Palo Alto Networks (TICKER: PANW) Palo Alto Networks Inc Panw Jmp Securities Technology Conference Transcript
Palo Alto Networks, Inc. (NASDAQ:PANW) JMP Securities Technology
Conference March 7, 2023 1:00 PM ET
Company Participants
Nikesh Arora - Chairman & Chief Executive Officer
Conference Call Participants
Trevor Walsh - JMP Securities
Trevor Walsh
Good morning, everyone. Really happy to be hosting our keynote
presentation for the day today on day two of our conference. And really
happy to welcome Nikesh Arora, CEO and Chairman of Palo Alto Networks
to the stage to have a conversation with us. Welcome.
Nikesh Arora
Thank you.
Trevor Walsh
Thanks for being here. Nikesh, if it's all right, I'd like to just read
through your bio first, just to help kind of set a framework for kind
of maybe some of the things we will talk about and just give maybe the
folks in the room that don't kind of know your full history, give them
-- the summary.
Nikesh Arora
Sure.
Trevor Walsh
Terrific. Nikesh Arora joined as Chairman and CEO of Palo Alto Networks
in June 2018. Before joining Palo Alto Networks, Mr. Arora served as
President and Chief Operating Officer of SoftBank Group. Prior to that,
he held a number of positions at Google, during a 10-year span,
including Senior Vice President and Chief Business Officer, President
of Global Sales and Operations and Business Development, and President
of Europe, the Middle East and Africa. Prior to journeying Google, Mr.
Arora held the role of Chief Marketing Officer for the T-Mobile
International division of Deutsche Telekom. He was Chief Executive
Officer and Founder of T-Motion PLC, which merged with T-Mobile
International in 2002.
Mr. Arora serves on the Board of Richemont, a public Switzerland-based
luxury goods holding company; and as well as Tipping Point, a
non-profit organization that fights poverty in the Bay Area.
Previously, he served on the Boards of SoftBank Group, Sprint,
Colgate-Palmolive and Yahoo! Japan, among others. He holds a Masters in
Business Administration from Northeastern University, a Masters in
Finance from Boston College and a Bachelors in Electrical Engineering
from the Institute of Technology at Banaras Hindu University.
Again, great to have you.
Nikesh Arora
Wow! You read that out loud. All right.
Question-and-Answer Session
Q - Trevor Walsh
So Nikesh, lots to talk about. But I thought as we normally do when we
have keynotes at the conference, we start a little bit with about --
just about your background.
Nikesh Arora
Sure.
Trevor Walsh
And kind of how -- just get into your head a little bit. And I was
noted when I was going through your bio that you took the easy path of
being EE as a bachelor. So clearly a glutton for punishment. But in all
seriousness, do you -- how do you think that more technical scientific
background has kind of been leveraged or come into the various roles
that you've done and kind of throughout tech?
Nikesh Arora
Well, you missed the part, I actually tried to do what you guys do for
a living did last long. I worked at Putnam and Fidelity for a few
years, and I figured it's much harder to figure out what's going to
work that's supposed to try and make it work.
So technically, it helps. Look, every role that I've had had some
element of technology. So even what we do today in cybersecurity, it's
very hard to figure out where we should go as a business, if you don't
understand the bits and bites that flow through everything we do, or if
you got to invest in the Internet business, if you don't understand
what the Internet's about.
So my most recent area of incompetence is AI. So I'm working hard to
figure out how to -- how all this stuff is going to change our lives.
No, but it helps to have that grounding.
Trevor Walsh
How you -- whether it's been at Palo Alto or other roles, how do you
kind of maintain that technical -- on the product kind of and services
side of what you guys are doing? Do you have kind of certain folks you
kind of lean on to kind of get smart on things? Or do you do a kind of
self-study? How do you maintain that kind of technical know-how with
the products?
Nikesh Arora
Well, 4.5 years ago, when I came to Palo Alto, I didn't know what
cybersecurity was. There are some people in the industry will tell you,
I probably still don't know what it is.
I would spend my morning drive talking to our Founder, and then I would
spend the evening drive getting therapy from my Chief Product Officer
about everything my Founder had told me, which I didn't understand. So
between the two of them, they keep me honest. And then with Walter's
help, I must have seen north of 350 cybersecurity companies and their
management trying to understand what they do in an attempt to make
sense both of the industry and also what are the areas we need to work
on. So we end up buying 17 of those, so that was helpful.
But I guess it's been a journey of trying to understand that. And we
still maintain not that pace, but a similar pace with Walter and
myself, meeting a whole bunch of companies in any area we believe is
interesting for us. And most recently, I've been spending my time
reading every company's attempt to team the AI dragon. Everybody's got
now. I think about yesterday, HubSpot announced that they have
something called Chathub.ai. I think Marc Benioff said, Salesforce is
going to have it, AI bot, you can talk to and get data from. So
everybody is chasing the AI dream.
Trevor Walsh
Yes. Indeed. We'll, I want to get into the kind of AI/ML stuff around
particularly to Palo Alto and kind of what you're doing kind of across
the platform with it. And you've made some, I think, good commentary in
the last earnings call kind of around that. But I'll say that I want to
get ahead of myself.
You've done obviously a lot around as far as roles within orgs and
leadership positions, marketing, operations, et cetera, either at Palo
Alto now or even before, are there particular functions within the
business that you find yourself kind of gravitating towards or kind of
more passionate about? Or is it more CEO many hats?
Nikesh Arora
No, look, I think when I was at Google, I remember a conversation that
I paid and Steve Jobs and Steve's alive and Steve told Larry that
Google was not going to be very successful because Larry needed to
learn how to focus. And Steve showed you the power of focus on product.
We could say it's one of the most amazing product development companies
in the world for what they've been able to achieve.
But Larry proved him around the other way, Larry had a whole bunch of
products at work. And as a consequence, I suspect both of them are
equally valuable in terms of what they've been able to build. But the
underlying lesson from both their conversation was, if you're going to
work in technology, you have to constantly focus on the product. If you
don't focus on the product, eventually companies die.
