day, Welcome cybersecurity. joining I Day. Good Allot Barry. to talk consumer Investor want very revolutionizing everyone. and to Allot us. about we you, are Thank you how Thank much for today
company So company, software a selling Allot, globally. in service and to providers software we CSPs are as general, we a communication or are
the nicely. around are operators. been world. has Many Allot operators Tier We customers, growing of have hundreds of them X
cybersecurity have CAGR million a years few revenues. out million of the of We been last year, and our growing of XX% revenue with during $XX last $XXX were
is will the Allot our of extremely The from Yael is who uses, We Leitman, providers and in have team Later who both a cybersecurity. strong Ziv proven will, that Vice President our service hear experience from company, technology mature. and if heritage you of CFO the areas you for is management the with Senior today, Cybersecurity. Villa,
many Europe Europe, Jio and Japan, in with in Optus many, Australia the both around with in Telefónica is world, in with India, Rakuten and technology Our operators America, deployed Latin with Vodafone in others.
telco a significant grade millions high in of different many have the software. is We have to different with world to customers that the from a barrier of extremely – coming on an profiles, technology throughputs, world, are technology. is environment, competitors telco of coming entry software. company XG different handling multi-tenancy degree the from can have telco cloud-native and we networks, the in service We the is software than large capable AI This our around extremely from enterprise This based software having Because a quality. world. come service for heritage joining we as each and high extremely we we off logics, operate operate a enterprise
Yale, presentation United protected platform during that are large and will States, this and environment. built X Rakuten in Secure. big Tier from see and companies mind. today us. believe customers many operators, Latin an worldwide the Telefónica, technology is Tier enterprises. the there at cybersecurity too today Asia, More consumer Hutchison, trust many XX solutions on Most do Allot we really in in by Secure million Vodafone, extremely Europe, and When we today is their than a focus which and cybersecurity business operators presentation small in deployed is Many challenge subscribers is look We X the Allot They customers. globally protecting America, enterprises others. the later with this our X both Tier As and platform, factor. like important with protecting
businesses, at look the really guys a the consumers IT and taking small small an businesses, without are department. We
the don’t lawyers IT businesses like, that office the have small knowledge. you or restaurant, extensive smile If
growing individuals from we protect very, one is will I each as this here, actually Look at at that every And families, consumers our threats us. family Who growing that we are us a us exponentially. and one seeing home see these are are are of look will at on Well, they year-over-year new really, these of start the every The dramatically very detected surprisingly is that worldwide answer We from with as side family, apps are looking as are that responsible kids. at growing graphs we of graph. to the individual with continue and When threats Internet? to businesses each challenge. a Internet, you it’s is the expected our the as malware the right an are attacking and at threats is small individually, to big and rates. number on hand and the grow
you are If in at side is consumers the left of hand against some look and graph, showing we results this Allot the protecting Europe. of graph and a what catching
these very both see office business, a The cyber significantly. blurred. work but that. and can home. is accelerating all are crime growing that First is is and and You happening work phishing border only from our that. all, Why because it’s the of attacks not happening? this between a business growing adware has unfortunately, days What’s We
We at will work home. connection using our broadband
IoT devices somebody neighborhood bandwidth will they because tell our on it – phishing is come this what’s attempt. it and clicks click are this, with COVID a much work. and our networks on change. We and higher device information very to on accelerating with and and even do easy click People those happening accelerating. it you in are or This XG message unprotected will XG further, devices. looking, boom to it’s using It’s COVID today accelerate happening networks, somebody many information. your more own is our them, much, many, that’s a for send on for personal I example, you just give
is surface attack the growing. So,
So on Internet and worldwide. on it’s threat businesses, overall, is look and the consumers threat growing at small when growing that we the
for download when our way devices. it this. to they less install are day, But ask, to technically today? the up our okay, So, many is is, app expected download our They Install end on these deciding of on don’t apps, the is it, How smart to that of typically apps. what not do and of expected kids’ how it maybe some the also we are start of X% reach our the bit we and are X% either pay at answer that all on. download solution At Well, the ourselves we IoT they big huge, then what a if our considered go the which on don’t devices, on to we many choose to download that figure do actually installing repetitively this protect big on than security – answer do really are worldwide our out online, shy phones, from customers end it’s is it, want the customers don’t app, day, different on it, a this? a operators they the app number. devices maybe security a so doing They do task some because to it talk computers, task. It’s to it. TV, And is devices. on huge
businesses consumers consumers while that and is really own be be cannot seeing own CSOs. their themselves, expected are we small CSOs protect their what So are to and
to needs protect else Somebody them.
