SYS-CON MEDIA Authors: Jim Kaskade, Yeshim Deniz, Elizabeth White, Greg Ness, Sean Houghton

News Feed Item

CommScope Commences Secondary Offering

CommScope Holding Company, Inc. (NASDAQ: COMM) has commenced an offering to sell 15,000,000 shares of its common stock by an affiliate of The Carlyle Group (the “selling stockholder”). The offering is being made pursuant to a registration statement on Form S-1 previously filed with the U.S. Securities and Exchange Commission. The selling stockholder has also granted the underwriters a 30-day option to purchase up to an additional 2,250,000 shares of CommScope’s common stock. CommScope will not receive any of the proceeds from the offering of shares by the selling stockholder.

J.P. Morgan, Deutsche Bank Securities and BofA Merrill Lynch are lead book-running managers for the proposed secondary offering. Additional book-running managers are Barclays, Credit Suisse Securities (USA) LLC, Goldman, Sachs & Co., Jefferies LLC, Morgan Stanley & Co. LLC, RBC Capital Markets and Wells Fargo Securities. Co-Managers are Allen & Company LLC, Evercore, Raymond James, Mizuho Securities, SMBC Nikko and Drexel Hamilton.

Copies of the preliminary prospectus relating to the proposed secondary offering may be obtained from J.P. Morgan, Attention: Broadridge Financial Solutions, 1155 Long Island Avenue, Edgewood, New York 11717, telephone: 1-866-803-9204; Deutsche Bank Securities Inc., Attn: Prospectus Department, 60 Wall Street, New York, New York 10005, telephone: 800-503-4611 or email: [email protected]; and BofA Merrill Lynch, 222 Broadway, New York, New York, 10038, Attn: Prospectus Department or email: [email protected].

Important Information

A registration statement relating to these securities has been filed with the SEC but has not yet become effective. These securities may not be sold nor may offers to buy be accepted prior to the time the registration statement becomes effective. This press release shall not constitute an offer to sell or the solicitation of an offer to buy, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

Cautionary Statement Concerning Forward-Looking Statements

This Press Release and any other oral or written statements made by us or on our behalf may include forward-looking statements which reflect our current views with respect to future events and financial performance. These forward-looking statements are identified by their use of such terms and phrases as “intend,” “goal,” “estimate,” “expect,” “project,” “projections,” “plans,” “anticipate,” “should,” “designed to,” “foreseeable future,” “believe,” “think,” “scheduled,” “outlook,” “guidance” and similar expressions. This list of indicative terms and phrases is not intended to be all-inclusive. These statements are subject to various risks and uncertainties, many of which are outside our control, including, without limitation, our dependence on customers’ capital spending on communication systems; concentration of sales among a limited number of customers or distributors; changes in technology; our ability to fully realize anticipated benefits from prior or future acquisitions or equity investments; industry competition and the ability to retain customers through product innovation, introduction and marketing; risks associated with our sales through channel partners; possible production disruptions due to supplier or contract manufacturer bankruptcy, reorganization or restructuring; the risk our global manufacturing operations suffer production or shipping delays causing difficulty in meeting customer demands; the risk that internal production capacity and that of contract manufacturers may be insufficient to meet customer demand or quality standards for our products; our ability to maintain effective information management systems and to successfully implement major systems initiatives; cyber-security incidents, including data security breaches or computer viruses; product performance issues and associated warranty claims; significant international operations and the impact of variability in foreign exchange rates; our ability to comply with governmental anti-corruption laws and regulations and export and import controls worldwide; risks associated with currency fluctuations and currency exchange; the divestiture of one or more product lines; political and economic instability, both in the U.S. and internationally; potential difficulties in realigning global manufacturing capacity and capabilities among our global manufacturing facilities, including delays or challenges related to removing, transporting or reinstalling equipment, that may affect ability to meet customer demands for products; possible future restructuring actions; possible future impairment charges for fixed or intangible assets, including goodwill; increased obligations under employee benefit plans; cost of protecting or defending intellectual property; changes in laws or regulations affecting us or the industries we serve; costs and challenges of compliance with domestic and foreign environmental laws and the effects of climate change; changes in cost and availability of key raw materials, components and commodities and the potential effect on customer pricing; risks associated with our dependence on a limited number of key suppliers; our ability to attract and retain qualified key employees; allegations of health risks from wireless equipment; availability and adequacy of insurance; natural or man-made disasters or other disruptions; income tax rate variability and ability to recover amounts recorded as value-added tax receivables; labor unrest; risks associated with future research and development projects; increased costs as a result of operating as a public company; our ability to comply with new regulations related to conflict minerals; risks associated with the seasonality of our business; substantial indebtedness and maintaining compliance with debt covenants; our ability to incur additional indebtedness; cash requirements to service indebtedness; ability of our lenders to fund borrowings under their credit commitments; changes in capital availability or costs, such as changes in interest rates, security ratings and market perceptions of the businesses in which we operate, or the ability to obtain capital on commercially reasonable terms or at all; continued global economic weakness and uncertainties and disruption in the capital, credit and commodities markets; any statements of belief and any statements of assumptions underlying any of the foregoing; and other factors beyond our control. These and other factors are discussed in greater detail in our 2013 Annual Report on Form 10-K and Registration Statement on Form S-1 filed with the Securities and Exchange Commission on June 2, 2014. Although the information contained in this Press Release represents our best judgment at the date of this release based on information currently available and reasonable assumptions, we can give no assurance that the expectations will be attained or that any deviation will not be material. We are not undertaking any duty or obligation to update these statements as a result of actual results, new information, future events or otherwise.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...