scwx-20210129
00014686662021FYFALSE1P2YP3Y1111111111100014686662020-02-012021-01-29iso4217:USD00014686662020-07-31xbrli:shares0001468666us-gaap:CommonClassAMember2021-03-230001468666us-gaap:CommonClassBMember2021-03-23xbrli:pure0001468666scwx:DenaliMemberus-gaap:IPOMember2020-02-012021-01-2900014686662021-01-2900014686662020-01-31iso4217:USDxbrli:shares0001468666us-gaap:CommonClassAMember2021-01-290001468666us-gaap:CommonClassAMember2020-01-310001468666us-gaap:CommonClassBMember2020-01-310001468666us-gaap:CommonClassBMember2021-01-2900014686662019-02-022020-01-3100014686662018-02-032019-02-0100014686662019-02-0100014686662018-02-020001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2018-02-020001468666us-gaap:CommonStockMemberus-gaap:CommonClassBMember2018-02-020001468666us-gaap:AdditionalPaidInCapitalMember2018-02-020001468666us-gaap:RetainedEarningsMember2018-02-020001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2018-02-020001468666us-gaap:TreasuryStockCommonMember2018-02-020001468666us-gaap:RetainedEarningsMember2018-02-032019-02-010001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2018-02-032019-02-010001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2018-02-032019-02-010001468666us-gaap:AdditionalPaidInCapitalMember2018-02-032019-02-010001468666us-gaap:TreasuryStockCommonMember2018-02-032019-02-010001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2019-02-010001468666us-gaap:CommonStockMemberus-gaap:CommonClassBMember2019-02-010001468666us-gaap:AdditionalPaidInCapitalMember2019-02-010001468666us-gaap:RetainedEarningsMember2019-02-010001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2019-02-010001468666us-gaap:TreasuryStockCommonMember2019-02-010001468666us-gaap:RetainedEarningsMember2019-02-022020-01-310001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2019-02-022020-01-310001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2019-02-022020-01-310001468666us-gaap:AdditionalPaidInCapitalMember2019-02-022020-01-310001468666us-gaap:TreasuryStockCommonMember2019-02-022020-01-310001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2020-01-310001468666us-gaap:CommonStockMemberus-gaap:CommonClassBMember2020-01-310001468666us-gaap:AdditionalPaidInCapitalMember2020-01-310001468666us-gaap:RetainedEarningsMember2020-01-310001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2020-01-310001468666us-gaap:TreasuryStockCommonMember2020-01-310001468666us-gaap:RetainedEarningsMember2020-02-012021-01-290001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2020-02-012021-01-290001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2020-02-012021-01-290001468666us-gaap:AdditionalPaidInCapitalMember2020-02-012021-01-290001468666us-gaap:CommonStockMemberus-gaap:CommonClassAMember2021-01-290001468666us-gaap:CommonStockMemberus-gaap:CommonClassBMember2021-01-290001468666us-gaap:AdditionalPaidInCapitalMember2021-01-290001468666us-gaap:RetainedEarningsMember2021-01-290001468666us-gaap:AccumulatedOtherComprehensiveIncomeMember2021-01-290001468666us-gaap:TreasuryStockCommonMember2021-01-29scwx:segment0001468666srt:MinimumMember2020-02-012021-01-290001468666srt:MaximumMember2020-02-012021-01-290001468666us-gaap:LeaseholdImprovementsMembersrt:MaximumMember2020-02-012021-01-290001468666us-gaap:AccountingStandardsUpdate201602Member2019-02-020001468666scwx:DeferredCommissionsMember2021-01-290001468666scwx:DeferredCommissionsMember2020-01-310001468666scwx:DeferredFulfillmentCostsMember2021-01-290001468666scwx:DeferredFulfillmentCostsMember2020-01-310001468666scwx:SubscriptionBasedSolutionsMember2020-02-012021-01-290001468666scwx:SubscriptionBasedSolutionsMember2019-02-022020-01-310001468666scwx:SubscriptionBasedSolutionsMember2018-02-032019-02-010001468666scwx:CloudNativeSecurityAnalyticsSoftwareAsAServiceMember2020-02-012021-01-290001468666scwx:CloudNativeSecurityAnalyticsSoftwareAsAServiceMember2019-02-022020-01-310001468666scwx:CloudNativeSecurityAnalyticsSoftwareAsAServiceMember2018-02-032019-02-010001468666scwx:ProfessionalServicesMember2020-02-012021-01-290001468666scwx:ProfessionalServicesMember2019-02-022020-01-310001468666scwx:ProfessionalServicesMember2018-02-032019-02-010001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2020-02-012021-01-290001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2018-02-032019-02-010001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2019-02-022020-01-310001468666scwx:DelveLaboratoriesIncMember2020-09-210001468666scwx:DelveLaboratoriesIncMember2020-09-212020-09-210001468666scwx:DelveLaboratoriesIncMember2021-01-290001468666scwx:DelveLaboratoriesIncMemberus-gaap:TechnologyBasedIntangibleAssetsMember2020-09-212020-09-2100014686662021-01-30scwx:SubscriptionBasedSolutionsMember2021-01-290001468666scwx:ProfessionalServicesMember2021-01-302021-01-29scwx:performance_obligation0001468666scwx:ActivePerformanceObligationMember2021-01-290001468666scwx:ActivePerformanceObligationMember2021-01-302021-01-2900014686662022-01-29scwx:ActivePerformanceObligationMember2021-01-290001468666scwx:ActivePerformanceObligationMember2023-01-282021-01-290001468666scwx:ActivePerformanceObligationMember2024-01-262021-01-290001468666scwx:BacklogPerformanceObligationMember2021-01-290001468666scwx:BacklogPerformanceObligationMember2021-01-302021-01-290001468666scwx:BacklogPerformanceObligationMember2022-01-292021-01-290001468666scwx:BacklogPerformanceObligationMember2023-01-282021-01-290001468666scwx:BacklogPerformanceObligationMember2024-01-262021-01-2900014686662021-01-302021-01-2900014686662022-01-292021-01-2900014686662023-01-282021-01-2900014686662024-01-262021-01-290001468666scwx:DeferredCommissionsMember2020-02-012021-01-290001468666scwx:DeferredFulfillmentCostsMember2020-02-012021-01-290001468666scwx:DeferredCommissionsMember2019-02-010001468666scwx:DeferredCommissionsMember2019-02-022020-01-310001468666scwx:DeferredFulfillmentCostsMember2019-02-010001468666scwx:DeferredFulfillmentCostsMember2019-02-022020-01-310001468666scwx:DeferredCommissionsMember2019-08-020001468666scwx:DeferredCommissionsMember2019-11-010001468666scwx:DelveLaboratoriesIncMember2020-02-012021-01-290001468666us-gaap:CustomerRelationshipsMember2021-01-290001468666us-gaap:CustomerRelationshipsMember2020-01-310001468666us-gaap:TechnologyBasedIntangibleAssetsMember2021-01-290001468666us-gaap:TechnologyBasedIntangibleAssetsMember2020-01-310001468666us-gaap:TradeNamesMember2021-01-290001468666us-gaap:TradeNamesMember2020-01-310001468666us-gaap:LineOfCreditMemberus-gaap:RevolvingCreditFacilityMember2015-11-020001468666us-gaap:LineOfCreditMemberus-gaap:RevolvingCreditFacilityMember2015-11-022015-11-020001468666us-gaap:LineOfCreditMemberus-gaap:LondonInterbankOfferedRateLIBORMemberus-gaap:SubsequentEventMemberus-gaap:RevolvingCreditFacilityMember2021-01-302021-03-250001468666us-gaap:LineOfCreditMemberus-gaap:RevolvingCreditFacilityMember2020-01-310001468666us-gaap:LineOfCreditMemberus-gaap:RevolvingCreditFacilityMember2021-01-290001468666us-gaap:StateAndLocalJurisdictionMember2021-01-290001468666scwx:LeasedFacilitiesMember2020-02-012021-01-290001468666scwx:LeasedFacilitiesMember2019-02-022020-01-310001468666scwx:LeasedEquipmentMember2020-02-012021-01-290001468666scwx:LeasedEquipmentMember2019-02-022020-01-310001468666srt:MinimumMember2021-01-290001468666srt:MaximumMember2021-01-2900014686662018-09-2600014686662019-03-260001468666us-gaap:CommonClassAMemberscwx:A2016LongTermIncentivePlanMemberus-gaap:StockCompensationPlanMember2016-04-180001468666us-gaap:CommonClassAMemberscwx:A2016LongTermIncentivePlanMember2019-02-022020-01-310001468666us-gaap:CommonClassAMemberscwx:A2016LongTermIncentivePlanMember2021-01-290001468666us-gaap:CommonClassAMemberscwx:A2016LongTermIncentivePlanMember2016-04-182016-04-180001468666us-gaap:CommonClassAMemberus-gaap:EmployeeStockOptionMemberscwx:A2016LongTermIncentivePlanMember2016-04-182016-04-180001468666scwx:A2016LongTermIncentivePlanMember2016-04-182016-04-180001468666us-gaap:EmployeeStockOptionMemberscwx:A2016LongTermIncentivePlanMember2016-04-182016-04-180001468666us-gaap:EmployeeStockOptionMemberscwx:EmployeeorDirectorMember2019-02-022020-01-310001468666us-gaap:EmployeeStockOptionMemberscwx:EmployeeorDirectorMember2020-02-012021-01-290001468666us-gaap:EmployeeStockOptionMemberscwx:EmployeeorDirectorMember2018-02-032019-02-010001468666us-gaap:EmployeeStockOptionMember2020-02-012021-01-290001468666us-gaap:EmployeeStockOptionMember2019-02-022020-01-310001468666us-gaap:EmployeeStockOptionMember2018-02-032019-02-010001468666us-gaap:EmployeeStockOptionMember2018-02-020001468666us-gaap:EmployeeStockOptionMember2019-02-010001468666us-gaap:EmployeeStockOptionMember2020-01-310001468666us-gaap:EmployeeStockOptionMember2021-01-290001468666scwx:A2013StockIncentivePlanMemberscwx:EmployeeStockOptionTimeBasedMember2016-04-270001468666scwx:EmployeeStockOptionPerformanceBasedMemberscwx:A2013StockIncentivePlanMember2016-04-270001468666scwx:EmployeeStockOptionPerformanceBasedMemberscwx:A2013StockIncentivePlanMember2018-02-032019-02-010001468666scwx:EmployeeStockOptionPerformanceBasedMemberscwx:A2013StockIncentivePlanMember2019-02-022020-01-310001468666scwx:EmployeeStockOptionPerformanceBasedMemberscwx:A2013StockIncentivePlanMember2020-02-012021-01-290001468666scwx:A2013StockIncentivePlanMemberscwx:EmployeeStockOptionTimeBasedMember2021-01-290001468666us-gaap:EmployeeStockOptionMemberscwx:A2013StockIncentivePlanMember2019-02-022020-01-310001468666us-gaap:EmployeeStockOptionMemberscwx:A2013StockIncentivePlanMember2020-02-012021-01-290001468666us-gaap:EmployeeStockOptionMemberscwx:A2013StockIncentivePlanMember2018-02-032019-02-010001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2016-04-272016-04-270001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2021-01-290001468666scwx:RestrictedStockAndRestrictedStockUnitsPerformanceBasedMember2021-01-290001468666scwx:RestrictedStockAndRestrictedStockUnitsServiceBasedMember2021-01-290001468666scwx:RestrictedStockAndRestrictedStockUnitsPerformanceBasedMember2020-02-012021-01-290001468666us-gaap:RestrictedStockMember2020-02-012021-01-290001468666us-gaap:RestrictedStockMember2019-02-022020-01-310001468666us-gaap:RestrictedStockMember2018-02-032019-02-010001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2018-02-020001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2019-02-010001468666scwx:RestrictedStockAndRestrictedStockUnitsMember2020-01-310001468666us-gaap:CostOfSalesMember2020-02-012021-01-290001468666us-gaap:CostOfSalesMember2019-02-022020-01-310001468666us-gaap:CostOfSalesMember2018-02-032019-02-010001468666us-gaap:ResearchAndDevelopmentExpenseMember2020-02-012021-01-290001468666us-gaap:ResearchAndDevelopmentExpenseMember2019-02-022020-01-310001468666us-gaap:ResearchAndDevelopmentExpenseMember2018-02-032019-02-010001468666us-gaap:SellingAndMarketingExpenseMember2020-02-012021-01-290001468666us-gaap:SellingAndMarketingExpenseMember2019-02-022020-01-310001468666us-gaap:SellingAndMarketingExpenseMember2018-02-032019-02-010001468666us-gaap:GeneralAndAdministrativeExpenseMember2020-02-012021-01-290001468666us-gaap:GeneralAndAdministrativeExpenseMember2019-02-022020-01-310001468666us-gaap:GeneralAndAdministrativeExpenseMember2018-02-032019-02-010001468666scwx:PerformanceBasedCashAwardsMember2017-03-012020-01-310001468666scwx:IncentiveCashAwardsMember2020-02-012021-01-290001468666scwx:IncentiveCashAwardsMember2019-02-022020-01-310001468666scwx:IncentiveCashAwardsMember2018-02-032019-02-010001468666srt:ProFormaMember2020-02-012021-01-290001468666us-gaap:ComputerEquipmentMember2021-01-290001468666us-gaap:ComputerEquipmentMember2020-01-310001468666us-gaap:LeaseholdImprovementsMember2021-01-290001468666us-gaap:LeaseholdImprovementsMember2020-01-310001468666us-gaap:OtherMachineryAndEquipmentMember2021-01-290001468666us-gaap:OtherMachineryAndEquipmentMember2020-01-310001468666us-gaap:PropertyPlantAndEquipmentMembercountry:RO2020-02-012021-01-290001468666us-gaap:PropertyPlantAndEquipmentMembercountry:RO2019-02-022020-01-310001468666country:US2020-02-012021-01-290001468666country:US2019-02-022020-01-310001468666country:US2018-02-032019-02-010001468666us-gaap:NonUsMember2020-02-012021-01-290001468666us-gaap:NonUsMember2019-02-022020-01-310001468666us-gaap:NonUsMember2018-02-032019-02-010001468666country:US2021-01-290001468666country:US2020-01-310001468666us-gaap:NonUsMember2021-01-290001468666us-gaap:NonUsMember2020-01-310001468666us-gaap:PrincipalOwnerMemberscwx:DellInc.Member2020-02-012021-01-290001468666us-gaap:PrincipalOwnerMemberscwx:DellInc.Member2019-02-022020-01-310001468666us-gaap:PrincipalOwnerMemberscwx:DellInc.Member2018-02-032019-02-010001468666us-gaap:PrincipalOwnerMemberscwx:DellAndEMCMember2020-02-012021-01-290001468666us-gaap:PrincipalOwnerMemberscwx:DellAndEMCMember2019-02-022020-01-310001468666us-gaap:PrincipalOwnerMemberscwx:DellAndEMCMember2018-02-032019-02-010001468666us-gaap:SubsidiaryOfCommonParentMemberscwx:EMCandVMwareMember2020-02-012021-01-290001468666us-gaap:SubsidiaryOfCommonParentMemberscwx:EMCandVMwareMember2019-02-022020-01-310001468666us-gaap:SubsidiaryOfCommonParentMemberscwx:EMCandVMwareMember2018-02-032019-02-010001468666scwx:VMwareMemberus-gaap:SubsidiaryOfCommonParentMember2020-02-012021-01-290001468666scwx:SolutionsPurchasesMemberus-gaap:SubsidiaryOfCommonParentMemberscwx:CarbonBlackInc.Member2020-02-012021-01-290001468666scwx:SolutionsPurchasesMemberus-gaap:SubsidiaryOfCommonParentMemberscwx:CarbonBlackInc.Member2019-02-022020-01-310001468666us-gaap:SubsidiaryOfCommonParentMemberscwx:RSASecurityLLCAndPivotalSoftwareInc.Member2020-02-012021-01-290001468666us-gaap:SubsidiaryOfCommonParentMemberscwx:RSASecurityLLCAndPivotalSoftwareInc.Member2019-02-022020-01-310001468666us-gaap:SubsidiaryOfCommonParentMemberscwx:RSASecurityLLCAndPivotalSoftwareInc.Member2018-02-032019-02-010001468666srt:ChiefExecutiveOfficerMemberscwx:DellInc.Member2020-02-012021-01-290001468666srt:ChiefExecutiveOfficerMemberscwx:DellInc.Member2019-02-022020-01-310001468666srt:ChiefExecutiveOfficerMemberscwx:DellInc.Member2018-02-032019-02-010001468666us-gaap:PrincipalOwnerMemberscwx:ContractsNotYetTransferredMemberscwx:DellInc.Member2020-02-012021-01-290001468666us-gaap:PrincipalOwnerMemberscwx:ContractsNotYetTransferredMemberscwx:DellInc.Member2019-02-022020-01-310001468666us-gaap:PrincipalOwnerMemberscwx:ContractsNotYetTransferredMemberscwx:DellInc.Member2018-02-032019-02-010001468666scwx:DellInc.Member2021-01-290001468666scwx:SolutionsPurchasesMemberus-gaap:PrincipalOwnerMemberscwx:DellInc.Member2020-02-012021-01-290001468666scwx:SolutionsPurchasesMemberus-gaap:PrincipalOwnerMemberscwx:DellInc.Member2019-02-022020-01-310001468666scwx:SolutionsPurchasesMemberus-gaap:PrincipalOwnerMemberscwx:DellInc.Member2018-02-032019-02-010001468666us-gaap:PrincipalOwnerMemberscwx:DellInc.Member2021-01-290001468666us-gaap:PrincipalOwnerMemberscwx:DellInc.Member2020-01-3100014686662020-02-012020-05-0100014686662020-05-022020-07-3100014686662020-08-012020-10-3000014686662020-10-312021-01-2900014686662019-02-022019-05-0300014686662019-05-042019-08-0200014686662019-08-032019-11-0100014686662019-11-022020-01-310001468666us-gaap:LineOfCreditMemberus-gaap:RevolvingCreditFacilityMember2020-03-260001468666us-gaap:LineOfCreditMemberus-gaap:LondonInterbankOfferedRateLIBORMemberus-gaap:RevolvingCreditFacilityMember2020-03-262020-03-260001468666us-gaap:AllowanceForCreditLossMember2020-01-310001468666us-gaap:AllowanceForCreditLossMember2020-02-012021-01-290001468666us-gaap:AllowanceForCreditLossMember2021-01-290001468666us-gaap:AllowanceForCreditLossMember2019-02-010001468666us-gaap:AllowanceForCreditLossMember2019-02-022020-01-310001468666us-gaap:AllowanceForCreditLossMember2018-02-020001468666us-gaap:AllowanceForCreditLossMember2018-02-032019-02-01

UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
 FORM 10-K 
(Mark One)
 
 ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934
For the fiscal year endedJanuary 29, 2021
or
 TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES
EXCHANGE ACT OF 1934
For the transition period from            to           
 
Commission file number: 001-37748

https://cdn.kscope.io/1fcd168423e15f02da602034c9ca0e18-scwx-20210129_g1.jpg

SecureWorks Corp.
(Exact name of registrant as specified in its charter)
 
 
Delaware 27-0463349
(State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.)
One Concourse Parkway NE Suite 500, Atlanta, Georgia 30328
(Address of principal executive offices) (Zip Code)
Registrant’s telephone number, including area code: (404)327-6339
Securities registered pursuant to Section 12(b) of the Act:
 
Title of each classTrading Symbol(s)Name of each exchange on which registered
Class A Common Stock,SCWXThe Nasdaq Stock Market LLC
 par value $0.01 per share(Nasdaq Global Select Market)
 
Securities registered pursuant to Section 12(g) of the Act: None
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.   Yes   No 
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes  No 
Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes    No 
Indicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). Yes    No 
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, smaller reporting company, or an emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company,” and “emerging growth company” in Rule 12b-2 of the Exchange Act.
Large accelerated filer  Accelerated filer
Non-accelerated filer   Smaller reporting company 
Emerging growth company
If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act.
Indicate by check mark whether the registrant has filed a report on and attestation to its management’s assessment of the effectiveness of its internal control over financial reporting under Section 404(b) of the Sarbanes-Oxley Act (15 U.S.C.7262(b)) by the registered public accounting firm that prepared or issued its audit report 
Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes  No 
As of July 31, 2020, the last business day of the registrant’s most recently completed second fiscal quarter, the aggregate market value of the registrant’s common stock held by non-affiliates was approximately $123.1 million (based on the closing price of $11.96 per share of Class A common stock reported on the Nasdaq Global Select Market on that date).
As of March 23, 2021, there were 83,029,259 shares of the registrant’s common stock outstanding, consisting of 13,029,259 outstanding shares of Class A common stock and 70,000,000 outstanding shares of Class B common stock.
DOCUMENTS INCORPORATED BY REFERENCE
The information required by Part III of this report, to the extent not set forth herein, is incorporated by reference from the registrant’s proxy statement relating to the annual meeting of stockholders in 2021. Such proxy statement will be filed with the Securities and Exchange Commission within 120 days after the end of the fiscal year to which this report relates.




TABLE OF CONTENTS
 PAGE
 







CAUTIONARY NOTE REGARDING FORWARD-LOOKING STATEMENTS

This Annual Report on Form 10-K contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. The words “believe,” “may,” “will,” “would,” “could,” “potentially,” “anticipate,” “estimate,” “expect,” “intend,” “plan,” “aim,” “seek” and similar expressions that convey uncertainty regarding future events or outcomes as they relate to us or our management are intended to identify forward-looking statements. Our results could be materially different from our expectations because of various risks, including the risks discussed in this report under “Part I – Item 1A – Risk Factors” and in our other periodic and current reports filed with the Securities and Exchange Commission. Moreover, we operate in a very competitive and rapidly changing environment, and new risks emerge from time to time. All statements by us regarding our expected financial position, revenues, cash flows and other operating results, business strategy, legal proceedings and similar matters are forward-looking statements. Our expectations expressed or implied in these forward-looking statements may not turn out to be correct. Any forward-looking statement speaks only as of the date as of which such statement is made, and, except as required by law, we undertake no obligation to revise or update any forward-looking statement after the date as of which such statement was made, whether to reflect changes in circumstances or our expectations, the occurrence of unanticipated events, or otherwise.
3



Except where the context otherwise requires or where otherwise indicated, all references in this report to “Secureworks,” “we.” “us,” “our” and “our company” refer to SecureWorks Corp. and our subsidiaries on a consolidated basis, and all references to “Dell” refer to Dell Inc. and its subsidiaries on a consolidated basis.

