Palo Alto Networks (TICKER: PANW) Palo Alto Networks Inc S Panw Ceo Nikesh Arora On Morgan Stanley Technology Media And Telecom
Palo Alto Networks, Inc. (NASDAQ:PANW) Morgan Stanley Technology, Media
and Telecom Conference 2022 March 7, 2022 12:10 PM ET
Company Participants
Nikesh Arora - Chief Executive Officer and Chairman
Conference Call Participants
Hamza Fodderwala - Morgan Stanley
Hamza Fodderwala
All right. Well, good morning, everybody. Thank you for coming. It's
great to be back in person. For those who may not know me, my name is
Hamza Fodderwala. I'm the cybersecurity analyst here at Morgan Stanley.
And this morning, I have the pleasure of speaking with Nikesh Arora,
CEO Palo Alto Networks.
Before I begin, just a brief programming note. For important
disclosures, please see the Morgan Stanley disclosure website,
www.morganstanley/researchdisclosures.
And with that, Nikesh, thank you so much for joining us this morning.
Nikesh Arora
Thank you for having me.
Hamza Fodderwala
All right. I want to start the conversation around company evolution.
So you joined about four years ago as CEO. You've driven some pretty
significant change. Can you walk us through where you are in that
process, that evolution? And how would you describe the evolution over
the next several years for Palo Alto Networks?
Nikesh Arora
Yeah. So I guess it must have been 3.5 years ago, sitting up here with
Keith Weiss and we're talking about what cybersecurity needs to do. And
many investors had a question, no cybersecurity company has actually
run the full course. You see companies come, they run the playbook,
there's a swim lane, they get to a certain market cap, and then there's
the next sort of flavor of the next generation shows up.
So we sat down and tried to figure out where is the puck going. And in
terms of that, cybersecurity is driven by the evolution of technology.
So to see where's technology going accordingly, you've got to make sure
it's secure. And we made a big bet that the cloud is going to be big,
wasn't kind of hard. It's kind of like the plastics moment. We said,
we're going to reorient the company towards building cloud security.
We also said the consequence of the cloud being big, you'd have to
fundamentally redo your network architecture. All network architectures
are back to the company data center and back to the user. We said you'd
get to get a more distributed network architecture.
And last but not the least, it doesn't seem precise, like AI and
machine learning are going to have a big impact on how secured needs to
happen. So with that in mind, we set about three years ago, and we
reoriented our portfolio in the process - we had a lot of technical
debt debate. We bought about 17 companies in 3.5 years. We paid $3.5
billion to do that. But we got to a point where we felt now, we're
technologically at the leading edge, and in some cases, perhaps the
bleeding edge, as far as cybersecurity is concerned.
And in that context, there's this wonderful thing I've learned in
enterprise called, Magic Quadrants and these beautiful two by two
graphs, you got to be in the far right corner. When I came, we were in
one. Today, we crossed 10, in the top right corner, and in being the
leader in 10 different categories of security. So that tells us that we
did manage to get through the technological transformation. So that's
where we are. Do we keep going?
Hamza Fodderwala
No, no that's perfect. Can you talk about how buyer behavior has
changed since you joined? So obviously, cybersecurity is the forefront
of mind for many companies, and how do you think buyer behavior is
going to change going forward?
Nikesh Arora
There's no secret that the awareness of cybersecurity is high. This
morning, I was watching CNBC, and they asked the CEO and President of
New York Stock Exchange, how are they thinking about cybersecurity?
Asked the CEO, PG&E or PSG, somebody like that. And everybody now
suddenly has to answer questions on cybersecurity. I can't imagine five
years ago, you'd be asking the CEO, how secure is your infrastructure?
And are you worried about the risk of cyber attacks?
So today, with there's a heightened degree of awareness, that awareness
forces CEOs to pay attention to the topic, forces boards to pay
attention to topics, which means there is more of a focus on getting
security right than there ever was. So you're seeing the pressure come
from the top in terms of making sure the infrastructure is secure. And
it's important because any financial services company, the
infrastructure gets breached, they'll be shut down in three days. I
think as generally speaking, we're woefully ill prepared for what could
happen to the technology infrastructure in this country around the
world.
Hamza Fodderwala
Yeah. And that's a good segue into next question. So it really does
seem like a demand environment, security is stronger than it has been
in several years. And now you have, obviously, the Russia/Ukraine
tensions. There's risk of cyber warfare being a potential major theater
in this conflict. What have you heard from some of the largest
organizations, both public and private, that you work with? Are people
worried about this? What's the - I guess the temperature in the room,
if you will?
Nikesh Arora
People are worried about it, but it's yet another risk. People are
worried about a lot of risks. I think the debate have gone from not
whether I'm susceptible, or whether I could be hacked. The debate is,
if I did get hacked, how am I going to get back up again, and up and
running. So there's a lot of focus on work this new practice called
Cyber resilience. Like if I get impacted, how do I stand up and get
better again? But technology buying cycles are three to seven-year
cycles. You bought something sometimes doesn't come up to refresh for
five years or seven years.
So the fact that we started talking about cybersecurity last year
doesn't mean the demand sustains for one year. It leads to the next
seven years. People have to get through the old infrastructure, replace
it, because nobody's going to tripling or quadrupling their
cybersecurity IT budget. So you will see that there's a five to
seven-year cycle it's going to take if you get it right. If you get
your cybersecurity, right, you still have to spend money for the next
five to seven years. This is not a six-month demand cycle or war
inspired a stimulated demands like this is a, I think, secular change
over time. That's going to happen because people get more and more
fixated on upon fixing this cybersecurity.
Hamza Fodderwala
Yeah. And all that secular change going back to the demand environment,
again, it's been really strong. What do you think you would attribute
that to? Do you think there's been a expansion in the attack surface
area for more distributed workforces, and obviously, more remote
computing?
Nikesh Arora
Well, we are going through, I think, it's one of the biggest tech
spending cycles ever in history. And cybersecurity, as I said, it's
driven by tech spending, not only are we going through a big tax
planning cycle, we're going through a sort of technological
transformation in the midst of it. We're seeing people go to the cloud,
shutting down data centers, you're seeing people rearchitect networks
that required to go create the security infrastructure needed to
support that.
