Allot Ltd. (ALLT)
NASDAQ: ALLT · Real-Time Price · USD
7.81
+0.16 (2.09%)
At close: May 8, 2026, 4:00 PM EDT
7.90
+0.09 (1.15%)
After-hours: May 8, 2026, 7:17 PM EDT
← View all transcripts

Status Update

Oct 26, 2021

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

We're gonna get started now. Thank you for your patience for that. I'm Barry Spielman, Product Marketing Director for Security Products at Allot. I'm very excited to be hosting this webinar today. Just to make sure you're all in the right place. SMBs are under cyberattack, what they are saying, and how telcos can protect them. Cyberattacks continue to increase dramatically across the board, and small businesses are no exception. SMBs are highly aware of the threats that they face, but their limited budgets, lack of skills, and IT staff leave them vulnerable. What are small businesses willing and able to do to protect themselves? Now, to find out, we joined forces with Coleman Parkes Research to survey small businesses across North America and Europe. We asked questions such as, how many cyberattacks have SMBs experienced in the last 12 months?

How much did the attack cost in terms of remediation and lost revenue? What are the most important criteria for selecting cybersecurity solutions, and how much are SMBs willing to pay per month for cybersecurity protection? Now, in today's webinar, we'll be discussing SMB attitudes and trends regarding cybersecurity. I'm very pleased to have with me, again, Ian Parkes, Director of the London-based Coleman Parkes Research, as well as Itay Glick, Vice President for Cybersecurity Products here at Allot, and Eduardo Holgado, Senior Product Manager for Cybersecurity at Allot. Ian, Itay, Eduardo, thank you so much for joining me.

Ian Parkes
Director, Coleman Parkes Research

Morning.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

All right, great. In a moment, we're gonna get started with the webinar. Before we do, as always, we have a few quick housekeeping items. Firstly, the webinar is being recorded and will be available on demand on the Resources section of the Allot website. Now, we'll be having a Q&A at the end of the webinar today, so if you wanna ask questions, you can do so using the Q&A tab, and we will answer as many as we can, depending on the time. I also wanna point out that all of you will be receiving our latest Telco Trend Report, which is based on the SMB survey that we're gonna be discussing in today's webinar. As I usually do, to get us started, I'd like to ask a couple of quick questions to know who's online.

I'm about to launch a first question, and if you folks could just answer, you know, who you are, what kind of CSP are you. Maybe you're not a CSP, maybe you're an enterprise. Who you are. Give it about, you know, 20 seconds, everyone join. This is information that is useful for us as the panelists to understand who's on the call, and I think maybe also for you folks. Just another 10 seconds, and we'll move to the second question, and we will start. Okay, I'm going to end the poll. I see people still responding, so another 5 seconds. That's it. All right, here I'm gonna share the results. We can see that. All right, a very nice spread of folks coming from all different types of CSPs or enterprises. Thank you for that.

That is very useful information. I wanna go now to a second poll. Let's see if I know how to do this correctly. Second poll. Okay, I don't know how to do it correctly, we're not gonna go to the second poll. All right, folks, we're gonna skip on that. Let's get started on this webinar. To kick things off, Ian, I think that, I'm gonna pass the ball over to you.

Ian Parkes
Director, Coleman Parkes Research

Yep. Thanks, Barry. Good morning, everyone. As Barry said, we're gonna look at some research that we've undertaken for Allot, independently of them, looking at the challenges that SMBs face with regards to cybersecurity. Could you put me over to my next slide and just give you a little bit of back-

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Yeah. I'm coming to double-click there, and we're good.

Ian Parkes
Director, Coleman Parkes Research

Oh, yeah, no problem. That's okay. Okay. Just a little bit of background to what we did. I'll apologize now that some of my slides are fairly busy, but I'm not gonna take you through absolutely everything. I'll take you through the important bits, really. In September of this year, I would like to have said, you know, post-COVID, but there doesn't appear to be any such term as post-COVID at the moment.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Not yet.

Ian Parkes
Director, Coleman Parkes Research

We interviewed through an online portal and an online research data collection methodology, 400 SMBs, split across in the bottom right-hand corner. You can see that, the countries that we went to, U.S., Germany, Sweden, and the U.K. I'm gonna keep this very top level across the whole of the sector, and the number of interviews that we did and all of the respondents, as opposed to getting and drilling down too much into country. There are one or two slides you'll see where I've drawn out a couple of country differences. The report that Barry has alluded to, will give you more detail on the country specific ones. If you have a particular penchant for wanting to know about a particular trend in a marketplace.

The SMBs that we spoke to had between 5 and 200 employees, so it's the true heartland of the SMB market. Our respondents were anything in the top right-hand corner from the MD, the owner, manager, founder, another manager, and occasionally an IT director. The interesting point, I think, if you look on the left there, we've got the IT team structure. You can see that for around about a third of the SMBs, they've got an IT department in-house that's got 2 or more specialists. That typically was the sort of larger, mid-size to large SMBs. They have 1 skilled IT person in-house, and he or she is dedicated to IT issues, was another third. Then you've got this rank of SMBs, approximately 40%, that don't have an IT team in place.

They have someone who perhaps fulfills part of the role, or they use an external provider. That's an important element as we go through the findings in terms of how SMBs are tackling the cyber issues. Then also, from a cloud transformation point of view, then, you know, some of them are doing a lot of their production and business online and in the cloud. Many use a mixed, cloud and some local server, and very few are doing it on local servers only. Enough about the background. Let's go and see what we found. Can we move on, please? Okay.