Our fiscal year is the 52- or 53-week period ending on the Friday nearest January 31. Our 2021 fiscal year ended on January 29, 2021, our 2020 fiscal year ended on January 31, 2020, and our 2019 fiscal year ended on February 1, 2019.

Part I

Item 1. Business
Overview
We are a leading global cybersecurity provider of technology-driven security solutions singularly focused on protecting our customers by outpacing and outmaneuvering threat actors.
Our vision is to be the essential cybersecurity company for a digitally connected world by providing the software platform of choice to deliver our holistic approach to security at scale for our customers. We combine considerable experience from securing thousands of customers, deep and machine-learning capabilities in our software platform, and actionable insights from our team of elite researchers, analysts and consultants to create a powerful network effect that provides increasingly strong protection for our customers.
Through our vendor-inclusive approach, we create integrated and comprehensive solutions by proactively managing the collection of “point” products deployed by our customers to address specific security issues and provide solutions to close the gaps in their defenses. We seek to provide the right level of security for each customer's unique situation, which evolves as their organization grows and changes over time.
By aggregating and analyzing data from sources around the world, we offer solutions that enable organizations to:
prevent security breaches,
detect malicious activity,
respond rapidly when a security breach occurs, and
identify emerging threats.
We have pioneered an integrated approach that delivers a broad portfolio of security solutions to organizations of varying size and complexity. Our flexible and scalable solutions support the evolving needs of the largest, most sophisticated enterprises, as well as small and medium-sized businesses and U.S. state and local government agencies with limited in-house capabilities and resources.
We offer our customers:
software-as-a-service, or SaaS, solutions,
managed security services, and
professional services, including incident response services and security risk consulting.
Our solutions leverage the proprietary technologies, software security operations workflows, extensive expertise and knowledge of the tactics, techniques and procedures of the adversary that we have developed over more than 22 years. As key elements of our strategy, we seek to:
be the cloud-native security analytics software platform of choice,
broaden our reach with security service providers to deliver our security analytics software platform globally, and
empower the global security community to beat the adversary at scale.

4


Our Competitive Strengths
We believe that the following key competitive advantages will allow us to maintain and extend our leadership position in providing technology-driven security solutions:
A Leader in Technology-Driven Security Solutions. We are a global leader in providing technology-driven security solutions and believe we have become a mission-critical vendor to many of the large enterprises, small and medium-sized businesses and U.S. state and local government agencies we serve. We believe our position as a technology and market leader enhances our brand and positions our offerings as a preferred solution.
Purpose-Built, Proprietary Technology. At the core of our solutions are the proprietary TaegisTM software platform and Counter Threat PlatformTM that collect, aggregate, correlate and analyze billions of daily events and data points and generate enriched security intelligence on threat actor groups and global threat indicators.
Scalable Software Platforms with Powerful Network Effects. Our multi-tenant software platforms provide rapid threat detection and response. As our customer base increases, our software platforms are able to analyze more events, and the intelligence derived from these additional events makes the software platforms more effective. This in turn drives broader customer adoption and enhances the value of the solutions to both new and existing customers.
Threat Intelligence. Our proprietary and purpose-built technology uses analytical models and sophisticated algorithms to generate threat intelligence. This intelligence is augmented by our Counter Threat UnitTM research team, which conducts research into threat actors, uncovers new attack techniques, analyzes emerging threats and evaluates the risks posed to our customers. Applying this intelligence across our solutions portfolio provides customers with deeper insights and enriched context regarding tactics, techniques and procedures employed by those threat actors.
Global Customer Base. We have a global customer base providing visibility into the cyber threat landscape through 5,200 customers across 57 countries. We are able to gain near real-time insights that enable us to identify, detect and respond to threats quickly and effectively. We also are able to identify threats originating within a particular geographic area or related to a particular industry and proactively leverage this threat intelligence to protect our customers against these threats.
Integrated, Vendor-Inclusive Approach. Our solutions collect and process vast amounts of data across multiple stages of the threat lifecycle by integrating a wide array of proprietary and third-party security products. This vendor-inclusive approach allows us to aggregate events from a wide range of endpoint, network, cloud and business systems to enhance our understanding of customers’ networks and increase the effectiveness of our solutions.
Specialist Focus and Expertise. We have built our company, technology and culture with a singular focus on protecting our customers by delivering technology-driven security solutions. We believe this continued focus reinforces our differentiation from other information security vendors, including network providers, IT security product companies, and local and regional information security solutions providers.
Strong Team Culture. At our company, the fight against sophisticated and malicious cybersecurity threats is a personal one, and we take great pride in helping our customers protect their critical business data and processes. We dedicate significant resources to ensure that our culture and brand reflect our singular focus on protecting our customers.
Our Growth Strategy
Our strategy is to be the essential cybersecurity company for a digitally connected world. To pursue our strategy, we seek to:
Broaden our portfolio to include software-as-a-service solutions. In fiscal 2020, we launched our first SaaS application, now called Taegis Extended Detection and ResponseTM. There is a managed version of this called Managed Detection and ResponseTM which allows Secureworks or our partners to manage the application for customers. We expanded our SaaS portfolio in fiscal 2021 by launching our second application, TaegisTM Vulnerability Detection and Response, upon our acquisition of Delve Laboratories Inc. We intend to expand our Taegis portfolio with additional internally developed or acquired SaaS solutions.
Extend our technology leadership. We intend to enhance our leading technology-driven integrated suite of solutions by adding complementary solutions that strengthen the security posture of our customers. We intend to meet this goal by continuing to invest in research and development, increasing our global threat research capabilities and hiring personnel with extensive cybersecurity expertise.
Expand and diversify our customer base. We intend to continue to expand and diversify our customer base, both domestically and internationally, by investing in our demand generation and marketing capabilities, investing in direct and channel sales activities, further developing our strategic and distribution relationships, expanding our alliance partnerships with key technology providers, and pursuing opportunities across a broad range of industries. We also intend to continue increasing our
5



geographic footprint to further enhance our deep insight into the global threat landscape and our ability to deliver comprehensive threat intelligence to our customers.
Deepen our existing customer relationships. We provide scalable Software-as-a-Service and intend to continue leveraging the strong customer relationships and high customer satisfaction from across our customer base to sell additional solutions to existing customers. We will continue to invest in our account management, marketing initiatives and customer success programs in seeking to achieve high customer renewal rates, help customers realize greater value from their existing solutions and encourage them to expand their use of our solutions over time.
Attract and retain top talent. Our technology leadership, brand, exclusive focus on information security, customer-first culture and robust training and development program have enabled us to attract and retain highly skilled professionals with a passion for building a career in the information security industry. We will continue to invest in attracting and retaining top talent to support and enhance our information security offerings.
Our Technology
Our technology-driven security solutions offer an innovative approach to prevent, detect and respond to cybersecurity breaches. Our Taegis software platform and our Counter Threat Platform collect, aggregate, correlate and analyze billions of events daily from our extensive customer base utilizing sophisticated algorithms to detect malicious activity and deliver security countermeasures, dynamic intelligence and valuable context regarding the intentions and actions of cyber adversaries. Through our Taegis SaaS applications and Counter Threat managed security services, which are both sold on a subscription basis, we provide global visibility and insight into malicious activity, enabling our customers to detect, respond to and effectively remediate threats quickly.
We leverage threat intelligence, gained over 22 years of processing and handling events, to provide insight into how attacks are initiated and spread across our customers’ networks. The Taegis software platform and Counter Threat Platform also apply security intelligence based on threat indicators continuously gathered by our Counter Threat Unit research team through in-depth analysis of the cyber threat environment. This team conducts research into emerging threat actors and new attack tactics and develops countermeasures to enable customers to prevent and detect potential compromises. Our ability to see more security incidents along with the applied intelligence acts as an early warning system that enables us to proactively alert customers, apply protections and respond quickly with appropriate context. The more security events we see, the more effective our countermeasures, detections and response actions are. Our software platforms are designed to be vendor-inclusive, enabling our customers to aggregate events from a wide range of endpoint, network, cloud and business systems.
Taegis Software Platform
Our proprietary Taegis software platform, which we launched in fiscal 2020, was purpose-built as a cloud-native software platform that combines the power of machine-learning with security analytics and threat intelligence to unify detection and response across endpoint, network and cloud environments for better security outcomes and simpler security operations. The Taegis software platform is a core element for our SaaS applications, which leverage workflows designed leveraging the Company’s 22 years of security operations expertise and our integrated orchestration and automation capabilities to increase the speed of response actions. Our SaaS applications and related solution include:
Extended Detection and Response (XDR), our SaaS application that provides advanced security analytics combined with our security operations expertise and threat intelligence capabilities to detect and respond to attacks across endpoint, network and cloud environments.
Managed Detection and Response (ManagedXDR), our advanced managed security solution that provides customers with threat detection, investigations and response actions within the Taegis XDR SaaS application.
Vulnerability Detection and Response (VDR), our SaaS application that enables customers to identify and prioritize vulnerabilities with an automated, machine-learning based approach which prioritizes critical information for each vulnerability based on asset information, network telemetry, organization-specific data and external factors.
Counter Threat Platform
Our proprietary Secureworks Counter Threat Platform was built to be the foundation of our managed security services. It has a multi-tenant, distributed architecture that enables our software to run on a single platform while providing simultaneous access to multiple users. The timely analysis and routing of this security information enables our services to assess risk and report rapidly to our customers worldwide. The platform is flexible, permitting us to tailor our services to a customer’s unique environment and can be configured to identify specific security events of interest to a particular customer.

6



The Counter Threat Platform is supported by the following proprietary technologies:
Counter Threat Appliance. The Counter Threat Appliance is a server that facilitates secure non-intrusive communications of security information used to provide managed security services, while our platform enriches data with our intimate knowledge of threats and customer-specific intelligence to detect security incidents. A Counter Threat Appliance may be physical or virtual, which refers to the manner by which our technology is deployed to transmit information. Physical deployment involves the provisioning of a physical Company-owned server to a customer’s site, while virtual deployment entails the use of the existing customer infrastructure and our residing and operating in a customer’s virtual environment or platform. This technology supports a wide range of security and network devices, applications and endpoints to collect information on the customer environment, perform analytics and report to our security operations centers.
Multi-Purpose Logic Engine. Our Multi-Purpose Logic Engine is an analytics engine that leverages our broad visibility into the global threat environment and applied intelligence from the Counter Threat Unit to identify security incidents of interest. The engine intelligently analyzes billions of events into actionable information, providing valuable context to our security analysts to help inform their analysis of the security incidents and shorten the customer’s response time.
Portal. Powered by integrated intelligence and analytics tools, the portal delivers security-related information to customer executives, managers and security professionals and provides insights that help customers make better security decisions.
Security Operations Center Automation
We have developed several technologies to automate operations to identify, diagnose and respond to security information.
Threat Analysis Platform. We present threat information using a graphical user interface to provide a high-quality security analysis of threats targeting or occurring within a customer’s environment. Visualization enables our security analysts to detect patterns and relationships of security incidents within a customer environment and across our entire customer base. Our security analysts have access to all data collected from customer environments and human readable threat intelligence from our Counter Threat Unit to provide them with the context necessary to inform their analysis.
Ticket Management. Our ticket management system is based on Information Technology Infrastructure Library principles and delivers security monitoring and device management solutions to customers. A sophisticated and configurable workflow provides incident, change and problem management in a leveraged-service delivery model to enable our security operations centers to handle a higher volume of work with consistent quality.
Management and Monitoring Applications. To effectively manage and monitor all relevant infrastructure, we rely on a suite of purpose-built software applications which facilitate full lifecycle management of all software and configuration deployments and updates and monitoring of the health and availability of devices.
Other Proprietary Software Platform-Enabling Technologies
iSensor. Many of our customers use our proprietary network intrusion detection and prevention appliance, the iSensor. The iSensor detects and blocks malicious inbound and outbound traffic by performing in-line deep packet inspection and by applying countermeasures from the Counter Threat Unit.
Red Cloak. This Advanced Endpoint Threat Detection software allows us to apply our threat intelligence and advanced analytics to the endpoint to reduce the time required to detect a compromise and the effort required to respond. Red Cloak also allows us to develop strategic countermeasures that interdict tactics used by threat actors.
Threat Intelligence Management System, or TIMS. TIMS collects, correlates and analyzes billions of data points to catalogue threat actors and generate threat indicators. The data points are sourced from our managed security services, malware, social media, honeypots (or traps set to detect or counteract attempts at unauthorized use of information systems), open-source intelligence, hunting and incident response engagements, strategic relationships and priority research.
Catalog for Artifact and Signal Extraction, or CASE. CASE is a repository and a set of tools for the dynamic analysis of malware to catalogue behaviors and generate threat indicators. CASE feeds into TIMS threat indicators identified from the analysis of malware.
Attacker Database. Our Counter Threat Unit research team maintains a patented process for generating a proprietary Attacker Database that contains machine readable threat intelligence we apply to the Taegis software platform, Counter Threat Platform, iSensorTM, Red CloakTM Advanced Endpoint Threat Detection and third-party security controls.
7


Our Platform and Professional Services Offerings
We offer an integrated suite of technology-driven security solutions enabled by our Taegis software platform or Counter Threat Platform and our team of highly-skilled security experts. Our customers may subscribe to our full suite of solutions or elect to subscribe to various combinations of our individual solutions.
Taegis Offerings
In fiscal 2020, we launched our first SaaS application and related solution, now called Taegis XDR and Taegis ManagedXDR. The Taegis XDR application provides advanced security analytics that is enriched and informed by Secureworks’ 22-year history understanding the evolving threat environment and by the network effect of our diverse customer base.
Extended Detection and Response. Taegis XDR collects and processes vast amounts of data from a wide range of sources, while leveraging workflows designed using the company's extensive security operations expertise and integrated orchestration and automation capabilities to increase the speed of response actions. We expanded our Taegis SaaS applications in fiscal 2021 with the addition of Vulnerability Detection and ResponseTM, or VDR, upon our acquisition of Delve Laboratories Inc.
Taegis XDR analyzes activity from endpoint, network and cloud while reducing the number of false-positive results security professionals face. It detects advanced threats by correlating information from a variety of sources and threat intelligence feeds, integrating Secureworks’ knowledge of threat actor behaviors, and applying machine-learning to provide much-needed context about the threat. Taegis XDR builds trust in security alerts and frees security teams to focus on threats that matter.
Taegis XDR unifies security environments and analyzes all relevant signals in one place. Customers gain additional context so they can quickly and accurately judge the implications of each event.
By enabling collaborative investigations with seamless handoffs, Taegis enables customers to quickly reach conclusions with confidence. The built-in chat feature can be used right from the user interface during an investigation to get expert help from Secureworks in real-time.
The application allows for a quick, accurate, software-driven response that gives users the ability to automate the right action.
Taegis XDR is a cloud-based SaaS application that is continuously updated with new features and updates pushed to the production environment on a daily basis.
The application is designed to efficiently integrate into an organization’s current control framework.
Managed Detection and Response. The Taegis ManagedXDR solution leverages the detectors, analytics and correlation capabilities of Taegis XDR to identify advanced threats, and to expand the context for each alert. Knowledge gained from our long history of security analysis, threat research and incident response engagements informs the continuously updated threat intelligence and analytics used to recognize malicious activity. With more accurate detections and better context, customers are able to focus on the events that matter. When an event requires action, customers have the option to check analyst recommendations via an intuitive interface or collaborate directly with Secureworks analysts using the built-in chat feature. The Taegis ManagedXDR solution includes threat hunting to proactively isolate and contain threats that evade existing controls, and also incorporates incident response support to deploy quickly during a critical investigation.
Vulnerability Detection and Response. Taegis VDR follows a risk-based approach that prioritizes remediation based on the context of the customer's environment. VDR automates previous manual tasks, leverages machine-learning models, and eliminates the need for multiple software products to detect vulnerabilities across the endpoint, network and cloud.
VDR helps organizations reduce risk by simplifying security operations with a single solution to identify and respond to vulnerabilities instead of relying on multiple technologies.
VDR identifies those vulnerabilities that require remediation by deploying a machine-learning risk prioritization engine. The solution provides context to determine which vulnerabilities are most important to each customer. The machine-learning engine will continuously learn and improve its performance as it collects data over time, leading to a more effective and efficient vulnerability management program.
VDR features an automated approach to vulnerability management that helps an organization’s staff focus on meaningful actions.
Taegis XDR, Taegis ManagedXDR and Taegis VDR are the first in a suite of software-driven applications and solutions that Secureworks plans to release driven by our Taegis security analytics software platform.


8


Counter Threat Service Offerings
We offer a broad range of managed security services via our Counter Threat Platform to our customers primarily on a subscription basis that typically ranges from one to three years, including those highlighted below.
Security Monitoring. Security appliances, systems and servers generate extensive logs, alerts and other messages which must be continuously monitored, correlated and analyzed to identify security events of concern while generating a minimal number of false-positive results. Our security monitoring service collects, correlates and analyzes logs, alerts and other messages generated by most leading security technologies and critical information assets to identify anomalies and respond to threats in near real time.
Advanced Endpoint Threat Detection. Advanced endpoint threat detection, or AETD, improves security situational awareness and visibility through continuous monitoring that utilizes proprietary endpoint intelligence. AETD is a managed security service that monitors the state of endpoints (which include Windows servers, laptops and desktops) for threat indicators, investigates events to determine their severity, accuracy and context, and quickly escalates critical events to the customer’s attention.
Firewall and Next-Generation Firewall Services. We provide an array of firewall services ranging from the collection, organization and reporting of firewall information to its full management. Our firewall management services provide policy-based control over applications, users and content, device provisioning and deployment and enable customers to respond immediately to security events.
Managed Network Intrusion Detection System, or IDS, and Intrusion Prevention System, or IPS, Services. We provide a wide range of services to enable our customers to realize the benefits from these technologies and effectively identify threats faster. Our services include security monitoring, performance and availability management, device upgrades and patch management, policy and signature management, integration of threat intelligence and use of our proprietary iSensor device.
Vulnerability Management. We perform vulnerability scans designed to alert an organization to potential exposures and vulnerabilities in its network, including internal and external scans across network devices, servers, databases and other assets in on-premises and cloud environments.
Log Retention Services. We offer comprehensive log aggregation, retention, searching and reporting to ensure the integrity of confidential data and to conduct forensic investigations. Our log retention services provide support for a wide range of sources, allowing the capture and aggregation of millions of logs generated every day by critical information assets such as servers, routers, firewalls, databases, applications and other systems of the log retention appliance.
Delivery Options for Managed Security. Our services are designed to be flexible and scalable to complement the evolving security needs of our customers.
Managed. With our managed delivery options, we assume control of a customer’s security technology so the customer can focus on running its business. Customers selecting managed delivery obtain all of the benefits of our monitored delivery option, including access to our on-demand Counter Threat Platform. In addition, our team of security analysts will monitor and manage a customer’s security technology or selected devices, proactively update that security infrastructure to protect against emerging threats, identify vulnerabilities, ensure that the devices are properly configured with our latest countermeasures, and block or respond to immediate threats in accordance with the customer’s escalation policies.
Monitored. Customers selecting our monitored services obtain access to our on-demand Counter Threat Platform through our web-based portal, plus monitoring and analysis by our security analysts of events collected from security and network devices and applications. Our monitored services enhance our customers’ security position by providing them with valuable context from our team of security analysts and comprehensive reporting. Our ability to see more security incidents across our entire customer base along with our threat intelligence acts as an early warning system, which benefits customers by proactively alerting them to potential threats, applying protections and helping them respond quickly. We believe that the more we see, the more accurate our protections are, and the more effectively we can respond.

9


Professional Services
In addition to Taegis SaaS applications and managed security services, we also offer a variety of professional services, which include incident response and security and risk consulting, to accelerate adoption of our software solutions. We advise customers on a broad range of security and risk-related matters through both project-based and long-term contracts in addition to our Taegis SaaS applications and managed security services.
Incident Response
In our incident response engagements, we help customers rapidly analyze, contain and remediate security breaches to minimize their duration and impact. In addition, our incident response and consulting services can increase customer awareness of and interest in our Taegis SaaS applications as we help customers develop a stronger and more comprehensive security program and posture.
Incident Management Proactive Solutions. Through our incident management proactive solutions, we prepare and train customers to respond quickly and effectively to a security incident. Our incident management risk assessment evaluates a customer’s ability to detect, resist and respond to a targeted or advanced threat and exposure to these threats, including advanced persistent threats, in order to reduce the risk of compromise. Our response plan review supports our customers in developing an effective computer security incident response plan, based on security best practices, incorporating the latest threat intelligence tailored to the customer’s specific needs.
Emergency Incident Response Solutions. We seek to ensure that organizations experience minimal economic loss and operational disruption when a security incident occurs. Our security consultants work to minimize the duration and impact of any breach through incident management, surveillance, digital forensic analysis, malware analysis and reverse engineering.
Security and Risk Consulting
We help customers improve their security posture by comprehensively assessing their security capabilities, designing and building robust security programs, preparing employees against cyber-attacks, facilitating regulatory compliance and identifying, prioritizing and resolving the vulnerabilities that pose the greatest threat.
Our team has extensive experience conducting security, compliance and risk engagements across many industries and geographic areas, and under recent regulations and industry standards that impose security mandates. Professional services offered by the team include the following:
Taegis Professional Services. Our Taegis Professional Services assist customers by providing training, onboarding and integration services to assist with the implementation and adoption of our Taegis XDR application. The services include assessing the customer's environment, performing data integration activities and application training.
Technical Testing and Assessments. Our testing and assessment solutions provide customers with thorough security and risk evaluations that address logical, physical, technical and non-technical threats in order to identify gaps that create risk, construct a stronger security posture and meet compliance mandates. Our testing and assessments solutions include application security, network security and Red Team testing, which simulates cyber-attacks using real-world tactics, techniques and procedures.
Targeted Threat Hunting. The Targeted Threat Hunting solution uses proprietary technology to search customer networks to identify the presence of security compromises and entrenched threat actors operating in a customer’s environment. The solution draws on our threat intelligence and extensive experience countering cyber adversaries.
Security Residency Solutions. Our security residency solutions provide customers with security consultants who serve as extended members of their staff either on-site or remotely to extend and heighten an organization’s security expertise and capabilities. Residency solutions are combined with managed security services in complex enterprise environments to enhance the value customers experience. We align with the customers’ internal processes, integrate our data feeds into customer applications and dashboards, and produce customized analytics and reporting. In addition, we assist customers with handling the security events identified by our managed security services.

