Palo Alto Networks (TICKER: PANW) Palo Alto Networks Panw Ceo Nikesh Arora On Q2 2022 Results Earnings Call Transcript
Palo Alto Networks Inc. (NASDAQ:PANW) Q2 2022 Earnings Conference Call
February 23, 2022 5:00 PM ET
Company Participants
Clay Bilby - Investor Relations
Nikesh Arora - Chairman and Chief Executive Officer
Dipak Golechha - Chief Financial Officer
Lee Klarich - Chief Product Officer
Conference Call Participants
Saket Kalia - Barclays
Tal Liani - Bank of America
Brian Essex - Goldman Sachs
Hamza Fodderwala - Morgan Stanley
Phil Winslow - Credit Suisse
Brent Thill - Jefferies
Rob Owens - Piper Sandler
Gregg Moskowitz - Mizuho Securities
Adam Borg - Stifel
Patrick Colville - Deutsche Bank
[Video Presentation]
Clay Bilby
Good day everyone and welcome to Palo Alto Networks' Fiscal Second
Quarter 2022 Earnings Conference Call.
I am Clay Bilby, Head of Palo Alto Networks Investor Relations. Please
note that this call is being recorded today, Tuesday, February 22,
2022, at 2:00 p.m. Pacific Time.
With me on today's call are Nikesh Arora, our Chairman and Chief
Executive Officer; and Dipak Golechha, our Chief Financial Officer. Our
Chief Product Officer, Lee Klarich, will join us in the Q&A Session
following the prepared remarks.
You can find the press release and information to supplement today's
discussion on our investor website at investors.paloaltonetworks.com.
While there, please click on the link for the Events and Presentations
where you will find the investor presentation and supplemental
information.
In the course of today's conference call, we will make forward-looking
statements and projections that involve risk and uncertainty that could
cause actual results to differ materially from forward-looking
statements made in this presentation.
These forward-looking statements are based on our current beliefs and
information available to management as of today. Risks, uncertainties,
and other factors that could cause actual results to differ are
identified in the safe harbor statements provided in our earnings and
presentation and in our SEC filings. Palo Alto Networks assumes no
obligation to update the information provided as a part of today's
presentation. We will also discuss non-GAAP financial measures.
These non-GAAP financial measures are not prepared in accordance with
GAAP and should not be considered as a substitute for or superior to
measures of financial performance prepared in accordance with GAAP. We
have included tables, which provide reconciliations between non-GAAP
and GAAP financial measures in the Appendix to the presentation and in
our earnings release, which we have filed with the SEC and can also be
found in the Investor section of our website.
Please note that all comparisons are on a year-over-year basis unless
specifically noted otherwise.
We would also like to note that our management is scheduled to
participate in the Morgan Stanley Investor Conference in March.
I'd like to apologize for the delay on our start time. We experienced a
technical issue that required delaying the call by 30 minutes.
I will now turn the call over to Nikesh.
Nikesh Arora
Thank you, Clay. Good afternoon and thank you everyone for joining us
today for our earnings call.
As you've seen by our results, we released, we had an exceptional Q2.
We continue to accelerate the growth of our business in line with our
stated direction of fiscal year 2022, being the year of focused
execution.
First, let's talk about the market and the trends we're seeing.
Firstly, we continue to see a strong demand for cyber security. We have
not seen any changes in the IT spending patterns of our customers or a
slowdown in companies investing in IT systems to drive competitive
advantage. On the contrary, we see acceleration around trends
associated with the shift to the cloud, as well as continued efforts to
redefine network architectures, to enable employees to work effectively
from anywhere, a trend which has been bolstered by the pandemic and we
continue to believe we are still in the early innings here. Both these
factors underpin continued demand for cybersecurity services.
Secondly, we continue to see an evolving and complicated threat
landscape. We have highlighted in the past that cybersecurity is at the
front and center of all conversations around risks and threats at
companies as well as nation and state levels. We believe cybersecurity
will continue to become more and more relevant and important. With
increased alliance on technology in the prevalence of cyber-attacks,
there is an ability to disrupt businesses and critical systems making
cybersecurity an area that will need continued focused investment.
In addition to industry specific trends, we're seeing a trend that is
unique to Palo Alto Networks. Given our investments in the areas and
continued relevance across multiple platforms and needs of our
customers, we're having more and more significant partnership
conversations, which encompass the entire Palo Alto Networks offering.
Whilst early, we believe this is the true differentiation that Palo
Alto Networks provides both best of breed and integrated security that
works.
