with I to you on joining thank us second our for share call record am today. Thank our results. quarter you, Bill and pleased you everyone
revenue XX% grew calculated grew year-over-year. XX% and billings Our
top our achieved another to we line free flow. of cash positive profit operating growth, and addition quarter In
XX improved year-over-year to percentage margins operating Our points XX%.
profitability. growth Having ability opportunity. significant continue will market said and our leverage to our Our business in that, aggressively our and the drive QX results pursue to model invest we our in demonstrate to business
policy no deployed right to the for there right XXX maintain across of expensive a than Internet of ZIA applications positioned center policy or is longer defending internal and to clouds are security be the stacks center, cloud acts is which security. The the disappearing. is the network has with the centers cloud. on a in and inside level public that network the the applications SaaS your data capitalize no more notion therefore is hybrid anywhere be is megashifts effectively business for there cloud network or users engine the architectures a of the and secured data securely complex network walls, In no trust disappeared. user has appliances the applications the network for private network and ZPA and can the parameter Zscaler to application; connect assigned cloud matter a to and adoption data outside It We anywhere. Design can a support which of no simple wall devices as well Zscaler cloud the to in worlds, or need to network and
as Our leveraged journey. they has cloud our stages adoption cloud been by of comprehensive platform customers through security their progress various
incumbent [ph] bound offered worldwide. traffic web from offices experience on-prem piloted Asia used driven proxy security. Office in in The with appliance would appliances existing XXX. issues days Zscaler several capacity cases. to bank top This with highlight uplevel as the customer surge their and the Their XXX,XXX employees not me business hybrid bundle that diverse up the XXX vendor puts quarter an scale for security. keep in Let cloud global illustrate over internet A the
the the by in head requirements. deploying see and to often inspection, accessory They sandboxing. leveling up solution advanced As security protection the hybrid failed are we meet also customer’s market,
our year. share business And you help entry in am requirements. to our purchase is I pleased they you last addition, our DLP with meet In Solution growing that new regulatory We to Japan to well this into market. talked about
a example, IT replace is users which and functionality products services Zscaler security with purchased of For company, now XXX stack web entry the inspection for layers bundle and XXX,XXX proxies additional last level professional us. consolidating global to year SLL on-premise
for SLL web attacks bundle drivers, SLL traffic hidden passing business that is traditional and The of XXX,XXX always sandboxing This more upgraded luggage targeted XX% security their the zero quarter through against almost they of airport box not are day replacing users to visible this all cloud increased to vendor. unchecked. has our sand protection incumbence Imagine to in than the XX% security traffic traffic. traffic, and appliances. highly
has our reduce what You can’t, leading that attempt unacceptable, [Indiscernible] designed this and organizations be when happens without user because security but a impacting proxy, means is SLL Zscaler inspect customers encrypted full experience, next-gen would better traffic businesses. firewalls which natively to exactly protect users. use to can to
Zscaler to and users me customer’s infrastructure. XXX locations. retail Fortune security the purchase all purchased example, which transformation A bundle manufacturing hundreds Zscaler and where secure Cloud firewall, secure cloud and give was to network XX,XXX of Let another sandbox, includes company IPS a transformation for of
matter secure DLP breakouts. and to internet helping mobile and local will including customer further office or initiative will a upcoming [ph] from their the experience, Zscaler for protect data improve laptop in on or SD-WAN headquarter, centers become users few a purchase user as addition for XXX coverage with In premise device. breakouts. or leaking, the on a users, own sitting all DLP enhance mobile sensitive Office the The deployment, at a customer information secure user branch ineffective the local to is, no the road, on where all for
with its its In take to the M&A network Instead, our data a wide organization in full is company. new the fast, or would secure, deal customer applications, out can of this the cases. wide locations security a security reliable driving Zscaler at from and than provide year location user security lower network ZIA hub will new and access take pursued to as leveraging global operational with policy and simplicity. used and years. they a as transformation separate for separate a Zscaler is and pharma from Zscaler The building to they one for a any Another XXXXX And ownership, spinning cloud engine. centers, to rather highlights spoke division, internet ZPA any with the business A appliances, capability world, used area network its for and XXX and off bundle new its greater area, need months the two. the of often They a users cost purchase mode and applications device network, across and be which without and gateways. pre-cloud moving building parent transformation
a business the contractors for Next, and putting to users, plus customer completes six the transformation. months and corporate less that and purchase. purchase for security traffic. the In of with and Fortune ZIA users all into This Auto users the network This functionality for specific XXX purchase across VPN for customer M&A the I applications This to Company purchase expanded deal highlight integration. XXX quickly in firewall including total ZPA success network, after ZIA. to will initial able customer without provide on started cloud than specific customer access was for user’s, With them our full visibility applications XX,XXX have bundle, led quadrupling XX,XXX and replacement to XXXX ZPA latest the full August, locations this spend resulted ZPA, Zscaler.