Just to get you all used to the way that I've structured the charts, you'll see across the top the question or questions that we asked, and then right down on the bottom corner, if you can see it, there's a thing called the either a single code or multi-code. That means that they could have answered just one option or multiple options in that question. Then the number of people, most of it will be the 400, and it will be broken down. The first thing we wanted to understand was, you know, really in terms of information, applications, and connectivity, is it important to their business? Is it not important? It won't surprise anyone that connectivity is critical to the daily operations of around about 2 in 5 of our SMBs.

A similar proportion said that connectivity is critical, all or most of their production and business are done online. Now, clearly, it's really important that they are connected, so they are gonna be on Wi-Fi, broadband, whatever. Therefore, that does open them up to the issue of how do they manage that connectivity and protect themselves against cybersecurity and cyberattacks. If we go on to the next one, please. We then said, you know, a typical research question using a five-point Likert scale, if one is not at all important and five is critical, how important is cybersecurity for each of the following areas? The first one is to protect the business. You can see what I've done here is I've grouped together the people that have said critical or somewhat important. Essentially it's important to them.

Well over half, 58% said that it's important to protect the business. Another 57% said it's important that they protect the network. Obviously, in the days of COVID and so on, there's a lot more BYOD and a lot more access into the company network via the employees themselves via their own devices. It's not surprising to see just over half saying that it really is important that they have some form of cybersecurity protection for the employees' mobile devices because they are gonna be accessing them while they're working from home. Let's see what's been happening on another set of statements. To me, these are quite critical and I've put a box around two, but by all means while I'm talking them through, take the time to read the others.

Again, we just said, you know, tell me whether you agree or disagree with each one of these. I'll take the second one in from the left first. Cyberattacks are going to be more common for small businesses. 79%, so almost 4 out of 5 SMBs said that that is going to be the case. Going to the far right-hand side, small businesses are under the radar of the cybercriminals and therefore the threat of attack is low. Here it's. I'm using a double negative, but only 21% agreed with that. 79% disagreed with it, which says, we are on the radar. We are gonna, we are prone, and therefore a target of attack.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

The awareness is high here, right?

Ian Parkes
Director, Coleman Parkes Research

Yeah, exactly. Awareness of cyber is high.

Then if you take again the one, fourth from the left, second from the right, the likelihood of my business falling victim to a cyberattack is high. Now, I didn't just say it's a potential. We said it's high. You can see 65% of SMBs agreed with that. You can summarize this so far as they need the connectivity to do their business. They don't necessarily have anyone in charge of IT per se in a lot of these, but they appreciate and know cyber and cyberattacks are a threat and an ongoing threat to their business. You'll see that's a trend as we go through.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Okay.

Ian Parkes
Director, Coleman Parkes Research

Let's move on to the next one.

We then said, well, the questions jump around a bit 'cause I've not done all of the questions that we've covered just in case anyone's thinking we've gone from question three to question seven. You know, what types of cyber risks and cyber-related risks do they consider to be the biggest threat? Now, they could pick one or all of these. Interestingly, on average, there's two, between two and three of these threats that the SMBs see as being of particular concern to them. You can see employees introducing vulnerabilities on the business network via personal devices. A third of companies are worried about it. It links back to the working from home. It links back to that employee mobile device thing that we saw in one of the earlier slides. Lack of employee IT security awareness, 35%.

Although the senior management team at the SMB seem to be aware of the threats, they're worried that their employees are not, and therefore there's a huge vulnerability there. Clearly, threats via laptops and mobile devices that are connected to corporate assets are an issue and all the way down to one in five saying that continuous remote working during the COVID era is continuing to offer a cyber-related risk or a threat to the companies. Let's see what else we found. We then said, obvious question then, you're worried about being attacked, have you actually suffered an attack? Now we've run this question many, many times, both in the business world and in the consumer world. We've tried to differentiate the awareness of actually what the threat was. I'm gonna take you just through this quite carefully. The bottom right-hand side.

The first thing is have you experienced a cyber incident? Now, if you were to ask me that in my business, I would say, "I'm really not sure. Could have done, might not. I think I've got the protection 'cause I've got a protected device setting, but I'm not sure whether I've had an attack." Down in the bottom right-hand corner, we haven't experienced a cybersecurity incident in the past year, and we're sure that's the case. About between a quarter and a third of SMB felt that that was the case, and they could categorically say, "We have not had an attack." Keep that figure in mind 'cause you'll see when we go on around in whether they've got insurances in place and so on. Moving up to the top right.

We haven't experienced a cyberattack incident in the past that we know of, but we can't be sure. They don't think they've had one, but they may have done, and it may be sitting dormant because most attacks sit dormant for a good few months before they actually get hit. They're in the sort of, "I think I'm okay, but I'm not sure." On the bottom left, 22%, so one in five have had an incident, but they're not sure if it was cyber-related. Again, there's an exposure there. So far, we've got 48%, almost half of our companies, might have had an incident. I've had an incident, but I don't know whether it was cyber-related. Then right in the top left, we have experienced at least one cybersecurity incident in the past year.

A quarter of our SMBs have experienced that they know of an attack, and we've got around about half that might have done, but they're not sure. We then said to them, "Well, how many attacks do you think you have? How many incidents?" On average, they had 2 within the last 12 months. That was amongst those that know it. It couldn't be amongst those that weren't sure. You can see they're aware of the threats. They think that they've been immune to them, but they're not sure. A quarter have actually had a threat. Let's see amongst that quarter what the impact has been. Excuse the number of questions at the top, but we basically just asked them a series of ongoing questions and some of this is quite, to me, staggering.

