue in fiscal 2018. The gross margin percentage increased 100 basis points to 51.9% infiscal 2018. The increase in gross margin percentage was mainly driven by efficiencies as we continue to leverage our global service delivery model, partiallyoffset by the impact of the growth in professional services revenue.Gross margin on a GAAP basis includes amortization of intangible assets and purchase accounting adjustments. On a non-GAAP basis, excluding theseadjustments, gross margin increased $22.5 million, or 9.5%, in fiscal 2018.Operating ExpensesThe following table presents information regarding our operating expenses during the fiscal years ended February 2, 2018 and February 3, 2017. Fiscal Years Ended February 2, 2018* February 3, 2017* Dollars % ofRevenue %Change Dollars % ofRevenue (in thousands, except percentages)Operating expenses: Research and development$80,164 17.1% 12.9% $71,030 16.4%Sales and marketing139,937 29.9% 18.4% 118,235 27.3%General and administrative92,726 19.8% 6.7% 86,876 20.1%Total operating expenses$312,827 66.9% 13.3% $276,141 63.8% Other Financial Information Non-GAAP research and development$76,903 16.4% 11.5% $68,997 15.9%Non-GAAP sales and marketing139,202 29.7% 18.8% 117,167 27.0%Non-GAAP general and administrative68,703 14.7% 5.0% 65,412 15.1%Non-GAAP operating expenses (1)$284,808 60.8% 13.2% $251,576 58.0% (1)See “"Non-GAAP Financial Measures" and "Reconciliation of Non-GAAP Financial Measures” for a reconciliation of each non-GAAP financial measure to the most directlycomparable GAAP financial measure.*Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.Research and Development Expenses. R&D expenses increased $9.1 million, or 12.9% , in fiscal 2018, primarily due to an increase in expenses forengineering resources. As a percentage of revenue, R&D expenses increased 70 basis points to 17.1% in fiscal 2018 as a result of incremental investment inorchestration and automation of threat playbooks in support of our growing Advanced Remediation Management, or ARM, subscription solutions. On a non-GAAP basis, R&D expenses as a percentage of revenue increased 50 basis points to 16.4% in fiscal 2018.Sales and Marketing Expenses. S&M expenses increased $21.7 million, or 18.4%, in fiscal 2018. As a percentage of revenue, S&M expenses increased 260basis points to 29.9% in fiscal 2018. The increase for the current fiscal year was primarily attributable to an increase in compensation-related expense relatedto our investment in additional quota bearing sales resources, solution engineers and other support personnel. On a non-GAAP basis, S&M expenses as apercentage of revenue increased 270 basis points to 29.7% in fiscal 2018.56General and Administrative Expenses. G&A expenses increased $5.9 million, or 6.7%, in fiscal 2018. The increase was primarily attributable to higher third-party consulting costs and increased amortization expense associated with our implementation of new financial systems in the third quarter of fiscal 2018. Asa percentage of revenue, G&A expenses decreased 30 basis points to 19.8% in fiscal 2018 as a result of operating efficiencies and economies of scale. On anon-GAAP basis, G&A expenses as a percentage of revenue decreased 40 basis points to 14.7% in fiscal 2018.Operating Income (Loss)Our GAAP operating income (loss) increased to $(70.0) million in fiscal 2018 from $(55.9) million in fiscal 2017. As a percentage of revenue, our operatingincome (loss) increased to 15.0% in fiscal 2018. Operating income (loss) on a GAAP basis includes amortization of intangible assets, purchase accountingadjustments and stock-based compensation expense. On a non-GAAP basis, excluding these charges, our operating income (loss) as a percentage of revenueincreased to 5.7% in fiscal 2018. The increases in both GAAP and non-GAAP operating income (loss) on a dollar basis and as a percentage of revenue weredriven by investments in research and development and the sales function to support continued growth. These investments more than offset improved grossmargins and lower G&A expenses as a percentage of revenue.Interest and Other, netInterest and other expense was $2.7 million in fiscal 2018 compared with interest and other income of $2.5 million in fiscal 2017. The change in interest andother primarily reflects the effects of foreign currency translation related to our European operations.Net Income (Loss)Our net income (loss) of $(10.4) million improved $21.2 million, or 67.1%, in fiscal 2018. The decrease in net income (loss) was due to the significantincrease in the income tax benefit in fiscal 2018 related to the Tax Cut and Jobs Act, partially offset by the increase in operating loss discussed above. Netincome (loss) on a non-GAAP basis was $(17.4) million, a decrease of $(9.4) million, or 119.1%, from fiscal 2017. Overall, the increase in non-GAAP net lossin fiscal 2018 was due to the impacts of the operating losses discussed above.Liquidity, Capital Commitments and Contractual Cash ObligationsOverviewWe believe that our cash and cash equivalents together with our accounts receivable will provide us with sufficient liquidity to fund our business and meetour obligations for at least 12 months. Our future capital requirements will depend on many factors, including our rate of revenue growth, the rate ofexpansion of our workforce, the timing and extent of our expansion into new markets, the timing of introductions of new functionality and enhancements toour solutions, potential acquisitions of complementary businesses and technologies, continuing market acceptance of our solutions, as well as generaleconomic and market conditions. We may need to raise additional capital or incur indebtedness to continue to fund our operations in the future or to fund ourneeds for less predictable strategic initiatives, such as acquisitions. In addition to our $30 million revolving credit facility from Dell, described below,sources of financing may include arrangements with unaffiliated third parties, depending on the availability of capital, the cost of funds and lender collateralrequirements. Selected Measures of Liquidity and Capital ResourcesCertain relevant measures of our liquidity and capital resources are as follows: February 1, 2019 February 2, 2018 (in thousands) Cash and cash equivalents$129,592 $101,539Accounts receivable, net$141,344 $157,764At February 1, 2019, our principal sources of liquidity consisted of cash and cash equivalents of $129.6 million and accounts receivable of $141.3 million.Our cash and cash equivalents balance as of February 1, 2019 included $90.7 million invested in money market funds pending their use in our business.57We invoice our customers based on a variety of billing schedules. During fiscal 2019, on average, 56% of our recurring revenue was billed in advance andapproximately 44% was billed on either a monthly or a quarterly basis. Invoiced accounts receivable are usually collected over a period of 30 to 120 days. Asof February 1, 2019, our accounts receivable decreased compared with February 2, 2018, which reflected improved days sales outstanding ("DSO") due toincreased collection activity, partially offset by an increase in revenue. We regularly monitor our accounts receivable for collectability, particularly inmarkets where economic conditions remain uncertain and continue to take actions to reduce our exposure to credit losses. As of February 1, 2019 andFebruary 2, 2018, the allowance for doubtful accounts was $6.2 million and $8.2 million, respectively. The decrease in the allowance for doubtful accountswas due to overall improvement in our longer-aged receivables balances, as well as to the collection of accounts for which we had previously recorded anallowance. Based on our assessment, we believe we are adequately reserved for credit risk.Revolving Credit FacilitySecureWorks, Inc., our wholly-owned subsidiary, has entered into a revolving credit agreement with a wholly-owned subsidiary of Dell Inc. under which wehave obtained a $30 million senior unsecured revolving credit facility. Under the facility, up to $30 million principal amount of borrowings may beoutstanding at any time. The maximum amount of borrowings may be increased by up to an additional $30 million by mutual agreement of the lender andborrower. The proceeds from loans made under the facility may be used for general corporate purposes. The facility is not guaranteed by us or oursubsidiaries. There was no outstanding balance under the facility as of February 1, 2019. Effective as of March 26, 2019, the facility agreement was amendedand restated to extend the maturity date to March 26, 2020 and to modify the annual rate at which interest accrues.Each loan made under the amended and restated credit facility will accrue interest at an annual rate equal to the applicable London interbank offered rateplus 1.50%. Amounts under the facility may be borrowed, repaid and reborrowed from time to time during the term of the facility. The borrower will berequired to repay in full all of the loans outstanding, including all accrued interest, and the facility will terminate upon a change of control of us or followinga transaction in which SecureWorks, Inc. ceases to be a direct or indirect wholly-owned subsidiary of our company. The credit agreement contains customaryrepresentations, warranties, covenants and events of default. The unused portion of the facility is subject to a commitment fee of 0.35%, which is due uponexpiration of the facility.Cash Flows Fiscal Year Ended February 1, 2019 February 2, 2018 (in thousands)Net change in cash from: Operating activities $57,199 $787Investing activities (10,200) (13,819)Financing activities (18,946) (2,024)Change in cash and cash equivalents $28,053 $(15,056)•Operating Activities — Cash provided by operating activities was $57.2 million in fiscal 2019 and $0.8 million in fiscal 2018. The increase in ouroperating cash flows was primarily driven by the decrease in accounts receivable due to increased revenues and improved collection rates, partially offsetby the overall decrease in our accounts payable and accrued liabilities, as well as by our net transactions with Dell. We expect that our future transactionswith Dell will be a source of cash over time as we anticipate that our charges to Dell will continue to exceed Dell’s charges to us, although the timing ofcharges and settlements may vary period to period.•Investing Activities — Cash used in investing activities totaled $10.2 million and $13.8 million in fiscal 2019 and fiscal 2018, respectively. For theperiods presented, investing activities consisted primarily of capital expenditures for property and equipment to support our data center and facilityinfrastructure. Additionally, during fiscal 2018, the Company capitalized costs associated with the implementation of its new ERP system.•Financing Activities — Cash used in financing activities was $18.9 million in fiscal 2019 and $2.0 million in fiscal 2018. The usage in fiscal 2019reflected our repurchase of $13.5 million of our Class A common stock pursuant to our stock repurchase program authorized during fiscal 2019,payments of long-term financing arrangements of $3.2 million, including intercompany obligations with a Dell subsidiary of $2.2 million, and employeetax withholding payments of $2.2 million associated with the vesting of stock compensation grants.58 Fiscal Year Ended February 2, 2018 February 3, 2017 (in thousands)Net change in cash from: Operating activities $787 $(6,838)Investing activities (13,819) (19,361)Financing activities (2,024) 109,372Change in cash and cash equivalents $(15,056) $83,173•Operating Activities — Cash flows from operating activities was a source of cash of $0.8 million in fiscal 2018 and a use of cash of $6.8 million in fiscal2017. Operating cash flows benefited from a lower net loss and a greater source of cash from working capital in fiscal 2018 as increases in liabilities andsettlement of transactions with Dell, including an income tax receivable, more than offset increases in accounts receivable.•Investing Activities — Cash used in investing activities totaled $13.8 million and $19.4 million for fiscal 2018 and fiscal 2017, respectively. For theperiods presented, investing activities consisted of capital expenditures for property and equipment to support our data center and facility infrastructure.Investing activities in fiscal 2017 also included investments in network upgrades, development of our software defined data center and implementationof new and upgraded back office systems and platforms to facilitate our expected growth.•Financing Activities — Cash flows from financing activities was a use of cash of $2.0 million in fiscal 2018 and a source of cash of $109.4 million infiscal 2017. Financing activities in fiscal 2018 consisted of $1.2 million of withholding tax payments associated with the vesting of stock compensationgrants and $0.8 million of repayment of a transaction with Dell Financial Services. Financing activities for fiscal 2017 included $99.6 million in net cashproceeds from our IPO and a $10.0 million capital contribution by Dell in March 2016.Contractual Cash ObligationsContractual cash obligations are summarized in the following table: Payments Due by Fiscal Year(in thousands) Less than 1 year1-3 years3-5 yearsThereafterTotalOperating leases $5,237$10,636$10,376$11,825$38,074Purchase obligations 7,2773,561——10,838Credit facilities and other(1) —1,000——1,000Total $12,514$15,197$10,376$11,825$49,912(1) Other reflects purchase obligations of annual maintenance services for hardware systems for internal use financed from a related party. See also “Notes to ConsolidatedFinancial Statements—Note 12—Related Party Transactions” in our consolidated financial statements included in this report.For information about operating leases and purchase obligations, see “Notes to Consolidated Financial Statements—Note 7—Commitments andContingencies” in our consolidated financial statements included in this report.Off-Balance Sheet ArrangementsAs of February 1, 2019, we were not subject to any obligations pursuant to any off-balance sheet arrangements that have or are reasonably likely to have amaterial effect on our financial condition, results of operations or liquidity.59Critical Accounting PoliciesWe prepare our financial statements in conformity with GAAP, which requires certain estimates, assumptions and judgments to be made that may affect ourconsolidated financial statements. Accounting policies that have a significant impact on our results are described in “Notes to Consolidated FinancialStatements—Note 2—Significant Accounting Policies” in our consolidated financial statements included in this report. The accounting policies discussed inthis section are those that we consider to be the most critical. We consider an accounting policy to be critical if the policy is subject to a material level ofjudgment and if changes in those judgments are reasonably likely to materially impact our results.Revenue Recognition. Secureworks derives revenue primarily from two sources: (1) subscription revenue related to managed security and threat intelligencesolutions; and (2) professional services, including security and risk consulting and incident response solutions.Subscription-based arrangements typically include security solutions, the associated hardware appliance, up-front installation fees and maintenanceagreements, which are all typically recognized over the life of the related agreement. We have determined that hardware appliances and the relatedmaintenance agreement included in the subscription-based solutions arrangements are incapable of being distinct within the context of the contract as theyare required to access the Company's Counter Threat Platform. Moreover, any related installation fees are non-refundable and also incapable of being distinctwithin the context of the contract. Therefore, we have deemed these arrangements as a single performance obligation within the context of a typicalsubscription-based arrangement. The revenue for these deliverables is recognized ratably over the contract term, beginning on the date on which service ismade available to customers. Amounts that have been invoiced, but for which the above revenue recognition criteria have not been met, are included indeferred revenue.Professional services consist primarily of fixed-fee and retainer-based contracts. Revenue from these engagements is recognized using an input method overthe contract term.Secureworks reports revenue net of any revenue-based taxes assessed by governmental authorities that are imposed on, and concurrently with, specificrevenue-producing transactions.We recognize revenue when all of the following criteria are met:•Identification of the contract, or contracts, with a customer—A contract with a customer exists when (i) we enter into an enforceable contract with acustomer, (ii) the contract has commercial substance and the parties are committed to perform, and (iii) payment terms can be identified andcollection of substantially all consideration to which we will be entitled in exchange for goods or services that will be transferred is deemedprobable based on the customer's intent and ability to pay. Contracts entered into for professional services and subscription-based solutions near orat the same time are generally not combined as a single contract for accounting purposes, since neither the pricing nor the services are interrelated.•Identification of the performance obligations in the contract—Performance obligations promised in a contract are identified based on the goods orservices that will be transferred to the customer that are both (i) capable of being distinct, whereby the customer can benefit from the goods or serviceeither on its own or together with other resources that are readily available from third parties or from us, and (ii) distinct in the context of thecontract, whereby the transfer of the goods or services is separately identifiable from other promises in the contract. When promised goods orservices are incapable of being distinct, we account for them as a combined performance obligation. With regard to a typical contract forsubscription-based solutions, the performance obligation represents a series of distinct services that will be accounted for as a single performanceobligation. In a typical professional services contract, Secureworks has a separate performance obligation associated with each service. We aregenerally acting as a principal in each subscription-based and professional services arrangement and, thus, recognize revenue on a gross basis.•Determination of the transaction price—The total transaction price is primarily fixed in nature as the consideration is tied to the specific servicespurchased by the customer, which constitutes a series for delivery of the solutions over the duration of the contract. For professional servicescontracts, variable consideration exists in the form of rescheduling penalties and expense reimbursements; no estimation is required at contractinception, since variable consideration is allocated to the applicable period.•Allocation of the transaction price to the performance obligations in the contract—We allocate the transaction price to each performanceobligation based on the performance obligation's standalone selling price. Standalone selling price is determined by considering all informationavailable to us, such as historical selling prices of the performance obligation, geographic location, overall strategic pricing objective, marketconditions and internally approved pricing guidelines related to the performance obligations.60•Recognition of revenue when, or as, the Company satisfies performance obligation—We recognize revenue over time using a time-elapsed outputmethod to measure progress (i.e., ratable recognition) for the subscription-based performance obligation over the contract term. For any upgradedinstallation services, which we have determined represent a performance obligation separate from its subscription-based arrangements, revenue isrecognized over time using hours elapsed over the service term as an appropriate method to measure progress. For the performance obligationpertaining to professional services arrangements, we recognize revenue over time using an input method based on time (hours or days) incurred tomeasure progress over the contract term.Intangible Assets Including Goodwill. Identifiable intangible assets with finite lives are amortized on a straight-line basis over their estimated useful lives.Finite-lived intangible assets are reviewed for impairment on a quarterly basis. Goodwill and indefinite-lived intangible assets are tested for impairment on anannual basis in the third fiscal quarter, or sooner if an indicator of impairment occurs. To determine whether goodwill and indefinite-lived intangible assetsare impaired, we first assess certain qualitative factors. Based on this assessment, if it is determined that the fair value of the goodwill or indefinite-livedintangible asset is less than its carrying amount, we perform the quantitative analysis of the impairment test.The goodwill impairment test consists of a two-step process, if necessary. The first step is to compare the fair value of the reporting unit to its carrying value,including goodwill. We typically use a discounted cash flow model to determine the fair value of the reporting unit. The assumptions used in the model areconsistent with those which we believe hypothetical marketplace participants would use. If the fair value of the reporting unit is less than its carrying value,the second step of the impairment test must be performed in order to determine the amount of the impairment loss, if any. The second step compares theimplied fair value of the reporting unit’s goodwill with the carrying amount of that goodwill. If the carrying amount of the reporting unit’s goodwill exceedsits implied fair value, an impairment charge is recognized in an amount equal to that excess. The loss recognized cannot exceed the carrying amount ofgoodwill. We have determined that we have a single goodwill reporting unit, and, accordingly, for the quantitative analysis, we compare the fair value of thisgoodwill reporting unit to its carrying value. For indefinite-lived assets, other than goodwill, if the carrying amount determined through the quantitativeanalysis exceeds the fair value, an impairment charge is recognized in an amount equal to that excess.Based on the results of the annual impairment test, the fair value of our reporting unit exceeded its carrying value and no impairment of goodwill orindefinite-lived intangible assets existed at our test date of November 2, 2018. Subsequently, no events occurred through our February 1, 2019 year end thatwould indicate an impairment exists.Stock-Based Compensation. Our compensation programs include grants under the SecureWorks Corp. 2016 Long-Term Incentive Plan and, prior to the IPOdate, grants under share-based payment plans of Dell Technologies Inc., or Dell Technologies. Under the plans, we and, prior to the IPO date, DellTechnologies have granted stock options, restricted stock awards and restricted stock units. Compensation expense related to stock-based transactions ismeasured and recognized in the financial statements based on fair value. Fair value for restricted stock awards and restricted stock units under our plan isbased on the closing price of our Class A common stock as reported on the NASDAQ Global Select Market on the day of the grant. The fair value of eachoption award is estimated on the grant date using the Black-Scholes option-pricing model and a single option award approach. This model requires that at thedate of grant we determine the fair value of the underlying common stock, the expected term of the award, the expected volatility, risk-free interest rates andexpected dividend yield. The annual grant of restricted stock and restricted stock units issued during the fiscal year ended February 1, 2019 vest over anaverage service period of three years and approximately 50% of such awards are subject to performance conditions. Stock-based compensation expense, netof forfeitures and adjustments for attainment of performance criteria, is recognized using a straight-line basis over the requisite service periods of the awards,which is generally three to four years. We estimate a forfeiture rate, based on an analysis of actual historical forfeitures, to calculate stock-based compensationexpense.Loss Contingencies. We are subject to the possibility of various losses arising in the ordinary course of business. We consider the likelihood of loss orimpairment of an asset or the incurrence of a liability, as well as our ability to reasonably estimate the amount of loss, in determining loss contingencies. Anestimated loss contingency is accrued when it is probable that an asset has been impaired or a liability has been incurred and the amount of loss canreasonably be estimated. We regularly evaluate current information available to us to determine whether such accruals should be adjusted and whether newaccruals are required.61Recently Issued Accounting PronouncementsInformation about recently issued accounting pronouncements is presented in “Notes to Consolidated Financial Statements—Note 2—Description of theBusiness and Basis of Presentation” in our consolidated financial statements included in this report.Item 7A. Quantitative and Qualitative Disclosures About Market RiskOur results of operations and cash flows have been and will continue to be subject to fluctuations because of changes in foreign currency exchange rates,particularly changes in exchange rates between the U.S. dollar and the Euro, the British Pound, the Romanian Leu and the Canadian Dollar, the currencies ofcountries where we currently have our most significant international operations. Our expenses in international locations are generally denominated in thecurrencies of the countries in which our operations are located.As our international operations grow, we may begin to use foreign exchange forward contracts to