Through the Lens - Cybersecurity
Is Cyber the Next Leg Up for IaaS?
Cyber is a tricky business.
Over the last decade, cyber powerhouse Palo Alto Networks (NASDAQ:PANW) has pursued an acquisition strategy that is best understood not as opportunistic deal-making, but as deliberate construction of an ecosystem. Rather than relying solely on internal R&D to extend its product line, the company consistently used acquisitions to assemble a portfolio of cybersecurity software applications that integrate tightly with its core firewall and network security platforms.
In doing so, Palo Alto Networks brought not only new technologies into the firm, but also engineering talent, operating cultures, and a network of many of the most influential executives in the industry. With this comes established customer relationships that accelerated its evolution from a firewall company into a broad, subscription-driven cybersecurity platform.
Let’s Get the Relevant Jargon Out of the Way First
“Hyperscalers” — Alphabet, Amazon, Meta, Microsoft and Oracle.
“Platformization” — The strategic transition from managing a fragmented toolbox of individual, single-purpose software applications (point solutions) to adopting a unified, integrated platform that serves as a central, foundational hub.
“Agentic AI” — An artificial intelligence application that runs and is optimized to run alongside the specific application you’re using or is implemented in your compute framework. Agent AI acts as a “digital worker” or “colleague”.
“Observability” — A well-established category of cybersecurity applications that can find a live threat, then make it visible to network engineers and automated systems, allowing the ability to trace the bad actor even if its form morphs while inside the network.
“Identity Security” — In early days, cybersecurity applications were applied to machines, endpoints and servers. Lately, identity means machines, users and AI agents that operate inside the network firewall regardless of where the function is located in the stack.
“SaaS” — Software as a Service. A cloud-based software application that you don’t buy. It’s a subscription with the vendor with no compute ownership. Like subscribing to Hulu or Peacock on your TV except (this is a metaphor) it’s a software application, not streaming content. ChatGPT is a SaaS application.
“IaaS” — Infrastructure as a Service. A vendor controls your total compute experience, end-to-end, and owns all the underlying components of modern cloud networks: fiber circuits, data centers, submarine cable, network operations, and racks of equipment hosting data and software applications. In the 1990’s we would have called these ISP’s - “Internet Service Providers”.
Over a Decade of Tuck-In Acquisitions
There’s an inflection point, beginning in the last twelve months, where PANW ‘went big’ and completed the acquisition of Chronosphere, a next generation Observability platform for $3.35B. A recent asset sale prior to Chronosphere made by IBM to PANW bolstered the customer portfolio in that space. Then CyberArk (NASDAQ:CYBR) was announced, completed on February 11, 2026 for $25B, two months ahead of initial guidance. The latter is financed with cash and PANW stock. They inked the deal to bolster their Identity Security platform in a world where the AI threats escalate almost daily, and fringe networks are increasingly vulnerable. Like desktop applications, security platforms need AI Agents.
These are blockbuster deals compared with their acquisition history. Picking up CYBR for $25B is already an order of magnitude bigger than the Chronosphere deal at $3.35 billion. And the Chronosphere deal was already an order of magnitude bigger than PANW’s deal size over the past decade, $400m on average. These tuck-ins, privately funded, were successful exits for the VC-financed cyber community.
Modern network security is broadly considered an ecosystem, and it represents a fundamental shift from fragmented security apps. This results, in a maturing industry, to an integrated platform of cybersecurity solutions. Don’t exclude the “people factor”, the engineers who are building the ecosystem and the management teams with deep ties across the cloistered cybersecurity community. It’s a relatively modest niche in the business of Information Technology where management know each other and/or worked together at times along their career path.
The Notion of Acquisitions to Build an Ecosystem
But is this about growth or defensive posturing facing the Hyperscalers? Is PANW scaling by choice – or by necessity? Not sure, but probably both. Let’s use PANW as a proxy for cyber applications that Hyperscalers might want to buy. PANW is buying Chronosphere and CyberArk, at much higher consideration than the average of the deals they’ve done in more than the last ten years. It indicates they decided to add larger, horizontal acquisitions before a Microsoft or Google decide to spend their cash and beat them to it, such as buying Check Point or Fortinet for example. This ultimately would make a big cyber company part of the developing Infrastructure as a Service (IaaS) model for Hyperscalers.
Palo Alto Networks’ early success was anchored in next-generation firewall technology, but the company’s leadership recognized early that network security alone would not remain a sufficient control point in enterprise IT environments. As workloads migrated to the cloud, applications became distributed, and “Identity” replaced physical location as the primary security flash point. Identity can be a human, a machine, a database application, and lately some AI Agent running on networks live on the network. The firm faced a strategic choice: remain a best-in-class firewall vendor or expand into a broader security platform that accommodates Identity threats.
The acquisition path Palo Alto Networks chose suggests a clear answer. Rather than attempting to build every adjacent capability organically, the company found emerging cybersecurity niches and selectively acquired companies that were already credible players with a narrowly defined cyber solution. These acquisitions were rarely about scale. A catalog of the companies PANW acquired and solutions they served are in Table 1.
In the late 1990’s and early 2000’s, specialized cyber software applications lived on separate physical or virtual servers whose code and operations swirled around the native functions of the firewall. This created silos where data was redundant between apps and soon became a management nightmare. The modern firewall ecosystem consolidates this collection of standalone applications into a single, high-performance software platform that runs in conjunction with the hardware and monitors/protects all of these data assets.
In 2018, New Edge Analytics published a group of articles about PANW as a proxy for the industry simply because of their firewall legacy. The tuck-in acquisitions PANW was making then are better called “vertical integration” now by M&A analysts, and for PANW this fits a recognizable pattern; deals ranging in size from $150m to $700m.
These were classic tuck-ins: small enough not to strain the balance sheet, but large enough to materially advance the firm’s technical roadmap. In economic terms, these deals increase control over the entire security stack and raise revenue through cross-selling. This creates a value chain and reduces time-to-market with new features, rather than requiring time spent on R&D and internal coding.
| Year | Company | Deal Size | Core Capability | Headquarters |
|---|---|---|---|---|
| Tuck-In Acquisitions (2015–2024) | ||||
| 2015 | Cyvera | $200M | Endpoint Security | Tel Aviv, Israel |
| 2016 | LightCyber | $100M | Behavioral Analytics | Herzliya, Israel |
| 2017 | Evident.io | $300M | Cloud Security Posture | San Mateo, USA |
| 2018 | RedLock | $173M | Cloud Compliance | Tel Aviv, Israel |
| 2019 | Twistlock | $410M | Container Security | Herzliya, Israel |
| 2019 | Demisto | $560M | SOAR Automation | Tel Aviv, Israel |
| 2019 | PureSec | $50M | Serverless Security | Tel Aviv, Israel |
| 2019 | Zingbox | $75M | IoT Security | San Jose, USA |
| 2019 | Aporeto | $150M | Workload Identity | San Jose, USA |
| 2020 | CloudGenix | $420M | SD-WAN / SASE | San Jose, USA |
| 2020 | Crypsis Group | $265M | Incident Response | McLean, USA |
| 2020 | Expanse | $670M | Attack Surface Mgmt | San Francisco, USA |
| 2021 | Bridgecrew | $156M | DevSecOps | Tel Aviv, Israel |
| 2022 | Cider Security | $195M | Application Security | Tel Aviv, Israel |
| 2023 | Dig Security | $350M | Data Security | Tel Aviv, Israel |
| 2023 | Talon Cyber Security | $625M | Secure Browser | Tel Aviv, Israel |
| 2024 | Protect AI | $675M | AI Model Security | Seattle, USA |
| Recent Additions Affecting Capital Structure (2024–2026) | ||||
| 2024 | IBM QRadar SaaS Assets | $1.14B | SIEM Expansion | Global |
| 2026 | Chronosphere | $3.35B | Cloud Observability | San Mateo, USA |
| 2026 | CyberArk | $25B | Identity Security | Petah Tikva, Israel |
Executive Pedigree, and Quality of Earnings
An underappreciated dimension of Palo Alto Networks’ acquisition strategy, in terms of the companies acquired, is the consistent presence of senior executives, both within PANW and among acquired companies, who trace their professional careers to the Israeli Army’s intelligence community, particularly Unit 8200. This pedigree is not relevant as a matter of geopolitics or covert activity. Its importance lies in how it shapes strategic priorities, authenticates customer credibility, and fosters peer communication to line up government contracts – which are a more stable sales pipeline than experienced with commercial customers.
At the center of this lineage is PANW founder Nir Zuk, who served in Unit 8200 prior to founding the company in 2005 and, at the time of the 2018 NEA publications, was Chief Technology Officer and a board member (a role he continues to hold). His background established early cultural norms around PANW’s signals intelligence work, and implementation of large-scale systems engineering projects.
| Executive | Company | Role | InfoSec Background | Acquisition Year | Current / Subsequent Role |
|---|---|---|---|---|---|
| Nir Zuk | Palo Alto Networks | Founder; CTO (2018); Board Member | Unit 8200 (SIGINT) | N/A | Board Member |
| Assaf Rappaport | Cyvera | Co-founder / CEO | Unit 8200 | 2015 | Former PANW exec; Founder of Wiz |
| Lior Div | Cyvera | Co-founder / President | Unit 8200 | 2015 | Former PANW exec; Founder of Wiz |
| Adi Dar | Cyvera | Co-founder | Unit 8200 | 2015 | Former PANW engineering leadership |
| Nir Gaist | LightCyber | Co-founder / CTO | Unit 8200 | 2016 | Former PANW analytics leadership |
| Idan Tendler | Bridgecrew | Co-founder / CEO | Unit 8200 | 2021 | Senior leader, PANW AppSec |
| Daniel Krivilevich | Cider Security | Co-founder / CTO | Unit 8200 | 2022 | Senior technical leader, PANW AppSec |
| Dan Benjamin | Dig Security | Co-founder / CEO | Unit 8200 | 2023 | Senior leader, PANW Data Security |
| Ofer Ben-Noon | Talon Cyber Security | Co-founder / CEO | Unit 8200 | 2023 | Senior leader, PANW Endpoint |
The US intelligence community equivalent of Unit 8200 owning the SIGINT charter is the National Security Agency, but NSA is much larger. PANW works here too. Government contracts – particularly in the US defense and intelligence agencies – tend to be longer-term, budgeted years in advance, and less sensitive to short-term IT spending cycles. It’s public knowledge that the US is a political and military ally with Israel. It’s easy to rationalize that PANW has predictable cash flow from government contracts which improve what we call earnings quality.
