Palo Alto Networks (TICKER: PANW) Palo Alto Networks Inc Panw Ceo Nikesh Arora Presents Jpmorgan 49th Annual Global Technology

Palo Alto Networks, Inc. (NASDAQ:PANW) JPMorgan 49th Annual Global Technology, Media and Communications Conference May 24, 2021 11:00 AM ET Company Participants Nikesh Arora - Chairman and Chief Executive Officer Conference Call Participants Sterling Auty - JPMorgan Sterling Auty Thanks everyone for joining us for our next session here at the 48th [ph] Annual Technology and Media and Communications Conference here virtually and hopefully next year back in Boston. Fortunate to have with us Nikesh Arora who is CEO Palo Alto Networks joining us for the next session. Nikesh, thanks for joining me. I appreciate it. Nikesh Arora Thank you for having me, Sterling. Sterling Auty Alright, let's just get kicked off at a high level. Can you give us a sense? How did the pandemic actually impact your business both positively and negatively? Nikesh Arora Well Sterling, as you are aware, we had this conversation about a year ago, where we talked about how every company had to figure out how to get this remote work thing going. And many of us not just as others in the industry offered a series of free trials, expansion of capacity, or capability for our customers. And now we saw the early adoption, in the first three to six months, we saw a lot of customers expand capacity, try and sort of Band Aid a bunch of existing remote security solutions for their employees. And as you know, depending on how you've architected it, some things are available at home, some things are not available at home depending on whether you are using a proxy based architecture, you're allowing access to all of your proprietary apps or not. And what's happened is post those first six months, what you're seeing is you're beginning to see a ramp in adoption of people actually taking this remote work, hybrid scenario as sort of your state. So you have to make sure that everything is accessible from everywhere. I think we're about to get into a more interesting challenge where in the past - everybody had worked or everybody at home. Now, you've got to make sure how do you create that first class citizen behavior for everyone, wherever they work from, and that really requires one to dig deep and re architect their network stack to make sure that that battery is achieved. And, it's a long way of saying is impacting a remote secure home business sort of, very positively, obviously, what we've also seen as a consequence of the pandemic is the technology adoption curve has sort of accelerated because a lot of our colleagues, a lot of our companies out there relied on technology to make it work. Your physical revenues vanished in the first three, four months. And the only way you supplemented anything was through the technology, sort of the online mechanism, and that's required people to increase capacity there, too. So I think all those things have been net positive for the security industry, not to mention the recent cyber-attacks that we've been witnessing. On the flip side, I'd say that, because people are not physically in the office, anything that requires a complicated deployment, and complicated testing associated with large scales that are going to rip and replace, is impacted, because people don't want to go take that risk. On the other side, there are some companies who are saying, let's use this as an opportunity. So there's ins and outs across the board, but I'd say net positive for the industry. Sterling Auty Do you think that it created any tough compares on that kind of initial capacity spend that you worry about in the coming quarters? Nikesh Arora Well, there's only one way to find out, I think, like it is puts in there, there is a secular trend. And there's a cyclical trend. I think a cyclical trend, obviously will create a on the margin, a bump, but I think the secular trend to overweight, the cyclical trend. Sterling Auty Makes sense. Alright, I want to dive both into the cloud business and the traditional on premise business. Let's start with the cloud business. And I think investors sometimes get a little bit confused yet next generation security. And you have clay sack. Can you describe the difference between the two? And, is this something that you'll normalize the description, maybe as you get into the next fiscal year? Nikesh Arora Ah, but a lot of us -- have a bunch of stuff in there. So let me go back to first principles. As companies move to the cloud, you're moving your applications to the cloud, either on your own stack, or you're moving, some of them do SaaS applications, right. So what used to be in the data center as a proprietary app or on-prem is now either in the public cloud, or in the SaaS applications. How you get there, how you get your applications is network security. And that, to me is next generation security is how do I make sure that I can get to my cloud through a firewall stack would the Prisma Access in our case, or I can put a VM against a public cloud to make sure my traffic is protected? That to me is next-generation; including hardware business that to me is next generation security. And when I look as a cloud business, there is one time on the public cloud, how do I protect all the applications that are on the public cloud? So that was this Prisma Cloud. And, AI application is, to me is transformational songs. So in our business world, there's the network security stack is getting replaced, the clouds needs to be secured. And you need to make sure that you may that as the security evolves, we get more and more images in our ability to remediate and detect what's going on in your infrastructure. So those are the three parts. We take the secondary parts the cloud and AI business and collectively call it ClaiSec because that's kind of falling in that new pattern, net new rhythm something new for us. The existing business of network security is going through its own