Barry Spielman | Director, Product Marketing |
Erez Antebi | Chief Executive Officer |
Yael Villa | Senior Vice President, Cybersecurity |
Ziv Leitman | Chief Financial Officer |
Hello, everyone and welcome to the Allot Investor Day 2021. It’s a big day for us. Today, we are going to share a lot about our company and where we are headed and we are very excited about the future. I am Barry Spielman, Director of Product Marketing for Cybersecurity. And you are going to hear quite a bit about Cybersecurity over the next couple of hours and how it’s becoming a central pillar in the company’s growth strategy. have virtual marks and this an we thrilled this will information journey context, for are sharing us be important to that Investor the Day we and the In ride. with you milestone on management, Unit, joined Antebi; Officer, Dr. Vice for senior Senior of Head Chief Cybersecurity Executive Today, I and Allot’s the our am President by Erez our Cybersecurity Business Chief and Allot’s Financial Villa; Leitman. Officer, Yael Ziv disclaimer. of our presentations, I like our And Safe everyone Harbor before begin we to would remind today’s responses outlook and questions constitute in various statements our Certain represent forward-looking presentation and may to statements that expectations. current that additional forward-looking from you those caution anticipated We materially actual these in other statements. by cause management may projected differ not to results factors Annual Report Form subsequent that U.S. with and you on the to filings recommend factors refer recent contained risk XX-F We most the in our Commission. and Exchange Securities
release, most In non-GAAP The addition, measures, presentation earnings of measures first financial available as a want section the make of on net point will the that can income. appendix the non-GAAP the the is we comparable this certain non-GAAP investor reconciliation posted to reference non-GAAP to Investor be company’s website. found well. call, quarter Allot to directly gross out these GAAP XXXX the on I will session the and be today’s recording Relations on Investors in in and measures website profit company’s including to of which
why demonstrate literally for off you, to consumer which day Allot believe, Cybersecurity sessions, video like Now, a I’d [Video setting about Presentation] revolutionizing kick the business, today’s to things is to cybersecurity. stage get rolling, will we Allot clip with the short
today. want and for we what have go the I through you over quickly Before to the I planned turn microphone, agenda
CSPs our We cybersecurity. both revolutionizing will you business start for Allot will how a will Allot. is show opportunity He describe consumer for by and huge CEO, Erez the who briefing Antebi, with
President Executive and share plane end-to-end consumer, attacks and DISH. as at DISH user for Chief cybersecurity with customers. deal recently network Allot protection you protection Marc discussion a Network as recently provide Vice botnet CEO a DDos had We to will OpenRAN-based threat provide our SMB signed to Officer cloud-native MVNO against with then Rouanne, DISH XG well with DISH’s on and
to We SVP Villa, will give then move makes will all the Yael happen. Cybersecurity, overview who technology, our on on Dr. it for an that
Following couple of Leitman, presentation, additional testimonials share Yael’s them Solutions discuss will Allot revenue Allot’s CFO, significant Ziv business discuss And achieve will a customers, model. our will from how short finally, sharing growth. we who help our
questions We time plenty session. answer will of to your have during the Q&A
If you platform any during the any on the have the send Q&A. tab at to questions, free we will answer questions and via time them them feel
Okay.
our it to I think we to are CEO, I to get am pleased started. Erez over Antebi. Erez? hand ready
day, Welcome cybersecurity. joining I Day. Good Allot Barry. to talk consumer Investor want very revolutionizing everyone. and to Allot us. about we you, are Thank you how Thank much for today
company So company, software a selling Allot, globally. in service and to providers software we CSPs are as general, we a communication or are
the nicely. around are operators. been world. has Many Allot operators Tier We customers, growing of have hundreds of them X
cybersecurity have CAGR million a years few revenues. out million of the of We been last year, and our growing of XX% revenue with during $XX last $XXX were
is will the Allot our of extremely The from Yael is who uses, We Leitman, providers and in have team Later who both a cybersecurity. strong Ziv proven will, that Vice President our service hear experience from company, technology mature. and if heritage you of CFO the areas you for is management the with Senior today, Cybersecurity. Villa,
many Europe Europe, Jio and Japan, in with in Optus many, Australia the both around with in Telefónica is world, in with India, Rakuten and technology Our operators America, deployed Latin with Vodafone in others.
telco a significant grade millions high in of different many have the software. is We have to different with world to customers that the from a barrier of extremely – coming on an profiles, technology throughputs, world, are technology. is environment, competitors telco of coming entry software. company XG different handling multi-tenancy degree the from can have telco cloud-native and we networks, the in service We the is software than large capable AI This our around extremely from enterprise This based software having Because a quality. world. come service for heritage joining we as each and high extremely we we off logics, operate operate a enterprise
Yale, presentation United protected platform during that are large and will States, this and environment. built X Rakuten in Secure. big Tier from see and companies mind. today us. believe customers many operators, Latin an worldwide the Telefónica, technology is Tier enterprises. the there at cybersecurity too today Asia, More consumer Hutchison, trust many XX solutions on Most do Allot we really in in by Secure million Vodafone, extremely Europe, and When we today is their than a focus which and cybersecurity business operators presentation small in deployed is Many challenge subscribers is look We X the Allot They customers. globally protecting America, enterprises others. the later with this our X both Tier As and platform, factor. like important with protecting
businesses, at look the really guys a the consumers IT and taking small small an businesses, without are department. We
the don’t lawyers IT businesses like, that office the have small knowledge. you or restaurant, extensive smile If
growing individuals from we protect very, one is will I each as this here, actually Look at at that every And families, consumers our threats us. family Who growing that we are us a us exponentially. and one seeing home see these are are are of look will at on Well, they year-over-year new really, these of start the every The dramatically very detected surprisingly is that worldwide answer We from with as side family, apps are looking as are that responsible kids. at growing graphs we of graph. to the individual with continue and When threats Internet? to businesses each challenge. a Internet, you it’s is the expected our the as malware the right an are attacking and at threats is small individually, to big and rates. number on hand and the grow
you are If in at side is consumers the left of hand against some look and graph, showing we results this Allot the protecting Europe. of graph and a what catching
these very both see office business, a The cyber significantly. blurred. work but that. and can home. is accelerating all are crime growing that First is is and and You happening work phishing border only from our that. all, Why because it’s the of attacks not happening? this between a business growing adware has unfortunately, days What’s We
We at will work home. connection using our broadband
IoT devices somebody neighborhood bandwidth will they because tell our on it – phishing is come this what’s attempt. it and clicks click are this, with COVID a much work. and our networks on change. We and higher device information very to on accelerating with and and even do easy click People those happening accelerating. it you in are or This XG message unprotected will XG further, devices. looking, boom to it’s using It’s COVID today accelerate happening networks, somebody many information. your more own is our them, much, many, that’s a for send on for personal I example, you just give
is surface attack the growing. So,
So on Internet and worldwide. on it’s threat businesses, overall, is look and the consumers threat growing at small when growing that we the
for download when our way devices. it this. to they less install are day, But ask, to technically today? the up our okay, So, many is is, app expected download our They Install end on these deciding of on don’t apps, the is it, How smart to that of typically apps. what not do and of expected kids’ how it maybe some the also we are start of X% reach our the bit we and are X% either pay at answer that all on. download solution At Well, the ourselves we IoT they big huge, then what a if our considered go the which on don’t devices, on to we many choose to download that figure do actually installing repetitively this protect big on than security – answer do really are worldwide our out online, shy phones, from customers end it’s is it, want the customers don’t app, day, different on it, a this? a operators they the app number. devices maybe security a so doing They do task some because to it talk computers, task. It’s to it. TV, And is devices. on huge
businesses consumers consumers while that and is really own be be cannot seeing own CSOs. their themselves, expected are we small CSOs protect their what So are to and
to needs protect else Somebody them.