So I think that's part of it. I think the volumes of post-pandemic are
still higher than the pandemic world. And so people thought we were
seeing tech volume go up or transaction volume go up, because we're in
the midst of pandemic, now people go outside and volumes of all, that's
what happening. The volumes are going up, which means suddenly, people
who would sort of hope that this would be a spurt in tech spend and
it's going to normalize, it's not normalized yet. I think you add all
of those things and go back to what I said earlier about the heightened
awareness of cybersecurity, thank you to demand here to stay for a
while.
Hamza Fodderwala
Yeah. So how is one of the few cybersecurity vendors that really
addresses pretty much all the vectors within an organization from your
network cloud endpoints. And you talked about how you're consolidating
more of the security budget. At the same time, it seems like a broader
security market is still as fragmented as ever been. You have a lot of
smaller companies that have been seeing some pretty prolific
fundraising. I'm just curious, like, where do you see customers
willingness to consolidate these days? And do you think that's going to
change within? Kind of what's your general strategy around here?
Nikesh Arora
So 3.5 years ago, when you asked people, why do people not consolidate
around a single cybersecurity solution? The challenge was, there was
not many people out there who offered you a single cybersecurity
solution. And even then people wanted to get best of breed. So how do
you create a solution, where you have best of breed solutions, as well
as the fact that they work better together.
So the last 3.5 years, we're getting closer to that. It's a fragmented
market. But since about $160 billion market, we used to have 2% share.
We probably have 3.5% share. There's a lot of room. And when you can
showcase that data of your products are industry-leading in the
segment, then you start to see some degree of consolidation begin to
happen.
Over the weekend, I was spending time with some enterprise CEOs. And we
were joking, because I said you knew nothing about enterprises, I still
don't. I said, the only math problem I was trying to solve was, if you
want to double the revenue, we either have to double the number of
customers and sell them the same thing, or sell twice as much the same
number of customers. So when I came to Palo Alto three years ago, our
largest deal was $28 million, over five years.
Last quarter, two quarters ago, we did $100 million deal, or five
years. So we've able to Forex what one customer can spend with us. And
now if we could take that and double that, that allows us the
opportunity to go to our existing customer base, and give them more and
more security solutions because we're still only 10% or 15% of
anybody's cybersecurity spend.
Hamza Fodderwala
All right. That's super helpful. So when we break down the Palo Alto
business, you've got two elements, you've got the the network security
business - those are three elements. But the way that we think about
it, you've got the firewall business and the attached services, that's
about, let's say, roughly two-thirds of the business are a little over
that growing 20 percentage. And then you've got the next gen security
business, which is a lot of your cloud security solution, that's about
30%, growing roughly 70% or so. And it seems like, these are kind of
separate businesses, but they also work together and you're really sort
of attacking the cyber strategy.
So maybe just to start off on the network security side, a lot of that
is still driven by the product. And people probably ask you about the
product refresh. How long you think that last? Where would you say you
are within your customer base, as far as refreshing that because I
think people got confused when you made that comment about 65% of
security portfolio being refreshed, but it wasn't anywhere near your
customer base?
Nikesh Arora
Yeah. As for our business, we said, there is a - I've been trying to
say that for 3.5 years, and hopefully one day people will leave it.
There is a network security element to our business, which is a
composition of hardware and software. In the last three years, we have
transformed that business from 100% hardware to 60% hardware, 40% of
that business is not software.
Now of that business, 80% across the whole business is software
subscriptions. So 60/40 in hardware software, and then 80% of the
President's subscriptions within the network security area. And we're
going to keep driving that hardware to software change. And there are
two elements to that . One is fundamentally software solved security is
much more secure. Like if I had to go put a hardware box in this hotel,
and you have $500, it's going to take you one year to go down every
hotel and put a hardware box. We can light up all these hotels in under
a month and solve the problem the software.
So I think security over time is going to migrate towards software
delivered security. If you - first of all, from that perspective, that
business, the hardware part of that business is also a steady business,
keep continues to grow. The harder part of the business, we have
refreshed less than 5% of our installed base [Technical Difficulty] new
hardware solutions, we've lost the last six months. Now the typical
hardware cycles run from 18 to 24 months, sometimes 36 months. So a
hardware hasn't been refreshed our base.
Additionally, three years ago, we had four software subscriptions.
Every time we sell a box, we offer four different capabilities, which
you can buy with the box. We have taken that from four to 10 in terms
of things we can give you with a hardware box. So not only do we sell a
box of hardware, now we can attach 10 different solutions to that. So,
we're going to see a natural evolution of as you get to our base and
refresh them in better hardware, we can attach more software. So, I
think that's kind of our strategy to drive sustained growth on our
network security business.
On the other side, our cloud and endpoint business does the service
growing about 70%, and I think we're very, very early in the cloud
security space. It's not inconceivable that anybody who's going to GCP,
Azure, or AWS, or IBM, or Alibaba Cloud, is probably going to have to
spend $10 million or $20 million a year in cloud security.
Hamza Fodderwala
All right. Would the attach rate as far as like subscriptions per box
today? You said Forex...
Nikesh Arora
Robust.
Hamza Fodderwala
Robust, and it's been growing, is that fair to say?
Nikesh Arora
Yeah. It's occurring.
Hamza Fodderwala
Okay.
Nikesh Arora
You go from $4 million to $10 million.
Hamza Fodderwala
Okay. Maybe just a high-level question like, can you talk about the
shift from hardware to software? Where do you think we are in sort of
the pace of change?
Nikesh Arora
Smart people are very quick to rationalize stuff away. There's still
people still use hard disk drive somewhere in data center. So, I think
for the next 10 years, we're going to still see hardware being
purchased in the market, because a lot of companies will still own data
centers, the cloud is 20% to 30% more expensive. So, you will see
companies who will not move to the cloud and hang on to the data
center. I think the hardware demand sustains for that period of time.
From a change perspective, as we start to see these big network
security rearchitectures, you're going to see more and more software
come in. You're going to see more and more software get attached. But I
think the market will still grow in the mid single digits on that for
security.
Hamza Fodderwala
On networks or just firewalls?
Nikesh Arora
On network security.
Hamza Fodderwala
Okay. Got it. Just a question on supply chain. Why is Palo Alto been
able to manage the supply chain issues better than some of your peers?
Nikesh Arora
I think everybody is hustling, trying to make sure that we get supply
chain sorted. But nine months ago, every chip vendor cancelled every
order and said, we're not sure we can give you that three months ago,
they started giving you some visibility what you can have, you still
don't get everything that you need. But remember, it's a - I can't
remember the numbers are, but it's multi $100 billion dollar chip
industry. We need 100 and odd million dollars of chips. So it's not a
very, very small part of the overall chip industry. So as long as we
have enough supplies all of this stuff out of the market, we can get
it.