transformation. As we highlighted, we have managed to in the last three years convert 40% of our network security business software which continues to grow over 20% Sterling Auty That's great. And then maybe before we go deeper into ClaiSec, you have the target of the $1.15 billion in ARR, from next generation security for the fiscal year, what are the things that give you the confidence? And yeah, I know, you're smiling, because I think there was there was that concern coming into this quarter right back end loaded the whole nine yards, you reiterated the targets, you've got confidence that you're going to hit it, you know, what are the elements that are driving that confidence? Nikesh Arora Well, Sterling, we did 977 plus 973, plus seven, which we announced a video on the first day of this quarter. So at 980, $170 million away. Collectively, last quarter, we did about 140. So if you look that we expect our Q4 billings to grow by 20% or 30%, from Q3, that 170 to 140 doesn't seem infeasible in the context of that compare. Having said that, there are more importantly, what's driving that ARR business, obviously, is our Prisma Access business, which is doing gangbusters from our perspective, the business we were not in three years ago. And we, partly luck, partly preparation has allowed our teams to be able to really build that business, relative to all that growing out in the market. Our virtual firewalls are the best in the industry; they continue drive growth, both in the cloud side and the data center use case side. We can receive traction, the XDR space with; we made it to the Forrester wave fastest any products ever gone from a standing start to making this drop, right. On the first sort of wave report, we see continuous traction with all the cyber activity going on at our expense business we acquired. We're seeing a lot of interest in our Crypsis business, although not all that falls into ARR. So there have been cloud, if you add it all up, that is the next generation of cyber security. And so far, so good. And again, there's only one way to find out, but our teams are confident they see the pipeline, they see the business upcoming, and we think we should, we should be able to get as a target. Sterling Auty Alright, great. Just as a reminder for investors that are watching, if you want to ask a question, there is a ask a question button on your screen, you can click type in your question there; it will come through to me. So diving into ClaiSec, can you give us a sense, what are the biggest contributors to that ClaiSec revenue? Nikesh Arora Well, it's pretty simple. I know, ClaiSec is driven by Prisma, Cloud and Cortex. So as Prisma Cloud, Cloud Security, it's kind of fascinating. Two and a half years ago, we acquired RedLock, the industry is like what is follow just networks doing cloud security. What are we doing in RedLock purely on evidence and I can't tell you I, every day I wake up, there's another company that's getting funded an absurd valuation. We crossed $250 million in ARR this past quarter in our cloud security business. I think that's about on a conservative basis, 15 times to 20 times, anybody, our nearest competitor was a pure play cloud security player, not counting obviously, whatever, AWS Azure or GCP. Starting with the security business, but people have funded, phenomenal, phenomenal valuations. So we feel vindicated in our last strategy have Prisma Cloud. We are in our second or third version, entire platform, we have an integrated strategy to container security, workload security, the fragmentation that existed in enterprise security, is what we're trying to stop from happening in the cloud. If you see most of the attacks, I think the attacks will get faster, they'll get harder to remediate if you're not on top of it. And you've got to make sure this stuff works together. Now, in a way, the Cloud is a lot easier to secure than the enterprise. The enterprise has 60 or 70 vendors that you have to deploy for the largest customer Matt [ph] had 110 vendors deployed the smallest at 25. Now they're sort of downsizing, consolidating, and down to 10 to 15 vendors, there's still a lot. So how do you make sure you don't make that same mistake in the public cloud? Because you're relying on one AWS, or maybe two AWS and Azure or AWS and GCP. You're relying on one or two public cloud providers? Can you put a security construct that sits on top doesn't require to have 40 different security vendors trying to secure the cloud because that's the kiss of death, it's not going to work together. So what we've tried to do for the last two and a half years is built a platform that actually allows you to see what's happening in your workload. What's happening, to your containers, are you doing micro segmentation across the entire public cloud, do you have a way of rasp against it? You know, are you managing identity access across that stuff? So some of the some of the public cloud mistakes today are still rudimentary, people are still making fundamental mistakes as they deploy the cloud. And they don't realize they're leaving the crown jewels exposed on the internet. Sterling Auty So you, but I was going to say you touched upon it, because I fundamentally feel that investors are still lacking a good understanding of the key components that really make up a cloud security platform and you touched on a couple of them there in terms of Identity, web etcetera. How would you kind of complete that stack and within that stack, what do you want to hold? Nikesh Arora Well, I think the way it works is the best way to think about is when you go from your on-premise, where you're using your own trading application, you're using your own HR application, you're using any proprietary application, you want to lift and shift to the cloud. You don't look and shift to do re-architecture obviously. Now, when you design that new application, you have to make sure any call you make to the internet is restricted, it's