From an equity analysis perspective, this distinction is material. Revenue streams with lower volatility support more durable growth projections in discounted cash-flow models and ultimately lead to higher valuations – an advantage (better terms) when financing acquisitions. When viewed through this lens, PANW’s pattern of integrating executives with Unit 8200 pedigree is not incidental. It’s an intentional complement to the firm’s acquisition-driven expansion across both government and commercial cybersecurity markets.
The Other Side of the Inflection Point
For nearly a decade, Palo Alto Networks deployed capital in increments measured in hundreds of millions of dollars. The objective was consistent: acquire specific capabilities, integrate them into the platform, and expand depth across the cybersecurity stack. Beginning in 2024, that pattern changed. Transactions moved from feature acquisition to capitalization strategies. The difference is not merely scale. It reflects a shift in corporate posture.
The acquisition of IBM’s QRadar SaaS assets marked the first signal of that transition. This was not a narrow technology addition. It expanded distribution and brought an installed enterprise base into the PANW Cortex ecosystem – their brand of AI-driven, cloud-native security operations. Chronosphere extended that logic into Observability, increasing telemetry depth and positioning PANW closer to infrastructure-level visibility. CyberArk moved further still, adding Identity Security at enterprise scale after closing on February 11, 2026. Identity Security is the buzz of this deal. Unlike earlier tuck-ins, CYBR required capital deployment including the use of equity. That alone signals structural change for Palo Alto. All of the prior deals were done in cash.
Figure 1. Cumulative acquisition spend, 2015–2026
Capital deployment is steady through 2024, then steps up sharply in 2026 with Chronosphere and CyberArk.
The cumulative investment curve illustrates the break. Capital deployment was steady through 2024. Beginning in 2025 and into 2026, the curve turns sharply upward. The competitive landscape provides context. Hyperscalers control IaaS and increasingly embed security within compute environments. As AI workloads expand, Observability and Identity Security sit adjacent to core infrastructure. A large acquisition by a Hyperscaler in these domains would reshape competitive positioning. Scaling now reduces the probability that PANW remains confined to its historical perimeter, they have a seat at the table in other words.
This is not a departure from prior discipline. It is the logical extension of a decade spent building platform depth. The difference is that depth alone is no longer sufficient. Capital scale, distribution breadth, and balance sheet flexibility now matter. The inflection point represents maturity, not abandonment of strategy, but it introduces a new phase in which capitalization becomes as important as integration.
Through the Lens of New Edge Analytics
Is cyber really a tricky business? Well, there still is a great deal of fragmentation, some consolidation, and a lot of moving parts. And the fear of losing control of your destiny in the cyber market to a Hyperscaler isn’t entirely unfounded. In December 2025, PANW announced the intent to spend $10B in partnership with Google to migrate key internal workloads to Google Cloud. The companies said the deal is an expansion of their existing strategic partnership and will deepen their engineering collaboration. Palo Alto Networks is now using Google’s Gemini AI models to power its copilots, and it is also using Google Cloud’s Vertex AI platform.
Vertical deals optimize what PANW can sell. CyberArk and Chronosphere are horizontal integrations. Horizontal deals expand who PANW can sell to. These deals add large groups of new customers and substantially more Annual Recurring Revenue. It stabilizes cash flow. This immediately expands market share in the whole of the cybersecurity industry. The resulting aspect, scaling the platform through sheer growth in the number of customers, creates the opportunity to deploy PANW’s vertically integrated ecosystem across a much broader customer base by cross-selling in both government and commercial markets.
PANW began to pursue horizontal expansion only after it had a sufficiently deep, internally integrated platform to monetize effectively. And the ferocious adoption of AI solutions is impacting the cybersecurity industry as a whole creating a race to be a market leader.
Finally, and not to be overlooked, PANW has a history of bringing industry leaders along with the tuck-in acquisitions, and by way of that, their relationships with senior executives in the industry – simply meaning they know the space. And with that pedigree, a depth of professional relationships across the customer base and industry peers.
Taken together, the progression to larger mega deals paid for with stock suggests strategic maturity rather than strategic drift (a loss of focus) and that’s a reasonable justification to do the deals. PANW first invested in building depth – owning the technical primitives of modern cybersecurity – before committing capital to expand breadth, adding companies who already have a large and mature customer base. A motive force that’s likely to continue for them.
Copyright © 2026 New Edge Analytics. All rights reserved.
Through the Lens - Public Policy
Star Trek lovers - you will remember the movies, Star Trek II: The Wrath of Khan, Star Trek
III: The Search for Spock, and Star Trek IV: The Voyage Home. And that the central theme for
these three movies embodied the “Genesis Device”; a revolutionary but dangerous
technology that creates a living planet from lifeless matter. This piece is not about that!
Although I guarantee you policy peops in the Federal Government gave it some thought
when considering what our government should be doing with Artificial Intelligence.
The “Genesis Mission” – launched via an Executive Order by President Trump – is not an academic or research science program. Nor is it entertainment. It’s a funding vehicle; established to allow Congress to create spending legislation and fund strategic public and private sector investment that will make America the predominant AI-capable sovereign nation. And to be economically and politically ahead of the rest of the world, most importantly China.
The importance of this policy move doesn’t rest on immediate federal appropriation, but on the ability to make future appropriations. And to anchor U.S. scientific discovery and national-security workloads inside a hybrid public–private compute ecosystem. Already, we can see that the agenda is supported by private sector capital in the order of hundreds of billions of dollars. This is real money. The developments are in the daily news cycle. We can’t avoid hearing about political and economic implications with AI.
The central analytical question is not, “How large is Genesis?” but rather, “How much incremental spending”, and infrastructure pull-through does Genesis create across the AI stack? This beyond the money that hyperscalers already are planning to spend – a level of investment forecasted to exceed $500 billion annually by 2026.
A Platform Mandate
The executive order establishing Genesis frames the initiative as a coordinated national effort to build an AI platform capable of training scientific models, deploying autonomous research agents, and automating discovery workflows; like evaluating DNA structure and modeling catastrophic weather systems. It also applies to the performance of defense assets in a myriad of offensive and defensive military scenarios.
Crucially, the executive order does not create a channel for new appropriations. Rather, it functions as a coordination instrument that re-prioritizes existing federal spending plans and signals long-term policy intentions. A good analogy would be, for example, moving water (money) from one (spending) bucket to another.
From an investment and infrastructure perspective, this distinction matters. Genesis is not a one-time spending event. It is a policy overlay that shapes capital allocation across the AI ecosystem. We need to become acquainted with discussing ‘ecosystem’ in the context of AI spending.
DOE as the Logical Anchor
Genesis will be implemented through the Department of Energy, fusing High-Performance Computing resources at DOE national laboratories with the private sector. Although competition with China is an unsaid strategic agenda, it is a logical look at the rest of the world already in a race to be the dominant benefactor of AI technologies. China would probably be considered the largest economic and political threat to the US with the use of AI. Russia, Iran, and fragments of the Middle East after that.
The Department of Energy is uniquely positioned to execute Genesis because of its stewardship of the national laboratory system, and its decades-long experience managing capital-intensive scientific infrastructure. DOE already operates the world’s most advanced, government-owned supercomputers and maintains institutional expertise with public and classified use of these critical resources.
Genesis builds upon existing federal R&D and security compute footprint rather than beginning a new spending conduit from point zero. The DOE FY2026 budget approved places total spending at approximately $46 billion, with the Office of Science accounting at roughly $7 billion of that. Within these buckets, Advanced Scientific Computing Research (ASCR) programs remain at approximately $1 billion in approved annual spending. The largest budget component, for the National Nuclear Security Administration (NNSA), exceeds $30 billion. Roughly two-thirds of FY2026 budget.
Scenario-Based Spending
Because Genesis lacks dedicated appropriations, its fiscal impact is best analyzed through scenarios. In a Re-Vectoring Scenario, Genesis primarily reorganizes existing federal spending, with incremental costs limited to software integration, staffing, and targeted procurements. Incremental federal outlays in this case would likely be in the low single-digit billions of dollars annually.
In a Platform-Build Scenario, Congress provides incremental funding to support Genesis as a national AI infrastructure priority. Annual incremental spending could rise to the mid-single-digit or low double-digit billions of dollars in scale, supporting new high performance computer systems. Networking capacity, storage, cybersecurity and natural resources like energy from the electrical grid, and water for cooling become a level of investment that can’t be ignored and will require some government backing.
In a National Mobilization Scenario, Genesis becomes a sustained, program over several decades with dedicated appropriations exceeding $10 billion per year. Even in this scenario, federal spending remains modest relative to private capital expenditures by hyperscalers (Google, Microsoft and AWS for example). But then, the private sector companies are entitled to make a profit from their CapEx. Federal spending is a necessary financial injection (or backstop if you will) so this buildout can happen rapidly; simultaneously promoting confidence that the projects will be completed. Failure to complete would be a huge black eye for everyone involved with the AI buildout not to mention the loss of investment dollars, the impact on corporate profits and the health of the economy in general. At this scale, once started, it will be difficult and painful to quit or turn back.
The Impact of Private Sector Capital
Lisa Su, CEO of Advanced Micro Devices, gave the keynote address at the 2026 Consumer Electronics Show (CES) in January. Her two-hour presentation included visiting corporate and government executives illustrating their plans for the use of AI compute once corporate spending is well underway and by the time the first stage of AI datacenter infrastructure is largely built.
Michael Kratsios, Director of the White House Office of Science and Technology Policy in the Trump Administration, joined the discussion and pointed to the already funded development of two new supercomputers at the Oak Ridge Laboratory in California; one code named ‘Lux’ (planned to be online in H1 this year), the other named ‘Discovery’. DOE already manages the world’s fastest supercomputer, El Capitan, at the Lawrence Livermore National Laboratory near San Francisco.
Given the proximity of these three ultra-high-powered machines to Silicon Valley, expect a meaningful and robust public-private partnership with the labs to build the ecosystem. Some of this work will be classified, other work will likely be ready for immediate industrial and academic use. Beyond the energy, defense and intelligence communities, the two largest private industries slated for research will include healthcare (biotechnology) and finance. Followed or coincident with fringe network devices, manufacturing systems and robotics.
