Fortinet (TICKER: FTNT) Fortinet Inc S Ftnt Ceo Ken Xie Presents Nasdaq 45th Investor Conference Transcript

Fortinet, Inc. (NASDAQ:FTNT) Nasdaq 45th Investor Conference Call December 1, 2021 11:00 AM ET Company Participants Ken Xie - Chairman, Chief Executive Officer, and Founder Peter Salkowski - Head, Investor Relations Conference Call Participants Hamza Fodderwala - Morgan Stanley Disclaimer*: This transcript is designed to be used alongside the freely available audio recording on this page. Timestamps within the transcript are designed to help you navigate the audio should the corresponding text be unclear. The machine-assisted output provided is partly edited and is designed as a guide. Hamza Fodderwala 00:04 Good morning everybody from New York. My name is Hamza Fodderwala, I'm the Cyber Security Analyst here at Morgan Stanley and this morning I have the pleasure of hosting the team from Fortinet. We have the Chairman, CEO and Founder of Fortinet, Ken Xie; as well as Peter Salkowski, the Head of Investor Relations. Before we begin, just a brief disclosure from our end, for forward disclosures please see the Morgan Stanley Research Disclosure website at www.morganstanley.com/researchdisclosures. 00:38 Peter, I believe you have a safe harbor statement to make as well before we dive in. Peter Salkowski 00:42 I do. I don't want to make this a whole disclosure [conversation] [ph], but I do want to show our safe harbor slide for those of you can speed read, I'll let you read that very quickly. Just basically anything we say today is as of today, and if we have any forward-looking statements in there, this is our safe harbor statement to adhere to them. That's it. Back to you Hamza. Hamza Fodderwala 01:05 Alright. Great. Let's jump right into it. Well, thank you guys for joining us. Ken, my first question for you, just around obviously, Fortinet's had a really strong run year to date, really surprised many of us. I'm curious if you could just speak a little bit on the demand environment in terms of, as I guess, some of us are coming back into the office or debating between [Technical Difficulty] or not. What's really driving that demand and how is it aligning with how people are designing their networks, the rising threat environment just from a general standpoint, if you could give us some of the drivers of this really strong demand that you're seeing in twenty twenty one? Ken Xie 01:50 Yeah, like we mentioned in the earning we see three driver for the growth. Definitely like you mentioned the threat environment has kind of much worse especially when people work from and there's a lot of tax service exposed right now, and also the [indiscernible] where from our study is to grow more than ten times compared to one years ago. So that's a lot of business need to be protect their data, their infrastructure. 02:22 The second part we also see, slightly, we see some consolidation whether within the cybersecurity space or within the network security space. You can see like a ten years ago, the top five vendor has less than fifty percent of market share on our security and now the top three are at fifty percent. So, there's some consolidation in the [same scene] [ph] like a network security vendor study like us employing some other email web or cloud all just kind of working together. 02:54 We call the fabric approach, government call a Mesh Architecture, which consolidate approach will be much lower cost and easy to manage and defense security much efficiently. So that's pretty much all the enterprise agree with this kind of consolidation will be the [indiscernible] trend. So, we do see that the [indiscernible] product growth much faster than the forty eight and in the last few years basically. 03:23 So that consultation was still going on, and we have better position because most our other products more internal developed, which [indiscernible] ultimately from day one compared to other vendor mostly comp acquisition or will be more difficult to integrate automate. And the third one is, probably the region we have for, like, over twenty years, when we started a company in two thousand, we call secured driven networking, we do believe the networking space will be convergent into to a security of driven network because this networking is still running the same protocol design forty fifty years ago, just to give you the connectivity and speed. But anything above that, like, how the content or the application, the user, the device or the location all these things [indiscernible] security. 04:13 But more and more [indiscernible] company in that local area network and the wide area network in the WAN they do see the importance of before you do the networking or know what's the content? What's the application? What's the device behind the user behind all [indiscernible]? So that's where we see the business we call, like a Secure SD-WAN or call internal inside a campus or data center through the segmentation study have a strong growth, and we do believe long term and see the percentage of network security compared with the - of market size and the network security compared to the network and network is pretty much flat in the last five to ten years, but network is secured to be more much faster. 04:56 And especially when we compare, like SD-WAN with security, we see wherever strong growth almost double year over year and we believe we are the number one leader now. So, it's a strong demand for the security driven network, eventually to believe the secured driven networking will be replacing the traditional networking will be in total addressable market where we owe one hundred billion dollars. 