protected. So it's not, it's only available to sanction applications or sanction functions. So when you do that lift and shift process, you have hundreds of developers working in your company who are trying to build this application. First and foremost, you got to make sure that as the developers are developing, they are constantly doing security checks. This is the acquisition made recently called Bridgecrew. As you move that stuff into production, as you move that stuff into AWS, or into GCP, or Azure, you want to make sure that that transition that you allow you allows you to scan everything you're doing, make sure there are no security vulnerabilities, as you put that in production. Once in production to make sure that nobody's left the door open to S3 buckets, nobody's not used encryption; people are making sure that there's not over provisioning of IDs. So you literally have to look at the entire workflow from the left to the right, all the way from development to production, and make sure you're consistently securing all aspects of it. If you don't, then you're in trouble. And once you're there, you got to make sure that whatever is out there, databases, applications, they're all sort of secured in a way that you know, you don't leave any vulnerabilities. Because today, I can easily rent public cloud and come looking for your vulnerabilities. That's how easy we made it. So you're going to wait in a sock and try and take all that data. And just to figure out where the mistakes are, it's too late. So all those aspects go into go into making sure that you're secure going to the public cloud. So that's got nothing to do with how you get there. That's kind of you know, zero trust access or Prisma, access, all that stuff. Just getting there. The question once you are there, how are you being productive? Sterling Auty So again, we within that, could you see Palo Alto playing in the identity portion, the web application firewall portion? Nikesh Arora We do. We're very new Sterling. There's a module we've launched last quarter go laughs fast. And Prisma Cloud, we have IAM with AWS and Azure going to GCP soon. So we already have them, we have seven modules in Cloud. Worker protection, container security, IAM, WFAS, DLP, Shift Left we have we have all of that already. That's why we get to [Indiscernible]. Sterling Auty But in terms, I want to make sure because that may cause some confusion that wait a minute. IAM are you going to go compete with Okta? So maybe that line? Nikesh Arora Yes. So what happens is I am in the organization is how you and I access 100 applications? I am the context of cloud is what access? What control rights do I have my AWS ID. Is it all provision as it have access to too many things? That's a security risk. So it's actually post entering into the cloud. Okta is kind of getting you to the cloud or taking it from there and saying, what rights do you have inside? And we're only doing that for the public cloud, because that's where it makes sense for us from a cloud security perspective. Sterling Auty So if I put it simplistic Okta proves that you're in the cache Palo Alto controls, once you know, it's in the cache what you can do. Nikesh Arora That's right. Sterling Auty Okay. Nikesh Arora There are API's available AWS, GCP. I just want to make sure that the developer has similar rights across the board, and he or she doesn't have access rights compared to others in their same role. Sterling Auty Who do you see as your primary competition and in the cloud space as you move forward? Nikesh Arora Honestly, I think approximately a third or so maybe even half that market over the long term is going to be occupied by the cloud service provider i.e. Amazon, Google, GCP, etcetera. Because if you're going to be a single cloud company, which I think is going to be hard anyway, because people eventually end up in multiple clouds. But if you start with a single cloud, you don't need the tools of anybody else. It's just make it work with your, with your own toolkit. And that I think that applies to the midmarket and the lower end of the market as you get up to a stack of over 2000. I don't think you can avoid it on-prem plus public cloud scenario. And the moment we get there, you need something that spans across both. I think it's really one of this gets underappreciated like to say that because I run the company, but the one thing that does get under appreciate is every one of those 20, 250 plus Cloud customers you sold to, we had a natural competitor in the CSV in their infrastructure, right? They bought AWS GCP, Azure, they've got to go prove our capabilities to sit on top of that security stack. So something was working. Sterling Auty But listen, I, I really appreciate all the companies that compete in some form or fashion in the cloud, we always ask them about competition with the underlying service providers. And usually they're all saying why they're not. I really appreciate that you kind of quantify where you think they fit. So I think that.... Nikesh Arora It's truly; it's a highly fragmented industry. If I can get close to 40%, 50% of any vector. I'm very happy. Sterling Auty Yes. How does the pricing work in this versus kind of the legacy parts of the business. I'm sorry, like the net... Nikesh Arora Enterprise Security business, they'll be calling you and me legacy Sterling, Watch out. Sterling Auty That's a whole different discussion. Nikesh Arora That's right. So in terms of how the pricing works, obviously, you buy hardware, like you always have, and you add subscriptions to it, which is how the traditional Enterprise Security business works. In our Prisma Access business, it's partially consumption based and partially based on number of seats, and number of branches. In the cloud business, we have tokenized, the business. Either you buy tokens, it's not a Bitcoin, it's just tokens. It's Prisma, cloud tokens, and it's not going public. So you tokenize our cloud security