The first one was what was the nature of the attack. You can see that 64% about, and the base at the bottom is 94 companies, which is that 24%. They said it was malware, so it could have been a virus attack. It could have been any form of malware. You can see further to the right. We've actually separated out some of the issues like virus attack and phishing. The interesting one, I think, is the second one, because that is the one that we all know is on the rise, ransomware attacks. It's been on the rise for enterprise companies. It's now on the rise for SMBs. You can see the types of attack, fairly varied, but focused around malware and ransomware.

We then said, "Well, you know, in terms of that particular attack that you know of, how many hours did it take for you to sort out the incident?" You can see on average it cost an SMB an average of 16 man-hours to sort out that attack. We then said, "Well, you know, how much did it cost in terms of changing the systems, putting in new systems, all the time and effort and so on to actually get yourself back to the point where you feel you're immune to that attack?" You can see that on average it was a staggeringly high, in my opinion, $70,000. That encompasses all new hardware and everything else. To me, the biggest issue was loss of revenue.

The average loss of revenue to the business during that cyberattack and before they got back into business was around about $146,000. Now in the U.S., I've put a figure in there. You know, the U.S. was much, much higher. In research terms, we have these things called outliers, and there were 2 companies there that had major attacks well above that particular average, which has really pushed the average up. If you exclude them, it goes down a little bit to around about $100,000. But no matter, I left it in there because these guys have had a major attack. You can see it's a really, really important figure.

It's not only the cost of the reputational impact or the time, there's a lot of cost involved in being attacked via these cyber issues.

Itay Glick
VP for Cybersecurity Products, Allot

A lot of money.

Ian Parkes
Director, Coleman Parkes Research

Let's move on to. It's staggering. We then said, "Well, what, if anything, is blocking the company from improving its current IT security position?" Because we've seen they're leaving themselves open. 24% already know they've been attacked. What's surprising in inverted commas to me is that the two that mention the word cost. Cost of IT security professionals, cost of technology and service. Now, to me, when you look at the previous figure, if it's costing you $60,000 to rectify an incident or it's costing you revenues of $100,000 plus, and let's say a gross margin of anything from 50% up, it's gonna be a lot less to actually invest properly in the right security measures.

The cost element in here is a little bit of a misnomer for me, but it's clearly an important element for the SMBs. There's also this thing of lack of leadership or ownership of IT security in-house because again, there's not necessarily anyone charged with that responsibility. They're all focused on the trading activity like all small businesses are. Lack of knowledge or understanding of what needs to be done was another one for a quarter of them. To be honest, for some of them that are aware, there's too many products or services to secure, so they're just not sure what to do.

There's a role that I think we'll come onto later for a lot of people to be able to play in terms of helping these SMBs become a bit more focused on that security issue. Then the other thing, I also said, "Well, what's their plans for their security budget in the coming year?" I'm slightly concerned by the 22% that said that they would decrease their budget compared to the current year. They must be, with the greatest of respect, unless they have done a full-scale implementation and a complete review, which is possible, but not for 22% of them, they are gonna be leaving themselves open to additional attack. The good news is they're outnumbered by at 34% by those that are gonna increase their IT security budget.

We are seeing the pendulum swing towards the investment in that activity and the investment in needing to be secure.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Yeah, I think it's also important to mention the fact that we are going through a pandemic, right? Many of these guys were affected in that sense, and their business has suffered, and they have to decrease their expenses across the board.

Ian Parkes
Director, Coleman Parkes Research

Yeah.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Of course, you know, security is one of the items that unfortunately will get less budget. In general, what we can see here is that they are aware of the issue. There is definitely a problem with the cost of the solutions out there, so the solution has to be affordable for the businesses. At the same time, they don't have the skills to choose that right solution that they need, right? Those I would say are the main problems, right? Cost and lack of skills to identify the right solution for them.

Ian Parkes
Director, Coleman Parkes Research

No, you're absolutely right.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Sure.

Ian Parkes
Director, Coleman Parkes Research

I don't wanna be undermining of SMBs because we as Coleman Parkes are one, but, you know, they are focused on running their business, They're creating their revenue, making sure their people are happy. All the things that the big enterprises have, i.e., big, you know, infrastructure teams and IT teams and so on, they are really, you know, they are able to focus on those. Whereas the SMB is literally around doing business, working on the business, and making sure that that business is sustainable. Eduardo, as you say, you know, with the pandemic hitting and a lot more people working from home, therefore, there's exposure with individuals' devices and so on, as we've seen, then the whole thing becomes a much, much harder thing for all of these guys to manage, quite frankly.

They are focused on the day-to-day business issues for themselves. They want that support and they want that help. Let's have a look at what we then asked them.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Yeah. Let's move on now.

Ian Parkes
Director, Coleman Parkes Research

Yeah. Sorry. Yeah. I'm conscious of time. We then asked a series of questions around ransomware because we saw that it was on the increase, and we all know it's on the increase. We can't deny it. We've seen some high-profile ransomware attacks. We then said, "Well, look, what would the impact be of a ransomware attack on your business?" You can see in the top left-hand corner. Apologies, it's a busy chart, but you know, you can see that for 40%, the impact would be at least high, and for 8%, it will be devastating. It will probably put the business out of business. It could potentially put them out of business. Only 10%, so literally one in ten said there would be no impact at all. Okay. The majority said a low impact.

