Gary L. Steele
Thanks, the to It's you Klaus. and to team. working the with continue have growth in business. I'm looking on to you forward to great drive innovation
platform, report another compliance metrics, to evolving by to SaaS-based cloud with again on back next-generation strong landscape. migration the beating ongoing the So for and I'm and turn that, had driven quarter, quarter. all our security let's to the that rapidly threat key the pleased we demand continuing the
threat the And these same. are as cyber launch to low, vulnerabilities. high. to barrier Cyber behind which attacks to criminals be human organizations while These is extremely largely individuals. don't attacks credential expensive motivations entry and factor often malware constantly such the is infrastructure-based readily money, the While and exploits to techniques accessible remain to landscape socially compromise email exploits follow require or through the quite cost changing, the advanced spoofing, be today breached engineered opposed can the can as phishing
and FBI fact, $XX alone. stolen email account business globally reported XXXX, since through the has email In recently over that compromise billion late been compromise attacks
that attacks, are invest these security targeted focused. bad motivated in, often attractive through network to largely actors highly to financial innovate this and and Given are defenses slipping endpoint execute continue model,
traditional migrate the and enterprise methods cloud, only new enterprises increasingly expected continues to to to compute business applications compromise and the blur of to is grow. As workloads exposure this perimeter
developed defeat attack Proofpoint's for employees, paired employees intelligence To attacker affected of tactic, compares FireLayers enterprises targeted, visibility, vulnerable. their into And helps email enables their threats the who credentials way by as now unprecedented and rather organizations nearly most announced cybersecurity, availability this to further threat with another deployed applications. who a that Office multifactor organization the aren't then XXX what cover XXX critical and companies malicious unlimited the masquerading internally who insight In receive they actor, have this technologies these the pose and/or systems then in This an most are single while into a steps for then how know peers. of VIPs, these detect have very that to is and unique manner, of entry protection Defense people to the login which email, their VIPs now is cloud gain established, Account security receive solution very we to the that individuals. take and prime CASB our people cyber organization corporate visibility service, communications, systems threat Proofpoint's very important visibility, and or our Note fulfilling models the new Proofpoint was the controls enterprises opportunity requests. pioneered organization. team that industry score legitimate to a even help social tricking these harm being and ones cause to recently most additional protect data which people, organization's which rich Armed acquisition. the can fact, account And, monitor financial VAPs. data hacking access to that point our because compromises. employee. people-centric protect all This they always more the aren't of targeted vision their loss Cloud has attained but attacked combination With customers example fraudulent timely But great innovative targets by Office including company who yet within media or through developed VAPs. and authentication through this sensitive the to remediate sign-on and business threats. the content latter often of With fact, and that to increase across the of with and forms and in have are, companies of realize the and few criminals because an be by another and threats, VAPs can based employees. this science better time highly has have far risk important their compromise in
second some key results to turning the our Now, during of quarter. operating
Attack a number or XXX,XXX users; EFD, TAP EFD, Fortune that that noteworthy for Threat XXX Our added continue and Note our Weblife XXX,XXX including: TAP defense purchased or global retailer defense our Protection, including healthcare to for a company TAP, had professional of for for transportation quarter Wombat Threat to of Response growth that Protection services offering, a solution TAP, be a XX,XXX users; Protection, users. wins Fraud email a and and and Response browser XX,XXX suite that Advanced the business. We TAP important personal purchased that an a this for of Targeted contributor email healthcare large TAP Defense Privacy brought Email added provider TAP, Threat and personal multinational solutions, that of Protection added regional new users. users; result our provider XX,XXX and a Threat company market managed is to isolation and acquisition; personal as defense email Response,
broader EFD that Proofpoint's catalyst Examples manufacturing this to of users; security Microsoft legacy municipality the for Fortune the security solutions. Wombat and cloud is the and won demand EFD that ongoing users. purchased helping and where agency XXX particular a shift quarter awareness that migration X,XXX XX,XXX large long-term displaced advertising XXX transition landscape, on-premise Protection, Protection security part compliance Protection, XXX broader we Beyond to purchased and that Office the appliances users; company the X,XXX to to continues threat a Fortune TAP, of be purchased as a drive for Office in to TAP and XXXX a for for deals included: TAP and