05:19 So that that's the third trend, but also the key is really a security need multiple company in power to close the gap because that's also the reason when you handle the same day the same traffic whether using security approach compared to the traditional network [indiscernible] security approach need, like, [indiscernible] hundred more company power processing traffic compared to the traditional routing and switching. 05:44 I think we have to check the content application, the device user obviously is behind, which the traditional routing switch and just cable connectivity. So, that's the reason that ASIC can increase the company and how lower the cost is our important tool to gather secure driven networking go in. So that's also the reason why you invest this ASIC technology strategy twenty one years ago when we started the company, and we do see the benefit of that, and we do believe with a long-term huge potential and the huge benefit going forward when the network and security converge together. Peter Salkowski 06:22 I think, just to add to what Ken said, I think the operating system is extremely important for Fortinet. FortiOS 7.0 came out earlier this year, we usually send out an updated version of the operating system every year. It's interesting in this space, you know, people get a [indiscernible] or focused on specific capabilities. So, you know, way back when it was mail, then it was sandbox, that it was endpoint. Today, things like Cloud or Zero Trust Network Access get a lot of attention. 07:02 Fortinet is all of those capabilities built in our operating system, right. We can do things in the cloud. We can do things on premise. We can do both. We get a hybrid cloud world. It will be a hybrid cloud world for a really long time. We have endpoint capabilities. We have for client or what we call EDR transferring and moving into an XDR, sort of capability. 07:22 We have Zero Trust Network Access; we also can do what we call micro segmentation with our firewall. So, there's all these [indiscernible] the new theme that gets a lot of attention because the ransomware guys continue the - the bad actors continue to find different ways to attack. But in Fortinet's case, we can address all of those through one common operating system, an operating system that runs well and fast and has the computing power because of our ASIC strategy, but can also take that operating system and make it virtual and go into a cloud scenario if that's where the security needs to be. 08:02 So, it's the ability to go across what Ken was saying, the security driven networking concept of being able to do a lot of the network functionality because the network is important, but also being able to add the security layer on top of that is really been this - basically the operating system working across all of that. Hamza Fodderwala 08:24 Got it. That's helpful. Definitely a lot to unpack there. If I could just take it, maybe please by peace, maybe just starting a little bit on the FortiGate side, I know, you have a lot of used cases beyond just traditional firewalling, but it seems to make a lot of sense, you're seeing a lot of consolidation in the market if you will towards solutions like yourself, a lot of share gain, but the market for firewalling has also been really strong. I think we're seeing that in other vendor of results as well. Can you talk about maybe what is driving that? How long you expect that demand environment to remain elevated? Is that people are returning to the office, is it perhaps more investment of the data, there it was obviously a lot of things that we'd be moving more towards cloud and this, you know, Zero Trust Network Access model which would shift away from some of these on-premise components, but obviously, you believe that it's going to be more hybrid? 09:27 So, just maybe if you could talk a little bit about what's driving the demand and how you expect the pace of that demand to evolve over time? Ken Xie 09:37 I do think in the network security what we say for [indiscernible] long term be the top finish in the cybersecurity for me in the network security for [thirty years] [ph], three company. And you can see that - because network securities were a unique provision. You can more device more people being connected and the network security is the one in the middle kind of helping like, apply some kind of whether the policy or the way you want to handle the data, secure the data in the middle, compared to other approach whether some application or have to move data that to the cloud or have to, like install a software in your own device. 10:21 The network security is a much unique provision and also, especially when comparing the network security with the networking is a huge advantage because you have to have network device there anyway, and just to this network device cannot go highly see other kind of application, but network security can apply that. 10:41 So that I do believe with move sense got connected, especially whether the 5G or some other - how to connect a [indiscernible], whatever. Then the network security will get a more and more important in an infrastructure will continue keeping growing. And it's also no longer just secured a boarder. That's only when company connect internet agency and put a firewall there because there are so many different ways to connect internet also work from home. 10:21 So that's where you can see that now network security starting apply into the internal segmentation inside the company and into the work from home environment, into the OT IoT space. And that's where we see [indiscernible] and because the position of the network security compared to other cybersecurity approach and to believe even there are some move to the cloud but in order to access the cloud, access application you still need the network, and the network security there to make sure you are secure. And so that's where, I think network security will be continue to have strong growth and continue need whole cybersecurity space be the number one market there. Peter Salkowski 11:49 To just highlight one area that Ken just mentioned, operational technology, OT, right. Companies are connecting their manufacturing floors to the Internet and trying to manage them and efficiently run their businesses through an AI or ML sort of situation. You physically need to be able to protect those locations with physical devices because those are physical locations that are doing manufacturing and they're not going to shoot it to the cloud, have it protected and come back. That's not an efficient way to run that manufacturing or that operation. 