partially mitigate the impact of fluctuations in net monetaryassets denominated in foreign currencies.62Item 8. Financial Statements and Supplementary DataINDEX TO CONSOLIDATED FINANCIAL STATEMENTSAudited Consolidated Financial Statements of SecureWorks Corp. Page Report of Independent Registered Public Accounting Firm 64 Consolidated Statements of Financial Position as of February 1, 2019 and February 2, 2018 65 Consolidated Statements of Operations for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017 66 Consolidated Statements of Comprehensive Loss for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017 67 Consolidated Statements of Cash Flows for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017 68 Consolidated Statements of Stockholders' Equity for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017 69 Notes to Consolidated Financial Statements 70 Schedule II - Valuation and Qualifying Accounts for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017 9563Report of Independent Registered Public Accounting FirmTo the Board of Directors andStockholders of SecureWorks Corp.Opinion on the Financial StatementsWe have audited the accompanying consolidated statements of financial position of SecureWorks Corp. and its subsidiaries (the “Company”) as of February1, 2019 and February 2, 2018, and the related consolidated statements of operations, comprehensive loss, stockholders’ equity and cash flows for each of thethree years in the period ended February 1, 2019, including the related notes and financial statement schedule listed in the accompanying index (collectivelyreferred to as the “consolidated financial statements”). In our opinion, the consolidated financial statements present fairly, in all material respects, thefinancial position of the Company as of February 1, 2019 and February 2, 2018, and the results of its operations and its cash flows for each of the three yearsin the period ended February 1, 2019 in conformity with accounting principles generally accepted in the United States of America. Change in Accounting PrincipleAs discussed in Note 2 to the consolidated financial statements, the Company changed the manner in which it accounts for revenues from contracts withcustomers in the year ended February 1, 2019.Basis for OpinionThese consolidated financial statements are the responsibility of the Company’s management. Our responsibility is to express an opinion on the Company’sconsolidated financial statements based on our audits. We are a public accounting firm registered with the Public Company Accounting Oversight Board(United States) (PCAOB) and are required to be independent with respect to the Company in accordance with the U.S. federal securities laws and theapplicable rules and regulations of the Securities and Exchange Commission and the PCAOB.We conducted our audits of these consolidated financial statements in accordance with the standards of the PCAOB. Those standards require that we plan andperform the audit to obtain reasonable assurance about whether the consolidated financial statements are free of material misstatement, whether due to error orfraud. The Company is not required to have, nor were we engaged to perform, an audit of its internal control over financial reporting. As part of our audits weare required to obtain an understanding of internal control over financial reporting but not for the purpose of expressing an opinion on the effectiveness ofthe Company's internal control over financial reporting. Accordingly, we express no such opinion.Our audits included performing procedures to assess the risks of material misstatement of the consolidated financial statements, whether due to error or fraud,and performing procedures that respond to those risks. Such procedures included examining, on a test basis, evidence regarding the amounts and disclosuresin the consolidated financial statements. Our audits also included evaluating the accounting principles used and significant estimates made by management,as well as evaluating the overall presentation of the consolidated financial statements. We believe that our audits provide a reasonable basis for our opinion./s/ PricewaterhouseCoopers LLPAtlanta, GeorgiaMarch 28, 2019We have served as the Company's auditor since 2014.64SECUREWORKS CORP.CONSOLIDATED STATEMENTS OF FINANCIAL POSITION(in thousands) February 1, 2019 February 2,2018* ASSETSCurrent assets: Cash and cash equivalents$129,592 $101,539Accounts receivable, net141,344 157,764Inventories468 1,030Other current assets27,604 40,551Total current assets299,008 300,884Property and equipment, net35,978 33,457Goodwill416,487 416,487Purchased intangible assets, net206,448 234,184Other non-current assets78,238 72,069Total assets$1,036,159 $1,057,081 LIABILITIES AND STOCKHOLDERS' EQUITYCurrent liabilities: Accounts payable$16,177 $23,266Accrued and other86,495 81,625Deferred revenue157,865 137,697Total current liabilities260,537 242,588Long-term deferred revenue16,064 14,948Other non-current liabilities66,851 68,455Total liabilities343,452 325,991Commitments and contingencies (Note 7) Stockholders' equity: Preferred stock - $0.01 par value: 200,000 shares authorized; 0 shares issued— —Common stock - Class A of $0.01 par value: 2,500,000 shares authorized; 11,016 and 11,085 issued andoutstanding, respectively110 111Common stock - Class B of $0.01 par value: 500,000 shares authorized; 70,000 shares issued and outstanding700 700Additional paid in capital884,567 867,411Accumulated deficit(176,263) (137,162)Accumulated other comprehensive income (loss)(2,884) 30Treasury stock, at cost - 819 and 0 shares, respectively(13,523) —Total stockholders' equity692,707 731,090Total liabilities and stockholders' equity$1,036,159 $1,057,081* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606. The accompanying notes are an integral part of these consolidated financial statements.65SECUREWORKS CORP.CONSOLIDATED STATEMENTS OF OPERATIONS(in thousands, except per share data) Fiscal Year Ended February 1, 2019 February 2,2018* February 3,2017* Net revenue$518,709 $467,930 $432,751Cost of revenue246,117 225,084 212,489Gross margin272,592 242,846 220,262Research and development87,608 80,164 71,030Sales and marketing141,818 139,937 118,235General and administrative91,898 92,726 86,876Total operating expenses321,324 312,827 276,141Operating loss(48,732) (69,981) (55,879)Interest and other, net2,778 (2,735) 2,490Loss before income taxes(45,954) (72,716) (53,389)Income tax benefit(6,853) (62,299) (21,748)Net loss(39,101) (10,417) (31,641) Loss per common share (basic and diluted)$(0.48) $(0.13) $(0.41)Weighted-average common shares outstanding (basic and diluted)80,710 80,280 77,635 * Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606. The accompanying notes are an integral part of these consolidated financial statements.66SECUREWORKS CORP.CONSOLIDATED STATEMENTS OF COMPREHENSIVE LOSS(in thousands) Fiscal Year Ended February 1,2019 February 2,2018* February 3,2017*Net loss$(39,101) $(10,417) $(31,641)Foreign currency translation adjustments, net of tax(2,914) 3,544 (1,993)Comprehensive loss$(42,015) $(6,873) $(33,634)* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.The accompanying notes are an integral part of these consolidated financial statements.67SECUREWORKS CORP.CONSOLIDATED STATEMENTS OF CASH FLOWS(in thousands) Fiscal Year Ended February 1,2019 February 2,2018* February 3,2017*Cash flows from operating activities: Net loss$(39,101) $(10,417) (31,641)Adjustments to reconcile net loss to net cash provided by (used in) operating activities: Depreciation and amortization41,207 42,171 39,425Change in fair value of convertible notes— — 132Stock-based compensation expense19,370 13,790 8,883Effects of exchange rate changes on monetary assets and liabilities denominated in foreigncurrencies(1,818) 3,256 (2,225)Income tax benefit(6,853) (62,299) (21,748)Excess tax benefit from share-based payment— — (221)Provision for doubtful accounts2,356 3,947 2,613Changes in assets and liabilities: Accounts receivable13,750 (48,540) 956Net transactions with parent(1,797) 11,024 (15,582)Inventories562 917 1,610Other assets(7,277) 14,610 (8,507)Accounts payable(6,117) 3,302 3,626Deferred revenue20,942 19,560 3,934Accrued and other liabilities21,975 9,466 11,907Net cash provided by (used in) operating activities57,199 787 (6,838)Cash flows from investing activities: Capital expenditures(10,200) (13,819) (19,361)Net cash provided by (used in) investing activities(10,200) (13,819) (19,361)Cash flows from financing activities: Principal payments on financing arrangement with Dell Financial Services(2,208) (800) —Taxes paid on vested restricted shares(2,207) (1,224) —Purchases of stock for treasury(13,531) — —Payments on financed capital expenditures(1,000) — —Proceeds from initial public offering, net— — 99,604Capital contribution from parent, net— — 9,547Excess tax benefit from share-based payment— — 221Net cash provided by (used in) financing activities(18,946) (2,024) 109,372Net (decrease) increase in cash and cash equivalents28,053 (15,056) 83,173Cash and cash equivalents at beginning of the period101,539 116,595 33,422Cash and cash equivalents at end of the period$129,592 $101,539 $116,595 Supplemental Disclosures of Non-Cash Investing and Financing Activities: Conversion of convertible notes to common stock$— $— $28,125Financed capital expenditures$373 $1,390 $800Income taxes paid$1,961 $1,152 $910* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.The accompanying notes are an integral part of these consolidated financial statements.68SECUREWORKS CORP.CONSOLIDATED STATEMENTS OF STOCKHOLDERS' EQUITY(in thousands, except per share data) Common Stock - Class A Common Stock - Class B OutstandingShares Amount OutstandingShares Amount AdditionalPaid in Capital AccumulatedDeficit Accumulated OtherComprehensive(Loss) Income Treasury Stock TotalStockholders'EquityBalances, January 29, 2016— $— 70,000 $700 $711,923 $(122,646) $(1,521) $— $588,456Cumulative effect of adjustmentfrom adoption of ASC 606— — — — — 27,542 — — 27,542Net loss— — — — — (31,641) — — (31,641)Other comprehensive (loss)income— — — — — — (1,993) — (1,993)Issuance of common stock inconnection with initial publicoffering, net of offering costs8,000 80 — — 96,246 — — — 96,326Conversion of convertible notesto common stock in connectionwith initial public offering2,009 20 — — 28,105 — — — 28,125Grants of restricted stockawards, net557 7 — — (18) — — — (11)Capital contribution fromparent, net— — — — 9,547 — — — 9,547Stock-based compensation— — — — 8,883 — — — 8,883Excess tax benefit from share-based payment— — — — 221 — — — 221Balances, February 3, 2017*10,566 $107 70,000 $700 $854,907 $(126,745) $(3,514) $— $725,455Net loss— — — — — (10,417) — — (10,417)Other comprehensive (loss)income— — — — — — 3,544 — 3,544Vesting of restricted stock units384 4 — — (4) $— — ———Grants of restricted stockawards, net284 2 — — (2) $— — — —Common stock withheld aspayment for withholding taxesupon the vesting of restrictedshares(149) (2) — — (1,280) — — — (1,282)Stock-based compensation— — — — 13,790 — — — 13,790Balances, February 2, 2018*11,085 $111 70,000 $700 $867,411 $(137,162) $30 $— $731,090Net loss— — — — — (39,101) — — (39,101)Other comprehensive (loss)income— — — — — — (2,914) — (2,914)Vesting of restricted stock units598 5 — — (5) — — — —Grants of restricted stockawards, net386 4 — — (4) — — — —Common stock withheld aspayment for withholding taxesupon the vesting of restrictedshares(234) (2) — — (2,205) — — — (2,207)Stock-based compensation— — — — 19,370 — — — 19,370Shares repurchased(819) (8) — — — — — (13,523) (13,531)Balances, February 1, 201911,016 $110 70,000 $700 $884,567 $(176,263) $(2,884) $(13,523) $692,707* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.The accompanying notes are an integral part of these consolidated financial statements.69SECUREWORKS CORP.Notes to Consolidated Financial Statements NOTE 1 - DESCRIPTION OF THE BUSINESS AND BASIS OF PRESENTATIONDescription of the BusinessSecureWorks Corp. (individually and collectively with its consolidated subsidiaries, “Secureworks” or the “Company”) is a leading global provider ofintelligence-driven information security solutions singularly focused on protecting the Company's customers from cyber attacks. The Company’s mission isto unlock the value of its customers’ security investments by simplifying their complex security operations and amplifying their defenses.The Company has one primary business activity, which is to provide customers with intelligence-driven information security solutions. The Company’s chiefoperating decision maker, who is the President and Chief Executive Officer, makes operating decisions, assesses performance, and allocates resources on aconsolidated basis. Accordingly, Secureworks operates its business as a single reportable segment.On February 8, 2011, the Company was acquired by Dell Inc. (individually and collectively with its consolidated subsidiaries, “Dell” or “Parent”). OnOctober 29, 2013, Dell was acquired by Dell Technologies Inc., formerly known as Denali Holding Inc. (“Dell Technologies”), a parent holding corporation.For the purposes of the accompanying financial statements, the Company elected to utilize pushdown accounting for the acquisition of Dell by DellTechnologies. On April 27, 2016, the Company completed its initial public offering (“IPO”), as further described below. Upon the closing of the IPO, DellTechnologies owned, indirectly through Dell Inc. and Dell Inc.’s subsidiaries, no shares of the Company's outstanding Class A common stock and all sharesof the Company's outstanding Class B common stock, which as of February 1, 2019 represented approximately 86.4% of the Company's total outstandingshares of common stock and approximately 98.5% of the combined voting power of both classes of the Company's outstanding common stock. Initial Public OfferingOn April 27, 2016, the Company completed its IPO in which it issued and sold 8,000,000 shares of Class A common stock at a price to the public of $14.00per share. The Company received net proceeds of $99.6 million from the sale of shares of Class A common stock, after deducting underwriting discounts andcommissions and unpaid offering expenses payable by the Company of $12.4 million.Upon the closing of the IPO, all of the Company's convertible notes automatically converted into 2,008,924 shares of the Class A common stock. For moreinformation regarding the convertible notes see “Note 6—Debt.”Basis of Presentation and ConsolidationThe Company’s consolidated financial statements have been prepared on a stand-alone basis in accordance with accounting principles generally accepted inthe United States of America (“GAAP”). The preparation of financial statements in accordance with GAAP requires management to make estimates andassumptions that affect the amounts reported in the Company’s financial statements. The consolidated financial statements include assets, liabilities, revenueand expenses of all majority-owned subsidiaries. Intercompany transactions and balances are eliminated in consolidation.For the periods presented, Dell has provided various corporate services to the Company in the ordinary course of business, including finance, tax, humanresources, legal, insurance, IT, procurement and facilities-related services. Dell also has provided the Company with the services of a number of its executivesand employees. For more information regarding the related party transactions, see “Note 12—Related Party Transactions.”During the periods presented in the financial statements, Secureworks did not file separate federal tax returns, as the Company was generally included in thetax grouping of other Dell entities within the respective entity’s tax jurisdiction. The income tax benefit has been calculated using the separate returnmethod, modified to apply the benefits for loss approach. Under the benefits for loss approach, net operating losses or other tax attributes are characterized asrealized or as realizable by Secureworks when those attributes are utilized or expected to be utilized by other members of the Dell consolidated group. See“Note 10—Income and Other Taxes” for more information.70SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued) Fiscal YearThe Company’s fiscal year is the 52- or 53-week period ending on the Friday closest to January 31. The fiscal years ended February 1, 2019, February 2,2018, and February 3, 2017 are referred to as fiscal 2019, fiscal 2018, and fiscal 2017, respectively. Fiscal 2019 and fiscal 2018 included 52 weeks, whilefiscal 2017 included 53 weeks, with the extra week included in the fourth quarter.Use of EstimatesThe preparation of financial statements in conformity with GAAP requires management to make estimates and assumptions that affect the reported amounts ofassets and liabilities, the disclosure of contingent assets and liabilities at the date of the financial statements and the reported amounts of revenue andexpenses during the reporting periods. Estimates are revised as additional information becomes available. In the Consolidated Statements of Operations,estimates are used when accounting for revenue arrangements, determining cost of revenue, allocating cost in the form of depreciation and amortization andestimating the impact of contingencies. In the Statements of Financial Position, estimates are used in determining the valuation and recoverability of assets,such as accounts receivable, inventories, fixed assets, goodwill and other identifiable intangible assets, and estimates are used in determining the reportedamounts of liabilities, such as taxes payable and the impact of contingencies, all of which also impact the Consolidated Statements of Operations. Actualresults could differ from these estimates.NOTE 2 — SIGNIFICANT ACCOUNTING POLICIESCash and Cash Equivalents. As of February 1, 2019 and February 2, 2018, cash and cash equivalents is comprised of cash held in bank accounts and moneymarket funds. The cash and cash equivalents are reported at their current carrying value, which approximates fair value due to the short-term nature of theseinstruments. The money market funds are valued using quoted market prices and are included as Level 1 inputs.Accounts Receivable. Trade accounts receivable are recorded at the invoiced amount, net of allowances for doubtful accounts. Accounts receivable arecharged against the allowance for doubtful accounts when deemed uncollectible. Management regularly reviews the adequacy of the allowance for doubtfulaccounts by considering the age of each outstanding invoice, each customer’s expected ability to pay, and the collection history with each customer, whenapplicable, to determine whether a specific allowance is appropriate. As of February 1, 2019 and February 2, 2018, the allowance for doubtful accounts was$6.2 million and $8.2 million, respectively.Unbilled accounts receivable included in accounts receivable, totaling $13.8 million and $18.1 million as of February 1, 2019 and February 2, 2018,respectively, relate to work that has been performed, though invoicing has not yet occurred. All of the unbilled receivables are expected to be billed andcollected within the upcoming fiscal year.Allowance for Doubtful Accounts. The Company recognizes an allowance for losses on accounts receivable in an amount equal to the estimated probablelosses, net of recoveries. The allowance is based on an analysis of historical bad debt experience, current receivables aging, and expected future write-offs, aswell as an assessment of specific identifiable customer accounts considered at risk or uncollectible. The expense associated with the allowance for doubtfulaccounts is recognized in general and administrative expenses.Fair Value Measurements. The carrying amounts of the Company’s financial instruments, including cash equivalents, accounts receivable, accounts payableand accrued expenses, approximate their respective fair values due to their short-term nature.Inventories. Inventories consist of finished goods, which include hardware devices such as servers, log retention devices and appliances that are sold inconnection with the Company’s solutions offerings. Inventories are stated at lower of cost or net realizable value, with cost being determined on a first-in,first-out (FIFO) basis.Prepaid Maintenance and Support Agreements. Prepaid maintenance and support agreements represent amounts paid to third-party service providers formaintenance, support and software license agreements in connection with the Company’s obligations to provide maintenance and support services. Theprepaid maintenance and support agreement balance is amortized on a straight-line basis over the contract term and is primarily recognized as a componentof cost of revenue. Amounts that are expected to be amortized within one year are recorded in other current assets and the remaining balance is recorded inother non-current assets.71SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Property and Equipment. Property and equipment are carried at depreciated cost. Depreciation is calculated using the straight-line method over the estimatedeconomic lives of the assets, which range from two to five years. Leasehold improvements are amortized over the shorter of five years or the lease term. Forthe fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017, depreciation expense was $13.5 million, $14.4 million, and $11.7 million,respectively. Gains or losses related to retirements or disposition of fixed assets are recognized in the period incurred.Intangible Assets Including Goodwill. Identifiable intangible assets with finite lives are amortized on a straight-line basis over their estimated useful lives.Finite-lived intangible assets are reviewed for triggering events on a quarterly basis. Goodwill and indefinite-lived intangible assets are tested for impairmenton an annual basis in the third fiscal quarter, or sooner if an indicator of impairment occurs. To determine whether goodwill and indefinite-lived intangibleassets are impaired, the Company first assesses certain qualitative factors. Based on this assessment, if it is determined that the fair value of the goodwill orindefinite-lived intangible asset is less than its carrying amount, the Company performs the quantitative analysis of the impairment test.The goodwill impairment test consists of a two-step process, if necessary. The first step is to compare the fair value of the reporting unit to its carrying value,including goodwill. The Company used a combination of income (discounted cash flow) and market approach model to determine the fair value of thereporting unit. The assumptions used in the model are consistent with those which the Company believes hypothetical marketplace participants would use. Ifthe fair value of the reporting unit is less than its carrying value, the second step of the impairment test must be performed in order to determine the amount ofthe impairment loss, if any. The second step requires the Company to determine the implied fair value of goodwill by allocating the reporting unit's fair valueto each of its assets and liabilities as if the reporting unit was acquired in a business acquisition. If the carrying amount of the reporting unit’s goodwillexceeds its implied fair value, an impairment charge is recognized in an amount equal to that excess. The loss recognized cannot exceed the carrying amountof goodwill. The Company has determined that it has a single goodwill reporting unit, and, accordingly, for the quantitative analysis, it compares the fairvalue of this goodwill reporting unit to its carrying value. For indefinite-lived assets, other than goodwill, if the carrying amount determined through thequantitative analysis exceeds the fair value, an impairment charge is recognized in an amount equal to that excess.Deferred Commissions and Deferred Fulfillment Costs. The Company accounts for both costs to obtain a contract for a customer, which are defined as coststhat the Company would not have incurred if the contract had not been obtained, and costs to fulfill a contract by capitalizing and systematically amortizingthe assets on a basis that is consistent with the transfer to the customer of the goods or services to which the assets relate. These costs generate or enhanceresources used in satisfying performance obligations that directly relate to contracts. Applying the practical expedient guidance, the Company recognizes theincremental costs of obtaining contracts as an expense when incurred if the amortization period of the incremental costs of obtaining contracts that theCompany otherwise would have recognized is one year or less.The Company’s customer acquisition costs are primarily attributable to sales commissions and related fringe benefits earned by the Company's sales forceand such costs are considered incremental costs to obtain a contract. Sales commissions for initial contracts are deferred and amortized taking intoconsideration the pattern of transfer to which assets relate and may include expected renewal periods where renewal commissions are not commensurate withthe initial commission period. The Company recognizes the deferred commissions on a straight-line basis over the life of the customer relationship (estimatedto be seven years) in sales and marketing expenses. These assets are classified as non-current, and included in other non-current assets in the ConsolidatedStatements of Financial Position. As of February 1, 2019 and February 2, 2018, the amount of deferred commissions included in other non-current assets was$62.9 million and $57.2 million, respectively.Additionally, the Company incurs certain costs to install and activate hardware and software used in its managed security services, primarily related to aportion of the compensation for the personnel who perform the installation activities. The Company makes judgments regarding the fulfillment costs to becapitalized. Specifically, the Company capitalizes direct labor and associated fringe benefits using standards developed from actual costs and