Industry analyses project total capital expenditures by major cloud service providers to exceed $520 billion in 2026, with some estimates higher than $600 billion. Of this total, roughly 70 to 75 percent is expected to be directly related to AI infrastructure, including servers, HPC accelerators, the networking matrix, data storage, and data center construction.
The market forecast for servers reinforces this view. The global server market in terms of money spent for rack-built processors and networking gear is projected to rise from approximately $253 billion in 2024 to over $565 billion this year.
Building the Relevant Infrastructure
Genesis reinforces several durable investment themes. First, accelerated computing remains central. Scientific AI workloads are among the most compute-intensive applications with continuous demand for high-bandwidth CPU/GPU/TPU chips and memory systems. Lisa Su at AMD and Jason Huang at Nvidia regularly point this out in presentations. Dr. Su forecasts the worldwide compute demand in the next five years to exceed 10 Yottaflops1 (10 followed by 24 zeroes) based on what we know now – and the estimate is subject to change.
Second, Large Language Models rely on the movement and retention of bits and bytes, ones and zeros, for workflow orchestration, and instrument integration rather than raw compute alone. Imagine the amount of networking and storage needed as billions of individuals, government and corporate users grow their own storage space in the cloud using LLM.
Third, secure hybrid platforms become essential. Genesis incorporates the use of national security methods and sensitive datasets: private US government records regarding defense programs, government agency financing, and spending patterns for example. Cybersecurity solutions for AI will have a big role here.
Finally, power and facility infrastructure emerge as a second order but unavoidable constraint. The scale of AI infrastructure investment implied by current forecasts investment in power generation: the ‘grid’, meaning power plants, transmission facilities, and cooling systems, is capital intensive and in need of expansion. Already, the most advanced two-nanometer and three-nanometer process manufactured chips – which are actually trays of microprocessors and circuit boards built into rack systems in data centers – cannot operate without substantial closed loop water-cooling systems.
Through the Lens of New Edge Analytics
John Chambers, former CEO of Cisco, once famously said that Cisco could grow at a rate of 30 percent annually, indefinitely, and indeed in perpetuity, forever. Of course, he was terribly wrong, and I guess his economics staff on Cisco’s payroll (with stock options) wouldn’t tell him. Compounding at 30 percent, even with Cisco’s valuation at the time, would mean over the course of a decade or so, Cisco as a revenue-producing company would overtake US Nominal GDP. The Tech Wreck followed and nixed that idea without involving the economists.
People say sometimes about fabulous growth in the IT sector, that ‘this time it’s different’, the five most dangerous words when investing. But it might be a little different this time. Maybe we learned something from the Tech Wreck in the early 2000’s and the Financial Crisis of 2009 that ushered in the Great Recession. With the latter, Congress mandated all the Wall Street banks to be placed under the jurisdiction of the Federal Reserve, like traditional banks. And their ability to create junk bond financing and pools of subprime mortgages would be severely curtailed if not outright eliminated. Regulated in other words.
Genesis is a catalyst creating an ecosystem to motion public and private investment to converge around AI infrastructure as an industry. Genesis is American Capitalism. Genesis serves as a strategic guidepost for the broader AI economy. Personally, I would vote for the National Mobilization Scenario as the most likely format for public policy going forward, signaling a long-term commitment by the government, integration of data centers with the energy grid, and mining for fuels. And remember these are ‘reappropriations’, meaning it is allocation of existing capital created through existing federal legislation that can be directed elsewhere without new and likely partisan spending bills.
The Genesis Mission, implemented through the Department of Energy, amplifies several key infrastructure themes – enormous requirements for compute, provisions for data networking and storage, secure hybrid platforms and all of this while managing growing constraints due to the need for power and cooling systems. It’s well known that the electrical grid in America is aging rapidly and needs a facelift anyway. Taken together, Genesis emerges as a coordinated effort allowing profit in the private sector while backing the effort with federal spending for multiple beneficiaries. Recognize that AI is here to stay and Genesis is as good an idea as we have now to build it.
Footnote
1 FLOPS are ‘floating point operations per second’, the common measure of RISC processor computing performance in terms of speed. By the way of one acronym referencing another, RISC means ‘reduced instruction set computer’, a chip architecture made popular in the scientific, open-source community, compared with Intel x86 processors, an architecture so dominant with office automation and industrial use.
Copyright © 2026 New Edge Analytics. All rights reserved.
Through the Lens - Corporate Debt and AI
The four most dangerous words with investing are, "this time it's different", with asset bubbles in particular. Consider for a moment that The Tech Wreck in 2000 and The Mortgage Crisis in 2008 were anomalies, the 100 Year Flood, a Black Swan Event. There were structural economic disconnects in the bond market that did cause these two severe market reversals and the recessions that followed them. We as humans suffer from an effect called "The Psychology of Recent Expectations". If we lived through these two painful events during our careers, we believe something similar can easily happen again. Maybe not. Maybe we are in a Supercycle of unprecedented growth in Information Technology, due to AI.
The article below is OpenAI generated, simply to show readers how effective and productive AI can be. It took a couple of hours to prompt ChatGPT for the material, organize it, and automatically generate CSS/HTML code to fit with the formatting. I "taught" GPT-5 the formatting simply by adding a link to this website (built in 2016). It replicated the formatting to match.
No requirement was played back (nothing was returned in the chat by the program) requesting a prompt for the math and the interrelated data that was automatically formatted and placed in tables. The numbers were pulled from financial reports, and they are accurate (I checked). It took more time for the editing and formatting to fit my writing style.
The prompts I gave ChatGPT followed this thought process: Illustrate the capital required to finance the buildout for AI among the top five hyperscale data center companies between 2021 and 2025. Show how the accumulation of new debt compares with market capitalization and debt-to-equity ratios for these five companies. There are good financial reasons to look at these specific numbers and ratios as they are, especially in the context of rising share prices, and whether this multi-year stock market rally is for real. Read on.
Tom Finkenbinder, analyst, author, prompter, editor, enabler.
Summary: From 2021–2025, Amazon, Alphabet, Microsoft, Meta, and Oracle financed hyperscale data-center construction and AI infrastructure buildout with a blend of operating cash flow and new long-term debt. Market capitalization growth, impacted by share prices, generally outpaced leverage, keeping debt-to-equity ratios moderately in check (Oracle excepted).
1. Alphabet (Google Cloud)
Alphabet’s 2020 multi-tranche notes (including a record sustainability tranche) underpinned energy-efficient data-center expansion for Google Cloud, using proprietary AI chips and agents (Trillium/Gemini). Expect more money directed to designing custom silicon for AI.
| Year | Long-Term Debt (US$ B) | Market Cap (US$ T) | Debt/Equity |
|---|---|---|---|
| 2021 | 14.8 | 1.9 | 0.06 |
| 2022 | 14.7 | 1.3 | 0.09 |
| 2023 | 25.1 | 1.7 | 0.08 |
| 2024 | 23.6 | 3.0 | 0.07 |
| 2025 | 23.6 | 3.05 | 0.07 |
2. Amazon (AWS)
Jumbo 2020–2021 notes funded new AWS regional buildout. The overall level of debt versus equity (D/E) later stabilized as Amazon's stock price recovered sharply, compressing the D/E ratio via growth rather than debt repayment.
| Year | Long-Term Debt (US$ B) | Market Cap (US$ T) | Debt/Equity |
|---|---|---|---|
| 2021 | 48.7 | 1.7 | 1.00 |
| 2022 | 58.2 | 0.9 | 0.84 |
| 2023 | 58.7 | 1.6 | 0.65 |
| 2024 | 52.6 | 2.35 | 0.46 |
| 2025 | 52.6 | 2.40 | 0.45 |
3. Microsoft (Azure)
Opportunistic borrowing, by adding low-coupon, long-maturity bonds (2020–2021) was core to Microsoft's debt strategy. Plus, strong operating cash flow was employed to keep debt stable near US$40 B as Azure scaled. D/E at about ~0.3 remained steady.
| Year | Long-Term Debt (US$ B) | Market Cap (US$ T) | Debt/Equity |
|---|---|---|---|
| 2021 | 41.0 | 2.5 | 0.30 |
| 2022 | 47.0 | 2.3 | 0.31 |
| 2023 | 43.0 | 2.9 | 0.28 |
| 2024 | 40.2 | 3.8 | 0.30 |
| 2025 | 40.2 | 3.8 | 0.30 |
4. Meta Platforms
Meta was a first-time corporate bond issuer in 2022. By 2025 Meta had ~US$28.8 B in new long-term debt on the balance sheet to fund AI-ready datacenter redesign, and AI training clusters. Leverage stayed modest compared to the stock price as it rebounded. Meta has a history of preferring to "buy" rather than "build".
| Year | Long-Term Debt (US$ B ) | Market Cap (US$ T ) | Debt/Equity |
|---|---|---|---|
| 2021 | 0.0 | 0.9 | 0.00 |
| 2022 | 10.0 | 0.3 | 0.11 |
| 2023 | 25.0 | 0.9 | 0.18 |
| 2024 | 28.8 | 1.9 | 0.20 |
| 2025 | 28.8 | 1.9 | 0.20 |
5. Oracle (Oracle Cloud Infrastructure)
Oracle used leverage rather than cash or stock to fund the Cerner acquisition and subsequently refinanced the transaction. But OCI expansion advanced in parallel. Staggered bond maturities and their predictable software revenue stream aided interest payment coverage for the debt.
| Year | Long-Term Debt (US$ B) | Market Cap (US$ B) | Debt/Equity |
|---|---|---|---|
| 2021 | 75 | 250 | ≈ 7.0 |
| 2022 | 77 | 220 | ≈ 8.0 |
| 2023 | 81 | 300 | ≈ 6.0 |
| 2024 | 85 | 653 | ≈ 4.5 |
| 2025 | 85 | 700 | ≈ 4.3 |
Debt Expansion vs Market Cap Growth (2021→2025)
Here we compare the effects that increasing leverage might contribute to growth in value of a company based on its outstanding shares of stock and current stock price. Considering these metrics alone aren’t quite enough to definitively say that infrastructure funded by long-term debt is causing the value of the company’s capitalization to increase. We need to look at more than one relationship.
| Company | Δ Long-Term Debt (US$ B ) | Δ Market Cap (US$ T) |
|---|---|---|
| Alphabet | +8.8 | +1.15 |
| Amazon | +3.9 | +0.7 |
| Microsoft | −0.8 | +1.3 |
| Meta | +28.8 | +1.0 |
| Oracle | +10.0 | +0.45 |
Aggregate Leverage Comparison (2021–2025)
This is an expectations reset, to realize that an industrial buildout so heavily capitalized and widespread is a fundamental engine for growth in the economy. Here, we’re simply looking at the five companies and their debt investment as a whole, compared with their total market capitalization. This is useful for comparison with GDP data, and beyond the scope of this article.
| Year | Combined LT Debt (US$ B) | Combined Mkt Cap (US$ T) | Aggregate D/E |
|---|---|---|---|
| 2021 | 180 | 7.3 | 0.35 |
| 2022 | 210 | 5.0 | 0.42 |
| 2023 | 233 | 7.6 | 0.31 |
| 2024 | 231 | 11.7 | 0.22 |
| 2025 | 230 | 11.9 | 0.21 |
Debt Features & Maturity Profiles
The high-bandwidth, full-stack semiconductor solutions for GPU's are being installed by AMD, Nvidia and Broadcom. In order to realize the full potential of implementing AI, more capabilities beyond the already robust features and performance of these RISC processors will be needed. It's hard to directly measure the link between new bond issuance in capital markets and the infrastructure buildout. But all five companies tapped the bond market issuing fixed-rate, long-maturity bonds, ten, to thirty-year maturities, with Wall Street underwriters (2020–2021).
