Security products, solutions and services such as ours are complex in development, design and deployment and may contain errors, bugs, misconfigurations or vulnerabilities, that are potentially incapable of being remediated or detected until after their deployment, if at all. Any real or perceived errors, bugs, design failures, defects, vulnerabilities, misconfigurations in our solutions or their accompanying documentation, or untimely or insufficient remediation thereof, could cause our solutions not to meet their specifications or security standards. The affected solutions may not fulfil their primary security functions, falsely identify threats or create new security threats, and be vulnerable to security attacks. There is no guarantee that our products would be free of flaws or vulnerabilities at all times and we may not correct all known vulnerabilities or errors, promptly or at all. Further, our solutions serve as mission-critical applications in our customers’ operational environments, allowing them to manage access and privileges in their systems and networks. Any breach, interruption or shut down of our solutions could significantly damage customers’ internal and external operations, and therefore we may suffer significant reputational, financial and legal adverse impact. Potential vulnerabilities or deficiencies associated with a product developed or obtained through an acquisition could also deteriorate our solutions’ security and expose our customers to additional risk (see “—We may fail to fully execute, integrate, or realize the benefits expected from acquisitions, which may require significant management attention, disrupt our business, dilute shareholder value and adversely affect our results of operations.”). Several of our solutions are made available to our customers as SaaS. Delivering software as a service involves storage and transmission of customers’ proprietary information, including personal data, related to their assets, employees and users. Security breaches, bugs, vulnerabilities, defects or improper configuration of our solutions, cloud accounts or production and development environments (including those embedded in third-party technology used in our products or by our customers) could result in loss or alteration of, or unauthorized access to this data and compromise of our networks or our customers’ networks secured by our SaaS solutions. Any such incident, whether or not caused by us, could result in significant liability for us and negative business repercussions. Our solutions not only reinforce but also rely on the common security concept of placing multiple layers of security controls throughout an IT environment. The failure of our customers, channel partners, managed service providers, subcontractors or similar entities to correctly implement or effectively manage and maintain our solutions and the environments in which they are utilized, or to consistently implement and utilize generally accepted and comprehensive, multi-layered security measures and processes, may lessen the efficacy of our solutions, in whole or in part. These entities may also independently develop or change existing application programming interfaces (APIs) that we provide or other customizable components in an incorrect or insecure manner. Such failures or actions may lead to security breaches and data loss, which could result in a perception that our solutions or services failed and associated negative business implications. In addition, we are expected to provide a high level of transparency regarding vulnerabilities in our products, which, once conveyed, may increase our customers’ exposure to a security breach until they properly implement the relevant fix. Further, our failure to provide our customers and channel partners with adequate services or accurate product documentation and training related to the use, implementation and maintenance of our solutions, could lead to claims against us. Similarly, and as demonstrated by the 2020 attack on SolarWinds, a failure by a provider like us to effectively secure and detect threats within our own resources and networks, such as development or customer-serving production environments, could lead to threat actors compromising our customers’ environments through a breach or exploitation of our products or services (see “—If our internal IT network systems, or those of our third-party providers, are compromised by cyberattacks or other security incidents, or by a critical system disruption or failure, then our reputation, financial condition and operating results could be materially adversely affected.”). As demonstrated by the 2021 Apache Log4j vulnerabilities, a similar effect could arise from the use of compromised third-party open-source software in our products or by our vendors, which could expose our solutions, networks and environments – and thereby our customers – to additional vulnerabilities. As we increase our developers’ workforce globally to meet our business goals, including by engaging external developers or through mergers and acquisitions, the risk of errors, misconfigurations, vulnerabilities or intentional misconduct, may be heightened due to governance difficulties and limited centralized oversight. In addition, difficulties or delays in hiring and retaining personnel may impact the resources available to us for continuous improvement of our product security posture and therefore, increase this risk (see “—The tight global labor market has created difficulty to attract and retain qualified personnel, has increased wages and compensation, and has increased employee turnover across industries. If we are unable to hire, retain and motivate qualified personnel, our business will suffer.”). An actual or perceived error, bug, misconfiguration, vulnerability, cyberattack or other security breach, regardless of whether the vulnerability or breach is actually attributable to the failure of our products, SaaS solutions or the related services we provide, could adversely affect the market’s perception of the efficacy of our solutions and our industry standing. Such circumstances could cause current or potential customers to look to our competitors for alternatives to our solutions and subject us to negative media attention, reputational harm, lawsuits, regulatory investigations and other government inquiries, indemnity claims and financial losses, as well as the expenditure of significant financial resources to, among other actions, analyze, correct or eliminate any vulnerabilities. Provisions in our agreements that attempt to limit our liability towards our customers, channel partners and relevant third parties may not withstand legal challenges, and certain liabilities may not be limited or capped. Additionally, any insurance coverage we have may not adequately cover all claims asserted against us and may leave a significant portion of such claims to be directly covered by us. In addition, such insurance may not be available to us in the future on economically reasonable terms, or at all.