consumption, and once you bought the tokens, then you can keep using as many modules from Palo Alto Networks as you need. Our intent is to create more consumption. Because once customers are consuming, we know that they're seeing value from our product. And as consumption rises, which I think it will, and think about it, this 200 plus billion of public cloud being sold almost every quarter, all that needs to get deployed, I think we're 18 to 24 months on a lag cycle of sale to deployment in the public cloud. That lifecycle as it covers the gap in a store to start recording 2% to 5% that spend in public cloud security. So we see as we build the consumption model, our job is to get into as many customers out there to make sure they understand the value of our products. Once they do, as their public cloud deployment, deployment increases, our consumption should go up. That's how you tokenize it and as we create more modules, consumption should go up. So we've got two vectors and consumption. One is more and more workloads deployed as a cloud. Second, more and more modules comes to you. Sterling Auty Got it? Got it. You touched upon this really quickly in your comment there. You mentioned in the quarter that you've decided not to create, an equity around the ClaiSec part of the business, what kind of drove that decision? Nikesh Arora When we, we started the conversation, we had a bit of a suspect cloud stock envy when we did that, because we figured we would be locked out of the market, which is still true, because lots of lots of companies get funding, getting funded absurd valuations, you don't want to take shareholder money at fault and our stock prices, and go and trade that into very high valuation companies. It requires so he said, maybe that's a reasonable thing about it, which we did. And as we went through the preparatory work in the last few months, and years, we showed a slide which is very telling 70% of our customers had bought two platforms from us, between Prisma Cortex and, and Strata, 40% bought all three. And we went through it in a deal by deal basis, turning our accountants and legal team starters to get on every deal, because you're going to be parking in two different public entities, you're going to have to have a contractual discussion across every deal, two pieces of paper execution at the sales point, web system, and went through that, it logistical complexity of executing that, we figured that it would create more friction and take away the agility we have associated with being able to sell all of our platforms. And that's why we decided to put that on the shelf until we believe this is truly a scale business, which starts to deserve its own sort of stack, it would be premature to go down that list. Sterling Auty I think the idea of the power of one goes right to that the efficiency that you keep, by this format, I think makes makes a ton of sense. Question for investor. And it's a good segway into talking about NetSec, which is, how would you say that your competitive position has changed over the over the last year versus Zscalers and the other kind of similar cloud vendors? Nikesh Arora Well, three years ago, we were not in the Prisma Access business. We had a VPN product, which worked off of our firewall stack. We have over 15,000 customers using a VPN. In the last three years, we have become a contender in SASE, Secure Access Secure Edge where, we have, we think we have the best SASE stack in the industry. And that's borne out by the fact that our largest deal last quarter was north of $20 million on SASE. We haven't done a trillion dollar firewall deal in a while. So you can see that's where the trend is remote security and that that's only half the deal. That's only for half the employees in the company, once we deploy that there is possibility of the second half showing up six to nine months later. So I think from our perspective, we have become a player in SASE, we think it's relevant that we've deployed as large as 650,000 employees and a customer 3000 employees in the customer. We have a contract for a million employees and a customer so that's that's sort of validates and indicates that we are a big player in the SASE space. We think that continues to grow. So we are competitive now to people who were claiming to be SASE players in the market. We believe you have a better stack. On the XDR front again, we were non-existent two and a half years ago. We launched a product, in fact we were the first company launch XDR. Prior to that the industry was called EDR Cortex 60. It was the first XDR prior to the launch. Now we have the privilege thanks for our product team to be in the top right corner next year. So we know there are players out there who are in the XDR space, but if you look at the latest mitre results, we beat most of them hands down on the technical capabilities, you'd have to go execute on the go-to-market capabilities to scale that up, XSOAR, we were irrelevant. Two years ago, we acquired Demisto. Today Demisto is the choice if you're not a Splunk. Customer, you end up with Demisto on something else. So across the board Prisma Cloud, we were non-existent in Prisma Cloud, there was no there was an industry called Cloud Security. People confuse the Cloud Security industry with the Secure Access industry. Today, this is this soon to be a fully developed cloud security capability industry. And we're, we think there's nobody else in the market with the seven modules we have. So from nowhere to run into Prisma Cloud. So I'm nervous relevance and SASE with the acquisition of CloudGenix. And also puts us squarely with SD-WAN. And they were already a leader there, from nowhere to Relevance and XDR, relevance and XSOAR. And to top it all up last week, we launched our next generation refreshable hardware and our software, we make that end to end zero trust on our network stack. And we've put out the hardware that is internally called Palo Alto security for