a a weeks who, is most need the Executive by complex and information acknowledging out Founder secure most Cyberark's today. call joining ago. identified organizations. valuable we start Udi and fit the market founding along Chair CyberArk's celebrated to Thanks, global Mokady, within which for Erica, thanks, the team, visionary world's want the everyone, XXth to with a few anniversary, just and I
a its list. access in moved has a segment grown of priority CyberArk evolved has become and management CyberArk identity the way, market, critical Since pioneered security founding, the ways. Along CISO's privileged consistently the many and layer that up
driven to our world unwavering was mission against success of the threats. cyber by Our securing commitment an
we cutting-edge To and So together, execute transformative importantly, mission, value can innovation fearlessly delivered our customers. most a move to forward. our threats. in escalating of world consistently all we Perhaps constantly a
the We security day every on first we in have decision relentlessly been make of mindset focused our founding. X since
execution recognized later, has security. privileged customers identity and As first resonating with to level a as that all broadly security mindset identities unique controls on customers. with the our value strong leader we created are in the result with secure years proposition of is platform the XX right partners, of security our identity our trust our and Today,
surface growing that of the only confident opportunity. am scratching market large are rapidly and we I this
And income QX Our demonstrate by Total solutions growing strong The XXXX. we XX% durability revenue, on results highlighted quarter ARR million, of our is million, first and we ARR built year-over-year. throughout XX% exceeded growing for $XXX across our results execution that and $XXX EPS. of experienced year-over-year. the of guidance demand operating significantly subscription momentum
our $XX.X the revenue operating million, quarter up share earnings in Total $XX from beverage per a at business significantly big the was period. approximately XX%, came income first Non-GAAP $XXX loss loss in $X.XX a ago XXXX, highlighting accelerated million. $X.XX, of model. Non-GAAP growth year a operating to of improvement in from reaching live of million in the
point to cash the million in $XX last report profitable commitment of and quarter year from to of significantly free thrilled growth. are flow in million up proof $X We for QX a our
will confidence gives talk momentum metrics, full the year for all business and to results our raise Josh XXXX on guidance of strength us which The the about our later.
number Identity a and of the machine by digital identities. success pace ongoing increases and common breach. the transformation, exponential to including secular cloud human attacker fueled the is major ongoing in tailwinds, Our innovation, denominator migration of is every cybersecurity in
Our attack, XX% have in from organizations a XX% an suffered from research year. identity-related about cyber increase has of significant the over shown that prior
privileged Last quarter, and merely proliferation by risks identities entire today's landscape, recognize extensive the controls security The and IT, by spectrum and are CISOs we afford. managing safeguarding risk a identities identities. security the AI identities faced security severe of the increased threat discussed customers for rise human elevation and challenges further of of they cannot exasperated workforce In without across developers, machine CIOs that is access of machines.
to result, at no organizations all We CyberArk address longer secure solutions customers machine in rely and helping environments, as human yesterday's access on can paradigm and identity to shift a today's identities, problems. are undergo need they a As all hybrid security. multi-cloud and environments. They including approaches
effectively. deep expertise from controls to Our risk our retailer and privileged for domain differentiation group comes mitigate access each identity and privileged
each secure the group. of life entire across identity We manage discover, cycle and
the to a all are privilege intelligent controls positioned We security comprehensive from platform. zero vendor access across just-in-time apply identity access, standing a standing best privilege unified approach, and
flywheel expand begins It momentum. new land quarter. nearly all signed to Our and first with customers motion and the continues the logos, and in XXX subscription gain we
logos day and with groups the more power security. about This land secure to from half majority identity or our with importance approximately X. PAM, the the choosing two volumes speaks of solutions new of While bought of many of identity multiple customers these platform
EPM examples with motion and has group database that to Today, logo that beyond selling new perfectly personnel. services marketplace. included that our in identity shadow evolved a to closed quarter well developers, high-risk Cloud for was servers, showcases only the and the flows much exciting IT a market, ACV a platform from workstations financial The administrators. securing deal PAM new protect X-figure of cloud PAM deal including Azure programs IT users, and large modern and routes privileged market which broader a Conjur and landed few PAM, A company
and and the They a and planning traditional and Health Privilege about example, resolution. NHS ever with browser. secure Cloud grow are powerful today and their have the and by than of And relationship new with excited -- SSO SSO off password solutions are new with our Cloud with we Secure sessions, their workforce healthcare future. MFA customer kicked relationship we we EPM this wrapping workforce Social and more quarter, workforce in an easily footprint to As We is Each the identity have secure our Care. web U.K. customers of MFA body CyberArk manager, to identity and great Department access verticals. reimagined more great A government our controls are in circumvented.
and head-to-head competition logistics large after pick IDAS a a vendor. leading for PAM workforce This identity CyberArk company, a with quarter,
Our factors our platform best-in-class amazing were this logo. security the and deciding new winning breadth of in
also expansion base growth solutions motion all our management vector is base quarter within strength is Our across our deals. Overall, expansion strong important for and our with customer platform our a CyberArk accelerating of we sequence an in selling particular had business.