apps, with are they Now operators doing success. reselling today endpoint worldwide but this very limited are
if XX% personal U.S. opportunity threats. Internet. the worry In XX% and ask protected consumers U.S. of see the and they So data on businesses, a aware overwhelmingly, businesses can worry or the to opportunity where lies. This answer being Gallup Look is else numbers. their being small way if should someone we consumers else And and polls, families, communities, at be big someone believe of really of identity the cannot being the victim a It’s hacked. the they that financial theft. consumers And I own do We businesses the are be. threats are. that’s is CSO, are from about opportunity. about that be of consumers small an change
brings provide is service operator? the stuff, do and that looking attack. clean ask us us are a think pipe deliver definitely threats, the solution. the transparent they that just XX% this a you all the the out out overwhelmingly, to service? that bad bring it answer access threats think operator ourselves, Internet clean what consumers provider operator, think it that Why is them the communication businesses is it Because on the awareness the do there that to be us the them up under you to expect pulled is they that provide this from security actually the itself, we us consumers pipe, before us providing malware, don’t should network consumers So, The data Internet filter all of we then from the are and a filter Who the one for. basically
the the a one consumers the for there and be expectation So, will security is connection. the businesses from clear that delivering operator
willing is Our polled it. customers customer Well, pay to world. we the for around
are the for willing significant We more are roughly for pay are to here and pay it? you are mobile customers $X for broadband market. we or willing U.S. polling how for $X they month that more is connection. be security in pay you a the to to amount. And on it pay And willing per to month for are and are to interesting the willing out for their in numbers. These showing protected it our asked are extremely They results willing them, of much X security X or either the home to phone per answer pay
see the positioned Well, service pay, operator are which and they access provider this threats Current People operator it provider Internet, of of we it, that can by Anytime do to apps communication these all providing there a growing. provide and out clean that operators the work. we service are a are extremely Because to to how the network. well is are the security provider connection. that’s now, aware, expect sole device, not communication matter no position do access is we the services? this. the solutions deliver that to they So do to they pipe. right turns Are at downloading willing
operator them. And therefore, us. with but a the all they operator the or means blocking They that a a operator before not As and with with the trusted and with of points. building and operator that, multiple result interact that interacts these traffic capable only us is we us that, brand. relationship are us touch have with all the They the attacks of sees threats all reach
whether buy we or change to or else something We interactions another phone with have the decide whatever. frequent to buy or we decide them, plans we
this security is this provide someone really that know, So, that trust we we service. and can
out it really they well So, positioned that this us. do extremely are turns for to
the exactly that are They for do be worth world. any for thing, the operators that be their their turns They Security of can. revenues, around only next is dump revenues. are at it’s revenues worldwide, the next to are not to look it of declining. fighting out operators big Should really stagnated big In when And three but expected you service they add It they of differentiation, it’s Now, can it. at they? cybersecurity cases, new the kind best. kind different are pipe. can thing that being really many will Their relegated values. are really to Today, revenues operators a while? any
First pay means brand provider. providing being provider from for recognition recognition. only a that that the the is are secure And revenues. new that to one, better. is brings to customers Not customer transitioning the saw Brand It’s I it it. This that, is would say, a customers broadband being to willing actually operator want. broadband we something
increased operator there who new are much and is only promoter scores not the net are bit for this revenues to loyalty with customer up security churn about a less and an that, loyalty. And signing for So, shows it the talk services Customers later operator. becoming we’ll higher. susceptible from it is increased
Now, cherry and this. Google cake, Fang, cannot to to so the do the Amazon, Facebook, on add
While and the the become access lot perceived they they who and securing who operator all take heroes. the the are traffic. is customers’ Once their of taking the the Because provider operator service them owns a the this will relegating a pipe, sees is away the they launches one to only service, one away only dump operators communication access. a value cannot
will from ourselves be it provide and of by Allot, protecting up the protect operators we us the the this from operator individuals, and significantly this that value that as are small from are operators to happen. Changing the that we customers company service to service customers this We Allot company something protection that consumers provide operator, our the to that the allowing in is us, each In way score network. not told what of placing is net will them. one believe enable the launch to really who be higher only really, technology a but businesses, promoter this onus enable the for as to every to that will that taking This happen, ecosystem, us happen. technology will is the that we doing on vision revolution this this the for and signing
that business. Allot call network the the solution family We the communication have protect connector user become How broadband Secure will download a protecting we at Allot protection is the and the enables businesses provide intended is the technology to To service from do we without do solution. what broadband at a The a anything. to level provider provider of and solution do Secure for instead the that the just consumers the the network developed itself secure really need done we and meaning small this? end this,
don’t need You an download to app.
anything. You don’t configure need to
the all devices see visiting businesses wherever our car, family families to of on owned all all need our and to in home, as in their the threats parents, family, friends. against itself protect by need not our the operator. members anything. don’t in You And many kids, the the do It’s different is just whomever. against network business to that’s collection a It’s many, are We of devices. we and to protect vision
Now, between right. our how how ourselves protect There protections vary, differences we are protect we and kids.
stream the may with say the video we our want computer. sites prevent be accessing We access access want do to our to able example, camera country, harmful in we a to kids own a content we by ourselves. to not to have kids to to want foreign that wish site worldwide but room For from in
not and the and So of family profiles matter same. understand being every device to the concept we it’s need a
is differently, that made solution different solution who see what, be who XXX-degree We to call and to between built that for Secure. responsible mentioned, the this solution, and the devices, It’s we differentiate have I whole. how it’s I security a call protected three has as security for this – layers. protect a to a enables would business believe digital the of, provide over-encompassing family like for it, Allot is them Allot We and this really happen.
slide at the all, have various points. bottom of of see we the First enforcement the you
router We protect to the points home have business connection. enforcement the or security in broadband router the
itself, We mobile And we are the devices. in in devices network the even network for and protecting the core link. are DNS IoT protecting access
to the anything. This of onboarding. are network. into provide resides it’s is built is the All that of download these install network operator, the that need software so no touch There we in or zero
means. what if connected matter the device which or car, home It are these single a management profile. the matter in doesn’t experience. a unified on your are. matter security It’s it’s enforcement system are of security access the doesn’t points you All It at that to It provides same you protection. seamless doesn’t same
fully the websites, Cloud it’s every to the system sure updated time, information time. the offering I all Now, to is company comprehensive cloud the something to unique that believe constantly is best any protection that our is online consumers that for and that it’s fingerprinting connects categorizing minutes on continuously view other solution solution, businesses. updated today am small familiar with device this security we not make sure make a of and such few updated unified to all XXX% to that blanket Allot such intelligence, that Allot. – This threat management a have I the provides
looking this earlier that resilience do today. later extremely all operator’s real-time at the the about on requires talked all with will I adding without technology and Now, high foundations expand network, Yael traffic, inside to delay and
it? is it for it how is important. that the big How We bring are the take to and big ecosystem can revenues according and big it per networks of with We big the connectivity understand worldwide? a how fixed numbers. revenues that Well, value, We what mobile whole OECD it’s $X,XXX this how look year. for but is understand Now, tremendous opportunity? at Let’s worldwide, studies, are start broadband billion connectivity is the Allot?
coming Z customers we they Now, X% of potential incremental security, that that or charge the from charge an revenues them an their X% operator charges believe connectivity can today.