I don't think it's going to get easier for the next six months. We're
going to keep having to hustle, trying to find the chips. But our
hardware revenues grew about 20% quarter-over-quarter, which is on the
higher side for us as a company. And we still weren't able to satisfy
all the orders that we had. So we ended up building backlog because we
couldn't get it planned for 20%. Our average growth used to be high
single digits.
So we plan to have enough supply for 20% and we got the stuff. But we
had to ship at all. We still have unmet demand. So we've - I've never
had as much visibility in the last 3.5 years into my hardware pipeline
that I have today, like I kind of stopped shipping six weeks before the
quarter ends. Anything you order in the last six weeks, I have to wait
to get the stuff to ship it.
Hamza Fodderwala
Yeah, the visibility point is really interesting.
Nikesh Arora
But that's true probably in the industry.
Hamza Fodderwala
Yeah. You did mention that you don't see things getting easier. But
like, from a lead time perspective, would you say those have been
fairly stable on the product side?
Nikesh Arora
As far as like there's 300 pieces that go into building a box. In one
quarter, it's 10 pieces from one supplier and the other quarter 10
pieces from the other supplier. It's not consistently one particular
supplier. So - and Dipak and his team, our CFO, they do a phenomenal
job of bringing all the stuff together and getting it out there. The
lead times we know what's going to get in the next six months.
Hamza Fodderwala
On the margins within that network security business, they're really
pile ready, I think 40% the last time you disclosed it. You think
there's room for that to move up as you start attaching more
subscriptions and sell the premium maintenance, for example?
Nikesh Arora
Yeah. The network security business, the margin components are,
obviously, our hardware margins, which are impacted because of supply
chain and those should ease over time. There's the software solve our
product Prisma SASE, which competes in the SASE space. As we scale that
and we're seeing phenomenal growth there. As we keep scaling it, our
cloud costs which are the biggest cost than our customers' deployment
cost because cost over time start to amortize.
So you have a mathematical effect of those things, beginning to give
you more margin. And last but not the least, as you attach more and
more software subscriptions to that typically higher-margin products.
So I think the network security margins in the long-term sustain and
get better.
Hamza Fodderwala
Speaking on the component cost, you also did some price increases, I
think, late last year or earlier this year. Do you think these price
increases are going to be durable as we think about next year or the
year after? Or do you think eventually those would get eaten up by
distributor discount?
Nikesh Arora
The price increase you're seeing in the market, they're very leaky,
because a lot of them get negotiated away. So we're in a competitive
market, price gets negotiated away, the yield is very low. It's
typically the smaller end customer that gets the biggest brunt of price
increases. And other large enterprise customers get impacted that much
by price increase.
So we've actively chosen not to drive price increases out of our
portfolio. We've done 1, 1.5, maybe and we've seen people do 2 or 3,
probably big picks was more price competitive. But I - some people have
to cut prices again. Supply chain is not going to suddenly ease up and
not suddenly - I'm sure somebody is going to be left with a lot of
boxes or something after the supply chain receipts, can't be that,
you've got to figure it out perfectly. So prices will come down for
some people.
Hamza Fodderwala
Yeah, that makes a lot of sense. Maybe shifting to the next side,
again, roughly a third of the billings now growing in the 70s. The way
that we think about it, so you've got this next gen business at $1.5
billion run rate in billing, roughly, maybe a little less than
two-third of that is coming from the SASE and the SD-WAN side.
Nikesh Arora
About a third.
Hamza Fodderwala
About a third. Okay, fine. You've seen some pretty significant growth
on the SASE side. Can you just talk a little bit about your
differentiation versus other players in the SASE market like a Zscaler,
for example?
Nikesh Arora
Just an example, yeah.
Hamza Fodderwala
Is an example, yeah.
Nikesh Arora
Most of you must have heard that there's a huge trust towards doing
zero trust. And zero trust is this concept where you don't trust
anything that comes into your technology infrastructure, you have to
validate his credentials. Like that's why we all carry badges when you
go to work. Even if it's a security guard identify you say, hello
mister Fodderwala, how are you? Just please swipe your badge because we
don't know if you've got this employed or not, that's called zero
trust. I know you, but I still don't trust you. That's kind of how zero
trusts work has been working in security for a long time.
A zero trust means that you have to make sure you're treating
everything consistently. So our differentiator is people use our
firewalls in the data center, they deploy security policies. Now when I
work from home and I log in, I'm not in the office. So the security
policies being applied to be a different. You have to be consistent for
you to deploy zero trust. If I'm running a workload in GCP, the same
policies need to apply. So we're the only cybersecurity company, which
can deploy the same security policies in your public cloud, in your
remote use case or in the data center. Nobody else can do that, because
nobody provides all those solutions.
So where are we seeing our growth is our existing very large enterprise
customers want to be consistent in how they deploy zero trust. And we
take the traffic, we offer to Google Cloud, it runs as fast as can
Google Cloud and gets dropped off the other place deploying the same
security policies up in their cloud infrastructure. That's our
differentiators zero trust.
We have and we do better in the large enterprise use cases. So, we have
done the last few quarters. We've done companies with employee size of
between 100,000 to 650,000 to a 1 million. So that's where it works
really well. 2.5 years ago, we're not in the business. We did not have
a SASE product.
Today, I think we see five out of 10 deals in the market. Hopefully,
we'll see 10 out of 10 deals in short order. I think when a bunch of
them and when rates are improving, SASE is going to be big. This is a
very early part of SASE. And the good news is that if I don't win it
today, it comes up for renewal to you. So now I can go, win it
tomorrow. In firewalls, you got to wait seven years. If somebody
doesn't buy my firewalls, we're going to wait for seven years for the
next set of firewalls to be refreshed.
In SASE, you can do this perversity in our industry called people like
ARR. I like DCV. Like ARR means, you do one year deals. I like my
competitors doing one year deals because it means the deals up for
renewal a year from now, I'd like to go ahead and be able to replace
them. So we do three deals, on average, across our customer base and
SASE is big.
Hamza Fodderwala
When you think about SASE, how do you think about the balancing the
growth between selling into your existing customer base versus net new?