These debt structures (and remember these are established S&P 500 companies with stellar track records) offered limited exposure to the interest rate volatility we experienced in 2022–2024. Use of the proceeds, while often noted as "for general corporate purposes” in financial statements, maps directly to technical infrastructure: data-center campuses, custom silicon (Trillium/Trainium/Maia/MTIA), backbone fiber, and renewable energy sources. It's the biggest thing going on in IT at the moment, and is a multi-year, even a decade(s) level of effort.
The AI Infrastructure Multiplier
Modest leverage increases coincided with outsized equity gains even as the financial analysis discounted AI-driven cash flows. Meaning that market capitalization, calculated from share price, outpaced the assumption of new debt regardless of whether AI revenue (if any) contributed to the mix.
| Company | Debt Growth % | Market Cap Growth % |
|---|---|---|
| Alphabet | +59% | +60% |
| Amazon | +8% | +41% |
| Microsoft | −2% | +52% |
| Meta | ∞ (from 0) | +110% |
| Oracle | +13% | +160% |
Capital Efficiency & Leverage Strategy
Alphabet and Microsoft: are minimalist borrowers, preferring use of cash flow and stock for growth. They use debt for interest rate arbitrage and optionality – meaning an alternative to other forms of equity and debt structure. Amazon: is self-funded with scaling, meaning for now they don't need to raise money in the bond market (post-issuance plateau). Meta: is a first-time capital markets borrower, using leverage to accelerate their AI buildout and data center pivot. Oracle: employs leverage to grow their AI footprint by acquiring smaller, AI-capable companies. Oracle has predictable cash flow from their enormous installed base of Java customers, and a stable software subscription model. Their pedigree supports future development as an IaaS company, Infrastructure as a Service. Alphabet is moving in the same direction.
Debt as an AI Enabler
Debt with hyperscale companies this large created a new term used in earnings announcements called "capacity moats". This is a strategic endeavor employed to create compute campuses, install GPU upgrades to the latest platforms, and create fiber routes - dig trenches and run local/regional fiber loops and long-haul circuits. Alphabet actually has dedicated submarine fiber cable. It's economic; create high barriers to entry in the hyperscale data center market. So far low debt coupons and rising scale for the data center buildouts among these five companies seem to be working. There is apparently as a group, enough cash sloshing around to support interest payments on the new debt. Finally, these companies are paying attention to ESG mandates from the government (Environmental, Social and Governance), reinforcing compliance with new energy efficiency regulations for power-hungry AI clusters, a political stress point. And the federal government is an active player as a non-trivial funding agent with the buildout.
Leverage vs. AI Leadership
There seems to be a moderate, positive correlation between rising leverage and the blistering speed of infrastructure buildout (Meta and Amazon are the examples). With stable leverage increases, Microsoft and Alphabet rely on strong operating cash flow. Oracle's challenges illustrate that debt quantity alone doesn’t guarantee an AI advantage, and that capital efficiency - the combined use of debt and equity - must occur without imposing negative impact on leverage ratios. Wall Street analysts look at leverage ratios carefully to assess financial health.
Outlook Beyond 2025
Expect further green/AI-linked financing (Alphabet, Microsoft). Expect continued self-funding with selective new debt issuance (Amazon). Watch for the use of occasional bond market taps balancing stock buybacks. Meta is good at this but all five are balancing the money spent on stock buybacks and personnel costs to offset new borrowing costs. Most report this dynamic in their earnnings conference calls. Oracle must gradually deleverage their balance sheet to stay competitive despite the large base of Java customers. Key variables for all five include: energy cost, chip supply, and government policy incentives.
Conclusion
Between 2021 and 2025, these firms deployed low-cost, long-term debt to secure capital-intensive AI infrastructure, while keeping leverage in check. Each borrowed dollar creates a multiple of market value. Debt served as a deliberate accelerator of technological leadership. Broadly, the industry represented by these companies is achieving AI buildout by borrowing money on favorable terms, rather than issuing new stock, while keeping their overall debt levels and interest rate payments in check. Keep this thesis in context compared with the almost daily news cycle about an AI bubble overdue to burst. There will be a correction at some point, markets always do, but the financials support the notion that this doesn't quite feel like another Black Swan Event or 100 Year Flood.
Copyright © 2025 New Edge Analytics. All rights reserved.
The New Tech Economy
volume xx - issue 2
By Definition: Part 1
A friend of mine called me out recently about the stocks I’ve bought in recent months, and that I advertise New Edge Analytics as a niche proxy hunter. More like a buy-side equity analyst, looking for pure plays in certain tech industries. Software and semiconductors mainly. He aptly pointed out that I went with mega-caps, multiple industries, multiple markets, multiple technology solutions. And he had me there. I had to think about it and remind myself what fits my definition of a proxy.
New Edge exercises a disciplined approach to performance recognition among IT companies. A company has a proxy when NEA attributes outstanding growth to a tangible product that, standing alone, makes a positive contribution to earnings and moves the price of the stock. Staying true to the core, stocks with good fundamentals, New Edge adds emphasis to technical indicators; the patterns that show up in the stock charts of publicly traded companies. I have always used technical indicators to pick entry and exit points but have added weight to those methods to pick growth stocks that would otherwise be ruled out based on their fundamentals alone.
Every seven years on average the stock market gives you the opportunity to shuffle the deck and pick new economy leaders. That is how you must look at bear markets and corrections in the long run – opportunities. It was twelve years ago, using 2018 as the middle of a bear market lasting 17 months, that the S&P 500 dropped over 56%. At the time some of the technologies among the companies named in this essay had been in development for at least several decades. But they were not yet mainstream and hence an investment in these stocks came along with high risk. Some fell hard in the Great Recession. Some mentioned here were under $5 per share – penny stocks.
The companies that suffered with bleeding edge innovation in that bear market have in a few sectors become companies that produce strong growth in earnings now. They enjoy double digit earnings growth year-over-year, and (prior year) quarter-over-quarter. Software and semiconductor technologies that once fit the description of a niche are now developed or acquired by companies that participate in multiple markets. These technologies include subscription software, 4G/5G mobile networks, cloud computing, RISC architecture in data centers, machine learning, artificial intelligence, and high-performance computing. Fringe networks accommodate the Internet of Things and are patrolled by cybersecurity systems.
The IT industry, like most industries, consolidates during bear markets and recessions. Some large companies emerge as winners and address more than one automated solution. The tell is if they can continue to integrate smaller companies, the stand-alone proxies, as well. This means there is still a pipeline of leading-edge solutions. These new economy leaders form the new baseline.
In the context of the recent COVID pullback and recovery, the stocks with the fastest improving prices telegraph who qualifies as new leadership positioned for the next leg up. For now, we need to think about sustainable trends and manage the risk over twelve to eighteen months. A longer bear market affecting all industries is not out of the question, with looming COVID fears and the election in November weighing on forecasts for economic growth.
Twenty-First Century Tech Portfolio
Tech companies with double digit sales and earnings growth have figured out how to move into new markets without assuming much debt. If debt is needed, borrowing continues to be financed with historically low interest rates. There are no significant monetary policy changes indicated by the Federal Reserve. Here are the categories of IT companies that now fit New Edge strategies from the perspective of a buy-side equity analyst:
SaaS
Software as a Service (SaaS) simply means the customer leases or subscribes to a software application running in the cloud, pays usually by the month, and can cancel at any time. There is no upfront purchase by the customer nor annual maintenance fees for a truly SaaS company. Client retention depends on how sticky the solution is. If it is a key necessity inside the company, the company is likely to remain subscribed. Teenagers and their mobile phones, social media, and gaming apps – not so much. The rub for the SaaS companies is a high gross margin percentage, and predictable cash flow. The stock market loves predictable cash flow.
There are just a couple of varieties of SaaS. The application may run entirely in the cloud (in data centers). The application may partially run in the cloud and partially on a user device (the fringe network). The application may run in an enterprise setting, meaning a large organization where the application, database, and network run both in the cloud and in the company’s own facilities. We call this “hybrid cloud computing”.
Chips
Semiconductor companies are coming out of a mild bear market. The rub in this sector is the amount of debt a fabless semiconductor company avoids versus a chip manufacturer. The industry over the last decade has moved to integrated circuit designers who outsource the mass production of the chips they create to a handful of manufacturers. We call these “fabless” or “non-fabricating” chip companies. Sometimes they are endeavoring to create a market. In the end, the emergence of fabless semiconductor companies is now mainstream, has shortened the design-to-build cycle, and helps manage inventories without the need for CapEx and a lot of debt.
Mass production facilities are called foundries, aka “fabricating plants”, and can operate from the early stages of making polysilicon ingots to mass production of wafers and chips. There is a lot of industrial equipment required to mass produce integrated circuits. There are three main foundries who are capable of building nearly all semiconductors – from computer memory, to CPUs, to graphics and solid state drives, to chips in a cell phone. They are Taiwan Semiconductor, Samsung Foundry and Global Foundries (privately held). Intel, Texas Instruments and Micron are examples of North American companies who design and in part have their own foundries. These are called “semi-fab” manufacturers. If we continue to be at odds with China, watch what these companies do to bring mass chip manufacturing back onshore to the US and South America.