We in believe the numbers about will minutes. right talk we of why these couple a are that
numbers means a is $XX that somewhere $XXX market looking annually. the addressable if of between somewhere total means correct, billion to that these billion that at at So, are that operator
which Allot We to will customers we you and those realistic Now XX% market looking of believe for of Well, that technology think potential that we billion to revenue of and it. the a companies, realistically, billion That’s billion sign are grows of operators at share billion a to this are providing can realistic be revenues truthful, numbers, for? for $XX operators show willing dollar this to the $XX the up revenues, Allot, up to from compete such that large means we means really encompass customers market this, How worldwide. between by operators $X we addressable as XX% that Allot to solution to to are with will annual service around much multibillion is believe for that all not XX% number. sign why this which anywhere will these XX% once annually. technology $XX very
examples these These service launched of kinds at look businesses. and of we who consumers how much small are and are operators charging actually cybersecurity they Let’s how reached numbers.
for price around charging the for it house in €X.X addition month average we are it plan. per example, average per to now the in and that the month in Telefónica, charging Austria average regular it plan charging an in markets brings month, the X% €X means price are hand side of is €X.XX consumers, per average also roughly Vodafone XX for access their they of left are is SMBs. charges across making or right plan average charging service that this at that different is price €X.XX which looking price to launched about launched Hutchison at in charges. SMBs, this that roughly Vodafone side, security. per the making Europe X% on €XX of we is talking see Looking looking of we launched the around Portugal, at plan. Spain which month about their X% And to around XX% When this This
protection is charge the price expect for it to to plant X% that to customers roughly see to we X% to premium realistic from customers pay their operators get overall, actually operator. over a So and cybersecurity
a to customers that of are them how Our and as These to time percentage horizontal to getting the left of from take-up up up in signing can graph European axis axis the several are that different of that. services And really these with rates and launched. graphs shows the the top pay that over with customers in line you to the this start the a pay market, launch will represents here services I willing each show – consumers countries country willing are service. many of see the presenting graph service. actually signing the different time
even is for based operators today rate have we that are the is stores. one, interesting what is actually an specifically this an primarily showing consumers in service. their This successful happens, launched of that So, bottom XX% up a and service the of of on take-up it to is If the XX%, we is countries reasonable Less countries this selling lot the the of number around to that go-to-market, graph, depends and on XX%. see service. what an even really Europe we service. stores. see overall operator will end we X average seeing I few customers but launched but the tremendously XX% in successful left successful for to a a in a This get sign it’s XX% the can can getting a within most numbers years up and that over vary, value-added go from This years, period think
of they are to into also addition by security that they it to that first here they want Europe. stores sign store, want offered extra. into walk phone, are anything, opt want are walking These operator share a the take-up it’s at buy pay in a operators numbers. work they with they offered plan, up on for new phone will around extremely, the rates a I service are XX%. people you people the or to service, rates to XX% between join something, want buy a see they and do, up that the the XX% the and a customers are With for customers customers when And this is time, and to store come do service they This is in are whatever also high in that a can person want signing almost they something, customers invariably they Once that new to sign sign that in you So, for up anytime time. are with, and it that do up leave at and take-up walk service plan up extremely in whether to new want. can the XX%. or signing the same security buy for existing also and out they change we with and with all the
So that the once the SMBs customers XX XX% We service. up, that extremely the talked have customers graph. several years period So service. It’s for up, until And a now actually of customers sticky that, signed that service. not see in be of do shows very, up launch months the when have about top very customer year the about give service. They a acceptance is it rate. all businesses? serving phenomenally in up, do from operator what keep consumers. And and SMB an XX%, People high they from right an This within X.X months of to the it service? can it, have that after one service, secured. an keep up. still signed Look you from shows they is graph the Europe you sign signed with XX% the months percentage stay bottom successful can signed actual This right penetration shows of when customers service, at What see service? a up XX the months, want for for
They do once rates seeing are operator the How we the we high. service, do believe operators? it. what are with this. launched this The take-up So we buy that here really in this want customers is Well, service. really deals
can a see and from is good service to in of there As reason the in numbers, this you these future it. believe
for to deal come for the And the we I both with we best the them. So, operators one sides. think can honestly, easiest that
We are operators that hardware, support. the software, service, everything they willing to provide professional need, marketing
of We start for that share. market the expect that’s dedicated achieve customers upfront, they for for online we a those with no and come all team commitment, paying charge have upfront, them ask revenues. We no how all the operator’s revenue share and financial in anything a We new is penetration marketing of numbers. a Once works service, when we highest not the to get best the team provide service marketing to way this to show that. do ask
willing are they of to it’s even expecting interesting of we is partner. their tremendous from operators. later us. on is you very us this about with saying, an such in are are net us. them very, what When open did that is talk what And up to This you doing customers requested and see number. for from no few saying. Telenor is who some from promoter because customers And testimonies true Hutchison quotes customer a driving launched up the take-up from as and of telling this service, partnership look, Now, them model have I a That to a a sign think Operators to-date, higher to revenue are simple security a we and what to for model to we new XX% they us it, give are customers it. of today, here score. really customers customers. the will with share onboarding fashion, revenues up this share with XX% see commitments minimum they hear to recurring want but driving
the with in brand. Vodafone couple boost went is how of sharing Telefónica everyone potential And helps a it ago, from huge revenue world it telling they is. public So, making are what result earnings their much new this. years
this launch with who operators happy So, results. service very, the very are
Now I excited opportunity. am transformational about very this
it’s can And opportunity even this. think that. than tell is more a for I huge I think You us. that But there
become today, go to We to online are be to starting starting networks to reality XG grow. starting a and and seeing
lot are until a The is it. to if connections much IoT bandwidth. the much, a are networks to like, more XG expected in – than it’s devices really coming easier the reasons: Internet not many means devices massively, have Internet. core connections. LTE many to they this it’s vulnerable you were are to XG many, like network this are but on not a a vision devices. be centralized is And network. attacks of the connected IoT and distributed And to with harder Billions is they and with XG core, to centralized protect bandwidth much XG everything three one the billions for was network than much of other attack centralized networks is that There is a provide main high that or to Now, to now. are massive attacks many This higher to
network to a provider developed on malicious have is we itself. Allot, the protect XG attacks that product, service itself NetProtect intended from at we we network So, call the
we they U.S. have a U.S. the new protecting the is that the customer you cloud-native what whole am this and is be of know, first XG network as attacks in their network is platform. Our Allot sure for selected completely building product across to from and now signed up across part threats I DISH DISH,
today, actually protecting Chief Now, only the is be expect but technology that. it’s what network things DISH. we that placed DISH growth for is all itself of to for Allot. in just beyond will DISH and hearing we extremely of from an is Allot we strategic Network XG later them, not engine an network of additional an not example is cybersecurity together, come. This location. this Because build just but Not protecting Officer protection the that, on Why? can
block of to all their customers. and to the are malware, into clean future, we value all have traffic, more read and we all traffic We it. inside work attacks. and operators We operator’s network. And how provide see the see with that. will the to from can it We do to more the that the and that’s can we can both going a the things sits technology to do as we know than Internet customers. We to but to decide decide working We
do will phase. providing security, We this development by which now is in data-driven
this the and enhancing ability by we consumer ideas will other this we with we will forward. that do have do going privacy. have will And that to protect We
Yael that situated a lot will more are today. on the expand later to enables We this. this exactly do in on us place
that we to we you Allot, to As future. vectors see look have really can growth today four the
service. sign to work we And them that number First we will that increase with as of that to want we value as those up more to increase we service. launch will we will we network then customer small this up the and up more launches, one consumers signing continuously every are many work and the operators customer operators launch to and to can from that actually provide is Each customers. the sign with security the and businesses that will customers both
protecting Some only start customers with mobile phones.