So whether I like it or not, I spend a disproportionate amount of my
time creasing product, people working with them, trying to figure out
what they're working on and whether our product is resonating in the
market or not.
Trevor Walsh
How much, in those conversations, do you take it kind of externally
with mean you're obviously talking with customers all the time. But how
do you kind of balance sort of what your internal folks are saying and
helping them to get out of their bubble because you don't know what you
don't know? And how does that dynamic play out in terms of...?
Nikesh Arora
Well, the proof of the pudding is in its eating, right? We are in a
very competitive market, and you can be mark-to-market every day. Every
deal that's out there, you're competing with either Zscaler or
CrowdStrike or Fortinet, or firewalls or Exabeam, Splunk in the SOC
business or [where's some cloud]. So there's competition out there, and
our product team can tell me whatever they want, when I find out that
they lost a deal to somebody else and it wasn't for price or it was for
some product feature, then they're telling me something that they
haven't worked out.
So the good news is when you work in a highly competitive market,
you're getting feedback every day. And our teams are aware of that.
They work on it every day. We've been fortunate to be able to have
transformed into many different swim lanes of security and beginning to
see product market fit. And some we have more work to do than the
others, a little less. But again, the industry keeps changing. So we're
going to be on your tools now the big thing not to belabor it, but we
have an internal AI summit in a week or two. Every product team is
supposed to come back and write down how AI is going to change the
future of the product, not where they're going to embrace ChatGPT or
not, which is it seems part gimmicky to some of us, I suspect. But
there is a lesson there. So the question is what lessons are you taking
from it? And how are you going to adapt your thinking and your product
philosophy to adapt to this change in the market.
Trevor Walsh
Yes. Maybe one last question around just your history and experience.
What was -- do you think you're kind of -- of your 10 years -- 10 or so
time at Google, what was the single biggest lesson? You mentioned one
of kind of a good story or anecdote around that with Steve Jobs. But
just overall, what do you think you kind of gleaned as the most
important takeaway?
Nikesh Arora
I guess the best thing it teaches you, you want to be in a growth
market. You want to be in a market where things are growing. I don't
think I sweated any quarters when I was at Google. I must have done 26
quarters -- quarterly calls when I was at Google as Chief Business
Officer. I don't think I said it one of them. You could tell every day
what the revenue is going to be.
And if it wasn't going to be, then you couldn't do much about it
because it meant people weren't searching for the keywords and sold
those keywords. So it's a great business to be in, and you're spending
all your time figuring out how to scale the business on a global basis
and the demand was there. So it was a wonderful lesson in scaling.
And when you come to a place like Palo Alto, then you sit down, I
wonder how do you scale that business? How do you take it and scale it
because I think cybersecurity is as much of a growth market as any
other market on the world.
Trevor Walsh
Yes. But as you mentioned, it's changing fast and a lot.
Nikesh Arora
Yes.
Trevor Walsh
So it's a lot to keep up with. So that's a good segue. Let's dig into
Palo. And what are you excited about for '23? Maybe it's AI when it
fits that, that's okay. It doesn't -- I would say that's probably not
it. What's...
Nikesh Arora
I think at an abstract macro level, and I'm sure everybody has heard
this in some way, shape or form. But is not new news, the world is
going through a huge technical transformation. And I was talking to
your CIO this morning, and he's going to go transform to the cloud. He
needs another two years to turn everything upside down go to the cloud.
So I think it's not a secret. Everybody wants to go to the cloud.
You're going to see most companies going to -- pretty much every large
company, Fortune 500 or Global 2000 you talk to, in some way, shape or
form, they're going to the cloud. So they're going to use technical
transformation at one end.
Two, even before the conversation around AI, every company is going
direct to consumer, one way shape or form, right? Everybody wants to
get more engaged with the consumer. They want to have apps. They want
to engage with the customer. Like normal retail stores, which used to
be used to walk in, bought your stuff chose a credit card, now they
wanted to engage in the app. They wanted to give returns on the app. So
they've got a whole IT department working with them in the customer
engagement piece.
So I think -- it's needless to say, every company is going through a
lot of -- that is embedding a lot of technology in their business.
Technology is becoming a critical part of the business. They're
collecting a lot of consumer data, which means they are now susceptible
to bad actors getting access to that data. I think yesterday, the City
of Oakland had some data, which was released on the dark web because
they hadn't paid their ransomware bill. Guess what? Ransomware is up on
the rise again, right?
We're seeing more cases now than we were seeing a few months ago. So
this is a perpetual problem. It's not going to go away. Nobody's
plugged the holes. Like you can sit in a remote country from here. You
can go get paid in Bitcoin. You can ask them between $5 million to $20
million, you're going to get paid some amount of money for a few days
of labor.
And what it does is it causes havoc in a company over here and
everybody has to go upgrade their entire technical stack. So I don't
think cybersecurity is going away. I think cybersecurity is going to be
here to stay. I think there's a lot of technical debt we have not paid
in the cybersecurity space. Cybersecurity -- cyber risk is now the #1
enterprise risk for companies, one that they can try and manage,
excluding pandemics, et cetera. So it's a growth market.
So in that market, with the huge technological change that is going on,
now with the advent of AI, the people are using AI to write malware.
We're testing in our labs. We're trying to figure out if we can write
malware and go protect ourselves against malware written by ChatGPT. So
try doing that, right?
So I think, unfortunately, that's a gift I will keep on giving as long
as we keep going down the technology transformation path. So in a way
that's exciting because it allows us to be a mission-driven business.
We're trying to protect our customers, and we're going to go out and
build great cybersecurity solutions to our customers.
