high match confidence
Sentence-level differences:
- Reworded sentence: "We store sensitive data, including intellectual property, our proprietary business information and that of our customers, and personal information, in our data centers, on our networks or on the cloud."
- Reworded sentence: "We also periodically acquire new businesses with less mature security programs, and it takes time to align their security practices to meet our information security policies, procedures and controls."
- Reworded sentence: "Our software products, hosted solutions and software security and quality testing solutions are also targeted by hackers and may be compromised by, among other things, phishing, exploits of our code or our system configurations, malicious code (such as viruses and worms), distributed denial-of-service attacks, sophisticated 22 22 22 Table of Contents Table of Contents attacks conducted or sponsored by nation-states, advanced persistent threat intrusions, ransomware and other malware."
- Reworded sentence: "If we fail to identify new and increasingly sophisticated methods of cyber attacks or fail to invest sufficient resources in research and development regarding new threat vectors, our security testing products and services may not detect vulnerabilities in our customers’ software code."
Current (2023):
We store sensitive data, including intellectual property, our proprietary business information and that of our customers, and personal information, in our data centers, on our networks or on the cloud. In addition, our operations depend upon our information technology (IT)…
Read full text
We store sensitive data, including intellectual property, our proprietary business information and that of our customers, and personal information, in our data centers, on our networks or on the cloud. In addition, our operations depend upon our information technology (IT) systems. We maintain a variety of information security policies, procedures, and controls to protect our business and proprietary information, prevent data loss and other security breaches and incidents, keep our IT systems operational and reduce the impact of a security breach or incident, but these securities measures cannot provide and have not provided absolute security. In the normal course of business, our systems are and have been the target of malicious cyber attack attempts and have been and may be subject to compromise due to employee error, malfeasance or other disruptions that have and could result in unauthorized disclosure or loss of sensitive information. To date, we have not identified material cyber security incidents or incurred any material expenses with any incidents. However, any breach or compromise could adversely impact our business and operations, expose us or our customers to litigation, investigations, loss of data, increase costs, or result in loss of customer confidence and damage to our reputation, any of which could adversely affect our business and our ability to sell our products and services. Industry incidences of cyberattacks and other cybersecurity breaches have increased and are likely to continue to increase. We are using an increasing number of third-party software solutions, including cloud-based solutions, which increase potential threat vectors, such as by exploitation of misconfigurations or vulnerabilities. We also use third-party vendors that provide software or hardware, have access to our network, and/or store sensitive data, and these third parties are subject to their own cybersecurity threats. Our standard vendor terms and conditions include provisions requiring the use of appropriate security measures to prevent unauthorized use or disclosure of our data, as well as other safeguards. Despite these measures, there is no guarantee that a compromise of our third-party vendors will not occur and in turn result in a compromise of our own IT systems or data. In addition, if we select a vendor that uses cloud storage as part of their service or product offerings, or if we are selected as a vendor for our cloud-based solutions, our proprietary information could be misappropriated by third parties despite our attempts to validate the security of such services. Many employees continue to work remotely based on a hybrid work model, which magnifies the importance of maintaining the integrity of our remote access security measures. We also periodically acquire new businesses with less mature security programs, and it takes time to align their security practices to meet our information security policies, procedures and controls. The techniques used to obtain unauthorized access to networks or to sabotage systems of companies such as ours change frequently and generally are not recognized until launched against a target. We may be unable to anticipate these emerging techniques, react in a timely manner, or implement adequate preventative measures, or we may not have sufficient logging available to fully investigate the incident. Our security measures vary in maturity across the business and may be and have been circumvented. For example, we have identified instances where employees have used non-approved applications for business purposes, some of which do not meet our security standards. In addition, we discovered unauthorized third-party access to our products and product license files hosted on our SolvNet Plus customer license and product delivery system in 2015. Any security breach of our own or a third-party vendor’s systems could cause us to be non-compliant with applicable laws or regulations, subject us to legal claims or proceedings, disrupt our operations, damage our reputation, and cause a loss of confidence in our products and services, any of which could adversely affect our business and our ability to sell our products and services. Our software products, hosted solutions and software security and quality testing solutions are also targeted by hackers and may be compromised by, among other things, phishing, exploits of our code or our system configurations, malicious code (such as viruses and worms), distributed denial-of-service attacks, sophisticated 22 22 22 Table of Contents Table of Contents attacks conducted or sponsored by nation-states, advanced persistent threat intrusions, ransomware and other malware. We leverage many security best practices throughout the software development lifecycle, but our security development practices vary in maturity across the business and may not be effective against all cybersecurity threats. Furthermore, due to geopolitical incidents, including regional military conflicts, state-supported and geopolitical-related cybersecurity incidents against companies such as ours may increase. Attacks on our products could potentially disrupt the proper functioning of our software, cause errors in the output of our customers’ work, allow unauthorized access to our or our customers’ proprietary information or cause other destructive outcomes. We also offer software security and quality testing solutions. If we fail to identify new and increasingly sophisticated methods of cyber attacks or fail to invest sufficient resources in research and development regarding new threat vectors, our security testing products and services may not detect vulnerabilities in our customers’ software code. An actual or perceived failure to detect security flaws may negatively impact the perceived reliability of our security testing products and services, and could result in a loss of customers or sales, or an increased cost to remedy a problem. Furthermore, our growth and recent acquisitions in the software security and quality testing space may increase our visibility as a security-focused company and may make us a more attractive target for attacks on our own IT infrastructure. As a result, we could experience negative publicity and our reputation could suffer, customers could stop buying our products, we could face lawsuits and potential liability, and our business, operating results and financial condition could be negatively impacted.