Because there are some use cases that you overlap with a traditional
firewall business. So when you talk to customers, is it like either or
like I just want to go SASE or just go firewall or is it kind of a
combination of both and how do you like balance the growth there?
Nikesh Arora
The customers come in all flavors and types and their own strategies.
But most customers want to deploy a consistent security protocol across
everything, across their data center, public clouds and the remote or
branch use case, which is three use cases, in this space. We sell
approximately 75% of our SASE indoor existing base, where we have
57,000 active network security customers. So that's a lot of customers
we cover north of 1,700 of the Global 2000, which means we cover most
companies that are out there.
So we sell 75% there. The interesting fact is though, the 25% of net
new customers are Palo Alto. And typically, their customers who will
take our SASE solutions, who will have other firewalls, in which case,
the conversation is perhaps when their firewalls come up for renewals,
they can then go reverse into zero trust by buying Palo Alto firewall.
So I think our SASE business also is a lead generator for our firewall
business, which we haven't had for a very long time. Because customers
now get comfortable that security policies say, it's working. Maybe I
can buy some hardware next time.
Hamza Fodderwala
Yeah, that's a really important point. And I think you mentioned you
have about 2,000 customers on the SASE side and or the 67,000 firewall
base.
Nikesh Arora
57,000.
Hamza Fodderwala
57,000. What is the uplift that you get when a customer moves to that
the over a period of time?
Nikesh Arora
Yeah, we did this about a year-and-a-half ago, we shared, I think, the
SASE customer is both more valuable and more profitable for us in the
longer-term. It seems the number is about 2x give or take. Because we
sell a firewall with six to seven-year duration. Our SASE solutions get
renewed after three years. And I think the contract values on SASE
typically end up being higher. Because it's a combination of both
network, both network and network security. And the standard
subscription that holds you back on the hardware, almost all the work
on the software solve is on SASE.
Hamza Fodderwala
Got it.
Nikesh Arora
So over time, you can attach more capability.
Hamza Fodderwala
So I want to push to Prisma Cloud. So I guess SASE is securing access
to the cloud. Prisma Cloud is actually securing actually the workloads
in the cloud.
Nikesh Arora
Yeah, I think this is about a $300 million run rate business now
growing triple digits. Palo Alto was pretty early to the cloud security
market. You bought RedLock, I think back in 2018. Back then, nobody
knew what a CSPM or cloud security posture management even was, most
people still don't know.
Hamza Fodderwala
Yeah, I know. How do you think that area has evolved from just like a
feature like CSPM to a broader cloud security platform, when you think
about for the cloud as a whole?
Nikesh Arora
Yeah. So when I came about, we had a company called Evident, which used
to protect workloads on AWS. And we made a bet that people will be on
multiple clouds, and most of our larger customers now are on multiple
clouds. So we bought RedLock, which did cloud CSPM across multiple
clouds. And we try to garden sell RedLock to our customers who did. And
so we're building container security, like don't worry about it,
there's a company out there called Syslog, which is the best of
container security is going to take you for here. So we bought Syslog.
And so to serverless offers, there's another company called PureSec.
So we took them, we merge them, we shut down the individual
capabilities and merge them into one platform as we've had it for three
years. We built four more capabilities on top of that. We built
[indiscernible] as well, an application firewalls. We built identity
access management, prevent data loss prevention. We bought a company
called [indiscernible] mike fragmentation.
So we have now seven modules in our Prisma Cloud platform. And the way
we sold it was we would sell credits upfront. So you buy a bunch of
credits. And then when we launched the product, you start using of the
credit as a new module show. So we're seeing adoption across our seven
modules because of the way we sold it to people. And the consequences
of the customers who consume it, the renewals come up faster, because
they end up consuming more because they are deploying more modules.
We're the only company, we don't see competition in this space. We see
it in two ways. One, there'll be smaller startups, who will provide a
sliver of capability and company will say we're not ready to go the
whole hog. We want to go solve this problem, or we see a bunch of DIY.
People will spin up their own. And we're lucky we've noticed that
people who said we don't want to buy a platform two years ago, but
their own solutions are now migrating because as the cloud gets bigger
and bigger for people.
I'll give you an example a customer who bought $2 million of credits in
the first year. 18 months later, they've up that to $8 million of
credits. And I think they could probably a $50 million customer from a
lifetime value perspective. Because they're barely 3% deployed in the
public cloud, and they have staged intention to go 100% public cloud.
That's what giving the example. This is a customer you would think is a
S&P 500 company. It's not a Dow company or Fortune 50 company.
So if you could think there are probably 500 companies out there, we're
going to end up spending $10 million to $15 million in public cloud
here. I think public cloud security is very early. So you're seeing a
bunch of these private valuations for these companies. We're about 2.5
years ahead of anybody out in the cloud security space.
Hamza Fodderwala
When you think about the size and the opportunity here, I mean, it
could potentially be big. I mean, there's probably going to be billions
of workloads in the cloud at some point.
Nikesh Arora
They got to be.
Hamza Fodderwala
Yeah.
Nikesh Arora
People paid for them. Like, I don't know they accumulated DCB, devs,
Azure, the $200 billion a quarter from year-end.
Hamza Fodderwala
Yeah.
Nikesh Arora
Already $200 million a quarter.
Hamza Fodderwala
But I mean, you've got certain workloads that are more addressable than
others, there's a lot that are just ephemeral, right? So how do you
think about the actual addressable opportunity for Palo Alto Networks?
Nikesh Arora
The simple rule of thumb, 2% to 5% of whatever Google, Amazon,
Microsoft book as a booking sort of cloud workloads should be security
spend. Half of that will go to them because they have tools that people
will use these single shot customers. But I think the other half is
opened down for third-party vendors like ourselves. So if you do the
math, if you start selling $700 billion to $800 billion worth of public
cloud, that in itself is a reasonably large market, $8 billion - $8
billion to $10 billion of your TAM, 300 million ARR, the market there.
Hamza Fodderwala
Yeah. And that $8 billion to $10 billion, obviously growing with
workload growth, potentially here.
Nikesh Arora
Yeah.
Hamza Fodderwala
Yeah, got it. I want to dig in a little bit on cloud code security or
some of the DevSecOps functionality. So Palo Alto talked a lot about
bringing security or shifting security labs into the development
lifecycle. Can you talk a little bit about some of your initiatives
there? And again, how do you think about that opportunity?