I think the big difference in what we're trying to do at Palo Alto is,
I was saying this to a bunch of investors earlier, there has been no
security company, which has been in a single swim lane that has stayed
evergreen in past a decade. So there was the endpoint companies, there
was the firewall companies, there was the next generation of SOC
companies. Nobody is actually a driver of swim lanes and been alive
past a decade in a way that people want to keep their money in there. I
think we are the first company, which has been around for 17 years,
which has reached a market cap of $57 billion by reinventing ourselves
and being in multiple swim lines. Today, compete in XDR with Microsoft
and CrowdStrike with SASE and Zscaler and Netskope in cloud with all
the upcoming cloud companies. We are ahead of every one of them and
firewalls with Fortinet, Check Point, Cisco. So we are now a player in
multiple spaces. We need to consolidate the market. And our aspiration
is to stay evergreen and keep innovating so that we can be around
probably a few decades.
Trevor Walsh
That's a perfect segue for me. So thank you. The consolidation story I
think is becoming just more prevalent now in the last call it 12 months
just with the macro and customers looking to produce ROI with whatever
they are going to additionally be spending on or whatever -- just
simplifying their stack. Everyone is talking about it. I think you
alluded to it just now. But how maybe as you look at those there
product pillars and the swim lanes that you have established, maybe why
is Palo Alto -- maybe it's a function of those three that you have
chosen, why is that the best kind of consolidation, why those -- I
guess why those three swim lanes if you will?
Nikesh Arora
Well, I think the Trevor it's kind of interesting. Five years ago, when
I started in this business, the industry wisdom was customers don't
want consolidation. They want best of breed. Everybody I talked to
whether it was a sell side or the buy side, they told me, look at the
industry, there is no consolidation that are best of breed companies
that are doing really well, they are worth $10 billion or $15 billion
or $20 billion. My thesis is somewhat different. I don't think we as an
industry gave the customer a choice to consolidate with great products
on the other side. As always, you had a great endpoint product and you
bought a somewhat mediocre product for CASB or somewhat mediocre
product for something else and you try to bundle it and sell to
customers.
Like, I don't want bad stuff. If this stuff doesn't work, and we get
fired, because it's a security, security is going to be good. So we
took a slightly different approach. We are now in 13 leadership
quadrants on the right in our product capabilities. So we can give you
best of breed, but we can also make it work together and we can compete
individually these players out there. So from that perspective, why in
these swim lanes we are in because that's where the puck is going. Like
SASE is a huge growth market, I think it's going to be a market that's
going to keep growing for the next few years. Cloud security is going
to be a huge market for the future. And I think the one big bet which
we announced and we made in the last few months is, we think the entire
SOC is going to get transformed.
The SOC is 15 years old. Nobody has built any technology to transform
it. People have been sort of feeding the old model of ingest a lot of
data, accumulate the data, try and run analytics against it. That's not
the new world. And guess what? And AI has been the tipping point, which
has made it apparent and we can go down that path as we want to, kind
of fill in a minute. But think that's where the next big opportunity in
cybersecurity is, and we are positioned with our XSIAM product to chase
that down.
Trevor Walsh
Let's go down that path. You've made comments I think that I thought
were in your way, humorous, and I am being a little sarcastic, but very
true that we are all in a kind of a frenzy around ChatGPT and AI. But
if you look at kind of the messaging, at least, of security, last five,
10 years, AI and ML has been upfront. Now, whether or not that was kind
of real or fluff, it could be debatable, but we've certainly been
talking about it within cyber as far as the benefits of kind of all the
data and using the power of those technologies to help kind of reign
that in and make sense of it all. So not necessarily anything new. Are
we at, I think with -- are we at some sort of new inflection point in
terms of AI do you think?
Nikesh Arora
Yes. Look, I discovered ChatGPT when I was on my way to India to go do
a graduation speech at my university with 37,000 people graduated. And
I was doing a bunch of research and I ran into ChatGPT that weekend. So
I was on -- sitting in Dubai waiting to catch a plane eight hours
later. I spent hours on that thing, and I analyzed that in 1989 when I
graduated, I programmed an ICL1904. For those of you who are not old
enough, don't worry about, it's a very old computer, which can barely
code.
Today, these two phones I carry have 10,000 times the computing power
off the computer I learned how to program on, 10,000 times. And that
was 30 years ago. Imagine if ChatGPT was 10,000 times more powerful
than 30 years, what would it be doing? I don't think it's going to be
10,000. It's going to be 1 million times more powerful. That's what
Jensen say is in 10 years. If it's 1 million times more powerful, what
would it be doing? So I think what ChatGPT is, I think people already
called it, I claim I called it first. If you go back and what's that
graduation speech, I was the first one to say, it's the iPhone moment
of AI. I think, everybody's discovered AI. You've never seen a 100
million users go flock to any product in two and a half days. You've
never seen in a grown men or women running large companies go and
embrace it as if like it's the flavor of the decade. Like suddenly
every CEO's announcing a ChatGPT type clone where it's going to get
embedded in their product.
Now if you step back and parse it, what has ChatGPT proven to us? It
has proven that a lot of data got processed. That data allowed a large
language model to learn, and then allows it to predict what the answer
needs to be for what you're asking. It shows you a bunch of creative
stuff, which is interesting, but it also shows you if you actually had
accurate data in there and you had AB testing, you knew what good was
or what bad was. It'll tell you what the right answer is. We're dealing
with the creative side of ChatGPT right?
I imagine if you knew AB what is good, what is bad. In security, we
know AB, we know what causes a breach. We know what doesn't cause a
breach. If I can train the data against this large language model, I
can actually predict an attack and stop it, right? There's a bunch of
stuff that we've been doing that. Why has it not happened so far? It's
great. You get it. You've been working on AI for 17 years,
unsupervised, supervised learning, and unsupervised for 12 years. Why
has it happened? It hasn't happened because we don't have good data.