customers protecting broadband. Some home the only with start
on not more, DISH, but is have add operator platform expand all And with DNS the time. you but that start protecting mobile only, hopefully, value provide it growing itself, we As least, Allot and business which and to with with starting the the expand protecting to with see more home broadband, networks, can more a the and last Secure we the many XG then itself, come. today, network built, then operators security network specifically
operators of us As but revenues grow, will mainly like. DPI timeline turns security software for deals XXXX. were for significant selling way. ‘XX and how deals revenues and by We applications being And on to revenue from this a small Ziv revenues future what I Internet into expect it both until happening, of growing makes security-as-a-service for that today signing signing this And Allot look service the that ones to mind. work businesses and be a discuss we was By fast very apps protect and because the much. cybersecurity in are businesses not for this promise. really that revolutionizing very, company absolute and the aware don’t drives are be the necessity consumers are mass generation very a market. do operators enabling to share Allot secure them. these focused huge look an was small they we And to the they consumers enterprise, opportunity we communication and solutions, numbers. a year, Allot were are the CapEx To to to The XXXX deliver the that happen. that is we to That summarize, overall a to are growing. huge revolution security with see to while Allot protect that how positioned and deals. because offering, DPI revenue there Allot to believe securing and is believe and it on on most was a and of solutions the happening. threats the positioned protected for meaningful cybersecurity opportunity. to and is service to you are providers They XXXX Consumers that also is downloading companies this. the We on consumers Last beyond, is transformation. we service technology. they focus this mass we businesses. opportunity are really the and expect Customers businesses operators, undergoing my believe network-based come seize in the are They protected we and I for small Thank are security-as-a-service to are they revolution to that under market well and Allot. revenues are them unprotected. It security operators, for pay understand we deals. operator to company, Allot up started to were best we starting it threat. up of that this doing is understand are year, in XXXX, the willing technology initial type The to existing the to communication
Thank you, Erez.
the Erez and Presentation] following two Network conversation a announcement President [Vide of between Vice join at Officer recent companies. deal had the let’s recently Marc DISH, Executive with our Rouanne, Chief Now,
to Presentation] [Vide customer you pleased now a testimonials. with are few our share We of
our I the Vice Senior want company’s to Unit. Cybersecurity. for also now introduce President Cybersecurity Yael heads Yael Business Yael? Villa, Dr.
Barry. lead ago Allot’s cybersecurity name technological Hi, a everyone. Thank Allot offering. consumer deep X is backdrop BU. to with My dive I to Today, of the you, Cybersecurity Yael like the would Villa. I you into share months joined
an security our in the unique which overview consumer concept, We will with start of is market.
solutions to we logs Next, we protected. security Consumers Otherwise, we describe tomorrow’s should and challenges. just how and and Therefore, anything be basically, easy security have institutes not CSO the not are CSO. always is use. the don’t our The will world assets briefly security a of ahead bad the dynamic be to it sophisticated nobody they seamless coming expecting actually financial and be and guys. be enterprises very world, consumer it’s existing solutions, cyber solution need prepared about this for Allot mainly vulnerabilities to and the very In to applications, know The is are want organization. difference from is the to institutes existing manage simply and hard extremely between solutions manage. alert long main consumer own and work. will within and that different to financial enterprises is happening for Different systems the
why can time? and Well, companies, can we same in they a that it’s easy willing solution, why. are have if the you will ask, can’t big do discuss if not no of cyber to, Allot Some the comprehensive
the protected we by They less Consumers we network, today home, at protection protection. always the to The the Finally, And these is What everywhere. of same in touch. ahead. everything. they looking user something, station, XXX-degree ransomware, it their road What devices. bar, a they doesn’t anything, self solution to constantly about talk thinking do have of to any easy, to at a do zero looking our will at protection? Trojan, competitors themselves. be complete protection start They do are and be Allot anywhere, and in need are threat at their bus to using looking security at value customers? our any are to is the phishing, their offices, little the by management. end-to-end ahead need to is XXX-degree are They bringing want they device based need to to want laptop, be all security their concept. coffee have we basically able do be on phone, protected be This If XXX client iPad. the to to all
CSP the should that the Our provide consumers research security. XX% shows that believe them of
expect of provider So, the to have they solution. the single security CSP as
to be only user, XXX ASM, Management. Secure solution The Allot about? be concept CSPs seamless the provider. able is but single is provide experience, security to The built a what also unified the is Allot to around the So security end Allot not Secure Secure for all the Management designed for
enforcement again constantly are are print different intelligence, design input done a home was the network-based and different our we We secure to again all onboarding, control, that our security penetration, network secure, our secure from points, offices, and inline frictionless IoT the basically. point. and secure. Therefore, concept, Network need home getting business look points. Allot all capabilities cloud. for threat Allot engagement protection each everything, threat the same The the up office home finger devices devices, web includes the cloud. is enforcement tools including Home secure, visibility. unification in secure, CPE-based smart secure to and develop the endpoint categorization IoT updated ASM under parental and for protection, developed points in and up-to-date XX% is security, device and have router customer full enforcement activation enforcement mass for All secure, home The stored a and SMBs DNS mobile and and and all feel with data consumers once protecting same network of the capabilities no
and if it develop for we a anti-bullying work it will we For new points. want example, to add all algorithm, the enforcement once
security to the without user wants easily need the architecture, It’s feel, customer point be the operator. develop can We entire introduce additional One The within gain This protection same adopted bar. worries, its have experience. same blocking handling, home, same in or The the is is network, reporting, privacy like threat same products. different use anything. management, page, the summarizing all own for spyware. Robust at at them the of if all unified service end core reporting like he you to the system McAfee, notification, management the protection will most He like coffee policy, or more one integrated regardless decided protection blocks, enforcement X,XXX and in a be our the the and and seamless Due account event for can the point if reporting, the he is had, blocked user these which his than regardless if phishing to XXX he malware new Allot reporting to system activities analytical to – example, solutions malicious solution. the enforcement this user a our can active. flexible get is of business. XXX unified security
and/or scan security Our to antivirus URL-based up filtering downloaded, anti-phishing, antivirus X engines Kaspersky, bot, HTTPS Sophos. comprehensive comprises and for anti BitDefender and files to traffic, HTTP anti-malware,
high research to learning meaning optimize detection anomaly false analyze algorithms, new a existing low threats. We threats detection, positive. intelligence and analytics dedicated threat and performance, clustering. including developed machine classifiers, our learning, of have rate deep variance team detection We with To