Thirdly, our continued focus and execution. This focus is bearing fruit
as we execute multiple dimensions across our business. Execution from
our product teams means continuing our rapid pace of integrated
platform delivery. We will talk about the innovation across our
platforms, but to highlight just today, we unveiled our XSIAM product,
which is poised to reimagine security operation centers and truly
deploy technology to resolve cyberattacks in real time.
Execution from our go-to-market teams means focusing on the broader
customer-driven priority of helping them significantly improve their
cybersecurity posture. This is demonstrated by the multi-platform large
deal commitments we're beginning to see. Execution from our supply
chain team means we are able to work with our suppliers in this tough
environment to deliver critical security appliances to our customers.
We had to balance some of the increased costs of price increases as an
offset, but we have been able to keep these increases modest in
comparison to our peers. Execution from our people leaders means
despite this being a hot market for great talent, we're able to attract
and retain the best minds in cybersecurity.
As you saw in the opening of the call, we launched a Welcome Home
Program to welcome back employees that had left our company. We have
seen good initial success here.
Let's take a quick look at some of the outcomes caused by the focus and
execution. In Q2, revenue was up 30% while the leading billing and RPO
metrics up 32% and 36% respectively. We're building a more predictable
business model.
Our CRPO balance of $3.4 billion gives us significant visibility into
our next 12 months revenue.
Next-generation security or NGS ARR finished Q2 at $1.43 billion. As we
hit our midyear point, we have greater confidence that our strategy is
working, which is driving us to make further investments in these
businesses.
At the same time, we continue to transform our core network security
business with a software mix within our Firewall as a Platform billings
came in at 40% up five points versus last year. We drove these strong
top-line results while balancing non-GAAP profitability even as we
absorbed some incremental expenses from supply chain challenges.
Operating income grew 20% and adjust to free cash grew 33%. We
outperformed our non-GAAP EPS guidance midpoint by $0.09.
For a number of quarters we've talked about our large deal momentum. To
accelerate these results as we exited fiscal 2021, we layered on a
sales strategy to elevate our focus and drive efficiency in our largest
opportunities. With a growing portfolio of products across the
platforms, making large deal selling repeatable process is core to our
sustaining and accelerated growth trajectory.
With BJ Jenkins, signaling the leadership role for our broader sales
organization, you had an ability to increase management attention on
the largest deals in the form of Amit Singh, our CBO. We're pleased
with the results we have seen in the first half of the year. These
deeper multi-platform relationships are win-win for Palo Alto networks
and our customers. As a Testament to this, at the end of Q2, 47% of our
Global 2000 customers use products from all three of our platforms up
from 38% a year ago.
In Q2, we closed 221 seven-figure transactions, including three
transactions over $20 million.
Our millionaire customers were 1077 in Q2, up 26% year-over-year. Our
combined rate of growth in millionaire customers, as well as an
increase in size of our large deals has helped us sustain the
accelerated level of growth we've seen over the last several quarters.
In all, for the strong quarter I want to thank our global teams for
their strong execution across the board.
Driving these results are the transformation of our firewall business
and our focus on capturing the growth in next-generation security. In
particular this quarter, our strengths were well balanced in both of
these.
Let's do a quick review of our progress across our three platforms. As
you know, we have them design modularly, so the customers can initiate
their partnership journey with Palo Alto Networks, whatever their
current need is. But over time, we work with them to both expand across
any one of our platforms, and also work with them to adopt our other
platforms in line with their plants.
At the heart of our three-platform strategy is innovation. This is a
fuel for our growth, especially in next-generation security, where we
play in markets that are early in their life cycle. In the first half
of fiscal year, 2022, we had 22 major product releases, which is equal
to all the releases we had in the full year of fiscal 2020. Even more
impressive is that this quarter, marks the end of all, integrations of
our acquired businesses over the last few years, i.e. all of our
products are now seamlessly integrated and can have organic development
continue on them.
We were also pleased to receive two new industry awards, adding one in
developer security tools and other in secure web gateway. We now have a
leadership position in ten categories. Focusing first in our firewall
business, we're continuing to refresh our platform. And just last week,
we announced two more new families with the PA-3400 and PA-5400. These
new generation four platforms have industry-leading performance on real
world encrypted traffic using our single pass architecture and
performance that is 3 times faster than similar Gen 3 appliances.