10


Research and Development
We focus our research and development efforts on enhancing and adding new functionality to our Taegis software platform and purpose-built technologies that are critical enablers of our solutions and services. Our research and development organization is responsible for the design, development and testing of all aspects of our suite of security solutions. We have deep security, software and data science expertise and work closely with our product management, customer success and support teams and with customers to gain insights into future product development opportunities. We focus our research on identifying next-generation threats and adversaries and developing countermeasures, which are continuously applied to our software platforms and are used to respond to the rapidly evolving security threat landscape. In addition to improving on our features, functionality and scalability, our research and development organization works closely with our information technology team to ensure that our software platforms are available, reliable and stable. The Taegis software platform and applications follow an agile development, continuous release process with new features pushed to production environments on a daily basis, and user interface enhancements released every two weeks.
We believe that innovation and the timely development of new solutions are essential to meeting the needs of our customers and improving our competitive position. During fiscal 2021, we introduced new features in our Taegis XDR application with the addition of log retention options, proprietary search query language, and flexible reporting. Additionally, we acquired a vulnerability scanning and prioritization software application that supports our long-term strategy and enhances the capabilities of our cloud-native security analytics software platform.
We plan to continue making significant investments in our research and development effort as we evolve and extend the capabilities of our solutions portfolio.
Our Customers
As of January 29, 2021, we had approximately 5,200 customers, including 400 Taegis and 3,400 managed security subscription customers, across 57 countries. We serve customers in a broad range of industries, including the financial services, manufacturing, technology, retail, insurance, utility and healthcare sectors. No one customer represented more than 10% of our annual revenue in any of our last three fiscal years. In fiscal 2021, financial services and manufacturing customers accounted for 23.1% and 26.1%, respectively, of our revenue. No other industries accounted for 10% or more of our fiscal 2021 revenue.
The fees we charge for our solutions vary based on a number of factors, including the solutions selected, the number of customer devices covered by the selected solutions, and the level of management we provide for the solutions. Approximately 76% of our revenue is derived from subscription-based arrangements, attributable to Taegis SaaS applications and managed security services, while approximately 24% is derived from professional services engagements. As we respond to the evolving needs of our customers, the relative mix of subscription-based solutions and professional services we provide our customers may fluctuate.
International revenue, which we define as revenue contracted through non-U.S. entities, represented approximately 30%, 25% and 22% of our revenue in fiscal 2021, fiscal 2020 and fiscal 2019, respectively. For additional information about our non-U.S. revenues and assets, see “Notes to Consolidated Financial Statements—Note 13—Selected Financial Information” in our consolidated financial statements included in this report.
Customer Success and Support
Customer success, training and support are key elements of our commitment to provide a superior customer experience and differentiated value. We have a comprehensive customer success training and support program to continuously improve the customer experience and to enhance the value that our customers derive from our solutions. We provide education, training and support on the functionality of our solutions so that our customers fully utilize the benefits. We regularly conduct customer surveys to improve and enhance both our customer relationships and solutions portfolio. We provide 24/7 application support for our Taegis XDR customers and VDR customers, as well as an integrated chat function. For our Taegis customers, we also integrate customer experience software that analyzes how customers use our applications, highlights new features available, and solicits customer feedback.

11


Sales and Marketing
Our sales, channel and marketing organizations work together closely to drive market awareness, building a strong sales pipeline and cultivate partner and customer relationships to drive growth. We offer SaaS solutions and managed security services primarily on a subscription basis. We sell these solutions under contracts with initial terms that typically range from one to three years and, as of January 29, 2021, averaged two years in duration. We provide security and risk consulting primarily under fixed-price contracts, although we perform some engagements under variable-priced contracts on a time-and-materials basis.
Sales
Our direct sales organization consists of inside sales and field sales personnel and solutions architects organized by core customer segments and geography. Our sales strategy varies based on the size of the company and the point-of-entry into an organization, which is primarily through chief information security officers or other IT and business leaders. Within North America, our direct sales organization has separate teams focused on new customer acquisition and account management, large enterprises and small and medium-sized businesses. We believe that continued additional investment in our direct and channel sales staff will contribute to our long-term growth. Our sales organizations are supported by security engineers who provide technical support to our sales personnel and solutions engineering for our end-customers.
We also have a dedicated team focused on channel sales who manage the relationships with our partners and work with them to win and support customers. We believe this direct/channel sales approach allows us to leverage the benefits of broader market coverage provided by a reseller channel while maintaining a direct connection with many of our customers.
Approximately 88% of our revenue in fiscal 2021 was generated through our direct sales force, in some cases in collaboration with members of Dell’s sales force, with the remaining portion generated through our channel partners.
Since our acquisition by Dell in February 2011, we have marketed our solutions through Dell’s channel partners as well as through our own and have entered into agreements with Dell to preserve, and potentially expand, our existing commercial arrangements with Dell.
Marketing
Our marketing strategy is focused on building market awareness of our portfolio to drive customer insights, generate demand, enable sales, build customer loyalty and increase the strength of the Secureworks brand. Our marketing team consists primarily of product marketing, field and channel marketing, demand generation and corporate communications.
Our primary marketing activities include:
digital marketing programs to engage and educate prospects while generating interest through product information, trials and demonstrations, reviews and case studies;
leveraging our proprietary research through content marketing and engagement on social channels like Twitter, LinkedIn and Facebook and on our own blogs;
search engine marketing and paid media advertising that drive traffic to our website;
press and industry analyst relations to build third-party validation and generate positive coverage for our company and our solutions;
online and face-to-face events, trade shows and industry events to create customer and prospect awareness; and
sales tools and field marketing events to enable our sales organization to convert leads more effectively into customers.
Alliance Partnerships
We maintain alliance partnerships with key technology providers who deliver capabilities we see as valuable in keeping our customers secure. These partnerships involve technology licensing, joint technology development, integration, research cooperation, co-marketing and sell-through arrangements. We license the technologies under agreements that generally have terms ranging from one to five years, subject to renewal in most cases, either upon notice of renewal or upon failure by us or the provider to give notice of termination to the other party. The provider generally may terminate any license upon advance notice to us of between 90 and 270 days. The technology partner license agreements generally provide for post-termination support, transition and wind-down periods that are intended to limit any disruption to our business that could result from a license termination. We generally are required under the agreements to make licensing payments in the form of fees or royalties at a discount off the list price, although some agreements also include volume or tiered pricing.
12


Competition
The markets for our technology-driven security solutions and services are intensely competitive, and we expect competition to continue to increase in the future with the introduction of new security solutions, new technologies and new market entrants. Conditions in our market could change rapidly and significantly as a result of technological advancements, partnerships, or acquisitions by our competitors. Changes in the threat and technology landscape have led to constantly evolving customer requirements for protection from security threats and adversaries.
We compete primarily against the following three types of security product and services providers, some of which operate principally in the large enterprise market and others in the market for small and medium-sized businesses:
security providers and niche IT security products and services such as FireEye, Inc., CrowdStrike, Inc., Rapid7, Inc. and Palo Alto Networks, Inc.;
diversified technology and telecommunications companies such as Cisco Systems, Inc., International Business Machines Corporation and AT&T Inc.; and
small regional MSSPs, including new market entrants, that compete in the small and medium-sized businesses market.
We believe that the principal competitive factors in our market include:
global visibility into the threat landscape;
ability to generate actionable intelligence based on historical data and emerging threats;
speed of innovation;
scalability and overall performance of platform technologies;
deep understanding of security operations best practices;
ability of our technology to integrate with a variety of third-party products;
ability to deliver SaaS solutions to meet specific customer needs;
ability to attract and retain high-quality professional staff with information security expertise;
brand awareness and reputation;
strength of sales and marketing efforts;
cost effectiveness;
customer success and support; and
breadth and richness of threat intelligence, including history of data collection and diversity and geographic scope of customers.
We believe that we generally compete favorably with our competitors on the basis of these factors as a result of the features and performance of our portfolio, the quality of our threat intelligence, the security expertise within our organization and the ease of integration of our solutions with other technology infrastructures. However, many of our competitors, particularly in the large enterprise market, have advantages over us because of their greater brand name recognition, larger customer bases, more extensive relationships within large commercial enterprises, more mature intellectual property portfolios and greater financial and technical resources.
Intellectual Property
Our intellectual property is an essential element of our business. To protect our intellectual property rights, we rely on a combination of patent, trademark, copyright, trade secret and other intellectual property laws as well as confidentiality, employee non-disclosure and invention assignment agreements.
Our employees and contractors involved in technology development are required to sign agreements acknowledging that all inventions, trade secrets, works of authorship, developments, processes and other intellectual property rights conceived or reduced to practice by them on our behalf are our property, and assigning to us any ownership that they may claim in those intellectual property rights. We maintain internal policies regarding confidentiality and disclosure. Our customer and resale contracts prohibit reverse engineering, decompiling and other similar uses of our technologies and require that our technologies be returned to us upon termination of the contract. We also require our vendors and other third parties who have access to our confidential information or proprietary technology to enter into confidentiality agreements with us.
13


Despite our precautions, it may be possible for third parties to obtain and use, without our consent, intellectual property that we own or otherwise have the right to use. Unauthorized use of our intellectual property by third parties, and the expenses we incur in protecting our intellectual property rights, may adversely affect our business.
Our industry is characterized by the existence of a large number of patents, which leads to frequent claims and related litigation regarding patent and other intellectual property rights. In particular, large and established companies in the IT security industry have extensive patent portfolios and are regularly involved in both offensive and defensive litigation. From time to time, third parties, including some of these large companies as well as non-practicing entities, may assert patent, copyright, trademark and other intellectual property rights against us, our channel partners or our end-customers, which we are obligated to indemnify against such claims under our standard license and other agreements. Successful claims of infringement by a third party, if any, could prevent us from performing certain solutions, require us to expend time and money to develop non-infringing solutions, or force us to pay substantial damages (including, in the United States, treble damages if we are found to have willfully infringed patents), royalties or other fees.
Patents and Patent Applications
As of January 29, 2021, we owned 47 issued patents and 14 pending patent applications in the United States and three issued patents and three pending patent applications outside the United States. The issued patents are currently expected to expire between 2023 and 2038. Although we believe that our patents as a whole are important to our business, we are not substantially dependent on any single patent.
We do not know whether any of our patent applications will result in the issuance of a patent or whether the examination process will require us to modify or narrow our claims, as has happened in the past with respect to certain claims. Any patents that may be issued to us may not provide us with any meaningful protection or competitive advantages, or may be contested, circumvented, found unenforceable or invalid, and we may not be able to prevent third parties from infringing upon them.
Trademarks and Copyrights
The U.S. Patent and Trademark Office has granted us federal registrations for some of our trademarks. Federal registration of trademarks is effective for as long as we continue to use the trademarks and maintain our registrations as permitted under federal law. We also have obtained protection for some of our trademarks, and have pending applications for trademark protection, in the European Community and various countries. We may, however, be unable to obtain trademark protection for our technologies and names that we use, and names, slogans or logos that we use or may use may be deemed non-distinctive, and therefore unable to distinguish our solutions from those of our competitors in one or more countries.
We have entered into a trademark license agreement with Dell Inc. under which Dell Inc. has granted us a non-exclusive, royalty-free worldwide license to use the trademark “DELL,” solely in the form of “SECUREWORKS-A DELL COMPANY,” in connection with our business and products, services and advertising and marketing materials related to our business.
Backlog
We define backlog as the non-cancellable value of subscription-based solutions to be provided under Taegis SaaS and managed security services contracted with a customer that have not yet been provisioned or installed. Backlog is not recorded in revenue, deferred revenue or elsewhere in our consolidated financial statements until we establish a contractual right to invoice, at which point it is recorded as revenue or deferred revenue, as appropriate. All contractual amounts included in backlog are available to be installed and revenue recognition commenced within the coming fiscal year. As of January 29, 2021 and January 31, 2020, backlog of subscription-based solutions was approximately $7.7 million and $12.9 million, respectively. Backlog is influenced by several factors, including seasonality, the compounding effects of renewals and the mix of solutions under contract with customers. Accordingly, we believe that fluctuations in backlog are not always a reliable indicator of future revenues.
Seasonality
Given the annual budget approval process of many of our customers, we have begun to see seasonal patterns in our business. Seasonal variations in our financial results may become more pronounced in future periods, with sales to new customers and additional sales to existing customers being greater in the second half of the year, particularly in the fourth quarter, as compared to the first half of the year. In addition, we also experience seasonality in our gross and operating margins, with lower margins in the first half of our fiscal year as a result of greater expenditures for payroll taxes and annual sales and marketing events. This seasonality may also affect the timing of our operating cash flow.

14


Human Capital Resources
Employee Population
As of January 29, 2021, we employed 2,696 full-time employees. Approximately 52.5 percent of our employees were located in the United States and the remainder were located in 24 other countries. None of our employees in the United States are represented by a labor organization or the subject of a collective-bargaining agreement. Employees of some of our foreign subsidiaries are represented on workers’ councils.
Compensation, Benefits and Well-being
We are committed to providing employees with compensation and benefits that support their physical, mental and financial well-being. We believe our compensation program is designed to attract and reward talented individuals who possess the skills necessary to support our business objectives and assist in the achievement of our strategic goals. In addition to competitive base salaries, eligible employees can receive short-term incentives and long-term cash or equity awards. We also offer employees a wide array of benefits, including life and health and welfare insurance, retirement benefits, and paid time off.
In response to the COVID-19 pandemic, we instituted a mandatory work-from-home policy for almost all but a small number of onsite essential personnel, and we restricted travel to essential “business-critical” needs. With the support and commitment of our employees, we were able to seamlessly pivot to a work-from-home model and continue protecting our customers without interruption. Early in the COVID-19 pandemic, our Chief Executive Officer hosted weekly all-hands update calls, and we believe open and on-going communications have been critical to maintaining our culture and productivity during the pandemic. During this period, we have taken a flexible approach to help our employees manage their work and personal responsibilities, with a focus on employee well-being, health and safety.
Diversity and Inclusion
We believe that our future growth and innovation depends on a company culture that promotes diversity and inclusion, and seek to advance these values in our hiring, development and advancement practices.
We also seek to connect our employees across regions and provide them with opportunities to enhance cultural awareness and enable collaboration.
Communication and Engagement
We strongly believe that our corporate culture depends on our employees’ engagement and understanding of their contribution to the achievement of our strategic imperatives, vision and mission. In addition to prioritizing regular communications, we conduct regular employee surveys to seek feedback on what is going well and where we can focus our efforts to do more. Our annual company survey surpassed an 80% participation rate in fiscal 2021, representing a wide cross section of our employee population. In addition, we have active employee resource groups, which are designed to address the need for more social and community interaction in our globally diverse workforce.
Community Involvement
We aim to give back to the communities where we live and work and believe that this commitment helps in our efforts to attract and retain employees. We partner with a variety of universities and inclusion-focused programs to promote technology education for all. Beyond contributions of cash, we encourage employee volunteerism at all of our locations, as well as volunteer service throughout the year.
Corporate Information
We are a holding company that conducts operations through our wholly-owned subsidiaries. The mailing address of our principal executive offices is One Concourse Parkway NE, Suite 500, Atlanta, Georgia 30328. Our telephone number at that address is (404) 327-6339.
Secureworks was acquired by Dell, Inc. in February 2011 and completed its initial public offering, or IPO, in April 2016. Upon the closing of our IPO, Dell Technologies Inc., the ultimate parent company of Dell, Inc., owned indirectly through Dell Inc. and Dell Inc.’s subsidiaries all shares of our outstanding Class B common stock, which as of January 29, 2021 represented approximately 84.9% of our total outstanding shares of common stock and approximately 98.3% of the combined voting power of both classes of our outstanding common stock.
We maintain a corporate Internet website at www.secureworks.com. We make available free of charge through our website our annual report on Form 10-K, quarterly reports on Form 10-Q, current reports on Form 8-K, and amendments to those reports, as soon as reasonably practicable after we electronically file the reports with, or furnish the reports to, the Securities and Exchange Commission. Information appearing on, or that can be accessed through, our website is not a part of this report.

15



Information about our Executive Officers
The following table sets forth information as of March 25, 2021 concerning our executive officers.
NameAgePosition
Michael R. Cote 60Chief Executive Officer
Paul M. Parrish59Senior Vice President, Chief Financial Officer
Wendy Thomas49President, Customer Success
Each executive officer is appointed by, and serves at the discretion of, our board of directors.
Michael R. Cote has served as our Chief Executive Officer since May 2015. He served as our General Manager and as Vice President of Dell from our acquisition by Dell in February 2011 through the closing of our initial public offering in April 2016. Before our acquisition by Dell, Mr. Cote had served as our Chairman, President and Chief Executive Officer since February 2002. Prior to joining Secureworks, Mr. Cote held executive positions with Talus Solutions Inc., a pricing and revenue management software firm acquired by Manugistics Group, Inc. in 2000. Mr. Cote joined Talus from MSI Solutions Inc., a web application development and systems integration company. In addition to his service in other technology executive roles, Mr. Cote's early career included international assignments with KPMG LLP, an accounting and consulting firm. Mr. Cote serves on the board of Children’s Healthcare of Atlanta, the Board of Regents at Boston College, the Board of Trustees at Marist School and since February 2019, the board of directors at Extrahop Networks, Inc.
Paul M. Parrish has served as our Senior Vice President and Chief Financial Officer since December 2019. Before joining us, Mr. Parrish most recently served as Chief Financial Officer of CIOX Health, LLC, a healthcare data management solutions company, from August 2016 to December 2019. Before joining Ciox, Mr. Parrish served as Chief Financial Officer of Brightree, LLC, a company providing a cloud-based software and services platform for the post-acute medical care market, from June 2014 to July 2016. Mr. Parrish’s previous experience includes multiple senior financial and accounting roles, including service as Chief Financial Officer of US Security Associates, Inc., a security services company, from September 2012 to January 2014, and Chief Financial Officer of S1 Corporation, a payments and financial services software company, from January 2009 to February 2012. Earlier in his career, Mr. Parrish was a Senior Manager with the global accounting firm Deloitte. Mr. Parrish is a Certified Public Accountant.

Wendy Thomas has served as our President, Customer Success, since April 2020. In this position, Ms. Thomas leads the Company’s managed security and consulting services, product development and counter-threat unit organizations. Ms. Thomas served as our Chief Product Officer from June 2019 until her appointment as President, Customer Success. Ms. Thomas was formerly our Senior Vice President, Business and Product Strategy, from March 2018 to June 2019, and Vice President, Strategic and Financial Planning, from March 2017 to March 2018. Previously, Ms. Thomas served as our Vice President, Financial Planning and Analysis from July 2015 to March 2017 and from June 2008 to June 2011. In addition, Ms. Thomas has served as Chief Financial Officer of Bridgevine, Inc. (currently Updater Inc.), a marketing software company, from November 2013 to July 2015, and as Vice President, Financial Planning and Analysis, at First Data Corporation (currently Fiserv, Inc.), a payment processing and financial services technology company, from July 2011 to October 2013. Earlier in her career, among other positions, Ms. Thomas held multiple finance roles at BellSouth Corporation, a telecommunications company, culminating in the position of Director, Finance.
16


Item 1A. Risk Factors
Risks Related to Our Business and Our Industry
We have a history of losses and may not achieve or maintain profitability.
We incurred net losses of $21.9 million in fiscal 2021, $31.7 million in fiscal 2020 and $39.1 million in fiscal 2019. Any failure to increase our revenue as we grow our business could prevent us from achieving or maintaining profitability on a consistent basis or at all. We expect our operating expenses to continue to increase as we implement our growth strategy to maintain and extend our technology leadership, expand and diversify our customer base and attract and retain top talent. Our strategic initiatives may be costlier than we expect, and we may not be able to increase our revenue to offset these increased operating expenses. Our revenue growth may slow or revenue may decline for a number of reasons described in this section. If we are unable to meet these risks as we encounter them, our business, financial condition and results of operations may suffer.
We must continue to enhance our existing solutions and technologies and develop or acquire new solutions and technologies, or we will lose customers and our competitive position will suffer.
Many of our customers operate in markets characterized by rapidly changing technologies, which require them to support a variety of hardware, software applications, operating systems and networks. As their technologies grow more complex, we expect these customers to face new and increasingly sophisticated methods of cyber-attack. To maintain or increase our market share, we must continue to adapt and improve our solutions in response to these changes without compromising the high service levels demanded by our customers. If we fail to predict accurately or react in a timely manner to the changing needs of our customers and emerging technological trends, we will lose customers, which will negatively affect our revenue, financial condition and results of operations.
Our future growth also depends on our ability to scale our Taegis security analytics software platform and our Counter Threat Platform to analyze an ever-increasing number of events. If the number of events grows to a level that our software platforms are unable to process effectively, or if our software platforms fail to automatically handle an increasing percentage of events or are unable to process a sudden, sharp increase in the number of events, we might fail to identify network, application and/or endpoint events as significant threat events, which could harm our customers and negatively affect our business and reputation.
We rely on personnel with extensive information security expertise, and the loss of, or our inability to attract and retain, qualified personnel in the highly competitive labor market for such expertise could harm our business.
Our future success depends on our ability to identify, attract, retain and motivate qualified personnel. We depend on the continued contributions of Michael R. Cote, our Chief Executive Officer, and our other senior executives, who have extensive information security expertise. The loss of any of these executives could harm our business and distract from the operating responsibilities of other executives engaged to search for their replacements.
Our Counter Threat Unit and security analyst teams are staffed with experts in information security, software coding, data science and advanced mathematics. We face intense competition in hiring individuals with the requisite expertise, including from companies with greater resources than ours. As a result, we may be unable to attract and retain suitably qualified individuals at acceptable compensation levels who are capable of meeting our growing technical, operational and managerial requirements. Any failure by us to do so could adversely affect our competitive market position, revenue, financial condition and results of operations.
We face intense competition, including from larger companies, and may lack sufficient financial or other resources to maintain or improve our competitive position.
The market for Taegis SaaS, managed security and other information security services is highly competitive, and we expect competition to intensify in the future. Increased competition in our market could result in greater pricing pressure, reduced profit margins, increased sales and marketing expenses and a failure to increase, or a loss of, market share.
Many of our existing and potential competitors, particularly in the large enterprise market, enjoy substantial competitive advantages because of their longer operating histories, greater brand name recognition, larger customer bases, more extensive customer relationships within large commercial enterprises, more mature intellectual property portfolios and greater financial and technical resources. In addition, some of our competitors have made acquisitions or entered into partnerships or other strategic relationships with one another to offer more comprehensive cybersecurity solutions than each could offer individually. Further, we expect pricing pressures within the information security market to intensify as a result of action by our larger competitors to reduce the prices of their security monitoring, detection and prevention products and security solutions. If we are unable to maintain or improve our competitive position with respect to our current or future competitors, our failure to do so could adversely affect our revenue growth and financial condition.
17