My personal opinion is some of them are underestimating it, but it could be a low impact. We then said, "Well, look, if you were attacked, would you pay the ransom?" You can see that 25% said they definitely would, and another 47%, so we're getting into two-thirds, said that they probably would pay the ransom. Now, they don't know how much it is. If you look to the right, what do they think the ransom might be? On average, it's gonna be around $7,000. Now, my opinion is that they are massively underestimating that. Given the cost of the impact of it, the ransomware attack is gonna be significantly more than that. Funny enough, I pulled out the Swedish figures, which were significantly over the $7,000.

However, the other interesting question, we said, "Well, actually, do you think it should be illegal to pay a ransom?" You can see that the majority of people said, yes, it should be illegal. Although they're saying if they were attacked, they would pay it. Again, there's an element of a disconnect between this and it, and it's just the newness of this phenomenon to the SMB community just highlights that they're not sure exactly how to go. Let's have a look at the next question. We then said, "Well, the obvious thing is to take out insurance. What insurance do you have to protect the company from things like a ransom attack or some form of cyber threat?" The bottom one is the key one. Sorry, second one down is the key one.

We have a specific policy in place for cyber insurance. Only 1/3 of companies have a specific cyber insurance policy in place. 44% think, operative term, that the business insurance policy covers them for cyber insurance. If my company is anything to go by, that's not true, because I've got both, because I know that my standard insurance does not cover cyber. I think, again, there's a lot of companies leaving themselves prone to attack and the inability to claim on insurance. Then you've got the 16% and the 11% said they don't have a policy in place at all, or they're gonna be planning it in the 12 months. Again, you know, with the volume of attacks, with the connectivity issues, 7 out of 10 fail to have the right level of insurance in place.

They're massively over.

Itay Glick
VP for Cybersecurity Products, Allot

I think a lot of what we're seeing here, Ian, is the newness of this whole thing.

Ian Parkes
Director, Coleman Parkes Research

I think there's an expectation, you know. As I said, I fell foul of that as well, but luckily I had the cyber insurance as well. Well, just got one of my colleagues to look at the standard insurance, and it doesn't mention cyber at all. It almost explicitly excludes it. That's why I think they do need to think about cyber insurance because, you know, the specific cyber or make sure that their ordinary business insurance and their continuity insurance would enable them to claim if it was a cyberattack. I just don't think that many of those really cover it.

Itay Glick
VP for Cybersecurity Products, Allot

A free tip to everyone, go ahead and check.

Ian Parkes
Director, Coleman Parkes Research

Yeah, exactly. Back in 2018, the National Cybersecurity Alliance reported that 60% of small and medium-sized businesses that are hacked go out of business within 6 months. We then said, well, you know, for 2021, how do you think this is relevant? Do you think it's relevant today? Do you think it's changed? You can still see 54% think it's still accurate, and it was 63% much higher in the U.K. 42% said, "I don't think the situation is as bad as it was in 2018, but obviously it's still an issue." A small proportion said the situation is much worse. I think again, this sums up this whole element of SMBs are aware of the issues, they're aware of those potential challenges, and they don't see it changing over time.

If anything, it's getting worse. If we can go on. We then said, "Well, think about cybersecurity now. Where do you think you should, or who do you get your security solutions from?" You can see a range of companies, and I think this goes back to the earlier point of there's an element of confusion of where they can go to get the level of cybersecurity that they need. They purchase from suppliers that specialize in security, fine, that's a third of them. They go to a general IT supplier around about a fifth, and a fifth go to their telco. Now, I think here there is a role for the telco and the CSP to play, and probably more upfront and central, to be honest, in terms of being able to communicate with the CSP.

They've got that relationship, they've got the connectivity, they're providing the broadband. They arguably could be a go-to organization to impact the uptake of cybersecurity for these companies. If we move on to the next one quickly. We then said, "Well, who do you think should be responsible for providing SMBs cybersecurity services?" Whoops, back one. I'll move on quickly 'cause my time is running out.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

I don't wanna be the clock guy, but.

Ian Parkes
Director, Coleman Parkes Research

Yeah. No, that's okay.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

This is good stuff.

Ian Parkes
Director, Coleman Parkes Research

Yeah, yeah. No, no, I'm very aware of it. My existing IT team, system integrator supplier. Here again, this is where I said there's a role for the telco service provider to play, 'cause 27%, so over a quarter approaching a third, want the CSP to help them provide those cybersecurity services. We then said, "Well, look, how much would you be willing to pay per month?" Barry mentioned it in the intro, and between $6 and $7 per month is what we're talking about now. You can all do the math, you can multiply that up by the number of SMBs in your local community, and you can start to think about the mega millions of dollars that that adds up to and in your local currency as well.

There is a huge opportunity, in my opinion, for those CSPs to be able to provide that cybersecurity. Go on to the next one. My penultimate slide, but I'm not gonna go through my key takeaways. We then said, "Well, look, we're all in the COVID era. What proportion of your workforce is working exclusively from home now? And what proportion will work from home in three years time?" You can see there's a slight reduction, but I think that's because everyone's gonna be moving towards hybrid working. Then we said, "Well, do you think the connection is secure enough?" Only 12% said definitely. Again, there's a concern around it's probably secure. Again, they're taking the risk. They're not absolutely certain that they are secure, ready to try.