We also rolled out PAN-OS 10.2 Nebula release, which adds significant
new capability in using machine learning to stop the current generation
of highly malicious attacks in line. This capability powers our
recently released advanced URL and new advanced threat prevention
subscriptions, as well as brings significant enhancements to the
capability of our DNS security subscription.
We added the industries first integrated AIOps to our next generation
firewalls. Our 10 subscription added to the firewall family. This
capability assists customers to prevent firewall misconfigurations and
proactively addresses performance issues before the impact customer
networks.
We were pleased with our ability to grow our product revenues at 21%.
This contributed to our Q2 revenue upside and was the head of our
guided mid-teens growth for the full year, which we will be raising.
Our teams work tirelessly during Q2 to ensure we could fulfill product
demands to customers as quickly as possible while also navigating
through Gen 3 to Gen 4 refresh.
We didn't see demand for our next generation firewall appliances
outstrip our ability to ship in the quarter and this is reflected in
the growing RPO I spoke about earlier. Strong security demand,
innovations we are bringing to customers such as our Nebula release as
well as customer appetite for our Gen 4 gives us strong conviction and
sustained product demand into fiscal year 2023.
Next, I want to spend some time in our NGS business. This is one where
our teams have done work, which I personally believe has not been done
in the cybersecurity industry before. And this is what makes Palo Alto
Networks special. We have built a formidable set of services, which are
cloud first, and these services are resonating with our customers.
This success is truly driven by us working with our customers to
anticipate their challenges, delivering best-of-breed solutions in an
integrated fashion whilst continuing to focus on security outcomes.
This has resulted in us building an NGS, ARR stream of $1.43 billion
driven by billings growth to 79% in NGS. Diving deeper into SASE, which
has been a strong contributor to NGS. We continue to see strong uptake
from our existing customers. We're also seeing marque new customer
wins, which are reflected in our current customer count of 19,083,
which is up 62%. A recent report from the IT industry analyst
enterprise strategy group noted that 78% of organizations have begun or
are planning SASE implementations.
We see this mirrored in our customer conversations where hybrid work is
now the way many of these companies are planning and supporting the
future work. We are pleased to against stand on Okta's Business at Work
report, where we were identified as a leading provider of remote access
solutions. We're seeing SASE emerge as a key platform for our
customers. With these customers, looking to Prisma SASE to deploy DG
capabilities. We rolled out integrated CASB within Prisma Access 2.0,
including a new capability around inline DLP for SaaS, and in
particular collaboration and applications.
We continue to see success attaching autonomous digital experience
management or ADEM as an upsell in Prisma Access as customers rely more
on SASE as a foundation of the network architecture. On the cloud
front, we're seeing mainstream adoption of hyperscale public cloud in
our customer base, as well as an acceleration and production workflows.
This is driving sustained strength we're seeing from Prisma Cloud.
Four years ago, we made it a conscious strategy to be a first mover
with multiple big bets to proactively invest or believe the future of
security was going. Our pivot began with several acquisitions targeting
companies with the best technologies. We developed a unique go-to
market approach, allowing us to promote future modules as part of an
integrated offering. We're seeing tremendous success with this
approach.
While our active customers grew 21% to 1,810 in Q2, we saw north of 56%
growth and credit consumptions driven both by increased adoption on the
cloud by our customers and their continued adoption of more security
modules in Prisma Cloud. While our two core modules, cloud security
posture management and cloud workload protection are mainstream within
most of our customer base. We're seeing an increased adoption of three
and more modules.
There are two areas I would like to highlight in Prisma Cloud to
support. First, the launch of cloud code security, and second, the
launch of agentless scanning. Approximately one year ago, we acquired
Bridgecrew, which has strong early attraction in DevSecOps enabling
security to be shifted left into the software development life cycle.
This addresses security problems before they are created in production
deployments and is far more efficient. A single deployment template can
be propagated hundreds of times. There are multiple vulnerabilities in
the code; each deployment could create hundreds of security events even
once in production.
Bridgecrew had significant traction with its checkout open-source tool,
momentum that has significantly accelerated since its acquisition
closed, and downloads are up to 5 times year-over-year. Building on the
Bridgecrew technology, in Q2, we released our fifth Prisma Cloud
pillar, cloud code security, which is part of our 3.0 release. Our
stand-alone Bridgecrew product has about 70 customers. We're pleased to
see DevSecOps customer momentum building as Prisma Cloud customers
adopt cloud code security to several weeks after its integrated
releases into our platform.