If we are unable to attract new customers, retain existing customers or increase our annual contract values, our revenue growth will be adversely affected.
To achieve revenue growth, we must expand our customer base, retain existing customers, and increase our annual contract values. In addition to attracting additional large enterprise and small and medium-sized business customers, our strategy is to continue to obtain non-U.S. customers, government entity customers and customers in other industry sectors in which our competitors may have a stronger position. If we fail to attract new customers, our revenue may cease to grow or may decline and our business may suffer.
Some customers elect not to renew their contracts with us or renew them on less favorable terms, and we may not be able, on a consistent basis, to increase our annual contract values by obtaining advantageous contract renewals. We offer Taegis SaaS and managed security services on a subscription basis under contracts with initial terms that typically range from one to three years and, as of January 29, 2021, averaged two years in duration. Our customers have no obligation to renew their contracts after the expiration of their terms. Our initial contracts with customers may include amounts for hardware, installation and professional services that may not recur. Further, if a customer renews a contract for a term longer than the preceding term, it may pay us greater total fees than it paid under the preceding contract, but still pay lower average annual fees, because we generally offer discounted rates in connection with longer contract terms. In any of these situations, we would need to sell additional solutions to maintain the same level of annual fees from the customer, but may be unable to do so.
We generate a significant portion of our revenue from customers in the financial services industry, and changes within that industry or an unfavorable review by the federal banking regulatory agencies could reduce demand for our solutions.
We derived approximately 23.1% of our revenue in fiscal 2021 from financial services institutions and expect to continue to derive a substantial portion of our revenue from customers in the financial services industry. Any of a variety of changes in that industry could adversely affect our revenue, profitability and financial condition. Spending by financial services customers on technology generally has fluctuated, and may continue to fluctuate, based on changes in economic conditions and on other factors, such as decisions by customers to reduce or restructure their technology spending in an attempt to improve profitability. Further, mergers or consolidations of financial institutions could reduce our current and potential customer base, resulting in a smaller market for our solutions.
Some of our solutions have been deemed to be mission-critical functions of our financial institution customers that are regulated by one or more member agencies of the Federal Financial Institutions Examination Council, or the FFIEC. We therefore are subject to examination by the member agencies of the FFIEC. A sufficiently unfavorable review of our operations could result in our financial institution customers not being allowed, or not choosing, to continue using our solutions, which could adversely affect our revenue, financial condition and results of operations.
If we fail to manage our growth effectively, we may be unable to execute our business plan and maintain high levels of customer service, and our operations may be disrupted.
As our customer base and solutions offerings continue to grow, we will seek to further expand our operations, which could place a strain on our resources and infrastructure and affect our ability to maintain the quality of our solutions, deploy our solutions, support our customers after deployment and foster our customer-focused culture. Our productivity, customer-focused culture and the quality of our solutions may be negatively affected if we do not integrate and train our new employees, particularly our sales and account management personnel, quickly and effectively. In addition, we may need to make substantial investments in additional IT infrastructure to support our growth and will have to maintain or improve our operational, financial and management controls and our reporting procedures, which will require substantial management effort and additional investments in our operations. If we are unable to manage our growth, expenses or business effectively, our financial condition, results of operations and profitability could be adversely affected.
Failure to maintain high-quality customer service and support functions could adversely affect our reputation and growth prospects.
Once our solutions are deployed within our customers’ networks, our customers depend on our technical and other support services to ensure the security of their IT systems. The potential for human error in connection with our customer service and support functions or the internal systems and networks that underpin our ability to provide solutions to our customers, even if promptly discovered and remediated, could disrupt customer operations, cause losses for customers or harm our internal operations, lead to regulatory fines or damage our reputation. In addition, if we do not effectively assist our customers to deploy our solutions, resolve post-deployment issues or provide effective ongoing support, our ability to sell additional solutions or subscriptions to existing customers could suffer and our reputation with potential customers could be damaged. If we fail to meet the requirements of our existing customers, particularly larger enterprises that may require higher levels of support, it may be more difficult to realize our strategy of selling higher-margin or different types of solutions to those customers.

18


Our results of operations may be adversely affected by service level agreements with some of our customers that require us to provide them with credits for service failures or inadequacies.
We have agreements with some of our customers in which we have committed to provide them our solutions at specified levels. If we are unable to meet the commitments, we may be obligated to extend service credits to those customers, or could face terminations of the service agreements. Damages for failure to meet the service levels specified in our service level agreements generally are limited to the fees charged over the previous 12 months, but, if challenged, such limits on damages payable by us may not be upheld, and we may be required to pay damages greater than such fees. Repeated or significant service failures or inadequacies could adversely affect our reputation and results of operations.
Because we recognize revenue ratably over the terms of our Taegis SaaS applications and managed security services contracts, decreases in sales of these solutions may not immediately be reflected in our results of operations.
In fiscal 2021, approximately 76% of our revenue was derived from subscription-based solutions, attributable to Taegis SaaS applications and managed security contracts, while approximately 24% was derived from professional services engagements. Our subscription contracts typically range from one to three years in duration and, as of January 29, 2021, averaged two years in duration. Revenue related to these contracts generally is recognized ratably over the contract term. As a result, we derive most of our quarterly revenue from contracts we entered into during previous fiscal quarters. A decline in new or renewed contracts and any renewals at reduced annual dollar amounts in a particular quarter may not be reflected in any significant manner in our revenue for that quarter, but would negatively affect revenue in future quarters. Accordingly, the effect of significant downturns in contracts may not be fully reflected in our results of operations until future periods. As of January 29, 2021, we billed approximately 57% of our recurring revenue in advance. We may not be able to adjust our outflows of cash to match any decreases in cash received from prepayments if sales decline. In addition, we may be unable to adjust our cost structure to reflect reduced revenue, which would have a negative effect on our earnings in future periods. Our subscription model also makes it difficult for us to increase our revenue rapidly through additional sales in any period, as revenue from new customers must be recognized over the applicable contract term. Accordingly, the effect of significant downturns in sales and market acceptance of our solutions may not be fully reflected in our results of operations in the current period, making it more difficult for investors to evaluate our financial performance.
Our sales cycles are long and unpredictable, and our sales efforts require considerable time and expense, which could adversely affect our results of operations.
Sales of our information security solutions usually require lengthy sales cycles, which are typically three to nine months, but can exceed 12 months for larger customers. Sales to our customers can be complex and require us to educate our customers about our technical capabilities and the use and benefits of our solutions. Customers typically pursue a significant evaluation and acceptance process, and their subscription decisions frequently are influenced by budgetary constraints, technology evaluations, multiple approvals and unplanned administrative, processing and other delays. We spend substantial time, effort and money in our sales efforts without any assurance that our efforts will generate long-term contracts. If we do not realize the sales we expect from potential customers, our revenue and results of operations could be adversely affected.
As we continue to expand sales of our information security solutions to customers located outside the United States, our business increasingly will be susceptible to risks associated with international sales and operations.
We have limited experience operating in international jurisdictions compared to our experience operating in the United States. We expect to increase our presence internationally through additional relationships with local and regional strategic and distribution partners and potentially through acquisitions of other companies. International revenue, which we define as revenue contracted through non-U.S. entities, contributed approximately 30% of our total revenue in fiscal 2021. Our relative lack of experience in operating our business outside the United States increases the risk that any international expansion efforts will not be successful. In addition, operating in international markets requires significant management attention and financial resources. The investment and additional resources required to establish operations and manage growth in other countries may not produce the expected levels of revenue or earnings. Conducting international operations subjects us to a variety of risks, including risks described elsewhere in this section. Such risks could negatively affect our international business and, consequently, our overall business, results of operations and financial condition.
The United Kingdom’s withdrawal from the European Union may adversely impact our operations in the United Kingdom and elsewhere.
Effective on January 31, 2020, the United Kingdom withdrew from the European Union in a process commonly referred to as “Brexit,” in accordance with the Treaty on European Union. Negotiation of some terms of the withdrawal has not yet been completed. Trade, immigration and commercial regulation may be subject to additional modification, and some of our customers may relocate some or all of their operations to jurisdictions outside of the United Kingdom as a result of Brexit. Any of these effects of Brexit, and others we cannot anticipate, could adversely affect our business, business opportunities and solutions.
19


We are exposed to fluctuations in currency exchange rates, which could negatively affect our financial condition and results of operations.
Our revenue and expenses denominated in foreign currencies are subject to fluctuations due to changes in foreign currency exchange rates. As we expand internationally in accordance with our growth strategy, we will enter into more sales contracts denominated in foreign currencies and incur incremental operating expenses outside the United States. Further, a strengthening of the U.S. dollar could increase the real cost of our solutions and subscriptions to our customers outside the United States, which could adversely affect our non-U.S. sales and results of operations. We do not currently hedge against the risks associated with currency fluctuations, but, as our international operations grow, we may begin to use foreign exchange forward contracts to partially mitigate the impact of fluctuations in net monetary assets denominated in foreign currencies. Any such hedges may be ineffective to protect us fully against foreign currency risk.
Governmental export or import controls could subject us to liability or limit our ability to compete in foreign markets.
Our information security solutions and technologies incorporate encryption technology and may be exported outside the United States only if we obtain an export license or qualify for an export license exception. Compliance with applicable regulatory requirements regarding the export of our solutions and technologies may create delays in the introduction of our solutions and technologies in international markets, prevent our customers with international operations from utilizing our solutions and technologies throughout their global systems or prevent the export of our solutions and technologies to some countries altogether. In addition, various countries regulate the import of our appliance-based technologies and have enacted laws that could limit our ability to distribute, and our customers’ ability to implement, our technologies in those countries. Any new export or import restrictions, new legislation or shifting approaches in the enforcement or scope of existing regulations, or in the countries, persons or technologies targeted by such regulations, could result in decreased use of our solutions and technologies by existing customers with international operations, loss of sales to potential customers with international operations and decreased revenue. If we fail to comply with export and import regulations, we may be denied export privileges, be subjected to fines or other penalties or fail to obtain entry for our technologies into other countries.
An inability to expand our key distribution relationships would constrain the growth of our business.
We intend to expand our distribution relationships to increase domestic and international sales. Approximately 12% of our revenue in fiscal 2021 was generated through our channel partners, which include referral agents, regional value-added resellers and trade associations. Our strategy is to increase the percentage of our revenue that we derive from sales through our channel partners. Our inability to maintain or further develop relationships with our current and prospective distribution partners could reduce sales of our solutions and adversely affect our revenue growth and financial condition.
Our agreements with our partners generally are non-exclusive, and our partners may have more established relationships with one or more of our competitors. If our partners do not effectively market and sell our solutions, if they choose to place greater emphasis on their own products or services or those offered by our competitors or if they fail to meet our customers’ needs, our ability to expand our business and sell our solutions may be adversely affected. Our business also may suffer from the loss of a substantial number of our partners, the failure to recruit additional partners, any reduction or delay in the sales of our solutions by our partners, or conflicts between sales by our partners and our direct sales and marketing activities.
Even if we do expand relationships with our channel partners, our results will reflect that the gross margins to us from sales by our partners generally are lower than gross margins to us from direct sales. In addition, sales by our partners are more likely than direct sales to involve collectability concerns and may contribute to periodic fluctuations in our results of operations.
Our technology alliance partnerships expose us to a range of business risks and uncertainties that could prevent us from realizing the benefits we seek from these partnerships.
We have entered, and intend to continue to enter, into technology alliance partnerships with third parties to support our future growth plans. Such relationships include technology licensing, joint technology development and integration, research cooperation, co-marketing and sell-through arrangements. We face a number of risks relating to our technology alliance partnerships that could prevent us from realizing the benefits we seek from these partnerships on a timely basis or at all. Technology alliance partnerships can require significant coordination between the partners and a significant commitment of time and resources by their technical staffs. In cases where we wish to integrate a partner’s products or services into our solutions, the integration process may be more difficult than we anticipate, and the risk of integration difficulties, incompatibility and undetected programming errors or defects may be higher than the risks normally associated with the introduction of new products or services. In addition, any particular relationship may not continue for any specific period of time. If we lose a significant technology alliance partner, we could lose the benefit of our investment of time, money and resources in the relationship. Moreover, we could be required to incur significant expenses to develop a new strategic alliance or to formulate and implement an alternative plan to pursue the opportunity that we targeted with the former partner.

20


Real or perceived defects, errors or vulnerabilities in our solutions or the failure or perceived failure of our solutions to prevent or detect a security breach could harm our reputation, cause us to lose customers and expose us to costly litigation.
Our solutions are complex and may contain defects or errors that are not detected until after their adoption by our customers. As a result of such defects, our customers may be vulnerable to cyber-attacks, and hackers or other threat actors may misappropriate our customers’ data or other assets or otherwise compromise their IT systems. In addition, because the techniques used to access or sabotage IT systems and networks change frequently and generally are not recognized until launched against a target, an advanced attack could emerge that our solutions are unable to detect or prevent. A security breach of proprietary information could result in significant legal and financial exposure, damage to our reputation and a loss of confidence in the security of our solutions that could have an adverse effect on our business.
If any of our customers experiences an IT security breach after adopting our solutions, even if our solutions have blocked the theft of any data or provided some form of remediation, the customer could be disappointed with our solutions and could look to our competitors for alternatives to our solutions. In addition, if any enterprise or government entity publicly known to use our solutions is the subject of a publicized cyber-attack, some of our other current customers could seek to replace our solutions with those provided by our competitors. Further, our reputation could be damaged if a cyber-attack were to occur through a customer's security or network devices, applications or endpoints that we are not contractually obligated to monitor, if there is a perception that Secureworks monitors all the affected customer's devices, applications and endpoints.
Any person that circumvents our security measures could misappropriate the confidential information or other valuable property of our customers or disrupt their operations. Because our solutions provide and monitor information security and may protect valuable information, we could face liability claims or claims for breach of service level agreements. Provisions in our service agreements that limit our exposure to liability claims may not be enforceable in some circumstances or may not protect us fully against such claims and related costs. Alleviating any of these problems could require significant expenditures by us and result in interruptions to and delays in the delivery of our solutions, which could cause us to lose existing or potential customers and damage our business and prospects.
Cyber-attacks or other data security incidents that disrupt our operations or result in the breach or other compromise of proprietary or confidential information about us or our workforce, customers or other third parties could harm our business and expose us to costly regulatory enforcement and other liability.
As a well-known information security solutions provider, we are a high-profile target and our websites, networks, information systems, solutions and technologies may be selected for sabotage, disruption or misappropriation by cyber-attacks specifically designed to interrupt our business and harm our reputation. Our solutions frequently involve the collection, filtering and logging of our customers’ information, while our enterprise operations involve the collection, processing, storage and disposition of our own human resources, intellectual property and other information. We also rely in certain limited capacities on third-party data management providers and other vendors to host, accept, transmit or otherwise process electronic data in connection with our business activities. Criminal or other threat actors may seek to penetrate our network security or the security of our third-party service providers and misappropriate or compromise our confidential information or that of our customers or other third parties, create system disruptions or cause shutdowns. We may experience breaches or other compromises of our information technology systems. Further, hardware and operating system software and applications that we produce or procure from third parties may contain defects in design or manufacture that could unexpectedly provide access to a threat actor to our systems and data. The shift to work-from-home arrangements resulting from the COVID-19 pandemic may also increase our vulnerability, as third-party providers are working remotely and using home networks that may pose a significant risk to network security.
The costs to address the foregoing security problems and security vulnerabilities before or after a cyber incident could be significant, regardless of whether incidents result from an attack on us directly or on third-party vendors upon which we rely. Cyber-attacks could compromise our internal systems and products and the systems of our customers or third-party service providers, resulting in interruptions, delays, or cessation of service that could disrupt business operations for us and our customers and that could impede our sales. Remediation efforts may not be successful or timely. Breaches of our security measures or those of our third-party service providers and the unapproved dissemination of proprietary information or sensitive or confidential data about us or our customers or other third parties could expose us, our customers or other affected third parties to a risk of loss or misuse of this information, result in regulatory enforcement, litigation and potential liability for us, damage our brand and reputation or otherwise harm our business.

21


If our solutions do not interoperate with our customers’ IT infrastructure, our solutions may become less competitive and our results of operations may be harmed.
Our solutions must effectively interoperate with each customer’s existing or future IT infrastructure, which often has different specifications, utilizes multiple protocol standards, deploys products and services from multiple vendors and contains multiple generations of products and services that have been added over time. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems and avoid disruptions when we provide software updates or patches to defend against particular vulnerabilities. Ineffective interoperation could increase the risk of a successful cyber-attack and violations of our service level agreements, which would require us to provide service credits that would reduce our revenue.
Loss of our right or ability to use various third-party technologies could result in short-term disruptions to our business.
We incorporate some third-party technologies into our solutions and may seek to incorporate additional third-party technologies in the future. Any loss of our right to use third-party or other technologies could result in delays in producing or delivering our solutions until we identify and integrate equivalent technologies. If any of the technologies we license or purchase from others, or functional equivalents of these technologies, are no longer available to us or are no longer offered to us on commercially reasonable terms, we would be required either to redesign our solutions and devices to function with technologies available from other parties or to develop these components ourselves, which could result in increased costs or delays in the delivery of our solutions and in the release of new offerings. We also might have to limit the features available in our current or future solutions. If we fail to maintain or renegotiate some of our technology agreements with third parties, we could face significant delays and diversion of resources in attempting to license and integrate other technologies with equivalent functions. Any errors or defects in third-party technologies, any inability to utilize third-party technologies as contemplated, or any inability to procure and implement suitable replacement technologies could adversely affect our business and results of operations by impeding delivery of our solutions.
New and evolving information security, cybersecurity and data privacy laws and regulations may result in increased compliance costs, impediments to the development or performance of our offerings, and monetary or other penalties.
We are currently subject, and may become further subject, to federal, state and foreign laws and regulations regarding the privacy and protection of personal data or other potentially sensitive information. These laws and regulations address a range of issues, including data privacy, cybersecurity and restrictions or technological requirements regarding the collection, use, storage, protection, retention or transfer of data. The regulatory framework for data privacy and cybersecurity issues worldwide can vary substantially from jurisdiction to jurisdiction, is rapidly evolving and is likely to remain uncertain for the foreseeable future. In the United States, these include laws and regulations promulgated under the authority of state attorneys general. In the United States, state laws also provide for disparate data breach notification regimes that may trigger consumer, customer or regulator notifications, all of which could apply to us in a situation where consumer or employee information is accessed or acquired by unauthorized persons in a “data breach”, depending on the information affected. There also have been a number of recent legislative proposals in the United States, at both the federal and state level, that would impose new obligations in the areas of privacy, information security and cybersecurity.
Internationally, most of the jurisdictions in which we operate have established their own data security and privacy legal frameworks with which we or our customers must comply. For example, in the European Economic Area, the General Data Protection Regulation, or GDPR, imposes stringent operational and governance requirements for companies that collect or process personal data of residents of the European Union and Iceland, Norway and Lichtenstein. The GDPR also provides for significant penalties for non-compliance, which can be up to four percent of annual worldwide “turnover” (a measure similar to revenues in the United States). Some countries are considering or have enacted legislation requiring local storage and processing of data that could increase the cost and complexity of delivering our services. In addition, under the GDPR and a growing number of other legislative and regulatory requirements globally, jurisdictions are adopting consumer, regulator and customer notification and other requirements in the event of a data breach, with the potential for fines and the possibility of such notifications resulting in penalties for late notice or investigations or litigation relating to the reasonableness of security measures.
The costs of compliance with, and other burdens imposed by, these laws and regulations may become substantial and may limit the use and adoption of our offerings, require us to change our business practices, impede the performance and development of our solutions, lead to significant fines, penalties or liabilities for noncompliance with such laws or regulations, including through individual or class action litigation, or result in reputational harm. We also may be subject to claims of liability or responsibility for the actions of third parties with which we interact or upon which we rely in relation to various services, including, among others, vendors and business partners.

