
Allot Signs Landmark Deal with Tier 1 EMEA Telecom Operator, Valued at Tens of Millions of Dollars
The multi-year agreement includes Allot Smart solutions for Traffic Management, Policy & Charging Control, Network Visibility and Analytics and a set of cybersecurity services including DDoS attack protection, anti-botnet and reputation protection. The solution will be based on the recently launched SG Tera-III platform, the highest capacity multiservice gateway in the telecommunications market.
'This is a major customer win for Allot, the largest in five years, and is pivotal in our journey as we continue to expand our security and network intelligence presence across EMEA' said Eyal Harari, CEO of Allot. 'We are excited with this new partnership as we leverage our unique technological advantages and core expertise to support all customer requirements as we progress with our 'security-first' strategy.'
The integrated Allot solutions will offer services, including cybersecurity services, for fixed fiber as well as mobile 5G and 4G networks, on a unified service gateway platform. The combination of solutions to be provided by Allot are designed to reduce the telecom operator's access bandwidth costs, defer capacity expansion, cut OPEX through automation and assure high QoE for the operator's customers.
###
Additional Resources:
Allot Blog: https://www.allot.com/blog
Telco CyberTalk Podcast: https://www.allot.com/resources/podcasts
Follow us on Twitter: @allot_ltd
Follow us on LinkedIn: https://www.linkedin.com/company/allot-communications
About Allot
Allot Ltd. (NASDAQ: ALLT, TASE: ALLT) is a provider of leading innovative converged cybersecurity solutions and network intelligence for service providers and enterprises worldwide, enhancing value to their customers. Our solutions are deployed globally for network-native cybersecurity services, network and application analytics, traffic control and shaping, and more. Allot's multi-service platforms are deployed by over 500 mobile, fixed and cloud service providers and over 1000 enterprises. Our industry-leading network-native security-as-a-service solution is already used by many millions of subscribers globally.
Allot. See. Control. Secure.
Forward-Looking Statement
This release contains forward-looking statements, which express the current beliefs and expectations of Company management. Such statements involve a number of known and unknown risks and uncertainties that could cause our future results, performance or achievements to differ significantly from the results, performance or achievements expressed or implied in such forward-looking statements. Important factors that could cause or contribute to such differences include risks relating to: our accounts receivables, including our ability to collect outstanding accounts and assess their collectability on a quarterly basis; our ability to meet expectations with respect to our financial guidance and outlook; our ability to compete successfully with other companies offering competing technologies; the loss of one or more significant customers; consolidation of, and strategic alliances by, our competitors; government regulation; the timing of completion of key project milestones which impact the timing of our revenue recognition; lower demand for key value-added services; our ability to keep pace with advances in technology and to add new features and value-added services; managing lengthy sales cycles; operational risks associated with large projects; our dependence on fourth party channel partners for a material portion of our revenues; and other factors discussed under the heading 'Risk Factors' in the Company's annual report on Form 20-F filed with the Securities and Exchange Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the company undertakes no obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.