Networks
Here is where 4G/5G mobile networks, data centers, telecom carriers, entertainment, and social media live. I would also include fringe networks, here in the context of devices that access the network for computing resources. The Internet of Things. The main 5G carrier companies in North America are AT&T, Verizon, and T-Mobile/Sprint. You could add Comcast and Cox to the mix with satellite feeds, and dozens of independent fiber and cable companies serving secondary markets. 5G is the radio enabler for more applications than cell phones.
5G in an industrial/municipal setting creates revenue for carriers to build infrastructure. This subsidizes the commercial end of the user market such as mobile devices. 5G devices will have applications with intelligent endpoints, sensors, and actuators in all kinds of environments. These include urban smart city solutions, durable gear for demanding indoor and outdoor manufacturing settings, automated logistics and shipping, and automated cars. The list grows daily.
Network Security
Cybersecurity and National Defense are included together at the author’s discretion since beyond traditional thinking about the ability to protect a computer network and data in the private sector, it’s unsaid that cybersecurity is a big area of spending for the military and intelligence communities. Unfortunately, the government doesn’t publish what it spends for network technology and cybersecurity.
You must work hard to understand the spending by the government and revenue opportunities for the cyber companies. Find companies whose primary customers are the military and research the contract awards that they win. Useful information can be found in earnings conference calls, a close look at financial statements, trade journals for defense contractors, and their websites.
Choose companies that make or implement firewalls, who have highly predictable sales and earnings growth. If they make a few strategic acquisitions a year among privately financed cybersecurity companies – the better. The industry is consolidating and the younger, privately held companies are clustering around the firewall manufacturers pre-IPO, or an M&A transaction.
Leading Stocks
Here are the New Edge picks for the second half of 2020. Stay tuned for follow up articles with justification for the companies mentioned here. Hover and click over any stock symbol.
SaaS: Adobe (NASDAQ:ADBE) and Microsoft (NASDAQ:MSFT). Based on broadening product lines, auto-updates, their embedded base of installations, and relevance with both consumer and business markets. They nearly own your user experience with desktop and Web applications. And you pay by the year/month.
Chips: Advanced Micro Devices (NYSE:AMD) and Nvidia (NASDAQ:NVDA). Given a confirmed uptrend in the use of RISC microprocessors in data centers, this new industrial opportunity complements their popularity with graphics and gaming. Add machine learning and artificial intelligence to the mix.
Networks: American Tower (NYSE:AMT). Cell towers figure prominently delivering both 4G LTE radio bandwidth, and in the hosting of new 5G antennas that reach both mobile and stationary devices. AMT is a real estate investment trust that passes lease revenue through to investors.
Network Security: Mercury Systems (NASDAQ:MRCY) and Palo Alto Networks (NASDAQ:PANW). Both participate with government civilian agencies, the military, and the intelligence community. Both make a few strategic acquisitions a year, some in government space. PANW is my favorite firewall pick.
Copyright © 2020 New Edge Analytics. All rights reserved.
Market 3000! Let’s Slow Down Here, But Just a Little
Equity Markets Inevitably Retreat - This Has Been One Good Ride
volume xix - issue 3
How Long the Bull?
All index prices are day-end with decimals omitted unless otherwise noted.
The S&P 500 Index passed a milestone at 3000 in July, truly an achievement of the longest bull market in history. And it bears plenty of notice. But this article is about perspective. Over a twenty-year span, 3000 is not such a big number.
I would like to ask the reader to humor me and consider it significant when the Index has crossed an upward bound, non-arbitrary threshold of 1500. This has happened three times. Twice the market retreated to roughly half that number. The Index first crossed 1500, then reached 1527, a rarefied milestone, on March 24, 2000. Y2K – The Dot Com Boom. By October 2002, the Boom had gone Bust. Soon following Nine-Eleven, the index cratered to 776. Almost half the peak value.
The most brutal stock market routs stem from broadly mispriced assets in large markets experiencing hoards of new cash invested. In the Dot Com era, frothy stock IPOs for new tech companies poorly reflected the truth that most had never earned a dime before going public and had no tangible prospects of ever breaking even. Promoting the bonds and collateralized debt of independent telecom companies as safe havens was another sham. WorldCom was not Ma Bell (AT&T), a regulated utility with a guaranteed income stream.
Finding the Bottom
This is what happens with every big stock market crash. Some structural element of the financial system becomes impossible to price and the assets must be marked down once realizing that those holding the assets – pros and moms and pops alike – won’t be getting their money back. Sounds like musical chairs doesn’t it?
The bust following Y2K was the first of two striking retreats from 1500 for the S&P 500. The years 2000 – 2010 were labeled “The Lost Decade” for shares of Information Technology companies, particularly telecommunications. It took eight years for the Market to return to the 1500’s, breaking the barrier again in 2007 and peaking October 9th that year at 1565.
This time, mortgage backed securities were the unpriceable assets. I recall at the time listening to a morning report on CNBC, that the size of the secondary market for mortgage backed securities had grown to three times the value of the US Treasury market. I gasped a little, and within the following weeks went to cash in portfolios except for the large, stodgy mega-cap and old money stocks that historically survive economic crises. Fortunately I side-stepped the slaughter coming up. The Big Short.
And so, the Mortgage Crisis ensued in 2008. Lehman Brothers went bankrupt, the largest in history. AIG and Bear Stearns nearly did; the latter bought by JP Morgan for $2 per share. Bank of America acquired Countrywide Mortgage and Merrill Lynch. The government quickly passed the Troubled Assets Relief Program (TARP), allowing the distribution of over $700B in liquidity to the largest US banks.
At the bottom, March 6, 2009, the Index had collapsed intraday to 666.79 but rallied. The lowest daily close came through a few days later, March 9, at 676 – lower than the bottom following the Dot Com Bust and the Nine-Eleven attacks. All the major brokerage firms were now owned by large banks under the jurisdiction of the Federal Reserve.
These banks, were given greater access to short term credit through the Fed Funds Discount Window, under the guise “Too Big To Fail”. Morgan Stanley and Goldman Sachs were the only two large investment banks still standing. They formed bank holding companies and grudgingly acquiesced to direction from Congress and control by the Fed.
It’s Just a Double
The Great Recession followed. But the S&P 500 Index climbed again and that value on March 6, 2009 of 666 stands as the most recent low point marking the start of a bull market that is now over ten years old. The media is celebrating the performance of the market as measured from the bottom, clearly through 1500 in 2013, and continuing uninhibited to 3000 last month. The statistics are accurate. The path from 666 to 3000 is four-and-a-half times your money from-trough-to-recent-peak. Astounding. Even accounting for a possible correction underway.
But here’s the thing: If you bought the S&P 500 Index, meaning “The Market” near the top of the Dot Com Boom, peaking near 1500, it would have taken nine years to reach that level again before the mortgage crisis. Then again dropping to half its value. Ten years later, here we are toying with 3000. This is only – not to discredit – a 100% gain, or double your money, over a few months more than nineteen years.
If you invested $5 in The Market in 1999, you would have about $10 now. I’ll do the math here. That’s about 5% annually without compounding, without inflation adjustment. The compounded annual rate of return for the S&P 500 over those twenty years is closer to 3.5%. When accounting for inflation, the ROR is actually worse. The long-term statistical mean of the S&P 500 is 8% annually with an 18% swing in one standard deviation. The actual twenty-year average return from 1999 to 2019 is nowhere near the mean.
Healthy Sector Rotation and Market Cycles
I recently completed a fifteen-year look back into the prices of the stocks of deliberately non-tech companies and have decided they are fairly priced. This opinion based on dividend yields, relative price to earnings ratios and a few other fundamentals. It’s boring but stocks of energy, natural resource and utility companies, and consumer brands that pay dividends are safe bets now.
This economy is quietly going through about as normal a sector rotation as I can remember since joining the investment finance business in 1985. Prolonged periods of low interest rates impact the banks, but that industry has been steadily on the mend. Growth in fee-based services is replacing money earned on the spread; the difference between the bank’s borrowing cost and the rates they charge as interest on loans to consumers and businesses.
The energy sector rolled over in 2015 when the fracking boom peaked. It became apparent that we have enough of our own energy resources to last without foreign imports. Most analysts believe that oil and gas prices have already reached the bottom of their cycle. I do, too.
Industrials and the manufacturing sectors are further along in the economic cycle, so I wouldn’t be surprised with a pullback here, but not like the breakdown in 1999 – 2002. Semiconductors peaked in 2017 and some have dropped by half their value. They had also in part fueled the ride up to 3000. But sector woes haven’t taken the broader industrial economy along with it.
Late Stagers Still Need to Peak and There is Cautious Upside
The S&P 500 and the Dow Jones Industrial Average are now heavily Information Technology weighted and that won’t change. This isn’t your grandfather’s portfolio. Of the 30 Dow Industrials, Apple, Cisco, IBM, Intel, and Microsoft are included. In the S&P 500, these stocks and the FANG Gang – Facebook, Amazon, Netflix and Google – are prominently represented due to their size. Their extraordinary new highs make the news. These stocks and companies like them are the most exposed to a correction and most heavily weigh on the price of the S&P 500 Index.
Consumer spending, jobs, the service economy, software, and military spending are usually the last to peak and we haven’t seen it. We have yet to show any real evidence that the economy is slowing down in a dramatic way. So, take a breath here. Consider raising some cash and increasing positions in safe-haven assets but don’t go overboard.
Sector rotation describes a healthy economy. Daily ups and downs that follow the news – China Trade, Brexit, the behavior of Iran and North Korea, an upcoming election and ongoing Congressional angst – are offset by cuts in corporate tax rates, share buybacks, more than a decade of low interest rates and a sensible Fed. Taking the long view, the Market knows what it’s doing and a double-the-money in twenty years means statistically there is more room for the bull to run.
Copyright © 2019 New Edge Analytics, All rights reserved
Cyber Defense, Sovereignty and Growth By Acquisition
Following Palo Alto’s Acquisition Binge and the Israeli Cybersecurity Thread
volume xviii - issue 5
Palo Alto Networks and Their Acquisition String
I penned an article in September, “Cyber Growth, Building an Ecosystem”, featuring Palo Alto Networks (NASDAQ:PANW) as a proxy in cybersecurity. Pointed out there, that an astute investor would want to know about Palo Alto’s business with the government. Cyber Defense is a strategic mission within developed countries that lives in both the military and the intelligence communities. The most sophisticated cyber attacks come from sovereign domains.