applicableoperational data. The Company updates the information quarterly for items such as the estimated amount of time required to perform such activity. TheCompany capitalizes and amortizes these fulfillment costs on a straight-line basis over the economic life of the services, or approximately four years, in costof revenue. As of February 1, 2019 and February 2, 2018, the amount of deferred fulfillment costs included in other non-current assets was $11.0 million and$10.2 million, respectively.72SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Foreign Currency Translation. During the periods presented, Secureworks primarily operated in the United States. For the majority of the Company’sinternational businesses, the Company has determined that the functional currency of those subsidiaries is the local currency. Accordingly, assets andliabilities for these entities are translated at current rates of exchange in effect at the balance sheet date. Revenue and expenses from these internationalsubsidiaries are translated using the monthly average exchange rates in effect for the period in which the items occur. Foreign currency translationadjustments are included as a component of accumulated other comprehensive loss, while foreign currency transaction gains and losses are recognized in theStatements of Operations within interest and other, net. These transaction (losses) gains totaled $1.8 million, $(3.3) million and $2.2 million in the fiscalyears ended February 1, 2019, February 2, 2018, and February 3, 2017, respectively.Revenue Recognition. Secureworks derives revenue primarily from two sources: (1) subscription revenue related to managed security and threat intelligencesolutions; and (2) professional services, including security and risk consulting and incident response solutions.Subscription-based arrangements typically include security solutions, the associated hardware appliance, up-front installation fees and maintenanceagreements, which are all typically recognized over the life of the related agreement. The Company has determined that hardware appliances and the relatedmaintenance agreement included in the subscription-based solutions arrangements are incapable of being distinct within the context of the contract as theyare required to access the Company's Counter Threat Platform. Moreover, any related installation fees are non-refundable and also incapable of being distinctwithin the context of the contract. Therefore, the Company has deemed these arrangements as a single performance obligation within the context of a typicalsubscription-based arrangement. The revenue and any related costs for these deliverables are recognized ratably over the contract term, beginning on the dateon which service is made available to customers. Amounts that have been invoiced, but for which the above revenue recognition criteria have not been met,are included in deferred revenue.Professional services consist primarily of fixed-fee and retainer-based contracts. Revenue from these engagements is recognized using an input method overthe contract term.The Company reports revenue net of any revenue-based taxes assessed by governmental authorities that are imposed on, and concurrently with, specificrevenue-producing transactions.The Company recognizes revenue when all of the following criteria are met:•Identification of the contract, or contracts, with a customer—A contract with a customer exists when (i) the Company enters into an enforceablecontract with a customer, (ii) the contract has commercial substance and the parties are committed to perform, and (iii) payment terms can beidentified and collection of substantially all consideration to which the Company will be entitled in exchange for goods or services that will betransferred is deemed probable based on the customer's intent and ability to pay. Contracts entered into for professional services and subscription-based solutions near or at the same time are generally not combined as a single contract for accounting purposes, since neither the pricing nor theservices are interrelated.•Identification of the performance obligations in the contract—Performance obligations promised in a contract are identified based on the goods orservices that will be transferred to the customer that are both (i) capable of being distinct, whereby the customer can benefit from the goods or serviceeither on its own or together with other resources that are readily available from third parties or from the Company, and (ii) distinct in the context ofthe contract, whereby the transfer of the goods or services is separately identifiable from other promises in the contract. When promised goods orservices are incapable of being distinct, the Company accounts for them as a combined performance obligation. With regard to a typical contract forsubscription-based solutions, the performance obligation represents a series of distinct services that will be accounted for as a single performanceobligation. In a typical professional services contract, the Company has a separate performance obligation associated with each service. TheCompany is generally acting as a principal in each subscription-based and professional services arrangement and, thus, recognizes revenue on agross basis.•Determination of the transaction price—The total transaction price is primarily fixed in nature as the consideration is tied to the specific servicespurchased by the customer, which constitutes a series for delivery of the solutions over the duration of the contract. For professional servicescontracts, variable consideration exists in the form of rescheduling penalties and expense reimbursements; no estimation is required at contractinception, since variable consideration is allocated to the applicable period.73SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)•Allocation of the transaction price to the performance obligations in the contract—The Company allocates the transaction price to eachperformance obligation based on the performance obligation's standalone selling price. Standalone selling price is determined by considering allinformation available to the Company, such as historical selling prices of the performance obligation, geographic location, overall strategic pricingobjective, market conditions and internally approved pricing guidelines related to the performance obligations.•Recognition of revenue when, or as, the Company satisfies performance obligation—The Company recognizes revenue over time using a time-elapsed output method to measure progress (i.e., ratable recognition) for the subscription-based performance obligation over the contract term. Forany upgraded installation services, which the Company has determined represent a performance obligation separate from its subscription-basedarrangements, revenue is recognized over time using hours elapsed over the service term as an appropriate method to measure progress. For theperformance obligation pertaining to professional services arrangements, the Company recognizes revenue over time using an input method basedon time (hours or days) incurred to measure progress over the contract term.As indicated above, the Company has one primary business activity, which is to provide customers with intelligence-driven information security solutions.The Company's chief operating decision maker, who is the President and Chief Executive Officer, makes operating decisions, assesses performance, andallocates resources on a consolidated basis. There are no segment managers who are held accountable for operations and operating results below theconsolidated unit level. Accordingly, the Company is considered to be in a single reportable segment and operating unit structure.The following table presents revenue by service type (in thousands): February 1, 2019 February 2, 2018* February 3, 2017*Managed Security Services revenue $396,130 $365,768 $345,601Security and Risk Consulting revenue 122,579 102,162 87,150Total revenue $518,709 $467,930 $432,751* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.Deferred Revenue (Contract Liabilities). Deferred revenue represents amounts contractually billed to customers or payments received from customers forwhich revenue has not yet been recognized. Deferred revenue that is expected to be recognized as revenue within one year is recorded as short-term deferredrevenue and the remaining portion is recorded as long-term deferred revenue.The Company has determined that its contracts generally do not include a significant financing component. The primary purpose of the Company's invoicingterms is to provide customers with simplified and predictable ways of purchasing its solutions, not to receive financing from customers or to providecustomers with financing. Examples of such terms include invoicing at the beginning of a subscription term with revenue recognized ratably over thecontract period.Cost of Revenue. Cost of revenue consists primarily of compensation and related expenses, including salaries, benefits and performance-based compensationfor employees who maintain the Counter Threat Platform and provide support services to customers, as well as perform other critical functions. Otherexpenses include depreciation of equipment and costs associated with maintenance agreements for hardware provided to customers as part of theirsubscription-based solutions. In addition, cost of revenue includes amortization of technology licensing fees, fees paid to contractors who supplement orsupport solutions offerings, maintenance fees and overhead allocations.Research and Development Costs. Research and development costs are expensed as incurred. Research and development expenses include compensation andrelated expenses for the continued development of solutions offerings, including a portion of expenses related to the threat research team, which focuses onthe identification of system vulnerabilities, data forensics and malware analysis and product management. In addition, expenses related to the developmentand prototype of new solutions offerings also are included in research and development costs, as well as allocated overhead. The Company’s solutionsofferings have generally been developed internally.74SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Sales and Marketing. Sales and marketing expense includes compensation and related expenses, including salaries, benefits, and performance-basedcompensation, including sales commissions and related expenses for sales and marketing personnel, marketing and advertising programs, including leadgeneration, customer advocacy events, other brand-building expenses, and allocated overhead. Advertising costs are expensed as incurred and were $12.6million, $14.7 million and $12.8 million for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017, respectively.General, and Administrative. General and administrative expense primarily includes the costs of human resources and recruiting, finance and accounting,legal support, management information systems and information security systems, facilities management and other administrative functions, offset byallocations of information technology and facilities costs to other functions.Software Development Costs. Qualifying software costs developed for internal use are capitalized when application development begins, it is probable thatthe project will be completed, and the software will be used as intended. In order to expedite delivery of the Company’s security solutions, the applicationstage typically commences before the preliminary development stage is completed. Accordingly, no significant software development costs have beencapitalized during any period presented.The Company capitalizes development costs incurred for software and applications to be sold, leased or otherwise marketed after technological feasibility ofthe software or application is established. Under the Company’s current practice of developing new software, the technological feasibility of the underlyingsoftware or application is not established until substantially all product development and testing is complete, which generally includes the development of aworking model. Software development costs that have been capitalized to date have been insignificant.Income Taxes. Current income tax expense is the amount of income taxes expected to be payable for the current year. Deferred tax assets and liabilities arerecorded based on the difference between the financial statement and tax basis of assets and liabilities using enacted tax rates in effect for the year in whichthe differences are expected to reverse. The effect on deferred tax assets and liabilities of a change in tax rates is recognized in the Statement of Operations inthe period that includes the enactment date. The Company calculates a provision for income taxes using the asset and liability method, under which deferredtax assets and liabilities are recognized by identifying the temporary differences arising from the different treatment of items for tax and accounting purposes.The Company accounts for the tax impact of including Global Intangible Low Tax Income (“GILTI”) in U.S. taxable income as a period cost. The Companyprovides valuation allowances for deferred tax assets, where appropriate. In assessing the need for a valuation allowance, Secureworks considers all availableevidence for each jurisdiction, including past operating results, estimates of future taxable income, and the feasibility of ongoing tax planning strategies. Inthe event Secureworks determines all or part of the net deferred tax assets are not realizable in the future, it will make an adjustment to the valuationallowance that would be charged to earnings in the period such determination is made.The accounting guidance for uncertainties in income tax prescribes a comprehensive model for the financial statement recognition, measurement,presentation and disclosure of uncertain tax positions taken or expected to be taken in income tax returns. The Company recognizes a tax benefit from anuncertain tax position in the financial statements only when it is more likely than not that the position will be sustained upon examination, includingresolution of any related appeals or litigation processes, based on the technical merits and a consideration of the relevant taxing authority’s administrativepractices and precedents.During the periods presented in the financial statements, the Company did not file separate federal tax returns, as the Company was generally included in thetax grouping of other Dell entities within the respective entity’s tax jurisdiction. The income tax benefit has been calculated using the separate returnmethod, modified to apply the benefits for loss approach. Under the benefits for loss approach, net operating losses or other tax attributes are characterized asrealized or as realizable by the Company when those attributes are utilized or expected to be utilized by other members of the Dell consolidated group.Stock-Based Compensation. The Company’s compensation programs include grants under the SecureWorks Corp. 2016 Long-Term Incentive Plan and, priorto the IPO date, grants under share-based payment plans of Dell Technologies. Under the plans, the Company, and prior to the IPO, Dell Technologies havegranted stock options, restricted stock awards and restricted stock units. Compensation expense related to stock-based transactions is measured andrecognized in the financial statements based on fair value. Fair value for restricted stock awards and restricted stock units under the Company’s plan is basedon the closing price of the Company’s Class A common stock as reported on the NASDAQ Global Select Market on the day of the grant. The fair value ofeach option award is estimated on the grant date using the Black-Scholes option-pricing model and a single option award approach. This model requires thatat the date of grant the Company must determine the fair value of the underlying75SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)common stock, the expected term of the award, the expected volatility, risk-free interest rates and expected dividend yield. The Company's annual grant ofrestricted stock and restricted stock units issued during the fiscal year ended February 1, 2019 vest over an average service period of three years andapproximately 50% of such awards are subject to performance conditions. Stock-based compensation expense, net of forfeitures and adjustments forattainment of performance criteria, is recognized using a straight-line basis over the requisite service periods of the awards, which is generally three to fouryears. The Company estimates a forfeiture rate, based on an analysis of actual historical forfeitures, to calculate stock-based compensation expense.Loss Contingencies. Secureworks is subject to the possibility of various losses arising in the ordinary course of business. An estimated loss contingency isaccrued when it is probable that an asset has been impaired or a liability has been incurred and the amount of loss can be reasonably estimated. The Companyregularly evaluates current information available to determine whether such accruals should be adjusted and whether new accruals are required. See “Note 6–Commitments and Contingencies” for more information about these loss contingencies.Recently Adopted Accounting PronouncementsCompensation - Stock Compensation. In May 2017, the Financial Accountng Standards Board (“FASB”) issued Accounting Standards Update (“ASU”) No.2017-09, “Compensation – Stock Compensation (Topic 718): Scope of Modification Accounting.” The amendments in this update provide guidance aboutwhich changes to the terms or conditions of a share-based payment award require an entity to apply modification accounting under Topic 718. The Companyadopted this guidance during the fiscal year ended February 1, 2019 with no material impact on its consolidated financial statements.Statement of Cash Flows. In August 2016, the FASB issued ASU No. 2016-15, “Statement of Cash Flows (Topic 230): Classification of Certain Cash Receiptsand Cash Payments - A consensus of the FASB Emerging Issues Task Force.” The update was issued with the objective of reducing the existing diversity inpractice in how certain cash receipts and cash payments are presented and classified in the statement of cash flows under Topic 230 and other topics. Theadoption of this standard had no impact on the Company’s consolidated financial statements.Revenue from Contracts with Customers. The Company adopted ASU 2014-09, “Revenue From Contracts With Customers” (“ASC 606”) effective February3, 2018 using the full retrospective method. The cumulative effect of the adoption was recognized as a decrease to accumulated deficit of $51.8 million onFebruary 2, 2018 and impacted certain other prior period amounts.Selected audited consolidated statements of financial position line items which reflect the adoption of ASC 606 are as follows (in thousands): February 2, 2018 Adjustments forAdoption of February 2, 2018 (as reported) ASC 606 (as adjusted)Current assets: Other current assets $42,163 $(1,612) $40,551Total current assets 302,496 (1,612) 300,884Other non-current assets 4,677 67,392 72,069Total assets $991,301 $65,780 $1,057,081 Current liabilities: Deferred revenue $139,632 $(1,935) $137,697Total current liabilities 244,523 (1,935) 242,588Other non-current liabilities 52,681 15,774 68,455Total liabilities 312,152 13,839 325,991Stockholders' equity: Accumulated deficit (188,936) 51,774 (137,162)Accumulated other comprehensive (loss) income (137) 167 30Total stockholders' equity $679,149 $51,941 $731,09076SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Select audited consolidated statements of operations line items which reflect the retrospective adoption of ASC 606 are as follows (in thousands): Fiscal Year EndedFebruary 2, 2018 Adjustments for Adoptionof Fiscal Year EndedFebruary 2, 2018 (as reported) ASC 606 (as adjusted)Net revenue $467,904 $26 $467,930Cost of revenue 226,718 (1,634) 225,084Gross margin 241,186 1,660 242,846Total operating expenses 324,231 (11,404) 312,827Operating loss (83,045) 13,064 (69,981)Interest and other, net (2,735) — (2,735)Income tax benefit (57,703) (4,596) (62,299)Net loss $(28,077) $17,660 $(10,417) Net loss per common share (basic and diluted) $(0.35) $0.22 $(0.13) Fiscal Year EndedFebruary 3, 2017 Adjustments for Adoptionof Fiscal Year EndedFebruary 3, 2017 (as reported) ASC 606 (as adjusted)Net revenue $429,502 $3,249 $432,751Cost of revenue 212,599 (110) 212,489Gross margin 216,903 3,359 220,262Total operating expenses 282,856 (6,715) 276,141Operating loss (65,953) 10,074 (55,879)Interest and other, net 2,476 14 2,490Income tax benefit (25,264) 3,516 (21,748)Net loss $(38,213) $6,572 $(31,641) Net loss per common share (basic and diluted) $(0.49) $0.08 $(0.41)Select audited consolidated statement of operations line items which reflect the retrospective adoption of ASC 606 are as follows (in thousands): Fiscal Year EndedFebruary 2, 2018 Adjustments for Adoption Fiscal Year EndedFebruary 2, 2018 (as reported) of ASC 606 (as adjusted)Cash flows from operating activities: Net loss $(28,077) $17,660 $(10,417)Adjustments to reconcile net loss to net cash used in operatingactivities: Effects of exchange rate changes on monetary assets andliabilities denominated in foreign currencies 3,256 — 3,256Income tax benefit (57,703) (4,596) (62,299)Changes in assets and liabilities: Other assets 27,699 (13,089) 14,610Deferred revenue 19,585 (25) 19,560Accrued and other liabilities 9,416 50 9,466Net cash provided by (used in) operating activities $787 $— $78777SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued) Fiscal Year EndedFebruary 3, 2017 Adjustments for Adoption Fiscal Year EndedFebruary 3, 2017 (as reported) of ASC 606 (as adjusted)Cash flows from operating activities: Net loss $(38,213) $6,572 $(31,641)Adjustments to reconcile net loss to net cash used in operatingactivities: Effects of exchange rate changes on monetary assets andliabilities denominated in foreign currencies (2,239) 14 (2,225)Income tax benefit (25,264) 3,516 (21,748)Changes in assets and liabilities: Other assets (1,724) (6,783) (8,507)Deferred revenue 7,185 (3,251) 3,934Accrued and other liabilities 11,975 (68) 11,907Net cash provided by (used in) operating activities $(6,838) $— $(6,838)Recently Issued Accounting PronouncementsIntangibles - Goodwill and Other - Internal-Use Software. In August 2018, the FASB issued ASU 2018-15, “Intangibles-Goodwill and Other-Internal-UseSoftware (Subtopic 350-40): Customer’s Accounting for Implementation Costs Incurred in a Cloud Computing Arrangement That Is a Service Contract.” ASU2018-15 aligns the requirements for capitalizing implementation costs in such cloud computing arrangements with the requirements for capitalizingimplementation costs incurred to develop or obtain internal-use software. The updated guidance is effective for the Company for annual and interim periodsbeginning in the Company's 2021 fiscal year, with early adoption permitted. Entities may choose to adopt the new guidance prospectively or retrospectively.The Company is currently evaluating the impact of this guidance on its consolidated financial statements.Intangibles - Goodwill and Other. In January 2017, the FASB issued ASU 2017-04, Intangibles-Goodwill and Other (Topic 350): “Simplifying the Test forGoodwill Impairment.” ASU 2017-04 eliminates Step 2 of the goodwill impairment test, which required the Company to determine the implied fair value ofgoodwill by allocating the reporting unit's fair value to each of its assets and liabilities as if the reporting unit was acquired in a business acquisition. Instead,the updated guidance requires an entity to perform its annual or interim goodwill impairment test by comparing the fair value of the reporting unit to itscarrying value, and recognizing a non-cash impairment charge for the amount by which the carrying value exceeds the reporting unit's fair value with the lossnot exceeding the total amount of goodwill allocated to that reporting unit. The updated guidance is effective for the Company beginning with theCompany's 2021 fiscal year, with early adoption permitted, and will be applied on a prospective basis. The Company does not expect that the adoption ofthis standard will have a material impact on its consolidated financial statements.Financial Instruments - Credit Losses. In June 2016, the FASB issued ASU No. 2016-13, “Financial Instruments - Credit Losses (Topic 326): Measurement ofCredit Losses on Financial Instruments.” The amendments in this update replace the incurred loss impairment methodology in current GAAP with amethodology that reflects expected credit losses and requires consideration of a broader range of reasonable and supportable information to inform credit lossestimates. The update is effective for the Company for fiscal years beginning with the Company’s 2021 fiscal year, including interim periods within thosefiscal years. The Company is currently evaluating the impact of this guidance on its consolidated financial statements.78SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Leases — In February 2016, the FASB issued ASU No. 2016-02, “Leases (Topic 842).” The primary objective of this update is to increase transparency andcomparability among organizations by requiring lessees to recognize a lease liability for the obligation to make lease payments and a right-of-use asset forthe right to use the underlying asset for the lease term. The guidance also makes some changes to lessor accounting and requires additional disclosures aboutall leasing arrangements. Companies are required to use a modified retrospective approach, with the option of applying the requirements of the standardeither (1) retrospectively to each prior comparative reporting period presented, or (2) retrospectively at the beginning of the period of adoption. TheCompany will adopt this standard for the fiscal year beginning February 2, 2019, and will apply it at the beginning of the period of adoption through acumulative-effect adjustment to