Companies don't have good data. That's why we have good data. We put it
in Splunk. You put in Exabeam for the log data like, well, it's not
good data, because you collected from 40 different vendors. The vendors
don't talk to each other. I don't know how somebody else collects their
data. The question is, how can you get normalized security data in an
enterprise which you can trust? So our product, which we launched four
months ago, does exactly that. We've been working for three years. That
product's job is to collect all the data and enterprise between our
firewalls and the endpoints.
Firewall and endpoints make up 85% data in any enterprise for a
security use case. If I have access to 85% of good data in an
enterprise, I can run AI against it, and start doing real time
security. Today, all security is set up as post breach analysis
security. So I think AI is huge promise. I think it's going to
transform our industry. It's going to be an arms race, no pun intended,
to see who we can get this order faster.
Trevor Walsh
How do you -- around that data piece and kind of -- Palo Alto has a lot
of sensors to go and grab like, as you mentioned, the firewall, the
endpoint piece. How do you play nice in the sandbox with others?
Because invariably, yes, there's going to be maybe platforms within a
stack, but there's going to be multiple tools because security guys
want and gals want redundancy. They can't rely on one thing because
that's just...?
Nikesh Arora
That's the fatal flaw. They're going to have to rely.
Trevor Walsh
Okay.
Nikesh Arora
They're going have to rely. I think part of the problem -- part of the
reason we are in this mess today is because you have 40 different
security vendors. Here is a very simple thing. You deploy 40 different
security vendors in enterprise, guess who's responsible for security?
You. Because I don't know what the other 39 are doing. I don't know how
you configured them. I don't know if you're using them right. It's too
complicated. There's -- not every CIO and CSO in the world is so smart,
they can understand 40 different vendor products, understand how data
is manipulated by all of us, do real-time analysis against them and
stop a breach in action. It's impossible. It is -- it defies the laws
of physics.
So I think those days should be over. The only way to get done right is
that somebody collects all the data, analyze it. It's analyzed by
computers. At that point in time, they figure out where the behavior
analytics is -- so I'll give you an example. SolarWinds. Solar winds, a
big attack. We had a SolarWinds -- we had 18 SolarWinds servers at Palo
Alto, right?
We buy -- good IT people, our IT team said, "Oh, new software upgrade.
Let's upgrade the software." Which is what you do. As a good security
company, you upgrade your software, keep it to the most recent version
of software, an upgraded software. And we saw some unnatural activity.
The unnatural activity was the SolarWinds servers trying to connect to
command and control server in Eastern Europe. Now SolarWinds server
should never connect outside your company. That's how it's architected.
We had an endpoint sitting on the server like we do on every Palo Alto
product, which recognize this abnormal behavior. It was configured to
shut down abnormal behavior. So we shut it down. We didn't let that
SolarWinds server connect.
Now if we had instead collected the data -- behavioral data, put it
into a large data lake and put people with SQL queries trying to
analyze what's behaving abnormal and say, "[Expletive], you're trying
to behave normally yesterday, I should have shut you down. It was too
late. So you can't do post-breach security. There's a ransomware attack
in progress a few weeks ago. The entire time from initiation until the
time they extracted petabytes of data was 14 hours. They went into a
company, they took out the data -- terabytes of data in 14 hours. If
you hadn't stopped them just -- the data's gone. You show me the
current security architectures that are designed to protect that kind
of behavior, they're not, right?
So everybody have to get there. And until you do, there's a -- the sad
part is if you got breached last month, it doesn't mean you can't be
breached again next month. It's not like a COVID vaccine. In fact,
COVID, you can get us in 12 months -- in one month. So even that period
doesn't work.
Trevor Walsh
Yes. Well, so they only need one tool, one -- as a...?
Nikesh Arora
They will need a coherent architecture, which is designed to collect
good data, analyze it and stop real-time breaches. I'm not suggesting
we are the [indiscernible] and everybody should only deploy Palo Alto
and everybody [indiscernible]. Please don't read that. What I was
saying is you will need a much better security architecture which is
based on being able to stop real-time threats. That's the new game in
town.
Trevor Walsh
Can we talk SASE a little bit?
Nikesh Arora
Sure.
Trevor Walsh
Awesome. So you've talked about 15x opportunity within the firewall
base, just specific to SASE, and that represents kind of on a per
account revenue basis, 2.5x or so I think it was the latest number you
guys put out. So -- and that's the largest kind of open pipeline, I
think, for you guys. What are, in your mind, the top requirements,
whether it's internal process-wise, go-to-market product for you to
kind of capitalize on that opportunity going forward?
Nikesh Arora
Look, we've been in that business for three years in the SASE business.
When I came to Palo Alto, we had 25 engineers working on it. Now we
have north of 800 people working on it. We have an architecture which
is now, we think -- for those of you who are -- everybody must know
SASE, but not go these gathers security exports.
So -- but for those who are not, just two people in the room,
basically, when you access your company's applications off your laptop,
you're sitting here and accessing, you're going through some sort of
connection to connect. You have two choices. You can connect to a VPN,
which many of you probably do or you can use a SASE product to connect.
When you're connecting, you connect to one of two apps. You're either
connecting to a ServiceNow or a Salesforce or a Workday, which is a
cloud SaaS app or are you connected to a proprietary app in your data
center, which is what you're doing.
Outsourcing that whole process of securing that traffic from where you
are into your data center and back or into service non-back is
effectively SASE. It's security and the network. The most important
thing to note there is, for the first time, you're outsourcing the
operations of your network to a security company. I don't sell your
firewall and go way anymore and your IT department operates it, I
actually run your traffic.
So when you log in, you're now moving to Palo Alto servers, and I'm
running your traffic. And I'm testing everything against security. For
that, it's very important that when you give your traffic to somebody,
you know that I can be alive and I can function all the time, and I can
give you 99.99% availability because if I can't, your business is sort
of impacted, let's just say. That's the big shift in going from selling
products to selling a service. We're actually selling a network service
in SASE. I worked at Google for 10 years. And I'll tell you, they spend
the most amount of money on building a network. They will give you five
9s of service, which is what we use.