net prices. Sterling Auty That's great. That's great. So it not to kick the hornet's nest thing and take us too far down the tech discussion, but proxy versus firewall? When we talk about Zscaler? Do you think that this becomes irrelevant in terms of the discussion? What, because I think your product has really evolved over the last 12 months in particular. But now, how do you see the market evolving along those lines? Nikesh Arora Well, the good news Sterling is, you haven't paid attention. We deployed onboarding proxies in Prisma Access, so that debate is over. So proxies can be used for two parts; One is for on-boarding, which we already deployed as part of as Prisma Access so Prisma access to Dotto [ph], which is just all of our customers by this weekend. As onboarding proxy capabilities, you don't have to worry about it. Proxy is not the issue, go talk to your IT team, they will not apply a proxy based architecture to your proprietary trading app. So, which means you can't use them when you're at home because nobody wants to send a proprietary app, it can't go through a third party IP server. So for that, you will have to drive it through a tunnel into a firewall stack in the on the cloud. That's why we do well in the upper end of the enterprise stack. Or the lower end of the stack, it doesn't matter because you're not using a lot of proprietary applications using mostly SaaS applications and using cloud applications. So there it's easier. But as you go up the complex stack, and you have your own SD LAN capability, you need your own firewall stack. So that debate is moot even though I'm sure you have nears, I'm really excited about talking about proxies. But now... Sterling Auty How is your partnerships in the service providers helped in that kind of go-to-market? Nikesh Arora We follow up there hasn't been strong in the service part of the segment for a while. So it takes a while to go. I spent 13 years of my life on that side of the world, working for service providers or being boards and they're amazing. But the onboarding ramp to become a service provider partner is long and fraught with lots of diligence and perspiration. So we are going to the diligence and perspiration phase. But there is no panacea. It's going to take us a while we have had some success in partnership with AT&T, Verizon, Comcast dishes you saw recently. So we are working at it. But it's a long game. Sterling Auty You talked about -- you alluded to in one of your earlier questions, firewalls or platform. So basically, cloud delivered or subscription delivered firewall, where are we in that transition? How much of your install base do you think ends up on that type of opportunity? Nikesh Arora Look, I think if you play the five to 10 year view, I think most large companies, barring what I would say, high throughput applications if you're running transactions for financial services company as your heavy data center, you'd run in tons of transactions. If you're an e-commerce company, you may have a data center may not may stay in the public cloud. Those applications lend themselves to having data centers and require you have your own hardware stack. A lot of the born in the cloud companies are being born in the cloud. They're born in the public cloud. They don't put data centers together. All this 10s of billions of dollars are spent is in the public cloud must come from somewhere in the long term. Right? So, my personal view is you end up in a 50:50 60:40 scenario or 60:40 is 60 software, 40 is hardware, or 70:30, as time evolves, because I think, once you're in the public cloud, you're going to need software based stacks to protect you. Once you move your, your computer to the public cloud, you're going to start to re architect your network architecture. So if you do that, you're going to end up with a 60% 70% form factor, which is cloud based. Over time, you'll still have, a reasonable number of companies data centers, either for legacy reasons, because they were there, and that's where they're going to stay, or for the fact that they have better throughput and better price performance in high throughput applications, which require hardware because hardware is cheaper on throughput basis, versus software, software has own benefits from a TCR perspective, and in a security perspective, but hardware from throughput perspective is cheaper. So I think I end up in that scenario, I think 40% in three years, is a gigantic move, for any company to be able to execute. And hopefully we can keep down going down that path, over the next few years and get to that 60% 70% number, which to be honest, is phenomenal from a resilience of our business perspective, because software is more predictable, it's more radical, obviously. And it's actually a lower the TCO and leaves a customer more secure. Sterling Auty So when you look at that combination of the rapid growth of the software and the subscription component, and then, the impact that you have from the appliance side, when you roll it all together, what does that mean for that kind of NetSec business as a growth profile as you move into the future? Nikesh Arora Well, I think if you look, the disclosure we did this quarter was it showed you that over the last two years, we have been able to transform from zero to 40, pretty much or than 40. And we've done that by sustaining operating margins over 25% 28%, our free cash flow margin is 42%, that business we're growing at 20 plus percent. That's it in my mind, it's a dream financial profile. If you can conduct an industry transition without burning that profitability, you are at scale. Sterling Auty So you but I think the component that myself and investors have both not focused on is that growth that 20% growth, you think that 20% growth in that segment is sustainable. Nikesh Arora We've shown you that we have been able to generate between 13% to 20% growth in that space, we always got it to 16% to 19% in the past. And
Scroll to Top