its accumulated deficit. The Company is continuing to assess the new guidance, but anticipates that the most significant change will be recognition of right-of-use assets and leaseliabilities on the Consolidated Statements of Financial Position. The standard will have no impact on the Company’s Consolidated Statements of CashFlows.NOTE 3 — LOSS PER SHARE Loss per share is calculated by dividing net loss for the periods presented by the respective weighted-average number of common shares outstanding, andexcludes any dilutive effects of share-based awards, as they would be anti-dilutive. Diluted net loss per common share is computed by giving effect to allpotentially dilutive common shares, including common stock issuable upon the exercise of stock options and unvested restricted common stock andrestricted stock units. The Company applies the two-class method to calculate earnings per share. Because both classes share the same rights in dividends andearnings, earnings per share (basic and diluted) are the same for both classes. Since losses were incurred in all periods presented, all potential common shareswere determined to be anti-dilutive.The following table sets forth the computation of loss per common share (in thousands, except per share amounts): Fiscal Year Ended February 1, 2019 February 2, 2018* February 3, 2017*Numerator: Net loss $(39,101) $(10,417) $(31,641)Denominator: Weighted-average number of shares outstanding: Basic and Diluted 80,710 80,280 77,635Loss per common share: Basic and Diluted $(0.48) $(0.13) $(0.41) Weighted-average anti-dilutive stock options, non-vestedrestricted stock and restricted stock units 5,966 5,096 3,806* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.NOTE 4 — CONTRACT BALANCES AND CONTRACT COSTS Promises to provide services related to the Company's subscription-based solutions are accounted for as a single performance obligation over an averageperiod of two years. Performance obligations related to the Company's professional service contracts are separate obligations associated with each service.Although the Company has many multi-year customer relationships for its professional service solutions, the contractual period is typically structured as aseparate performance obligation and recognized over a duration of less than one year.Deferred revenue represents the aggregate amount of billing in advance of service delivery. The deferred revenue balance does not represent the total contractvalue of annual or multi-year, non-cancelable subscription agreements. The Company invoices its customers based on a variety of billing schedules. Duringthe fiscal year ended February 1, 2019, on average, approximately half of the Company's recurring revenue was billed in advance. In addition, many of theCompany's professional services engagements are billed in advance of service commencement. The deferred revenue balance is influenced by several factors,including seasonality, the compounding effects of renewals, invoice duration and invoice timing.79SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Changes to the Company's deferred revenue during the fiscal year ended February 1, 2019 are as follows (in thousands): As of February 2, 2018* Upfront payments received andbillings during the fiscal yearended February 1, 2019 Revenue recognized during thefiscal year ended February 1,2019 As of February 1, 2019Deferred revenue $152,645 $206,960 $(185,676) $173,929* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.Remaining Performance ObligationThe remaining performance obligation represents the transaction price allocated to contracted revenue that has not yet been recognized, which includesdeferred revenue and non-cancellable contracts that will be invoiced and recognized as revenue in future periods. The remaining performance obligationconsists of two elements: (i) the value of remaining services to be provided through the contract term for customers whose services have been activated("active"); and (ii) the value of services contracted with customers that have not yet been installed ("backlog"). Backlog is not recorded in revenue, deferredrevenue or elsewhere in the consolidated financial statements until the Company establishes a contractual right to invoice, at which point it is recorded asrevenue or deferred revenue, as appropriate. The Company applies the practical expedient in ASC paragraph 606-10-50-14(a) and does not discloseinformation about remaining performance obligations that are part of a contract that has an original expected duration of one year or less. Additionally, theCompany has elected to use the practical expedient to not disclose backlog related to the comparative period under ASC 606-10-65.The Company expects that the amount of backlog relative to the total value of its contracts will change from year to year due to several factors, including theamount invoiced at the beginning of the contract term, the timing and duration of the Company's customer agreements, varying invoicing cycles ofagreements and changes in customer financial circumstances. Accordingly, any fluctuations in backlog are not always a reliable indicator of future revenues.As of February 1, 2019, the Company expects to recognize remaining performance obligations as follows (in thousands): Total Expected to berecognized in the next12 months Expected to berecognized in 12-24months Expected to berecognized in 24-36months Expected to berecognized thereafterPerformance obligation - active $257,311 $142,575 $82,489 $29,401 $2,846Performance obligation - backlog 39,086 14,019 14,019 10,937 111Total $296,397 $156,594 $96,508 $40,338 $2,957Deferred Commissions and Fulfillment CostsThe Company capitalizes a significant portion of its commission expense and related fringe benefits earned by its sales personnel, related to the acquisitionof new business. Additionally, the Company capitalizes certain costs to install and activate hardware and software used in its managed security services,primarily related to a portion of the compensation for the personnel who perform the installation activities. These deferred costs are amortized on a systematicbasis that is consistent with the transfer to the customer of the goods or services to which the assets relate.Changes in the balance of total deferred commission and total deferred fulfillment costs during the fiscal year ended February 1, 2019 are as follows (inthousands): As of February 2, 2018 Amount capitalized Amount recognized As of February 1, 2019Deferred commissions $57,229 $19,915 $(14,249) $62,895Deferred fulfillment costs 10,163 5,920 (5,110) 10,973The Company did not record any impairment losses on the deferred commissions or deferred fulfillment costs during the fiscal year ended February 1, 2019.80SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)NOTE 5 — GOODWILL AND INTANGIBLE ASSETSGoodwill relates to the acquisition of Dell by Dell Technologies and represents the excess of the purchase price attributable to Secureworks over the fairvalue of the assets acquired and liabilities assumed. There were no additions, adjustments or impairments to goodwill during the periods presented.Accordingly, goodwill totaled $416.5 million as of February 1, 2019 and February 2, 2018.Goodwill and indefinite-lived intangible assets are tested for impairment on an annual basis during the third fiscal quarter, or earlier if an indicator ofimpairment occurs. The Company completed the most recent annual impairment test by performing a quantitative assessment of goodwill at the reportingunit level. In performing this quantitative assessment, the Company, using a combination of discounted cash flows and market approach (comparable marketprices) to determine fair value of the reporting unit, compared the fair value to its carrying value. The assumptions used in the valuation are consistent withthose which the Company believes hypothetical market participants would use. After performing the assessment, the Company determined that it was notmore likely than not that the fair value of the Secureworks reporting unit was less than its carrying amount, which would not indicate a potential impairment.Additionally, through a quantitative assessment using a discounted cash flow model, the Company determined that the fair value of the other indefinite-livedintangible asset exceeded its carrying value. Further, no triggering events have subsequently occurred that would indicate a potential impairment as ofFebruary 1, 2019.Intangible AssetsThe Company's intangible assets at February 1, 2019 and February 2, 2018 were as follows: February 1, 2019 February 2, 2018 Gross AccumulatedAmortization Net Gross AccumulatedAmortization Net (in thousands)Customer relationships $189,518 $(77,152) $112,366 $189,518 $(63,058) $126,460Technology 135,584 (71,620) 63,964 135,584 (57,978) 77,606Finite-lived intangible assets 325,102 (148,772) 176,330 325,102 (121,036) 204,066Trade name 30,118 — 30,118 30,118 — 30,118Total intangible assets $355,220 $(148,772) $206,448 $355,220 $(121,036) $234,184Amortization expense related to finite-lived intangible assets was approximately $27.7 million in each of the fiscal years ended February 1, 2019, February 2,2018, and February 3, 2017, respectively. Amortization expense is included within cost of revenue and general and administrative expenses in theConsolidated Statement of Operations. There were no impairment charges related to intangible assets during the fiscal years ended February 1, 2019,February 2, 2018 and February 3, 2017.Estimated future pre-tax amortization expense of finite-lived intangible assets as of February 1, 2019 over the next five years and thereafter is as follows:Fiscal Years(in thousands)2020$27,736202127,736202227,736202327,736202423,491Thereafter41,895 Total$176,33081SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)NOTE 6 — DEBTConvertible DebtOn June 30, 2015, the Company entered into an agreement with investors to sell up to $25.0 million in aggregate principal amount of its convertible notes.These investors included members of the Company’s board of directors who were director nominees prior to the date of the IPO. The initial sale of convertiblenotes was completed on August 3, 2015 in the aggregate principal amount of $22.0 million. On September 14, 2015, the Company sold an additionalconvertible note in the principal amount of $0.5 million, resulting in an aggregate principal amount of convertible notes outstanding of $22.5 million. As ofJanuary 29, 2016, the fair value of the convertible notes was $28.0 million and the Company recorded a $5.5 million change in fair value during the fiscalyear ended January 29, 2016. The convertible notes were valued using Level 3 inputs. This change in fair value was included in interest and other, net in theStatements of Operations. These notes remained outstanding until the completion of the IPO, on which date, according to their terms, the convertible notesautomatically converted into 2,008,924 shares of the Class A common stock, with a total settlement of $28.1 million and a $0.1 million change in fair valuebeing recorded in the fiscal year ended February 3, 2017 for the period prior to settlement. The converted shares equaled the $22.5 million face value of theconvertible notes divided by the conversion price of $11.20 per share, which was equal to 80% of the IPO price of $14.00 per share.Revolving Credit FacilityOn November 2, 2015, SecureWorks, Inc., a wholly-owned subsidiary of SecureWorks Corp., entered into a revolving credit agreement with a wholly-ownedsubsidiary of Dell Inc. under which the Company obtained a $30 million senior, unsecured revolving credit facility. This facility was initially available for aone-year term beginning on April 21, 2016 and was extended on the same terms for an additional one-year term ending on April 21, 2018. During fiscal 2019,the facility was amended and restated to extend the maturity date to March 27, 2019 and to reduce the annual rate at which interest accrues to the applicableLondon Interbank Offered Rate plus 1.15%.Under the facility, up to $30 million principal amount of borrowings may be outstanding at any time. Amounts under the facility may be borrowed, repaid,and reborrowed from time to time during the term of the facility. The proceeds from loans made under the facility may be used for general corporate purposes.The credit agreement contains customary representations, warranties, covenants and events of default. The unused portion of the facility is subject to acommitment fee of 0.35%, which is due upon expiration of the facility.The maximum amount of borrowings may be increased by up to an additional $30 million by mutual agreement of the lender and borrower. The borrower willbe required to repay, in full, all of the loans outstanding, including all accrued interest, and the facility will terminate upon a change of control ofSecureWorks Corp. or following a transaction in which SecureWorks, Inc. ceases to be a direct or indirect wholly-owned subsidiary of SecureWorks Corp. Thefacility is not guaranteed by SecureWorks Corp. or its subsidiaries. There was no outstanding balance under the credit facility as of February 1, 2019 orFebruary 2, 2018.NOTE 7 — COMMITMENTS AND CONTINGENCIESPurchase Obligations and Lease Commitments—The Company had various purchase obligations at February 1, 2019 over a period of approximately fouryears with vendors or contractors, subject to the Company’s operational needs. The Company also leases land, office buildings and equipment under variousoperating lease agreements. As of February 1, 2019, the purchase obligations and future minimum payments under the Company's operating leases (inthousands) are as follows: Payments Due For Operating Purchase Credit Facilities Fiscal Years Ending Leases Obligations and Other (1) Total2020 $5,237 $7,277 $— $12,5142021 4,446 2,884 500 7,8302022 6,190 677 500 7,3672023 5,440 — — 5,4402024 4,936 — — 4,9362025 and beyond 11,825 — — 11,825Total $38,074 $10,838 $1,000 $49,912(1) Reflects purchase obligations of annual maintenance services for hardware systems for internal use from a related party. See also “Note 12—Related Party Transactions.”82SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Rent expense under all leases totaled $5.5 million, $4.7 million, and $3.9 million during the fiscal years ended February 1, 2019, February 2, 2018, andFebruary 3, 2017, respectively.Legal Contingencies — From time to time, the Company is involved in claims and legal proceedings that arise in the ordinary course of business. TheCompany accrues a liability when it believes that it is both probable that a liability has been incurred and that it can reasonably estimate the amount of theloss. The Company reviews the status of legal cases at least quarterly and adjusts its liabilities as necessary to reflect ongoing negotiations, settlements,rulings, advice of legal counsel and other relevant information. Whether the outcome of any claim, suit, assessment, investigation or legal proceeding,individually or collectively, could have a material adverse effect on the Company’s business, financial condition, results of operations or cash flows willdepend on a number of factors, including the nature, timing and amount of any associated expenses, amounts paid in settlement, damages or other remediesor consequences. To the extent new information is obtained and the Company’s views on the probable outcomes of claims, suits, assessments, investigationsor legal proceedings change, changes in accrued liabilities would be recorded in the period in which such a determination is made. As of February 1, 2019,the Company does not believe that there were any such matters that, individually or in the aggregate, would have a material adverse effect on its business,financial condition, results of operations or cash flows.Customer-based Taxation Contingencies—Various government entities (“taxing authorities”) require the Company to bill its customers for the taxes theyowe based on the services they purchase from the Company. The application of the rules of each taxing authority concerning which services are subject toeach tax and how those services should be taxed involves the application of judgment. Taxing authorities periodically perform audits to verify complianceand include all periods that remain open under applicable statutes, which generally range from three to four years. These audits could result in significantassessments of past taxes, fines and interest if the Company were found to be non-compliant. During the course of an audit, a taxing authority may questionthe Company's application of its rules in a manner that, if the Company were not successful in substantiating its position, could result in a significantfinancial impact to the Company. In the course of preparing its financial statements and disclosures, the Company considers whether information exists thatwould warrant disclosure or an accrual with respect to such a contingency.Indemnifications — In the ordinary course of business, the Company enters into contractual arrangements under which it agrees to indemnify its customersfrom certain losses incurred by the customer as to third-party claims relating to the services performed on behalf of the Company or for certain losses incurredby the customer as to third-party claims arising from certain events as defined within the particular contract. Such indemnification obligations may not besubject to maximum loss clauses. Historically, payments related to these indemnifications have been immaterial. Concentrations — The Company sells solutions to customers of all sizes primarily through its direct sales organization, supplemented by sales throughchannel partners. During the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017, the Company did not have any single customerthat represented 10% or more of its revenue during the fiscal period.NOTE 8 — STOCKHOLDERS' EQUITY On September 26, 2018, the Company's board of directors authorized a stock repurchase program, under which the Company is authorized to repurchase up to$15 million of the Company's Class A common stock through September 30, 2019. Repurchases may be made from time to time through open marketpurchases, in privately negotiated transactions, or in other types of transactions. The timing and amount of any repurchases under the program will bedetermined by management based upon market conditions and other factors. During the fiscal year ended February 1, 2019, the Company repurchased819,063 shares of Class A common stock at an average price of $16.52, for an aggregate cost of $13.5 million. As of February 1, 2019, $1.5 million remainedavailable for further purchases under the stock repurchase program.NOTE 9 — STOCK-BASED COMPENSATION AND EMPLOYEE BENEFIT PLANIn connection with the IPO, the Company's board of directors adopted the SecureWorks Corp. 2016 Long-Term Incentive Plan (the “2016 Plan”). The 2016Plan became effective on April 18, 2016, and will expire on the tenth anniversary of the effective date unless the 2016 Plan is terminated earlier by the boardof directors or in connection with a change in control of SecureWorks Corp. The Company has reserved 12,500,000 shares of Class A common stock forissuance pursuant to awards under the 2016 Plan. The 2016 Plan provides for the grant of options, stock appreciation rights, restricted stock, restricted stockunits, deferred stock units, unrestricted stock, dividend equivalent rights, other equity-based awards and cash bonus awards. Awards may be granted under the2016 Plan to individuals who are employees, officers or non-employee directors of the Company or any of its83SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)affiliates, consultants and advisors who perform services for the Company or any of its affiliates, and any other individual whose participation in the 2016Plan is determined to be in the best interests of the Company by the compensation committee of the board of directors. The Company utilizes both authorizedand unissued shares to satisfy all shares issued under the 2016 Plan. During fiscal 2019, the 2016 Plan was amended to increase the total shares of Class Acommon stock available for issuance by an additional 4,000,000 shares, which are now available for grants under the 2016 Plan.Stock OptionsUnder the 2016 Plan, the exercise price of each option will be determined by the compensation committee, except that the exercise price may not be less than100% (or, for incentive stock options to any 10% stockholder, 110%) of the fair market value of a share of Class A common stock on the date on which theoption is granted. The term of an option may not exceed ten years (or, for incentive stock options to any 10% stockholder, five years) from the date of grant.The compensation committee will determine the time or times at which each option may be exercised and the period of time, if any, after retirement, death,disability or termination of employment during which options may be exercised. Options may be made exercisable in installments, and the exercisability ofoptions may be accelerated by the compensation committee.During the fiscal years ended February 1, 2019 and February 2, 2018, no stock options were granted to employees or directors. However, the Companyrecognized $3.7 million, $3.7 million and $2.9 million in compensation expense for the fiscal years ended February 1, 2019, February 2, 2018 andFebruary 3, 2017, respectively, for previously granted options.The fair value of stock options are estimated as of the date of the grant using the Black-Scholes option pricing model. This model requires the input ofsubjective assumptions that will usually have a significant impact on the fair value estimate. The expected term was estimated using the SEC simplifiedmethod. The risk-free interest rate is the continuously compounded, term-matching, zero-coupon rate from the valuation date. The volatility is the leverage-adjusted, term-matching, historical volatility of peer firms. The dividend yield assumption is consistent with management expectations of dividenddistributions based upon the Company’s business plan at the date of grant.The following table summarizes stock option activity and options outstanding and exercisable for the fiscal years ended, and as of, February 1, 2019,February 2, 2018 and February 3, 2017. NumberofOptions Weighted-AverageExercise PricePer Share Weighted-AverageContractual Life(years) Weighted-Average Grantdate Fair ValuePer Share AggregateIntrinsic Value1 (in thousands)Balance, January 29, 2016— $— Granted2,960,419 14.00 Exercised— — Canceled, expired or forfeited(382,252) 14.00 Balance, February 3, 20172,578,167 $14.00 Granted— — Exercised— — Canceled, expired or forfeited(53,065) 14.00 Balance, February 2, 20182,525,102 $14.00 Granted— — Exercised(9,826) 14.00 Canceled, expired or forfeited(27,514) 14.00 Balance, February 1, 20192,487,762 $14.00 7.23 $6.11 $22,664 Options expected to vest, February 1, 20191,262,669 $14.00 7.23 $6.09 $11,503 Options exercisable, February 1, 20191,195,367 $14.00 7.23 $6.12 $10,890(1) The aggregate intrinsic values represent the total pre-tax intrinsic values based on the Company's closing share price of $23.11 as reported on the NASDAQ Global SelectMarket on February 1, 2019, that would have been received by the option holders had all in-the-money options been exercised as of that date.84SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)The total fair value of options vested was $3.7 million and $3.8 million for the fiscal years ended February 1, 2019 and February 2, 2018, respectively. AtFebruary 1, 2019, unrecognized stock-based compensation expense related to stock options was $4.9 million, net of estimated forfeitures, which is expectedto be recognized over the weighted-average remaining requisite period of 1.67 years.In connection with the acquisition of Dell by Dell Technologies in 2013, the Company’s compensation programs included grants under the Denali HoldingInc. 