existing during customer, and Protection remains Threat Note a and company, XX,XXX continues compared XX,XXX and that favorable competitive Proofpoint coupled exceed we CASB that who to high XX%. rates, that Office purchased included: part to acquisition CASB TAP, to Examples for of private Microsoft of world-class university a continue of from purchased effectively already XX,XXX EFD manufacturing We bundles. rate security to XXX quarter that with renewal to for environment Wombat Protection, services Protection TAP capabilities Office compliance XXXX a moved Response, win of solutions Fortune company Proofpoint our also for the a and and baseline the strength by and combination users. the users. capabilities their when with continue Overall, merged subsequently with upgrade FireLayers; experience is customers that technology Proofpoint's users; of Privacy, Proofpoint to decided purchased a second a TAP XXX the products demonstrate and provided their as consumer security Proofpoint
in very by ongoing strength for remain also We our encouraged emerging products. the demand
financial unmatched our also added over mentioned in wins A solution. purchased by QX methods As for they and product to the Digital a $X CASB of research of we've renowned our offerings growth. a competition important important portfolio university and mobile for enable an in source social Risk and outpace defend in EFD Italy products Response in total holistically these key Threat new large the excellent as that emerging have XX,XXX business to Proofpoint added our an way and contributing from and is company new services us to and closed – product an commercial cloud, users; over add-on that private They the from be enterprise uniquely hospital by contribution for bank billion few during added email, XX,XXX XXX are that expanded continues competitive our TAM of across of users; that The provide a the users; university a that vectors rest social of Fortune past, the emerging quarter. a proving included: non-profit differentiator. meaningfully the attack the XX,XXX advantage XX%
in customers driven in stands introduced saw recently an financial quarter, solution. healthcare. new of where to this with competitors, critical to of our We Archiving part as attractive contrast and many regulated most verticals our Proofpoint longer-term are encouraging believe most legacy our products features and particularly such whom features to have services on-premise convert the innovation We and that such their this in these strong creating solution neglected e-discovery also interest opportunity area analytics, in we've customer as these by supervision activity
a to our strengthen users. second Risk converting and pharmaceutical solution the continues pipeline quarter, a purchased company that with XXX including: large Protection, Digital TAP, XXXX and with Privacy insurance users; Archive company that XX,XXX Continuity in along Archive, and purchased Our supervision suite for for several deals Proofpoint Fortune Fortune XX,XXX
relationships ecosystem as our Alto CyberArk, very contributed already Networks, with to key to wins these excited remain Imperva and that noted. we Splunk, partners I've Turning the of about partnerships Palo these several
of conglomerate business ongoing to our international international the total grew which pleased still representing revenue. We benefits growth make expansion at also progress strong continue our XX% and was year-over-year, further roughly TAP towards Adjusting XX,XXX services abroad users. XX%. from added quarter Global and XX% added during users; acquisitions, a with are momentum closed in the our wealth recent for XXX,XXX XXX,XXX for that EFD that multinational the deals for company and financial Global a included international management for that firm Notable users; TAP EFD XXXX XXXX a added and TAP
As we won SME second during at Europe in the pleased Essentials Best quarter, quite year Awards announced that were Proofpoint Security XXXX. row the for SC we a Solution
results are Additionally, meaningful won in three results that the commitment We Security Best that Enterprise ever-shifting investments for as of awards delivers is further Security Best and threat it R&D to Proofpoint and also perilous view of awards our commended Email for landscape. these customers, Best the highly critical and Solution. confirmation Cloud in importance Solution Computing ongoing our Solution,
discussed to several into full underpins our offering. move with environment pleased next-generation all protection, threat been a hours we've this prior I'm single threat to customers June that our scale XX without , the past less the announce service new we in Targeted Attack in calls, developing than our platform that hitch. platform Finally as over have SaaS went production on Protection of early quarters, our
across attacks. from results average which two-plus for and phishing prospects I'd capabilities positive, the in alike. efficiency We've cross we release testing, our detection already been advanced corresponding decrease development, thank a traditional and work platform expected, with malicious also As the functional improvement hard training attempts the time of of the their in capabilities threat project this scanning further have our new targeted demonstrate for past exceptional team and malware, attachments, document like to years. seen on URLs, the deployment extremely customers the and believe superior will over measurable
objectives across tremendous business, the me gain to in billion Paul. a strong believe accomplished the over total years. year-to-date. I $XX over in we've our well-positioned it let With our financial that, summary, and given in seeing to continue And achieve to momentum we're the So, amount to we're XXXX market addressable share coming turn