Ready to operate in a secure environment. If we move on to my last one. I'm not gonna read these out, guys. I think everyone-

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Yeah. You also can see them in the report as well.

Ian Parkes
Director, Coleman Parkes Research

You can see them in the report. I'm gonna stop there and hand back to Barry.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

All right. Well, I appreciate that. Thank you very much. As always, what you do for us, we appreciate good insights. At this point, Allot team here, now that you've seen the survey, I'm gonna turn it over to Eduardo. Let's see the Allot perspective on some of these trends and what we're doing about it. Eduardo, I'll turn it over to you.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

First of all, thank you, Ian. That was very, very interesting. Thank you, Barry. Good morning, everyone. The SMB new normal. This is the new reality. This is the way we have affectionately called this section of the presentation. Why? Because the SMBs were forced due to the pandemic to move to a work from home model. Many of them, not to say most of them, were not ready for that. They had to adapt to that. Now as we are slowly coming out of the pandemic times, what we are seeing is that there is a switch to a hybrid working model, whereby users and employees are starting to come to the office every now and again. This has advantages and disadvantages, but from a cybersecurity perspective, it definitely has consequences.

That's why we have titled it the SMB New Normal, it's the new reality. There is an expanded perimeter that they have to protect, and there are infections that are going to come from the work from home model. Let's talk about the work from home risk. Now, as we were saying, work from home is here to stay, right? Mostly in hybrid mode, meaning sometimes I go to the office, sometimes I work from home. When we look at businesses and employees and ask that question, and this is a separate independent report, we see that the majority of them is saying, "Hey, you know, I expect a mix of office and remote work." Why? Because on the one hand, for the business, they are saving on real estate expenses. They don't have to have as much of a bigger office, right?

They don't have to have all of the employees sitting there at the same time. On the other hand, for a small business, it's critical to have visibility. It's critical to be maybe on the high street, maybe, you know, on a banner somewhere. For them, visibility is very important. From the employee point of view, on the one hand, they are not dedicating as much time to commuting and going to the office. You know, let's be honest, working from home all the time, you can go nuts, right? You really want to go to the office, you really want to have that social interaction, that social touch. It just makes sense that we are moving to this hybrid model.

Itay Glick
VP for Cybersecurity Products, Allot

100% agree with that.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Yeah. What does it mean, though, from a cybersecurity perspective? Definitely the network perimeter has not only expanded, but the main issue here is that these devices are constantly exposed to unmanaged networks. Sometimes this can be the home network of the employee. Sometimes it might be this employee going to Starbucks or a coffee shop and connecting from there and being exposed to, you know, unknown people that are sitting there connected to the same network. It's definitely a big risk because those devices are going to come to the office. It's no surprise that 22% of small businesses have suffered a security breach due to this, right? It just makes sense. As we said at the beginning, they have to adapt very quickly to this work from home model.

Probably they focus too much on connectivity and neglected security, and now we have the consequences. The employees, I mean, this is the first takeaway. The employee device has to be protected wherever that device goes, okay? This is a must. Then, of course, when that device comes back to the office, there is an increased risk because, again, that device has been connecting from home, unmanaged network, there might be infected devices at the employee's home. That device might have connected from a coffee shop, for example. Again, you know, unknown network, unknown people connected there. When these devices come back to the office, to your office, you can be infected. This is adding on top of the well-known SMB risks, right? We covered some of those during Ian's presentation.

First of all, they are a target. I mean, today this is no longer the large enterprise stuff, right? The SMBs are not only a target, sometimes they are even the main target. 76% of cyberattacks occur at businesses with under 100 employees. Why? It makes sense, right? The hacker, the threat actor knows these guys don't have the security measures in place to protect themselves, most commonly, so they just attack them. They are an easy target. They are the low-hanging fruit. Ransomware, of course, is a top threat. I mean, that came up, what? Became, let's say, a buzzword 5-7 years ago, and still here with us, right? I think for a long time. 55% of those are attacking businesses with under 100 employees.

Again, the very, very small businesses are being a target for ransomware. What is interesting is that even the employees, and these guys are not technical people necessarily, they are aware of this risk. I'm working for an SMB, and I know there is an issue, right? 23% of these, and this is for very, very small companies up to 50, which again, are not technical people, they believe their digital information is not secure, which is a big issue. Why? What is the main thing here? There are no skills, right? That's a problem. Those skills are very scarce on the market, and they are very, very expensive. Definitely not at the reach of an SMB. Consequences. Very high cost, okay?

In any case, I mean, you will see, depending on the source you are checking, you will see a different figure, but in any case, it's a very high figure always. Always. For a small business, I mean, think of it like, you know, I have 20 employees, and I have to pay $40,000 or close to $40,000, that can basically mean that I am out of business, right? Because these guys are, most of them are just starting. They are very tight on money. They have gone through a pandemic. Many of them have closed anyways for other reasons. If on top of that, they are hit by a cyberattack, just the end of the story. Now let's talk about the tailor-made security solutions for the SMB, okay? This is the Allot Secure Value.

This is what we are bringing to the table, and this is served from the CSP, the operator. First of all, the solution has to be straightforward. We are talking about an SMB that very typically is a consumer that created a company with a bunch of people. They are not technical. The budget is very tight, and the solution has to be so easy that they don't have to hire someone to manage it. However, that cannot come at the compromise of security. The security has to be robust. You have to have good security there, because otherwise, what's the point, right? The way we do it is you have one button, you activate security, but in the background there are multiple layers kicking in to protect your network. It has to be modular as well.