So we basically said, we're not going to build our own network, we want
to take your traffic and move it to Google Cloud or run on Google Cloud
because they run a much better network than I could with a $7 billion
revenue business.
But then we also did another thing we said, well, what if Google Cloud
goes down? It does sometimes for a few hours, we hot switch you to
Amazon. So running our product on Amazon and Google, and we hot
switched the network traffic from one to the other. So I can give
99.99% availability. We believe that is the right architectural choice
in the future.
Now we've done $1 billion of business in the last 6 quarters on SASE,
where we basically taken large organizations. Our largest data last
quarter was $45 million over three years. I'm not sold to $45 million
firewall deals since I came to Palo Alto, sold last year -- last
quarter in a SASE deal. Our SASE pipeline is the largest. I think a lot
of companies are still under journey towards SASE. You're going to see
that across the board. The U.S. government announced Zero Trust
initiative last week. They said Thunderdome was approved by Department
of Defense, the SASE project. There's going to be a lot of SASE.
Trevor Walsh
Do you -- it brings up a lot to unpack there, but probably what's I
think most interesting is your point around security taking -- security
company can take in control of the kind of the just the basic network?
Nikesh Arora
Operating, not control. Control is a dangerous word. We operated for
customers.
Trevor Walsh
Right. Yes. You're -- but either way, you're moving into more of the
kind of traditional operation -- just basic IT operation space?
Nikesh Arora
Network operations. Yes.
Trevor Walsh
Network. So how does -- there are I've dealt with it on the endpoint
side in my prior life. There's always kind of -- there's different
bureaucracies within an IT org between security and kind of -- how do
you manage through those? Or what are you seeing, I guess, with
customers in the SASE realm of kind of taking over some of those?
Nikesh Arora
Good customers, typically both the network team and the security team,
are involved in SASE decision. They are. But the biggest question is,
what is your break-fix process? If your CEO is trying to access an app
on their laptop and it's not working, who do you call? And do you have
the tools and capabilities set up that it's going to work and you can
go -- you can troubleshoot it.
Trevor Walsh
How is the -- kind of from a sales field perspective, you have probably
a lot of sellers that are come up and just selling security products.
How is that transition over kind of having more of that operational
discussion and taking some enablement there? How is that...
Nikesh Arora
What's interesting is I don't think there's enough of a network
conversation yet on SASE, which is bizarre. I think there should be. I
think customers should be demanding to see what your network looks like
and how you -- what is your processes to come back up. What do you have
to troubleshoot it? I think you will see more and more of that as more
and more people deploy SASE and as it becomes more of a prevalent. But
yes.
Trevor Walsh
You've alluded to it a little bit, I think also in your comments, but I
mean there's obviously the two schools of thought around how you
architect a SASE kind of offering, one using hyperscaler's public cloud
and then versus proprietary networks, points of presence, et cetera.
Does the customer at the end of the day, if they're getting the same
type of uptime and SLAs, do they necessarily care which one they use? I
mean they can see maybe the risks of kind of one or the other, but at
the end of the day, if the offering to them like things are up and
running, and it's the same, do they care, I guess, is it make...
Nikesh Arora
They should. Because the only one way to find out if it's going to work
or not, if it goes down. So the risk is if the proprietary network goes
down, there is no recourse. You don't have a hot switch anywhere. If
you're using a hyperscaler, I can do a hard switch, then there is
recourse. It's the architecture that we've made, we think is going to
-- it's more expensive to run it on hyperscalers than it is to run your
own proprietary network.
But let's be fair. We're a $7 billion company, have 15,000 employees.
Imagine we run -- we're getting in close to about 10 million end users
we run on SASE. Imagine if that number goes at 5x or running 50 million
end users at any point in time, I'm running a network in 150 POPs, 150
countries. One goes down, how am I going to manage it? That will become
a network services company. We're staying $7 billion company, which is
we are the largest obviously getting to $7 billion. Imagine we're a lot
smaller, I just think it's -- you've got to be good at one more thing.
I think there are people who are better at.
Trevor Walsh
Do you think -- any -- what about kind of the Azure piece will that
kind of that -- is there a need or a kind of a benefit of kind of
partnering with them, too? Or what -- how is that in terms of the mix
of the offering?
Nikesh Arora
Look, there are customers who demand that we reported to Azure, we
will. We're not beholden to any one cloud. Remember, there is a cloud
security stack, which we have, which works in the public cloud. And
there's a network stack that they provide. As long as the network stack
works, which it does, we can easily put the cloud security stack onto
their -- which, by the way, we already run firewalls in all public
clouds, including Oracle. So we can run firewalls in Azure today.
Trevor Walsh
That leads -- points a little bit towards Prisma and just all things
kind of cloud security and shared kind of security models, et cetera.
But maybe before we leap there, let's do a little bit of just talking
about product line revenue and hardware.
You've had really great quarters of good -- really excellent
performance on that around with this current refresh cycle. And you've
spoken at length, I think, especially throughout last year, around all
the different factors around COVID and supply chain challenges, macro
pressures, et cetera, that kind of have influenced this current refresh
cycle.
You've also made, again, in your way, very humorous comments around, I
think, just -- and I'm paraphrasing here. The -- it's not like the
firewalls at the end of their life are going to inflow or blow up and
customers realize that so -- which I think is a good point.
And so I guess the -- lead to the ultimate question, do you think we
will ever kind of given the change of the -- of this refresh cycle, do
you think we will ever go back to kind of a "normal" type of cycle, I
guess?
Nikesh Arora
What is a normal cycle? 5 years of running a security company, I don't
see normal. I've seen pandemic. I've seen [indiscernible] beat the
world down on interest rates. I've seen supply chain events. I've seen
the great Silicon Valley hiring. I've seen the great Silicon Valley,
which you call it, dehiring right now? Or what are they calling it?