12:28 And so that needs physical devices. And so, we call that on the third quarter earnings call that we saw very strong growth in OT, I think we've provided some data, said it was up seventy seven percent on a year over year basis, and said it was only six percent of our billings in the quarter. 12:45 So, one of those areas, one example of where a physical firewall or networking in firewall and capability that Fortinet can provide is definitely seeing good growth. Micro segmentation is another example of the use of the firewall, in an on-premise capability where you're in a networking setting because you're really running with the network in line with what's going on in the network, but also offering a set of security capabilities that allow you to micro segment or really Zero Trust Network Access capabilities within your network or functionality. Hamza Fodderwala 13:24 Got it. That's super helpful. Maybe taking a step back, so you mentioned the security driven networking strategy clearly that's been working out for you and with the success that you've had with SD-WAN, when did you start to see this conversions and what do you think is driving it? Because I think we were starting to think of security and networking as separate, right? I mean, if security and networking were truly converging, then you would still obviously see Cisco continuing to gain more share than the network security space and some of the other networking vendors. So, why do you think that we've seen decoupling like in the last ten years and now we're seeing more convergence? Ken Xie 14:09 Like I said, the basic gap, I mean, the difference already secured need more company power to process high layer traffic compared to the routing switch in the networking to just handle the layer routing switch in there. So that's where security is much more expensive and difficult to manage. But whenever we can close this gap there is a huge demand. So, SD-WAN that the one space compared to the traditional local area networking always in the data center is relatively slow on the speed, and the gap is smaller. 14:48 So that's where the user adopt the first, but also within the campus network, within the data center they also have a much strong need. Just today the network security speed, [indiscernible] has a difficult time to handle in more high speed environment, which ASIC can help in a lot across this gap, but with a new kind of ASIC technology with some other can apply with the space into this like internal and the local area networking, I think that will also set in change in whole landscape inside the company, inside the data center there. 15:26 [Indiscernible] is a one good example. We do have a, like, including, I thinking I had remember fifteen years ago, we started [indiscernible] WiFi, we secured it together Fortinet also WiFi controller, WiFi also ramp up however quickly, in the beginning people just want to get connected. They did probably don't pay other security that much, but once they get connected, the next thing the worry about, how to handle this security, how to handle the data, the content on application. 15:51 And the same thing, SD-WAN is probably the first protocol is conducting some traffic based on certain application and also apply security there where we have huge advantage, huge benefit as we see our strong growth, especially we have the same OS, the same to hand the networking security. But go inside the company, go inside the data center, especially there's a lot of ransomware, lot of a security spread right now, we can see pretty strong demand, but also have to solve this kind of a performance gap issue and also increase some of the cost for internal networking security, which we see pretty strong demand, but also just starting ramp up right now. Peter Salkowski 16:39 Just to add to that, I think, you know, your example, Cisco for example. I think one of the advantages that Fortinet has is the fact that we've developed everything in-house. So, our capabilities, our operating system is integrated to the point where everything can communicate with each other, other players in the space have gone - coming to the security space through acquisition. 