22


If we are not able to maintain and enhance our brand, our revenue and profitability could be adversely affected.
We believe that maintaining and enhancing the Secureworks brand is critical to our relationships with our existing and potential customers, channel partners and employees and to our revenue growth and profitability. Our brand promotion activities, however, may not be successful. Any successful promotion of our brand will depend on our marketing and public relations efforts, our ability to continue to offer high-quality information security solutions and our ability to successfully differentiate our solutions from the services offered by our competitors.
We believe our association with Dell has helped us to build relationships with many of our customers because of Dell’s globally recognized brand and the favorable market perception of the quality of its products. We have entered into a trademark license agreement with Dell Inc. under which Dell Inc. has granted us a non-exclusive, royalty-free worldwide license to use the trademark “DELL,” solely in the form of “SECUREWORKS-A DELL COMPANY,” in connection with our business and products, services and advertising and marketing materials related to our business. Under the agreement, our use of the Dell trademark in connection with any product, service or otherwise is subject to Dell Inc.’s prior review and written approval, which may be revoked at any time. We must immediately cease use of the licensed trademark generally or in connection with any product, services or materials upon Dell Inc.’s written request. The agreement is terminable at will by either party, and we must cease all use of the Dell trademark upon any such termination. If we discontinue our association with Dell in the future, our ability to attract new customers may suffer.
We may expand through acquisitions of other companies, which could divert our management’s attention from our current business and could result in unforeseen operating difficulties, increased costs and dilution to our stockholders.
We may make strategic acquisitions of other companies to supplement our internal growth. We may not realize the anticipated benefits of any acquisition we are able to complete. We could experience unforeseen operating difficulties in assimilating or integrating the businesses, technologies, services, products, personnel or operations of acquired companies, especially if the key personnel of any acquired company choose not to work for us. To complete an acquisition, we may be required to use a substantial amount of our cash, sell or use equity securities or incur debt to secure additional funds. If we raise additional funds through issuances of equity or convertible debt securities, our existing stockholders could suffer significant dilution, and any new equity securities we issue could have rights, preferences and privileges senior to those of our Class A common stock. Any debt financing obtained by us in the future could involve restrictive covenants that will limit our capital-raising activities and operating flexibility. In addition, we may not be able to obtain additional financing on terms favorable to us or at all, which could limit our ability to engage in acquisitions.
Earthquakes, fires, power outages, floods, terrorist attacks, public health issues such as COVID-19 and other catastrophic events could disrupt our business and ability to serve our customers and could have a material adverse effect on our business, results of operations or financial condition.
A significant natural disaster, such as an earthquake, a fire, a flood or a significant power outage, or a widespread public health issue, such as the ongoing COVID-19 pandemic, could have a material adverse effect on our business, results of operations or financial condition. Although our four security operations centers are designed to be redundant and to offer seamless backup support in an emergency, we rely on two data centers and public cloud providers to sustain our operations. While each of these data centers and public cloud providers are capable of sustaining our operations individually, a simultaneous failure of the centers or public cloud providers could disrupt our ability to serve our customers.
In addition, our ability to deliver our solutions as agreed with our customers depends on the ability of our supply chain, manufacturing vendors or logistics providers to deliver products or perform services we have procured from them. If any natural disaster or other catastrophic event, including a pandemic such as COVID-19, impairs the ability of our vendors or service providers to support us on a timely basis, our ability to perform our customer engagements may suffer. Disruptions from COVID-19 or a similar pandemic or public health issue could include, and have included, restrictions on the ability of our employees or the employees of our customers, vendors or suppliers to travel, or closures of our facilities or the facilities of these third parties. Such restrictions or closures could affect our ability to sell our solutions, develop and maintain customer relationships or render services, such as our consulting services, could adversely affect our ability to generate revenues or could lead to inadvertent breaches of contract by us or by our customers, vendors or suppliers.
During fiscal 2021, we experienced a limited reduction in customer demand that we believe is attributable to COVID-19 and that we believe may impact our results in future periods. Although we are unable to predict the extent and severity of all future impacts of COVID-19, the pandemic might further curtail customer spending, lead to delayed or deferred purchasing decisions, lengthen sales cycles and result in delays in receiving customer or partner payments. These effects, individually or in the aggregate, could have a material negative impact on our business and future financial results.

23


Risks Related to Intellectual Property
We rely in part on patents to protect our intellectual property rights, and if our patents are ineffective in doing so, third parties may be able to use aspects of our proprietary technology without compensating us.
As of January 29, 2021, we owned 47 issued patents and 14 pending patent applications in the United States and three issued patents and three pending patent applications outside the United States. Any failure of our patents and patent strategy to protect our intellectual property rights adequately could harm our competitive position. The legal systems of some countries do not favor the aggressive enforcement of patents, and the laws of other countries may not allow us to protect our inventions with patents to the same extent as U.S. laws. Changes in patent laws, implementing regulations or the interpretation of patent laws may diminish the value of our rights. Our competitors may design around technologies we have patented, licensed or developed. In addition, the issuance of a patent does not give us the right to practice the patented invention. Third parties may have blocking patents that could prevent us from marketing our solutions or practicing our own patented technology. If any of our patents is challenged, invalidated or circumvented by third parties, and if we do not own or have exclusive rights to other enforceable patents protecting our solutions or other technologies, competitors and other third parties could market products or services and use processes that incorporate aspects of our proprietary technology without compensating us, which may have an adverse effect on our business.
If we are unable to protect, maintain or enforce our non-patented intellectual property rights and proprietary information, our competitive position could be harmed and we could be required to incur significant expenses to enforce our rights.
Our business relies in part on non-patented intellectual property rights and proprietary information, such as trade secrets, confidential information and know-how, all of which offer only limited protection to our technology. The legal standards relating to the validity, enforceability and scope of protection of intellectual property rights in the information technology industry are highly uncertain and evolving. Although we regularly enter into non-disclosure and confidentiality agreements with employees, vendors, customers and other third parties, these agreements may be breached or otherwise fail to prevent disclosure of proprietary or confidential information effectively or to provide an adequate remedy in the event of such unauthorized disclosure. Our ability to police that misappropriation or infringement is uncertain, particularly in other countries. Costly and time-consuming litigation could be necessary to enforce and determine the scope of our proprietary rights, and failure to maintain trade secret protection could adversely affect our competitive business position.
Claims by others that we infringe their proprietary technology could harm our business and financial condition.
Third parties could claim that our technologies and the processes underlying our solutions infringe or otherwise violate their proprietary rights. The software and technology industries are characterized by the existence of a large number of patents, copyrights, trademarks and trade secrets and by frequent litigation, including by non-practicing entities, based on allegations of infringement or other violations of intellectual property rights, and we expect that such claims may increase as competition in the information security market continues to intensify, as we introduce new solutions (including in geographic areas where we currently do not operate) and as business-model or product or service overlaps between our competitors and us continue to occur. For example, in fiscal 2016, we settled litigation in which a third party alleged that aspects of our business and solutions infringed and induced the infringement of two of its U.S. patents relating to network intrusion and event monitoring technology.
Our use of open source technology could require us in some circumstances to make available source code of our modifications to that technology, which could include source code of our proprietary technologies, and also may restrict our ability to commercialize our solutions.
Some of our solutions and technologies incorporate software licensed by its authors or other third parties under open source licenses. To the extent that we use open source software, we face risks arising from the scope and requirements of common open source software licenses. Some of these licenses contain requirements that we make available source code for modifications or derivative works we create based on the open source software, and that we license such modifications or derivative works under the terms of a particular open source license or other license granting third parties certain rights of further use. If we combine our proprietary technology with open source software in a certain manner, we may face claims from time to time from third parties claiming ownership of, or demanding release of, the open source software or derivative works that we developed using such software, which could include our proprietary source code, or otherwise seeking to enforce the terms of the applicable open source license.
Our ability to commercialize solutions or technologies incorporating open source software may be restricted because, among other reasons, open source license terms may be ambiguous and may result in unanticipated or uncertain obligations regarding our solutions, litigation or loss of the right to use this software. Therefore, there is a risk that the terms of these licenses will be construed in a manner that imposes unanticipated conditions or restrictions on our ability to commercialize our solutions, and we could be required to seek licenses from third parties to continue offering our solutions, to re-engineer our technology or to discontinue offering our solutions if re-engineering cannot be accomplished in a commercially reasonable manner.
24


Risks Related to Our Relationship with Dell and Dell Technologies
Our inability to resolve in a manner favorable to us any potential conflicts or disputes that arise between us and Dell or Dell Technologies with respect to our past and ongoing relationships may adversely affect our business and prospects.
Potential conflicts or disputes may arise between Dell or Dell Technologies and us in a number of areas relating to our past or ongoing relationships, including:
intellectual property, tax, employee benefit, indemnification and other matters arising from our agreements and relationship with Dell;
employee retention and recruiting;
business combinations involving us;
our ability to engage in activities with certain channel, technology or other marketing partners;
sales or dispositions by Dell Technologies of all or any portion of its beneficial ownership interest in us;
the nature, quality and pricing of services Dell has agreed to provide us;
business opportunities that may be attractive to both Dell and us;
Dell’s ability to use and sublicense patents that we have licensed to Dell under a patent license agreement; and
product or technology development or marketing activities that may require consent of Dell or Dell Technologies.
The resolution of any potential conflicts or disputes between us and Dell or Dell Technologies over these or other matters may be less favorable to us than the resolution we might achieve if we were dealing with an unaffiliated party.
If Dell Technologies, Dell or Dell Technologies’ other affiliates or Silver Lake or its affiliates engage in the same type of business we conduct or take advantage of business opportunities that might be attractive to us, our ability to operate successfully and expand our business may be hampered.
Our certificate of incorporation, or charter, provides that, except as otherwise agreed in writing between us and Dell Technologies, Dell or Dell Technologies’ other affiliates (other than us or our controlled affiliates), referred to as the Dell Technologies Entities, have no duty to refrain from:
engaging in the same or similar activities or lines of business as those in which we are engaged;
doing business with any of our customers, customers or vendors; or
employing, or otherwise engaging or soliciting for such purpose, any of our officers, directors or employees.
In addition, under our charter, Silver Lake and its affiliates, referred to as the Silver Lake Entities, which are significant stockholders in Dell Technologies, have no duty to refrain from any of the foregoing activities except as otherwise agreed in writing between us and a Silver Lake Entity. These and related provisions of our charter could result in the Dell Technologies Entities and the Silver Lake Entities having rights to corporate opportunities in which both we and the Dell Technologies Entities or the Silver Lake Entities have an interest, which might impede our ability to operate successfully and expand our business.
To preserve Dell Technologies' ability to conduct a tax-free distribution of the shares of our Class B common stock that it beneficially owns and its ability to consolidate with us for tax purposes, we may be prevented from pursuing opportunities to raise capital, acquire other companies or undertake other transactions, which could hurt our ability to grow.
To preserve its ability to effect a future tax-free spin-off of our company, or certain other tax-free transactions involving us, Dell Technologies is required to maintain “control” of us within the meaning of Section 368(c) of the Internal Revenue Code, which is defined as 80% of the total voting power and 80% of each class of nonvoting stock. In addition, to preserve its ability to consolidate with us for tax purposes, Dell Technologies generally is required to maintain 80% of the voting power and 80% of the value of our outstanding stock. We have entered into a tax matters agreement with Dell Technologies that restricts our ability to issue any stock, issue any instrument that is convertible, exercisable or exchangeable into any of our stock or which may be deemed to be equity for tax purposes, or take any other action that would be reasonably expected to cause Dell Technologies to beneficially own stock in us that, on a fully diluted basis, does not constitute “control” within the meaning of Section 368(c) of the Internal Revenue Code or to cause a deconsolidation of us for tax purposes with respect to the Dell Technologies consolidated group. We also have agreed to indemnify Dell Technologies for any breach by us of the tax matters agreement. As a result, we may be prevented from raising equity capital or pursuing acquisitions or other growth initiatives that involve issuing equity securities as consideration.
25


Risks Related to Ownership of Our Class A Common Stock
As long as Dell Technologies Inc. controls us, the ability of our other stockholders to influence matters requiring stockholder approval will be limited.
As of January 29, 2021, Dell Technologies owned, indirectly through Dell Inc. and Dell Inc.’s subsidiaries, all 70,000,000 outstanding shares of our Class B common stock, which represented approximately 84.9% of our total outstanding shares of common stock and approximately 98.3% of the combined voting power of both classes of our outstanding common stock.
So long as Dell Technologies controls the majority of the voting power of our outstanding common stock, our other stockholders will not be able to affect the outcome of any stockholder vote in which holders of the Class B common stock are entitled to vote. Dell Technologies is able to control, directly or indirectly and subject to applicable law, significant matters affecting us, including, among others, the election and removal of our directors, and determinations with respect to business combinations, dispositions of assets or other extraordinary corporate transactions. If Dell Technologies does not provide any required affirmative vote on matters requiring stockholder approval allowing us to take particular corporate actions when requested, we will not be able to take such actions, and, as a result, our business and our results of operations may be adversely affected.
Dell Technologies could have interests that differ from, or conflict with, the interests of our other stockholders, and could cause us to take corporate actions even if the actions are not in the interest of our company or our other stockholders, or are opposed by our other stockholders. For example, Dell Technologies’ voting control could discourage or prevent a change in control of our company even if some of our other stockholders might favor such a transaction.
We do not expect to pay any dividends on our Class A common stock for the foreseeable future.
We intend to retain any earnings to finance the operation and expansion of our business, and do not expect to pay any cash dividends on our Class A common stock for the foreseeable future. Accordingly, investors must rely on sales of our Class A common stock after price appreciation, which may never occur, as the only way to realize any future gains on their investment.
The dual-class structure of our common stock may adversely affect the trading price of our Class A common stock.
Our Class B common stock has ten votes per share and our Class A common stock has one vote per share. The limited ability of holders of our Class A common stock to influence matters requiring stockholder approval may adversely affect the market price of our Class A common stock.
In addition, in 2017, FTSE Russell and S&P Dow Jones changed their eligibility criteria to exclude new companies with multiple classes of shares of common stock from being added to certain stock indices. Under the current criteria, our dual-class capital structure makes our Class A common stock ineligible for inclusion in any of these indices and, as a result, mutual funds, exchange-traded funds and other investment vehicles that track these indices will not invest in our stock. Other major stock indices might adopt similar requirements in the future. It is unclear what effect, if any, exclusion from any indices will have on the valuations of the affected publicly-traded companies. It is possible that such policies could depress the valuations of public companies excluded from such indices compared to those of other companies that do not have multi-class capital structures.
As a “controlled company” under the marketplace rules of the Nasdaq Stock Market, we may rely on exemptions from certain corporate governance requirements that provide protection to stockholders of companies that are subject to such requirements.
As of January 29, 2021, Dell Technologies beneficially owns more than 50% of the combined voting power of both classes of our outstanding shares of common stock. As a result, we are a “controlled company” under the marketplace rules of the Nasdaq Stock Market, or Nasdaq, and eligible to rely on exemptions from Nasdaq corporate governance requirements that generally obligate listed companies to maintain a board of directors having a majority of independent directors and compensation and nominating committees composed solely of independent directors. We currently rely on the exemption from the requirement to maintain a board of directors having a majority of independent directors. Although we do not currently rely on the other exemptions from Nasdaq’s corporate governance requirements, we may decide to avail ourselves of one or more of these exemptions in the future. During any period in which we do so, investors may not have the same protections afforded to stockholders of companies that must comply with all of Nasdaq’s corporate governance requirements. Our status as a controlled company could make our Class A common stock less attractive to some investors or otherwise adversely affect its trading price.

26


Future sales, or the perception of future sales, of a substantial number of shares of our Class A common stock could depress the trading price of our Class A common stock.
Sales of a substantial number of shares of our Class A common stock in the public market, or the perception that these sales may occur, could adversely affect the market price of the Class A common stock.
As of January 29, 2021, we have outstanding 12,450,207 shares of our Class A common stock and 70,000,000 shares of our Class B common stock. The shares of Class A common stock are freely tradeable without restriction or further registration under the Securities Act of 1933, or Securities Act, unless these shares are held by our “affiliates,” as that term is defined in Rule 144 under the Securities Act, or Rule 144. As of January 29, 2021, Dell Technologies owned, indirectly through its subsidiary Dell Inc. and through Dell Inc.’s subsidiaries, no shares of our Class A common stock and all 70,000,000 outstanding shares of our Class B common stock. The shares of our Class A common stock eligible for resale by our affiliates under Rule 144, subject to the volume limitations and other requirements of Rule 144, include the 70,000,000 shares of Class A common stock issuable upon conversion of the same number of shares of our Class B common stock that are outstanding.
We have entered into a registration rights agreement with Dell Marketing L.P. (the record holder of our Class B common stock), Michael S. Dell, the Susan Lieberman Dell Separate Property Trust, MSDC Denali Investors, L.P., MSDC Denali EIV, LLC and the Silver Lake investment funds that own Dell Technologies common stock in which we have granted them and their respective permitted transferees demand and piggyback registration rights with respect to the shares of our Class A common stock and Class B common stock held by them from time to time. Registration of those shares under the Securities Act would permit the stockholders under the registration rights agreement to sell their shares into the public market.
Our charter designates the Court of Chancery of the State of Delaware as the sole and exclusive forum for certain types of actions and proceedings that may be initiated by our stockholders, which could limit our stockholders’ ability to obtain a favorable judicial forum for disputes with us or with our directors, our officers or other employees, or our majority stockholder.
Our charter provides that, unless we consent in writing to the selection of an alternative forum, the Court of Chancery of the State of Delaware will, to the fullest extent permitted by law, be the exclusive forum for:
any derivative action or proceeding brought on our behalf;
any action asserting a claim of breach of a fiduciary duty owed by, or other wrongdoing by, any of our directors, officers or other employees, or stockholders to us or our stockholders;
any action asserting a claim arising pursuant to any provision of the Delaware General Corporation Law or as to which the Delaware General Corporation Law confers jurisdiction on the Court of Chancery of the State of Delaware; and
any action asserting a claim governed by the internal affairs doctrine.
Any person purchasing or otherwise acquiring any interest in shares of our capital stock is deemed to have received notice of and consented to the foregoing provisions. This choice of forum provision may limit a stockholder’s ability to bring a claim in a judicial forum that it finds more favorable for disputes with us or with our directors, our officers or other employees, or our other stockholders, including our majority stockholder, which may discourage such lawsuits against us and such other persons. Alternatively, if a court were to find this choice of forum provision inapplicable to, or unenforceable in respect of, one or more of the specified types of actions or proceedings, we may incur additional costs associated with resolving such matters in other jurisdictions, which could adversely affect our business, results of operations and financial condition.
Our choice of forum provision is intended to apply to the fullest extent permitted by law to the above-specified types of actions and proceedings, including, to the extent permitted by the federal securities laws, to lawsuits asserting both the above-specified claims and claims under the federal securities laws. Application of the choice of forum provision may be limited in some instances by applicable law. Section 27 of the Securities Exchange Act of 1934, or Exchange Act, creates exclusive federal jurisdiction over all suits brought to enforce any duty or liability created by the Exchange Act or the rules and regulations thereunder. As a result, the choice of forum provision will not apply to actions arising under the Exchange Act or the rules and regulations thereunder. Section 22 of the Securities Act creates concurrent jurisdiction for federal and state courts over suits brought to enforce any duty or liability created by the Securities Act or the rules and regulations thereunder, subject to a limited exception for certain “covered class actions.” There is uncertainty, particularly in light of current litigation, as to whether a court would enforce the choice of forum provision with respect to claims under the Securities Act. Our stockholders will not be deemed, by operation of our choice of forum provision, to have waived claims arising under the federal securities laws and the rules and regulations thereunder.

27


We are an “emerging growth company,” and our election to comply with the reduced disclosure requirements as a public company may make our Class A common stock less attractive to investors.
We have qualified as an “emerging growth company” as defined in the Jumpstart Our Business Startups Act of 2012, or JOBS Act, since we completed our initial public offering in April 2016. For so long as we remain an emerging growth company, we are permitted and currently intend to rely on the following provisions of the JOBS Act that contain exceptions from disclosure and other requirements that otherwise are applicable to companies that file periodic reports with the SEC. The JOBS Act provisions:
provide an exemption from the auditor attestation requirement in the assessment of our internal control over financial reporting under the Sarbanes-Oxley Act of 2002, or the Sarbanes-Oxley Act;
permit us to include reduced disclosure regarding executive compensation in our SEC filings; and
provide an exemption from the requirement to hold a non-binding advisory vote on executive compensation and stockholder approval of any golden parachute arrangements not previously approved.
We will remain an emerging growth company until: (a) the first to occur of the last day of the fiscal year (1) which follows the fifth anniversary of the completion of our IPO, (2) in which we have total annual gross revenue of at least $1 billion or (3) in which the market value of our capital stock held by non-affiliates was $700 million or more as of the last business day of the preceding second fiscal quarter; or (b) if it occurs before any of the foregoing dates, the date on which we have issued more than $1 billion in non-convertible debt over a three-year period.
Some investors may find our Class A common stock less attractive if we rely on these exemptions, which could result in a less active trading market for our Class A common stock and higher volatility in our stock price.
We are obligated to develop and maintain proper and effective internal control over financial reporting and any failure to maintain the adequacy of our internal controls may adversely affect investor confidence in our company and, as a result, the value of our Class A common stock.
We are required, pursuant to Section 404 of the Sarbanes-Oxley Act, or Section 404, to furnish a report by our management on, among other matters, the effectiveness of our internal control over financial reporting. Our independent registered public accounting firm will not be required to attest to the effectiveness of our internal control over financial reporting until our first annual report required to be filed with the SEC following the date we are no longer an emerging growth company. We are required to disclose significant changes made in our internal control procedures on a quarterly basis.
During the evaluation and testing process of our internal controls, if we identify one or more material weaknesses in our internal control over financial reporting, we will be unable to assert that our internal control over financial reporting is effective. We may experience material weaknesses or significant deficiencies in our internal control over financial reporting. Any failure to maintain internal control over financial reporting could severely inhibit our ability to report accurately our financial condition or results of operations. If we are unable to conclude that our internal control over financial reporting is effective, or if our independent registered public accounting firm determines we have a material weakness in our internal control over financial reporting, we could lose investor confidence in the accuracy and completeness of our financial reports, the market price of our Class A common stock could decline, and we could be subject to sanctions or investigations by the SEC or other regulatory authorities. Failure to remedy any material weakness in our internal control over financial reporting, or to implement or maintain other effective control systems required of public companies, also could restrict our future access to the capital markets.
Item 1B. Unresolved Staff Comments
None.
28


Item 2. Properties
As of January 29, 2021, our facilities consisted of our corporate headquarters, four security operations centers, two data centers, and various other facilities housing our research and development, marketing and sales, administrative and IT functions. We either lease these facilities or have the right to use them pursuant to service agreements, with Dell or with other third parties. As of January 29, 2021, we did not own any facilities.
Our corporate headquarters, one security operations center and one data center are located in Atlanta, Georgia, where we lease facilities of approximately 141,000 square feet. As of January 29, 2021, we leased or licensed facilities for our other security operations centers in the following locations: Providence, Rhode Island; Edinburgh, Scotland; and Bucharest, Romania. Our employees also operate out of a number of Dell facilities around the globe pursuant to arrangements with Dell. For information about our facility leases, see “Notes to Consolidated Financial Statements—Note 9—Leases” in our consolidated financial statements included in this report.
As we expand, we intend to lease or license additional sites, either from Dell or other third parties, for security operations centers, sales offices and other functions. We believe that suitable additional facilities will be available on commercially reasonable terms to accommodate the foreseeable expansion of our operations.

Item 3. Legal Proceedings
From time to time, we are a party to or otherwise subject to legal proceedings that arise in the ordinary course of our business. As of January 29, 2021, we were not subject to any material pending legal proceedings.

