13.04.2013 Views

Annual Report 2009 (1 MB, pdf) - Vasco

Annual Report 2009 (1 MB, pdf) - Vasco

Annual Report 2009 (1 MB, pdf) - Vasco

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Intellectual Property and Proprietary Rights and Licenses<br />

We rely on a combination of patent, copyright, trademark and trade secret laws, as well as employee<br />

and third-party non-disclosure agreements to protect our proprietary rights. In particular, we hold several patents<br />

in the U.S. and in other countries, which cover multiple aspects of our technology. These patents expire between<br />

2010 and 2022. We do not believe that the expiration of patents in 2010 will affect business, profitability or<br />

increase competition. In addition to the issued patents, we also have several patents pending in the U.S., Europe<br />

and other countries. The majority of our issued and pending patents cover our DIGIPASS family. We believe<br />

these patents to be valuable property rights and we rely on the strength of our patents and on trade secret law to<br />

protect our intellectual property rights. To the extent that we believe our patents are being infringed upon, we<br />

intend to assert vigorously our patent protection rights, including but not limited to, pursuing all available legal<br />

remedies.<br />

Research and Development<br />

Our research and development efforts historically have been, and will continue to be, concentrated on<br />

product enhancement, new technology development and related new product introductions. We employ a team of<br />

full-time engineers and, from time to time, also engage independent engineering firms to conduct non-strategic<br />

research and development efforts on our behalf. We recorded $11.6, $11.6 and $9.4 million for fiscal years ended<br />

December 31, <strong>2009</strong>, 2008, and 2007, respectively, on company-sponsored research and development.<br />

Production<br />

Our security hardware DIGIPASSES are manufactured by third party manufacturers pursuant to<br />

purchase orders that we issue. Our hardware DIGIPASSES are made primarily from commercially available<br />

electronic components that are purchased globally. Our software products, including software versions of our<br />

DIGIPASSES are produced in-house.<br />

Hardware DIGIPASSES utilize commercially available programmable microprocessors, or chips. We<br />

use a limited number of microprocessors, made by Samsung, for the various hardware products we produce. The<br />

Samsung microprocessors are purchased from Samsung Semiconductor in Germany. The microprocessors are the<br />

only components of our security authenticators that are not commodity items readily available on the open<br />

market.<br />

Orders of microprocessors generally require a lead-time of 12-16 weeks. We attempt to maintain a<br />

sufficient inventory of all parts to handle short-term increases in orders. Large orders that would significantly<br />

deplete our inventory are typically required to be placed with more than 12 weeks of lead-time, allowing us to<br />

make appropriate arrangements with our suppliers.<br />

We purchase the microprocessors and arrange for shipment to third parties for assembly and testing in<br />

accordance with our design specifications. Our DIGIPASS products are assembled by one of three independent<br />

companies with headquarters in Hong Kong and production facilities in China. Purchases from these companies<br />

are made on a volume purchase order basis. These companies commit to very high production standards, and as a<br />

result, they also have major production contracts with Japanese hi-tech companies. Equipment designed to test<br />

product at the point of assembly is supplied by us and periodic visits are made by our personnel for purposes of<br />

quality assurance, assembly process review and supplier relations.<br />

Competition<br />

The market for computer and network security solutions is very competitive and, like most technologydriven<br />

markets, is subject to rapid change and constantly evolving products and services. Our main competitor is<br />

RSA Security, a subsidiary of EMC Corporation. Additional competitors are ActivIdentity, Gemalto, Todos Data<br />

13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!