Nikesh Arora
So you guys are seeing like, there's a huge movement out of this whole,
the GitLab, HashiCorp, Atlassian, where it's kind of developer lead,
developers pick up tools that make stuff happen. Now, there's this
fallacy that security should work like that, too, it doesn't work like
that. That's why we don't have the 4,000 police forces in every state,
because you can't delete one consistent way of doing security. If you
don't do it, it doesn't work. And so there's a company which built an
open source tool for security. Now developers prefer that because then
they can just look at it, use it and then ship their code for
production.
So what we did was we bought a company called Bridgecrew, where
developers can use that as part of their open source toolkit, but it
checks everything you're doing against the enterprise version of Prisma
Cloud. So you deploy your tools. We check it beforehand. So when you
submit it to the CIO, CSO, it's passed all the security test would have
told you that. You bought a company about a year-and-a-half, a year
ago, almost now. We've integrated into our Prisma Cloud platform. We
launched it about, I want to say, two months ago, and we're seeing
really good adoption of that toolkit amongst the Prisma Cloud customer
base. And we're also seeing independent customers come in because of
that capability.
I think it's very early days. It's kind of akin to what Sneak [ph]
does, which is a separate private company do the same thing, but then
they don't have the other enterprise capabilities we do. So I think,
again, it's part of filling out the entire platform to do
cybersecurity, I think we're very, very early in the whole cloud
security space. And I don't think there's enough companies out there
who billing a platform.
Hamza Fodderwala
Ownership to the core tech side, kind of what you're doing on the globe
on the endpoint protection security analytic, I think another roughly
$300 million run rate business plus or minus?
Nikesh Arora
Hopefully plus.
Hamza Fodderwala
Yeah. Hopefully plus. So Palo Alto has been talking about XDR
detection, detection response for quite some time. I remember you used
to sell traps for endpoint protection. And I think like, three years
ago, you said, "Okay, we're going to kind of give that away." So we can
get the threat telemetry and go after bigger XDR opportunity. How would
you think about your capability relative to some of the other next gen
EDR vendors who are trying to go after it? Is this a area where you
want to be a serious player? Or is this another thing to sell within
your installed base?
Nikesh Arora
If our XDR business was an independent company, it will be valued
somewhere in the vicinity of central one, just myself, right, because
we have we started off at the same time. We have similar kind of
customer behavior and growth. Our technical capabilities are at par or
better than all the vendors out there. It's a crowded marketplace.
I think the more interesting opportunity is goes back to what we
started by saying that AI and machine learning needs to be applied. 3.5
years ago, the meantime to remediate a cyber attack was 27 to 50 days.
So when you find out that we've been breached, it took 27 days to find
out what actually happened. That kind of doesn't work. So today, that
mean time to respond is coming down. In 3.5 years, at Palo Alto, our
meantime responds in the same vicinity.
So it's kind of hard to be a cybersecurity company and do that, because
you will know for 27 days they were breached, or what actually happened
you were breached. But you have to go back and analyze everything to
figure out what happened. We spent 3.5 years, our mean time to
remediate is under one minute. In our company, we can find out and
remediate under one minute. We used to get 67,000 alerts a week. We've
analyzed them, cost correlated them, eliminated them, automated all the
responses. We see about 56 events a week, give or take, those 56 events
are manually analyzed, and remediated and under a minute.
The industry time is still in the 20-day range. And if we don't do that
to cybersecurity, every company will get breached, you will know I
mean, I remember reading newspapers about hacks where large amounts of
data have been extracted. The companies took one year to tell us that
they've been hacked and they've been extracted. So the industry has to
go to this world where you are remediating on the fly.
Now, what does it take to remediate on the fly? It takes an analysis of
data in real-time. Now, on average, every company has about 30 to 40
cybersecurity vendors, and none of us talk to each other. They actually
can't cross correlate data across 40 companies, because we all have our
own mechanisms for doing security. So you can't normalize data. You
take all of that data, you dump it into a large data lake, you can call
whatever you want, there's a bunch of companies out there who does. You
ingest all the data put in large data lake, and then humans go in and
analyze that data. Because there is no mix. There's no technology that
analyzes data. This is what you call UEBA, user behavior analysis,
which basically tells you how to understand the data. But that's still
helping you do it manually.
So we've taken all of that. It says, we're going to use a single source
of truth. We will take our data. We extract. We take 150 megabytes of
data per endpoint in a company, analyze that data, use that as a single
source of truth and cross correlate everything against that. That's how
you get to a wonder response time. So that's what we just launched,
called XIM, which is we're working with now nine companies. We are
going to work with them to replicate what we did amongst our own flock,
using a combination of XDR, combination of all of our analytical tools.
If we can do that, for those nine companies, or when we can do that,
we're going to launch that product in July for all of our customers out
there. I think that's how we transform the whole security analytics
space. That's how we transform space, which I think is a 15-year olds
space where we're ingesting a lot of data, which is the SIM space. You
can go look at the Gartner Magic Quadrant, see what's going to get
displaced. That's the opportunity. The opportunity of XDR is yet
another sliver product that solves a certain problem. It makes it a lot
easier, but doesn't solve the whole problem.
Hamza Fodderwala
Yeah, I want to dig into XIM a little bit. But just that broader data
advantage, as you're talking about, we're going to take all this threat
telemetry, how does that feed into other parts of the business? Because
I think in the past, you've had cybersecurity solutions that have been
focused on securing a particular vector, right? And eventually the
cyber criminals will catch up. So how does this really help your
solution get better over time, so that we start to see more of a steady
compound of cyber security, which quite frankly, in the past, we
haven't seen?
Nikesh Arora
I'll give you a thought experiment. All of you can go back to your
organizations and just for fun, ask your CIO or CSO, how many agents do
we have on our endpoints? I did that three years ago, the answer was
for financial services between five to 11. What does that mean? That
means there are five different companies who would sell your IT team is
solution, which would go on your laptop, and they will extract a little
bit of data and analyze that data and solve the problem. Like, why
don't you deploy five things on my laptop? Why can't you just deploy
one thing? It collects all the data, because everything is analyzed in
the cloud now. That's what we're doing. We're reshaping how this world
of data analytics needs to happen.
Hamza Fodderwala
Yeah. So on the XIM front, I thought it was interesting talking to lead
your Chief Product Officer after the call, and I was like, why are you
trying to, I guess, effectively replace a SIM, right? At least a
traditional SIM, as its constructed, has been inefficient, kind of
causing...