Item 4. Mine Safety Disclosures
Not applicable.
29


Part II

Item 5. Market for Registrant's Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities
Market for Class A Common Stock
Our Class A common stock is listed and traded on the Nasdaq Global Select Market under the symbol “SCWX.” There is no public market for our Class B common stock.
Holders
As of March 23, 2021, there were ten holders of record of our Class A common stock and one holder of record of our Class B common stock. The number of record holders of our Class A common stock does not include individuals or entities that beneficially own shares of Class A common stock, but whose shares are held of record by a broker, bank or other nominee.
Dividends
Subsequent to the listing of our Class A common stock on the Nasdaq Global Select Market in April 2016, we have not declared or paid cash dividends on our common stock. We do not anticipate declaring or paying any cash dividends on our common stock in the foreseeable future. We currently intend to retain all available funds and any future earnings to support our operations and finance the growth and development of our business. Any future determination related to our dividend policy will be made at the discretion of our board of directors and will depend upon, among other factors, our results of operations, financial condition, capital requirements, contractual restrictions, business prospects and other factors our board of directors may deem relevant.

30


Stock Performance Graph
The following graph compares the cumulative total return on the Class A common stock for the period from April 22, 2016, the date on which the Class A common stock began trading on the Nasdaq Global Select Market, through January 29, 2021 with the total return over the same period on the Nasdaq Composite Index and the PureFunds ISE Cyber Security ETF Index. The graph assumes that $100 was invested on April 22, 2016 in the Class A common stock and in each of the foregoing indices and assumes reinvestment of dividends, if any. The comparisons in the graph are based on historical data and are not necessarily indicative of the future price performance of the Class A common stock.


https://cdn.kscope.io/1fcd168423e15f02da602034c9ca0e18-scwx-20210129_g2.jpg
April 22,
2016
February 3, 2017February 2, 2018February 1, 2019January 31, 2020January 29, 2021
Secureworks$100.00 $75.64 $67.43 $165.07 $112.36 $98.86 
NASDAQ Composite100.00 115.50 147.59 148.05 186.52 266.41 
PureFunds ISE Cyber Security ETF100.00 121.21 137.94 161.01 179.55 251.81 

This performance graph shall not be deemed to be incorporated by reference by means of any general statement incorporating by reference this annual report on Form 10-K into any filing under the Securities Act of 1933 or the Securities Exchange Act of 1934, except to the extent that Secureworks specifically incorporates such information by reference, and shall not otherwise be deemed filed under the Securities Act or the Exchange Act.

31


Item 6. Selected Financial Data
The following selected financial data presented below should be read in conjunction with Part II, Item 7, "Management’s Discussion and Analysis of Financial Condition and Results of Operations," and with our audited financial statements and accompanying notes appearing in Part II, Item 8, "Financial Statements and Supplementary Data," of this Annual Report on Form 10-K to fully understand the factors that affect the comparability of the information presented below. The results of operations for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019 and the balance sheet data as of January 29, 2021 and January 31, 2020 are derived from our audited financial statements appearing in Part II, Item 8, "Financial Statements and Supplementary Data," of this Annual Report on Form 10-K. The results of operations for the fiscal years ended February 2, 2018 and February 3, 2017 and the balance sheet data as of February 1, 2019, February 2, 2018 and February 3, 2017 are derived from audited financial statements not included in this Annual Report on Form 10-K. Our historical results are not necessarily indicative of the results to be expected in the future.
The selected balance sheet data as of January 29, 2021 and January 31, 2020 reflect the prospective adoption of Accounting Standards Update No. 2016-02, "Leases (Topic 842)." The selected results of operations and balance sheet data for the fiscal years ended February 2, 2018 and February 3, 2017 reflect the retrospective adoption of Accounting Standards Update No. 2014-09, "Revenue from Contracts with Customers."
Fiscal Year Ended
January 29, 2021January 31, 2020February 1, 2019February 2, 2018February 3, 2017
(in thousands, except per share data)
Results of Operations:
Net revenue$561,034 $552,765 $518,709 $467,930 $432,751 
Gross margin318,867 299,969 272,592 242,846 220,262 
Operating expenses351,702 352,143 321,324 312,827 276,141 
Operating loss(32,835)(52,174)(48,732)(69,981)(55,879)
Net loss(21,902)(31,666)(39,101)(10,417)(31,641)
Share and Per Share Data
Net loss per share - basic and diluted$(0.27)$(0.39)$(0.48)$(0.13)$(0.41)
Weighted average shares outstanding - basic and diluted81,358 80,563 80,710 80,280 77,635 
January 29, 2021January 31, 2020February 1, 2019February 2, 2018February 3, 2017
(in thousands)
Balance Sheet:
Cash and cash equivalents$220,300 $181,838 $129,592 $101,539 $116,595 
Accounts receivable108,005 111,798 141,344 157,764 113,546 
Total assets(1)
$1,045,361 $1,048,031 $1,036,159 $1,057,081 $1,047,544 
Short-term deferred revenue168,437 175,847 157,865 137,697 117,999 
Long-term deferred revenue9,590 12,690 16,064 14,948 14,752 
Total stockholder's equity$667,781 $666,880 $692,707 $731,090 $725,455 
(1) Reflects the impact of the adoption of the new lease accounting standard in fiscal 2020 which was adopted prospectively.
32


Item 7. Management's Discussion and Analysis of Financial Condition and Results of Operations
This management’s discussion and analysis is based upon the financial statements of Secureworks which have been prepared in accordance with accounting principles generally accepted in the United States, or GAAP, and should be read in conjunction with our consolidated financial statements and related notes included in this report. In addition to historical financial information, the following discussion contains forward-looking statements that reflect our plans, estimates, beliefs, expected future responses to and effects of the COVID-19 pandemic and other characterizations of future events or circumstances. Our actual results could differ materially from those discussed or implied in our forward-looking statements. Factors that could cause or contribute to these differences include those discussed in “Risk Factors.”
Our fiscal year is the 52- or 53-week period ending on the Friday nearest January 31. We refer to our fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019, as fiscal 2021, fiscal 2020 and fiscal 2019, respectively. Fiscal 2021, fiscal 2020 and fiscal 2019 each included 52 weeks. The following discussion focuses on our fiscal 2021 and fiscal 2020 financial condition and results of operations, including comparisons with respect to fiscal 2021 and fiscal 2020. For discussion and analysis related to our financial condition and results of operations for fiscal 2019, including comparisons with respect to fiscal 2020 and fiscal 2019, see Part II, Item 7. Management's Discussion and Analysis of Financial Condition and Results of Operations in our Annual Report on Form 10-K for fiscal year ended January 31, 2020, which was filed with the Securities and Exchange Commission on March 27, 2020.
All percentage amounts and ratios presented in this management’s discussion and analysis were calculated using the underlying data in thousands
Except where the context otherwise requires or where otherwise indicated, all references to “Secureworks” “we,” “us,” “our” and “our company” in this management’s discussion and analysis refer to SecureWorks Corp. and our subsidiaries on a consolidated basis, all references to “Dell” refer to Dell Inc. and its subsidiaries on a consolidated basis and all references to “Dell Technologies” refer to Dell Technologies Inc., the ultimate parent company of Dell Inc.
Overview
We are a leading global cybersecurity provider of technology-driven security solutions singularly focused on protecting our customers by outpacing and outmaneuvering threat actors.
Our vision is to be the essential cybersecurity company for a digitally connected world by providing the software platform of choice to deliver our holistic approach to security at scale for our customers. We combine considerable experience from securing thousands of customers, deep and machine-learning capabilities in our software platform, and actionable insights from our team of elite researchers, analysts and consultants to create a powerful network effect that provides increasingly strong protection for our customers.
Through our vendor-inclusive approach, we create integrated and comprehensive solutions by proactively managing the collection of “point” products deployed by our customers to address specific security issues and provide solutions to close the gaps in their defenses. We seek to provide the right level of security for each customer's unique situation, which evolves as their organization grows and changes over time.
By aggregating and analyzing data from sources around the world, we offer solutions that enable organizations to:
prevent security breaches,
detect malicious activity,
respond rapidly when a security breach occurs, and
identify emerging threats.
We have pioneered an integrated approach that delivers a broad portfolio of security solutions to organizations of varying size and complexity. Our flexible and scalable solutions support the evolving needs of the largest, most sophisticated enterprises, as well as small and medium-sized businesses and U.S. state and local government agencies with limited in-house capabilities and resources.
We offer our customers:
software-as-a-service ("SaaS") solutions,
managed security services, and
professional services, including incident response services and security risk consulting.
33


Our solutions leverage the proprietary technologies, security operations workflows, extensive expertise and knowledge of the tactics, techniques and procedures of the adversary that we have developed over more than 22 years. As key elements of our strategy, we seek to:
be the cloud-native security analytics software platform of choice,
broaden our reach with security service providers to deliver our security analytics software platform globally, and
empower the global security community to beat the adversary at scale.
Our technology-driven security solutions offer an innovative approach to prevent, detect, and respond to cybersecurity breaches. The platforms collect, aggregate, correlate and analyze billions of events daily from our extensive customer base utilizing sophisticated algorithms to detect malicious activity and deliver security countermeasures, dynamic intelligence and valuable context regarding the intentions and actions of cyber adversaries. Through our Taegis SaaS applications and Counter Threat managed security services, which are both sold on a subscription basis, we provide global visibility and insight into malicious activity, enabling our customers to detect, respond to and effectively remediate threats quickly.
Our proprietary Taegis software platform, which we launched in fiscal 2020, was purpose-built as a cloud-native software platform that combines the power of machine-learning with security analytics and threat intelligence to unify detection and response across endpoint, network and cloud environments for better security outcomes and simpler security operations. The Taegis software platform is a core element for our SaaS applications, which leverage workflows designed using 22 years of security operations expertise and our integrated orchestration and automation capabilities to increase the speed of response actions. We expanded our Taegis SaaS applications with VDR during fiscal 2021 with our acquisition of Delve Laboratories Inc., as discussed below.
In addition to Taegis SaaS applications and managed security services, we also offer a variety of professional services, which include incident response and security and risk consulting, to accelerate adoption of our software solutions. We advise customers on a broad range of security and risk-related matters through both project-based and long-term contracts in addition to our Taegis SaaS applications and managed security services.
Acquisition of Delve Laboratories
Pursuant to our growth strategy, we seek to make strategic acquisitions of other companies to supplement our internal expansion. On September 21, 2020, we acquired all of the outstanding shares of Delve Laboratories Inc., or Delve, for $15.1 million, net of cash acquired. Delve provides comprehensive vulnerability assessment solutions through its automated vulnerability platform. Delve’s SaaS application is powered by artificial intelligence and machine-learning to provide customers with more accurate and actionable data about the highest risk vulnerabilities across their network, endpoints and cloud. We are integrating the vulnerability discovery and prioritization technology represented by VDR into new offerings within our cloud-based portfolio, including our Taegis software platform and XDR application, expanding visibility and insights for users.
COVID-19
In December 2019, a novel strain of the coronavirus, COVID-19, was reported in mainland China. The World Health Organization declared the outbreak to constitute a "pandemic” on March 11, 2020. This led to a significant disruption of normal business operations globally, as businesses, including Secureworks, have implemented modifications to protect employees by restricting travel and directing employees to work-from-home, in some instances as required by federal, state and local authorities. While we instituted a global work-from-home policy beginning in March 2020, we did not incur significant disruptions in our business operations or a material impact on our results of operations, financial condition, liquidity or capital resources during the fiscal year ended January 29, 2021. We have experienced a limited reduction in customer demand for our solutions that we believe is attributable to COVID-19, which may impact our results in future periods. Although we are unable to predict the extent and severity of all impacts of COVID-19, the pandemic might further curtail customer spending, lead to delayed or deferred purchasing decisions, lengthen sales cycles and result in delays in receiving customer or partner payments. These effects, individually or in the aggregate, could have a material negative impact on our future results of operations and financial condition.
In light of these considerations, we continue to actively monitor the impacts and potential impacts of the COVID-19 pandemic in all aspects of our business. The extent of the impact of COVID-19 on our future operational and financial performance will depend on various developments, including the duration and spread of the virus, effectiveness of vaccines deployed to contain the virus, impact on our employees, customers and vendors, impact on our customers' liquidity, and impact on volume of sales, and length of our sales cycles, all of which remain uncertain and cannot be predicted, but which could have a material negative effect on our business, results of operations or financial condition. Due to our subscription-based business model, any such effect of COVID-19 may not be fully reflected in our results of operations until future periods.

34


Key Factors Affecting Our Performance
We believe that our future success will depend on many factors, including the adoption of our Taegis solutions by organizations, continued investment in our technology and threat intelligence research, our introduction of new solutions, our ability to increase sales of our solutions to new and existing customers and our ability to attract and retain top talent. Although these areas present significant opportunities, they also present risks that we must manage to ensure our future success. For additional information about these risks, refer to “Risk Factors” in this report. We operate in an intensely competitive industry and face, among other competitive challenges, pricing pressures within the information security market as a result of action by our larger competitors to reduce the prices of their security prevention, detection and response solutions, as well as the prices of their managed security services. We must continue to manage our investments in an efficient manner and effectively execute our strategy to succeed. If we are unable to address these challenges, our business could be adversely affected.
Adoption of Technology-Driven Solution Strategy. The evolving landscape of applications, modes of communication and IT architectures makes it increasingly challenging for organizations of all sizes to protect their critical business assets, including proprietary information, from cyber threats. New technologies heighten security risks by increasing the number of ways a threat actor can attack a target, by giving users greater access to important business networks and information and by facilitating the transfer of control of underlying applications and infrastructure to third-party vendors. An effective cyber defense strategy requires the coordinated deployment of multiple products and solutions tailored to an organization’s specific security needs. Our integrated suite of solutions, including our new Taegis offerings, is designed to facilitate the successful implementation of such a strategy, but continuous investment in, and adaptation of, our technology will be required as the threat landscape continues to evolve rapidly. The degree to which prospective and current customers recognize the mission-critical nature of our technology-driven information security solutions, and subsequently allocate budget dollars to our solutions, will affect our future financial results.
Investment in Our Technology and Threat Intelligence Research. Our software platforms constitute the core of our technology-driven security solutions. They provide our customers with an integrated perspective and intelligence regarding their network environments and security threats. Our software platforms are augmented by our Counter Threat Unit research team, which conducts exclusive research into threat actors, uncovers new attack techniques, analyzes emerging threats and evaluates the risks posed to our customers. Our performance is significantly dependent on the investments we make in our research and development efforts, and on our ability to be at the forefront of threat intelligence research, and to adapt these software platforms to new technologies as well as to changes in existing technologies. This is an area in which we will continue to invest, while leveraging a flexible staffing model to align with solutions development. We believe that investment in our Taegis software platform and solutions will contribute to long-term revenue growth, but it may continue to adversely affect our near-term profitability.
Introduction of New Security Solutions. Our performance is significantly dependent on our ability to continue to innovate and introduce new information security solutions, such as our Taegis solutions, that protect our customers from an expanding array of cybersecurity threats. We continue to invest in solutions innovation and leadership, including hiring top technical talent and focusing on core technology innovation. In addition, we will continue to evaluate and utilize third-party proprietary technologies, where appropriate, for the continuous development of complementary offerings. We cannot be certain that we will realize increased revenue from our solutions development initiatives. We believe that our investment in solutions development will contribute to long-term revenue growth, but such investment may continue to adversely affect our near-term profitability.
Investments in Expanding Our Customer Base and Deepening Our Customer Relationships. To support future sales, we will need to continue to devote resources to the development of our global sales force. We have made and plan to continue to make significant investments in expanding our go-to-market efforts with direct sales, channel partners and marketing. Any investments we make in our sales and marketing operations will occur before we realize any benefits from such investments. The investments we have made, or intend to make, to strengthen our sales and marketing efforts may not result in an increase in revenue or an improvement in our results of operations. Although we believe our investment in sales and marketing will help us improve our results of operations in the long term, the resulting increase in operating expenses attributable to these sales and marketing functions may continue to adversely affect our profitability in the near term. The continued growth of our business also depends in part on our ability to sell additional solutions to our existing customers. As our customers realize the benefits of the solutions they previously purchased, our portfolio of solutions provides us with a significant opportunity to expand these relationships.
Investment in Our People. The difficulty in providing effective information security is exacerbated by the highly competitive environment for identifying, hiring and retaining qualified information security professionals. Our technology leadership, brand, exclusive focus on information security, customer-first culture, and robust training and development program have enabled us to attract and retain highly talented professionals with a passion for building a career in the information security industry. These professionals are led by a highly experienced and tenured management team with extensive IT security expertise and a record of developing successful new technologies and solutions to help protect our customers. We will continue to invest in attracting and retaining top talent to support and enhance our information security offerings.
35


Key Operating Metrics
In recent years, we have experienced broad growth across our portfolio of technology-driven information security solutions being provided to all sizes of customers. We have achieved much of this growth by providing solutions to large enterprise customers, which generate substantially more average revenue than our small and medium-sized business, or SMB, customers, and by continually expanding the volume and breadth of the security solutions that we provide to all customers. Execution of this strategy has resulted in steady growth in our average revenue per customer. This growth has required ongoing investment in our business, resulting in net losses. We believe these investments are critical to our success, although they may continue to impact our profitability.
We believe the operating metrics described below provide further insight into the long-term value of our subscription agreements and our ability to maintain and grow our customer relationships. Relevant key operating metrics are presented below as of the dates indicated and for the fiscal years then ended.
 January 29, 2021January 31, 2020February 1, 2019
Managed security subscription customer base3,400 4,000 4,200 
Taegis subscription customer base400 100 — 
Total subscription customer base3,800 4,100 4,200 
Total customer base5,200 5,200 4,700 
Managed security annual recurring revenue (in millions)$371.9 $422.0 $434.1 
Taegis annual recurring revenue (in millions)54.9 15.5 — 
Total annual recurring revenue (in millions)$426.8 $437.5 $434.1 
Managed security average subscription revenue per customer (in thousands)$110.8 $105.3 $103.3 
Taegis average subscription revenue per customer (in thousands)138.3 191.4 — 
Total average subscription revenue per customer (in thousands)$113.8 $107.8 $103.3 
Net revenue retention rate88 %95 %89 %
Total Subscription Customer Base. We define our total subscription customer base as the number of customers who subscribe to our Taegis SaaS applications or managed security services as of a particular date. We believe that growing our existing customer base and our ability to grow our average subscription revenue per customer represent significant future revenue opportunities for us.
Total Customer Base. We define total customer base as the number of customers that subscribe to our Taegis SaaS applications and managed security services and customers that buy professional and other services from us, as of a particular date.
Total Annual Recurring Revenue. We define total annual recurring revenue as the value of our subscription contracts as of the measurement date. Changes to recurring revenue may result from the expansion of our offerings and sales of additional solutions to our existing customers, as well as the timing of customer renewals.
Total Average Subscription Revenue Per Customer. Total average subscription revenue per customer is primarily related to the persistence of cyber threats and the results of our sales and marketing efforts to increase the awareness of our solutions. Our customer composition of both enterprise and small and medium sized business provides us with an opportunity to expand our professional services revenue. As of January 29, 2021, January 31, 2020 and February 1, 2019, approximately 65%, 60% and 50%, respectively, of our professional services customers subscribed to our Taegis SaaS applications or managed security services.
Net Revenue Retention Rate. We define net revenue retention rate is an important measure of our success in retaining and growing revenue from our subscription-based customers. To calculate our revenue retention rate for any period, we compare the annual recurring revenue of our subscription-based customers at the beginning of the fiscal year (base recurring revenue) to the same measure from that same cohort of customers at the end of the fiscal year (retained recurring revenue). By dividing the retained recurring revenue by the base recurring revenue, we measure our success in retaining and growing installed revenue from the specific cohort of customers we served at the beginning of the period. Our calculation includes the positive revenue impacts of selling and installing additional solutions to this cohort of customers and the negative revenue impacts of customer
36


or service attrition during the period. The calculation, however, does not include the positive impact on revenue from sales of solutions to any customers acquired during the period. Our net revenue retention rates may increase or decline from period to period as a result of various factors, including the timing of solutions installations and customer renewal rates.
Non-GAAP Financial Measures
We use supplemental measures of our performance, which are derived from our financial information, but which are not presented in our financial statements prepared in accordance with generally accepted accounting principles in the United States of America, referred to as GAAP. Non-GAAP financial measures presented in this management's discussion and analysis include non-GAAP gross margin, non-GAAP research and development expenses, non-GAAP sales and marketing expenses, non-GAAP general and administrative expenses, non-GAAP operating income (loss), non-GAAP net income (loss), non-GAAP earnings (loss) per share and adjusted EBITDA. We use non-GAAP financial measures to supplement financial information presented on a GAAP basis. We believe these non-GAAP financial measures provide useful information to help evaluate our operating results by facilitating an enhanced understanding of our operating performance and enabling more meaningful period-to-period comparisons.
There are limitations to the use of the non-GAAP financial measures presented in this management’s discussion and analysis. Our non-GAAP financial measures may not be comparable to similarly titled measures of other companies. Other companies, including companies in our industry, may calculate non-GAAP financial measures differently than we do, limiting the usefulness of those measures for comparative purposes.
The non-GAAP financial measures we present, as defined by us, exclude the items described in the reconciliation below. As the excluded items can have a material impact on earnings, our management compensates for this limitation by relying primarily on GAAP results and using non-GAAP financial measures supplementally. The non-GAAP financial measures are not meant to be considered as indicators of performance in isolation from or as a substitute for revenue, gross margin, research and development expenses, sales and marketing expenses, general and administrative expenses, operating income (loss), net income (loss), earnings (loss) per share and EBITDA prepared in accordance with GAAP, and should be read only in conjunction with financial information presented on a GAAP basis.
Reconciliation of Non-GAAP Financial Measures
The table below presents a reconciliation of each non-GAAP financial measure to its most directly comparable GAAP financial measure. We encourage you to review the reconciliations in conjunction with the presentation of the non-GAAP financial measures for each of the periods presented. In future fiscal periods, we may exclude such items and may incur income and expenses similar to these excluded items. Accordingly, the exclusion of these items and other similar items in our non-GAAP presentation should not be interpreted as implying that these items are non-recurring, infrequent or unusual.
The following is a summary of the items excluded from the most comparable GAAP financial measures to calculate our non-GAAP financial measures:
Amortization of Intangible Assets. Amortization of intangible assets consists of amortization of customer relationships and acquired technology. In connection with the acquisition of Dell by Dell Technologies in fiscal 2014 and the Delve acquisition in fiscal 2021, all of our tangible and intangible assets and liabilities were accounted for and recognized at fair value on the transaction date. Accordingly, amortization of intangible assets consists of amortization associated with intangible assets recognized in connection with this transaction.
Stock-based Compensation Expense. Non-cash stock-based compensation expense relates to both the Dell Technologies and Secureworks equity plans. We exclude such expense when assessing the effectiveness of our operating performance since stock-based compensation does not necessarily correlate with the underlying operating performance of the business.
Impact of Tax Cuts and Jobs Act. The impact of the Tax Cuts and Jobs Act relates to final tax provision impacts of complying with the U.S. tax reform that was enacted in December 2017, as recorded in fiscal 2020 and fiscal 2019, as well as the provisional tax benefit of $27.0 million that was recorded in the fourth quarter of fiscal 2018. For additional information, see “Notes to Consolidated Financial Statements—Note 12—Income and Other Taxes” in our consolidated financial statements included in this report.
Aggregate Adjustment for Income Taxes. The aggregate adjustment for income taxes is the estimated combined income tax effect for the adjustments mentioned above. The tax effects are determined based on the tax jurisdictions where the above items were incurred.
37


