Gil Shwed - Founder, Chairman and Chief Executive Officer
Management
So, I think in terms of the price, I don't know, I think our price is very reasonable because we don't sell standalone, super-expensive infrastructure. The incremental cost of infrastructure is actually quite reasonable. In terms of the differentiator, I think there's a big difference in what we are seeing. First, the CPU-level threat prevention knows how to detect threats that are not detected by any other solution because it happens before the threat actually happens. I think our overall catch rate, and I think we've proven it, is quite good and the NSS test last quarter was very indicative on that and that's a good thing. I think in terms of the deployment option, we have more deployment options. It can be on our cloud infrastructure, it can be on a dedicated appliance service customer. One threat, by the way, that we see a trend in Europe, people prefer the in-house appliances, I think for concern of privacy and exporting their data in the U.S. Most people prefer the cloud service, which is very economical and very easy to use; it's a utility. And so, that's another trend. I think the biggest – well, actually, the two critical differentiators that we have, a differentiator through model solution is relatively fast (47:26) that we actually block the threats. Our Threat Extraction technology allows companies to transfer the files very quickly without – with minimal delay, delay of seconds, which is not – again, not meaningful, while stripping the unknown malware, and that's unique to our Threat Extraction. In the overall threat sandboxing technology that we have, it doesn't transfer file until they are being tested. That's not the case with most of the other competitors. Most of the other competitor products are either designed or used in a way that, first, lets the infected file come through. This file might cause damage. And half an hour later or two days later, you get a report that says you've been infected. I don't think that's the effective way of doing security. And I think that's a big differentiator that we have across our products. We prevent the damage from happening. Many other vendors that call it threat prevention actually allow the damage to happen and report to you after the fact. That, I think, is the most – the biggest item that we have.