Some due diligence about relationships with Uncle Sam is warranted here. There is a tremendous advantage when a company is given an opportunity to build cutting edge technologies for the military and intelligence community. We spend a lot of tax dollars in these branches of government. There is a long history of game changing applications in IT that comes to us by way of government research. Mega disruptors appear every ten years or so and often the base technologies come from the government.
Alliance with Israeli Intelligence
Palo Alto does not segment government sales in financial statements. Nor do they divulge much about their R&D efforts. And they certainly don’t publish information about our government’s alliances with foreign countries. So, it’s worth a deeper dive into the history of Palo Alto, its founders, financing, and evidence of government relationships that can be parsed from evaluating their acquisitions.
Palo Alto has been acquisitive from the start, founded by Nir Zuk in 2005. He retains the role of CTO and is a board member. Mr. Zuk served in the Israeli Defense Forces intelligence corps, Unit 8200, their SIGINT (signal intelligence) division. Unit 8200 in the Israeli military is comparable to our National Security Agency (the NSA).
It’s not much of a stretch, given an acquisition string that includes many Unit 8200 alumni, to believe that our own national defense agencies team with Israel as a military ally and cooperate with international cybersecurity defense programs.
Israel is probably the best choice. We engage in competing and hostile cyber activity with other parts of the developed world. Just read the daily news to speculate about the countries we compete with and who are likely to be our cyber foes.
Financing
Cash is needed for acquisitions. So far, Palo Alto has gone the route of public debt financing only twice. $575m of convertible notes were issued in April 2014 that mature next year. The notes convert at $110 per share so given current prices ($178 at this writing), it’s likely the notes will be retired in exchange for stock. In August, another $1.5B in convertible notes was raised in a private placement.
Borrowing money for acquisitions is usually a signal that the management team believes their growth opportunities will create more shareholder wealth with debt finance than issuing common stock. Key officers have a significant stake in their performance compensation plans with awards paid in common stock and stock options.
These new notes convert at an equivalent price of roughly $418 per share, more than a double premium over current share prices. The notes mature in 2023. In five years and given CEO Nikesh Arora’s growth plans, it is within reach. Continuing the share repurchase program should also serve to concentrate equity and improve the price of the stock.
Summary of Early Acquisitions
Cash on the balance sheet as of July 31, 2018, including proceeds from the new debt is about $2.5B. It’s clear that Palo Alto prefers acquisitions rather than organic growth, and the successful deals are vertical integrations adding certain niche cyber solutions. Here are the early-on additions:
Morta Security – the first acquisition made in 2014, an automated threat protection platform with a variety of utilities beyond firewalls. The founders and seed capital originated inside the NSA,
Cyvera – acquired in 2014 for $200m, a small Israeli security firm with 55 employees. The technology blocks “zero-day” attacks introduced through endpoints. It integrates well with Traps, the award-winning flagship offering at Palo Alto that secures fringe networks and,
CirroSecure – acquired in 2015, a Silicon Valley company. The technology secures SaaS applications, like Dropbox and Google Drive, cloud versions of SalesForce and Office 365.
The total spent on acquisitions since 2015 is $675m, not including Morta and CirroSecure. The terms with these two early acquisitions were undisclosed.
Recent Acquisitions
Here are terms of more recent deals:
LightCyber – was acquired in February 2017 for $105m cash. The company was founded in 2011, and over the course of their four private funding rounds, raised $36.5m. Shlomo Kramer, who has been called the “Godfather of Israeli Cybersecurity”, is an investor. He is also a graduate of the Israeli intelligence community, and co-founded Checkpoint.
LightCyber tracks adaptable malware, a threat that morphs from its original fingerprint and can hide inside a computer network for months. The company points out that “dwell time” from introduction to the network until attack, usually through phishing, can last on average five months. The undetected software, that probably changed several times since infection, eventually will launch the attack suited to its original purpose, to create havoc or worse – denial of service, destruction, ransom and theft of key data. In January LightCyber was rebranded. Its new name at Palo Alto is “Magnifier”.
Evident.IO – of Santa Clara, CA was acquired this March for $300m cash. Rebranded simply as “Evident”, this application focuses on securing physical infrastructure in the cloud. This means the servers, switches, routers and firewalls that manage the cloud application. Cloud computing today requires distributed networks. The associated hardware and switching equipment need not be co-located in the same data center, nor on the same continent for that matter.
Evident brought along a stable list of US government customers. They successfully raised $49.1 million in venture capital prior to acquisition, including an undisclosed amount from the CIA’s financing arm In-Q-Tel. Evident chief executive Tim Prendergast points out that government investment allowed the company to work more closely with our military and intelligence agencies and helped align Evident’s product road map with their customers’ missions.
Secdo – incorporated in Israel with headquarters in Ra’anana (near Tel Aviv) is a new addition, following on the heels of Evident. Terms were not disclosed. Sources believe the Secdo deal was about $100m cash with some equity. Secdo was founded in 2015 by Gil Barak and Shai Morag. Both served in Unit 8200. Secdo is an endpoint detection and response (EDR) company – the fastest growing niche of cybersecurity applications.
Endpoint detection has traditionally meant anti-virus software installed on a workstation and at the firewall. Even though the threats still originate out in the fringes, EDR now has more to do with detection deep inside networks. The application creates threads – strings of related events – and populates an incident report log integrated with Palo Alto’s Traps EDS. Once an event is flagged as a potential breach, false positives are sorted out and an automatic defensive response is made within seconds. This preempts the need for an immediate human reaction and gives the security team more time to evaluate and completely shut down the uncovered threat.
RedLock, Inc. – is the most recent transaction, closed last month for $173m in cash. RedLock was launched in 2015 and raised $12 million while private. RedLock addresses new international rules, the General Data Protection Regulation (GDPR), enacted by the European Union (EU) and effective last May. GDPR requires cloud network vendors to prove they can secure their own infrastructure and protect their customers’ Personally Identifiable Information (PII).
The three largest cloud service providers, Amazon Web Services, Google Cloud and Microsoft Azure have done a decent job shoring up their networks. GDPR as written has teeth. The EU can impose penalties up to four percent of gross annual revenue for each instance of non-compliance leading to a breach and theft of PII. Says RedLock founder Varun Badhwar, “We built a technology platform that’s entirely cloud-based [with a] very quick time to [create tangible] value since customers can just turn it on through API’s”. This means that RedLock can easily link a company and its cloud application to its cloud service provider and can assure customers they are immediately GDPR compliant.
Conclusions
Palo Alto Networks is in the space of supporting US cyber defense initiatives in alliance with other countries, namely Israel.
It is assumed that the US and Israel devote significant budget for custom cyber defense software development. Cybersecurity is such a large international threat that cannot be ignored.
A technique is used with this evaluation that probes the depth of a financial relationship between the United States and Israel in the growth of Palo Alto Networks, by means of exploring its acquisitions.
Of the complete list of acquisitions here, over $800m has been spent on companies with origins, operations and financing inside the US and Israeli military and intelligence agencies. Well over half of what Palo Alto has spent on acquisitions since its inception.
Copyright © 2018 New Edge Analytics, All rights reserved
Cyber Growth, Building an Ecosystem
Palo Alto Networks - Steadily Building Money, People and Apps Around Their Firewalls
volume xviii - issue 4
Please see the companion article, NextGen Firewalls and the Cyber Business Cycle, on the New Edge Analytics website. New Edge considers Palo Alto Networks as a proxy for the cybersecurity industry and gives the company a Gold Performance rating.
Palo Alto Networks (NASDAQ:PANW) needs a strategy to maintain double-digit growth in a consolidating cybersecurity industry. New CEO Nikesh Arora has thrown down the gauntlet and challenged the company to grow the business 2 to 3 times current revenue. Doing the CAGR math, this means 15% to 25% annual growth over the next five years.
Investors need to look for success in developing an ecosystem. One that attracts the best talent in the industry, fills out the key industry segments by acquisition, and all at a time when it will become more important to avoid paying too much for the assets. I count human capital, particularly cyber programmers, informally as assets to the corporation. You simply need to hire the best hackers. Such developments won’t show up in quarterly earnings reports.
While 20% to 30% revenue growth has been the norm for PANW since they went public, firewall sales have slowed. The business of firewalls is midway through a technology refresh cycle that began in early 2017. When firewall replacements among Palo Alto’s customers and competitive wins are complete, it could be another three to five years before the next buying cycle returns for hardware.
The size of the market for all cybersecurity solutions in 2017 was about $138 billion in sales. There is a lot of very bullish sentiment out there, particularly among industry consultants. But Wall Street and CEO’s in the cybersecurity industry agree that a likely annual growth rate going forward is 8% to 10%. Taking the high side of the range, this makes a planning number for size of the market about $200 billion by 2021.
Palo Alto’s refresh product line falls in their Next Generation Firewall group among a bevy of cyber solutions. There are two offerings: VM-Series and GlobalProtect. PANW cites a competitive advantage with their NextGen firewalls. They have 54,000 and counting customers, and recent competitive wins versus Cisco, Checkpoint and Symantec.
When PANW went public in 2012, annual revenue was $225.1 million. For the fiscal year ending July 31, 2018, revenue was $2.3 billion. PANW stock trades at 10x fiscal 2018 revenue and is in the low end of a valuation range between 6- and 20-times trailing revenue using the price-to-sales ratio for guidance about valuation. Maintaining these growth rates requires scaling.
Mr. Arora was hired in part for his tenure at Google as Chief Business Officer, where he served in key strategic roles with the company from 2004 to 2014. Sales grew from $3.2 billion to $65.7 billion in that timeframe. He served as President and Chief Operating Officer at SoftBank between 2014 and 2016 and was widely thought to succeed CEO Masayoshi Son, until Son decided to stay on for at least five more years.
Palo Alto went live with Application Framework in August. This is the third iteration of attempts to create an open source software development platform for cyber coders that integrates with their firewalls. They absolutely must make it work this time. Growth in the industry is shifting to software subscriptions – cloud revenue – and Application Framework needs to be the catalyst at Palo Alto Networks.
Develop an ecosystem. Therein, lies the opportunity, and the risk.