This is for the CSP, perfect, right? Because they can create their own offering. They can decide what is interesting for them, for their network, for their customers. They might create different packages according to the different type of customers. We give full flexibility in that sense, in terms of modules, as we call it, that you can have in the products, and we will cover them in the next slide. But also in terms of the offering itself. 360 protection, as we said, very important to protect the guy that is working from home or working maybe from a coffee shop. We have to protect that device because that device is coming back to the office, right? It has to be always on, even off-net protection.

The solution that you are deploying, at the end of the day, you have to offer this for very little money. Money that any SMB size can afford. We were talking about the budget is very tight. In order to achieve that, this has to be a solution that is built for multi-tenancy. Why? Because that way, that is the only way actually to reduce the footprint and to be able to offer a solution to the end user that they can afford, and that you are going to make money on as a CSP. Let's look at the, let's call it typical network layout for an operator, right? We have here the CSP network, that cloud at the center, right? On the top left, we have radio access. Those phones, devices, even IoT these days, right?

Connecting through 4G, 5G. At the bottom, we have a router access. That can be a fixed network or can be a fixed wireless access. Whatever it is, goes through a router. Of course, we have the work from home or public Wi-Fi essentially. That guy that is connecting from somewhere else to the resources in the office. Now, when we look at our solutions, we are going to refer to them as modules, right? We have two modules, NetworkSecure and DNSSecure . They are sitting on the CSP network. That has advantages and disadvantages, as we will see later. Okay? On top of that, we can also have an agent on the router, okay? Which is what we call BusinessSecure.

This gives us additional functionality because we are now sitting on the router, and we are able to see what is happening inside the network, and we are able to provide protection for that internal traffic. To add to that and to complete the picture, as we said, it's critical to have a solution that is covering those devices that are going somewhere else, connecting from somewhere else. For that reason, we have EndpointSecure. It's an application that you install on your device and goes with the device wherever that device goes. Okay. The main value that we are bringing to the table here is unification for configuration and reporting. This is provided by Allot Secure. Allot Secure is the umbrella.

It's the orchestrator that is putting all the pieces together and making sure that everything in the background is working, right? You, as an operator and also as an SMB owner, you are interacting with Allot Secure. Allot Secure instructs, directs the different modules to do their job. Okay? This is the main value that unified configuration, reporting, and essentially vision that you get. Let's look at it. I mean, let's say that I am an SMB owner, right? I have my app. This app that I am showing here is only for representation purposes. Typically, an operator will customize it according to their look and feeling, right? This is the app that allows me to make configuration changes, to take a look at reporting.

Now let's say that I want to configure a couple of policies, okay? Barry?

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Oh, sorry.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

That's okay. Let's say that I configure one for salespeople and simple as I want security to be on, and we take care of the complex stuff in the background. On top of that, I don't want them to do any gambling. There is an important element here of content filtering. With content filtering, you can increase productivity for your business by preventing people from going to the wrong content. I can do that for the salespeople. For Matt, the finance guy, also security is on, but in his case, on top of gambling, he likes, being on Facebook every now and again. I don't want to allow him to do any social networking. From the SMB owner point of view, that's all I do. That is sent to the Allot Secure umbrella.

Allot Secure does the processing of that and pushes that policy to BusinessSecure and Endpoint Secure, just two examples, two modules that you can have in the platform, and enforces those policies for these guys. The main thing is, again, it's a solution that is group and user-centric. As an SMB owner, as the manager, it has to be super straightforward. It has to be very simple to manage. All I know is that I am configuring a couple of policies for these guys, and then Allot Secure is in charge of doing that enforcement at the device level. Let's take a look at the Allot Secure modules. Let's start with BusinessSecure .

As we said before, BusinessSecure is bringing that visibility into the network, and that will allow the SMB to be further protected, right? Let's start from the basics, actually. There are two items that persist across all the Allot Secure modules. Those are threat protection and content filtering. Those exist across all the different modules. Threat protection, what is that? It's protection against malware, phishing, botnets, spyware, you name it. Again, all of that complexity is not exposed to the end user. They don't really have to know what malware is or what phishing is. They don't really care. All they want to know is that they are protected. For them, it's just switching it to on, and that's it. That's what we call threat protection.

Content filtering, unproductive content or content that the SMB owner doesn't want the employees to visit. Here we are talking about categories, essentially. I might be blocking social networking, gambling, to give a couple of examples. Now, if we remember the picture that we saw earlier, this is essentially a piece of code, an agent that is being installed on the router of the business of the SMB. Because of that, we have additional advantages. For example, something we can do is blocking shell access to the devices in the network. Typically when your network gets infected, that will try to do what is known as lateral movement. That means the malicious code will try to jump from one device to another device and then to another device. Normally, that happens over the command shell.

That an SMB will not normally use, that will be used by the malware. With this, we are blocking that access. It's a very effective measure to prevent that kind of lateral movement. We can also identify weak Wi-Fi passwords, right? Because at the end of the day, if there is someone, you know, Wi-Fi is open, I mean, there is no way to restrict that, right? If there is someone somewhere near the office, they can also hack that code and potentially get into your network. With this feature, you are able to know if the password that you configured is not strong enough. On top of that, we can also do router hardening.