Seth Greenberg Allot +972 54 922 2294 [email protected] Ehud Helft/Kenny Green Allot Investor Relations +1-212-378-8040 [email protected]
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
4 minutes ago
- Yahoo
ZIM Integrated (ZIM) Climbs 14.9% on Acquisition Rumors
We recently published . ZIM Integrated Shipping Services Ltd. (NYSE:ZIM) is one of the best-performing stocks on Monday. ZIM Integrated grew its share prices by 14.9 percent on Monday to close at $17.81 apiece as investors snapped up shares amid news reports that it was set to go private through a $2.4 billion acquisition plan. According to Israel-based business publication Calcalist, ZIM Integrated Shipping Services Ltd. (NYSE:ZIM) and magnate Rami Unger were mulling over the acquisition of all of the company's outstanding shares to merge the former with the tycoon's own shipping company. The reported offer marks a significant premium to ZIM Integrated Shipping Services Ltd.'s (NYSE:ZIM) market capitalization of $1.87 billion. If proven, the acquisition would remove ZIM Integrated Shipping Services Ltd. (NYSE:ZIM) from the roster of publicly listed companies on the New York Stock Exchange. Based on information on its website, ZIM Integrated Shipping Services Ltd. (NYSE:ZIM) is scheduled to announce the results of its financial and operating highlights for the second quarter of the year before market open next Wednesday, August 20. Investors will also be closely watching out for cues and confirmation about the reported privatization. Photo by Ammiel Jr on Unsplash For full-year 2025, ZIM Integrated Shipping Services Ltd. (NYSE:ZIM) is targeting to generate between $1.6 billion and $2.2 billion in adjusted EBITDA, and $350 million to $950 million in adjusted EBIT. While we acknowledge the potential of ZIM as an investment, our conviction lies in the belief that some AI stocks hold greater promise for delivering higher returns and have limited downside risk. If you are looking for an extremely cheap AI stock that is also a major beneficiary of Trump tariffs and onshoring, see our free report on the . Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Android Authority
6 minutes ago
- Android Authority
With this final change, T-Mobile now charges taxes and fees on everything
Joe Maring / Android Authority TL;DR T-Mobile has removed tax and fee-inclusive pricing from all new 5G Home Internet plans as of August 6th. Existing customers are grandfathered in, though it's certainly possible that T-Mobile will do what it can to get its customer base to slowly switch away to newer plans. This move effectively ends T-Mobile's inclusive pricing policy for new customers across all services. T-Mobile introduced brand new mobile plans earlier this summer, and with it came a pretty significant change: the end of all-inclusive taxes and fees. A few weeks later, T-Mobile began adding additional taxes and fees to its tablet, smartwatch, and hotspot plans as well. Now, the company has set its sights on the last inclusive service it offers: 5G Home Internet. Late last week, the company announced new T-Mobile home internet plans, and while they weren't significant enough to warrant much of our attention at the time, the company was once again using this as a way to stealthily remove its old tax and fee-inclusive policy, as first spotted by PCMag. As of August 6th, all new Home Internet plans no longer include taxes or fees. The good news is that customers with existing plans are grandfathered in and will continue paying the advertised price — though that doesn't mean you won't eventually be forced to switch. After all, T-Mobile has a track record of nudging cellular customers toward more expensive plans or finding workarounds to raise prices, so a similar move here wouldn't be surprising — though this is just speculation for now. This change marks the end of T-Mobile's inclusive pricing for new customers across all services. In many ways, it feels like the final blow to the old 'Uncarrier' image, which has been on life support for a while. That said, those with older voice plans that still include taxes can add new voice lines under the same tax-inclusive terms, as long as they don't change their main plan. Unfortunately, that's now about the only major exception. Follow


Forbes
7 minutes ago
- Forbes
How To Adapt Authentication For Global Digital Finance
Ajai Paul | Cybersecurity Executive | Trusted Leader in Fintech And Healthcare Security | Sr. Dir of Enterprise Security at Affirm. In the evolving digital finance landscape, robust authentication is paramount. Modern financial products offer unprecedented digital accessibility, but this convenience exists within a complex environment of sophisticated cyber threats and diverse international regulations. Therefore, strong, adaptive authentication is not just a feature but a foundational requirement for the trust and sustainability of these services. The Global Regulatory Challenge Fintech applications are often geographically border-adverse, meaning they can be accessed by users worldwide. While this creates opportunities for growth, it also presents significant regulatory hurdles and amplifies security risks, as malicious actors can attack from anywhere. Financial technology firms must navigate a complex and evolving patchwork of compliance mandates across multiple jurisdictions, which is both operationally demanding and costly. Key regulations that impact authentication include: • Strong Customer Authentication (SCA): A European mandate that includes multifactor authentication (MFA) in various payment and account access scenarios • General Data Protection Regulation (GDPR): Governing