2013 Stock Incentive Plan (the "2013 Plan"). Under the 2013 Plan, time-based and performance-based options to purchase shares of the Series C commonstock of Dell Technologies were awarded to two of the Company's executive officers. Upon the closing of the Company’s IPO, all unvested time-based awardswere forfeited and 32,000 vested time-based stock options remained outstanding and 400,001 performance-based options remained unvested andoutstanding subject to award terms. During the fiscal year ended February 1, 2019, the 400,001 performance-based options vested with a total fair value of$2.4 million. As of February 1, 2019, 32,000 time-based and 400,001 performance-based stock options remained outstanding. The Company recognizedcompensation expense related to these awards of $0.5 million, $0.3 million and $0.5 million for the fiscal years ended February 1, 2019, February 2, 2018,and February 3, 2017, respectively.Restricted Stock and Restricted Stock UnitsUnder the 2016 Plan, a restricted stock award ("RSA") is an award of shares of Class A common stock that may be subject to restrictions on transferability andother restrictions as the compensation committee determines in its sole discretion on the date of grant. The restrictions, if any, may lapse over a specifiedperiod of time or through the satisfaction of conditions, in installments or otherwise as the compensation committee may determine. Unless otherwiseprovided in an award agreement, a grantee who receives restricted stock will have all of the rights of a stockholder as to those shares, including, withoutlimitation, the right to vote and the right to receive dividends or distributions on the shares of Class A common stock, except that the compensationcommittee may require any dividends to be withheld and accumulated contingent on vesting of the underlying shares or reinvested in shares of restrictedstock.Under the 2016 Plan, a restricted stock unit ("RSU") represents the grantee’s right to receive a compensation amount, based on the value of the shares of ClassA common stock, if vesting criteria or other terms and conditions established by the compensation committee are met. If the vesting criteria or other terms andconditions are met, the Company may settle, subject to the terms and conditions of the applicable award agreement, restricted stock units in cash, shares ofClass A common stock or a combination of the two. All award agreements currently outstanding require settlement in shares of Class A common stock.In connection with the IPO, the Company granted shares of RSAs and RSUs to employees and directors. The fair value of the RSAs and RSUs was $14.00 pershare and all will vest over an average service period of four years. During the fiscal years ended February 1, 2019 and February 2, 2018, the Company issuedadditional restricted stock units to employees at weighted-average fair values per share of $9.78 and $10.40, respectively. The Company's annual grant ofrestricted stock and restricted stock units issued during the fiscal years ended February 1, 2019 and February 2, 2018 vests ratably over three years andapproximately 50% of such awards are subject to performance conditions. Of the 3.3 million restricted stock and restricted stock units outstanding onFebruary 1, 2019, approximately 0.9 million were performance-based awards and 2.4 million were service-based awards. For the fiscal year ended February 1,2019, approximately 193,000 shares were canceled for the performance-based awards that were tied to fiscal year 2019 results. The Company recognized compensation expense related to RSAs and RSUs of $15.2 million, $9.8 million and $5.4 million for the fiscal years endedFebruary 1, 2019, February 2, 2018 and February 3, 2017, respectively. At February 1, 2019, unrecognized stock-based compensation expense related torestricted stock awards and restricted stock units was $20.5 million, which is expected to be recognized over the weighted-average remaining requisite periodof 1.93 years.85SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)The following table summarizes activity for restricted stock and restricted stock units for the fiscal years ended, and as of, February 1, 2019, February 2, 2018and February 3, 2017. NumberofShares Weighted-AverageGrant DateFair Value PerShare Weighted-AverageContractualLife (years) Aggregate IntrinsicValue1 (in thousands)Balance, January 29, 2016— $— Granted2,460,594 13.28 Vested(2,143) 14.00 Forfeited(215,965) 14.00 Balance, February 3, 20172,242,486 $13.21 Granted1,134,966 10.40 Vested(507,196) 13.62 Forfeited(550,697) 11.46 Balance, February 2, 20182,319,559 $12.16 Granted2,274,508 9.78 Vested(793,723) 11.99 Forfeited(453,866) 10.69 Balance, February 1, 20193,346,478 $10.84 1.12 $77,337 Restricted stock and restricted stock units expected to vest, February 1,20193,026,353 $10.92 1.23 $69,939(1) The aggregate intrinsic values represent the total pre-tax intrinsic values based on the Company's closing share price of $23.11 as reported on the NASDAQ Global SelectMarket on February 1, 2019, that would have been received by the restricted stock and restricted stock unit holders had all restricted stock and restricted stock units been issuedas of that date.As of February 1, 2019, restricted stock and restricted stock units representing 3.3 million shares of Class A common stock were outstanding, with anaggregate intrinsic value of $77.3 million based on the Company’s closing stock price as reported on the NASDAQ Global Select Market on February 1,2019. The total fair value of Secureworks' restricted stock and restricted stock units that vested during the fiscal years ended February 1, 2019 and February 2,2018 was $9.4 million and $6.9 million, respectively, and the pre-tax intrinsic value was $8.5 million and $4.6 million, respectively.Stock-based Compensation ExpenseThe following table summarizes the classification of stock-based compensation expense related to stock options, restricted stock and restricted stock units forthe fiscal years ended February 1, 2019, February 2, 2018 and February 3, 2017. Stock-based compensation expense for the periods prior to the fiscal yearended February 3, 2017 related solely to grants under the Denali Holding Inc. 2013 Stock Incentive Plan awarded to two of the Company’s executive officers. Fiscal Year Ended February 1, 2019 February 2, 2018 February 3, 2017 (in thousands)Cost of revenue $780 $891 $462Research and development 4,133 3,261 2,033Sales and marketing 2,652 735 1,068General and administrative 11,805 8,903 5,320Total stock-based compensation expense $19,370 $13,790 $8,88386SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)The tax benefit related to stock-based compensation expense was $4.7 million, $3.3 million, and $3.4 million for the fiscal years ended February 1, 2019,February 2, 2018, and February 3, 2017 respectively.Long-term Performance Cash AwardsIn March 2017, the Company began granting long-term performance cash awards to certain employees. The employees who receive the performance cashawards do not receive equity awards as part of the long-term incentive program. The long-term performance cash awards are subject to various performanceconditions and vest in equal annual installments over a three-year period. For the fiscal years ended February 1, 2019 and February 2, 2018, the Companygranted approximately $15.7 million and $11.6 million of these awards, respectively, and recognized $6.6 million and $2.9 million of related compensationexpense, respectively.Employee Benefit PlanSubstantially all employees are eligible to participate in a defined contribution plan that complies with Section 401(k) of the Internal Revenue Code(“401(k) Plan”). The Company matches 100% of each participant’s voluntary contributions, subject to a maximum contribution of 6% of the participant’scompensation, and participants vest immediately in all contributions to the 401(k) Plan. For the fiscal years ended February 1, 2019, February 2, 2018, andFebruary 3, 2017, total expense under this plan was $10.2 million, $10.7 million, and $9.4 million, respectively.NOTE 10 — INCOME AND OTHER TAXESThe Company’s effective income tax rate for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017 was as follows: Fiscal Year Ended February 1, 2019 February 2, 2018* February 3, 2017* Loss before income taxes $(45,954) $(72,716) $(53,389)Income tax benefit $(6,853) $(62,299) $(21,748)Effective tax rate 14.9% 85.7% 40.7%* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.During the periods presented in the accompanying Consolidated Financial Statements, Secureworks did not file separate federal tax returns, as the Companygenerally was included in the tax grouping of other Dell entities within the respective entity’s tax jurisdiction. The income tax benefit has been calculatedusing the separate return method modified to apply the benefits-for-loss approach. Under the benefits-for-loss approach, net operating losses or other taxattributes are characterized as realized by Secureworks when those attributes are utilized by other members of the Dell consolidated group.The change in the Company's effective income tax rate for the fiscal years ended February 1, 2019, February 2, 2018 and February 3, 2017 was primarilydriven by the decrease in the U.S. corporate income tax rate from 35% to 21% and the impact of the minimum tax on foreign earnings from the enactment ofthe U.S. Tax Cuts and Jobs Act (“U.S. Tax Reform” or the “Act”) that was enacted in December 2017.U.S. Tax Reform was enacted in December 2017. GAAP requires the effect of a change in tax laws to be recognized in the period that includes the enactmentdate. Among other changes, U.S. Tax Reform decreases the U.S. corporate income tax, established a modified territorial system by requiring a mandatorydeemed repatriation tax on undistributed earnings of foreign subsidiaries (the “Transition Tax”) and requires a minimum tax on certain future earningsgenerated by foreign subsidiaries. Due to the complexities involved in accounting for the enactment of U.S. Tax Reform, SEC Staff Accounting Bulletin No.118 (“SAB 118”) allows companies to record provisional amounts in earnings for the first year following the Act's enactment, with those provisional amountsrequired to be finalized by the end of that year.87SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)In accordance with GAAP and SAB 118, the Company recognized a provisional tax benefit in the fourth quarter of the fiscal year ended February 2, 2018 of$27.0 million related to U.S. Tax Reform, primarily attributable to the remeasurement of deferred tax assets and liabilities at the lower statutory rate. This taxbenefit was net of an expense estimate of approximately $0.6 million for the impact of the Transition Tax. The Company completed its accounting for theincome tax effects of U.S. Tax Reform during the fourth quarter of the fiscal year ended February 1, 2019, and recorded an adjustment to the provisionalbenefit recognized in fiscal 2018 of approximately $0.4 million due to a change in the remeasurement of a deferred tax liability, and $3.3 million due to theCompany’s finalization of the Transition Tax charge. Throughout the fiscal year ended February 1, 2019, the U.S. Department of the Treasury and InternalRevenue Service issued preliminary and final regulatory guidance clarifying certain provisions of U.S. Tax Reform, and the Company anticipates additionalregulatory guidance and technical clarifications to be issued. When additional guidance and technical clarifications are issued, the Company will recognizethe related tax impact in the quarter in which such guidance is issued. The GILTI provisions of the Act signed into law on December 22, 2017 require theCompany to include in its U.S. income tax return foreign subsidiary earnings in excess of an allowable return on the foreign subsidiary’s tangible assets. TheCompany has elected to account for GILTI as a current period cost included in the year incurred. A reconciliation of the Company's income tax provision to the statutory U.S. federal tax rate is as follows: Fiscal Year Ended February 1, 2019 February 2, 2018* February 3, 2017* U.S. federal statutory rate21.0 % 33.7 % 35.0 %Impact of foreign operations0.2 0.5 (0.4)State income taxes, net of federal tax benefit3.2 2.6 3.8Research and development credits4.4 2.1 3.7Nondeductible/nontaxable items(4.0) (2.1) (1.4)U.S. Tax Reform(9.4) 49.5 —Stock-based compensation(0.5) (0.6) —Total14.9 % 85.7 % 40.7 %* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.The benefit for income taxes consists of the following: Fiscal Year Ended February 1, 2019 February 2, 2018* February 3, 2017* (in thousands)Current: Federal$(527) $(20,288) $(22,470)State/Local(421) (886) 657Foreign1,274 80 1,379Current326 (21,094) (20,434)Deferred: Federal(5,930) (41,825) (596)State/Local(1,132) (444) (194)Foreign(117) 1,064 (524)Deferred(7,179) (41,205) (1,314)Income tax benefit$(6,853) $(62,299) $(21,748)* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.88SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)Loss before provision for income taxes consists of the following: Fiscal Year Ended February 1, 2019 February 2, 2018* February 3, 2017* (in thousands)Domestic$(47,523) $(77,390) $(55,667)Foreign1,569 4,674 2,278Loss before income taxes$(45,954) $(72,716) $(53,389)* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.The components of the Company's net deferred tax balances are as follows: February 1, 2019 February 2, 2018* (in thousands)Deferred tax assets: Deferred revenue$2,163 $3,441Provision for doubtful accounts1,245 1,883Loss carryforwards7,531 3,966Stock-based and deferred compensation8,468 5,701Other2,948 2,803Deferred tax assets22,355 17,794Valuation allowance(4,742) (3,966)Deferred tax assets, net of valuation allowance17,613 13,828Deferred tax liabilities: Property and equipment(1,842) (1,347)Purchased intangible assets(50,509) (56,590)Operating and compensation related accruals(18,614) (19,528)Other(347) (14)Deferred tax liabilities(71,312) (77,479)Net deferred tax liabilities$(53,699) $(63,651)* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.Net deferred tax balances are included in other non-current assets and other non-current liabilities in the Consolidated Statements of Financial Position.As of February 1, 2019 and February 2, 2018, Secureworks had $4.7 million and $4.0 million of deferred tax assets, respectively, related to net operating losscarryforwards for state tax returns that are not included with those of other Dell entities. These net operating loss carryforwards began expiring in the fiscalyear ended February 1, 2019. Due to the uncertainty surrounding the realization of these net operating loss carryforwards, the Company has providedvaluation allowances for the full amount as of February 1, 2019 and February 2, 2018. Because the Company is included in the tax filings of certain otherDell entities, management has determined that it will be able to realize the remainder of its deferred tax assets. If the Company’s tax provision had beenprepared using the separate return method, the unaudited pro forma pre-tax loss, tax benefit and net loss for the fiscal year ended February 1, 2019 wouldhave been $46.0 million, $5.0 million and $40.9 million, respectively, as a result of the recognition of a valuation allowance that would be recorded oncertain deferred tax assets.89SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)As of February 1, 2019, the Company has cumulative undistributed foreign earnings that would incur some amount of local withholding and state taxes if theearnings are distributed to SecureWorks Corp., which is domiciled in the United States. U.S. Tax Reform fundamentally changes the U.S. approach to taxationof foreign earnings. The Company has analyzed its global working capital and cash requirements and the potential tax liabilities attributable to repatriation,and has determined that it may be repatriating certain unremitted foreign earnings that were previously deemed indefinitely reinvested. As of February 1,2019, the Company has recorded withholding taxes of $0.3 million related to certain unremitted foreign earnings that may be repatriated.A reconciliation of the Company's beginning and ending amount of unrecognized tax benefits is as follows: Fiscal Year Ended February 1, 2019 February 2, 2018 February 3, 2017 (in thousands)Beginning unrecognized tax benefits$763 $579 $193Increases related to tax positions of the current year1,204 285 386Increases related to tax position of prior years5,589 — —Reductions for tax positions of prior years(271) (101) —Ending unrecognized tax benefits$7,285 $763 $579The Company's net unrecognized tax benefits of $7.5 million, $0.8 million and $0.6 million include amounts reflected in the table above, plus accruedinterest and penalties of $0.3 million, $0.0 million, and $0.0 million as of February 1, 2019, February 2, 2018, and February 3, 2017, respectively, and areincluded in other non-current liabilities in the Consolidated Statements of Financial Position. The net unrecognized tax benefits, if recognized, wouldincrease the Company's income tax benefit and effective income tax benefit rate. Interest and penalties related to income tax liabilities are included inincome tax expense. The Company recorded interest and penalties of $0.2 million, $0.0 million, and $0.0 million for the fiscal years ended February 1, 2019,February 2, 2018, and February 3, 2017, respectively.Judgment is required in evaluating the Company's uncertain tax positions and determining the Company's provision for income taxes. The Company doesnot anticipate a significant change to the total amount of unrecognized tax benefits within the next twelve months.The Company is also currently under income tax audit in foreign jurisdictions. The Company is undergoing negotiations, and in some cases contestedproceedings, relating to tax matters with the taxing authorities in these jurisdictions. The Company believes that it has provided adequate reserves related toall matters contained in tax periods open to examination. Although the Company believes it has made adequate provisions for the uncertainties surroundingthese audits, should the Company experience unfavorable outcomes, such outcomes could have a material impact on its results of operations, financialposition, and cash flows.The Company takes certain non-income tax positions in the jurisdictions in which it operates and has received certain non-income tax assessments fromvarious jurisdictions. The Company believes that a material loss in these matters is not probable and that it is not reasonably possible that a material lossexceeding amounts already accrued has been incurred. The Company believes its positions in these non-income tax litigation matters are supportable andthat it ultimately will prevail. In the normal course of business, the Company's positions and conclusions related to its non-income taxes could be challengedand assessments may be made. To the extent new information is obtained and the Company's views on its positions, probable outcomes of assessments, orlitigation change, changes in estimates to the Company's accrued liabilities would be recorded in the period in which such a determination is made. In theresolution process for income tax and non-income tax audits, the Company may be required to provide collateral guarantees or indemnification to regulatorsand tax authorities until the matter is resolved.The Company is no longer subject to tax examinations for years prior to fiscal 2012.90SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)NOTE 11 — SELECTED FINANCIAL INFORMATIONThe following table provides information on amounts included in accounts receivable, net, other current assets, property and equipment, net, accrued andother current liabilities, and other non-current liabilities as of February 1, 2019 and February 2, 2018. Consolidated February 1, 2019 February 2, 2018* (in thousands)Accounts receivable, net: Gross accounts receivable $147,504 $166,010 Allowance for doubtful accounts (6,160) (8,246) Total $141,344 $157,764Other current assets: Income tax receivable 6,853 21,380 Prepaid maintenance and support agreements 10,602 11,826 Prepaid other 10,149 7,345 Total $27,604 $40,551Property and equipment, net Computer equipment $67,468 $59,754 Leasehold improvements 26,151 19,634 Other equipment 2,978 2,079 Total property and equipment 96,597 81,467 Accumulated depreciation and amortization $(60,619) $(48,010) Total $35,978 $33,457Other noncurrent assets Prepaid maintenance agreements 1,351 956 Deferred tax asset 648 832 Deferred commission and fulfillment costs 73,868 67,392 Other 2,371 2,889 Total $78,238 $72,069Accrued and other current liabilities Compensation $48,242 $46,046 Intercompany payable, net 15,634 19,580 Other 22,619 15,999 Total $86,495 $81,625Other non-current liabilities Deferred tax liabilities $54,347 $64,483 Other 12,504 3,972 Total $66,851 $68,455* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.The allocation between domestic and foreign net revenue is based on the location of the Company’s customers. Net revenue from any single foreign countrydid not constitute 10% or more of the Company’s net revenue during any of the periods presented. As of February 1, 2019, net property and equipment inRomania represented 13% of the Company's consolidated net property and equipment. As of February 2, 2018, there were no net property and equipmentassets in any single foreign country that represented 10% or more of the Company's consolidated net property and equipment.91SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)The following tables present net revenue and property, plant and equipment allocated between the United States and international locations. The Companydefines international revenue as revenue contracted through non-U.S. entities. Fiscal Year Ended February 1, 2019 February 2, 2018* February 3, 2017*Net revenue United States $403,614 $391,159 $375,982 International 115,095 76,771 56,769 Total $518,709 $467,930 $432,751* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606. February 1, 2019 February 2, 2018Property and equipment, net United States $29,684 $28,587 International 6,294 4,870 Total $35,978 $33,457NOTE 12 — RELATED PARTY TRANSACTIONSAllocated ExpensesFor the periods presented, Dell has provided various corporate services to Secureworks in the ordinary course of business. The costs of services provided toSecureworks by Dell are governed by a shared services agreement between Secureworks and Dell Inc. or its wholly-owned subsidiaries. The total amount ofthe charges under the shared services agreement with Dell was $3.7 million, $4.9 million, and $4.4 million for the fiscal years ended February 1, 2019,February 2, 2018 and February 3, 2017, respectively. Management believes that the basis on which the expenses have been allocated to be a reasonablereflection of the utilization of services provided to or the benefit received by the Company during the periods presented.Related Party ArrangementsFor the periods presented, related party transactions and activities involving Dell Inc. and its wholly-owned subsidiaries were not always consummated onterms equivalent to those that would prevail in an arm’s-length transaction where conditions of competitive, free-market dealing may exist.The Company purchases certain enterprise hardware systems from Dell Inc. and its wholly-owned subsidiaries in order to provide security solutions to theCompany’s customers. The expenses associated with these transactions are intended to approximate arm’s-length pricing pursuant to the Company’samended and restated master commercial customer agreement with a subsidiary of Dell Inc. that went into effect on August 1, 2015. The Company did notmake any direct purchases of systems from Dell for the fiscal years ended February 1, 2019 and February 2, 2018. Purchases of systems from Dell totaled $3.0million for the fiscal year ended February 3, 2017. The Company purchases computer equipment for internal use from Dell that is capitalized within property and equipment in the Consolidated Statements ofFinancial Position. These purchases were made at pricing that is intended to approximate arm's-length pricing. Purchases of computer equipment from Delland EMC Corporation, a wholly-owned subsidiary of Dell ("EMC"), totaled $2.7 million, $2.6 million, and $3.6 million for the fiscal years ended February 1,2019, February 2, 2018, and February 3, 2017, respectively.92SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)EMC, a company that provides enterprise software and storage, maintains a majority ownership interest in a subsidiary, VMware, Inc. (“VMware”), whichprovides cloud and virtualization software and services. The Company's purchases of annual maintenance services, software licenses and hardware systemsfor internal use from Dell, EMC and VMware totaled $1.2 million, $1.3 million, and $4.4 million for the fiscal years ended February 1, 2019, February 2,2018, and February 3, 2017, respectively.The Company recognized revenue related to security solutions provided to other subsidiaries of Dell Technologies, consisting of RSA Security LLC andPivotal Software, Inc. The revenue recognized by the Company for security solutions provided to these entities totaled $0.3 million and $0.2 million for thefiscal years ended February 1, 2019 and February 2, 2018, respectively. The Company had no related party revenue from solutions provided to these entitiesfor the fiscal year ended February 3, 2017. Purchases by the Company from these other subsidiaries totaled $0.7 million and $0.1 million during the fiscalyear ended February 1, 2019 and February 2, 2018, respectively. The Company had no purchases from these related parties during the fiscal year endedFebruary 3, 2017.The Company recognized revenue related to solutions provided to significant beneficial owners of Secureworks common stock, which include Michael S.Dell, Chairman and Chief Executive Officer of Dell Technologies and Dell Inc. and Silver Lake Partners III, L.P. The revenue recognized by the Companyfrom solutions provided to Mr. Dell, MSD Capital, L.P. (a firm founded for the purposes of managing investments of Mr. Dell and his family), DFI ResourcesLLC, the Michael and Susan Dell Foundation, and Silver Lake Partners III, L.P. totaled $0.5 million, $0.4 million, and $0.4 million for the fiscal years endedFebruary 1, 2019, February 2, 2018, and February 3, 2017, respectively.The Company provides solutions to certain customers whose legal contractual relationship has historically been with Dell rather than Secureworks, althoughthe Company is generally acting as a principal in these arrangements. Effective on August 1, 2015, upon the creation of new subsidiaries to segregate some ofthe Company’s operations from Dell’s operations, as described in “Note 1—Description of the Business and Basis of Presentation,” many of such customercontracts were transferred from Dell to the Company, forming a direct legal contractual relationship between the Company and the end customer. Forcustomers whose contracts have not yet been transferred, the Company recognized revenue of approximately $59.0 million, $44.7 million, and $39.0 millionfor the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017, respectively.As the Company’s customer and on behalf of certain of its own customers, Dell also purchases solutions from the Company. Beginning in the third quarter ofthe fiscal year ended January 29, 2016, in connection with the effective date of the Company’s commercial agreements with Dell, the Company begancharging Dell for these services at pricing that is intended to approximate arm’s-length pricing, in lieu of the prior cost recovery arrangement. Such revenuestotaled approximately $16.6 million, $21.1 million, and $22.0 million for the fiscal years ended February 1, 2019, February 2, 2018, and February 3, 2017,respectively. As a result of the foregoing related party arrangements beginning in the third quarter of the fiscal year ended January 29, 2016, the Company has recorded thefollowing related party balances in the Consolidated Statement of Financial Position as of February 1, 2019 and February 2, 2018: February 1, 2019 February 2, 2018 (in thousands)Intercompany payable (in accrued and other) $15,634 $19,580 Accounts receivable from customers under reseller agreements with Dell (in accounts receivable, net) $21,760 $25,229 Net operating loss tax sharing receivable under agreement with Dell (in other current assets) $6,853 $21,38093SECUREWORKS CORP.Notes to Consolidated Financial Statements (Continued)NOTE 13 — UNAUDITED QUARTERLY RESULTS OF OPERATIONSThe following table presents selected unaudited Statements of Operations for each quarter of fiscal 2019 and fiscal 2018: Fiscal Year 2019 First Second Third Fourth Quarter Quarter Quarter Quarter Net revenue $126,161 $128,778 $133,060 $130,710Gross margin $65,631 $66,230 $70,927 $69,804Net loss $(13,819) $(9,769) $(3,735) $(11,778)Net loss per common share (basic and diluted) (1) $(0.17) $(0.12) $(0.05) $(0.15)Weighted-average common shares outstanding (basic and diluted) 80,522 80,839 80,892 80,587(1) Basic and diluted net loss per common share are computed independently for each of the quarters presented. Therefore, the sum of the quarterly basic and diluted net loss percommon share amounts may not equal the annual basic and diluted net loss per common share amounts. Fiscal Year 2018* First Second Third Fourth Quarter Quarter Quarter Quarter Net revenue $113,678 $116,240 $117,101 $120,911Gross margin $60,065 $60,333 $61,790 $60,658Net (loss) income $(13,277) $(10,271) $(9,386) $22,517Net (loss) income per common share (basic and diluted) (1) $(0.17) $(0.13) $(0.12) $0.28Weighted-average common shares outstanding (basic) 80,056 80,353 80,355 80,357Weighted-average common shares outstanding (diluted) N/A N/A N/A 80,528* Certain prior period amounts have been adjusted as a result of the adoption of the accounting standard for revenue recognition set forth in ASC 606.