For example, there is no reason for the router itself to be contacting a server, I don't know, in India, just to give the name of a random country. Why? Because my operator is in the U.K., for example. Why should the router be contacting an external server in a different country? That makes no sense. What we are able to do is to restrict that traffic so that the router can only communicate with the update servers from the operator and also with the DNS servers of the operator. That's all it needs. A completely different story is the devices that are sitting behind the router, right? Those have to connect to the Internet. The router itself only needs to talk to these two elements. DNS tampering, detection, and mitigation.

This is an interesting one and a relatively common attack. What they do is they compromise the router, they change the DNS settings, and effectively what they are doing is getting all the requests, potentially all the traffic from your network, okay? Because, you know, when the device is trying to ask, "Hey, what is google.com?" There will be a malicious DNS server answering that and saying, "Hey, here it is," and it will get all the traffic. We are able to identify DNS tampering and also mitigate, meaning we replace it again by the ones defined by the operator. You are back in a safe state. On top of that, automated classification of connected devices. Because, you know, these days it's not only laptops, tablets, it's there is a whole bunch of IoT devices that we can have.

I mean, even if we talk about consumer, right? The regular house can have, like, 15, 20 IoT devices. When you look at a business, the number is way higher. This is giving you visibility in terms of what devices are connecting, what type of devices those are, and allows you to bring them under management. NetworkSecure is a fully zero-touch solution sitting on the network. It's a premium solution, so it allows you to do very cool stuff. Like for example, you can do antivirus from the network. For example, if you have an IoT device, there is no way you can install an antivirus in an IoT device. With NetworkSecure, you can do antivirus for that device. We can also get full URL visibility just to see where exactly you are going.

On top of that, because one of the main advantages is to be able to penetrate the market, right? To be able to reach a lot of people and make sure people have visibility of the product and also the value it brings. With it, you can do what we call marketing campaigns to create awareness of the solution. And once again, it also includes, as you see at the top, threat protection and content filtering. DNS Secure. Quite similar to NetworkSecure in the sense that this is a network-based solution. It's also zero-touch. It allows you to have very high penetration. Benefit is that it's very lightweight filtering, okay? Because you are only looking at DNS queries, it allows you to have a very lightweight solution. And then finally, EndpointSecure.

EndpointSecure, as we said, is your module to protect those devices working from home. It leverages award-winning Bitdefender categorization. The engine, what is doing the filtering is Bitdefender, okay? However, it has a wrapping on top, let's put it that way. That wrapping is interacting and communicating with Allot Secure for configuration and reporting purposes, okay? Benefits, because you have an agent installed and you are able to identify existing malware on the device. Let's say that I just bought the Allot Secure solution, whatever name the operator is giving to that, okay? That's a different story. But let's say that I buy Allot Secure, I install EndpointSecure, right? And I already have a virus. With this, I am able to run a scan and identify that virus.

On top of that, it gives you additional benefits, like for example, device tracking and theft protection. You know where the device is and you have threat protection capabilities like for example, you know, play an alarm on the device. But very, very important and critical for these days, it provides filtering even off-net. Wherever you go, the protection goes with you, okay? Just to summarize, you have EndpointSecure, BusinessSecure, NetworkSecure, DNS Secure. As an operator, you pick and choose the module that is more interesting for your needs. Then from there you can create a tailored offering for different businesses. Some of them might be mobile, some of them might be fixed, some of them might be converged, some of them might be willing to pay for a premium price. It's totally up to you.

We give you the flexibility.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Eduardo, thank you very much. This is all good stuff. I kinda feel like the guy here with, you know, in the fourth quarter of the football game, watching the clock. He got 10 minutes left, and there's a lot of things. I've got some questions that I wanna ask you as a panel, and I wanna take advantage of the fact that Itay, our VP, product for cybersecurity is with us too. Let me start with this question. We'll see how much time we've got. Also, a couple of questions in from the audience, it's likely that we're going to answer them offline. Here, let me start with this.

Do you think the SMB market and the focus on cybersecurity could be the growth area for CSPs over the next 2-3 years? Or in short, what do you see the demand? How do you see this growing? Where do you see this market going? Maybe Itay we'll start with you and then a few other guys, Ian, and Eduardo wanna chime in.

Itay Glick
VP for Cybersecurity Products, Allot

Yeah. I think that the SMBs are just like you said, are now going to be more affected, more concerned about cybersecurity, and they would look for somebody to help them. I believe that the first call that they would do is for their service provider. We will be able to address their needs immediately. With a click of a button, they would get secured with our solutions.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Okay. Eduardo, you wanna add to that from your side?

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

No, Itay, totally right. At the end of the day, you know, as an SMB, what I am looking for, simplicity. Not only from the solution point of view, but also from a, let's call it, process point of view. If I already have an existing contract with my operator and my operator is giving me a security solution, why do I have to go somewhere else to find it, right? I already have that existing relationship. I can leverage it, and if that operator is offering me a solution such as what we have here, then, yeah, it's a no-brainer.

Barry, you mentioned a cool example about the water pipes, which I love.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

What? The water pipes?

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

The water.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Oh, the water pipes.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

When you have water in your house, you get clean from germs. The same approach is a product I really like here. I personally have a very dedicated system in my house, but I think that SMBs usually would look for a clean pipe, a clean water pipe for them.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Good analogy.

Itay Glick
VP for Cybersecurity Products, Allot

Yeah.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

I see you sitting over there anxious to jump in.

