growing .
Demand And motion call XXXX, XX% in great to recurring an company nimble today. a and in growth all leadership bookings were our subscription. end beating in year had our and Identity year, fourth solidified backdrop. quarter. fourth Early year We the Erica, to delivered a over $XXX for metrics. market. ARR accelerated record fourth guidance the adjusted a We the growing continued resulting record-breaking the subscription income sequential the million, $XXX across joining in XX% million, and entered our and and having position quarter, exceeded light another reached revenue, year-over-year. Security our round platform to new add momentous thrilled from with EPS. CyberArk. Thanks, guidance pay in and selling fully XXXX, operating year-over-year. Subscription revenue for our coming thanks, We everyone, Total quarter of quarter, We off total amazing we across we out the in AR range were ARR of reached we for net our XX% it macroeconomic
operating came growth $XX Total $X.XX. revenue Non-GAAP income reaching approximately non-GAAP per in earnings million, million. and at we accelerated $XXX generated of to XX%, share
We growth also the operating well million the revenue million and or with income consistently approximately accelerating $XXX the for we guided of beginning to breakeven operating at year, outperformed of XXXX. of above $XX total delivered a X% XX%, non-GAAP margin throughout
Non-GAAP earnings a million year we of flow, and were we or thrilled margin full share flow $XX guide while cash generate XXXX. free per cash $X.XX for the in did to for X% not
and strategy execution. about including generating channel alignment sales marketing, Our improved between We performance pipeline and go-to-market fine high-quality our platform success. all customer volumes motion, our tuned selling, solutions. across We our speaks the record
our all mission delivered right security with of secure our And groundbreaking identities controls privileged lastly, against R&D level the platform. to to identity
Throughout to yet reminded All identities, trends attack new identity. methods. by environments XXXX, strong were roads driven organizations again In that is there constant and in benefiting new the of durable execution, addition lead proliferation demand cyber to from one we're attacks. new
world securely that which the can urgent effectively address these mission-critical of controls. nature a new context security apparent. becomes platform of the only trends, vendor with the our CyberArk center the and requirements, In is on platform
call going massive and challenges, innovation, last to to solve to cadence the the how I'm also over outline customers for in which are security helping typical years, these few quarterly solutions business groundbreaking our growth identity speaks CyberArk. our our the changes our break Given from
workforce. has is and of at Access identities number today entire machines organization of of identities the a these unique Every spectrum different complexity, of of rate. And increasing its to requiring developers an levels from exponential IT identities own level for the risk across and controls. core each has to
what market. of take this me from spectrum our addressable has through customers and seeing Let you expanded and identities we that how are
on for customer of privileges users CyberArk core management IT team. have privileged securing or a typically A maybe focused access who a like database access high and starts operations levels cloud application administrator with is standing or
deploy, brings but IT, controls. they and number of security organizations even PAM under a that users they road map IT also third-party vendors central growing a As follow within shadow
a of there's of a expansion the As PAM. number leveraging users result, continuous
Adoption further access. access is methods or even accelerates just-in-time begins adoption delivered as new like service, through easier customers an cost we to dynamic a when of when given PAM lower cases and tackle new path use revolutionary ownership. It accelerate help
by curve access even adoption by the to allowing at cuts increasing controls while access databases, modern federated dynamically entitlements the time down the other and signing access. workloads security cloud Just-in-time also further targets, of
organization. in The for few has expansion years dramatically significant has up opened program the even the modern opportunity within and last extended CyberArk a TAM evolved IT
is fastest this persist. that human for growing healthy see to moving the rates have expanding for community. second, in IT But one of a continued PAM areas the identities our developer You beyond growth ARR
Access meaningfully developers scientists. Our TAM privileged as to has engineering cloud solution and data expanded teams brings to and Secure Cloud include our controls as well the
native with to access are a they discovery organizations reduces access developers in go of to entitlements quickly This provide environments for yet cloud zero the true nightmare, speed of programs. dabbling from control Always modern and on developers innovation measurably environments. cloud and as actual standing a greatly their privilege promise cloud security can is approach. We innovative risk solution
or SCA customers security that Access have never choose between speed. and Cloud our to Secure ensures innovation
other and in is most pipeline one continues But we as to about quarter to developers are XXXX. in offerings, SCA in infrastructure excited machine on the critical enter data newest rise or these of cloud, as access we we creating that are results one QX, workloads work is strong focused While build. and had cloud of This the the and areas our applications, workloads. a of identities. extending This need they APIs
riskiest our complex one Machine the the components they of and modern solution. of use protect management the identities that most and to secrets represent enterprise machines customers to turn these secrets
the secrets our to It bring enterprise impeding and machine Our the with customers. our human secrets the sprawl. all together while Vault and elevates are never and solution workflows, management avoiding securely manage ability at requirements satisfies CISO's while exploding developers' centrally scale, identities conversations machine
our think and results, top success Manager quarter we Secrets included was with X Conjur Cloud. of we fourth pleased about our of early As are the in XX deals,
developers We've they requirements. and need approaches of time an entirely I But IT. in approach but the machines, covered are to evidence limited breaches. enterprise security, on of workforce and major security, have on want identity identities. to to now provide move part Legacy of new MFA We their again is in own, covered and securing that workforce the SSO time
workforce, holistic for like making fourth comprehensive and unified This intelligent sessions, traditional created identity controls, When Manager, Web Leveraging a identity secure reconsider once building our way top workforce into innovations MFA they approach can of workforce SSO SSO we and has privileged CyberArk Workforce market-leading and the causing become quarter the Privilege combined CyberArk and Any more we again paying more had enterprise solutions. and Password approach MFA Secure have by with CISOs reinvented solution where intelligent Secure a securing the secure. one on workforce. is to privileged, the to with controls are off record Browser.