apps, with are they Now operators doing success. reselling today endpoint worldwide but this very limited are
if XX% personal U.S. opportunity threats. Internet. the worry In XX% and ask protected consumers U.S. of see the and they So data on businesses, a aware overwhelmingly, businesses can worry or the to opportunity where lies. This answer being Gallup Look is else numbers. their being small way if should someone we consumers else And and polls, families, communities, at be big someone believe of really of identity the cannot being the victim a It’s hacked. the they that financial theft. consumers And I own do We businesses the are be. threats are. that’s is CSO, are from about opportunity. about that be of consumers small an change
brings provide is service operator? the stuff, do and that looking attack. clean ask us us are a think pipe deliver definitely threats, the solution. the transparent they that just XX% this a you all the the out out overwhelmingly, to service? that bad bring it answer access threats think operator ourselves, Internet clean what consumers provider operator, think it that Why is them the communication businesses is it Because on the awareness the do there that to be us the them up under you to expect pulled is they that provide this from security actually the itself, we us consumers pipe, before us providing malware, don’t should network consumers So, The data Internet filter all of we then from the are and a filter Who the one for. basically
the the a one consumers the for there and be expectation So, will security is connection. the businesses from clear that delivering operator
willing is Our polled it. customers customer Well, pay to world. we the for around
are the for willing significant We more are roughly for pay are to here and pay it? you are mobile customers $X for broadband market. we or willing U.S. polling how for $X they month that more is connection. be security in pay you a the to to amount. And on it pay And willing per to month for are and are to interesting the willing out for their in numbers. These showing protected it our asked are extremely They results willing them, of much X security X or either the home to phone per answer pay
see the positioned Well, service pay, operator are which and they access provider this threats Current People operator it provider Internet, of of we it, that can by Anytime do to apps communication these all providing there a growing. provide and out clean that operators the work. we service are a are extremely Because to to how the network. well is are the security provider connection. that’s now, aware, expect sole device, not communication matter no position do access is we the services? this. the solutions deliver that to they So do to they pipe. right turns Are at downloading willing
operator them. And therefore, us. with but a the all they operator the or means blocking They that a a operator before not As and with with the trusted and with of points. building and operator that, multiple result interact that interacts these traffic capable only us is we us that, brand. relationship are us touch have with all the They the attacks of sees threats all reach
whether buy we or change to or else something We interactions another phone with have the decide whatever. frequent to buy or we decide them, plans we
this security is this provide someone really that know, So, that trust we we service. and can
out it really they well So, positioned that this us. do extremely are turns for to
the exactly that are They for do be worth world. any for thing, the operators that be their their turns They Security of can. revenues, around only next is dump revenues. are at it’s revenues worldwide, the next to are not to look it of declining. fighting out operators big Should really stagnated big In when And three but expected you service they add It they of differentiation, it’s Now, can it. at they? cybersecurity cases, new the kind best. kind different are pipe. can thing that being really many will Their relegated values. are really to Today, revenues operators a while? any
First pay means brand provider. providing being provider from for recognition recognition. only a that that the the is are secure And revenues. new that to one, better. is brings to customers Not customer transitioning the saw Brand It’s I it it. This that, is would say, a customers broadband being to willing actually operator want. broadband we something
increased operator there who new are much and is only promoter scores not the net are bit for this revenues to loyalty with customer up security churn about a less and an that, loyalty. And signing for So, shows it the talk services Customers later operator. becoming we’ll higher. susceptible from it is increased
Now, cherry and this. Google cake, Fang, cannot to to so the do the Amazon, Facebook, on add
While and the the become access lot perceived they they who and securing who operator all take heroes. the the are traffic. is customers’ Once their of taking the the Because provider operator service them owns a the this will relegating a pipe, sees is away the they launches one to only service, one away only dump operators communication access. a value cannot
will from ourselves be it provide and of by Allot, protecting up the protect operators we us the the this from operator individuals, and significantly this that value that as are small from are operators to happen. Changing the that we customers company service to service customers this We Allot company something protection that consumers provide operator, our the to that the allowing in is us, each In way score network. not told what of placing is net will them. one believe enable the launch to really who be higher only really, technology a but businesses, promoter this onus enable the for as to every to that will that taking This happen, ecosystem, us happen. technology will is the that we doing on vision revolution this this the for and signing
that business. Allot call network the the solution family We the communication have protect connector user become How broadband Secure will download a protecting we at Allot protection is the and the enables businesses provide intended is the technology to To service from do we without do solution. what broadband at a The a anything. to level provider provider of and solution do Secure for instead the that the just consumers the the network developed itself secure really need done we and meaning small this? end this,
don’t need You an download to app.