 January 29, 2021January 31, 2020February 1, 2019
GAAP revenue(1)
$561,034 $552,765 $518,709 
GAAP gross margin$318,867 $299,969 $272,592 
Amortization of intangibles14,587 14,089 13,642 
Stock-based compensation expense 1,346 1,206 780 
Non-GAAP gross margin$334,800 $315,264 $287,014 
GAAP research and development expenses$105,008 $94,964 $87,608 
Stock-based compensation expense (4,410)(4,280)(4,133)
Non-GAAP research and development expenses$100,598 $90,684 $83,475 
GAAP sales and marketing expenses$144,934 $157,674 $141,818 
Stock-based compensation expense (3,676)(1,694)(2,652)
Non-GAAP sales and marketing expenses$141,258 $155,980 $139,166 
GAAP general and administrative expenses$101,760 $99,505 $91,898 
Amortization of intangibles(14,094)(14,094)(14,094)
Stock-based compensation expense (14,982)(12,368)(11,805)
Non-GAAP general and administrative expenses$72,684 $73,043 $65,999 
GAAP operating loss$(32,835)$(52,174)$(48,732)
Amortization of intangibles28,682 28,183 27,736 
Stock-based compensation expense 24,414 19,548 19,370 
Non-GAAP operating income (loss)$20,261 $(4,443)$(1,626)
GAAP net loss$(21,902)$(31,666)$(39,101)
Amortization of intangibles28,682 28,183 27,736 
Stock-based compensation expense24,414 19,548 19,370 
Impact of Tax Cuts and Jobs Act— (1,191)4,325 
Aggregate adjustment for income taxes(13,267)(14,688)(10,978)
Non-GAAP net income$17,927 $186 $1,352 
GAAP loss per share$(0.27)$(0.39)$(0.48)
Amortization of intangibles0.35 0.35 0.34 
Stock-based compensation expense0.30 0.24 0.24 
Impact of Tax Cuts and Jobs Act— (0.01)0.05 
Aggregate adjustment for income taxes(0.16)(0.18)(0.13)
Non-GAAP earnings per share *$0.22 $— $0.02 
* Sum of reconciling items may differ from total due to rounding of individual components
GAAP net income (loss)$(21,902)$(31,666)$(39,101)
Interest and other, net(1,034)(850)(2,778)
Income tax benefit(9,899)(19,658)(6,853)
Depreciation and amortization41,614 42,932 41,207 
Stock-based compensation expense 24,414 19,548 19,370 
Adjusted EBITDA$33,193 $10,306 $11,845 
(1)    Historically the Company has presented non-GAAP revenue as a financial measure, however there are no such adjustments that give rise to non-GAAP revenue for any of the periods presented.
38


Our Relationship with Dell and Dell Technologies
On April 27, 2016, we completed our IPO. Upon the closing of our IPO, Dell Technologies owned, indirectly through Dell Inc. and Dell Inc.’s subsidiaries, all shares of our outstanding Class B common stock, which as of January 29, 2021 represented approximately 84.9% of our total outstanding shares of common stock and approximately 98.3% of the combined voting power of both classes of our outstanding common stock.
As a majority-owned subsidiary of Dell, we receive from Dell various corporate services in the ordinary course of business, including finance, tax, human resources, legal, insurance, IT, procurement and facilities related services. The costs of these services have been charged in accordance with a shared services agreement that went into effect on August 1, 2015, the effective date of our carve-out from Dell. For more information regarding the allocated costs and related party transactions, see “Notes to Consolidated Financial Statements—Note 14—Related Party Transactions” in our consolidated financial statements included in this report.
During the periods presented in the consolidated financial statements included in this report, Secureworks did not file separate federal tax returns, as Secureworks was generally included in the tax grouping of other Dell entities within the respective entity’s tax jurisdiction. The income tax benefit has been calculated using the separate return method, modified to apply the benefits for loss approach. Under the benefits for loss approach, net operating losses or other tax attributes are characterized as realized or as realizable by Secureworks when those attributes are utilized or expected to be utilized by other members of the Dell consolidated group. For more information, see “Notes to Consolidated Financial Statements—Note 12—Income and Other Taxes” in our consolidated financial statements included in this report.
Additionally, we participate in various commercial arrangements with Dell, under which, for example, we provide information security solutions to third-party customers with which Dell has contracted to provide our solutions, procure hardware, software and services from Dell, and sell our solutions through Dell in the United States and some international jurisdictions. In connection with our IPO, effective August 1, 2015, we entered into agreements with Dell that govern these commercial arrangements. These agreements generally were initially effective for up to one to three years and include extension and cancellation options. To the extent that we choose to, or are required to, transition away from the corporate services currently provided by Dell, we may incur additional non-recurring transition costs to establish our own stand-alone corporate functions. For more information regarding the allocated costs and related party transactions, see “Notes to Consolidated Financial Statements—Note 14—Related Party Transactions” in our consolidated financial statements included in this report.
Components of Results of Operations
Revenue
We sell SaaS applications and managed security services on a subscription basis and various professional services, including security and risk consulting and incident response solutions. Our Taegis SaaS applications and managed security contracts typically range from one to three years and, as of January 29, 2021, averaged approximately two years in duration. The revenue and any related costs for these deliverables are recognized ratably over the contract term, beginning on the date on which service is made available to customers. Professional services customers typically purchase solutions pursuant to customized contracts that are shorter in duration. In general, these contracts have terms of less than one year. Professional services consist primarily of fixed-fee and retainer-based contracts. Revenue from these engagements is recognized under the proportional performance method of accounting. Revenue from time and materials-based contracts is recognized as costs are incurred at amounts represented by the agreed-upon billing rates.
The fees we charge for our solutions vary based on a number of factors, including the solutions selected, the number of customer devices covered by the selected solutions, and the level of management we provide for the solutions. In fiscal 2021, approximately 76% of our revenue was derived from subscription-based arrangements, attributable to SaaS applications and managed security services, while approximately 24% was derived from professional services engagements. As we respond to the evolving needs of our customers, the relative mix of subscription-based solutions and professional services we provide our customers may fluctuate. International revenue, which we define as revenue contracted through non-U.S. entities, represented approximately 30%, 25% and 22% of our total net revenue in fiscal 2021, fiscal 2020 and fiscal 2019, respectively. Although our international customers are located primarily in the United Kingdom, Japan, Australia and Canada, we provide our SaaS applications or managed security services to customers across 57 countries as of January 29, 2021.
Over all of the periods presented in this report, our pricing strategy for our various offerings was relatively consistent, and accordingly did not significantly affect our revenue growth. However, we may adjust our pricing to remain competitive and support our strategic initiatives.


39


Gross Margin
We operate in a challenging business environment, where the complexity and number of cyber-attacks are constantly increasing. Accordingly, initiatives to drive the efficiency of our Counter Threat Platform and the continued training and development of our employees are critical to our long-term success. Gross margin has been and will continue to be affected by these factors as well as others, including the mix of solutions sold, the mix between large and small customers, the timing of revenue recognition and the extent to which we expand our security operations centers.
Cost of revenue consists primarily of personnel expenses, including salaries, benefits and performance-based compensation for employees who maintain our Counter Threat Platform and provide support services to our customers, as well as perform other critical functions. Also included in cost of revenue are amortization of equipment and costs associated with hardware utilized as part of providing subscription services, amortization of technology licensing fees, amortization of intangible assets, fees paid to contractors who supplement or support our solutions, maintenance fees and overhead allocations. As our business grows, the cost of revenue associated with our solutions may fluctuate.
We operate in a high-growth industry and have experienced significant revenue growth since our inception. We continue to invest in initiatives to drive the efficiency of our business to increase gross margin as a percentage of total revenue. However, as we balance revenue growth and efficiency initiatives, gross margin as a percentage of total revenue may fluctuate from period to period.
Operating Costs and Expenses
Our operating costs and expenses consist of research and development expenses, sales and marketing expenses and general and administrative expenses.
Research and Development, or R&D, Expenses. Research and development expenses include compensation and related expenses for the continued development of our solutions offerings, including a portion of expenses related to our threat research team, which focuses on the identification of system vulnerabilities, data forensics and malware analysis. R&D expenses also encompass expenses related to the development of prototypes of new solutions offerings and allocated overhead. Our customer solutions have generally been developed internally. We operate in a competitive and highly technical industry. Therefore, to maintain and extend our technology leadership, we intend to continue to invest in our R&D efforts by hiring more personnel to enhance our existing security solutions and to add complementary solutions.
Sales and Marketing, or S&M, Expenses. Sales and marketing expenses include salaries, sales commissions and performance-based compensation benefits and related expenses for our S&M personnel, travel and entertainment, marketing and advertising programs (including lead generation), customer advocacy events, and other brand-building expenses, as well as allocated overhead. As we continue to grow our business, both domestically and internationally, we will invest in our sales capability, which will increase our sales and marketing expenses in absolute dollars.
General and Administrative, or G&A, Expenses. General and administrative expenses include primarily the costs of human resources and recruiting, finance and accounting, legal support, information management and information security systems, facilities management, corporate development and other administrative functions, and are partially offset by allocations of information technology and facilities costs to other functions.
Interest and Other, Net
Interest and other, net consists primarily of the effect of exchange rates on our foreign currency-denominated asset and liability balances and interest income earned on our cash and cash equivalents. All foreign currency transaction adjustments are recorded as foreign currency gains (losses) in the Consolidated Statements of Operations. To date, we have had minimal interest income.
Income Tax Expense (Benefit)
Our effective tax benefit rate was 31.1%, 38.3% and 14.9% for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019, respectively. The change in effective tax rate from fiscal 2020 to fiscal 2021 was primarily attributable to the impact of certain discrete adjustments related to the vesting of stock-based compensation units, certain provisions from the Tax Cuts and Jobs Act, results of foreign operations and the recognition of additional benefits relating to research and development credits.
We calculate a provision for income taxes using the asset and liability method, under which deferred tax assets and liabilities are recognized by identifying the temporary differences arising from the different treatment of items for tax and accounting purposes. We provide valuation allowances for deferred tax assets, where appropriate. We file U.S. federal returns on a consolidated basis with Dell and we expect to continue doing so until such time (if any) as we are deconsolidated for tax purposes with respect to the Dell consolidated group. According to the terms of the tax matters agreement between Dell
40


Technologies and Secureworks that went into effect on August 1, 2015, Dell Technologies will reimburse us for any amounts by which our tax assets reduce the amount of tax liability owed by the Dell group on an unconsolidated basis. For a further discussion of income tax matters, see “Notes to Consolidated Financial Statements—Note 12—Income and Other Taxes" in our consolidated financial statements included in this report.
Results of Operations
Fiscal 2021 Compared to Fiscal 2020
The following table summarizes our key performance indicators for the fiscal years ended January 29, 2021 and January 31, 2020.
 Fiscal Year Ended
 January 29, 2021January 31, 2020
 $% of
Revenue
% Change$% of
Revenue
 (in thousands, except percentages)
Net revenue$561,034 100.0 %1.5 %$552,765 100.0 %
Cost of revenue242,167 43.2 %(4.2)%252,796 45.7 %
Total gross margin318,867 56.8 %6.3 %299,969 54.3 %
Operating expenses351,702 62.7 %(0.1)%352,143 63.7 %
Operating loss(32,835)(5.9)%(37.1)%(52,174)(9.4)%
Net loss$(21,902)(3.9)%(30.8)%$(31,666)(5.7)%
Other Financial Information (1)
GAAP revenue(2)
$561,034 100.0 %1.5 %$552,765 100.0 %
Non-GAAP gross margin334,800 59.7 %6.2 %315,264 57.0 %
Non-GAAP operating expenses314,540 56.1 %(1.6)%319,707 57.8 %
Non-GAAP operating income (loss)20,261 3.6 %(556.0)%(4,443)(0.8)%
Non-GAAP net income17,927 3.2 %9,538.2 %186 — %
Adjusted EBITDA$33,193 5.9 %222.1 %$10,306 1.9 %
_____________________
(1)    See "Non-GAAP Financial Measures" and "Reconciliation of Non-GAAP Financial Measures" for more information about these non-GAAP financial measures, including our reasons for including the measures, material limitations with respect to the usefulness of the measures, and a reconciliation of each non-GAAP financial measure to the most directly comparable GAAP financial measure. Non-GAAP financial measures as a percentage of revenue are calculated based on GAAP revenue.
(2) Historically the Company has presented non-GAAP revenue as a financial measure, however there are no such adjustments that give rise to non-GAAP revenue for any of the periods presented.
Revenue
Net revenue, which we refer to as revenue, increased $8.3 million, or 1.5%, in fiscal 2021, compared with fiscal 2020. The revenue increase resulted primarily from revenue generated by subscription-based solutions, which represented approximately 76% of revenue in fiscal 2021 and fiscal 2020. Our existing customers continued to increase their contracted subscriptions for our solutions, with our average revenue per customer increasing 5.6% in fiscal 2021.
Revenue for certain services provided to or on behalf of Dell under our commercial agreements with Dell totaled approximately $18.6 million and $27.2 million for fiscal 2021 and 2020, respectively. For more information regarding the commercial agreements, see "Notes to Consolidated Financial Statements—Note 14—Related Party Transactions" in our consolidated financial statements included in this report.
We primarily generate revenue from sales in the United States. However, international revenue, which we define as revenue contracted through non-U.S. entities, totaled $168.5 million in fiscal 2021, which represented a 20.2% increase over our international revenue in fiscal 2020. Currently, our international customers are primarily located in the United Kingdom, Japan, Australia and Canada. We are focused on continuing to grow our international customer base in future periods.

41


Gross Margin
Our total gross margin increased $18.9 million, or 6.3%, in fiscal 2021, compared with fiscal 2020. As a percentage of revenue, our gross margin percentage increased 250 basis points to 56.8% in fiscal 2021. Gross margin on a GAAP basis includes amortization of intangible assets and stock-based compensation expense. On a non-GAAP basis, excluding these adjustments, gross margin increased $19.5 million, or 6.2%, in fiscal 2021. As a percentage of revenue, our non-GAAP gross margin increased 270 basis points to 59.7% in fiscal 2021. The increase in gross margin as a percentage of revenue on a GAAP and non-GAAP basis during the fiscal year was mainly attributable to improvement in our subscription-based solutions margins as we continue to focus on delivering comprehensive higher-value security solutions and driving scale and operational efficiencies, as well as to a decrease in travel-related costs attributable to the COVID-19 pandemic.
Operating Expenses
The following table presents information regarding our operating expenses during the fiscal years ended January 29, 2021 and January 31, 2020.
 Fiscal Year Ended
 January 29, 2021January 31, 2020
 $% of Revenue%
Change
$% of Revenue
Operating expenses:  
Research and development105,008 18.7 %10.6%94,964 17.2 %
Sales and marketing144,934 25.8 %(8.1)%157,674 28.5 %
General and administrative101,760 18.1 %2.3%99,505 18.0 %
Total operating expenses$351,702 62.7 %(0.1)%$352,143 63.7 %
Other Financial Information
Non-GAAP research and development100,598 17.9 %10.9%90,684 16.4 %
Non-GAAP sales and marketing141,258 25.2 %(9.4)%155,980 28.2 %
Non-GAAP general and administrative72,684 13.0 %(0.5)%73,043 13.2 %
Non-GAAP operating expenses (1)
$314,540 56.1 %(1.6)%$319,707 57.8 %
            
(1)     See “Non-GAAP Financial Measures” and “Reconciliation of Non-GAAP Financial Measures” for a reconciliation of each non-GAAP financial measure to the most directly comparable GAAP financial measure.

Research and Development Expenses. R&D expenses increased $10.0 million, or 10.6%, in fiscal 2021. As a percentage of revenue, R&D expenses increased 150 basis points to 18.7% in fiscal 2021. As a percentage of revenue on a non-GAAP basis, R&D expenses increased 150 basis points to 17.9%. The increase in R&D expenses was primarily attributable to increased compensation and benefits resulting from the addition of R&D personnel associated with the continued development of our solutions, including the development of our Taegis security analytics software platform and applications.
Sales and Marketing Expenses. S&M expenses decreased $12.7 million, or 8.1%, in fiscal 2021. As a percentage of revenue, S&M expenses decreased 270 basis points to 25.8% in fiscal 2021. On a non-GAAP basis, S&M expenses as a percentage of revenue decreased 300 basis points to 25.2%. The decrease in S&M expenses was primarily attributable to lower travel-related cost associated with increased remote activities as a result of the COVID-19 pandemic and a reduction of sales costs associated with our Safeguard offerings in partnership with Dell, the effects of which were partially offset by an increase in marketing expenses related to Taegis go-to market efforts.
General and Administrative Expenses. G&A expenses increased $2.3 million, or 2.3%, in fiscal 2021. G&A as a percentage of revenue were relatively consistent year over year. As a percentage of revenue, G&A expenses increased 10 basis points to 18.1% in fiscal 2021. On a non-GAAP basis, G&A expenses as a percentage of revenue decreased 20 basis points to 13.0%. There were no significant changes identified when comparing fiscal 2021 to fiscal 2020.

42


Operating Loss
Our operating loss was $32.8 million for fiscal 2021 compared to $52.2 million for fiscal 2020. As a percentage of revenue, our operating loss was 5.9% and 9.4% in fiscal 2021 and fiscal 2020, respectively. The decrease in our operating loss as a percentage of revenue was primarily due to our increased gross margins as previously described. Operating loss on a GAAP basis includes amortization of intangible assets and stock-based compensation expense. On a non-GAAP basis, excluding these adjustments, our operating income was $20.3 million in fiscal 2021 compared with an operating loss of $4.4 million in fiscal 2020.
Interest and Other, Net
Interest and other income was $1.0 million in fiscal 2021 compared with an expense of $0.9 million in fiscal 2020. The change primarily reflected the effects of foreign currency transactions and related exchange rate fluctuations.
Income Tax Expense (Benefit)
Our income tax benefit was $9.9 million or 31.1% and $19.7 million or 38.3% of our pre-tax loss in fiscal 2021 and fiscal 2020, respectively. The changes in the effective tax benefit rate were primarily attributable to the improvement in loss before income taxes and the impact of certain discrete adjustments related to stock-based compensation expense of approximately $2.1 million and $2.8 million in fiscal 2021 and fiscal 2020, respectively.
Net Income (Loss)
Our net loss of $21.9 million decreased $9.8 million, or 30.8%, in fiscal 2021. Net income on a non-GAAP basis was $17.9 million, which represented an increase of $17.7 million from fiscal 2020. The changes on both a GAAP and non-GAAP basis were attributable to our improved operating results offset in part by the lower income tax benefit recognized in the current period.
Liquidity, Capital Commitments and Contractual Cash Obligations
Overview
We believe that our cash and cash equivalents together with our accounts receivable will provide us with sufficient liquidity to fund our business and meet our obligations for at least 12 months and for the foreseeable future thereafter. Our future capital requirements will depend on many factors, including our rate of revenue growth, the rate of expansion of our workforce, the timing and extent of our expansion into new markets, the timing of introductions of new functionality and enhancements to our solutions, potential acquisitions of complementary businesses and technologies, continuing market acceptance of our solutions, and general economic and market conditions. We may need to raise additional capital or incur indebtedness to continue to fund our operations in the future or to fund our needs for less predictable strategic initiatives, such as acquisitions. In addition to our $30 million revolving credit facility from Dell, described below, sources of financing may include arrangements with unaffiliated third parties, depending on the availability of capital, the cost of funds and lender collateral requirements.
Selected Measures of Liquidity and Capital Resources
As of January 29, 2021, our principal sources of liquidity consisted of cash and cash equivalents of $220.3 million and accounts receivable of $108.0 million. Our cash and cash equivalents balance as of January 29, 2021 included $85.8 million invested in money market funds pending their use in our business.
Selected measures of our liquidity and capital resources are as follows:
 January 29,
2021
January 31,
2020
 (in thousands)
Cash and cash equivalents$220,300 $181,838 
Accounts receivable, net 108,005 111,798 
We invoice our customers based on a variety of billing schedules. During fiscal 2021, on average, 57% of our recurring revenue was billed in advance and approximately 43% was billed on either a monthly or a quarterly basis. Invoiced accounts receivable are generally collected over a period of 30 to 120 days. The decrease in accounts receivable as of January 29, 2021 from January 31, 2020 reflected increased collection activity. We regularly monitor our accounts receivable for collectability, particularly in markets where economic conditions remain uncertain and continue to take actions to reduce our exposure to credit losses. As of January 29, 2021 and January 31, 2020, the allowance for credit losses was $4.8 million and $5.1 million, respectively. We believe we are adequately reserved for credit risk.