and rapidly. devices. managed The machines world proliferation of remit machines of often a these The the applications Traditionally, an machine security and machines identity This components becoming identities grappling identities. top to Each variety outside secured teams Organizations secrets complexity across is changing needs workloads a growth to AI sits the from of of certificates. ever-growing are from securing multiple managing control. of one to the and further is machine is number be larger life of security to IoT of to to keys digital cycle with bots accelerating challenge.
need programs platform. a exponentially security realize to they local and can beyond practice scale through identity enforced and enterprise-ready is single an this security threat loosely scale need However, landscape. security increases identity into risk their their identity in open policies approach is machine tools. tied unsustainable machine today's They human and Customers source increasingly program that vaults,
while the focus win Pensions I customer am identities they U.K. stronger an the their Department on map XXXX. our been kicking a focused with as CyberArk long-standing program exhibited management expanded with that security relationship great posture. us on all machine for One a and robust are human With identity Work cybersecurity with was We a and key describing in has expanded since who aligning supporting off CyberArk the partner, for secrets road U.K. government's strategic a program. with
looking a about approach, servers, to removing SSO the it for can and protecting lease attackers. identity-based strategy. endpoint, deal turn this And to protects one using in rights broader also food is which extend entry X-figure reasons ACV workstations as strategy how quietly also detecting most Latam attackers and and quarter. and This in targeting the everywhere being the By that its to without endpoint first organizations local customer talked organizations enforcing from for approach needs goes off company the and threats we MFA. EDR part are high of This is beyond multinational EPM a proceed main We identity the point the who attack the reduce agents workforce earlier deploy administration a of CyberArk reimagined signed common detected, privilege surface.
and experienced servers. the past to to the solution's a adenine years, ability achievement in During and to growth strong trust few $XXX and is testament recently surpassed workstations zero EPM ARR. This extend million security
new We and in are growth customers. both existing excited about the further our EPM business, potential for with
exploding interfering the though to talked them privilege their innovation. without as of start the speed securing also population We of and developers about need with identities
our the cloud without least multi-cloud change environments. Access privilege by hybrid scientists and or preferred of and Cloud solution having just engineers to natively and in their work standing data provides access privileged workflows. still permissions while to with zero privileges allowing SCA, Secure best-in-class granting Our controls applies to It principle developers, efficiently
identities. cloud to to traction CyberArk exciting include major important with workforce our for customer solution. plans releases. to recently and Last is are helping the our broadly managed a innovation MSP X-figure move routes our we access human identity.
QX they continue new was security center, And Cloud, partners the cloud, discussed solutions about the and our reach quarter expand accelerate that their excited CyberArk solutions market service a and SaaS To console. to in by this customers' in ACV with a Privilege quarter, step XXXX. and most the a increase incredibly MSPs nonhuman consume an launched single through the signed are deal deal key excellent high MSP the a Gartner, our deployed on market managed the also expected see focus secure to channel, retailer, but build continued MSPs. console XX% we to first cited secure We secrets as providing offering. that And a a differentiator of this By and and we year, command services customers with to According
use of first cloud-first a threats world Browser, for all purpose also and solutions. the of identity-centric enabling are built our productivity and secure while about browser. ease against the industry's Secure availability general protects very across emerging We CyberArk It is customers CyberArk excited
and Secure Browser integrated workforce customers unified believe is attacks, serves also solutions, Logan [ but designed seamless is providing a security our our also cookie ]. as drive to for experience Secure and only beyond of solutions. access a We methods fast-growing customers, and user not from like attack Browser at will adoption protect platform. harvesting natively our portal browser-based direct our help enhance entire both It with to
its Lastly, of solutions, recently two CyberArk has workforce identity. and Privilege received for Endpoint Manager authorization FedRAMP high SaaS
move in CyberArk's strategies FedRAMP help principles future. to efficient implement and that the a public High and more to investment secure zero Our sector to commitment highlights trust adhere
you our As customers more a excited weeks. about we what to these impact all developments, great I'm even for of in in excited have I by am in and Nashville all just few talk store at as
tremendous truly of to innovative about. talk lineup developments have We a
please to moment, evident deeper Josh deep a this go but the of look there. of P&L into morning just we wanted focused my forward emphasize seeing you many tune and that in, most although will So I tremendous to in comments results, profitability QX the to targets to introduced and deliver on on and we equally was flow. last track in on remain This potential we we long-term well for committed remain year. the growth, cash our delivering
main four off first first in kicked the will with summary, you I our XXXX momentum continued and the a we quarter, In strong takeaways. leave year quarter. with from
remain of and is CISO's list. priority strong, demand our for identity First, top at the solutions security
human our to is the apply right identity, Second, platform machine. unified every customer security meeting a level identity of clear privileged requirement to and controls
we and win Third, for and to in opportunity. capture security-first of making are bigger investments a clear us market approach is disciplined growth have And the helping a runway our long fourth, large differentiator share a a for market, deals. CyberArk growing
you. Josh, turn I'll to over the call