Let's talk about agentless scanning. You've seen a number of smaller
provider focused on small initiatives in cloud-native security,
providing only agentless scanning is one of them. What we hear clearly
from a customer is that they want a platform approach to cloud
security, which offers the flexibility of both agent and agentless
scanning, depending on their architecture and security needs. Towards
this end, our teams rallied and delivered agentless scanning in record
time. This makes sure that our customers can deploy either approach via
the integrated platform that is Prisma Cloud.
Now turning to Cortex, our endpoint security, security analytics and
automation solutions. We continue to see significant customer demand
for automation and security as threat data and volume security events
grow at exponential rates. The human-only approach to interpreting data
and responding to events is not keeping pace.
We're seeing strong customer adoption of our market-leading
technologies across XDR, XSOAR and Xpanse. Total customers across XDR
Pro and XSOAR reached 3,232 and increased over 69%. Q2 was a strong
quarter for new customers, both those that are brand-new to Palo Alto
Networks and also cross-sells to Cortex. We also saw acute strength
across all of our geographies for Cortex. At our Ignite event last
November, we launched our managed partnership program, XMDR, and we
continue to see partners join the program to further align the
opportunity across our Cortex portfolio. We now have 27 partners there
and have a strong pipeline of interest of partners working through the
certification process.
Core to our growing success with Cortex is the innovation investments
we have made over the last years in XDR, XSOAR and Xpanse with
market-leading capabilities in each. Shortly after leasing XDR 3.0 in
Q1 to enable cloud detection response, we release XDR 3.0 - 3.1 in Q2
to further enhance our cloud asset visibility and insights. Q2 also
marked the release of our intelligence modules for XSOAR providing
end-to-end railroad certain intelligence to identify and discover new
malware familiar - families or campaigns or attack techniques that are
related to security incidents.
This morning, we announced our Cortex extended security intelligence
and automation management, or XSIAM, platform and shared our vision to
provide an autonomous cybersecurity solution as a modern alternative to
SIEM solutions. We believe security operations teams have an urgent
threat detection remediation problem, and only by leaning into a
natively AI-driven platform, we will be able to bring down response
times from hours and days to seconds and minutes.
We're on a mission to revolutionize how data analytics and automation
is leveraged in cybersecurity, and XSIAM is a product of years of
research and development we've been doing in this area. XSIAM is
currently available to a limited number of customers that will be
broadly available later this year.
In summary, I am very pleased with our Q2 results. We both continue to
benefit from strength in our core next-generation firewall business and
is a strong sign of our future growth prospects, significant strength
across our next-generation security portfolio. This balanced
performance is a hallmark of our long-term strategy to drive durable
growth. On the back of this trend and based on what we're seeing in our
pipeline heading into the second half of fiscal year 2022, we are
raising our total revenue, product revenue and total billings guidance
for the year.
Within this top line, given our confidence in both our pipeline and our
sales execution NGS, we're also raising NGS ARR for the year. Lastly,
we're delivering this top line while we continue to make significant
investments in our business for future growth. We not only continue to
see strong near-term demand but also strong medium-term trends in
cybersecurity, fueled by underlying spend in IT spending and secular
trends like hybrid work and cloud-native adoption.
We have aligned investments both to building sales capacity for fiscal
year 2023 as well as medium-term investments and product capability.
These investments have been made while also absorbing unexpected supply
chain-related costs this year. Despite this, we have been able to
deliver upside to our non-GAAP EPS forecast so far this year. We're
lifting our non-GAAP EPS guidance here, reflecting much of the upside
resulting in Q2.
With that, I will turn the call over Dipak to go into more detail in
the Q2 performance of our guidance.
Dipak Golechha
Thank you, Nikesh and good afternoon, everyone.
We again delivered results ahead of our guidance across all metrics as
we continue to transform our business. Top line growth remains strong
in Q2 with balance strength across our portfolio, including product and
especially in our next generation security offerings. Supported by the
strength in our differentiated offerings we're raising our full year
guidance. For Q2, revenue of $1.32 billion grew 30% and was above the
high end of our guidance range. Product grew 21% and total services
grew by 32%. We saw strong growth in all geographies and across all
platforms.
By geography the Americas grew 33%, EMEA was up 22% and JPAC grew 23%.
NGS ARR finished the quarter at $1.43 billion supported by broad
strength across each of our platforms. Prisma Access ARR more than
doubled year-on-year and we continue to see especially strong growth
from XDR and Prisma Cloud. This demonstrates that our portfolio
approach to driving growth in our high growth markets is working and
what gives us confidence to rate our - raise our guidance here, which I
will talk more about shortly.