Smooth Integration and Economics Required
By recent estimates, over 80% of security breaches happen in the application layer, so application security testing is the current buzz. If PANW can incorporate solutions to address the application threats and integrate the software with their Next Generation Firewalls, they should be successful in developing an industry leadership reputation.
Application Framework creates sticky relationships. Developers and their customers become dependent on PANW because they have already bought the firewalls. New Application Framework customers include Microsoft, ServiceNow, ProofPoint, Phantom, and Splunk. So there appears to be a market and Palo Alto is assumed to have pedigree. PANW promotes that AF will make it easier and less expensive to integrate software solutions with their firewalls.
The economics for developers in private cybersecurity companies include cheap access to next generation firewall technology, bloom on the rose from association with Palo Alto, and access to private equity and partnerships with the best cyber companies in the industry. It is difficult to hang a value on Application Framework because sales due to the platform are not broken out with revenue and expenses in financial reports. Contribution to sales, net income and a higher valuation are strategic initiatives and depend on the performance of the ecosystem.
Investors should look for an ecosystem and consider these variables:
Can new software go straight to a SaaS model,
Can the opportunities and financial incentives attract the best cyber programmers,
Can engineers’ compensation with acquisitions be applied to COGS,
Can new customers be acquired without adding salespeople,
Can key acquisitions be made at fair prices,
Can any premium paid be absorbed without increasing operating expenses,
Is there enough cash on hand and plentiful VC funding to incubate startups?
Employee compensation is the largest chunk of operating expenses. Silicon Valley reports non-GAAP net operating income/loss where the stock compensation expense is stripped out. Because of this, PANW has shown a non-GAAP net operating profit the last four years. In 2018 operating margin was 14% of sales. But financial statements must be adjusted for GAAP requirements and include share compensation as an expense, which creates a net loss and negative 6% operating margin for 2018. It’s notable that the negative operating margin is narrowing and half the amount in 2015.
The obvious attractions for software engineers are stock signing bonuses and compensation plans that include a large percentage of pay in the form of incentive stock options. This has been the Silicon Valley model for decades. Palo Alto has one of the largest percentage share compensation plans for employees in Silicon Valley. The only way to measure whether PANW is attracting the best talent is to ask around. Talk with the millennial engineers at the company, among PANW competitors and the FANG crowd. Who are the cyber rock stars and where do they work? This is a soft metric but may be the most important. Trade journals and local papers might have some good insight.
Qualification of Risks
PANW is publicly concerned with attracting large enterprise customers where they compete with Cisco and Juniper Networks, others that have a strong switch/routing platform with firewalls in the product mix. Probably the biggest risk, is the acquisition of a major competitor by a behemoth network equipment manufacturer who has an installed base among the largest enterprise customers and the government. Cisco buying Fortinet comes to mind as a possibility.
Virtually all PANW revenue is generated through resellers and channel partners – which would be a valuation risk if Arora and the board decide that PANW is for sale. With recent private cyber deals, the channel partner sales are stripped out of revenue when figuring the multiple. PANW as currently structured gives up a measure of control by relying on channel partners to build the business.
Next. ASC Rule 606, Revenue from Contracts with Customers, is an accounting standard published in 2014 and required for revenue measurement this year. PANW has chosen the full retrospective method, which will be in place for the fiscal year beginning August 1, 2018. Adjustments will be included in the 2018 annual report when published, for prior accounting periods. This has an effect of boosting revenue in the year adopted, but less predictable figures in forward years.
There is much greater forgiveness charging employee compensation expenses to Cost of Goods Sold (COGS) in a software subscription model, where gross margin is many times a whopping 80%. And here is where accounting meets strategy. R&D software development is charged as an operating expense and can easily create a loss, particularly with the GAAP numbers. Via thoughtful acquisitions, if a new software-only cyber solution company is brought into the fold, it would be hoped that the bulk of the R&D effort was completed while the company was still private.
A Good Strategy for Scaling
Arora has spent his first three months as CEO with key customers, the management team, outside experts and integrators. When asked about generalizing Application Framework, he points out that customers want better integration in a market that has become fragmented. IT managers want to manage the cost and level of effort needed to incorporate solutions that work.
About $500 million was spent on acquisitions between 2015 and 2018. Goodwill and intangibles increased from $216 million to $664 million – so about $450 million in that period. It doesn’t seem that they are overpaying for new technology and new customers in the last three acquisitions. All three solutions are applied to segments in the industry that don’t overlap, and they are all software-based.
Total debt in April 2018 was $540 million and reflects the remaining obligation on convertible senior notes due for repayment or conversion by 2019. $1.5 billion of new capital was raised with convertible notes offered through a private placement and completed in August. Cash on the balance sheet for the fiscal year ending July 31, 2018, including proceeds from the convertible underwriting, is $2.5 billion. It’s likely this money in part is raised to finance more acquisitions tied into Application Framework.
Palo Alto already has in place a $20 million venture fund in association with Greylock Partners and Sequoia Ventures. One could reasonably assume that Arora can pick up the phone and call a partner at SoftBank given a deal that makes sense – would love to see his Rolodex! One could also make a case that all this access to capital and the Silicon Valley elite makes Palo Alto look like a private equity fund. An interesting point of view.
Guidance for Investors
Foremost, understand that the thesis by CEO decree is 15% to 25% per annum revenue growth in a business that is now widely forecasted to improve at a more modest 8% to 10%, which is about the compound annual growth rate for the S&P 500. Look for evidence in quarterly reports that the company is on that “fifteen to twenty-five” trajectory in their year-over-year statistics.
Look at the quarterly SEC filings, the 10-Q, for the income statement, under “Total Revenue”, and calculate the percentage of total revenue that is reported as “Subscriptions and Support”. This metric should be increasing annually. Reviewing this data quarterly might be too granular but it’s worth checking out. Per the most recent 10-K (page 41) the ratio is 61.7% so about two-thirds of total. “Product” listed under Total Revenue makes up the other third.
PANW doesn’t itemize their sales or discuss software development efforts with the US Government in reports. An astute investor would like to know more about this. Remember the soft data example about success with hiring the best hackers. Information about US Government installed firewalls, agencies participating with Application Framework, and cyber software R&D efforts, would be useful but hard to find.
The notion of ecosystem is about creating a community so that the best and brightest talent in the industry will seek to join the Application Framework platform. PANW will hopefully establish themselves as the go-to employer/partner due to pedigree of the new CEO, an installed base of firewalls, and access to billions of dollars in capital. The best acquisitions are going to win large swaths of enterprise customers, delivering to them SaaS solutions that integrate with firewalls.
Don’t be alarmed by a mega-deal that includes a competitor acquired by someone like Cisco. There is plenty of room in the market among the larger players, and PANW may in fact have the best solutions for cyber software and firewalls, for now and going forward if AF succeeds. Cisco makes switches and routers.
Decide as an investor how much you personally are willing to pay based on a multiple of sales. The price-to-sales ratio is currently 10x. The range has been 6x to 20x. With negative earnings, a price-earnings ratio has no meaning. It would be great if Palo Alto soon reports a quarterly profit on a GAAP-adjusted basis. Eventually everyone must grow up.
A broad NASDAQ selloff, or a selloff more specific to IT, isn’t farfetched in the next twelve months. This bull market has had a relatively normal cyclical rotation and IT is due to slow down. It’s ok to buy the dips if you are on board with the opportunities discussed here. Finally, growth and momentum investors will tell you that the fundamentals are bunk but, in the end, it pays to be able to make a buy or sell decision understanding both technical and fundamental characteristics of a stock. This is one of those truths that cannot easily be taught. Palo Alto is a great story. Tech stocks are volatile.
Copyright © 2018 New Edge Analytics, All rights reserved
NextGen Firewalls and the Cyber Business Cycle
Micro Industry Trends with the Cybersecurity Business Cycle
volume xviii - issue 3
Firewall companies are midway through a technology refresh cycle that began in early 2017. This is common in the IT sector. All businesses go through growth cycles when sales are robust, and then fade a little. Those who make it through a full cycle emerge with stronger product platforms and services. The new technology achievements in cyber worthy of attention live in what is called a Next Generation Firewall (NGFW). New Edge Analytics believes these new and updated features are a good proxy for the direction of the cybersecurity industry as a whole.
Cyber is a fragmented and consolidating industry and a big spend for IT departments. Sales and order growth are likely to slow down in the next twelve months after the bulk of the new firewall hardware and related apps are installed. Now is a good time to benchmark the new features. Despite a plethora of cyber solutions and the thousands of companies working in the space, those companies that make the firewalls and have an application framework to peer with third-party software developers have the upper hand.
Palo Alto Networks (NASDAQ: PANW) is a New Edge Gold Performance company. A gold performer is a company whose metrics are cream of the crop, with better financial performance than 90% of its peers over the past 26-weeks (half a year). Gold Performance is a ranking that NEA awards based on data from financial reports and computer models, aggressive growth in sales and earnings, price and volume trading patterns of the stock, news releases and comments from the management team.
PANW has the financial depth to do it all – an application firewall, central and distributed controls for security equipment, encryption with a VPN (virtual private network) interface, traditional packet and port analysis, and endpoint management. Cloud security at PANW is only a five-year-old effort. They must adapt quickly to build market share to address increasing competition from Amazon Web Services, Microsoft Azure and Google Cloud.
The basics of how firewalls manage computer viruses and malware have been the same for over thirty years. There have been lots of new risks and improvements. A Next Generation Firewall goes beyond port and protocol inspection that denies or allows traffic through the firewall based on permissions. The developing model takes the same idea and looks for misbehavior in the operating system and application layers.
A computer application has its own unique fingerprint so to speak. Applications have predictable behavior; how they use the CPU, how they manage resources like DRAM and storage, how they make program calls to the operating system. Threat analysis also considers how the algorithms work, how the application communicates with other servers, network management and other cyber applications.
Threats also have their own signatures and are becoming a lot more complex. Some of the most dangerous can live undetected inside a network for an extended period before exploiting a vulnerability and creating havoc. Operating directly on databases and applications, these threats as a group are called ‘malicious code’.
Malicious code searches for a path to hack and disable an application or steal database records. Of the most formidable challenges ahead, is the ability to detect and manage threats enabled with Artificial Intelligence. AI-enabled malware has the disturbing ability to repeatedly morph into another difficult if not impossible to track piece of harmful code that remains hidden inside the network.