the discussed which largest history, QX contributed billings Lastly, quarter. in deal we on the in million our to $XX.X call, Zscaler’s
This for project, billings. a in deal required Zscaler sustained period, additional cloud point, that Over deliver XXX began of hybrid Remo throughput, current quarter, cloud deals discuss handle second we throughput. a give five million reference this delivers. to allowed a a benefits XXX revenue. demonstrate gigabits in customers scalable to second per of $XX center this engine, $XX the to this million second stage security a public per highly further. the will solution. that gigabits customer secure This sector you These transformation extend this SSL policy traffic architecture our to expect data and while few deal These need the an majority can customer unmatched [ph] in us generate resulting of Fortune enterprise a inspecting year
serves cloud approach, We keep cloud. PeopleSoft version? of deployed cloud version application cloud heard extend network around It’s happened virtual message data you While to way, customer's single cloud we architecture, significant world, This you hybrid cloud corporate This technology defensive have trying the and to between of result the are on premise, which a born and the the running are legacy noise a our the to data they scaling the vendor center self-preservation risk. making cloud customer. When not security [ph] my the and was on-prem Yet office. will is the boxes, have case, in who what technology, VPN have more your our castle. the in but the we is or a maturity increasing their needs time of service increases my Zscaler’s where splitting can, the the for With moat? in cloud spend know right not based private? cloud the a a when network various competitive hence hybrid many Where designed and technology security Siebel this equates on to doing you public [Indiscernible] managing, a clouds use business where for keep office, Legacy extend view do the the the corporate logs, fundamentally and we architecture, users are Their it. a vendors full customers machines. cloud? single as last architecture the of your of corporate a platform. cloud, them. network How center who traditional data the do their and hybrid protect virtual vendors, use is, it our We or firewall the manages build what cloud. to where of hybrid road a the that’s tenant the service. my boxes, and In vendors building It's the about moat a In security disjointed in tax advantage to believe, strategy, on branch are security responsibility network solution. the by how designed the manages in will
As the world's inspecting billion largest security cloud, transactions XX each day. we are
is traffic expansion, second security of Zscaler hundred The requirement site. over of high. a and of As all gigabytes one nines latest very our that per for per fourth availability centers appearing per generation links total second your SLA. for handles internet of data cloud ongoing a provide five part Hence, capacity delivers multiple terabyte cloud
We scale. have years experience, XX operational at over of cloud our security running
As have compression said, experience. there some or no really algorithm is
As exploring highlighter seen without is with deals, our granting network trust of corporate apps zero techniques access momentum. Customers the ZPA to are to building to offer network. access some
offering a at early have pioneer we software enterprises. mature, of perimeter, in rich an As in hundreds running defined production ZPA that's
investing are designed with use can't. While for range coming applications and to fast secure web others and of multi many on using we was quarter, our out ZPA wide and and to Global us apps, that a marketing. and environment. internal in This running cases with imitators in XXXX our hybrid access cloud by and allows all capabilities on to workforce cloud protocols address that access this and approximately employees half making report to We expanded remain focused pleased XXX in solid sales the we executing go-to-market our on accounts. progress execution, vision I'm are
on are Tours. road, how We enable are IT and customer taking Zenith of Academy Cloud securely. events, regional Zscaler providing World studies Summit hands labs, series Transformation these best on events a case Cloud we the on with called our Live practices to At
market also channel results pleased XX% continued QX the large networks call significant and over contribute to strengthening security. and to which business. opportunity we are turn very strong financial the service We the walk we innings with system of summary, in growth global our to our over I are partnerships, in are like results. now our disrupt our early a Remo We providers, through to integrators In our believe, traditional revenue. of