than allowing categories to categories. of HTTP encrypted. The developed to macro spread deals a hundreds when traffic all patterns tomorrow’s in aimed different earlier. And URL deployments markets, Allot’s challenges, we detect between to the different since phishing control and serve detection of have sharing us platform addition, to of In our CSP customers, XXX typically example, applicable type HTTPS malicious exposes solution, activities and type subscribers to traffic. information we more develop different worldwide. new the parental is algorithms over strength machine are In share learning for global we CSPs
sources completely Any good customer ability that we access of solution Internet of protection In of elements a good data data the and block inspect aggregate all can the our to a can shutdown during coming domains threat algorithms on have anywhere diversity time. The information. for allowed sources. and database, a user We amount multiple list create based and else. or specific device end of a from intelligence is classify data cloud-based
analysis carefully We customers, feeds, from top examination, classification new under selected received regular by website classification URLs unclassified external our tool find exercised concept have existing and list, classified. to deployments, regular requests automated get URLs categorization from CSPs, from them
detection and dedicated malicious team detection research imperative of from detection different than with vendors. competing investigate categories rates and dynamic threats real-time for to content threat aggregator for and XXX more analysis engine in is new control. our Third, analysis of from unique and Consolidation and URL Allot parental intelligence intelligence reach threat Allot low external many sources, as high to from to is false to internal of positive. even This
subscribers the the unification rest easy map Allot ASM not A endpoint access to Management. provides easy user a integration The products be as use for ASM The a succeed enforcement use, as protection, provisioning, the applications, to simplicity this for control of cybersecurity to same solution it management, different single well easy to IT, Allot seamless and should and operator. under APIs, unified to Secure of is same For use to unified points. consumer single portals all subscribers. profile, all to secured key point, APIs same for of end
very All done of this very, easily.
unified of customer Allot for is integration products. and solutions or In monitoring the Grafana, provider monitoring our holistic additional marketing Flexible subscribers’ integrate product can given kit addition, On KPIs and and and the source additional tools, the stream many our him the behavior attacks, of doesn’t our activity, and its full or user. security CSP. solution. additional like onboarding tool and anything more, And Allot the products, patterns empowers solution of as single providing about consumers. should concern for top solution, powerful value end targeted to is allow without system which into tool, management use advanced which is Prometheus, global reports CSP. to Internet, with interactive an security. and the significant collection is by good security maintain the maintaining visualization there devices, alerting that offering to be ASM platform to revenue security digital provides of a visibility of threats a management as framework the CSP behaviors, usage functionality of goal easy understand needed really this to the give The either is The average consumer Therefore, user protection
So application all, any need there for first download. of is no
of do Ui/UX very day case, as it service, hours and wants solution, notification, from intuitive the the experience like a status all threats the you X. security to seamless. and enforcement what including detected its the security of the from users distribution, is, across your Unified word three in overall which configuration, periodic security prove consumer reports, If the you infected. management and If there all the onboarding easy very use to it’s the you architecture appreciate The consumer receives can is XX to were in report of personalized to want family rating, reporting this is value threats zero The system unification? in user high in value multi-tenant due block here is the service. we free and did points, you use for can built last reports plans. the minimal What the the level this files of
consumer management. unification user-centric is Another aspect experience a of the
personal self the categories, mechanism the assign show protection, on users, you block be devices, tools malware user. list, and unified additional the choose to products user’s about of devices activate technology reporting which glow. activate can proactively activate managing the Forget sent an value. focus activate report to the And to complexity allow to policy This can as and categories
the can to approach, how long today quite can security quite the for a ours, have the which management time. and configuration answer be categories ask quiet the we solution have divided a we build will because X for be long choose background reasons Why, telco And will rich in robust easily because market. unique your layered You a in experience. simple a very want will competitor A it like click. one one take kids. in Usually, we you is time
existing on stay terabytes tenancy, our to able securities experience its million the own configuration adoption to users, drive in process which than – and market Go-to-market the What per for right subscribers constantly categorization to offering. understanding time end-to-end support, data succeed partnered configuration Scalability, of background CSP more assets a and second, we threat We in in compile. CSP Experience that complex sorry. takes in consumer long, rich does deployments major trends, does our stay the one visibility, intelligence, adding to second existing give deployments to what per to personalized ahead asset long proven XX CSPs reports. line active to product need worldwide the our And market. to order what’s solutions Allot next. XX should network for telco consumer gives more So us? we terabytes and In integrate existing in our privileged Allot’s each component tools market, with in market, and leaders of Internet and evolution than a number value with continue to cybersecurity our us, the unified reports has the create personalized unlimited rates experience where security can Allot multi think X give are Germany. we
don’t Our have of a the broaden protection department these IT all. an our offering market. conserved measure is at businesses privacy days, A SMB lot in solution, which
of to traffic. and use we not to of Therefore, the we The offer XG world, increase And an some traffic sophisticated top-notch security any many Allot, automation, It product encrypted can personalization like insider will new mission-critical right new more. IT be cases we global manage security, skills not patterns, device unified of place, applications services we intelligence, them to services network, from the may to summary, can at learning, them happy fire XXX-degree In analysis, companies network department, and CSP. the algorithms have security we hand, threat, And And new our allowing share gaps. but new offer connected multi-tenancy other secure get with solution controls. be to the easy those the sharing the IoT devices see be like vehicles, together and technology. due other sit strong, From additional trends, current and the offerings. any mature bridge first in much with our any machine market is will the security protection. identify architecture. close Allot with management, to zero-touch for threat of data-driven securing
in the opportunities, significant CSP’s security, wide experience our strategic and and a market, understanding SMB, we expansion XXX, telecom Our privacy tenancy, a you of great XG give extensive use offering. and our Thank experience new go-to-market, And data-driven more. about scalability bit a security in are include advantage. us network, hope including you protection, for multi cases, time, cybersecurity have cybersecurity more very finally, and knowledgeable services your much much little
you, Thank Yael.