worth for CyberArk to It's Browser. Secure moment discuss pausing a our
Our built of Secure methods, will to a user browser-based easy all the capabilities, which our fastest built the customers be rising with targets and cookie integrations providing platform. our attacks. native against help workforce Identity one allowing Browser protect entire It's experience all is also Security is gateway solutions, to harvesting and all of to attack enterprise our seamless to and to access
workforce however, with workforce of Manager workflow. their own need The solutions and as intelligent as workforce not endpoints regular our seamlessly and stop integrated servers do EPM, These day well. part form there. Browser into Privilege Endpoint desktops, controls. Our solutions, is every laptops Privilege our modern or of logs their
We secured. truly are privilege the secure foundational Lease a is be and needs implement access doing privilege to security lease to control. endpoint. EPM this Every endpoint
for growth to great over tremendous a years, the the last cross-sell further also spot logos. we see Despite base we new still have a installed landing few within strong And our EPM as EPM. opportunity
and how XXXX, delivers setting adjusting pace the we innovation, upon risk. understood together value we of I how solutions work the security to dynamically wanted are our how level investors our controls based off complexity identity kick sure our make of platform by and As
a We the are market. in delivering changer game
move Privileged We controls time, efficiency at business to from the and threats same on that customers help are and forward. their save operational driving focusing cyber
If into a we fourth for back move second. quarter the
On side, in signed the quarter. logos new new about the business fourth XXX we
in-depth or As X more landed security solutions. threat prioritize landscape, are controls this increasingly with new in logos customers severe
customers QX, in in of to sizes. with solutions, fact, our new In X a deal number landed more contributing new the business largest increase or significant
the are as bad by to new align evolving top logo of sector industry-leading mind. actors, security the continues in of the include quarter controls highlights targeted to A with be few practices education
new business measurably to school improve security London the the looking a In quarter, this Management. went with This its and Secrets logo win, EPM and they Economics, leading PAM, posture. School across broad platform of globally significantly was
all our through of financial closed the CyberArk. This services ecosystem, deal a Fortune SaaS customer AWS Marketplace. In a introduced of X-figure ACV to an XXX was power the example partner
customer Endpoint, and of We approach CyberArk securing the Secrets, third-party this are Privileged everywhere thrilled identities. gate workforce to vendors see a out applying access,
into and outperformance. into expand strategy our to our is moving from motion on focus Our built platform is contributing land
consolidating strategic this buying looking retailer And more X-figure Privileged examples ACV cloud and and they in extended A across agency U.S. products in few Secrets protection deal. include of deals their users, chose Identity defense a Secrets, access. EPM, for Secure XXX a Flows, expansion another and as session with with customer their with Management, Compliance, more quarter remote government adviser the returned secure CyberArk. PAM, CyberArk workforce Fortune for X-figure major deal our access depth, and quarter, more identity, XXXX, trusted and are spend platform, that quarter CyberArk Identity Web ACV from A last landed users
all as address. and have throughout vertical, the profitability, every line business we Touching demonstrate a that each our sizes across demonstrated platform summarize, of revenue. can land briefly identity our percent security improving expand every challenges operating business expense the deals year, in that To all leverage on with help
we grew XX% XX%. non-GAAP grew year, our the over while revenue operating just expenses over For
and striking innovation growth profitability are and right and driving cash the We investing flow. balance in between
few a stellar I our minutes, we confident With just performance targets and hear guidance strong you Josh the from XXXX set. long-term the have in remain will very in in
we strengthening learning top cutting-edge experience customer As outstanding and ahead, and growth, XXXX leadership for use analytics position and innovation leveraging identity look journey. artificial the value machine customer of our industry-leading our scale priorities delivering business, and to our expanding data across in driving including delivering and platform, security intelligence our the are
very wish have excited Camacho worked CyberArk. to also XX tremendous I to for Chief March him and her closely with a her as contribution thank years to to for I stay Eduarda welcome our for Officer. ensure and seamless to her future. strategy go-to-market the I'm with field drive we of customer the respect than Operating CyberArk through Chris ability well end our to his outcomes and want more also and have transition, execution. lead Kelly and for He'll
a in are is position competitive position our strong. We leader as security identity the in incredibly of strength and
is our landscape We Security platform and with priority the are our customer threat addressing a keeping a at top critical customers. need Identity
X to in after As to together more October responded. CyberArk's how into our XXXX, ]. want X on about XXXX. coming am I they I am enthusiastic and proud here I mass our reflect [ very talk October attack global team accomplishments future so I the did how of about we even and pause team
loss culture tragedy, increased and As and our continue success. families, navigate team communities entire are drive and stress, to great friends, what colleagues our through
more the turn who Josh, in now XXXX over call will with financial detail. outlook results and I provide will discuss our to you record our for