the processing and storage of personal data for individuals in the EU • Personal Information Protection And Electronic Documents Act (PIPEDA): A Canadian law for the collection, use and disclosure of personal information • California Consumer Privacy Act (CCPA): Grants California residents the right to control their data • Payment Card Industry Data Security Standard (PCI DSS): An industry standard for protecting cardholder data that often has contractual compliance requirements To manage this complexity, fintech companies must build flexible, country-agnostic core authentication services that can incorporate specific local requirements, such as rules around SMS-based verification or device fingerprinting. Failure to do so can result in severe financial penalties and reputational damage. The High Cost Of Neglecting Security In the competitive fintech market, prioritizing speed over security can lead to severe consequences. Weak authentication significantly increases the risk of account takeover (ATO), where criminals gain unauthorized access to user accounts to commit financial fraud and steal personal data. Such incidents result in substantial financial losses and, more critically, erode consumer trust, a vital asset for any financial institution. Delaying security considerations can also create fundamental architectural weaknesses that are expensive and difficult to fix later. A "security-first" approach, incorporating threat modeling from the start, is far more effective. Furthermore, inadequate security can lead to non-compliance with regulations, resulting in hefty fines, sanctions or even the suspension of operating licenses. Modern Authentication Strategies To navigate the complex landscape of threats and regulations, modern financial products must adopt a multilayered and adaptive approach to authentication. Relying on outdated or single-factor authentication methods is no longer sufficient to protect user accounts and comply with evolving security standards. Contemporary authentication strategies encompass several key principles and technologies: MFA is a cornerstone of modern security, requiring users to provide at least two distinct verification factors. This greatly reduces the risk of unauthorized access. The factors include: • Something The User Knows: This includes passwords or PINs. • Something The User Has: This refers to a physical token, a trusted mobile device or an authenticator app. Secure options, such as authenticator apps, are preferred over SMS-based one-time passcodes, which are vulnerable to interception. • Something The User Is: This means biometric data, like a fingerprint or facial scan. Offering a choice of MFA methods improves both security and user experience. RBA is a dynamic approach that adjusts authentication requirements based on the risk level of a user's activity. It analyzes contextual factors like user behavior, device and location data, transaction details and threat intelligence. Low-risk activities encounter minimal friction, while high-risk scenarios, such as logins from unusual locations or large money transfers, trigger "step-up" authentication for additional verification. Establishing trust in a user's device is another crucial element of modern authentication. Device fingerprinting technologies can create a unique identifier for a user's device based on its hardware and software characteristics. Empowering users with device management tools enables them to view logged-in sessions and revoke access for lost or unrecognized devices, allowing them to detect unauthorized activity promptly. Passkeys are a modern, passwordless method that enhances security and usability. They use cryptographic keys stored securely on a user's device, authenticated via biometrics or a PIN. This method is highly resistant to phishing because the keys are tied to a specific website or app. However, robust security is crucial during passkey registration to prevent fraudsters from adding their passkeys to a compromised account. Requiring MFA before enabling a passkey is an essential safeguard. When integrating with third-party services, federated identity solutions (utilizing protocols such as OAuth or SAML) enable users to grant limited access without sharing their primary login credentials. This reduces risk and shifts some management burden to the partner who owns the identity. It is crucial to establish clear security responsibilities to ensure that critical fraud signals, such as device information, are shared consistently across platforms. Conclusion: A Continuous Imperative Securing modern financial products through contemporary authentication methods is a complex and crucial endeavor. It necessitates a thorough understanding of the expansive digital environment, given the varied and changing legal mandates, as well as the advanced threats facing the financial services sector. By prioritizing security from the outset, avoiding the pitfalls of shortcuts and embracing a layered, adaptive approach (including multifactor authentication, risk-based authentication, device authentication and fingerprinting, passwordless technologies and secure partner integrations), fintech companies can build trusted and resilient platforms that protect users, ensure regulatory compliance and foster sustainable growth in an increasingly interconnected world. The ramifications of neglecting security are severe, underscoring the imperative for a proactive and comprehensive strategy that views robust authentication not as a cost center but as a fundamental pillar of a successful and trustworthy financial product. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?