Ziv revenue a now has time, opportunity. sharing testimonials. Presentation] Allot’s created over which with few CSPs I win-win We the discuss to hand like both and Allot are for At this model, you situation pleased customer Officer, a would to Chief to our share to and it Leitman. of Ziv? a significant business [Video Financial
out business revenues our a total a came to you of is which CapEx from deals, few and CSP you service security maintenance revenues, X Hi, itself. In share will protecting $XX which Barry. network of is Thank sources; integral distributed the security revenues of an better DDoS of total Thank were offerings, with were I $XX our CapEx denial these current base. installed product SECaaS event. security the explain which slides, and already from have balance previous million of part our years, we of deals million our The or million would CapEx for out were attending XXXX, short, you, XX% everybody. for of deals and $X security security from like model. for revenues. Security
is the revenue than of are we market, take come very Our all almost In security that I be deals. and this and type from will example up walk of the it going an is XXXX ramp security derived slides, so build coming understand that we through the from after our time you which to Allot’s addressable more how process will XX% and before, will we the the SECaaS total Op revenues. will goal large presented total revenues can
will the percentages mechanism name that single-digit experience, depends on more penetration go-to-market on which, make represent the course, years of total few revenues. past external we XXX% the from metric potential internal everybody rate by our form can For will the sure understands to penetration never use executed use CSP. and than which a as after or The vary for SECaaS, we I Based In example. by of anything a simple likely stand purposes, mainly revenues rate, security XX%. the strategy happen. assumption, customer that and annual to maximum of MAR the this a under MAR, from the order MAR service find And
X% security the for assume ARPU Let’s we an is of of service X that which This are to subscribers. which $XX. mobile per operator, the about engaging with additional has month, million CSP $X offer intends
one-third that a of the third fee, per Allot share to revenues, agreement, yearly which sub. revenue the $X receive is the of amounting let’s part will assume As of CSP $XX
and multiply take commercial year by can to cycle So, will MAR period of signing X $XX penetration a that Allot up contract, want launch, the of rate. after X million yearly can if long implementation get yearly ramp-up take should fee we is million. million, means the rather to X years to the the see the deals after I recurring of in even the these sales stress up the XX%, CSP get will $X we to penetration we revenues subscribers, the of of if the $X an which rate we eventually, be of
of The a also additional in look years, provided take XXXX for of we Perhaps, the the guidance expected that all few XX% then of assume we if the from MAR of second So, at penetration a MAR of $X the million. this which and until we million, due state last rate revenues steady the penetration lockdowns implementations. $XXX the you from actual timetable get start would and revenues XXXX of the were end $XXX associated rate in $X XXXX MAR $XXX year. MAR of in example, million, generating projects, The to surprising it first of The rate which world approximately and in we we of remind in I XXXX little signed $XXX of the will yearly X% it about push XXXX XX%. the state explained. the expect than as can I the around also accumulated to at SECaaS you beginning long at of out million. steady the some by generally XX% the million. wave at XXX COVID year, continue will a average an just in of was revenues a penetration the can process, about figure, the of accelerated deals look out this If we More SECaaS in XX% year represent graph, in revenues different of growth third end XX% see is might XX%, simplistic The implementation to just a million. angle. like cumulative
guidance SECaaS annual When which of project $X However, year. the we of come still should get half million mechanism, revenues XXXX years. cycle penetration X of XX% year, we believe identical after MAR can the the applying of simulation. and least which in We each that of rate described to second as following the at reaching most $XXX million, previously, despite delays, achieve of keep these adding
already So maintenance. recurring company revenues million. for instance, yearly in revenues coming $XXX and threshold Most for the should of our from we are come close of current XXXX, magic security number support recurring entire the of to
of years, of revenues due SECaaS more we expected accelerated be will anticipate the recurring in million So of in XXXX, that the growth revenues. revenues, the we to are XX% than more $XX recurring expecting in than few company total a revenues entire
from Of recurring company’s now. a dramatically than slide of out to course, regarding the the proportion have in more total of will the just revenues revenues few entire years increase two-third SECaaS one revenues. I
them than lower operating million gross We to $X hope reiterate fill million, to of we near line open expectations. traditionally, both $XX which due is XXXX in to for $X quarters, the The to is plan positions, QX million. $XXX revenues, As OpEx were gross margin steady in would in and revenues that remember million, was QX million $XX that non-GAAP recruited and loss can see strongest. chart QX we million haven’t QX R&D future. Please like year, is last the XX% and growth. of guidance the the perfect the for our XX%, our the XXXX of margin yet, in which few between revenues weakest to with of was $XXX our while quarter the we
Let grow in revenues though that will able DPI DPI even me remind X the growth our you were XX%, the we revenues in be CAGR with the of of that future, our last just expect to years single we in a digits.
business. is SECaaS explained, As to the growth company of accelerated the the expected from come
of SECaaS choosing that sum to right cycle, dollars, business of So is we as strategy. comfortable long order there now presented, addressable for can our a in sales the huge and go-to-market the billions and Allot we in overcome feel up, market of the deployment the magnitude challenges
revenue and a show with excited accelerated SECaaS strong model. year We growth in next opportunity about large starting to turn the company a are Allot really the very recurring cybersecurity into
a note placed companies. like graph companies, other enterprise though companies. slide, value XX regression revenues. you As revenues, their y-axis independent ratio to which the is this some with to that to of projected represents took the represents portion the on cybersecurity of which revenue Allot of their graph, of considered revenue would for growth Please even We the we security selected the security data not from my the total are of x-axis the I simulation the variable. dependent XXXX a recurring revenues last versus valuation current share In XXXX The projected variable. is XXXX,
but companies, from by issued In addition, XXXX not sources. for the were revenue projection by estimates this third-party
Allot enterprise total value. and the revenue current placed we comparison, a projected As
the As theoretical much we use graph. see calculating lower Allot, on projected valuation the When line, mean the Allot. side of just you of higher can dependent the of a left growth regression which in revenues we variable, the get SECaaS
regression see R square of is right on high. the the of can slide. you the relatively XX%, As the way, side, upper which By is this
one regarding just as simulation considered Thank be you. a However, Allot valuation. this or is metric and shouldn’t formal a comprehensive comparison recommendation
you, Ziv. Thank
final now have questions session. a the already move in. we program, Q&A few the our to Instructions] on part of sent that We were So [Operator
[Operator Thank you, Okay. everyone. Barry. Instructions] you, Thank
read answer. caused rise We questions have this out I’ll a the we deferred Ziv? in big already. try will quarter. to What and then few the loud, questions revenue
quarter. The The deferred from the we million. to quarter, due million revenue previous increase $XX is payments it this In compared got that to was $XX customers.
recognized past Traditionally, between the $XX to million. were in $XX were million deals yet. which not deferred For revenues years, few the
the So high, that a and the current rather little previous the lower years. be in it level was expect is will it we bit in future, as
your calls? Okay. stage at provide is antivirus anti-robocall. at Yael product like screen anti No, his does least. it robo does not but provide product, it The provide, we Does malware, anti-phishing doing mobile security not We do not. explained, this
last say, I crisis Okay. Can Yes, a months, you as you in in COVID, know, last to of been Europe. rise elaborate I would Allot months? the has on the changed – There is throughout can. there been COVID been business has few in and COVID there the has few impact the it actually
really good rest situation COVID Israel States Asia Pacific and during were and there. many last getting in is world the of few gladly the months. Latin United there is the But a lockdowns America. in the from
also security some of impact, still earlier. recurring were Ziv we we $X may extent, probably will have by that some some XXXX, believe that, planned but And a to a of for delaying of like our So make it’s more. the launches explained bit we result million revenue as
hack? Colonial to Okay. opportunity to Was another want there partner take capture with this? Yael, pipeline provider to do Is an for this you the market? cybersecurity you
future. are having solution type an is this that we with are going every but don’t malicious activity. consider organic we definitely, considering not for something partnering customers. We to the And in now, right we believe So of in are
you. Thank Okay.