In the second quarter of 2022, we deliver total billings of $1.61
billion, up 32% and also above the high end of our guidance range.
Total deferred revenue in Q2 was $5.4 billion, an increase of 31%. As a
reminder billings as total revenue plus the change in total deferred
revenue net of acquired deferred revenue. Our NGS billings grew 79%
year-over-year. Going forward we encourage investors to focus on our
NGS ARR metric as we view this measure is being more indicative of the
underlying drivers of this business. We will not be updating NGS
billings in the future.
Remaining performance obligation or RPO was $6.3 billion, increasing
36% with current RPO growing largely in line with total RPO. As
mentioned previously we believe RPO adds meaningful insight into our
future revenue, as it includes both prepaid and contractual commitments
from customers. The strength of our RPO growth gives us confidence in
our future quarters as it effectively provides us a head start from a
revenue perspective. Our product growth was 21% in Q2 and above what we
have seen historically, reflecting strong customer demand for our
appliance and software offerings. Within our firewall as a platform
business, we saw billing growth 26% in line with the growth we have
seen over the last year as customers purchased hardware, software, and
SASE form factors. Within FWaaP, our software mix increased 5 points to
40%. Last quarter we raised our fiscal year 2022 outlook for product
revenue growth to mid-teens. We're raising this outlet to height teams
as we continue to balance the forces of very strong customer demand and
supply chain constraints.
Turning to the details of our results, product revenue was $308 million
growing 21%. Subscription revenue was $618 million, increased 34%.
Support revenue of $391 million increased 30% and in total subscription
support revenue of $1.01 billion increased 32% and counted for 77% of
our total revenue. Non-GAAP gross margin of 74% was down 130 basis
points in part due to the ongoing cost associated with the supply
chain. Our production teams have done an outstanding job in fulfilling
the growing demand and keeping the priority focused on enabling
shipments to customers. We will continue that posture moving forward.
Non-Gap operating margin of 18.4% was again up sequentially and down at
year-over-year as expected with higher product and support costs
impacting the year-over-year track. Non-GAAP net income for the second
quarter grew 20% to $185 million or $1.74 per diluted share. Our
non-GAAP effect tax rate was 22%, our GAAP net loss was $94 million or
$0.95 per basic and diluted share.
Turning now to the balance sheet and cash flow statement. We finished
January with cash equivalents and investments of $4.2 billion. Days
sales outstanding was 60 days unchanged from a year ago. Cash flow from
operations was $483 million; we generated adjusted free cash of $441
million, a margin of 33.5%. In QT we again balanced multiple financial
priorities with strength in both top line, underlying non-GAAP
profitability and in cash conversion. We believe it is important to
hold ourselves to this discipline even when growth is robust in order
to drive a best-in-class financial model as we scale into a larger
company.
We continue to execute on our capital allocation priorities that
outlined in our September Analyst Day. During Q2 we repurchased
approximately 1 million share on the open market at an average price
for approximately $534 per share for a total consideration of $550
million. We continue to expect a large part of our cash flow to be used
for share purchase. We have approximately $450 million remaining on our
authorization, for future share purchases expiring December 31st, 2022.
On the M&A front we did not close any acquisitions in Q2. As we noticed
at Analyst Day, we continue to focus on managing down our stock based
compensation as a percentage of revenue. This quarter we reduced SBC by
about two points zero over year, as we apply our overall discipline to
this process, whilst balancing the current market for cyber ready
talent. We look forward to continuing this trend. Similarly, we talked
about an aspiration for achieving the rule of 60 combining revenue
growth and adjusted free cash margin. You will see that with the
revised midpoint of our fiscal year guidance, we are now expecting to
achieve this once aspirational goal.
Lastly, moving to guidance and modeling point. As Nikesh highlighted,
we continue to see very balanced demand. This includes demand from our
appliance form factors that outstrips our ability to fulfill them in
the short-term, as well as strengthen our next generation security
portfolio. Our Q3 guidance takes into account the strong demand picture
as well as the best information we have today on supply chain and other
factors.
Turning to our guidance for the third quarter of fiscal 2022, we expect
billings to be in the range of $1.59 to $1.61 billion, an increase of
24% to 25%. We expect revenue to be in the range of $1.345 billion to
$1.365 billion, an increase of 25% to 27%. Non-GAAP EPS is expected to
be in the range of a $1.65 to $1.68 based on a weighted average diluted
count of approximately 106 million to 108 million shares.