17:03 It's very difficult to integrate these capabilities, especially, if you're buying mature sort of capability, security capabilities to actually integrate them and get them to communicate with each other. And be basically a holistic or one sort of operating system. So, I think that gives us a huge advantage over a lot of the other companies that are in the space. Hamza Fodderwala 17:25 Right. How much of the networking market do you think obviously, right now you're taking, you're doing a lot of good things with SD-WAN, but how much of the networking market you think can capture over time? And do you think other than the fabric approach that you have, is it also the fact that you are the price performance leader, and that just gives you a structural advantage versus many others that are trying to break into, you know, from security networking or vice versa. Ken Xie 17:53 Yeah. The ASIC was a flat to ten more company in power compared to the [indiscernible] can do for the same cost function. And the same time, the poor consumption is about two percent of the general purpose CPU doing the same computing calculation of the working. So, that's what advantaged pretty huge, but also ASIC need a long term investment you need to invest on this like five to ten years. And [indiscernible] billion dollar before you see the benefit of that. 18:21 And also the economy of our skill also working for the ASIC industry, we have the quantity cheap cost contained much lower has more benefit, which we have the quantity in none of our other competitor has. So, basically, we had a quantity more than the number two, number three, number four, number five, I'll have to gather we still have multiple [indiscernible] then they are all together. So, that's also working for us and - but on the other side, I do see, yeah, once those emotions get connected, a lot of edge computing this ASIC advantage we are keeping expanding beyond the traditional networking side. Peter Salkowski 19:00 I think it's important Hamza to realize that we're not just, like we don't sell networking capabilities, you know, switches, routers, whatever that aren't secure or to a customer that probably isn't already a Fortinet firewall customer, right? So, it's not like we're going out and competing against a networking company, specifically on a switch basis, for example. Right. We're going to be doing that in the security capability, sort of offering where we're offering their firewalls [allowing you] [ph]. 19:32 That's the way, a fine example. We have what we call SD-Branch, where the company might be installing our firewalls in their branch locations or their retail locations, for example, you know, three thousand different retail locations and in doing so, not only getting the SD-WAN functionality and security that's built into that operating system, but they might also go into that branch location and replace all the routers and switches there with all Fortinet equipment. So, now it's the entire location is running, on a Fortinet operating system, so the whole thing can communicate with each other. 20:08 So, in that case, we may be selling them switches and routers that go along with that. But we wouldn't just go in and compete on a networking basis simply as a networking company, that's not we're about, we're about security and networking together. Ken Xie 20:22 Yeah. We are doing some study, probably what [indiscernible] of the scale, which would be March next year. Also with, we called our seller at the Partner Customer Conference. You can see the last twenty, thirty years compared to the network inside the market, the network security market you can see the percentage of network security go higher and higher percentage. And the same time, from time to time there are some first [indiscernible] on the networking, whether they're sudden like the WiFi approach, whether the SD-WAN 5G because of some device comes in - when they get connected, so that's where people want, get connected first. But once they connect with vendor, all kind of - they see the importance of knowing what they are connecting to? 21:08 What's the content with application side? Then section security me to be stepped in. And so that's where - and also once like the mature networking market like within the company campus or within the data center, which they also want to know what's the content they are been connected with application and what was, they need to have better visibility beyond to just connections together then the security to step in, and then they are starting to replacing the traditional network device there. Even costs are higher and need more [company] [ph] power, which we also try to helping solve that that issue right now. Hamza Fodderwala 21:46 Ken, so, yeah, you mentioned consolidation and security, and, I mean, at Morgan Stanley we've been calling for consolidation for many years now, and it seems like there's a different point solution that pops up every other day in security and you talked about that a little bit. So, I'm curious, I know we've had conversions in certain areas of security, but just that broad based consolidation? Like where are you seeing it, is it mostly more in the mid-market SMB, are you starting to see a more in larger enterprises? If you could, sort of give me a state of that, and what's finally driving that now? Ken Xie 22:31 On the [price] [ph] definitely see some consolidation. I have to say the SMB, most of the [indiscernible] were service provider, the carrier of some other local service provider, secured service provide, which they also benefit from the consolidation. So, that's what basically, yeah the enterprise definitely see probably the driver for some of that, and then the service provider is also the driver for the consolidation. Hamza Fodderwala 23:02 Got it. Shifting to cloud, I know you've made some investments around cloud security, as well as your ZTNA offering, I'm curious when it comes to the cloud secure access product that I think you're still building out, since one of your acquisitions, how are you thinking about building out a cloud network security model? Is it going to be leveraging the service providers? Are you going to have your own pops? Just curious how you're thinking about the cloud portion of the network security market? Ken Xie 23:43 You know, our approach were both on the cloud and also whether they call [indiscernible] some other service provider model it's different than some other vendor. Basically, we do see a long term, the carrier service provider in a much better position because they have the structure to offer this kind of service based security approach, including SASE. And that's where we are working more closely with them like we announced a partnership with AT&T, with Verizon with Comcast, with BT, with [indiscernible], so we're working with also long on time in front of our beginning like when we start the company. 