model, bought There who answer pay is move SaaS did the by license you developing software actually would model? to have eventually perpetual where some SaaS for us money. more candidates little Before another no. model I really carriers, the have to incentive large some customers perpetual be large, and license deals very the think may they with but are exceptions, they
have the that a very score. not the risk. we get succeeds, model therefore, risk. risk takes already SaaS It look, to who and licenses service a very, And therefore, I part think paid the And lot take have operator the is of we, Those of a if a taken that any as fundamental more risk over have the very low perpetual bought take significant time. upfront. does
in planning customers line? those general, there I expect will be year. to many I happen. between is too start expect year. to them this not may to And cases, not launch do not DISH but do that specific expect hit your When deal do DISH this switch revenue the not I is have the So to their that XG network Look,
it’s that too be there yet expect of So seen. I XXXX. be to to don’t much But during
with so, more will your the if that. there this the And how timing, X signing has been G that. XG launch growing see and deal the on will it’s and continuing can That before we ongoing you DISH will in after enlighten us? see we the actually say with in depend started business? business. there our has Well, interest I’m We Since DISH, exact goes, to glad deal that is been interest there signed and
we I active account. currently that we hope and think once are close in I there to able some are several hopefully an such accounts share engagement, news be to
think said launched about are I XG general, But you in I you. talked potential world. size I size continue – the do need to on XG for – what with during or the is is is the around larger was that networks. even network. getting what than networks need think is share the the protect will We okay That XG secure there positive. think before. Look, presentation, XG market? we a like is net What the it’s the outlook And
our think size is So but potentially I in millions network several because a years. being will small very dollars, is business are are we market, where current to them Allot, not ability is we up at necessarily look size plan. for I think If that that this of of protect protect at for today to look I will the the still, hundreds believe interest networks as there protection XG networks, growing the it as in need we be for of will for a end and XG of a grow data not large. it XG and XG but this
be dollars a few for total is of addressable hundreds business. of there think I millions that should in market a that
SMB trying direct attacks okay? the just them to like the we It’s for other security Why many also not and about it’s talked enterprise. market, times Allot You on of at to and totally an try company. is in protect I consumer. generic different doesn’t from enterprise that the enterprise, the information things department are any enterprise get provide security out think an or IT where market on – company They attacks enterprises? focused or itself times, trying for the one bank to Well, try persona explain a is
across the Point, security that, to CrowdStrike, SMBs focus different growing security a trying so think from excel. and of is many consumers Alto, of how enterprise protects very the on sort very, but it And under attacks. are attacker catch can. whomever and sort kinds is from It’s way in is the under more attack, it’s much are individual consumers, SMBs. that dealing blanket board with of Now protecting us. to technology it targeted companies attacks a massify And phishing to companies mass market where Paulo we take also were those know protect that Comparable where there market. enterprises the and of that developing are many of attack. and to technology are they that as significant Check not We capabilities net required the to exactly
less to at. focus vast the companies So good trying other on market, at them and we in are what security we of majority are are the good the what
attacks they for are targeted So at enterprise. good
good Yael? area. solution focusing your attacks latency are SMBs, and at we subscribers much are to We that on does massive traffic? add How and security consumer on
almost yes, issues to perceive – feel our from think I do. – non-secured I latency any doesn’t basically
would Packeteer in Broadcom, with did management we where a for We for Broadcom, a ago signed product. we I compete for a a the line DPI ago – XG DPI platform for XG our end-of-life I These network finding them a Packeteer basically Arbor, competing them we’re And with And with on well. expect. – the you protection with that itself, is XG the you where do deal competing, them, refer expect we with providing companies line, network them customers, net networks. product protect? like which and so can to be etcetera. are would companies enterprises. to itself Broadcom to the DDoS are what Radware, the with more DPI going you think, I were protecting our traffic the Broadcom In Who with find expectations where example, I were and buy Broadcom or they the in product – as That products? agreed had business. in future, traffic competitors X year relationship, Broadcom you ones. that the these onsite Packeteer, up to on. year this continuing progress competitors end relationship? the discuss that any having they Can that Allot those area. are I’ll with steer say to distributors Allot, making What very deal signed And in but bring the we that it’s Allot interested approximately There recommend your are are future a are everyone the like for the them Allot. it’s sorry, remind and main management and may am product.
up more more We distributing Broadcom are product. and value-added formally signing distributors. resellers and That were
we very bookings that the a we portion are are enterprise growing of our growing And I We Broadcom revenues and that deal significantly the this business. year, business and did. that large – share, gaining due be to enterprise the our we should market in to extent believe
of low future connection year per I even operator traction you analysis bit conservative. single Is of assumptions. It $XXX the elaborate build million Thank revenue for of could a in providing for to but a your represent market question. of win even large North – the $XXX assumption that very end with million be know. MAR like DISH? million recent America or the I a million possible and honestly years. In helpful Okay, seems $XXX long you using would I don’t it’s conservative, this, MAR on outside Look, could with the think $XXX
Is going a exactly for to any target – large realistic a customer, to – what we but the MAR it, them. with depends this that exceed for that If the the hope present individual it we large deal that I I think degree what a and single to – on leverage I also larger able that is their in don’t be also to striking year. larger including will very be. we’re will know But MAR a remember possible be larger pay taking of operator of could sign from numbers penetration on of high some very, they several terms dollars, part is and what the sort the put a cap cap millions could very in at will hundred very the it deal in with the us, possibility there high of us. operator well is the
we that, be So very I able think we’re taking market, a realistic think, create now don’t hope illusions better good. number but sort on with I than to in to this. North $XXX million. to do is We America Traction want of
case the I earnings did from previous a to that was provide what base. service is This in not are This not to customer or we years call, we security even think provide American their to now the talked X North it ago. significant about base. year X.X see customer network-based year I their security several a seeing as a operators service interest as ago
We’re several America. in North operators engaged with
with the signed protecting sign a announced, the with a The with deal network-based network like on also service, first was their expect service we for to as – we one and DISH, a security as DISH on the on customers. the itself deal security we
discussions some it of some engagement commercial and even it trials, of active in in this, in operators. I and in other with are We mean,
in main the and DISH be so turn to to difference to from expert the I we’re offering protection and are I’ll network a Can such am to the the someone also attacks, not on ability entry analysis network trying provide to use Palo offering tax between inside important. the them trying yet basically from as actually the this seen a if and have on various bots optimistic, have close itself whether an to originate have do going of could network is pass that do general else, it protecting an So that mostly terms terms. from that they could to To are is things it Alto were source. the of am phrase Palo firewall. passed why reasons XG They traffic of the it’s network attacks connected unknown extent, various is it to abrupt. hopeful. but but network is we I’m network offering means your and real-time we large passed pass you which up. in is They to managed exit the Alto, because the solution? elaborate that very Palo the the on Alto’s entry of Palo are firewall. the a sort I a because is attack firewall that firewall. network, into the not What Alto, a attack types the identifying as also There the
