SYS-CON MEDIA Authors: Xenia von Wedel, Peter Silva, Glenn Rossman, Ava Smith, Elizabeth White

News Feed Item

Ceragon Networks Ltd. Prices Underwritten Public Offering of Ordinary Shares

PARAMUS, N.J., July 30, 2014 /PRNewswire/ -- Ceragon Networks Ltd. (NASDAQ: CRNT), today announced the pricing of an underwritten public offering of 21,250,000 of its ordinary shares at a price of $2.00 per share. The company has also granted to the underwriters a 30-day option to acquire an additional 3,187,500 shares to cover overallotments in connection with the offering. After the underwriting discount and estimated offering expenses payable by the company, the company expects to receive net proceeds of approximately $39.8 million, assuming no exercise of the overallotment option. The offering is expected to close on August 5, 2014, subject to customary closing conditions.

Needham & Company is acting as lead book-running manager of the offering. Oppenheimer & Co. is acting as co-book runner.

Ceragon intends to use the net proceeds from the offering for general corporate purposes. The shares described above are being offered by Ceragon pursuant to a registration statement on Form F-3, including a base prospectus, previously filed with and subsequently declared effective by the Securities and Exchange Commission. The securities may be offered only by means of a prospectus. A preliminary prospectus supplement relating to the offering was filed with the SEC on July 28, 2014 and a final prospectus supplement relating to the offering will be filed with the SEC and will be available on the SEC's website at http://www.sec.gov. Copies of the final prospectus supplement and accompanying base prospectus relating to this offering may also be obtained, when available, from Needham & Company, LLC, 445 Park Avenue, New York, NY 10022, (800) 903-3268.

This press release shall not constitute an offer to sell or the solicitation of an offer to buy any of the securities described herein, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

About Ceragon Networks Ltd.

Ceragon Networks Ltd. (NASDAQ: CRNT) is the #1 high-capacity wireless hauling specialist.  We provide innovative, flexible and cost-effective wireless backhaul and fronthaul solutions that enable mobile operators and other wired/wireless service providers to deliver 2G/3G, 4G/LTE and other broadband services to their subscribers.  Ceragon's high-capacity, solutions use microwave technology to transfer voice and data traffic while maximizing bandwidth efficiency, to deliver more capacity over longer distances under any deployment scenario. Based on our extensive global experience, Ceragon delivers turnkey solutions that support service provider profitability at every stage of the network lifecycle enabling faster time to revenue, cost-effective operation and simple migration to all-IP networks.  As the demand for data pushes the need for ever-increasing capacity, Ceragon is committed to serve the market with unmatched technology and innovation, ensuring effective solutions for the evolving needs of the marketplace. Our solutions are deployed by more than 430 service providers in over 130 countries.

Ceragon's IRapp available on AppStore & GooglePlay

Ceragon Networks® and FibeAir® are registered trademarks of Ceragon Networks Ltd. in the United States and other countries. CERAGON ® is a trademark of Ceragon Networks Ltd., registered in various countries.  Other names mentioned are owned by their respective holders.

Safe Harbor

This press release contains "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995 regarding the proposed public offering and the intended use of proceeds from the offering. The offering is subject to market and other conditions and there can be no assurance as to whether or when the offering may be completed or as to the actual size or terms of the offering. These forward-looking statements are subject to risks and uncertainties that may cause actual results to differ materially, including the satisfaction of the conditions to the closing of the offering, market conditions, risks associated with the cash requirements of our business and other risks detailed from time to time in our Annual Report on Form 20-F and other filings with the Securities and Exchange Commission, and represent our views only as of the date they are made and should not be relied upon as representing our views as of any subsequent date. We do not assume any obligation to update any forward-looking statements.

Media Contact:

Investor Contact:

Justine Schneider

Claudia Gatlin

Calysto Communications

Ceragon Networks

Tel: +1-(404)-266-2060 x507

Tel. +1-(201)-853-0228

[email protected]  

[email protected]

SOURCE Ceragon Networks Ltd

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...