Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:06 PM
Dark Reading
Dark Reading
Products and Releases

AVG Technologies Announces Change To Executive Leadership Team

J.R. Smith has resigned as CEO

AMSTERDAM and SAN FRANCISCO, March 7, 2013 /PRNewswire/ -- AVG Technologies N.V.

(NYSE: AVG), the provider of Internet and mobile security, privacy and optimization to 146 million active users, today announced that J.R. Smith has resigned as CEO and will become a member of the Supervisory Board. He will remain as CEO until a successor is named. Day-to-day operations continue to be the responsibility of Chief Operating Officer, John Giamatteo, who has been in this role since 2011. The Company has retained SPMB, a leading executive search firm, to find a successor. The search will include a full review of both internal and external candidates.

"J.R. has been a visionary leader for AVG. He transformed the company from a small European antivirus company to a successful publicly traded global leader in PC and mobile solutions," said Dale Fuller, Chairman of the Supervisory Board of AVG. "The board is grateful to J.R. for his leadership and valuable contributions. We look forward to his role as Supervisory Board member."

"During my six years as CEO I am proud of what we've accomplished: substantially growing the customer base, delivering strong financial performance, successfully leading our IPO and building a world class business and management team," said JR Smith, CEO. "Having grown the company to this stage, I feel the time is right to turn over the reins. I am looking forward to continuing to contribute as a member of the Supervisory Board knowing that the company is well positioned for future success."

AVG has reported five quarters of strong growth since becoming a publicly traded company. Revenue for the fourth quarter of 2012 was $95.2 million, compared with

$74.3 million in the fourth quarter of 2011, an increase of 28%. For the fiscal year 2012 revenue was $356.0 million, compared with $272.4 million in 2011, an increase of 31%. User numbers were 146 million at December 31, 2012, an increase of 38 million, or 35%, compared with the prior year.

AVG generated $119.3 million in cash from operating activities in fiscal year 2012, compared to $82.9 million in 2011.

Conference Call Today, Thursday March 7, 2013 at 2:00 PM PT AVG will hold a corresponding conference call today at 23:00 CET/5:00 p.m.

ET/2:00 p.m. PT. The conference call may be accessed via webcast at http://investors.avg.com or by calling 1 (877) 941-1427 (United States and

Canada) or +1 (480) 629-9664 (International).

A replay of the webcast can be accessed via http://investors.avg.com.

Additionally, an audio replay of the conference call will be available through March 14, 2013 by calling 1 (800) 406-7325 (United States and Canada) or +1

(303) 590-3030 (International), (conference passcode required: 4607218#).

Forward-Looking Statements

This press release contains forward-looking statements within the Private Securities Litigation Reform Act of 1995, including those relating to the expectation that the company's Chief Executive Officer will be nominated by the Supervisory Board as a member of the company's Supervisory Board and such nomination will be approved by the general meeting of shareholders, and the timing and outcome of the transition plan regarding the company's Chief Executive Officer. Words such as "expects," "proposes," "intends" and "believes," variations of such words and similar expressions are also intended to identify forward-looking statements. These forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from those contemplated herein. Factors that could cause or contribute to such differences include but are not limited to the ability of the company to identify and hire a suitable successor to replace the company's Chief Executive Officer and potential disruption to the company's operations and management that could result from the transition. Given these risks and uncertainties, you should not place undue reliance on these forward-looking statements. Further information on these factors and other risks that may affect the Company's business is included in filings AVG makes with the Securities and Exchange Commission (SEC) from time to time, including its Annual Report on Form 20-F, particularly under the heading "Risk Factors". These documents are available online from the SEC or in the Investor Relations section of our website at http://investors.avg.com. Information on our website is not part of this release. All forward-looking statements in this press release are based on information currently available to us, and we assume no obligation to update these forward-looking statements in light of new information or future events.

About AVG Technologies (NYSE: AVG)

AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG's powerful yet easy-to-use software and online services put users in control of their Internet experience.

By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 146 million active users as of December 31, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
PUBLISHED: 2019-12-05
Exception messages from internal exceptions (like database exception) are wrapped by \Symfony\Component\Security\Core\Exception\AuthenticationServiceException and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. A validation m...
PUBLISHED: 2019-12-05
An Information Disclosure vulnerability exists in the Jasig Project php-pear-CAS 1.2.2 package in the /tmp directory. The Central Authentication Service client library archives the debug logging file in an insecure manner.
PUBLISHED: 2019-12-05
Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash...