most their too all we and world. the and this dedicated take our work efforts. in to like we like and of The the and discuss would Kate, was partners three for XXXX. the we completes metrics. consecutive the to ranges We I some you, highlights, said joining support things: in conscious key recognize employees a of our appreciate team us where your do, in two moment we you and pride our this guidance meeting or the FireEye financial and consecutive would security FireEye. result to customers all for XXXX, to protecting all or some shared exceeding quarter fourth provide we performance years employees, executed Today, our accomplishments I everyone. thank quarter of our Thank investors, on of call. insights organizations That into with interest QX are who doing what you continued for of plan Such would is thank exceeded eighth plan feel
with in a had demand expand record $XXX on million. geography. high-end and revenue, the growth record sales highlights. number in which $X add-on of above We QX, quarter We I'm high revenues row. our a our million was expertise new sales. of availability our several quarter record a with and sales in fourth guidance million, on of to billings greater And some expertise third partners. services dollars showing on-demand services our $XXX transactions the of of in share me profitability a demand in guidance quarter non-GAAP $XXX of range posted globally. a pleased sourced we million, let limited new We also and Now, our the transactions, of of which than We Even million posted $XXX record We every sales. achieved record range. We generated at experienced number was results number record total logos had as by million for
security break by security performed our year-over-year. look for their just we And circumvent We to also a into have but such as their XXX approximately these over performed digits We up highlights, increase generated hundreds profitability to we safeguards. over OT time learning network, and in into achieved front Red year. engagements, of free an In And and the in if year from for We hours or environment successful when incidents, try stealing were QX for customers Red added full is that is essential accessing resulting cash XXXX. full Teaming flow new digit We of impact safeguards to in tested double lines great we other the break milestones ways into a non-GAAP actions security history. an We Teaming year-over-year. data. achieved and X,XXX positive of thousands we for network perform first XXX attacker, addition not when investigations they do double the customer would operating the failed customers. our this security customers' and
training classes and improve During continue our Red accelerate, for way the delivered more education believe of true state and customers understand to to such our defenses. most security Team effective side services organizations Teaming saw We customers, And year-over-year. we security. we on assessments professional our by unvarnished side the their with their Red our can XX% work how they advising I in
how a of make agencies better I product and customers. and nations government These security Without that rather cybersecurity a As enforcement to our our FireEye our understand demonstrate innovation to training may adapt not and highly services cybersecurity is customers, doing our people threats. us believe you are committing have part want our criminal And Therefore, for it trusted attribution, these allows engagement intelligence industry, relationships emerging societies in solutions FireEye, is and conducted by and cannot by classes with perform or difference really identifying critical. practice to law to allows attribution investigations. fills to results rapidly biding acts. and for cycle accountable courses reminder, strategic attack attribution established advisor business if remains forge it hold ensure also or cybersecurity but our to the an perform threat that our possible. And using whenever any rules to us who
our better in it threat external the Our resulted protected. differentiation and importantly, more and intelligence being intelligence in our stems intelligence the curetting matters. named sole FireEye from unique report. And the customers New-Wave resulted being Forrester in attribution services capabilities in belief threat obtaining And that leader
the made dashboards analytics, tremendous cloud analytics based operations or for Helix, and and have and the email and XXX expanded in learned regard to addition platform of requirements thousands we capabilities. With Helix complaint to orchestration strides and that significantly meet threats solutions. Google replace functionality security our Azure, integrations than in products SIEM more to as is innovation discovered serve We can over lines. third-party our XX we XXXX, AWS intelligence, in the and and able We for specific so they increased on analytics future. fully In endpoint XXXX. our reports also our With legacy we today's the product on cloud services now front
agencies the some personnel as side-by-side we in work And These And continue and we both As FireEye to be work we I'm for incumbent for in do to to world. to agencies double example, play a state XXXX. technology. able FireEye, security, we the use midterm of pipeline both digits the XXXX process. role we displaced led here cases In network federal as our QX continues the a safeguard features do U.S. and year-over-year work around and result, to cases email process. and continued election to of defending in with features important most were an sales honored that endpoint, of opportunities security grew of And successfully critical and this network am build. the in growth proud and sales vendors I the new our new both develop our use democratic of products government component
XXXX. highlights Now, our I to a for would few for like provide plans
our bring data our the necessary security our our to the available. effective will we leverage innovate expertise security the of Big breadth our portfolio, and overview, together Data an experienced and build continue As containing platform product to most and expert operations to managing incidents to operations responding components platform, scientists,
specific services. Now, turning products to and
exit supports SaaS on-premise our and all clouds offering. cyber to deployments, public expect endpoint systems an XXXX that We operating solution runs major with or on private
We our native advanced metadata analytics streaming power solution orchestration. integrating are Helix and to also endpoint working on tightly into endpoint with
stream also solution our we cloud security, building Turning email email our API the while drive email be into the driven email to to integrations capabilities displacing leveraging more gateway detection. are cloud legacy into products, metadata and email positioning to more security by we to rolling advanced continue And email security migration will major Helix effective providers.
Azure, extend our market-leading into the for protection protection we Oracle capabilities network AWS cloud reach the to plan Cloud. with Google and For further of threat security, advanced
with technologies that customer's snap cloud working will solutions a We major on FireEye providers their integrate easily into solutions are deployments. cloud with so
automate to applying analysis. segment also network sensors metadata as from traffic one will activity able elements insights and third-party network detecting know fundamental built are some we Helix, refer we activity. the network unique to Helix, provide FireEye a tier what We two anomalous operations. suspicious needed to security With market with be into and tier associated feeding network have to about By we
security forward, intelligence and to than other solve more analytics and learning, products. will enable efficiently innovate faster, machine Going better continue to to Helix artificial we customers' challenges
extension must to of on much platform operations, story. plan than customers' innovation at of to of But integrate to and also more center seamlessly our security deployment become public options value our We it and cloud intelligence SaaS addition in premise Helix services. To an private introduce the current and integrate also security is a Helix expertise, offering. the or is our products. enhance just
earnings stop cybersecurity last cannot call, mentioned alone the that challenges. On technology I all the
our Given all believe experts Customers ways. to more it In make cadre refine as our able the available accessible having our expertise is customers, that will only first of a our more click quarter in continue and will the offering our we XXXX, shortage to Helix to why expertise a click on-demand to indispensable security, a through to will at dashboard. away button. talent become on-demand in the I expertise as directly well and of intelligence be of our as be partners needed tap customers
Red able investigations, malware and training For using example, analyst, intelligence the request Team units. be more forensic customers exercises, briefings, through platform internal will prepaid a to much classes
As investments our security their use gain able customers budget our they manage from to be will more on-demand, menu and services. leverage expertise as of easily products it extensive for and
intelligence our makes the that only We smaller and between be services it link it and it our does on-demand to experts, also on on-demand threat expands Not business. direct are excited for products customers. When easy believe our potential our will I Expertise And about services a impact combine a customers. technology, and our impact purchase expertise sell really intelligence cycle midsize innovation, create and our our of the of our we subscriptions we expertise market and are own for the for to their supporting best for partners of and our protection very or use we company. create services unique customers. means into continuous to security their what
XXXX unique innovation both Our our and also the for foundation cycle for term. the growth, provides in long
a to experts I I put who to in on I with our thank their their and and would our us customers would like thank who partners trust the us to our turn Frank, moment are call to safeguard products we Before growing our a have him base McDermott, Directors. Adrian our take Adrian and is of to organizations. also every like day work over our rely development And proven in serve lastly, at leader President of Board to would of software Products customers. I to board. excited join welcome FireEye's Zendesk like to
call would I over Now, the turn like Frank. to