View prior text (2022)
We store sensitive data, including intellectual property, our proprietary business information and that of our customers, and confidential employee information, in our data centers, on our networks or on the cloud. These systems may be vulnerable to attacks by hackers or compromised due to employee error, malfeasance or other disruptions that could result in unauthorized disclosure or loss of sensitive information. Many employees continue to work remotely based on a hybrid work model, which magnifies the importance of maintaining the integrity of our remote access security measures. For example, we discovered unauthorized third-party access to our products and product license files hosted on our SolvNet Plus customer license and product delivery system in 2015. While we identified and remediated the incident, it is possible that our security measures may be circumvented again in the future, and any such breach could adversely impact our business, operations and reputation. The techniques used to obtain unauthorized access to networks, or to sabotage systems, change frequently and generally are not recognized until launched against a target. We may be unable to anticipate these techniques, react in a timely manner or implement adequate preventative measures. Furthermore, in the operation of our business we also use third-party vendors that have access to our network and store certain sensitive data, including confidential information about our employees, and these third parties are subject to their own cybersecurity threats. Our standard vendor terms and conditions include provisions requiring the use of appropriate security measures to prevent unauthorized use or disclosure of our data, as well as other safeguards. However, that is no guarantee that a breach will not still occur. In addition, if we select a vendor that uses cloud storage of information as part of their service or product offerings, or if we are selected as a vendor for our cloud-based solutions, our proprietary information could be misappropriated by third parties despite our attempts to validate the security of such services. Any security breach of our own or a third-party vendor’s systems could cause us to be non-compliant with applicable laws or regulations, subject us to legal claims or proceedings, disrupt our operations, damage our reputation, and cause a loss of confidence in our products and services, any of which could adversely affect our business and our ability to sell our products and services. Our software products, hosted solutions, and software security and quality testing solutions may also be vulnerable to attacks, including phishing, exploits of our code or our system configurations, malicious code (such as viruses and worms), distributed denial-of-service attacks, sophisticated attacks conducted or sponsored by nation-states, advanced persistent threat intrusions, ransomware and other malware. Furthermore, the risk of state-supported and geopolitical-related cybersecurity incidents may increase due to geopolitical incidents, such as the Russia-Ukraine conflict. An attack could disrupt the proper functioning of our software, cause errors in the output of our customers’ work, allow unauthorized access to our or our customers’ proprietary information or cause other destructive outcomes. We also offer software security and quality testing solutions. If we fail to identify new and increasingly sophisticated methods of cyber attacks or fail to invest sufficient resources in research and development regarding new threat vectors, our security testing products and services may fail to detect vulnerabilities in our customers’ software code. An actual or perceived failure to identify security flaws may harm the perceived reliability of our security testing products and services, and could result in a loss of customers or sales, or an increased cost to remedy a problem. Furthermore, our growth and recent acquisitions in the software security and quality testing space may increase our 22 22 22 Table of Contents Table of Contents visibility as a security-focused company and may make us a more attractive target for attacks on our own information technology infrastructure. If any of the foregoing were to occur, we could experience negative publicity and our reputation could suffer, customers could stop buying our products, we could face lawsuits and potential liability, and our financial performance could be negatively impacted.