Nikesh Arora
Replacing, why you're trying to replace the chariot with the car.
Hamza Fodderwala
Right. Okay. That's a good point.
Nikesh Arora
Okay.
Hamza Fodderwala
Fair enough. But I guess what is your thinking behind it? And like how
do you think Palo Alto is going to be better in terms of efficacy in
addition to relative to your - yeah?
Nikesh Arora
Yeah. Look, the way we think about assessing, I've never used to
sitting for an hour and talking about the stuff. Okay. Look, our
current business in network security business, which is what 80% of
business is, we think the world is going through a huge network
transformation. So we think both our innovation and hardware attached
subscriptions is going to drive sustaind growth in network security
with SASE. The world is going to the cloud.
I think we have everything we need on the cloud portfolio and what are
we doing? We either build or buy smaller companies more
product-oriented, nothing big. And we're going to stay competitive and
not letting anybody else into that space where we are 2.5 years at. The
whole world of analytics and replacing the SIM or the chariot, for us,
is where we're going to find growth in 18 months, 24 months from now,
because I think that market gets transformed. So my job is to look for
revenue today, tomorrow, and two years from now.
I think for the next two years, we'll get a great run in network
security. We're going to get a great run for five to seven years of
cloud security. And thereafter, as X5 starts to work, we're going to
see a great problem with that for the next several decades.
Hamza Fodderwala
Thank you for holding my hand through that. On the go-to-market front,
so you've guys done a really good job of enabling your channel partners
to sell some of these next gen security solutions. And quite frankly,
when it - you started do that, it wasn't really in their incentive, or
at least that's what it felt like, especially some of the traditional
VARs who are used to selling boxes. Can you talk about the shift in
mindset among your partners and how they're starting to see more
benefit by selling the butter pile on the platform as well?
Nikesh Arora
So look, there's a big reshuffle going to have - going on in the
distribution world out there. Majority of distribution used to be
hardware-oriented in the past, and you're seeing a software
distribution start to build. So whether it's the systems integrators,
the essentially the Lloyds, PwC is the world whether it's the MSSPs, or
every telecom company now has a star, large enterprise sales team in
every country. It's them, whether it's the cloud providers, Google,
Amazon, Microsoft, they all have Cloud Marketplace advice stuff.
Suddenly, all these guys are becoming very good at value-added
reselling, which is not what they were doing five years ago. A lot of
our newer NGS sales are happening in partnership with many of these
folks. At the same time the traditional large resellers are building
software teams, so they understand where the market is going. And
they're building software capability in the mid to low segment of the
market saying okay, we'll go deploy Palo Alto products for you, monitor
them for you because they can work for you. So you are seeing a
reshaping happening out there in industry. And I think there's a lot of
winners and losers in that space.
Hamza Fodderwala
Yeah. You also run some new sales leadership in the past several
months, be just BJ Jenkins from Barracuda. You also retardant who's
running the sales organization? How are these seasoned sort of veterans
within security? How are they complementing some of your strengths or
weaknesses that have a lot of go-to-markets there? Yeah.
Nikesh Arora
One of the people we can I think he's most of the people who has made
an art out of selling enterprise solutions to the world and you're
chatting about this enterprise sales at 99%, perspiration and 1%
inspiration. You got to cover as much ground as you can. The more
ground you cover, the more customers you can touch. The more customers
you touch, the more likely to buy.
Now have we just did mention Helmut Reisinger. Helmut used to run
Orange Business Services in Europe. For Orange, he now runs Palo Alto
Networks, Europe, Middle East Africa and Latin America. BJ Jenkins
President used to be CEO Barracuda now runs Palo Alto go-to-market
efforts. Amit Singh who was a prior President still there, he's focused
on the very large deals of the company. Rick's focused on selling a lot
of stuff.
So between all of us, again, I keep harking back to three years ago,
that's when I joined like, we didn't meet many CIOs of the company. We
used to sell firewalls. As I said, last quarter, I have seen more CIOs
in the last 12 months than Palo Alto Networks have seen in five years,
right. And see them they need more spread or more coverage amongst our
leadership team. So we've taken 10 of our leaders. We've parsed the
whole large fan base across identifiers and we track how many CIOs we
meet on a weekly basis or a monthly basis, because that's where we have
those zero trust conversation. That's where we build a plan. That's how
you get somebody spend $100 a day when they trust that not only is your
current portfolio useful, but where you're going to the next five
years, what they want to be following you or working with you on.
Hamza Fodderwala
Yeah. Ownerships on the federal side. So I think Palo Alto has one of
the higher FedRAMP certifications, if not the highest. And you also got
FedRAMP certs for some of your cloud security products, I think, last
year or a year ago. How's the pipeline trending in federal? And are you
seeing any incremental traction after the zero trust mandate that was
rolled out by OMB recently?
Nikesh Arora
The federal government is very powerful. They take a lot of time
validating their decisions. As you can imagine, we're still waiting for
them to deploy the public cloud after I think four years of analyzing
bidding, rebidding and trying to deploy it. So until - so, let's just
say, they're slow to show up in vendors' numbers, that's the point. But
there's never been a time where they've been more focused on fixing
cybersecurity than now between Jen Easterly, Anne Neuberger, Chris, all
these guys are very focused on trying to get that stuff sorted.
I think the first six to 12 months of any new administration, it's very
hard for them to get their stuff together, because there's a whole cost
of character that changes, they got to figure out the new working
rhythm. So we have - we are hopeful about good stuff to come to them in
year two and year three. But all the signs point to more focus and more
availability of resources for them to go deploy solutions. And at times
our friends have more time to take longer to take our products get
better and better, more adapted to the federal government as well.
Hamza Fodderwala
Yeah. Just on the organization in the culture, it sounds like you came
in four years ago, you had this narrow window to buy a bunch of great
technologies, maybe something has got disrupted earlier on. When you
look at the culture now, especially given the really competitive labor
market, how is Palo Alto been attracting talent? And how do you see
your potential for attracting talent relative to back then?
Nikesh Arora
Look, we've been very lucky because the 17 companies we bought, we've
retained north of 80% of the founders of these companies. They still
are Palo Alto Networks, they still work there, they're still excited.
Many of them are actually driving the efforts.
So there were three principles we deployed when we did M&A. One, we're
going to buy the best in the market. The reason they're successful,
because they beat us with less number of people and lower amount of
money. So we're going to buy whatever is best out there, because our
customers are not going to buy something that's not best to pay. So we
bought the best companies, one.