(1) Basic and diluted net loss per common share are computed independently for each of the quarters presented. Therefore, the sum of the quarterly basic and diluted net loss percommon share amounts may not equal the annual basic and diluted net loss per common share amounts.NOTE 14 — SUBSEQUENT EVENTSEffective as of March 27, 2018, SecureWorks, Inc., the Company's wholly-owned subsidiary, extended a revolving credit agreement with a wholly-ownedsubsidiary of Dell Inc. under which the Company has a $30 million senior unsecured revolving credit facility. This facility was scheduled to expire on March27, 2019. Effective as of March 26, 2019, subsequent to the end of fiscal 2019, the revolving credit agreement was further amended and restated to extend thematurity date to March 26, 2020 and to increase the annual rate at which interest accrues from the applicable London interbank offered rate plus 1.15% tosuch rate plus 1.50%. The amended and restated revolving credit agreement otherwise has terms substantially similar to those of the facility before theamendment and restatement.On March 26, 2019, the Company's board of directors authorized an increase of $15 million to the Company's existing stock repurchase program, underwhich the Company is authorized to repurchase up to $30 million in total of the Company's Class A common stock through May 1, 2020. Repurchases maybe made from time to time through open market purchases, in privately negotiated transactions, or in other types of transactions. The timing and amount ofany repurchases under the program will be determined by management based upon market conditions and other factors.94SCHEDULE II - VALUATION AND QUALIFYING ACCOUNTSValuation and Qualifying Accounts Balance at Charged to Balance at Beginning Income Charged to End ofFiscal Year Description of Period Statement Allowance Period Trade Receivables: 2019 Allowance for doubtful accounts $8,246 $2,356 $(4,442) $6,1602018 Allowance for doubtful accounts $6,132 $3,947 $(1,833) $8,2462017 Allowance for doubtful accounts $4,484 $2,613 $(965) $6,13295Item 9. Changes in and Disagreements With Accountants on Accounting and Financial DisclosureNoneItem 9A. Controls and ProceduresEvaluation of Disclosure Controls and ProceduresDisclosure controls and procedures (as defined in Rules 13a-15(e) and 15d-15(e) under the Exchange Act) are designed to ensure that information required tobe disclosed in reports filed or submitted under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in SECrules and forms and that such information is accumulated and communicated to management, including the chief executive officer and the chief financialofficer, to allow timely decisions regarding required disclosures.In connection with the preparation of this report, our management, under the supervision and with the participation of our Chief Executive Officer and ChiefFinancial Officer, conducted an evaluation of the effectiveness of the design and operation of our disclosure controls and procedures as of February 1, 2019.Based on that evaluation, our management has concluded that our disclosure controls and procedures were effective as of February 1, 2019.Management's Report on Internal Control Over Financial ReportingManagement, under the supervision of the Chief Executive Officer and the Chief Financial Officer, is responsible for establishing and maintaining adequateinternal control over financial reporting. Internal control over financial reporting (as defined in Rules 13a-15(f) and 15d(f) under the Exchange Act) is aprocess designed to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for externalpurposes in accordance with generally accepted accounting principles. Internal control over financial reporting includes those policies and procedures which(a) pertain to the maintenance of records that, in reasonable detail, accurately and fairly reflect the transactions and dispositions of assets, (b) providereasonable assurance that transactions are recorded as necessary to permit preparation of financial statements in accordance with generally acceptedaccounting principles, (c) provide reasonable assurance that receipts and expenditures are being made only in accordance with appropriate authorization ofmanagement and the board of directors, and (d) provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use, ordisposition of assets that could have a material effect on the financial statements.In connection with the preparation of this report, our management, under the supervision and with the participation of our Chief Executive Officer and ChiefFinancial Officer, conducted an evaluation of the effectiveness of our internal control over financial reporting as of February 1, 2019, based on the criteriaestablished in Internal Control — Integrated Framework (2013) issued by the Committee of Sponsoring Organizations of the Treadway Commission. As aresult of that evaluation, management has concluded that our internal control over financial reporting was effective as of February 1, 2019.Changes in Internal Control Over Financial ReportingThere were no changes in our internal control over financial reporting identified in connection with the evaluation required by Rules 13a 15(e) and 15d 15(e)under the Exchange Act that occurred during the quarter ended February 1, 2019 that have materially affected, or are reasonably likely to materially affect,our internal control over financial reporting.Item 9B. Other InformationEffective as of March 27, 2018, SecureWorks, Inc., our wholly-owned subsidiary, extended a revolving credit agreement with a wholly-owned subsidiary ofDell Inc. under which we have a $30 million senior unsecured revolving credit facility. This facility was set to expire on March 27, 2019. Effective as ofMarch 26, 2019, subsequent to the end of fiscal 2019, the revolving credit agreement was further amended and restated to extend the maturity date toMarch 26, 2020 and to increase the annual rate at which interest accrues from the applicable London interbank offered rate plus 1.15% to such rate plus1.50%. The amended and restated revolving credit agreement otherwise has terms substantially similar to those of the facility before the amendment andrestatement. The credit facility and the recent amendment and restatement to the credit facility to extend the term are described under “Notes to ConsolidatedFinancial Statements—Note 6—Debt” and “—Note 14—Subsequent Events” in our consolidated financial statements included in this annual report onForm 10-K.96On March 26, 2019, the Company's board of directors authorized an increase of $15 million to the Company's existing stock repurchase program, underwhich the Company is authorized to repurchase up to $30 million in total of the Class A common stock through May 1, 2020. Repurchases may be madefrom time to time through open market purchases, in privately negotiated transactions, or in other types of transactions. The timing and amount of anyrepurchases under the program will be determined by management based upon market conditions and other factors.97Part IIIItem 10. Directors, Executive Officers and Corporate GovernanceWe have adopted a code of ethics applicable to our principal executive officer and other senior financial officers. The code of ethics, which we refer to as ourCode of Ethics for Senior Financial Officers, is available on the Investors page of our website at www.secureworks.com. To the extent required by SEC rules,we intend to disclose any amendments to this code and any waiver of a provision of the code for the benefit of any senior financial officer on our websitewithin any period that may be required under SEC rules from time to time.See “Part I — Item 1 — Business — Executive Officers of Secureworks” for information about our executive officers, which is incorporated by reference inthis Item 10. Other information required by this Item 10 is incorporated herein by reference to our definitive proxy statement for our 2019 annual meeting ofstockholders, referred to as the “2019 proxy statement,” which we will file with the SEC on or before 120 days after our 2019 fiscal year end, and which willappear in the 2019 proxy statement under the captions “Proposal 1 — Election of Directors” and “Additional Information — Section 16(a) BeneficialOwnership Reporting Compliance.”The following lists the members of our board of directors and the principal occupation of each director as of the date of this report.Michael R. CotePresident and Chief Executive OfficerSecureWorks Corp.Mark J. HawkinsPresident and Chief Financial OfficerSalesforce.com, Inc.Michael S. DellChairman and Chief Executive OfficerDell Technologies Inc.William R. McDermottChief Executive OfficerSAP SEEgon DurbanManaging PartnerSilver Lake PartnersYagyensh C. (Buno) PatiPartnerCenterview Capital TechnologyPamela DaleyRetired Senior Vice President andSenior Advisor to the Chairmanof General Electric CompanyJames M. WhitehurstPresident and Chief Executive OfficerRed Hat, Inc.Item 11. Executive CompensationInformation required by this Item 11 is incorporated herein by reference to the 2019 proxy statement, including the information in the 2019 proxy statementappearing under the captions “Proposal 1 — Election of Directors — Director Compensation” and “Compensation of Executive Officers.”Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Stockholder MattersInformation required by this Item 12 is incorporated herein by reference to the 2019 proxy statement, including the information in the 2019 proxy statementappearing under the captions “Equity Compensation Plan Information” and “Security Ownership of Certain Beneficial Owners and Management.”Item 13. Certain Relationships and Related Transactions, and Director IndependenceInformation required by this Item 13 is incorporated herein by reference to the 2019 proxy statement, including the information in the 2019 proxy statementappearing under the captions “Proposal 1—Election of Directors” and “Additional Information— Certain Relationships and Related Transactions.”Item 14. Principal Accounting Fees and ServicesInformation required by this Item 14 is incorporated herein by reference to the 2019 proxy statement, including the information in the 2019 proxy statementappearing under the caption “Proposal 2 — Ratification of Appointment of Independent Registered Public Accounting Firm.”98Part IVItem 15. Exhibits, Financial SchedulesThe following documents are filed as a part of this annual report on Form 10-K:(1)Financial Statements: The following financial statements are filed as a part of this report under “Part II — Item 8 Financial Statements andSupplementary Data”:Report of Independent Registered Public Accounting Firm Consolidated Statements of Financial Position as of February 1, 2019 and February 2, 2018 Consolidated Statements of Operations for the fiscal years ended February 1, 2019, February 2, 2018, andFebruary 3, 2017 Consolidated Statements of Comprehensive Loss for the fiscal years ended February 1, 2019, February 2, 2018,and February 3, 2017 Consolidated Statements of Cash Flows for the fiscal years ended February 1, 2019, February 2, 2018, andFebruary 3, 2017 Consolidated Statements of Stockholder's Equity for the fiscal years ended February 1, 2019, February 2, 2018,and February 3, 2017 Notes to Consolidated Financial Statements Schedule II - Valuation and Qualifying Accounts (2)Financial Statement Schedules: The following financial statement schedule is included following the Notes to the Consolidated FinancialStatements under “Part II — Item 8 — Financial Statements and Supplementary Data”:Schedule II — Valuation and Qualifying Accounts(3)Exhibits: EXHIBIT INDEXExhibit No. Description3.1 Restated Certificate of Incorporation of SecureWorks Corp. (the "Company") (incorporated by reference to Exhibit 4.1 to the Company'sRegistration Statement on Form S-8 filed with the Securities and Exchange Commission (the "Commission") on April 22, 2016 (the "FormS-8")) (Registration No. 333-210866).3.2 Amended and Restated Bylaws of SecureWorks Corp. (incorporated by reference to Exhibit 4.2 to the Form S-8) (Registration No. 333-210866).4.1 Specimen Certificate of Class A Common Stock, $0.01 par value per share, of the Company (incorporated by reference to Exhibit 4.1 tothe Company's Registration Statement on Form S-1 filed with the Commission on December 17, 2015 (the "Form S-1")) (Registration No.333-208596).10.1 Shared Services Agreement, effective as of August 1, 2015, between Dell Inc., for itself and its subsidiaries, and the Company (formerlyknown as SecureWorks Holding Corporation), for itself and its subsidiaries (incorporated by reference to Exhibit 10.1 to the Form S-1)(Registration No. 333-208596).10.1.1 Amendment #1 to Shared Services Agreement, dated December 8, 2015, between Dell Inc., for itself and its subsidiaries, and theCompany, for itself and its subsidiaries (incorporated by reference to Exhibit 10.1.1 to the Form S-1) (Registration No. 333-208596).10.1.2 Amendment #2 to Shared Services Agreement, dated November 8, 2017, between Dell Inc., for itself and its subsidiaries, and theCompany, for itself and its subsidiaries (incorporated by reference to Exhibit 10.1.2 to the Company's Annual Report on Form 10-K forthe fiscal year ended February 2, 2018) (Commission File No. 001-37748).10.1.3 Amendment #3 to Shared Services Agreement, dated as of July 11, 2018, between Dell Inc., for itself and its subsidiaries, and theCompany, for itself and its subsidiaries (incorporated by reference to Exhibit 10.2 to the Company's Quarterly Report on Form 10-Q forthe quarterly period ended August 3, 2018) (Commission File No. 001-37748).10.2 Intellectual Property Contribution Agreement, effective as of August 1, 2015, among Dell Inc., the Company and other subsidiaries ofDell Inc. party thereto (incorporated by reference to Exhibit 10.2 to the Form S-1) (Registration No. 333-208596).99EXHIBIT INDEX - ContinuedExhibit No. Description10.3 Patent License Agreement, effective as of August 1, 2015, between Dell Inc., for itself and its subsidiaries, and the Company, for itself andits subsidiaries (incorporated by reference to Exhibit 10.3 to the Form S-1) (Registration No. 333-208596).10.4 License Agreement, dated as of September 9, 2015, between Dell Inc. and the Company (incorporated by reference to Exhibit 10.4 to theForm S-1) (Registration No. 333-208596).10.5 Tax Matters Agreement, effective as of August 1, 2015, between the Company, for itself and its subsidiaries, and Dell Technologies Inc.(formerly known as Denali Holding Inc.), for itself and its subsidiaries other than the Company (incorporated by reference to Exhibit 10.5to the Form S-1) (Registration No. 333-208596).10.5.1 Amendment #1 to Tax Matters Agreement, dated December 8, 2015, between the Company, for itself and its subsidiaries, and DellTechnologies Inc., for itself and its subsidiaries other than the Company (incorporated by reference to Exhibit 10.5.1 to the Form S-1)(Registration No. 333-208596).10.6 Amended and Restated Employee Matters Agreement, effective as of August 1, 2015, among Dell Technologies Inc., Dell Inc. and theCompany (incorporated by reference to Exhibit 10.6 to the Form S-1) (Registration No. 333-208596).10.7+ Security Services Customer Master Services Agreement, effective as of August 1, 2015, between SecureWorks, Inc. and Dell USA L.P., onbehalf of itself, Dell Inc., and Dell Inc.'s subsidiaries (incorporated by reference to Exhibit 10.7 to the Form S-1) (Registration No. 333-208596).10.8 Letter Agreement to Security Services Customer Master Services Agreement and Reseller Agreement, effective as of August 1, 2015,between Dell Inc. and SecureWorks, Inc. (incorporated by reference to Exhibit 10.8 to the Form S-1) (Registration No. 333-208596).10.8.1+ First Amendment to Security Services Customer Master Services Agreement, effective as of November 3, 2017, between Dell USA L.P. andSecureWorks, Inc. (incorporated by reference to Exhibit 10.8.1 to the Company's Annual Report on Form 10-K for the fiscal year endedFebruary 2, 2018) (Commission File No. 001-37748).10.9+ Amended and Restated Master Commercial Customer Agreement, effective as of August 1, 2015, between Dell Marketing L.P. andSecureWorks, Inc. (incorporated by reference to Exhibit 10.9 to the Form S-1) (Registration No. 333-208596).10.9.1+ Amendment No. 1 to Amended and Restated Master Commercial Customer Agreement, effective as of August 4, 2018, between DellMarketing L.P. and SecureWorks, Inc. (incorporated by reference to Exhibit10.9.1 to the Company's Quarterly Report on Form 10-Q forthe quarterly period ended November 2, 2018) (Commission File No. 001-37748).10.10+ Amended and Restated Reseller Agreement, effective as of August 1, 2015, between SecureWorks, Inc., for itself and its subsidiaries, andDell Inc., for itself and its subsidiaries other than the Company (incorporated by reference to Exhibit 10.10 to the Form S-1) (RegistrationNo. 333-208596).10.10.1††+ Amendment No. 1 to Amended and Restated Reseller Agreement, dated as of January 23, 2019, between Dell, Inc., for itself and itssubsidiaries other than SecureWorks, Inc. and SecureWorks, Inc., for itself and its subsidiaries.10.11 Registration Rights Agreement, dated as of August 3, 2015, among the Company and the Holders party thereto (incorporated by referenceto Exhibit 10.22 to the Form S-1) (Registration No. 333-208596).10.12 Registration Rights Agreement, dated as of April 27, 2016, among the Company, Dell Marketing L.P., Michael S. Dell, the SusanLieberman Dell Separate Property Trust, MSDC Denali Investors, L.P., MSDC Denali EIV, LLC, Silver Lake Partners III, L.P., Silver LakeTechnology Investors III, L.P., Silver Lake Partners IV, L.P., Silver Lake Technology Investors IV, L.P. and SLP Denali Co-Invest, L.P.(incorporated by reference to Exhibit 10.1 to the Company's Current Report on Form 8-K filed with the Commission on April 27, 2016)(Commission File No. 001-37748).10.13 Amended and Restated Revolving Credit Agreement, dated as of March 27, 2018, between SecureWorks, Inc. and Dell USA L.P.(incorporated by reference to Exhibit 10.1 to the Company's Quarterly Report on Form 10-Q for the quarterly period ended May 4, 2018)(Commission File No. 001-37748).10.14 Note Purchase Agreement, dated as of June 30, 2015 and amended on July 31, 2015, among the Company, Dell Technologies Inc. and theInvestors party thereto (incorporated by reference to Exhibit 10.21 to the Form S-1) (Registration No. 333-208596).10.15 Office Lease between Teachers Concourse, LLC and SecureWorks, Inc., dated as of April 20, 2012, as amended (incorporated by referenceto Exhibit 10.23 to the Form S-1) (Registration No. 333-208596).10.16 Unconditional Guaranty of Payment and Performance, entered into on April 20, 2012, by Dell Inc. in favor of Teachers Concourse, LLC(incorporated by reference to Exhibit 10.24 to the Form S-1) (Registration No. 333-208596).100EXHIBIT INDEX - ContinuedExhibit No. Description10.17 Sublease Agreement between Dell International Services SRL and SecureWorks Europe SRL, dated as of June 22, 2015, as amended(incorporated by reference to Exhibit 10.26 to the Form S-1) (Registration No. 333-208596).10.18 Lease Deed between Dell International Services India Private Limited and SecureWorks India Private Limited, dated as of August 8, 2015(incorporated by reference to Exhibit 10.27 to the Form S-1) (Registration No. 333-208596).10.19* Dell Technologies Inc. 2013 Stock Incentive Plan (as amended and restated) (incorporated by reference to Exhibit 10.8 to DellTechnologies Inc.'s Current Report on Form 8-K filed with the Commission on December 28, 2018) (Commission File No. 001-37867).10.20* Dell Technologies Inc. 2012 Long-Term Incentive Plan (formerly known as Dell Inc. 2012 Long-Term Incentive Plan) as amended andrestated as of October 6, 2017 (incorporated by reference to Exhibit 10.4 to Dell Technologies Inc.'s Quarterly Report on Form 10-Q forthe quarterly period ended November 3, 2017) (Commission File No. 001-37867).10.21* Form of Indemnification Agreement between the Company and each director and executive officer of the Company (incorporated byreference to Exhibit 10.20 to the Form S-1) (Registration No. 333-208596).10.22* SecureWorks Corp. 2016 Long-Term Incentive Plan, as amended and restated as of June 21, 2018 (incorporated by reference to Exhibit10.1 to the Company's Current Report on Form 8-K filed with the Commission on June 27, 2018) (Commission File No. 001-37748).10.23* Form of Nonqualified Stock Option Agreement for Executives under SecureWorks Corp. 2016 Long-Term Incentive Plan (incorporatedby reference to Exhibit 10.13 to the Form S-1) (Registration No. 333-208596).10.24* Form of Nonqualified Stock Option Agreement for Directors under SecureWorks Corp. 2016 Long-Term Incentive Plan (incorporated byreference to Exhibit 10.13.1 to Amendment No. 1 to the Form S-1 filed with the Commission on March 22, 2016) (Registration No. 333-208596).10.25* Form of Restricted Stock Unit Agreement for Executives under SecureWorks Corp. 2016 Long-Term Incentive Plan (incorporated byreference to Exhibit 10.14 to the Form S-1) (Registration No. 333-208596).10.26* Form of Restricted Stock Unit Agreement for Directors under SecureWorks Corp. 2016 Long-Term Incentive Plan (incorporated byreference to Exhibit 10.14.1 to Amendment No. 1 to the Form S-1 filed with the Commission on March 22, 2016) (Registration No. 333-208596).10.27* Form of Restricted Stock Agreement for Executives under SecureWorks Corp. 2016 Long-Term Incentive Plan (incorporated by referenceto Exhibit 10.15 to the Form S-1) (Registration No. 333-208596).10.28* SecureWorks Corp. Amended and Restated Severance Pay Plan for Executive Employees (incorporated by reference to Exhibit 10.1 to theCompany's Current Report on Form 8-K filed with the Commission on September 6, 2016) (Commission File No. 001-37748).10.29* SecureWorks Corp. Non-Employee Director Compensation Policy, adopted March 2, 2018 and effective June 21, 2018 (incorporated byreference to Exhibit 10.2 to the Company's Quarterly Report on Form 10-Q for the quarterly period ended May 4, 2018) (Commission FileNo. 001-37748).10.30* SecureWorks Corp. Form of Protection of Sensitive Information, Noncompetition and Nonsolicitation Agreement (incorporated byreference to Exhibit 10.1 to the Company's Current Report on Form 8-K filed with the Commission on December 7, 2016) (CommissionFile No. 001-37748).10.31* Form of Performance-Based Restricted Stock Agreement for Executives under the SecureWorks Corp. 2016 Long-Term Incentive Plan(incorporated by reference to Exhibit 10.1 to the Company's Current Report on Form 8-K filed with the Commission on March 10, 2017)(Commission File No. 001-37748).10.32* Form of Performance Stock Unit Agreement for Executives under the SecureWorks Corp. 2016 Long-Term Incentive Plan (incorporatedby reference to Exhibit 10.2 to the Company's Current Report on Form 8-K filed with the Commission on March 10, 2017) (CommissionFile No. 001-37748).10.33* Amended and Restated SecureWorks Corp. Incentive Bonus Plan (incorporated by reference to Exhibit 10.33 to the Company's AnnualReport on Form 10-K for the fiscal year ended February 3, 2017) (Commission File No. 001-37748).21.1†† Subsidiaries of SecureWorks Corp.23.1†† Consent of PricewaterhouseCoopers LLP, independent registered public accounting firm of SecureWorks Corp.31.1†† Certification of Chief Executive Officer of the Company pursuant to Rule 13a-14(a) or Rule 15d-14(a) under the Securities Exchange Actof 1934, as adopted pursuant to Section 302 of the Sarbanes-Oxley Act of 2002.31.2†† Certification of Chief Financial Officer of the Company pursuant to Rule 13a-14(a) or Rule 15d-14(a) under the Securities Exchange Actof 1934, as adopted pursuant to Section 302 of the Sarbanes-Oxley Act of 2002. 