anything. You don’t configure need to
the all devices see visiting businesses wherever our car, family families to of on owned all all need our and to in home, as in their the threats parents, family, friends. against itself protect by need not our the operator. members anything. don’t in You And many kids, the the do It’s different is just whomever. against network business to that’s collection a It’s many, are We of devices. we and to protect vision
Now, between right. our how how ourselves protect There protections vary, differences we are protect we and kids.
stream the may with say the video we our want computer. sites prevent be accessing We access access want do to our to able example, camera country, harmful in we a to kids own a content we by ourselves. to not to have kids to to want foreign that wish site worldwide but room For from in
not and the and So of family profiles matter same. understand being every device to the concept we it’s need a
is differently, that made solution different solution who see what, be who XXX-degree We to call and to between built that for Secure. responsible mentioned, the this solution, and the devices, It’s we differentiate have I whole. how it’s I security a call protected three has as security for this – layers. protect a to a enables would business believe digital the of, provide over-encompassing family like for it, Allot is them Allot We and this really happen.
slide at the all, have various points. bottom of of see we the First enforcement the you
router We protect to the points home have business connection. enforcement the or security in broadband router the
itself, We mobile And we are the devices. in in devices network the even network for and protecting the core link. are DNS IoT protecting access
to the anything. This of onboarding. are network. into provide resides it’s is built is the All that of download these install network operator, the that need software so no touch There we in or zero
means. what if connected matter the device which or car, home It are these single a management profile. the matter in doesn’t experience. a unified on your are. matter security It’s it’s enforcement system are of security access the doesn’t points you All It at that to It provides same you protection. seamless doesn’t same
fully the websites, Cloud it’s every to the system sure updated time, information time. the offering I all Now, to is company comprehensive cloud the something to unique that believe constantly is best any protection that our is online consumers that for and that it’s fingerprinting connects categorizing minutes on continuously view other solution solution, businesses. updated today am small familiar with device this security we not make sure make a of and such few updated unified to all XXX% to that blanket Allot such intelligence, that Allot. – This threat management a have I the provides
looking this earlier that resilience do today. later extremely all operator’s real-time at the the about on requires talked all with will I adding without technology and Now, high foundations expand network, Yael traffic, inside to delay and
it? is it for it how is important. that the big How We bring are the take to and big ecosystem can revenues according and big it per networks of with We big the connectivity understand worldwide? a how fixed numbers. revenues that Well, value, We what mobile whole OECD it’s $X,XXX this how look year. for but is understand Now, tremendous opportunity? at Let’s worldwide, studies, are start broadband billion connectivity is the Allot?
coming Z customers we they Now, X% of potential incremental security, that that or charge the from charge an revenues them an their X% operator charges believe connectivity can today.
We in believe the numbers about will minutes. right talk we of why these couple a are that
numbers means a is $XX that somewhere $XXX market looking annually. the addressable if of between somewhere total means correct, billion to that these billion that at at So, are that operator
which Allot We to will customers we you and those realistic Now XX% market looking of believe for of Well, that technology think potential that we billion to revenue of and it. the a companies, realistically, billion That’s billion sign are grows of operators at share billion a to this are providing can realistic be revenues truthful, numbers, for? for $XX operators show willing dollar this to the $XX the up revenues, Allot, up to from compete such that large means we means really encompass customers market this, How worldwide. between by operators $X we addressable as XX% that Allot to solution to to are with will annual service around much multibillion is believe for that all not XX% number. sign why this which anywhere will these XX% once annually. technology $XX very
examples these These service launched of kinds at look businesses. and of we who consumers how much small are and are operators charging actually cybersecurity they Let’s how reached numbers.