Two, we made them responsible for our efforts, not our team's
responsible for their efforts, because they beat us. So we had a lot of
change in leadership, as a consequence acquiring all these companies.
And the third principle was we forced integration. We forced tough
technical decisions. In fact, when we buy companies, we don't sign the
deal until we have an integration plan between the two of us from a
product perspective, because you get all the emotions out of the
system. So, we do that. And as a consequence a lot of - all of our
products are now integrated.
From a cultural perspective, we've been lucky because lucky and lucky,
suddenly Palo Alto Networks has become a place where people want to
draw talent from. So we see a lot of people trying to hire people to
Palo Alto because even early in many spaces. The flip side, we just run
a campaign. Those of you who frequent LinkedIn, we run a campaign
called Welcome Home. Because many of our employees have left for other
cybersecurity companies have seen their personal network get destroyed
or depleted, given the current markets. And we've offered to reinstate
them back the number of shares they had at Palo Alto, and they're
looking at the math thing, holy [explicit], I should have stayed. And
we're seeing a lot of success and people wanting to come back.
We've been running a program called Flex Work in the midst of pandemic,
which we started with Zoom, Splunk, Box and Uber. And now we have 300
companies that are part of the flexible coalition who are deploying
flexible workplace policies. And we were sort of early in that space.
Our Head of HR drove a lot of the efforts. So culturally, I think it's
the best cybersecurity for companies you'd like to work for you want to
work for. But we see churn like most people in the industry.
Hamza Fodderwala
Maybe shifting to the margin side. So you talked about how operating
margins will start to expand beyond this fiscal year. So we all know
the core sort of the firewall, NetSec business is very profitable, 40%
free cash flow margin, and that's funding what you're doing on the next
gen side. At what point do you see that next gen business becoming
breakeven or profitable on its own and sort of sustaining itself?
Nikesh Arora
Let's make sure I say it right, because they're all public investors
and whatever I say, then you go and suddenly a seed happen in software.
So we're seeing way better growth than we expected when they started
out here. And we're trying to make sure we manage the operating margin
in the context of what we promised the street and we will do so out for
a three-year plan. At the same time we have more opportunity to invest
than we have time and resources.
So we're going to be balancing our resources to live up both to our
commitments, at the same time to keep investing for growth, because
very few cybersecurity companies growing. There aren't any
cybersecurity companies growing at 30% in the current market deploying
across multiple categories. So, we will keep investing, but we'll
balance the amount of investment against the promises you've made to
the Street.
Hamza Fodderwala
Yeah, makes sense. Just last question for me, I want to open up to the
audience. M&A, you talked about less frequent M&A. I think Q4 last
year, you reiterated on the Analyst Day. Just curious on your strategy
going forward, how do you make sure you're not missing out on anything
by doing less frequent M&A?
Nikesh Arora
So we don't do M&A to do M&A. We do M&A to complement our product
strategy. We're not going to miss out on product strategy. If there are
opportunities that we believe we should participate in, it's an area we
missed, we're going to go build. Remember, 3.5 years ago, we were not
in the sock transformation business, we were not in the SASE business,
we're not in the cloud security business, we were not in the Incident
Response business. So the net few businesses, we could acquire
companies, integrate them and go do what we need to do.
Today, anything that's out there typically is an incremental feature to
what we already do, or anything is out there is already a space we're
playing. So it's very hard for - I don't want to buy stuff and have two
companies with the same space. I don't want to do SD-WAN businesses to
endpoint businesses, we're happy with the ones we have. So actually,
the target opportunity set is a lot smaller. There are opportunities in
cloud security because I still think there's a whole bunch of products
that haven't been built.
So we - Walter and his team track, I want to say, 50 to 100 companies a
month. We visit with them, we see what's going on, we see what's
interesting or not, is interesting to work. But I don't think we're
going to miss out on the opportunity to acquire. But if you look, we
only acquired product. We don't believe there's a value to acquiring
customers' revenue and being multiples that we have to go back and then
earn both investors. So on a product basis, I don't think M&A is going
to be meaningful to our financial profile over the next few years.
Hamza Fodderwala
Walter seems like a busy man, just give him raise.
Nikesh Arora
They still have to work at some point in time.
Hamza Fodderwala
Yeah. I just want to make sure there's no questions in the audience. If
anyone has a question, feel free to raise your hand. Doing that one
right here. Oh, I think the other way some mic, sorry.
Question-and-Answer Session
Q - Unidentified Analyst
Hello, there is an increasing need to protect against sophisticated
malicious governmental actors around the world. Some have advocated a
united front made up of various companies as the first defense against
these attacks. Former Chief Cyber Command Chief [indiscernible], for
example, is such one person. My question for you is where is your
thoughts on having a united front against a malicious, very
sophisticated attacks other governments like North Korea, for example,
or Russia, attacking against companies such as Sony, for example. You
thoughts on this, please?
Nikesh Arora
So there is a - there are various groups in this country and other
countries, I'm sure, where there's a lot of threat sharing that goes
on. So we see something if you see a sustained attack of certain kind.
There are protocols we follow to make sure those that information is
shared aggressively with both cybersecurity companies in the private
markets as well as the federal government as and when required. And
that kind of becomes the way to protect against a concerted attack.
But given we need to know what the attack is first, whether you take
example of SolarWinds, take example of blog for J when these things
happen. There's currently an attack underway called Viper, which has
been malware being sent around try and wipe out your data. So you don't
have any ability to respond both from a critical infrastructure
perspective or from a military perspective.
So when you know what the nature of the attack is, then you can rally
together and figure out what the threat vectors are, what the IOCs and
go and perpetrate them through the entire infrastructure. The challenge
is, as we said, it's not like every company has its own proprietary
infrastructure. It's not like Palo Alto can provide the solution to
everyone because half of them are not our customers. So we have to work
as a collective between public and private to make sure that we
understand the IOC. We make it available. So each of the practitioners
in the individual companies can then deploy them based on what their
proprietary infrastructure is.
Unidentified Analyst
You perceive a need for a governmental or non-public and number of
private sector, over public sector in organization that actually serves
as a united first defense front against these governments...?
Nikesh Arora
Yeah, those are in place. Those things are in place today, whether it's
just with Jen Easterly, whether it's the NSA they have.
