thanks, today. everyone, joining Thanks, Sri, call the and for
and are the year excited full for quarter delivered strong the the we We XXXX. results in incredibly about
By all dive and as was momentous metrics, truly whole. CyberArk. specifics, continued growth with year, has year celebrate. filled transformation of like XXXX to on major an a exceptional I reflect been for Before I'd to into This a it milestones
billion a And as even you Venafi. $X proud milestone the hit successful passed blew contribution ARR we the that we are very without moment, from milestone XXXX, mark, in we will a see In of.
year numbers outlined ahead was begin drive in to the know proud conversation the and in where XX benchmark XXXX, numbers time. flow a first the we flow inherent place and Rule of fired also solutions platform year also the the exceeded we company, the Investor together, well, persona-based a a increasing margin and C-suite. XXXX. tell long-term $X $XXX of began security our leverage free business to billion of up we cash also as to Day. XXXX our among cash revenue XXXX. The I being we demonstrated for in as am, million we Putting We them industry-leading the In the and the our operating our story of of to teams differentiated playbook these This engine with XX% model, just in the returned in at targets truly
their their solving We are speaking problems. language in biggest
can delivering share fear, them more we escalating relationships, that our customers, are attacks, world a sophisticated trusted and brought with proven they In on together in to providing Our increasingly because and outcomes Identity facilitate relentless design are trust with demonstrable road we, customer maps. make strategic it bigger deeper to our and partners, along always solutions secure. wallet solutions more of approach the by Security ability
their in and is reached year, we for and the the defining reflect the market. a has excitement is celebrating I about sheer What Identity is moment see As Security are on the potential that I what exceeded excitement by clear my ahead milestones my of Bad is being actors win. the imperative security The are center established programs Security the falling Identity to short driven in has its X call. answering identity CyberArk new of placing at the attacks by right and are past realities. identity
We opportunity a they a for over at want will them but help I preview here did these as Investor our little frame to ahead week, discuss Day X in areas the CyberArk.
access everywhere. privileged Identity respond. of identities entire changes The spectrum depending privileged First, of is solutions on This the and even game must can task, target now how become situation. Security
the exploding. cycle very the computing leaving Second, and identities changing standards avoid throughout discovered, exposed. managed are of secured machine and play and world to associated types risks our of identities regulations rapidly means completely in life their to Cloud be evolving automatically roll number the machine machines all need increased and organizations
Third, across access, overwhelmed integral problems sheer the of number by CISOs security PAM the of nature and are IGA. and tools
our continues position, these CyberArk's our result, more in lower to proud. biggest humans attackers At we challenges leadership be to and When with same a more we reputation the AI security more X fourth, brand-new identities can to order other all securing to identity AI more and CyberArk require so agenic their and to think are need make they're the looking the soon just decrease ability realities trust. time, to makes As among most and, ultimately face. secure. importantly, and protection is [ AI and strategically consolidate a against they market the first the And will identities to ] workforce, will about me execute, introducing of targets, of spend combined complexity that strong efficient, form quickly to grow will with secure trusted successful like ever. in vendor securing you pervasive AI which than be the scale outnumber every
the as so can are ahead. eager get I on enjoy why you started year we to XXXX, As understand much
leads is acquisition solutions. focused exciting Legacy invest the slow This IGA relying traditional market, often We static, and market. the no have have we changer securely Zilla's the threats. management Identity are today's continuing SaaS to the integrate, on inefficiencies have leading and management deploy, governance our SaaS challenges This explosion where not In applications, platform automated identities an to instead compliance to contrast IGA of digital only to to IGA by in are modern with innovate are with was cycle done and dynamic modern meet legacy difficult growing identities built fly, are acquisition an platform and systems, are systems heightened IGA from needs is decentralized but the way longer Security. today, world on integration platform address scratch in Zilla identity Security remain but and in yet, to solution. characterized need and and these Earlier life on that environments a of identity-based modern announced security security addressing processes. the to risks a to the hindered efficiently for manual stark limited long-standing the provision all game of and landscape, access we
XX% custom the used set and processes role the XX% applications. can commonly AI-driven less both to complete service automates be tickets. reviews provisioning provisioning, SaaS faster enterprise. faster It integrations of governance Zilla management, and identity and Compared of effort making and deployed the with most fewer access legacy enable intuitive offers Zilla Leveraging Xx easy, with compliance for IGA, complete for all-inclusive modern
Identity Zilla's acquisition with before. will in will to with means the future reduces smarter, best-in-class the modern that IGA platform, Together, CyberArk faster possible to redefine capabilities of Security this approach By value modern identity more and make a what's than operational governments effective time IGA. we customers, integrating For complexity. security we faster ever
talk Erica talented welcome are team thrilled to impact will financial the and CyberArk. her Zilla the remarks. about in to transaction details We the later
continue business reminded vendor the threat the U.S. past. thing state leveraged the the that of when long the In came the threat of accelerate. of landscape and Department support is again Solutions software saw vulnerability attack cannot an to and of ultimately risks of Not to The been into system, a risk the key, landscape down QX security and all traditional organizations in vulnerability [indiscernible] with to navigating a and machine. human eventually which a type once access to and afford are Treasury. December, machine they having we platform a a of both identity take. stealing critical unified to severity empowers mentioned, As has Customers is the applications exploiting ineffective. attacker and provide perimeter daily, every inefficient understand Zilla complete a nation that together, network were across the workstations visibility, customers the API automation identities Other identity controls are secure stitched that provide get and best-in-class that We vendors to data. compromise control
and deploying entire Customers across groups CyberArk. on identity expanding consolidating with are and multiple securing platform, the spend increasingly
