The market for information and network security solutions is intensely competitive and we expect that competition will continue to increase in the future. Our competitors include Cisco Systems, Inc., Fortinet Inc., Palo Alto Networks, Inc. and SonicWall Inc. and other companies in the network security space. We also compete with several other companies, including Zscaler, Inc., McAfee, Inc., Trend Micro Inc., NortonLifeLock Inc., Lookout, Inc., Zimperium, Inc, CrowdStrike Holdings, Inc., SentinelOne, Inc., Sophos Group plc, Proofpoint, Inc., Broadcom, Inc. Mimecast Limited and Mandiant, Inc., with respect to specific products that we offer. In addition, there are hundreds of small and large companies that offer security products and services that we may compete with from time to time. Some of our current and potential competitors have various advantages over us, including longer operating histories; access to larger customer bases; significantly greater financial, technical and marketing resources; a broader portfolio of products, applications and services; and larger patent and intellectual property portfolios. As a result, they may be able to adapt better than we can to new or emerging technologies and changes in customer requirements, or to devote greater resources to the promotion and sale of their products. Furthermore, some of our competitors with more diversified product portfolios and larger customer bases may be better able to withstand a reduction in spending on information and network security solutions, as well as a general slowdown or recession in economic conditions in the markets in which they operate. In addition, some of our competitors have greater financial resources than we do, and they have offered, and in the future may offer, their products at lower prices than we do, or may bundle security products with their other offerings, which may cause us to lose sales or to reduce our prices in response to competition. In addition, consolidation in the markets in which we compete may affect our competitive position. This is particularly true in circumstances where customers are seeking to obtain a broader set of products and services than we are able to provide. The markets in which we compete also include many niche competitors, generally smaller companies at a relatively early stage of operations, which are focused on specific Internet and data security needs. These companies’ specialized focus may enable them to adapt better than we can to new or emerging technologies and changes in customer requirements in their specific areas of focus. In addition, some of these companies can invest relatively large resources on very specific technologies or customer segments. The effect of these companies’ activities in the market may result in price reductions, reduced gross margins and loss of market share, any of which will materially adversely affect our business, results of operations and financial condition. Further, vendors of operating system software, networking hardware or central processing units, or CPUs, may enhance their products to include functionality that is currently provided by our products. The widespread inclusion of similar functionality to that which is offered by our solutions, as standard features of operating system software and networking hardware could significantly reduce the demand for our products, particularly if the quality of such functionality were comparable to that of our products. Furthermore, even if the network or application security functionality provided as standard features by operating systems software and networking hardware is more limited than that of our solutions, a significant number of customers may elect to accept more limited functionality in lieu of purchasing additional products. We may not be able to continue competing successfully against our current and future competitors, and increased competition within the market may result in price reductions, reduced gross margins and operating margins, reduced net income, and loss of market share, any or all of which may materially adversely affect our business, results of operations and financial condition. For additional information, see “Item 4 – Information on Check Point”.