Autodesk 2015 Annual Report Download - page 114

Download and view the complete annual report

Please find page 114 of the 2015 Autodesk annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 208

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

2015 Form 10-K 22
Because we derive a substantial portion of our net revenue from a small number of products, including our AutoCAD-based
software products and suites, if these products are not successful, our revenue will be adversely affected.
We derive a substantial portion of our net revenue from sales of licenses of a limited number of our products, including
AutoCAD software, products based on AutoCAD, which include our suites that serve specific markets and products that are
interoperable with AutoCAD. Any factor adversely affecting sales of these products, including the product release cycle, market
acceptance, product competition, performance and reliability, reputation, price competition, economic and market conditions,
and the availability of third-party applications, would likely harm our financial results. During fiscal 2015 and 2014, combined
revenue from our AutoCAD and AutoCAD LT products, not including suites having AutoCAD or AutoCAD LT as a
component, represented 28% and 30% of our total net revenue, respectively.
A breach of security in our products, services or computer systems may compromise the integrity of our products or services,
harm our reputation, create additional liability and adversely impact our financial results.
We make significant efforts to maintain the security and integrity of our source code and computer systems. The risk of a
security breach or disruption, particularly through cyber attack or cyber intrusion, including by computer hackers, foreign
governments and cyber terrorists, has increased as the number, intensity, and sophistication of attempted attacks and intrusions
from around the world have increased. These threats include but are not limited to identity theft, unauthorized access, DNS
attacks, wireless network attacks, viruses and worms, advanced persistent threat (APT), application centric attacks, peer-to-peer
attacks, phishing, backdoor trojans, and distributed denial of service (DDoS) attacks. Any of the foregoing could attack our
products, services or computer systems. Despite significant efforts to create security barriers to such programs, it is virtually
impossible for us to entirely eliminate this risk. Like all software, our software is vulnerable to cyber attacks. In the past,
hackers have targeted our software, and they may do so in the future. The impact of cyber attacks could disrupt the proper
functioning of our software products or services, cause errors in the output of our customers' work, allow unauthorized access
to sensitive, proprietary or confidential information of ours or our customers, and other destructive outcomes. Moreover, as we
continue to invest in new lines of consumer products and services we are exposed to increased security risks and the potential
for unauthorized access to, or improper use of, the information of our consumer users. If any of the foregoing were to occur, our
reputation may suffer, customers may stop buying our products or services, we could face lawsuits and potential liability, and
our financial performance could be negatively impacted.
We rely on third parties to provide us with a number of operational services, including hosting and delivery and certain of our
customer services and other operations. Any interruption or delay in service from these third parties, breaches of security or
privacy, or failures in data collection could expose us to liability, harm our reputation, and adversely impact our financial
performance.
We rely on hosted computer services from third parties for services that we provide our customers and computer
operations for our internal use. As we gather customer data and host certain customer data in third-party facilities, a security
breach could compromise the integrity or availability or result in the theft of customer data. In addition, our operations could be
negatively affected in the event of a security breach, and we could be subject to the loss or theft of confidential or proprietary
information, including source code.
Unauthorized access to this data may be obtained through break-ins, breaches of our secure networks by unauthorized
parties, employee theft or misuse, or other misconduct. We rely on a number of third-party suppliers in the operation of our
business for the provision of various services and materials that we use in the operation of our business and production of our
products. Although we seek to diversify our third-party suppliers, we may from time to time rely on a single or limited number
of suppliers, or upon suppliers in a single country, for these services or materials. The inability of such third parties to satisfy
our requirements could disrupt our business operations or make it more difficult for us to implement our business strategy. If
any of these situations were to occur, our reputation could be harmed, we could be subject to third-party liability, including
under data protection and privacy laws in certain jurisdictions, and our financial performance could be negatively impacted.
If we are not able to adequately protect our proprietary rights, our business could be harmed.
We rely on a combination of patent, copyright and trademark laws, trade secret protections, confidentiality procedures,
and contractual provisions to protect our proprietary rights. Despite such efforts to protect our proprietary rights, unauthorized
parties from time to time have copied aspects of our software products or have obtained and used information that we regard as
proprietary. Policing unauthorized use of our software products is time-consuming and costly. We are unable to measure the
2015 Annual Report