Unidentified Analyst
Just private companies. So for example, when Sony was hacked, I mean,
they were hacked by North Korea. They didn't have the sophistication to
actually prevent these types of attacks. My question is, do you think
there's a need for a sector organization that actually protects these
private companies early on really quickly?
Nikesh Arora
There's an industry out there. There's the - between the combination of
us Mandiant CrowdStrike, we have enough resources that get deployed.
The problem is they were hacked. So once they're hacked, you can't
unpack them, you just have to go figure it out, pick up the pieces. So
everything you and I read was a consequence of the hack. But once they
were hacked, I think they didn't take too long to plug the hole for.
But when the data has gone, the data has gone.
Hamza Fodderwala
Anybody else have a question? Maybe I'll throw one in there. So you
talked about the cap allocation being skewed a bit more towards your
buyback. We saw that I think this most recent quarter, you bought back,
I think, $50 million in shares. How do you think about your share
buyback strategies, the more opportunistic or should we expect more
like a regular cadence for quarter?
Nikesh Arora
We usually get analysis and approval for a $1 billion share buyback
every year, which kind of roughly equates to our dilution from a
stock-based comp, give or take. And we don't get paid to time the
market. So we will just have some sort of regular cadence depending on
what's going on in the company where we have information on private
MMPI where we can't trade. But it's going to be somewhat more on a
cadence relative to the markets, but I don't get paid to buy it at very
cheap prices and not buy at high prices.
Hamza Fodderwala
Yeah. I think you talked a little bit last quarter about your focus on
becoming GAAP profitable, I think, in the next year or so. So is that
part of it that's driving down that dilution with the share buyback
or... yeah?
Nikesh Arora
But that doesn't impact it. So I didn't say next year, by the way. I
said we will talk at the end of this fiscal year and share the plan
with you in terms of how our numbers transformed to get us we're
profitable. But look, the difference between us being GAAP profitable
or not right now is the overhang from the M&A we did in the stock we
reinvested for the founders of the companies we bought. Once that wears
off of our GAAP P&L, we will end up becoming profitable. So it's not
hard to compute mathematically when that wears off, given when we
stopped acquiring companies. It also helps if you're growing revenue at
30% and holding margins because then that also washes out some of that.
So it's not a hard math problem.
Hamza Fodderwala
Yeah. I know we got a few minutes left, but anything that we didn't
talk about or asked or any closing remarks that you wanted to touch on?
Nikesh Arora
No. Look, I think you've said it. There's a very large sector, which is
growing in high single digits, possibly north of that. There are not
many players who are consolidators of that sector. It's still - I think
the 3.5% was still the largest market share, depending on how you count
Microsoft securities revenue. And our anticipation is that if we
continue on the path that we've laid out for ourselves, you'll see the
first $100 billion cybersecurity company ruling.
Hamza Fodderwala
We still have a few minutes left.
Nikesh Arora
Yeah, I think [Multiple Speakers] they'll sell faster clothes. We're
done buddy.
Hamza Fodderwala
Exactly. I read the clock wrong. So you made a point at the NOC where
you talked about partnering more with a cloud service provider.
Nikesh Arora
Yeah.
Hamza Fodderwala
Just how do you think about the competitive threat from the CSP, in
particular, and like versus partnering with them?
Nikesh Arora
There are a certain set of customers where they're better suited using
the native tools of the cloud service providers and a lot of them as
their environment gets more complex and there are multiple clouds, a
better sort of adopts. So I don't think there's a challenge. I'm very
happy with 50% of the cloud security market share.
Hamza Fodderwala
Yeah. Just on going back to the margin front, so I think you - oh,
sorry, we have a question over here. Happy with that.
Unidentified Analyst
Maybe, all right. I was just going to say you warned us not to conflate
the current geopolitical events Russia with the CapEx cycle that's
going on. But I do want to ask, if you're seeing incoming right now,
what the nature of it is, whether this is raising awareness by
companies about things they need to do differently?
Nikesh Arora
Look, as you can expect, given the current circumstances we're in, a
lot of the critical infrastructure companies are in alert, because they
have to be because right now, there's not as much cyber as a cyber
attack going on right now in the direction of the U.S. or the West, as
you would expect, because I think it's quite concentrated, where
everything happening. But who's to say that in a few days, or a few
weeks, when things get more desperate for certain people that the guns
are not going to get pointed, the cyber guns are not going to get
pointed in different directions.
So I'd say generally, there's a heightened state of alert across the
board, both in critical infrastructure companies or companies where
they're getting impacted could create chaos, for some way, shape or
form. So I would say, everybody is watching carefully. And the
challenge, as you know, it's like, you can't fix it. If you didn't fix
it one year ago, you can't certainly call me and say what, can you come
protect me? Of course, I'll say, yes, I'll charge you a lot of money,
but I'm not going to be as effective.
So bad strategy for companies call and say fix it in 24 hours. But
again, as I said, it just - this is a mistake, this is why we still
take off our shoes on and we go to TSA. So now people are going to be
aware of this. Over the next five years, we're going to make sure the
security is covered.
Unidentified Analyst
Yeah. As you mentioned your broad capabilities you have this discussion
in the industry best of breed versus people like Palo Alto with the
broad capabilities. And I wonder on the really enterprise level, if you
talk about Fortune 2000, et cetera. Why do you believe an integrated
platform will win versus best of breed, where people like CrowdStrike,
Zscaler work together versus you offering a product solution and
integrated platform?
Nikesh Arora
So you said a few things. First of all, I agree with you that our
customers want best of breed. So we don't sell just an integrated
platform. We sell an integrated platform, which is comprised of best of
breed. We have 10 solutions we can sell you independently, which will
meet or beat any public vendor out there in the same space, or you can
have them from us, and they will also work together better. And so
that's one part.
The other part is, I don't think we lose affiliations of my product is
integrated with somebody else's product works. I mean, I don't buy any
of these industry partnerships is that our product is integrated with
this other third-party product because we have a lot of security
products, but very hard to integrate your product without sharing
security protocols and nobody does that. So it's - they're two
different spaces and therefore, they can work together because they
don't have overlapping capabilities.
Hamza Fodderwala
All right. I think with that, we'll end it here. Sorry for the...
Nikesh Arora
Can I say the $100 million thing one more time.
Hamza Fodderwala
It's good to say. Okay. Thank you so much, Nikesh. I really appreciate
it.
Nikesh Arora
Thank you.