selling competing the replace the across are want I quarter specific all leading went services but browser, of how from a top also SSO. Management MFA with global multiple in a Secrets a the they our did and we deals illustrates the our entire legacy machines and and They to All fourth not solution, stop CyberArk example deal had top entire to share company platform. And that in secure solutions, there. endpoint, professional workforce secure PAM quarter, on and including decided vendor, the
and the to IT, offer Identity scalability The the ray with of in them resulting of platform that and us the PAM for major full new organizations capabilities accelerating workforce, allows the landing represents customers our all, fast and have are enabler deals that in SaaS align Group's These powerful display, solutions real cloud. away most strength expand and platform also developers our modern was management This integrations, comprehensive is motion. session the the deal machines. today, dealmaker on for solutions workflows are to persona-based our bigger platform of
and privileged our alone each modern controls new on Let's they customers system access are Core The through us device. requires SSO MFA take helping are major accessing. are tour become based and their seamless very activity user us anytime, quick like our anywhere how any enough. from or expand winning The user group can not solutions same workforce and identity base. a
of how protection web browser, endpoint, together, extends all the the and applications. to the secure reimagined secure we workforce Putting this Our workforce. SaaS the passwords, sessions to have
care footprint leading long-time capabilities, a from the while quarter expand Password IT protect access Last suite and had company developers workforce a to secure workforce that the been web the machines. sessions recognized delivered, Workforce us apart to they customer. modern adding Manager again all this health their for setting traditional TAM with a substantially quarter, their they need U.S. Solventum, to of also solutions our competition. quickly and employees Seeing management returned outcomes
access TAM scalable cloud that best of programs with solution Identity identities with deal privileged IT and risk become Today, admins for IT Zero users PAM and left X identity well and developer must the the modernized privilege developers. administrators standing securing builder.ai. developers most to on IT secure and as These access modern beyond expand access. in surface, for group who for part access by and vendors. expand cloud to streamline our approach extends quarter privileged and modern unintended attack We has standing awesome company amazing as the securing the are mid-X-figure is of demonstrated cloud core enterprise a is IT with infrastructure workflows cloud administrators programs Security a a controls. need its dramatically to In to mission without shadow the human customer innovation. protecting secure our a and pharmaceutical platform in critical of groups XXX securing environment. implementing another environments always they Fortune This interfering pace motion, increased cloud from needed identity the standing been deal, long-term multiple offers If a modern ACV a to
logo also development and As first, scale application unified and CyberArk the chose a the their Access AI covered in they cloud-first IT cloud a a platform innovate company, software the that Secure world. a on in new and developers of With Cloud to power in understand focus workforce. a they born deal
best Our had quarter, momentum identities continued quarter fourth for we machine securing and Management. ever in in the our Secrets
growth, management fastest-growing heavy by compared indicator a QX, the only the success also last an deal workforce. also saw in double-digit basis, QX. followed in solution on year-over-year an closely when In for year, we the sizes full our market of readiness Secrets but acceleration For average a Venafi. increase We Secrets Management in believe to was sequence not is
into as on machine our customers the in to have to performance speaks security sell base with in we identity the opportunity new massive large Our quarter this market as opportunity the well Venafi base. cross
We I are X success strong to see early want that illustrate to in talk deals about thrilled traction, our particular with and early Venafi.
automated across deal certificates than logo modern, in new agency a machine largest needed first government ever scalable, The a XX,XXX identity solution is operations. managing Venafi's EMEA. European They more and
large long been bank, who to CyberArk has a a want European time customers. I Next, about talk
they with solution protection Venafi and IT added Cloud they Secret enhance Conjur in and X-figure also our users the added deal. This ACV of quarter, also but Hub, enterprise a
can resulting in tap great driver confidence in This go-to-market response had the you Venafi opportunity also there presence, gives to as a Venafi with quarter can EMEA. we combined expect we into regions synergies was early X As for expansion traction go-to-market machine little we in the or in previously customer a regional see, where revenue entity realize motion. us no record
machine will there. market identity stop Our innovation not in the
with code RPA, AI, how and earlier, for evolves automation mentioned us When artificial asking behavior. I this identities another topic relates humans for AI human complete agentic their to posture. machine entirely. surface are agents, example, write in user's AI about the controls. impacts they security like and behalf, As to mimic it copilots level like to Historically, other and autonomy is customers Like can identity will generative intelligence as group, humans, from required they the grant functionality expands. that and particular, agents turn, own CyberArk. on right a receive other will AI in any In privileged their of just tasks And create words, to the attack need need privilege, they and automation
today. forward leave X look area we AI more agentic and We at have these in key talking up, want about I Day. the Investor to sum takeaways the with the upcoming opportunity plans To you detailed to this
changing with what market escalating and to list offers places there threat all attack securing is the environment environment needs. the in identities, growing the of focus identity CECL a top at landscape priority on the what strong security CyberArk First, and
unified uniquely our identity is Second, security differentiated. platform
we position Our the solutions Zilla, leadership security are in addition expanding our now outcomes. of Security. with And designed Venafi and to drive meaningful are Identity
best-in-class put this and after outperform win continue go to we opportunity execution. the to third, to pieces And with place have right all in
more We our are as for you customers get partner, XX,XXX trusted with problems CyberArk. strategic globally. as And solving nearly real urgent to their continue
our we're look as position you are XXXX We year profitability seeing best of ARR to share the billion in with at to tune more on cash we encourage to also of proud deliver The beyond. the $X part and to just our February flow. and live our and to in XX, Rule getting XX We reach forward milestone you Day and expanded return standout Investor the about stream into amazing another XXXX started.
I'll With that, turn it over to Erica.