So there hasn't been a normal yet. Like I think when I came 5 years
ago, there was a general thesis that hardware was going to decline as
people go to the cloud. The market has shown us some degree of
seasonality because of all these confounding factors between supply
chain and all the other stuff. So I don't think hardware is going away.
There are still some use cases or hardware. If you're running a large
financial service organization, you're processing lots of traffic,
you're probably better off running your own data centers as opposed to
going to the public cloud.
And you see that already, most banks don't run their large transaction
processing systems. They're not moving them to the public cloud. It's
expensive, and they're not purpose-built for this thing.
So hardware still is the best solution for high throughput, low latency
period than software. And that's why it's being used in most cases. And
when you're running offices or campus or data centers, you're going to
have a big box. The boxes are actually getting bigger, not smaller. In
Palo Alto, we went to the cloud. Our box and our campus tripled in size
because I see got to move all the traffic in and out of my campus.
So there is a use case for hardware is not going to go. Is hardware
going to be growing at 30%, 40%? I don't think so. I think the
underlying hardware growth is single digits. I think it's going to stay
there for a while. In the meantime, there's also share shifts going on
in the market because the whole paradigm was, let's get parables who
bought like IT, let's get two vendors.
Today because the cloud is there, the customers don't feel compelled
that I got to be in two vendors. As long as I'm on one vendor in the
firewall, I'm in the cloud, I still have redundancy between the two
architectures. So you're going to see consolidation on hardware, which
you're seeing in the market.
There are a few share donors, there are a few chair-takers in the
market. You're going to see hardware limp along at normal, perhaps in
single digits, low single digits. And you'll see some of the, I'd say,
confounding effects perhaps normalize in the next 12 months.
Trevor Walsh
Got it. Okay. Well, so if not normal then, that's fair. I get it. were
there, I guess, maybe lessons that you've taken from this more recent
not normal phase that you think you can carry -- whether it's supply
chain or whether it will maybe help make you stronger kind of on the go
forward?
Nikesh Arora
Well, there was -- it was supply lead times now feature weren't a buck
because we weren't able to ship everything and the costs were too high.
And now that everything is available and we can ship everything, the
gross margins are higher.
So it's good, don't ship a lot of product when you're having to pay a
lot for the cost of goods. I think we're beginning to get to normal. I
think you're beginning to see across the industry that people are
unwinding their backlog, things are normalizing. Supply chain prices
are going away. Lead times are shortening forward there in the next
three to six months.
Trevor Walsh
Cool. As far as the installed base, 60,000, give or take, firewall
customers. How important -- and you've talked about again on the calls
and as is other cyber within our coverage about just how it's easier to
just generally upsell in this current environment than new logos. How
important is new logo generation for Palo Alto for your kind of next
phase of growth and your kind of mission to get to top of us?
Nikesh Arora
I think it's important to understand that the fact that somebody has
our firewall does not make them walk up to me and say, "I'll buy your
cloud because I have your firewall or I buy your SaaS because of a
firewall. So for me, we've acquired 4,500 net new endpoint customers,
which were not Palo Alto endpoint customers. We acquired north of 2,000
cloud security customers who were not cloud security customer. They
were customers of Azure, GCP and AWS, not of ours, they might have been
on the firewall side, but they didn't make them by cloud.
And so we bought -- we've got SASE customers who were not SASE
customers. So we are acquiring net new logos in all these new
categories that we have. It does help if you have a happy firewall
customer where they have a good reputation, they have a relationship
with us that allows us to open the door. But once you're in the door,
you got to prove yourself again on the merits, which goes back to the
whole conversation about you can't sell mediocre security products into
customer bases because CSOs get fired for bad security products.
Trevor Walsh
Is there a particular subset of within either the pillars where, again,
from a absolute kind of net new perspective that you're finding kind of
if someone hasn't had any kind of exposure to Palo that you're kind of
-- is it still firewalls? Or is it now kind of getting more into that
SASE realm?
Nikesh Arora
There are more net new customers in SASE and XDR than there are in
firewalls because pretty much everybody who wanted a firewall has one.
So either they're existing Palo Alto customers or existing half
follow-up to customers or there's somebody else's customer who's going
to rip out somebody else's firewall and put us in.
So there are very few Fortune 500 companies being created in 12 months.
It takes a while. So usually, they have a firewall that they need to
place or they want. So they usually most net new logos are coming in
the form of somebody who want to do a network transformation or
somebody want to do a cloud transformation or a soft transformation.
Trevor Walsh
Yes. As far as just kind of market -- mid-market more down-market type
of movements, can you talk to us a little bit about SASE's -- or excuse
me, Prisma's ability, just given that it is a nice kind of robust set
that you guys have built out, obviously, kind of over the last few
years to...?
Nikesh Arora
Are you talking about cloud or SASE?
Trevor Walsh
On cloud, on Prisma side. Prisma Cloud, on the cloud security front,
how are you finding -- just because, again, that breadth of offering is
well developed and there's a lot of things you can offer is that how
attractive is that for a mid-market business necessarily have an
account that doesn't have the resources to?
Nikesh Arora
So I think it's important to parse the cloud security opportunity for a
second. If you look at the combined amount of public cloud sold by the
hyperscalers, the Amazons, Googles and the Microsoft the world, this is
the hundreds of billions of dollars, right?
Rule of thumb, cloud security should be 2% to 5% of that spend on
average. So we, at Palo Alto, spend close to $250 million a year. Our
cloud security spend is slightly on the higher side on the 5% range,
but we should be spending $10 million to $15 million in our own product
because we use it fully to protect us of cloud security.
So that's -- in my mind, that's normal, right? To go back to your word
normal. So if you believe that, that should be the amount of money
spent on cloud security in a normal circumstance is not being spent
today. And it's partly because most customers are not fully deployed,
partly because people are using some sort of point solutions, partly
because they haven't fully understood the impact of a cloud breach. So
I think it's an industry evolution.