Ian Parkes
Director, Coleman Parkes Research

No, I would agree with both Itay and Eduardo, really. I think there is that move that SMBs are gonna be prone to more and more attacks. Obviously, the CSP market or the CSPs have been focusing on the enterprise and the consumer market. I understand that, and the SMB market is much harder to penetrate just by its very nature.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Mm-hmm.

Ian Parkes
Director, Coleman Parkes Research

I do think Itay's point is very true. There is an ongoing relationship between the CSP and the SMB, so it's just natural to harness that relationship and provide those additional services 'cause that's where people will want to go.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

All right. Well, let me ask you another. I'm gonna, with your permission, put on the glasses. I just did this laser surgery, so it's still getting used to this whole thing. So looking at it from the CSP point of view, what would the role be to help better facilitate the protection for SMBs? You know, expand on that a little bit from the CSP point of view. Who wants to start? Don't all jump in at once. Maybe it's a good question. All right, Ian Parkes, why don't you start?

Ian Parkes
Director, Coleman Parkes Research

Well, okay. I think from the CSP's point of view, it is around, you know, having the product available. I think that the key thing to me, from Eduardo's presentation is the zero touch for the SMB. You know, I said during my presentation, we're an SMB, and the last thing I wanna be worrying about is what's going on with my IT, what's going on with my connectivity, what's going on with my network. It's a bit like my house, you know, to take that. I love the pipe analogy as well and the water analogy. Take the same thing, you know. I have a house alarm. I wanna make sure that that's continuously operated and it's operational and it's maintained and so on.

I think from the CSP's point of view, that there is that massive opportunity to give them a level of consultancy initially and then a level of service that just takes away the headache, and that's what SMBs want. They just don't want the natural headache. You know, managing IT, managing security, they just want everything to be operational, so they can focus on doing business, which is really what they're good at and what they want to do.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Exactly. Now we are using analogies. You are talking about the alarm, right? The user doesn't have to understand how that alarm operates, what it's being connected to. All the user wants to know is that I am paying this money. I want to know when someone is breaking into my house, right? Or I want to know when my house is on fire. That's all. I don't care about anything else.

Ian Parkes
Director, Coleman Parkes Research

Yeah.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

All right. All right. I know, Itay, you want the same thing or I'll go to one last question here, just in interest of time, and then we're going to basically conclude. What are the similarities you see between consumer and SMB needs or SMB security needs? Maybe, Eduardo, why don't you start with that?

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Yeah, sure. I can go first. Basically, I think there is a massive overlap between consumers and especially the lower end of the SMBs, right? Because again, if we think about it, small SMB like a micro business with, you know, 1 to 10 employees or even the small businesses, right? This is essentially a consumer that created a business. What that means is that they don't have the skill and they don't know how to address these cybersecurity issues that they are facing. Yet they know that there is something to be addressed, okay? Because if you're a consumer, of course you are affected, but if you are a business, then that's your livelihood, right? If your business is affected by a cyberattack and you have to close your business as a result of that, then that's it.

You have no money to buy bread, right? To put it simply. They are very similar in that sense, so the solution that they are looking for is a solution that doesn't demand them to hire people or to pay money to consultants to manage that solution. It has to be so simple that anyone can manage it. That's the critical part.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Simplicity, simplicity.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Correct.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Okay, guys, you wanna add to that or any other last comments before?

Ian Parkes
Director, Coleman Parkes Research

I would just add to that a little bit. The commonality is also, Eduardo mentioned it during his presentation, which is the infamous IoT. You know, the level of connectivity, the level of exposure through the different devices is becoming common now between the consumer with all of the IoT devices and the SMB. The SMB might be multiple, you know, mobile phones across their employee group, as well as other IoT devices. In the consumer world, you've got all the other things going on. I just think you're seeing the proliferation of potential vulnerabilities, both within the consumer and the SMB world. They are pretty much matched in that context and offer a great opportunity.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

Excellent. Itay, I'll give you the last word here before we close out. Any last comments if you want to say, put an emphasis on something?

Itay Glick
VP for Cybersecurity Products, Allot

Sure. I think that the SMB is a very high potential market. Many potential subscribers would be interested to something that will solve their problem in a very simple manner. The threats are rising, okay? There is more and more threats, and they need to make sure that they are protected. This would cost them their business.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

That's correct, yeah.

Eduardo Holgado
Senior Product Manager, Cybersecurity, Allot

Right. As Ian was saying, right, that the environment is getting more and more complex. We have work from home, lots of IoT devices, the move to the cloud. There are so many things going on at the same time that the SMB doesn't know what to do here. They only know that they need security, and they need it fast and simple.

Barry Spielman
Director of Product Marketing, Cybersecurity, Allot

All right, guys. Listen, we could talk more, and I see there's a bunch of questions from the crowd. We will get back to you guys offline, but we are out of time. Let me at this point conclude the webinar. I wanna take the opportunity to thank Ian Parkes, Director of London-based Coleman Parkes Research, as well as Itay Glick, Vice President for Cybersecurity Products, and Eduardo Holgado, Senior Product Manager for Cybersecurity, both from Allot. I also wanna thank all of you guys out there in the audience for taking time to participate. We don't take it for granted. We know it's taking time from your day. I wanna remind everybody that this webinar has been recorded and will be available on demand.

That we will be sending you today the Telco Trend Report, which is based on the SMB survey that was presented today, earlier by Ian on the webinar. That brings us to the conclusion of today's event. Thank you all for joining. Stay safe.

Powered by