43


Revolving Credit Facility
SecureWorks, Inc., our wholly-owned subsidiary, is party to a revolving credit agreement with a wholly-owned subsidiary of Dell Inc. under which we have obtained a $30 million senior unsecured revolving credit facility. Under the facility, up to $30 million principal amount of borrowings may be outstanding at any time. The maximum amount of borrowings may be increased by up to an additional $30 million by mutual agreement of the lender and borrower. The proceeds from loans made under the facility may be used for general corporate purposes. The facility is not guaranteed by us or our subsidiaries. There was no outstanding balance under the facility as of January 29, 2021. Effective as of March 25, 2021, the facility agreement was amended and restated to extend the maturity date to March 25, 2022 and to modify the annual rate at which interest accrues.
Each loan made under the amended and restated credit facility will accrue interest at an annual rate equal to the applicable London interbank offered rate, or LIBOR, plus 1.54%. Under the amended terms, if LIBOR is no longer published on a current basis and such circumstances are unlikely to be temporary, the facility will be amended to replace LIBOR with an alternate benchmark rate. Amounts under the facility may be borrowed, repaid and reborrowed from time to time during the term of the facility. The borrower will be required to repay in full all of the loans outstanding, including all accrued interest, and the facility will terminate upon a change of control of us or following a transaction in which SecureWorks, Inc. ceases to be a direct or indirect wholly-owned subsidiary of our company. The credit agreement contains customary representations, warranties, covenants and events of default. The unused portion of the facility is subject to a commitment fee of 0.35%, which is due upon expiration of the facility.
Cash Flows
 Fiscal Year Ended
 January 29,
2021
January 31,
2020
 (in thousands)
Net change in cash from:  
Operating activities$60,589 $78,839 
Investing activities(18,086)(12,590)
Financing activities(4,041)(14,003)
Change in cash and cash equivalents$38,462 $52,246 
Operating Activities Cash provided by operating activities was $60.6 million and $78.8 million in fiscal 2021 and fiscal 2020, respectively. The decrease in cash provided by operating activities was primarily driven by the establishment of consistent customer collection rates year over year and a decline in deferred revenue during fiscal 2021 compared with an increase in fiscal 2020. Both items were partially offset by our net transactions with Dell. We expect that our future transactions with Dell will be a source of cash over time as we anticipate that our charges to Dell will continue to exceed Dell’s charges to us, although the timing of charges and settlements may vary period to period.
Investing Activities — Cash used in investing activities totaled $18.1 million and $12.6 million in fiscal 2021 and fiscal 2020, respectively. The use of cash for fiscal 2021 primarily related to our acquisition of Delve for $15.1 million, net of cash acquired, and capital expenditures of $3.0 million. The use of cash for fiscal 2020 consisted primarily of capital expenditures for property and equipment to support our data center and facility infrastructure, as well as certain capitalized costs related to the development of our security analytics software platform.
Financing Activities — Cash used in financing activities was $4.0 million and $14.0 million in fiscal 2021 and fiscal 2020, respectively. The usage in fiscal 2021 reflected employee tax withholding payments of $5.5 million associated with the vesting of stock compensation grants, which was partially offset by proceeds of $1.5 million from stock options exercised during fiscal 2021. The usage in fiscal 2020 reflected employee tax withholding payments of $8.5 million associated with the vesting of stock compensation grants and our repurchase of $6.4 million of our Class A common stock pursuant to our stock repurchase program, which expired by its terms on May 1, 2020, and payment of a long-term financing arrangement of $0.5 million, which was partially offset by proceeds of $1.3 million from stock options exercised during fiscal 2020. For information about our former stock repurchase program, see Notes to Consolidated Financial Statements—Note 10—Stockholders' Equity” in our consolidated financial statements included in this report.

44


Contractual Cash Obligations
Contractual cash obligations are summarized in the following table:
Payments Due by Fiscal Year
(in thousands)Less than 1 year1-3 years3-5 yearsThereafterTotal
Operating leases$6,973 $12,533 $9,879 $4,148 $33,533 
Purchase obligations4,923 4,738 — — 9,661 
Total$11,896 $17,271 $9,879 $4,148 $43,194 

For information about leases and purchase obligations, see Notes to Consolidated Financial Statements—Note 9—Leases” and Notes to Consolidated Financial Statements—Note 8—Commitments and Contingencies in our consolidated financial statements included in this report.
Off-Balance Sheet Arrangements
As of January 29, 2021, we were not subject to any obligations pursuant to any off-balance sheet arrangements that have or are reasonably likely to have a material effect on our financial condition, results of operations or liquidity.
Critical Accounting Policies and Estimates
We prepare our financial statements in conformity with GAAP, which requires certain estimates, assumptions and judgments to be made that may affect our consolidated financial statements. Accounting policies that have a significant impact on our results are described in “Notes to Consolidated Financial Statements—Note 2—Significant Accounting Policies” in our consolidated financial statements included in this report. The accounting policies discussed in this section are those that we consider to be the most critical. We consider an accounting policy to be critical if the policy is subject to a material level of judgment and if changes in those judgments are reasonably likely to materially impact our results.
Revenue Recognition. Secureworks derives revenue primarily from three sources: (1) subscription revenue related to managed security services, (2) software-as-a-service subscription revenue related to our security analytics software platform and (3) professional services, including security and risk consulting and incident response solutions.
Subscription-based managed security service arrangements typically include security services, up-front installation fees and maintenance, and also may include the provision of an associated hardware appliance. The Company uses its hardware appliances in providing security services required to access the Company’s Counter Threat Platform. The arrangements that require hardware do not typically convey ownership of the appliance to the customer. Moreover, any related installation fees are non-refundable and are also incapable of being distinct within the context of the arrangement. Therefore, the Company has determined that these arrangements constitute a single performance obligation for which the revenue and any related costs are recognized ratably over the term of the arrangement, which reflects the Company’s performance in transferring control of the services to the customer.
Taegis is a cloud-native security analytics software platform deployed as a subscription-based software-as-as-service, or SaaS, designed to unify detection and response across endpoint, network and cloud environments for better security outcomes and simpler security operations for our customers. Taegis offerings currently include two applications, Extended Detection and Response, or XDR, and Vulnerability Detection and Response, or VDR. The two SaaS applications are separate performance obligations. They are promises that are both capable of being distinct and distinct within the context of the contract, primarily because they function independently and can be purchased separately from one another. Customers do not have the right to take possession of the software platform. Revenue for our SaaS applications is recognized on a straight-line basis over the term of the arrangement, beginning with provision of the tenant by grant of access to the software platform. Customers also have the option to purchase an add-on managed service to supplement the XDR SaaS application, referred to as our Managed Detection and Response, or ManagedXDR, subscription service. The ManagedXDR service is identified as a distinct performance obligation that is separable from the SaaS application. While a customer must purchase and deploy the XDR software to gain any utility from the ManagedXDR service, a customer can purchase and benefit from using the XDR SaaS application on its own. In order to conclude that the two promises are not separately identifiable, the interrelationship/interdependence would most likely have to be reciprocal between the two separate offerings. The nature of the ManagedXDR service is to stand-ready, or deliver an unspecified quantity of services each day during the contract term, based on customer-specific needs. The ManagedXDR service period is contractually tied to the related software application and, as a stand ready obligation, will be recognized on a straight-line basis over the term of the arrangement.
Amounts that have been invoiced for our managed security service subscription arrangements and our Taegis SaaS application offerings where the relevant revenue recognition criteria have not been met will be included in deferred revenue.
45


Professional services consist primarily of fixed-fee and retainer-based contracts. Revenue from these engagements is recognized using an input method over the contract term.
Secureworks reports revenue net of any revenue-based taxes assessed by governmental authorities that are imposed on, and concurrently with, specific revenue-producing transactions.
We recognize revenue when all of the following criteria are met:
Identification of the contract, or contracts, with a customer—A contract with a customer exists when (i) we enter into an enforceable contract with a customer, (ii) the contract has commercial substance and the parties are committed to perform, and (iii) payment terms can be identified and collection of substantially all consideration to which we will be entitled in exchange for goods or services that will be transferred is deemed probable based on the customer's intent and ability to pay. Contracts entered into for professional services and subscription-based solutions near or at the same time are generally not combined as a single contract for accounting purposes, since neither the pricing nor the services are interrelated.
Identification of the performance obligations in the contract—Performance obligations promised in a contract are identified based on the goods or services that will be transferred to the customer that are both (i) capable of being distinct, whereby the customer can benefit from the goods or service either on its own or together with other resources that are readily available from third parties or from us, and (ii) distinct in the context of the contract, whereby the transfer of the goods or services is separately identifiable from other promises in the contract. When promised goods or services are incapable of being distinct, we account for them as a combined performance obligation. With regard to a typical contract for subscription-based managed security services, the performance obligation represents a series of distinct services that will be accounted for as a single performance obligation. For a typical contract that includes subscription-based SaaS applications, each application is generally considered to be distinct and accounted for as a separate performance obligation. In a typical professional services contract, Secureworks has a separate performance obligation associated with each service. We generally act as a principal when delivering either our subscription-based solutions or our professional services arrangement and, thus, recognize revenue on a gross basis.
Determination of the transaction price—The total transaction price is primarily fixed in nature as the consideration is tied to the specific services purchased by the customer, which constitutes a series of distinct services for delivery of the solutions over the duration of the contract for our subscription services. For professional services contracts, variable consideration exists in the form of rescheduling penalties and expense reimbursements; no estimation is required at contract inception, since variable consideration is allocated to the applicable period.
Allocation of the transaction price to the performance obligations in the contract—We allocate the transaction price to each performance obligation based on the performance obligation's standalone selling price. Standalone selling price is determined by considering all information available to us, such as historical selling prices of the performance obligation, geographic location, overall strategic pricing objective, market conditions and internally approved pricing guidelines related to the performance obligations.
Recognition of revenue when, or as, the Company satisfies performance obligation—We recognize revenue over time on a ratable recognition basis using a time-elapsed output method to measure progress for all subscription-based performance obligations, including managed security services and SaaS applications, over the contract term. For any upgraded installation services, which we have determined represent a performance obligation separate from its subscription-based arrangements, revenue is recognized over time using hours elapsed over the service term as an appropriate method to measure progress. For the performance obligation pertaining to professional services arrangements, we recognize revenue over time using an input method based on time (hours or days) incurred to measure progress over the contract term.
Business Combinations. The Company accounts for business combinations under the acquisition method of accounting. This method requires the recording of acquired assets and assumed liabilities at their acquisition date fair values. The allocation of the purchase price in a business combination requires us to make significant estimates in determining the fair value of acquired assets and assumed liabilities, especially with respect to intangible assets. The excess of the purchase price over the fair value of assets acquired and liabilities assumed is recorded as goodwill. These estimates are based upon a number of factors, including historical experience, market conditions and information obtained from the management of the acquired company. Critical estimates in valuing certain intangible assets include, but are not limited to, cash flows that an asset is expected to generate in the future, discount rates, the time and expense that would be necessary to recreate the assets and the profit margin a market participant would receive. Results of operations related to business combinations are included prospectively beginning with the date of acquisition and transaction costs related to business combinations are recorded within selling, general and administrative expenses in the Consolidated Statements of Operations.
46


Intangible Assets Including Goodwill. Identifiable intangible assets with finite lives are amortized on a straight-line basis over their estimated useful lives. Finite-lived intangible assets are reviewed for impairment on a quarterly basis, or as potential triggering events are identified. Goodwill and indefinite-lived intangible assets are tested for impairment on an annual basis in the third fiscal quarter, or sooner if an indicator of impairment exists. We may elect to first assess qualitative factors to determine whether it is more likely than not (greater than 50% likelihood) that the fair value of our reporting unit is less than its carrying amount, including goodwill. The qualitative assessment includes our consideration of relevant events and circumstances that would affect our single reporting unit, including macroeconomic, industry and market conditions, our overall financial performance, and trends in the market price of our Class A common stock. We will perform a quantitative impairment test by comparing our reporting unit’s carrying amount, including goodwill, to its fair value if any of the aforementioned qualitative factors indicate that it is more likely than not to be impaired. We may choose to perform the quantitative assessment periodically even if the qualitative assessment does not require us to do so. For goodwill and our indefinite-lived intangible assets, if the carrying amount determined through the quantitative analysis exceeds the fair value, an impairment charge is recognized in an amount equal to that excess.
We performed a quantitative assessment during fiscal 2021 largely due to the unique macroeconomic factors caused by the COVID-19 pandemic and concluded based on our quantitative assessment that the reporting unit's fair value exceeded its carrying amount. The assumptions used in the quantitative model to test impairment are consistent with those which we believe hypothetical marketplace participants (market approach) would use. We have determined that we have a single goodwill reporting unit, and, accordingly, for the quantitative analysis, we compare the fair value of this goodwill reporting unit to its carrying value. We also performed a quantitative assessment for our trade name intangible asset during fiscal 2021 using the royalty savings method. The assumptions used in the model value the intangible asset by estimating the cost of royalties saved through its ownership rather than paying a rent or royalty to another party for the use of the asset. Upon performing each of the aforementioned quantitative assessments for goodwill and for our trade name intangible asset, it was determined that no impairment existed at our test date of November 1, 2020. Subsequently, no events occurred through our January 29, 2021 year end that would indicate an impairment exists.
Stock-Based Compensation. Our compensation programs include grants under the SecureWorks Corp. 2016 Long-Term Incentive Plan and, prior to the IPO date, grants under share-based payment plans of Dell Technologies Inc., or Dell Technologies. Under the plans, we and, prior to the IPO date, Dell Technologies have granted stock options, restricted stock awards and restricted stock units. Compensation expense related to stock-based transactions is measured and recognized in the financial statements based on grant date fair value. Fair value for restricted stock awards and restricted stock units under our plan is based on the closing price of our Class A common stock as reported on the Nasdaq Global Select Market on the day of the grant. The fair value of each option award is estimated on the grant date using the Black-Scholes option-pricing model and a single option award approach. This model requires that at the date of grant we determine the fair value of the underlying Class A common stock, the expected term of the award, the expected volatility, risk-free interest rates and expected dividend yield. The annual grant of restricted stock and restricted stock units issued during the fiscal year ended January 29, 2021 vest over an average service period of three years and approximately 15% of such awards are subject to performance conditions. Stock-based compensation expense, regarding service-based awards, is adjusted for forfeitures, and recognized using a straight-line basis over the requisite service periods of the awards, which is generally three to four years. Stock-based compensation expense, regarding performance awards, is adjusted for forfeitures and performance criteria, and recognized on a graded vesting basis. We estimate a forfeiture rate, based on an analysis of actual historical forfeitures, to calculate stock-based compensation expense.
Loss Contingencies. We are subject to the possibility of various losses arising in the ordinary course of business. We consider the likelihood of loss or impairment of an asset or the incurrence of a liability, as well as our ability to reasonably estimate the amount of loss, in determining loss contingencies. An estimated loss contingency is accrued when it is probable that an asset has been impaired or a liability has been incurred and the amount of loss can reasonably be estimated. We regularly evaluate current information available to us to determine whether such accruals should be adjusted and whether new accruals are required.
Recently Issued Accounting Pronouncements
Information about recently issued accounting pronouncements is presented in “Notes to Consolidated Financial Statements—Note 2—Significant Accounting Policies” in our consolidated financial statements included in this report.

47


Item 7A. Quantitative and Qualitative Disclosures About Market Risk
Our results of operations and cash flows have been and will continue to be subject to fluctuations because of changes in foreign currency exchange rates, particularly changes in exchange rates between the U.S. dollar and the Euro, the British Pound, the Romanian Leu, the Japanese Yen, the Australian Dollar and the Canadian Dollar; the currencies of countries where we currently have our most significant international operations. Our expenses in international locations are generally denominated in the currencies of the countries in which our operations are located.
As our international operations grow, we may begin to use foreign exchange forward contracts to partially mitigate the impact of fluctuations in net monetary assets denominated in foreign currencies.

48


Item 8. Financial Statements and Supplementary Data

INDEX TO CONSOLIDATED FINANCIAL STATEMENTS
Audited Consolidated Financial Statements of SecureWorks Corp.Page
Report of Independent Registered Public Accounting Firm
Consolidated Statements of Financial Position as of January 29, 2021 and January 31, 2020
Consolidated Statements of Operations for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019
Consolidated Statements of Comprehensive Loss for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019
Consolidated Statements of Cash Flows for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019
Consolidated Statements of Stockholders' Equity for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019
Notes to Consolidated Financial Statements
Schedule II - Valuation and Qualifying Accounts for the fiscal years ended January 29, 2021, January 31, 2020 and February 1, 2019
49



Report of Independent Registered Public Accounting Firm


To the Board of Directors and Stockholders of SecureWorks Corp.

Opinion on the Financial Statements
We have audited the accompanying consolidated statements of financial position of SecureWorks Corp. and its subsidiaries (the “Company”) as of January 29, 2021 and January 31, 2020, and the related consolidated statements of operations, comprehensive loss, stockholders’ equity and cash flows for each of the three years in the period ended January 29, 2021, including the related notes and financial statement schedule listed in the accompanying index (collectively referred to as the “consolidated financial statements”). In our opinion, the consolidated financial statements present fairly, in all material respects, the financial position of the Company as of January 29, 2021 and January 31, 2020, and the results of its operations and its cash flows for each of the three years in the period ended January 29, 2021 in conformity with accounting principles generally accepted in the United States of America.
Change in Accounting Principle
As discussed in Note 2 to the consolidated financial statements, the Company changed the manner in which it accounts for leases in the year ended January 31, 2020.

Basis for Opinion
These consolidated financial statements are the responsibility of the Company’s management. Our responsibility is to express an opinion on the Company’s consolidated financial statements based on our audits. We are a public accounting firm registered with the Public Company Accounting Oversight Board (United States) (PCAOB) and are required to be independent with respect to the Company in accordance with the U.S. federal securities laws and the applicable rules and regulations of the Securities and Exchange Commission and the PCAOB.
We conducted our audits of these consolidated financial statements in accordance with the standards of the PCAOB. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the consolidated financial statements are free of material misstatement, whether due to error or fraud. The Company is not required to have, nor were we engaged to perform, an audit of its internal control over financial reporting. As part of our audits we are required to obtain an understanding of internal control over financial reporting but not for the purpose of expressing an opinion on the effectiveness of the Company's internal control over financial reporting. Accordingly, we express no such opinion.
Our audits included performing procedures to assess the risks of material misstatement of the consolidated financial statements, whether due to error or fraud, and performing procedures that respond to those risks. Such procedures included examining, on a test basis, evidence regarding the amounts and disclosures in the consolidated financial statements. Our audits also included evaluating the accounting principles used and significant estimates made by management, as well as evaluating the overall presentation of the consolidated financial statements. We believe that our audits provide a reasonable basis for our opinion.

/s/ PricewaterhouseCoopers LLP

Atlanta, Georgia
March 25, 2021

We have served as the Company's auditor since 2014.


50


SECUREWORKS CORP.
CONSOLIDATED STATEMENTS OF FINANCIAL POSITION
(in thousands)
 January 29,
2021
January 31,
2020
ASSETS
Current assets: 
Cash and cash equivalents$220,300 $181,838 
Accounts receivable, net108,005 111,798 
Inventories560 746 
Other current assets17,349 27,449 
Total current assets346,214 321,831 
Property and equipment, net17,143 27,606 
Goodwill425,861 416,487 
Operating lease right-of-use assets, net22,330 23,463 
Intangible assets, net157,820 180,052 
Other non-current assets75,993 78,592 
Total assets$1,045,361 $1,048,031 
LIABILITIES AND STOCKHOLDERS' EQUITY
Current liabilities:
Accounts payable$16,769 $18,690 
Accrued and other current liabilities109,134 98,855 
Deferred revenue168,437 175,847 
Total current liabilities294,340 293,392 
Long-term deferred revenue9,590 12,690 
Operating lease liabilities, non-current22,461 24,669 
Other non-current liabilities51,189 50,400 
Total liabilities377,580 381,151 
Commitments and contingencies (Note 8)
Stockholders' equity:
Preferred stock - $0.01 par value: 200,000 shares authorized; shares issued
  
Common stock - Class A of $0.01 par value: 2,500,000 shares authorized; 12,450 and 11,206 issued and outstanding, respectively
124 112 
Common stock - Class B of $0.01 par value: 500,000 shares authorized; 70,000 shares issued and outstanding
700 700 
Additional paid in capital917,344 896,983 
Accumulated deficit(229,831)(207,929)
Accumulated other comprehensive loss(660)(3,090)
Treasury stock, at cost - 1,257 and 1,257 shares, respectively
(19,896)(19,896)
Total stockholders' equity667,781 666,880 
Total liabilities and stockholders' equity$1,045,361 $1,048,031 

 The accompanying notes are an integral part of these consolidated financial statements.
51


SECUREWORKS CORP.
CONSOLIDATED STATEMENTS OF OPERATIONS
(in thousands, except per share data)
Fiscal Year Ended
 January 29, 2021January 31, 2020February 1, 2019
Net revenue$561,034 $552,765 $518,709 
Cost of revenue242,167 252,796 246,117 
Gross margin318,867 299,969 272,592 
Research and development105,008 94,964 87,608 
Sales and marketing144,934 157,674 141,818 
General and administrative101,760 99,505 91,898 
Total operating expenses351,702 352,143 321,324 
Operating loss(32,835)(52,174)(48,732)
Interest and other, net1,034 850 2,778 
Loss before income taxes(31,801)(51,324)(45,954)
Income tax benefit(9,899)(19,658)(6,853)
Net loss(21,902)(31,666)(39,101)
Loss per common share (basic and diluted)$(0.27)$(0.39)$(0.48)
Weighted-average common shares outstanding (basic and diluted)81,358 80,563 80,710 

 The accompanying notes are an integral part of these consolidated financial statements.


52


SECUREWORKS CORP.
CONSOLIDATED STATEMENTS OF COMPREHENSIVE LOSS
(in thousands)
Fiscal Year Ended
January 29, 2021January 31, 2020February 1, 2019
Net loss$(21,902)$(31,666)$(39,101)
Foreign currency translation adjustments, net of tax2,430 (206)(2,914)
Comprehensive loss$(19,472)$(31,872)$(42,015)

The accompanying notes are an integral part of these consolidated financial statements.
53


SECUREWORKS CORP.
CONSOLIDATED STATEMENTS OF CASH FLOWS
(in thousands)
Fiscal Year Ended
 January 29, 2021January 31, 2020February 1, 2019
Cash flows from operating activities:
Net loss$(21,902)$(31,666)(39,101)
Adjustments to reconcile net loss to net cash provided by operating activities:
Depreciation and amortization41,614 42,932 41,207 
Stock-based compensation expense24,414 19,548 19,370 
Effects of exchange rate changes on monetary assets and liabilities denominated in foreign currencies(1,485)270 (1,818)
Income tax benefit(9,899)(19,658)(6,853)
Other non cash impacts392 1,830  
Provision for credit losses1,810 3,099 2,356 
Changes in assets and liabilities:
Accounts receivable2,557 26,789 13,750 
Net transactions with parent11,788 (12,483)(1,797)
Inventories186 (278)