Now we see that our cloud security consumption goes up pretty
consistently 40% every quarter -- 40% every year, quarter-over-quarter.
So we're seeing a 40% growth in people deploying cloud security, which
means we're seeing consumption in the market. We'll get to about $1
billion TCV in the next 12 to 18 months, which is a good start for us.
So in that context, I think we're early in the cloud security space.
Having said that, if Palo Alto, which is probably in Fortune 500, #500,
if you're spending $250 million a year in a fully deployed state,
there's no reason why there shouldn't be hundreds of other companies in
that state.
So our focus on cloud is on larger customers, which can spend $10
million to $15 million a year in the long term. We get a few hundred of
those, that's real money. So we're really focused on customer
acquisition, net new logo acquisition, expansion within the customer
where we have 9 different modules.
And as I mentioned, our largest deal last quarter was $38 million, with
one customer, which probably is the combined ACV of some security
startups out there of one deal. So we'd like to do a few more of those.
Trevor Walsh
Yes, absolutely. Let's -- can we switch gears and talk about the new
MDR offering a little bit.
Nikesh Arora
Sure.
Trevor Walsh
That would be great. Recently launched through Unit 42. And there's a
lot of -- and really good metrics or performance around the inaugural
MITRE assessment of those solutions, which is great to see. Can you
just maybe walk us through or explain kind of what you thought the kind
of primary drivers of you guys launching into that pretty fairly
crowded field of managed security?
Nikesh Arora
Yes. Look, if you look at it, you saw this basic inflection point and
end point companies where you had the McAfees, Symantecs of the world.
Suddenly a whole new wave of EDR and XDR companies came about, they
were 10 or 11 at their peak. I think it's consolidated down to four and
possibly may even go down to three at some point in time, which tells
you the market is competitive. We are seeing -- we have north of 4,500
customers in that space from a standing start. These are complex
products. Customers would prefer if there was some but who came along
with the product and allowed you to actually understand what the
breaches were, what the instances are, what the behavior and analytics
are telling you.
So there is a need in the market, especially for the midsized companies
to have some sort of managed service. I think this managed service is
an interim step before we get into this full-blown AI model requires a
fully managed stock over time. those socks are typically managed by the
IBMs, the Infosys, the Deloittes of the world. And you'll see that
these MDR things will start migrating towards managed SoCs over time.
Trevor Walsh
Is there -- within either Cortex or with any of the pillars, is there
kind of a thrust or a priority of effort around what you're kind of
doing within the MDR in terms of which portion, I guess, of the
portfolios you're leading with or that...?
Nikesh Arora
No, it's really -- so look, if you want to get into a detailed
discussion, like the thing is, I think the XDR or the endpoint business
is in interim state. I think eventually, it all converges on the slot.
I think the MDR and the SOC spaces are going to emerge. It will become
an AI game, as we started talking about in the beginning, I think right
now, it's all crutches for people who are not able to deploy the
capabilities where everybody capability. Eventually, you want an
autonomous SOC. You want the stock to look at data, understand what the
behavior issues are, not have to spend too much time configuring and
running policies and watch bad access stock. That's what you want.
Today, we say, here's a tool, go configure it yourself, we figure it
out, then it gives you an alert and have some people analyze the alert.
See there's a problem about it. That's too much to DIY to your
customers. You want to get to a place we're saying, I come in, I deploy
the tools and I give you better security outcome. That's what you want.
That's what XSIAM will do. That's what managed SOCs will do. For that,
you will need consulting services associated with it. Long term, we
don't want to be in the consulting services business. There's
established businesses out there, they have different margin structures
than ours. They want to be the product business, to build great
products. We'll partner with consulting companies, they'll provide the
full managed SOC. In the interim, we'll make sure there is transitory
services allowed where we can manage endpoint response with our
customers.
Trevor Walsh
Great. Cool. I'll open it up for questions here in a second. But just
for maybe anyone in the room that's maybe newer to Palo Alto or kind of
newer to the story or considering it kind of as a potential investment.
Any parting words or thoughts that you might have for?
Nikesh Arora
Yes, I was -- I asked Walter this morning at 4:00 o'clock. I e-mailed
him and he responded back at 4:30. Let's just remind me, again, where
we have come in the last 5 years. We have in 5 years, just tripled the
revenue of the company, we tripled the EPS. We started a 21.8% margin
when I joined in 2019 -- 2018, and we're back to a 22% operating
margin. We've done a huge sort of resetting of the company investment
cycle. I see no reason why we couldn't do similar things in the next
three to five years of our company, especially now where we believe
there is operating leverage at the scale that we have, which is what
we're guiding to from a margin perspective.
And our free cash flow margins are healthy. As interest rates
[indiscernible] right, and started getting 5% or 6%, that's an uplift
to free cash flow margins because we have $6 billion of cash on our
balance sheet. We generate north of $2.5 billion of cash a year. So
okay...
Trevor Walsh
Awesome. Questions for Mr. Arora.
Nikesh Arora
Great. There's a sale before 1:00 o'clock. You can buy a lot of stock,
just kidding.
Unidentified Analyst
So which products does the SOC, XSIAM typically displays and within the
[indiscernible] more security or IT use cases?
Nikesh Arora
It's only security. So the product that XSIAM over time should replace
your data lakes, in your SoC because people collect a lot of data to be
able to post-breach analysis. We normally allow you to ingest data into
exome like you would with any other large data lake. We can ingest 400,
500 security vendors worth the data. But on top of that, we normalize
that data to allow it to be AI ready.
And then we have a bunch of AI layers that sit on top, but we just
launched something last week called ITDR for identity threats. We
ingest on identity data in there. We can analyze that against your
firewalls, against your endpoints. We have other endpoint-related
analytics that we're going to run on it, and it also can replace your
SIEM. So it's a full unsecured use case. It's the next-generation SIEM
tool. That's what we call it XSIAM but has embedded automation in it,
so you can actually automate away some of the alerts that you get. So
you can keep it.
