Welcome!

News Feed Item

FriendFinder Networks Estimates Q3 2012 Adjusted EBITDA of Over $22 Million

Expected Q3 Adjusted EBITDA Compares to $20 Million for Q3 2011 and $17 million for Q2 2012

SUNNYVALE, Calif., Nov. 5, 2012 /PRNewswire/ -- FriendFinder Networks Inc. (NasdaqGM: FFN) ("FriendFinder Networks" or the "Company"), a leading internet and technology company providing services in the rapidly expanding markets of social networking and web-based video sharing, today announced a preliminary adjusted EBITDA estimate for the third quarter of 2012.  The Company also announced it has retained CRT Capital Group LLC (www.crtllc.com) as its financial advisor to help explore opportunities to refinance its long-term debt.

On November 14, 2012, FriendFinder Networks will report its third quarter 2012 results.  Expected highlights include Adjusted EBITDA that the Company estimates will be over $22 million for the period ended September 30, 2012, compared to Adjusted EBITDA of $20 million reported in Q3 2011 and $17 million reported in Q2 2012.

"We are actively exploring opportunities to refinance our long-term debt and have entered into forbearance agreements with certain of our senior lenders to facilitate this process," noted Anthony Previte, Chief Executive Officer of FriendFinder Networks.  "While we continue to see significant improvement in our operating results and have adequate cash to make our excess cash flow payment due today, we currently intend to refrain from making this excess cash flow payment in order to conserve cash and take advantage of current favorable market conditions to refinance our debt.  To allow the Company to retain maximum liquidity and financial flexibility and to more effectively approach the capital markets, we have received forbearance agreements from the holders of over 80% of our senior debt to permit suspension of this excess cash flow payment.  This agreement recognizes our continuing efforts to rationalize our capital structure and signals the continued support of our senior lenders.  We will continue to pay interest during the refinancing phase."

Non-GAAP Financial Measures
Management believes that certain non-GAAP financial measures of earnings before deducting net interest expense, income taxes, depreciation and amortization, or EBITDA, and Adjusted EBITDA are helpful financial measures as investors, analysts and others frequently use EBITDA and Adjusted EBITDA in the evaluation of other companies in FriendFinder Networks Inc.'s industry.

These non-GAAP financial measures may not provide information that is directly comparable to that provided by other companies in FriendFinder Networks Inc.'s industry, as other companies in FriendFinder Networks Inc.'s industry may calculate such financial measures differently, particularly as it relates to nonrecurring, unusual items. The Company's non-GAAP financial measures of EBITDA and Adjusted EBITDA are not measurements of financial performance under GAAP and should not be considered as alternatives to cash flow from operating activities or as measures of liquidity or as alternatives to net income or as indications of operating performance or any other measure of performance derived in accordance with GAAP.  When the Company reports third quarter earnings on November 14, 2012, a full reconciliation of adjusted EBITDA to its most comparable GAAP measure will be provided.

SAFE HARBOR
This press release includes "forward-looking statements" within the meaning of the safe harbor provisions of the United States Private Securities Litigation Reform Act of 1995.  Actual results may differ from expectations, estimates and projections and, consequently, you should not rely on these forward looking statements as predictions of future events.  Words such as "expect," "estimate," "project," "budget," "forecast," "anticipate," "intend," "plan," "may," "will," "could," "should," "believes," "predicts," "potential," "continue," and similar expressions are intended to identify such forward-looking statements.  These forward-looking statements involve significant risks and uncertainties that could cause the actual results to differ materially from the expected results.

Additional information concerning these and other risk factors is contained in the Company's most recent filings with the SEC, including its Form 10-K for the year ended December 31, 2011.  All subsequent written and oral forward-looking statements concerning the Company are expressly qualified in their entirety by the cautionary statements above and subject to such risk factors discussed in the Company's recent SEC filings.  The Company cautions readers not to place undue reliance upon any forward-looking statements, which speak only as of the date made.  The Company does not undertake or accept any obligation or undertaking to release publicly any updates or revisions to any forward-looking statement to reflect any change in their expectations or any change in events, conditions or circumstances on which any such statement is based.

ABOUT FRIENDFINDER NETWORKS INC.
FriendFinder Networks Inc. (www.FFN.com) is an internet-based social networking and technology company operating several of the most heavily visited websites in the world, including AdultFriendFinder.com, Amigos.com, AsiaFriendFinder.com, Cams.com, FriendFinder.com, BigChurch.com and SeniorFriendFinder.com. FriendFinder Networks Inc. also produces and distributes original pictorial and video content and engages in brand licensing.

Investor Contact for FriendFinder Networks Inc.
Jeffrey Goldberger / Rob Fink
KCSA Strategic Communications
212.896.1249 or [email protected]
212.896.1206 or [email protected]

Media Contact for FriendFinder Networks Inc.
Lindsay Trivento
FriendFinder Networks Inc.
Director, Corporate Communications
561.912.7010 or [email protected] 

SOURCE FriendFinder Networks Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
SYS-CON Events announced today that CollabNet (www.collabnet.com) a global leader in enterprise software development and delivery solutions that help customers create high-quality applications at speed, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The CEO of CollabNet Flint Brenton will also present about DevOps challenges in today’s global, open, and heterogeneous world of software development.
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...