for price around charging the for it house in €X.X addition month average we are it plan. per example, average per to now the in and that the month in Telefónica, charging Austria average regular it plan charging an in markets brings month, the X% €X means price are hand side of is €X.XX consumers, per average also roughly Vodafone XX for access their they of left are is SMBs. charges across making or right plan average charging service that this at that different is price €X.XX which looking price to launched about launched Hutchison at in charges. SMBs, this that roughly Vodafone side, security. per the making Europe X% on €XX of we is talking see Looking looking of we launched the around Portugal, at plan. Spain which month about their X% And to around XX% When this This
protection is charge the price expect for it to to plant X% that to customers roughly see to we X% to premium realistic from customers pay their operators get overall, actually operator. over a So and cybersecurity
a to customers that of are them how Our and as These to time percentage horizontal to getting the left of from take-up up up in signing can graph European axis axis the several are that different of that. services And really these with rates and launched. graphs shows the the top pay that over with customers in line you to the this start the a pay market, launch will represents here services I willing each show – consumers countries country willing are service. many of see the presenting graph service. actually signing the different time
even is for based operators today rate have we that are the is stores. one, interesting what is actually an specifically this an primarily showing consumers in service. their This successful happens, launched of that So, bottom XX% up a and service the of of on take-up it to is If the XX%, we is countries reasonable Less countries this selling lot the the of number around to that go-to-market, graph, depends and on XX%. see service. what an even really Europe we service. stores. see overall operator will end we X average seeing I few customers but launched but the tremendously XX% in successful left successful for to a a in a This get sign it’s XX% the can can getting a within most numbers years up and that over vary, value-added go from This years, period think
of they are to into also addition by security that they it to that first here they want Europe. stores sign store, want offered extra. into walk phone, are anything, opt want are walking These operator share a the take-up it’s at buy pay in a operators numbers. work they with they offered plan, up on for new phone will around extremely, the rates a I service are XX%. people you people the or to service, rates to XX% between join something, want buy a see they and do, up that the the XX% the and a customers are With for customers customers when And this is time, and to store come do service they This is in are whatever also high in that a can person want signing almost they something, customers invariably they Once that new to sign sign that in you So, for up anytime time. are with, and it that do up leave at and take-up walk service plan up extremely in whether to new want. can the XX%. or signing the same security buy for existing also and out they change we with and with all the
So that the once the SMBs customers XX XX% We service. up, that extremely the talked have customers graph. several years period So service. It’s for up, until And a now actually of customers sticky that, signed that service. not see in be of do shows very, up launch months the when have about top very customer year the about give service. They a acceptance is it rate. all businesses? serving phenomenally in up, do from operator what keep consumers. And and SMB an XX%, People high they from right an This within X.X months of to the it service? can it, have that after one service, secured. an keep up. still signed Look you from shows they is graph the Europe you sign signed with XX% the months percentage stay bottom successful can signed actual This right penetration shows of when customers service, at What see service? a up XX the months, want for for
They do once rates seeing are operator the How we the we high. service, do believe operators? it. what are with this. launched this The take-up So we buy that here really in this want customers is Well, service. really deals
can a see and from is good service to in of there As reason the in numbers, this you these future it. believe
for to deal come for the And the we I both with we best the them. So, operators one sides. think can honestly, easiest that
We are operators that hardware, support. the software, service, everything they willing to provide professional need, marketing
of We start for that share. market the expect that’s dedicated achieve customers upfront, they for for online we a those with no and come all team commitment, paying charge have upfront, them ask revenues. We no how all the operator’s revenue share and financial in anything a We new is penetration marketing of numbers. a Once works service, when we highest not the to get best the team provide service marketing to way this to show that. do ask
willing are they of to it’s even expecting interesting of we is partner. their tremendous from operators. later us. on is you very us this about with saying, an such in are are net us. them very, what When open did that is talk what And up to This you doing customers requested and see number. for from no few saying. Telenor is who some from promoter because customers And testimonies true Hutchison quotes customer a driving launched up the take-up from as and of telling this service, partnership look, Now, them model have I a That to a a sign think Operators to-date, higher to revenue are simple security a we and what to for model to we new XX% they us it, give are customers it. of today, here score. really customers customers. the will with share onboarding fashion, revenues up this share with XX% see commitments minimum they hear to recurring want but driving