Look, the fundamental problem in security has been you collected a lot
of data, a lot of alerts. We used to get 67,000 horsepower of networks.
And the or sought would get a prioritization saying, these are the
important ones to pay attention to these Guess what, the bad actors
know how we prioritize these like, "I want to slide in from the
bottom."
So we took a point of view of saying, oh, 67,000 have to vanish. You
have to solve all of them. You can't solve 67,000 alerts. So with our
product, which we started using internally first, we eliminated 50x the
alerts by cross-correlating data between endpoints and firewalls.
Then we cut it down another 8x by automating. So we're down to 137
events at Palo Alto a week, which we have four people analyzed. But
that gives us 0 exceptions. If you run a SOC with exceptions, the bad
guys will figure it out. You have to run a SOC with 0 exceptions.
That is why we think it's an inflection point in the way SOCs need to
be managed. That's why I'm excited about it. Again, I don't want to get
ahead of my skids. It's been 4 months, we're still building the
product. We're 70%, 80% there, but [indiscernible] a new paradigm that
is needed in the SOC.
Unidentified Analyst
Can you talk about how XSIAM is [indiscernible] to driving XDR
adoption?
Nikesh Arora
Yes. Look, one out of the 14 customers looked at our products, I really
like your XSIAM product, but can you make it work in my endpoint agent.
I said, our endpoint agent collects 200 megabytes of data per day. If I
use your existing endpoint, I get 5 megabytes of data from them. I
don't have enough data to cross-coat everything else. So my product is
not going to be as effective as if I was to go with an end point -- so
that customer ended up buying XDR first, deploying it to be ready for
XSIAM, right? Because for the first time, we're trying to give an
outcome-based orientation and saying, I can reduce your cycle time from
days to minutes. What do I need to do?
Unidentified Analyst
[Question Inaudible]
Nikesh Arora
Yes, look, when I mentioned when 2018, our operating margins were
21.8%, and we took them down to the 17% in 2020. And part of that was
we had to reinvest in the company because we had technical debt we
hadn't paid. Our R&D costs, our R&D proportions were off because we
were not investing in XDr, not investing in SASE.
And then when you invest and you have no revenue, then you're in a
situation where your cost base goes out of whack. Today, after 4 years,
we built a north of $1 billion TCV business SASE, cloud and XDR in the
next 12 to 18 months, which are all going to start. And you know what,
TCV is ahead of revenue.
So our revenue waterfall from these products is kicking in at high
growth rates, which is allowing us our costs to start getting amortized
much easier across these numbers. That's kind of like one, is a pure
math outcome. Two is, yes, the environment has helped because one year
ago, at a similar conference not too far from here, I was being asked,
-- there's this huge crazy thing where it's very hard to retain people.
What are you doing? Are you going to spend more money for attention?
There's people who are being posted by every other company, why are you
going to increase your wage budgets? Today, it doesn't seem as a
problem. I can retain my people, my attrition is down. People are happy
working at Palo Alto. We haven't gone through a big rightsizing as many
of the companies in the tech space. So this is a better time as an
employer than we had 12 months ago, which allows you to be a bit more
rational and say, "Listen, can you get this project done with four
people instead of six? And I say, yes, I can get it done. Just don't
ask me to take to out. So it's a different environment.
Unidentified Analyst
You want a glib answer or real one? The glib answer is the customer. If
the customer doesn't want my product and they're a public company, then
I'm a deep ship, so that is my biggest competitor. The customer says,
you're not the right person. I'll go get it done myself.
On a more serious note, I think I peel back from a macro perspective,
as I said, there are very few single swim lane cybersecurity companies
that have survived cycles, whether it's endpoint or whether it's
firewalls. And they eventually plateau. They are $10 billion to $15
billion company to end up being operating margin cash flow companies,
which, over time, lose their competitive edge and innovation edge.
So that's one part of it. Now having said that, we've showed the market
there as reinvention possible. There are still some new wage companies
out there in the security space, which would definitely evolve and
getting multiple subline. So there is hope that there will be two or
three other people out there. SASE, Zscaler is a formidable competitor,
CrowdStrike is a formidable competitor in the XDR and SoC space.
Fortinet's a formidable competitor in the firewall business, but none
of them have the other two pieces.
I think the other one out there is Microsoft. They are very good at
what they do. They have a large established base on identity. They have
large tables based on endpoints. So -- and they're active in the
security space. And by most accounts actually have a bigger revenue
number than most of us.
Trevor Walsh
Maybe one more. Yes, sir.
Unidentified Analyst
[Question Inaudible]
Nikesh Arora
So we have a solution for IoT OT or we take a slightly different tack.
Our tack is we have 61,000 firewall customers. Every IoT OT device, we
see the traffic on the network. We identify the traffic on the network,
and we segment them away. So they don't get interfere with the core IT
network.
Our approach is that we don't think you need to go deploy yet another
sense. But the biggest problem of security is that -- everybody who
wants to deploy good security says, please deploy my sensor. Every time
you deploy one more sensor in the infrastructure, you're introducing
another vendor into your infrastructure and you've got to understand
their alerts, understand how they work.
We're seeing you don't need a new sensor. You can use our existing
sensor of the firewall, you can go use another pane of glass in our
PAN-OS and you can do that from an IoT OT perspective. So we have a
slightly alternate view. Look, there's a lot of billion-dollar unicorns
in security that are out there. Now at the end of the day, the question
is when do they become profitable? When did it become companies that
are formidable.
I think IoT OT will be a narrow swim lane. And I think eventually, it's
a feature of large security enterprise operations as opposed to big
enough for themselves, but what do I know?
Trevor Walsh
Great. I think that's all we have time for. I want to thank you Nikesh
for being with us. This has been terrific. So thank you, and have a
rest of the week.
Nikesh Arora
Thank you, guys.