24:28 So that's what we feel - they have a infrastructure customer base and more close resources supporting their customer there. Just they also not aggressively invest all kind of more little bit slower compared to some other security vendor there. But long-term, they are more profit based model for them to offer the service. On the other side, we also believe some of these like whether they would trust SASE will be better integrated into the OS level, which will be more easy to manage, more easy to scale and also eventually also can be pushed to the edge to the local process and instead have to always [indiscernible] to the data center for the top or for some cloud infrastructure there. 25:17 That's also the trend calendar upgrade, which the edge contributing would be replacing the cloud in the next five years. So, that's where we kind of announced in March early this year, in the FortiOS7.0 with the building SASE, Zero Trust and 5G as SD-WAN in the same FortiOS7.0, which were announced earlier this year and there is more consolidated, more integrated approach in the same OS for the service compared to like different - serve different box within like the cloud infrastructure there. 25:56 And that's the two approaches kind of unique, but also take a little bit long term to build, for that to believe what we last much longer with more kind of a healthy business model compared to the current rush into the space and is a big loss of the money and try to get some customer base. So, that's why we move working through the long term approach with service provider and with data integration solution, eventually may also accelerate by ASIC has huge [company power] [ph] advantage compared with our current software approach. Peter Salkowski 26:32 I think, comes a couple things that point out. We do have a very strong cloud business. I's a driver for our business. If you look at, I like to put a plugin in for my Investor Relations presentation that's up on our website. Slide twenty five will give a break out of FortiGate versus non-FortiGate billings. It has some cloud data on there I think that people would appreciate. In twenty twenty, our Cloud business is about two thirty seven million of billings growing at two year CAGR of about thirty eight percent. That's accelerated with the rest of our business this year. 27:04 If we assume a forty percent growth rate this year, that cloud business on itself is going to be three thirty million of our billings this year. So, it's a fairly decent size of our business in growing quite rapidly. 27:18 The other side of that though in terms of like rapid move to the cloud, you have to look at our customer wins, right? And where our businesses are, you know, fifty percent of my billing comes from a hundred countries, right. Fifty percent of my billings comes from six countries, the U.S. and a couple of - four European companies and countries in Canada. 27:42 The other fifty percent comes from a hundred countries, no one of which is more than three percent of my billings. So, you started talking about cloud access, you start talking about Internet access and all those kinds of things that we take for granted here in the United States. There weren't in a lot of countries where that isn't realistic. And so those companies or those customers of ours aren't necessarily looking to go to the cloud tomorrow. 28:07 They're still working on a much different kinds of capabilities at this point. So, we're moving there, we're having certainly very good success there, but we also have, you know, we still believe it's a hybrid cloud world and going to be that way for a long time and our customer base would suggest that. Hamza Fodderwala 28:25 Got it. I know we have a couple minutes left. But I wanted to touch a little bit on the OT opportunity, you've been talking a lot more about that. I noticed that your recent event you had a number of OT vendors there as well. How big do you think that this business could be? Do you think it could be bigger than the SD-WAN business over time just given the demand that you're seeing out there? Ken Xie 28:50 Long-term definitely will be our strong growth driver because when you get all these since connected, IoT connect and also the OT in that we also kind of suffer a lot of ransomware attack that they see the importance of protecting the infrastructure data there. So, we do see pretty strong growth. I think within the data received, we grow like a seventy seven percent year-over-year and is now is probably between six to ten percent for the business. Sometimes a little bit difficult to measure it. 29:23 I think they use the same product [for detail] [ph]. So, that's where we see pretty strong growth, but also it depend on the landscape and depend on how quickly people invest into this whether the 5G or some other part of this, kind of OT infrastructure, but this definitely is one of the strong growth driver for us. Hamza Fodderwala 29:48 Got it Well, with that, unfortunately, we're out of time. Thank you guys very much for joining us this morning, and have a great rest of your day. Ken Xie 29:55 Thanks Hamza. Peter Salkowski 29:56 Thank you. Question-and-Answer Session Q -
Scroll to Top