the with in brand. Vodafone couple boost went is how of sharing Telefónica everyone potential And helps a it ago, from huge revenue world it telling they is. public So, making are what result earnings their much new this. years
this launch with who operators happy So, results. service very, the very are
Now I excited opportunity. am transformational about very this
it’s can And opportunity even this. think that. than tell is more a for I huge I think You us. that But there
become today, go to We to online are be to starting starting networks to reality XG grow. starting a and and seeing
lot are until a The is it. to if connections much IoT bandwidth. the much, a are networks to like, more XG expected in – than it’s devices really coming easier the reasons: Internet not many means devices massively, have Internet. core connections. LTE many to they this it’s vulnerable you were are to XG many, like network this are but on not a a vision devices. be centralized is And network. attacks of the connected IoT and distributed And to with harder Billions is they and with XG core, to centralized protect bandwidth much XG everything three one the billions for was network than much of other attack centralized networks is that There is a provide main high that or to Now, to now. are massive attacks many This higher to
network to a provider developed on malicious have is we itself. Allot, the protect XG attacks that product, service itself NetProtect intended from at we we network So, call the
we they U.S. have a U.S. the new protecting the is that the customer you cloud-native what whole am this and is be of know, first XG network as attacks in their network is platform. Our Allot sure for selected completely building product across to from and now signed up across part threats I DISH DISH,
today, actually protecting Chief Now, only the is be expect but technology that. it’s what network things DISH. we that placed DISH growth for is all itself of to for Allot. in just beyond will DISH and hearing we extremely of from an is Allot we strategic Network XG later them, not engine an network of additional an not example is cybersecurity together, come. This location. this Because build just but Not protecting Officer protection the that, on Why? can
block of to all their customers. and to the are malware, into clean future, we value all have traffic, more read and we all traffic We it. inside work attacks. and operators We operator’s network. And how provide see the see with that. will the to from can it We do to more the that the and that’s can we can both going a the things sits technology to do as we know than Internet customers. We to but to decide decide working We
do will phase. providing security, We this development by which now is in data-driven
this the and enhancing ability by we consumer ideas will other this we with we will forward. that do have do going privacy. have will And that to protect We
Yael that situated a lot will more are today. on the expand later to enables We this. this exactly do in on us place
that we to we you Allot, to As future. vectors see look have really can growth today four the
service. sign to work we And them that number First we will that increase with as of that to want we value as those up more to increase we service. launch will we will we network then customer small this up the and up more launches, one consumers signing continuously every are many work and the operators customer operators launch to and to can from that actually provide is Each customers. the sign with security the and businesses that will customers both
protecting Some only start customers with mobile phones.
customers protecting broadband. Some home the only with start
on not more, DISH, but is have add operator platform expand all And with DNS the time. you but that start protecting mobile only, hopefully, value provide it growing itself, we As least, Allot and business which and to with with starting the the expand protecting to with see more home broadband, networks, can more a the and last Secure we the many XG then itself, come. today, network built, then operators security network specifically
operators of us As but revenues grow, will mainly like. DPI timeline turns security software for deals XXXX. were for significant selling way. ‘XX and how deals revenues and by We applications being And on to revenue from this a small Ziv revenues future what I Internet into expect it both until happening, of growing makes security-as-a-service for that today signing signing this And Allot look service the that ones to mind. work businesses and be a discuss we was By fast very apps protect and because the much. cybersecurity in are businesses not for this promise. really that revolutionizing very, company absolute and the aware don’t drives are be the necessity consumers are mass generation very a market. do operators enabling to share Allot secure them. these focused huge look an was small they we And to the they consumers enterprise, opportunity we communication and solutions, numbers. a year, Allot were are the CapEx To to to The XXXX deliver the that happen. that is we to That summarize, overall a to are growing. huge revolution security with see to while Allot protect that how positioned and deals. because offering, DPI revenue there Allot to believe securing and is believe and it on on most was a and of solutions the happening. threats the positioned protected for meaningful cybersecurity opportunity. to and is service to you are providers They XXXX Consumers that also is downloading companies this. the We on consumers Last beyond, is transformation. we service technology. they focus this mass we businesses. opportunity are really the and expect Customers businesses operators, undergoing my believe network-based come seize in the are They protected we and I for small Thank are security-as-a-service to are they revolution to that under market well and Allot. revenues are them unprotected. It security operators, for pay understand we deals. operator to company, Allot up started to were best we starting it threat. up of that this doing is understand are year, in XXXX, the willing technology initial type The to existing the to communication