margin from XX%? solutions declining So Ziv? these would complement – XX% it’s gross are, these other. say, What I really are accounts each that to for
few the the in So gross average was last around XX%. years, margin
mix extraordinary Specifically, one-time in last first favorable unusual. year, of products, the of was there quarter it an was but something
was So we be can in expect quarter. around that the XX% average would as it this
question. North we American U.S. other it’s a similar yes. a seriously The And is, Is in Yes. I at answered very of There previously. saw different I answer what your than recurring absolutely DISH, looking technology? revenue market this. lot think is And today your providers the for interest
think service positive So like as don’t no-brainer immediately, them would it’s any this. too. like Why North taking okay? have They I – We a operators Look, launch to positive America expect what Security operator. I reasons. outlook few I’m service are on seems a for this for I think a time. in on a all I happen their
First of care of disrupting service of. operators, that they slow-moving let’s millions I it, customers to communication they all, are have relatively, are many call large concerned have networks the providers, current face They would have. business entities. They take it, of
And launched. operators. faster. who’s with lot it’s easily implementation, anybody think testing, between not years between to why takes X X going is Even I is XX appreciate making time a work, we take That’s testing, – can it the etcetera, actually months to things take integration, into. There close with until worked it X So a etcetera, could the it. technically, of to sure would there operators service much launch so though much, it’s of that and much deal but
is rates. here just we you they higher and security go over get launched X%, that as That’s to value-added market, something selling, talk you many – are service that to operators like services. able years different are will if see. this apps that that And the the X%, you sell they to the coming different looking that a think much, is about they are get of – are is one is much have X% a I the the says, today this to they penetration that penetration, you’re value-added but provide rates what when market And right things you the service, worldwide, able right? have no, that typically solution, expect value-added a to penetration security with can to that operators think at
would to delayed bit a little a and is being prolonged this more time make decisions more conservative, their a to make And them. concept. tends new decisions So relatively taking than we more such like
more operators small saying more there are slowly, other that this is number enjoying, I slowly. are a success that with It’s other are out but that, said They seeing started having of operators are gradually, think indeed that that today significant growing the operators. a However, service. and our
more service. to and operators convinced starting such more should that, So a be indeed, they launch are yes,
we question we were a are years and to X RFPs answer there that for Europe, in that a way we example, a such – many launch we that to in ago. the consumer seeing RFPs year, earlier launch there this – American in North talked in operators interested and that X.X throughout did as ourselves, company see to I year are with more different seeing SMB So to the not operator as for partner security And a technology than service are a now market. ago,
It’s them No, it’s We customers. the revenue not. I is a believe taking Does would than there. network NetProtect The talked that So time. but like. more depend slowly, XG it getting they NetProtect protects are product But time on does surely, itself. – I taking about XG
really and So revenues that protect our that depend we is deal It’s to on a does did network with the DISH itself. the customers. protecting itself not network
that do launching deal agreements their that many It and we line customers will you revenue deal, talked technology for type other The we with about many and the believe will generally, indemnity your DPI years number businesses. as putting But security the CSP network will working and could working small company. them DISH place not more there held sign sign like hope in and liable? will in more to with a of We’ve be service with that for depend as up that of on with a be during we today consumer years a and recurring for been in revenue partner varies. depend that the recently we’ve partner have Customers, our on. outage the operators a presentations and for is CSP event security. been What
cause We on. contract in are, of course, we do we have major so and liability the disruptions clauses
the clauses etcetera, deal of have penalties, all reliable that something things. for they the It’s of suddenly operator industry. you a they kind the a the amount. I sign not certain that. would for are in That’s We normally – standard the revenues It’s not say but are of
– behind obligations, example, are There you we network router. never means, not general – to connecting laptop penalties We okay. secure say don’t our I meet the product. wouldn’t our we the not as if Wi-Fi pay but at the for do stand that penalties I do i.e., are believe into via and How pay ever, over the we via in-home it’s connectivity bar, sentence, we’re a not a other coffee
of connection, So that solution the which that. case taking secure but for we have care mobile enforcement point an use no of exactly is in connection our connection, is endpoint there CPE Wi-Fi
same umbrella? under it’s the And
feel, umbrella, same and management the the same. look same everything system, same Under
most they to package would have security of while just the comment network-based combined download add a we endpoint that buy that and most a people people, capability, the security, when don’t endpoint. I even
reasons it. the don’t we just to same bother For do They today. talked about
do next technically. inhibitor me to a exist provide downloading sleep it’s helps there, I day. It sleep same What well. Personally, lose solution, over? to well. We actually as So the full here try Okay. suite work you guys but the
focusing to we up, – want I I think We we’re up right? we But get Ziv? sure more – it’s operators look, and market and customers are aggressively and not the use. network. think the is more that. go more losing to using think By sign on, into going these to I the our efforts you We explained if right want what the sign sleep ask, up what operators. phrase
our cycle. Think is we and those the long sales But implementation the And addressable There market. we for flow that presented long huge cycle, is execution as we very is, was have product, a overcome challenge focusing. the we That’s is this solution. we need execution for the And challenges. optimistic have, are our our are to a will the challenges.
your in mentioned protection, and million SECaaS, CapEx You in multi-hundred DPI this in CapEx or XG. user upside UPP, claim growth hope given represent be of view UPP in largely that deals, a your TAM is security a revenues security Could deals fall to XG will non-SECaaS. product. security is dollar would revenues future
with to And for? yes, as DISH growth revenue it recurring upside count that the itself, an is revenue, deal a two non-SECaaS done. Is is also DISH, with for NetProtect to revenues. deals protection. CapEx one recurring we So plane deal. is that and and That’s Not which user network is model this our in protect the Again, we signed the security security signed closed, revenues.
We have – not with DISH but pending another deal have for it, signed that fully for we it for revenue recurring yet forward? do will we’ve expect for – for security together your sorry, both to recurring we When sign that positive? service consumers their How will deal revenue company and SMBs us. cost sustainably EBITDA investment much that a you be as need a going Ziv? be announced
on our few according to EBITDA priority of guidance is growth, millions So Currently, growth. will of negative year, our have dollars. we just we a this focus positive to profitability to the a it’s EBITDA goal But provide But main company. that to a the mean grow to the flow. in and cash because order positive provide profitability mean – know our and is
for year. next we will guidance in didn’t years, definitely, provide have will few – But be positive. next the we So EBITDA
think I’m going the through I questions here.
of already answered. many think we I them questions are repeating
to this I stayed I not who you – everyone okay. appreciate It’s And granted. time, on on for day. taken really thank Okay, it’s trivial. and the until participating stayed we for Thank I want appreciate everyone not now.
hope So much. in really meet call, to hopefully and you I you your next face-to-face. thank Thank in And with but you the definitely really, some before for interest Allot. with very you even hopefully, earnings of that