In the business of cyber, the ability to find, analyze and shut down malicious code can be grouped according to techniques. Vulnerability assessment, dynamic firewall, threat mitigation, threat detection, and incident response are the most common classifications. Leading edge solutions in these categories are the industry fundamentals that management and investors must understand as the business of cyber continues to mature.
The Palo Alto Networks Application Framework, beyond the ability to manage all of Palo Alto’s own hardware and cyber applications, allows integration with software made by third parties. PANW will be rolling out Application Framework over the next twelve months, it was discussed extensively in their last earnings conference call in June.
Rapidly becoming a threat, and maybe the most vexing problem to challenge cyber defense programmers, are thugs (a personification) that penetrate the network through endpoints; mobile devices, sensors and IoT actuators for automated factories and connected cars. The list in a world of IoT is possibly endless. Microsoft, Amazon and Google are keen to build endpoint defense and working on it now. Palo Alto is addressing the endpoint race with their Traps Advanced Endpoint Protection.
Rather than a piecemeal approach to traditional antivirus protection, Traps AEP provides its own application framework to manage viruses and malicious code, particularly those threats introduced by endpoint devices. NSS Labs published its 2018 Advanced Endpoint Protection (AEP) Group Test in April, an independent evaluation of twenty endpoint cyber solution vendors and announced the results at RSA 2018. The findings placed Traps AEP 4.1 at the top of the list. Traps AEP 5.0 was released in March.
A final bit about the economic cycle and a consolidating industry: M&A in this space will be vibrant over the next 24 months. Stick to looking for companies who make network routers, switches and firewalls as the buyers. Stick to evaluating the main categories of cyber solutions. A good solution by a small company with paying customers still will need a parent or a peer to grow.
Avoid giving much attention to companies who claim to have a – unique and independent solution – to a cyber threat, other than in one or more of the categories mentioned here. The classifications for threat management are clear by now and they are going to live in hyper-programmable firewalls with portable cyber application development platforms.
Copyright © 2018 New Edge Analytics, All rights reserved.
The Loudoun Technology Coalition Solicits Advice from a Panel of Blockchain Experts
A Blog about Blockchain for the Loudoun County Chamber of Commerce
volume xviii issue 2
Written by Tom Finkenbinder, New Edge Analytics
In May, the Technology Coalition of Loudoun County hosted an event on blockchain. Coalition co-chair Paul McNeal worked with the panelists who represented business process engineering, enterprise IT and data center integration of blockchain, and purposeful blockchain applications built by developers. Generally, the question was asked, “How would a company use blockchain to meet profit-achieving and risk management goals”.
Blockchain is a hot and newsworthy topic. At first look, several key questions were asked. Will blockchain technology be considered the next disruptor? Should you jump on The Blockchain Train or watch for a while? Will blockchain upend industries in the same way Amazon is reshaping brick and mortar retailers and ecommerce?
Economists already agree that blockchain is a general-purpose technology, with a great variety of potential applications across all industries and vertical markets. But the main notion is that blockchain will make trading (economic transactions) more efficient. The most impacted industries in the near term will be in the banking and financial services industry, to cut out the cost of the middle man.
Paul asked how blockchain technology should be evaluated and implemented in an organization and can blockchain applications be economical for companies of any size. Generally, the advice of the panel was to start small, and the advice applies to companies of all sizes. Pick one business process. Analyze that process and either develop or find and acquire code to implement a blockchain application for your company or internal line of business.
Large companies can afford to buy, lease or build a blockchain transaction system. It is a database application. Look for solutions that can be integrated with a network service provider. If the preference of the IT staff is to outsource the work, treat blockchain as an infrastructure application, such as Storage as a Service, or a private VPN. An organization who has an IT department with programmers, would build an encrypted database on a secured server.
Programmers and managers should treat the project with the same life cycle engineering techniques as any internally generated database application. Use version control. For now, this is a simpler and less expensive strategy to acquire the technology, and to avoid missing or falling behind on potentially ‘the next big thing’. If built correctly the database can be migrated to a vendor or network service provider as application usage grows and upscaling becomes an issue.
Per one of the programmers on the panel, it is not terribly difficult to code scripts and build applications that handle the creation and management of blocks. What is difficult, is managing the Quality Assurance (QA) loop with the code development process. A high degree of confidence needs to be accepted, that the code is bug-free when it goes live. This is most important with applications using tokens. Real money is at stake with cryptocurrencies. There are instances where coding errors are responsible for tokens being sent to bogus accounts or that they simply disappear from the network.
Not unlike databases in use today, an organization must consider the risk of a malicious threat; someone with intent to disrupt a process or steal private information or steal cryptocurrency. This is always a risk with programmers inside the company. So internal authentication, tracking methods and rules of use need to be established. On the outside, the blockchain application needs to be robust so that the transmission channel is fully encrypted, and access to the information is controlled. The default consideration is to treat the database like a vault, the entire resource and appliance should be encrypted and the API’s protected as they are developed.
Finally, and going forward, there is regulatory risk and most people eventually find themselves thinking about the possibility of a cryptocurrency shutdown by the Fed for example. So, if a company decides to use a cryptocurrency for trade, and so as not to be surprised at a minimum, or deprived of a large sum of money, be sure to find a blockchain company who is properly advancing/establishing their cryptocurrency through application to financial regulators. And remember, start small.
Paul wrapped up the event with a challenge to the Chamber and the greater Loudoun community; to implement a blockchain application. He asked to explore use of a blockchain database to manage the voting for awards the Chamber makes to members as an example. Another and slightly more ambitious project would be to establish a unique cryptocurrency for the Chamber – to allow members to conduct transactions with each other and avoid their credit card transaction fees at the point-of-sale. Stay tuned!
Copyright © 2018 New Edge Analytics, All rights reserved.
More Than an Indestructible Bull Market
FASB Changes for Revenue Recognition and the Effect on Tech Companies
volume xvii issue 4
The Financial Accounting Standards Board (FASB) and the IASB (FASB’s international peer) jointly released Accounting Standards and Codification Rule 606 as a requirement for companies to report revenue, with a few exceptions, in the accounting period earned. In other words, when the vendor is paid. Heretofore, revenue smoothing techniques were allowed in certain industries, so that companies could record average income over several years.
ASC 606, aka “Revenue from Contacts with Customers” is widely considered the most significant change to accounting standards since Sarbanes Oxley. 606 has been in development for a decade. It goes live January 1, 2018.
In January, when full-year earnings reports for 2017 come out, US stock prices will react poorly due to greater uncertainty in corporate earnings, than due to Republican/Democrat competition for new legislation, unease about President Trump’s domestic and foreign policy decisions, combined.
The Rule affects publicly traded companies reporting adjusted sales for the fiscal year ending in December 2017. For privately held companies, the deadline for compliance is December 2018. Companies must also be prepared to disclose more information about their contracts and order backlogs in notes to financial statements.
In a recent publication from Citigroup, "We expect that (the new rules) will cause significant investor confusion over the next 12 months to the financial analysis of companies ranging from small companies up to the largest, including Microsoft”.
And here’s why.
ASC 606 requires all industries to use the same reporting guidelines. Companies like Yum Brands (owners of Kentucky Fried Chicken and Pizza Hut) and Proctor & Gamble (laundry detergent, toothpaste and paper towels) aren’t much affected by the Rule since consumer products manufacturing and retailers have no economic need to defer revenue. Income at every stage in the supply chain is recorded at the point-of-sale.
But a lot of other multi-billion-dollar industries are affected. Revenue smoothing is enjoyed by companies who have large, multi-year contracts with government and private industry. Companies that build roads and bridges, data centers, manufacture aircraft, submarines, and rail engines are particularly impacted. With defense industry contract labor, a dominant source of employment where I live in Washington DC, the current practice of recognizing order backlog can no longer be used to adjust reported revenue.
Here is an example: Let’s say Company A sells contract labor for software development to the Defense Department. Company A is awarded a contract with total revenue of $10M, earned over the five-year life, aka “period of performance”. $2M is claimed (booked as revenue) per year with current smoothing methods, allowed by law. Without smoothing, Company A must book revenue when it’s received, so maybe $3M in year one is recorded. Then $1M in each of the following two years.
Let’s say further that up to $5M is forecasted to be received in years four and five, depending on performance incentives. Standing alone, this contract would now show a revenue drop by two-thirds after the first year. And maybe the government included provisions in the contract to cancel at any time after year two – not an uncommon caveat.
Contract cancellation can occur if the vendor doesn’t perform well, or if the government decides to change the scope of work, or wants new pricing. Now the out-year revenue forecasts have become entirely a wildcard. Those estimates cannot be included on the income statement. Instead, the revenue risks are highlighted in notes to the financial statements with no material impact to the bottom line.
The math for calculating cash flow in the future is pretty simple. To evaluate projects, Company A must apply a higher discount rate, maybe derived from higher borrowing costs, that reduces the likelihood or guarantee of sources of future income. The result, and Wall Street analysts can run the numbers pretty quickly, is a lower valuation for the company, and in turn a lower share price.
Stock price targets in the most impacted industries need to be adjusted downward and the market will react to the change. The effect is equally painful if the company wants to be acquired. It won’t fetch as much in the M&A marketplace than it would have a year ago. M&A deals are valued on sales (more so than earnings), cash flow and working capital.
With software, entirely SaaS companies are expected to be the least affected among the industry group. Once the application or an update is released, the vendor is paid monthly. Thirty years of historical pricing with multi-year site license and user agreements – enterprise installations – will be a memory soon. Have these accounting changes been anticipated by the software industry? Do the changes support pricing via recurring revenue in the cloud? Look at Adobe. Look at Salesforce.com with Oracle nipping at their heels for the lion’s share of cloud revenue. You bet it’s strategic!
So where are the profit opportunities? ASC 606 is an accounting change to reporting requirements on financial statements. ASC 606 is not a change of the underlying fundamentals and business opportunities of the company or the industry it's in. So view this as a temporary uncertainty that could lower stock prices and present buying opportunities.
Earnings are a real concern in Q1 2018 for these affected companies, given the backdrop of a complacent US stock market immune to bad news. Investors on the buy side benefit, provided they keep cash available and are willing to stomach the risk. Forget about the 24-hour news cycle. We are way overdue for a market correction anyway. Stay tuned for more volatility, and a little more drama in 2018.
Copyright © 2017 New Edge Analytics, All rights reserved.