101EXHIBIT INDEX - ContinuedExhibit No. Description32.1††† Certifications of Chief Executive Officer and Chief Financial Officer of the Company pursuant to Rule 13a-14(b) or Rule 15d-14(b) underthe Securities Exchange Act of 1934 and 18 U.S.C. Section 1350, as adopted pursuant to Section 906 of the Sarbanes-Oxley Act of 2002.101 .INS†† XBRL Instance Document - the instance document does not appear in the Interactive Data File because its XBRL tags are embeddedwithin the Inline XBRL document.101 .SCH†† XBRL Taxonomy Extension Schema Document.101 .CAL†† XBRL Taxonomy Extension Calculation Linkbase Document.101 .DEF†† XBRL Taxonomy Extension Definition Linkbase Document.101 .LAB†† XBRL Taxonomy Extension Label Linkbase Document.101 .PRE†† XBRL Taxonomy Extension Presentation Linkbase Document. + Certain portions of this exhibit have been omitted pursuant to a confidential treatment request. Omitted information has been filedseparately with the SEC.†† Filed with this report.††† Furnished with this report.* Management contracts or compensation plans or arrangements in which directors or executive officers participate.Item 16. Form 10-K SummaryNone.102SIGNATURESPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on itsbehalf by the undersigned, thereunto duly authorized. SecureWorks Corp. By: /s/ Michael R. Cote Michael R. Cote President and Chief Executive Officer (Duly Authorized Officer)Date: March 28, 2019Pursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the registrantand in the capacities and on the dates indicated. SIGNATURE TITLE DATE /s/ Michael R. Cote President, Chief Executive Officer and Director March 28, 2019 Michael R. Cote (Principal Executive Officer) /s/ R. Wayne Jackson SVP, Chief Financial Officer March 28, 2019 R. Wayne Jackson (Principal Financial Officer) /s/ Teri Miller Vice President, Chief Accounting Officer March 28, 2019 Teri Miller (Principal Accounting Officer) /s/ Michael S. Dell Chairman of the Board of Directors March 28, 2019 Michael S. Dell /s/ Egon Durban Director March 28, 2019 Egon Durban /s/ Pamela Daley Director March 28, 2019 Pamela Daley /s/ Yagyensh C. Pati Director March 28, 2019 Yagyensh C. Pati /s/ Mark J. Hawkins Director March 28, 2019 Mark J. Hawkins /s/ William R. McDermott Director March 28, 2019 William R. McDermott /s/ James M. Whitehurst Director March 28, 2019 James M. Whitehurst 103[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission.Confidential treatment has been requested with respect to the omitted portions. Exhibit 10.10.1Amendment No. 1 to Amended and Restated Reseller AgreementDell Inc., for itself and its Subsidiaries other than SecureWorks, Inc., (“Reseller”) and SecureWorks, Inc., for itself and its Subsidiaries(“Spyglass”) hereby enter into this Amendment No. 1 (“Amendment”) as of the date of last signature below (“Amendment EffectiveDate”) for the purpose of amending the Amended and Restated Reseller Agreement, dated as of October 28, 2015, and thoseamendments, addenda or riders thereto dated prior to the Amendment Effective Date (collectively, the “Reseller Agreement”).WHEREAS, Dell Marketing LP, a Texas limited partnership, on behalf of Reseller and its direct and indirect subsidiaries (other thanSpyglass) (collectively, “Dell”), Spyglass, and CrowdStrike, Inc., a Delaware corporation (“CS”) are parties to an agreement (includingany amendments, addenda or riders, the “Tri-Party Agreement”) pursuant to which Dell may sell certain products and services ofSpyglass and/or CS (the “Solutions”) to Clients. WHEREAS, the Parties desire to clarify the understandings under the Reseller Agreement with respect to sales of Solutions under theTri-Party Agreement.WHEREAS, the terms and conditions of this Amendment only apply to transactions under the Reseller Agreement involving sales ofSolutions to Clients.NOW, THEREFORE, in consideration of the promises and obligations contained herein, the parties agree as follows:RELATIONSHIP TO RESELLER AGREEMENT. This Amendment hereby incorporates by reference and amends the above-referenced Reseller Agreement. The Reseller Agreement shall remain in effect and unchanged except to the extent provided in thisAmendment. In case of any conflict between this Amendment and the Reseller Agreement, the provisions of this Amendment shallcontrol with regard to the subject matter set forth herein.1.INCORPORATED DEFINITIONS. Unless specifically stated otherwise in this Amendment, all terms defined in the ResellerAgreement shall have the same meaning when used in this Amendment.2.CHANGES TO RESELLER AGREEMENT. The parties agree to make the following changes to the Reseller Agreement inrespect of sales of Solutions to Clients under the Tri-Party Agreement only:a.Clients. Section 1.1.1 of the Reseller Agreement is modified for sales of Solutions only by replacing “whose end users (i) arelocated outside the U.S., U.K., France, Romania, Australia, India and Japan (the “Non-LE Countries”), (ii) are public and/oreducational institutions located within the U.S., or (iii) the parties agree can receive Services from Dell under this Agreement(the “Territory”)” with “whose end users are “Customers” within the “Territory” (as such terms are defined in the Tri-PartyAgreement) (the “Territory”).”b.Order Submission. Reseller shall send Spyglass orders related to Solutions in Exhibit 1 on a semi-daily basis. For claritythese are only orders containing Spyglass products and services. Exhibit 1 may be amended by mutual agreement of theParties.c.Reporting. Section 1 of the Reseller Agreement is modified for sales of Solutions only by adding thePage 1 of 25following new provision as Section 1.5:i. “Reporting. Reseller shall provide the following five reports to Spyglass for sales associated with Solutions listedin Exhibit 1 to the Amendment (as the same may be amended):•For orders within the U.S., Reseller shall provide monthly Standard BRM reports for reporting and invoicingpurposes. BRM reports include order-level detail including order number, invoice number, customer ID andcontact information in addition to pricing and term length information.•For orders outside the U.S., Reseller shall provide monthly Standard Royalty Accounting reports that containonly high level product descriptions and aggregated royalties by geography.Both Standard BRM reports and Standard Royalty Accounting reports are automated and shall be presented as-is toSpyglass. Spyglass acknowledges that Reseller has no responsibility to modify or customize these reports in anyway.In addition, Reseller shall provide the following reports with data fields and frequency as indicated below:•*Weekly Report Feed◦Reseller Part # (SKU)◦Client Name◦Client Number (Unique Identifier)◦Contract State Date◦Contract End Date◦Contract Term in years•**Monthly Report Feed◦Reseller Part # (SKU)◦Client Name◦Client Number (Unique Identifier)◦Contract State Date◦Contract End Date◦Contract Term in years•*Quarterly Report Feed◦number of endpoints◦client name◦contract start date◦Either contract end date or part number* Weekly report shall be in an Excel File format.** Reseller and Spyglass shall determine in good faith a mutually agreeable format for the monthly report. Resellershall target delivery of this monthly report to Spyglass no later than the first business Monday (excluding holidays)each month. Neither party shall change the format of the report without prior written approval from the other party.Page 2 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.d. Reseller shall ensure that all Reseller order forms include a link to the Spyglass end user license agreement. Such Spyglassend user license agreement shall comprise the entire Flow Through Terms in respect of sales of Solutions to Clients underthe Tri-Party Agreement.e.Support. Section 4.2 of the Reseller Agreement is modified for sales of Solutions only by adding the following newprovision as Section 4.2(i):i. Notwithstanding the foregoing, Reseller shall provide Level 1 Support and Level 2 Support (as specified in the Tri-Party Agreement) for Crowdstrike Solutions listed in Exhibit 1 to the Amendment (as the same may be amended).Spyglass shall be responsible for providing all support with respect to the Spyglass Solutions. f.Taxes. Section 6 of the Reseller Agreement is modified for sales of Solutions only by adding the following new provision atthe end of Section 6:“Foreign taxes. If Reseller is required by any tax authority to withhold taxes on payments to Spyglass, then Reseller maydeduct such taxes from the amount owed Spyglass and pay them to the authority. Reseller must deliver to Spyglass anofficial receipt for any taxes withheld (or other documents necessary) for Spyglass to claim a tax credit or refund. Resellermust deliver the receipt within 60 days of payment of the tax or maximum time allowed for delivery of the receipt underlocal law.”g.Royalties. Reseller shall remit license fees according to Exhibit 1 to the Amendment.h.Non-Standard Pricing. If non-standard pricing is requested by Reseller, Reseller and Spyglass may negotiate in good faithand mutually agree in writing on any applicable variances on a case-by-case basis. Mutual agreement in writing may beevidenced by an email from Spyglass with a quotation and a corresponding Reseller PO (or line item on a Reseller PO orMonthly Report) in the quoted amount. In the event non-standard pricing is not agreed upon, then the pricing in Exhibit 1shall apply.i.Spyglass Indemnification Obligation. Section 13.3 of the Reseller Agreement is modified for sales of Solutions only byadding the following new provision as the last sentence:“In addition to the foregoing, Spyglass will, at its expense, indemnify, defend and hold Reseller harmless from andagainst any and all third party claims, actions, demands, ensuing legal proceedings, liabilities, damages, losses,judgments, authorized settlements, costs and expenses as incurred, including without limitation reasonable attorney'sfees, to the extent caused by any alleged or actual: (a) acts or omissions of Spyglass that result in any violation bySpyglass of any applicable laws; (b) Spyglass’s or its representative’s grossly negligent act or grossly negligent omission,fraud or willful misconduct; (c) Spyglass’s failure to comply with any of its privacy notices or any other terms andconditions Spyglass enters into with a Client; (d) Spyglass’s breach of the NDA, or Spyglass’s improper access,collection, distribution, processing, transmission, or storing of a Client’s personally identifiable information.”j.Limitation of Liability. Section 14 of the Reseller Agreement is modified for sales of Solutions only by replacing Section14 in its entirety with the following:“EXCEPT FOR (I) SPYGLASS’S INDEMNIFICATION OBLIGATIONS AS SET FORTH IN SECTION 13.3(i), (II) EACHPARTY’S GROSSLY NEGLIGENT ACTS OR GROSSLY NEGLIGENT OMISSIONS, FRAUD OR WILLFUL MISCONDUCT,(III) RESELLER’S FLOW THROUGH OBLIGATION, (IV) AN UNAUTHORIZED DISCLOSURE OF CONFIDENTIALINFORMATION (FOR AVOIDANCE OF DOUBT, A THIRD-PARTY HACK SHALL NOT BE CONSIDERED ANUNAUTHORIZED DISCLOSURE OF CONFIDENTIAL INFORMATION BY A PARTY FOR PURPOSES OF THISSECTION), OR (V)Page 3 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.INFRINGEMENT/MISAPPROPRIATION OF INTELLECTUAL PROPERTY, IN NO EVENT WILL EITHER PARTY BELIABLE TO THE OTHER PARTY (INCLUDING ANY CLIENT OF RESELLER) FOR ANY CONSEQUENTIAL, INDIRECT,INCIDENTAL, PUNITIVE OR SPECIAL DAMAGES, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OFBUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION AND THE LIKE, DAMAGESFOR LOSS OF DATA RESULTING FROM DELAYS, NON-DELIVERIES OR SERVICE INTERRUPTIONS, ARISING OUTOF THIS AGREEMENT, EVEN IN THE EVENT OF FAULT, TORT, STRICT LIABILITY, OR BREACH OF WARRANTY ANDEVEN IF SUCH PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.EXCEPT FOR (I) AN UNAUTHORIZED DISCLOSURE OF CONFIDENTIAL INFORMATION (FOR AVOIDANCE OFDOUBT, A THIRD-PARTY HACK SHALL NOT BE CONSIDERED AN UNAUTHORIZED DISCLOSURE OFCONFIDENTIAL INFORMATION BY A PARTY FOR PURPOSES OF THIS SECTION), (II)INFRINGEMENT/MISAPPROPRIATION OF INTELLECTUAL PROPERTY, (III) SPYGLASS’S INDEMNIFICATIONOBLIGATIONS AS SET FORTH IN SECTION 13.3(i), OR (IV) EACH PARTY’S GROSSLY NEGLIGENT ACTS ORGROSSLY NEGLIGENT OMISSIONS, FRAUD OR WILLFUL MISCONDUCT, EACH PARTY’S LIABILITY FOR ALLCLAIMS ARISING OUT OF THIS AGREEMENT, WHETHER IN CONTRACT, TORT OR OTHERWISE, SHALL BE LIMITEDTO THE GREATER OF (A) THREE TIMES THE AMOUNT OF FEES PAID BY RESELLER TO SPYGLASS UNDER THISAGREEMENT DURING THE TWELVE MONTHS PRECEDING THE CLAIM AND (B) THIRTY MILLION DOLLARS($30,000,000).”IN WITNESS WHEREOF, the parties have caused this Amendment to be signed on the respective dates indicated below.Dell Inc. SecureWorks, Inc. (“Reseller”) (“Spyglass”)By: /s/ Brett Hansen By: /s/ R. Wayne Jackson Name (Print): Brett Hansen Name (Print): R. Wayne Jackson Title: VP, Client Solutions Title: CFO Date: Jan 23, 2019 Date: Jan 23, 2019 Page 4 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Exhibit 1 - Pricing ScheduleGlobal OTB (non-volume):Product DescriptionDell Price Paid to SCWXCrowdstrike Falcon Prevent OTB 1Yr $ [***]Crowdstrike Falcon Prevent + Insights OTB 1Yr $ [***]Crowdstrike Falcon Prevent OTB 3Yr $ [***]Crowdstrike Falcon Prevent + Insights OTB 3Yr $ [***]SCWX Managed endpoint services 1Yr OTB $ [***]SCWX Managed endpoint services 3Yr OTB $ [***]Crowdstrike Falcon Prevent OTB 1Yr $ [***]Global PCaaS (non-volume):Product DescriptionDell Price Paid to SCWXCrowdstrike Falcon Prevent PCaaS 4 Yr $ [***]Crowdstrike Falcon Prevent + Insight PCaaS 4 Yr $ [***]SCWX Managed endpoint services PCaaS 4 Yr $ [***]Global ESST/TD Conversions (non-volume):Product DescriptionDell Price Paid to SCWXESSE/TD Conversion to Falcon Prevent 1Yr $ [***]ESSE/TD Conversion to Falcon Prevent 2Yr $ [***]ESSE/TD Conversion to Falcon Prevent + Insights 1Yr $ [***]ESSE/TD Conversion to Falcon Prevent + Insights 2Yr $ [***]ESSE/TD Conversion SCWX Managed endpointservices 1Yr volume $ [***]ESSE/TD Conversion SCWX Managed endpointservices 2Yr volume $ [***]Global Volume: SecureWorks Retainer Fees:Product DescriptionDell Price Paid to SCWXSecureworks Incident Management Retainer (40 hrs) $ [***]Page 5 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Global Volume: AETD (Managed Endpoint Services):Product DescriptionDell Price Paid to SCWX: One YearLicenseDell Price Paid to SCWX: Three YearLicenseManaged Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 50 to 149Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 150 to 299Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 300 to 499Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 500 to 749Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 750 to 999Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 1000 to1499 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 1500 to1999 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 2000 to2499 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 2500 to4999 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 5000 to9999 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 10000 to24999 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 25000 to49999 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 50000 to99999 Endpoints $ [***] $ [***]Managed Endpoint Services: Standalone:AETD: CrowdStrike w/o License: 100000 orGreater Endpoints $ [***] $ [***]Page 6 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.CrowdStrike Volume Offerings U.S. OnlyProduct DescriptionEnd point Range Low-endEnd point Range High-endDell Price Paid toSCWX: One YearLicenseDell Price Paid toSCWX: Three YearLicenseFalcon Prevent (NGAV)Application - Band 1 1 149 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 2 150 299 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 3 300 499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 4 500 749 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 5 750 999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 6 1,000 1,499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 7 1,500 1,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 8 2,000 2,499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 9 2,500 4,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 10 5,000 9,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 11 10,000 24,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 12 25,000 49,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 13 50,000 99,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 14 100,000 249,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 15 250,000 499,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 16 500,000 999,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 1 1 149 $ [***] $ [***]Falcon Insight (EDR) Application- Band 2 150 299 $ [***] $ [***]Falcon Insight (EDR) Application- Band 3 300 499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 4 500 749 $ [***] $ [***]Falcon Insight (EDR) Application- Band 5 750 999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 6 1,000 1,499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 7 1,500 1,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 8 2,000 2,499 $ [***] $ [***]Page 7 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Insight (EDR) Application- Band 9 2,500 4,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 10 5,000 9,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 11 10,000 24,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 12 25,000 49,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 13 50,000 99,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 14 100,000 249,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 15 250,000 499,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 16 500,000 999,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 1 1 149 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 2 150 299 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 3 300 499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 4 500 749 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 5 750 999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 6 1,000 1,499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 7 1,500 1,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 8 2,000 2,499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 9 2,500 4,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 10 5,000 9,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 11 10,000 24,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 12 25,000 49,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 13 50,000 99,999 $ [***] $ [***]Page 8 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Discover - (DiscoverySolution) - Band 14 100,000 249,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 15 250,000 499,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 16 500,000 999,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 1 1 149 $ [***] $ [***]Falcon Overwatch PremiumService - Band 2 150 299 $ [***] $ [***]Falcon Overwatch PremiumService - Band 3 300 499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 4 500 749 $ [***] $ [***]Falcon Overwatch PremiumService - Band 5 750 999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 6 1,000 1,499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 7 1,500 1,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 8 2,000 2,499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 9 2,500 4,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 10 5,000 9,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 11 10,000 24,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 12 25,000 49,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 13 50,000 99,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 14 100,000 249,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 15 250,000 499,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 16 500,000 999,999 $ [***] $ [***]Page 9 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Overwatch PremiumService - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon X Application - Band 1 1 149 $ [***] $ [***]Falcon X Application - Band 2 150 299 $ [***] $ [***]Falcon X Application - Band 3 300 499 $ [***] $ [***]Falcon X Application - Band 4 500 749 $ [***] $ [***]Falcon X Application - Band 5 750 999 $ [***] $ [***]Falcon X Application - Band 6 1,000 1,499 $ [***] $ [***]Falcon X Application - Band 7 1,500 1,999 $ [***] $ [***]Falcon X Application - Band 8 2,000 2,499 $ [***] $ [***]Falcon X Application - Band 9 2,500 4,999 $ [***] $ [***]Falcon X Application - Band 10 5,000 9,999 $ [***] $ [***]Falcon X Application - Band 11 10,000 24,999 $ [***] $ [***]Falcon X Application - Band 12 25,000 49,999 $ [***] $ [***]Falcon X Application - Band 13 50,000 99,999 $ [***] $ [***]Falcon X Application - Band 14 100,000 249,999 $ [***] $ [***]Falcon X Application - Band 15 250,000 499,999 $ [***] $ [***]Falcon X Application - Band 16 500,000 999,999 $ [***] $ [***]Falcon X Application - Band 17 1,000,000 9,999,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 1 1 149 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 2 150 299 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 3 300 499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 4 500 749 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 5 750 999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 6 1,000 1,499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 7 1,500 1,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 8 2,000 2,499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 9 2,500 4,999 $ [***] $ [***]Page 10 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.EPP Standard (Prevent + Insight) -Band 10 5,000 9,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 11 10,000 24,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 12 25,000 49,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 13 50,000 99,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 14 100,000 249,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 15 250,000 499,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 16 500,000 999,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 1000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 250 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 25000 files/month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 500 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 5000 files/month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample Size up to5000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample Size up to25000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample SizeUnlimited 1 9,999,999 $ [***] $ [***]Remote SSH access forintallation/upgrades. Price is perhour. 1 9,999,999 $ [***] $ [***]Remote Installation andconfiguration session. Price is persession. 1 9,999,999 $ [***] $ [***]Falcon Sandbox Bridge 1 9,999,999 $ [***] $ [***]Falcon MalQuery 1 9,999,999 $ [***] $ [***]Falcon Spotlight - Band 1 1 149 $ [***] $ [***]Falcon Spotlight - Band 2 150 299 $ [***] $ [***]Falcon Spotlight - Band 3 300 499 $ [***] $ [***]Page 11 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Spotlight - Band 4 500 749 $ [***] $ [***]Falcon Spotlight - Band 5 750 999 $ [***] $ [***]Falcon Spotlight - Band 6 1,000 1,499 $ [***] $ [***]Falcon Spotlight - Band 7 1,500 1,999 $ [***] $ [***]Falcon Spotlight - Band 8 2,000 2,499 $ [***] $ [***]Falcon Spotlight - Band 9 2,500 4,999 $ [***] $ [***]Falcon Spotlight - Band 10 5,000 9,999 $ [***] $ [***]Falcon Spotlight - Band 11 10,000 24,999 $ [***] $ [***]Falcon Spotlight - Band 12 25,000 49,999 $ [***] $ [***]Falcon Spotlight - Band 13 50,000 99,999 $ [***] $ [***]Falcon Spotlight - Band 14 100,000 249,999 $ [***] $ [***]Falcon Spotlight - Band 15 250,000 499,999 $ [***] $ [***]Falcon Spotlight - Band 16 500,000 999,999 $ [***] $ [***]Falcon Spotlight - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Device Control - Band 1 1 149 $ [***] $ [***]Falcon Device Control - Band 2 150 299 $ [***] $ [***]Falcon Device Control - Band 3 300 499 $ [***] $ [***]Falcon Device Control - Band 4 500 749 $ [***] $ [***]Falcon Device Control - Band 5 750 999 $ [***] $ [***]Falcon Device Control - Band 6 1,000 1,499 $ [***] $ [***]Falcon Device Control - Band 7 1,500 1,999 $ [***] $ [***]Falcon Device Control - Band 8 2,000 2,499 $ [***] $ [***]Falcon Device Control - Band 9 2,500 4,999 $ [***] $ [***]Falcon Device Control - Band 10 5,000 9,999 $ [***] $ [***]Falcon Device Control - Band 11 10,000 24,999 $ [***] $ [***]Falcon Device Control - Band 12 25,000 49,999 $ [***] $ [***]Falcon Device Control - Band 13 50,000 99,999 $ [***] $ [***]Falcon Device Control - Band 14 100,000 249,999 $ [***] $ [***]Page 12 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Device Control - Band 15 250,000 499,999 $ [***] $ [***]Falcon Device Control - Band 16 500,000 999,999 $ [***] $ [***]Falcon Device Control - Band 17 1,000,000 9,999,999 $ [***] $ [***]CrowdStrike Volume Offerings All Territories Excluding Japan and U.S.Product DescriptionEnd point Range Low-endEnd point Range High-endDell Price Paid toSCWX: One YearLicenseDell Price Paid toSCWX: Three YearLicenseFalcon Prevent (NGAV)Application - Band 1 1 149 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 2 150 299 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 3 300 499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 4 500 749 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 5 750 999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 6 1,000 1,499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 7 1,500 1,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 8 2,000 2,499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 9 2,500 4,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 10 5,000 9,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 11 10,000 24,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 12 25,000 49,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 13 50,000 99,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 14 100,000 249,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 15 250,000 499,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 16 500,000 999,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 1 1 149 $ [***] $ [***]Falcon Insight (EDR) Application- Band 2 150 299 $ [***] $ [***]Falcon Insight (EDR) Application- Band 3 300 499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 4 500 749 $ [***] $ [***]Falcon Insight (EDR) Application- Band 5 750 999 $ [***] $ [***]Page 13 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Insight (EDR) Application- Band 6 1,000 1,499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 7 1,500 1,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 8 2,000 2,499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 9 2,500 4,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 10 5,000 9,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 11 10,000 24,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 12 25,000 49,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 13 50,000 99,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 14 100,000 249,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 15 250,000 499,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 16 500,000 999,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 1 1 149 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 2 150 299 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 3 300 499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 4 500 749 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 5 750 999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 6 1,000 1,499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 7 1,500 1,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 8 2,000 2,499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 9 2,500 4,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 10 5,000 9,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 11 10,000 24,999 $ [***] $ [***]Page 14 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Discover - (DiscoverySolution) - Band 12 25,000 49,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 13 50,000 99,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 14 100,000 249,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 15 250,000 499,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 16 500,000 999,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 1 1 149 $ [***] $ [***]Falcon Overwatch PremiumService - Band 2 150 299 $ [***] $ [***]Falcon Overwatch PremiumService - Band 3 300 499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 4 500 749 $ [***] $ [***]Falcon Overwatch PremiumService - Band 5 750 999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 6 1,000 1,499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 7 1,500 1,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 8 2,000 2,499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 9 2,500 4,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 10 5,000 9,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 11 10,000 24,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 12 25,000 49,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 13 50,000 99,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 14 100,000 249,999 $ [***] $ [***]Page 15 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Overwatch PremiumService - Band 15 250,000 499,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 16 500,000 999,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon X Application - Band 1 1 149 $ [***] $ [***]Falcon X Application - Band 2 150 299 $ [***] $ [***]Falcon X Application - Band 3 300 499 $ [***] $ [***]Falcon X Application - Band 4 500 749 $ [***] $ [***]Falcon X Application - Band 5 750 999 $ [***] $ [***]Falcon X Application - Band 6 1,000 1,499 $ [***] $ [***]Falcon X Application - Band 7 1,500 1,999 $ [***] $ [***]Falcon X Application - Band 8 2,000 2,499 $ [***] $ [***]Falcon X Application - Band 9 2,500 4,999 $ [***] $ [***]Falcon X Application - Band 10 5,000 9,999 $ [***] $ [***]Falcon X Application - Band 11 10,000 24,999 $ [***] $ [***]Falcon X Application - Band 12 25,000 49,999 $ [***] $ [***]Falcon X Application - Band 13 50,000 99,999 $ [***] $ [***]Falcon X Application - Band 14 100,000 249,999 $ [***] $ [***]Falcon X Application - Band 15 250,000 499,999 $ [***] $ [***]Falcon X Application - Band 16 500,000 999,999 $ [***] $ [***]Falcon X Application - Band 17 1,000,000 9,999,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 1 1 149 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 2 150 299 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 3 300 499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 4 500 749 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 5 750 999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 6 1,000 1,499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 7 1,500 1,999 $ [***] $ [***]Page 16 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.EPP Standard (Prevent + Insight) -Band 8 2,000 2,499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 9 2,500 4,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 10 5,000 9,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 11 10,000 24,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 12 25,000 49,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 13 50,000 99,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 14 100,000 249,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 15 250,000 499,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 16 500,000 999,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 1000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 250 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 25000 files/month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 500 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 5000 files/month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample Size up to5000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample Size up to25000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample SizeUnlimited 1 9,999,999 $ [***] $ [***]Remote SSH access forintallation/upgrades. Price is perhour. 1 9,999,999 $ [***] $ [***]Remote Installation andconfiguration session. Price is persession. 1 9,999,999 $ [***] $ [***]Falcon Sandbox Bridge 1 9,999,999 $ [***] $ [***]Falcon MalQuery 1 9,999,999 $ [***] $ [***]Falcon Spotlight - Band 1 1 149 $ [***] $ [***]Page 17 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Spotlight - Band 2 150 299 $ [***] $ [***]Falcon Spotlight - Band 3 300 499 $ [***] $ [***]Falcon Spotlight - Band 4 500 749 $ [***] $ [***]Falcon Spotlight - Band 5 750 999 $ [***] $ [***]Falcon Spotlight - Band 6 1,000 1,499 $ [***] $ [***]Falcon Spotlight - Band 7 1,500 1,999 $ [***] $ [***]Falcon Spotlight - Band 8 2,000 2,499 $ [***] $ [***]Falcon Spotlight - Band 9 2,500 4,999 $ [***] $ [***]Falcon Spotlight - Band 10 5,000 9,999 $ [***] $ [***]Falcon Spotlight - Band 11 10,000 24,999 $ [***] $ [***]Falcon Spotlight - Band 12 25,000 49,999 $ [***] $ [***]Falcon Spotlight - Band 13 50,000 99,999 $ [***] $ [***]Falcon Spotlight - Band 14 100,000 249,999 $ [***] $ [***]Falcon Spotlight - Band 15 250,000 499,999 $ [***] $ [***]Falcon Spotlight - Band 16 500,000 999,999 $ [***] $ [***]Falcon Spotlight - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Device Control - Band 1 1 149 $ [***] $ [***]Falcon Device Control - Band 2 150 299 $ [***] $ [***]Falcon Device Control - Band 3 300 499 $ [***] $ [***]Falcon Device Control - Band 4 500 749 $ [***] $ [***]Falcon Device Control - Band 5 750 999 $ [***] $ [***]Falcon Device Control - Band 6 1,000 1,499 $ [***] $ [***]Falcon Device Control - Band 7 1,500 1,999 $ [***] $ [***]Falcon Device Control - Band 8 2,000 2,499 $ [***] $ [***]Falcon Device Control - Band 9 2,500 4,999 $ [***] $ [***]Falcon Device Control - Band 10 5,000 9,999 $ [***] $ [***]Falcon Device Control - Band 11 10,000 24,999 $ [***] $ [***]Falcon Device Control - Band 12 25,000 49,999 $ [***] $ [***]Falcon Device Control - Band 13 50,000 99,999 $ [***] $ [***]Page 18 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Device Control - Band 14 100,000 249,999 $ [***] $ [***]Falcon Device Control - Band 15 250,000 499,999 $ [***] $ [***]Falcon Device Control - Band 16 500,000 999,999 $ [***] $ [***]Falcon Device Control - Band 17 1,000,000 9,999,999 $ [***] $ [***]CrowdStrike Volume Offerings JapanProduct DescriptionEnd point Range Low-endEnd point Range High-endDell Price Paid toSCWX: One YearLicenseDell Price Paid toSCWX: Three YearLicenseFalcon Prevent (NGAV)Application - Band 1 1 149 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 2 150 299 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 3 300 499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 4 500 749 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 5 750 999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 6 1,000 1,499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 7 1,500 1,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 8 2,000 2,499 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 9 2,500 4,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 10 5,000 9,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 11 10,000 24,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 12 25,000 49,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 13 50,000 99,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 14 100,000 249,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 15 250,000 499,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 16 500,000 999,999 $ [***] $ [***]Falcon Prevent (NGAV)Application - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 1 1 149 $ [***] $ [***]Falcon Insight (EDR) Application- Band 2 150 299 $ [***] $ [***]Falcon Insight (EDR) Application- Band 3 300 499 $ [***] $ [***]Page 19 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Insight (EDR) Application- Band 4 500 749 $ [***] $ [***]Falcon Insight (EDR) Application- Band 5 750 999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 6 1,000 1,499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 7 1,500 1,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 8 2,000 2,499 $ [***] $ [***]Falcon Insight (EDR) Application- Band 9 2,500 4,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 10 5,000 9,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 11 10,000 24,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 12 25,000 49,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 13 50,000 99,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 14 100,000 249,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 15 250,000 499,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 16 500,000 999,999 $ [***] $ [***]Falcon Insight (EDR) Application- Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 1 1 149 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 2 150 299 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 3 300 499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 4 500 749 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 5 750 999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 6 1,000 1,499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 7 1,500 1,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 8 2,000 2,499 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 9 2,500 4,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 10 5,000 9,999 $ [***] $ [***]Page 20 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Discover - (DiscoverySolution) - Band 11 10,000 24,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 12 25,000 49,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 13 50,000 99,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 14 100,000 249,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 15 250,000 499,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 16 500,000 999,999 $ [***] $ [***]Falcon Discover - (DiscoverySolution) - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 1 1 149 $ [***] $ [***]Falcon Overwatch PremiumService - Band 2 150 299 $ [***] $ [***]Falcon Overwatch PremiumService - Band 3 300 499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 4 500 749 $ [***] $ [***]Falcon Overwatch PremiumService - Band 5 750 999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 6 1,000 1,499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 7 1,500 1,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 8 2,000 2,499 $ [***] $ [***]Falcon Overwatch PremiumService - Band 9 2,500 4,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 10 5,000 9,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 11 10,000 24,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 12 25,000 49,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 13 50,000 99,999 $ [***] $ [***]Page 21 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Overwatch PremiumService - Band 14 100,000 249,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 15 250,000 499,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 16 500,000 999,999 $ [***] $ [***]Falcon Overwatch PremiumService - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon X Application - Band 1 1 149 $ [***] $ [***]Falcon X Application - Band 2 150 299 $ [***] $ [***]Falcon X Application - Band 3 300 499 $ [***] $ [***]Falcon X Application - Band 4 500 749 $ [***] $ [***]Falcon X Application - Band 5 750 999 $ [***] $ [***]Falcon X Application - Band 6 1,000 1,499 $ [***] $ [***]Falcon X Application - Band 7 1,500 1,999 $ [***] $ [***]Falcon X Application - Band 8 2,000 2,499 $ [***] $ [***]Falcon X Application - Band 9 2,500 4,999 $ [***] $ [***]Falcon X Application - Band 10 5,000 9,999 $ [***] $ [***]Falcon X Application - Band 11 10,000 24,999 $ [***] $ [***]Falcon X Application - Band 12 25,000 49,999 $ [***] $ [***]Falcon X Application - Band 13 50,000 99,999 $ [***] $ [***]Falcon X Application - Band 14 100,000 249,999 $ [***] $ [***]Falcon X Application - Band 15 250,000 499,999 $ [***] $ [***]Falcon X Application - Band 16 500,000 999,999 $ [***] $ [***]Falcon X Application - Band 17 1,000,000 9,999,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 1 1 149 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 2 150 299 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 3 300 499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 4 500 749 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 5 750 999 $ [***] $ [***]Page 22 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.EPP Standard (Prevent + Insight) -Band 6 1,000 1,499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 7 1,500 1,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 8 2,000 2,499 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 9 2,500 4,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 10 5,000 9,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 11 10,000 24,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 12 25,000 49,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 13 50,000 99,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 14 100,000 249,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 15 250,000 499,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 16 500,000 999,999 $ [***] $ [***]EPP Standard (Prevent + Insight) -Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 1000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 250 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 25000 files/month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 500 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Private Cloud -Up to 5000 files/month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample Size up to5000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample Size up to25000 files per month 1 9,999,999 $ [***] $ [***]Falcon Sandbox Full Standalone(On Premise) Sample SizeUnlimited 1 9,999,999 $ [***] $ [***]Remote SSH access forintallation/upgrades. Price is perhour. 1 9,999,999 $ [***] $ [***]Remote Installation andconfiguration session. Price is persession. 1 9,999,999 $ [***] $ [***]Falcon Sandbox Bridge 1 9,999,999 $ [***] $ [***]Page 23 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon MalQuery 1 9,999,999 $ [***] $ [***]Falcon Spotlight - Band 1 1 149 $ [***] $ [***]Falcon Spotlight - Band 2 150 299 $ [***] $ [***]Falcon Spotlight - Band 3 300 499 $ [***] $ [***]Falcon Spotlight - Band 4 500 749 $ [***] $ [***]Falcon Spotlight - Band 5 750 999 $ [***] $ [***]Falcon Spotlight - Band 6 1,000 1,499 $ [***] $ [***]Falcon Spotlight - Band 7 1,500 1,999 $ [***] $ [***]Falcon Spotlight - Band 8 2,000 2,499 $ [***] $ [***]Falcon Spotlight - Band 9 2,500 4,999 $ [***] $ [***]Falcon Spotlight - Band 10 5,000 9,999 $ [***] $ [***]Falcon Spotlight - Band 11 10,000 24,999 $ [***] $ [***]Falcon Spotlight - Band 12 25,000 49,999 $ [***] $ [***]Falcon Spotlight - Band 13 50,000 99,999 $ [***] $ [***]Falcon Spotlight - Band 14 100,000 249,999 $ [***] $ [***]Falcon Spotlight - Band 15 250,000 499,999 $ [***] $ [***]Falcon Spotlight - Band 16 500,000 999,999 $ [***] $ [***]Falcon Spotlight - Band 17 1,000,000 9,999,999 $ [***] $ [***]Falcon Device Control - Band 1 1 149 $ [***] $ [***]Falcon Device Control - Band 2 150 299 $ [***] $ [***]Falcon Device Control - Band 3 300 499 $ [***] $ [***]Falcon Device Control - Band 4 500 749 $ [***] $ [***]Falcon Device Control - Band 5 750 999 $ [***] $ [***]Falcon Device Control - Band 6 1,000 1,499 $ [***] $ [***]Falcon Device Control - Band 7 1,500 1,999 $ [***] $ [***]Falcon Device Control - Band 8 2,000 2,499 $ [***] $ [***]Falcon Device Control - Band 9 2,500 4,999 $ [***] $ [***]Falcon Device Control - Band 10 5,000 9,999 $ [***] $ [***]Page 24 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions.Falcon Device Control - Band 11 10,000 24,999 $ [***] $ [***]Falcon Device Control - Band 12 25,000 49,999 $ [***] $ [***]Falcon Device Control - Band 13 50,000 99,999 $ [***] $ [***]Falcon Device Control - Band 14 100,000 249,999 $ [***] $ [***]Falcon Device Control - Band 15 250,000 499,999 $ [***] $ [***]Falcon Device Control - Band 16 500,000 999,999 $ [***] $ [***]Falcon Device Control - Band 17 1,000,000 9,999,999 $ [***] $ [***]Page 25 of 25[***] Certain information in this document has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment hasbeen requested with respect to the omitted portions. Exhibit 21.1 Jurisdiction of IncorporationName of Subsidiary or OrganizationSecureWorks, Inc. GeorgiaSecureWorks Australia Pty. Ltd. AustraliaSecureWorks Europe Limited United KingdomSecureWorks Europe S.R.L. RomaniaSecureWorks India Private Limited IndiaSecureWorks Japan K.K. JapanSecureWorks SAS France Exhibit 23.1CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRMWe hereby consent to the incorporation by reference in the Registration Statements on Form S‑8 (Nos. 333-210866 and 333-225925) of SecureWorks Corp.of our report dated March 28, 2019 relating to the financial statements and financial statement schedule, which appears in this Form 10‑K./s/ PricewaterhouseCoopers LLPAtlanta, GAMarch 28, 2019EXHIBIT 31.1CERTIFICATION OF CHIEF EXECUTIVE OFFICEROF THE COMPANY PURSUANT TO RULE 13a-14(a)OR RULE 15d-14(a) UNDER THE SECURITIES EXCHANGEACT OF 1934, AS ADOPTED PURSUANT TO SECTION 302OF THE SARBANES-OXLEY ACT OF 2002I, Michael R. Cote, certify that:1.I have reviewed this Annual Report on Form 10-K of SecureWorks Corp.;2.Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make thestatements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report;3.Based on my knowledge, the financial statements, and other financial information included in this report, fairly present in all material respects thefinancial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this report;4.The registrant’s other certifying officer(s) and I are responsible for establishing and maintaining disclosure controls and procedures (as defined inExchange Act Rules 13a-15(e) and 15d-15(e)) and internal control over financial reporting (as defined in Exchange Act Rules 13a-15(f) and 15d-15(f))for the registrant and have:(a)Designed such disclosure controls and procedures, or caused such disclosure controls and procedures to be designed under our supervision, to ensurethat material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities,particularly during the period in which this report is being prepared;(b)Designed such internal control over financial reporting, or caused such internal control over financial reporting to be designed under oursupervision, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for externalpurposes in accordance with generally accepted accounting principles;(c)Evaluated the effectiveness of the registrant’s disclosure controls and procedures and presented in this report our conclusions about the effectivenessof the disclosure controls and procedures, as of the end of the period covered by this report based on such evaluation; and(d)Disclosed in this report any change in the registrant’s internal control over financial reporting that occurred during the registrant’s most recent fiscalquarter (the registrant’s fourth fiscal quarter in the case of an annual report) that has materially affected, or is reasonably likely to materially affect,the registrant’s internal control over financial reporting; and5.The registrant’s other certifying officer(s) and I have disclosed, based on our most recent evaluation of internal control over financial reporting, to theregistrant’s auditors and the audit committee of the registrant’s board of directors (or persons performing the equivalent functions):(a)All significant deficiencies and material weaknesses in the design or operation of internal control over financial reporting which are reasonablylikely to adversely affect the registrant’s ability to record, process, summarize and report financial information; and(b)Any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant’s internal control overfinancial reporting.March 28, 2019 /s/ Michael R. Cote Michael R. Cote President and Chief Executive OfficerEXHIBIT 31.2CERTIFICATION OF CHIEF FINANCIAL OFFICEROF THE COMPANY PURSUANT TO RULE 13a-14(a)OR RULE 15d-14(a) UNDER THE SECURITIES EXCHANGEACT OF 1934, AS ADOPTED PURSUANT TO SECTION 302OF THE SARBANES-OXLEY ACT OF 2002I, R. Wayne Jackson, certify that:1.I have reviewed this Annual Report on Form 10-K of SecureWorks Corp.;2.Based on my knowledge, this report does not contain any untrue statement of a material fact or omit to state a material fact necessary to make thestatements made, in light of the circumstances under which such statements were made, not misleading with respect to the period covered by this report;3.Based on my knowledge, the financial statements, and other financial information included in this report, fairly present in all material respects thefinancial condition, results of operations and cash flows of the registrant as of, and for, the periods presented in this report;4.The registrant’s other certifying officer(s) and I are responsible for establishing and maintaining disclosure controls and procedures (as defined inExchange Act Rules 13a-15(e) and 15d-15(e)) and internal control over financial reporting (as defined in Exchange Act Rules 13a-15(f) and 15d-15(f))for the registrant and have:(a)Designed such disclosure controls and procedures, or caused such disclosure controls and procedures to be designed under our supervision, to ensurethat material information relating to the registrant, including its consolidated subsidiaries, is made known to us by others within those entities,particularly during the period in which this report is being prepared;(b)Designed such internal control over financial reporting, or caused such internal control over financial reporting to be designed under oursupervision, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for externalpurposes in accordance with generally accepted accounting principles;(c)Evaluated the effectiveness of the registrant’s disclosure controls and procedures and presented in this report our conclusions about the effectivenessof the disclosure controls and procedures, as of the end of the period covered by this report based on such evaluation; and(d)Disclosed in this report any change in the registrant’s internal control over financial reporting that occurred during the registrant’s most recent fiscalquarter (the registrant’s fourth fiscal quarter in the case of an annual report) that has materially affected, or is reasonably likely to materially affect,the registrant’s internal control over financial reporting; and5.The registrant’s other certifying officer(s) and I have disclosed, based on our most recent evaluation of internal control over financial reporting, to theregistrant’s auditors and the audit committee of the registrant’s board of directors (or persons performing the equivalent functions):(a)All significant deficiencies and material weaknesses in the design or operation of internal control over financial reporting which are reasonablylikely to adversely affect the registrant’s ability to record, process, summarize and report financial information; and(b)Any fraud, whether or not material, that involves management or other employees who have a significant role in the registrant’s internal control overfinancial reporting.March 28, 2019 /s/ R. Wayne Jackson R. Wayne Jackson Chief Financial OfficerEXHIBIT 32.1 CERTIFICATIONS OF CHIEF EXECUTIVE OFFICERAND CHIEF FINANCIAL OFFICER OF THE COMPANYPURSUANT TO RULE 13a-14(b) OR RULE 15d-14(b)UNDER THE SECURITIES EXCHANGE ACT OF 1934AND 18 U.S.C. SECTION 1350, AS ADOPTEDPURSUANT TO SECTION 906 OFTHE SARBANES-OXLEY ACT OF 2002Each of the undersigned hereby certifies, in his capacity as an officer of SecureWorks Corp. (the “Company”), for purposes of 18 U.S.C. Section 1350, asadopted pursuant to Section 906 of the Sarbanes-Oxley Act of 2002, that, to the best of his knowledge:1.The annual report on Form 10-K of the Company for the fiscal year ended February 1, 2019 fully complies with the requirements of Section 13(a) or15(d) of the Securities Exchange Act of 1934; and2.The information contained in such annual report on Form 10-K fairly presents, in all material respects, the financial condition and results ofoperations of the Company.Date:March 28, 2019 /s/ Michael R. Cote Michael R. Cote President and Chief Executive OfficerDate:March 28, 2019 /s/ R. Wayne Jackson R. Wayne Jackson Chief Financial Officer
Continue reading text version or see original annual report in PDF format above