For fiscal year 2022 we expect billions to be in the range of $6.8
million to 6.85 billion, an increase of 25% to 26%. We expect revenue
to be in the range of $5.425 to $5.475 billion, an increase of 27% to
29%. We expect NGS ARR to be $1.725 billion to $1.775 billion, an
increase of 46% to 50%. We expect product revenue to grow in the high
teens with the seasonality weighted to Q4 as we have seen in prior
years. We continue to expect operating margins to be in the range of
18.5% to 19%. Non-GAAP EPS is expected to be in the range of $7.23 to
$7.3 based on a weighted average diluted count of approximately 106
million to 108 million shares. Adjusted free cash flow margin is
expected to be in the range of 32% to 33%.
Additionally, please consider the following additional modeling points.
We expect our non-GAAP tax rate to remain at 22% for Q3 2022 and fiscal
year 2022, subject to the outcome of future tax legislation. We expect
net interest and other expenses of $5 million to $6 million per
quarter. For Q3, we expect capital expenditures of $40 million to $45
million. For fiscal year 2022, we expect capital expenditures of $185
million to $195 million, which includes $39 million outlaid in Q2
related to our Santa Clara headquarters.
With that, I will turn the call back over to Clay for the Q&A portion
of the call. Thank you.
Question-and-Answer Session
A - Clay Bilby
Great. Thank you, Dipak. [Operator Instructions] The first question is
coming from Saket Kalia of Barclays with Tal Liani of BofA to follow.
Saket Kalia
Okay. Great. Thanks, Clay. Thanks team. Nikesh, maybe I'll start off
with a product question since it's hot off the press this morning. I
was wondering if you could talk a little bit about the XSIAM product a
little bit. Again, brand new given the announcement today, but maybe
the question is, how do you envision disrupting the SIEM market? And
how can you maybe leverage your existing portfolio to cross-sell into
the customer base?
Nikesh Arora
Well, thank you, Saket. Thanks for the question. Look, when I came to
Palo Alto Networks, our mean time to respond at Palo Alto Networks was
measured into days. And for someone who did not work in the security
industry, I found that a little flabbergasting because if it takes tens
of days to figure out that you've been breached and all you're doing is
closing the door after somebody is gone. So we challenged our team
internally, said can you take that and turn that into seconds or
minutes because that's the only way we're going to have a chance to be
able to protect not just ourselves, but our customers in the future.
That required us internally revamp from having north of, I'd say 15 to
20 other security vendors even in our infrastructure down to less than
10 because there are some areas, as we don't play in cybersecurity.
But that coupled with automation, with data analytics; we're down at
Palo Alto Networks just under one-minute as a mean time to resolution,
which is how we can resolve Log4j within our company or SolarWinds
within our company. And I think that's the capability that customers
need. And we did a phenomenal job just in his video where he says,
look, you take a car and you had adaptive control, you add park lane
assist. You add all those features to an old car or is an a new car,
but doors between around 20 years that doesn't make it an autonomous
vehicle. You have to start from scratch. You have to build the software
to build analyzing data and that's kind of the right analogy to think
about it. The future of protecting our customers will have to depend on
being able to analyze data on the fly, immediate on the fly, not wait
for humans to analyze it and come back 10 days later and say now I know
what happened.
So towards that end we have launched XSIAM, it is an early release
working with a handful of design partners to work with them to go
replace to security infrastructure and align with what we've done at
Palo Alto that allow us to learn and to build with them, but we expect
this product will be GA-ed later in the year, really excited. The way
it leverages our portfolio is we can do it quickly if you're using Palo
Alto appliances, Palo Alto firewalls, Palo Alto endpoints. We can do a
Palo Alto Prisma Cloud is an easy thing to do for us. We also integrate
with other security vendors but obviously the quality of data becomes
suspect as you keep going on to more and more legacy security
technologies
Saket Kalia
Great. Thanks.
Clay Bilby
And our next question comes from Tal Liani of Bank of America, with
Brian Essex next. Please proceed.
Tal Liani
Hi. I hope you can hear me. I have a balance sheet - I'm limited to one
question, so I'll just ask the question that no one else will ask
probably. I'll ask the balance sheet question. There is a long-term
convertible note that was rolled into short-term liabilities, the
magnitude is big. It's $1.6 billion. Can you explain this?
Also, I'm looking into your SBC; it's getting to $290 million this
quarter almost. It's a big number and if I go back, you're not
profitable if I take into account SBC, and that has been the historical
trend. So can you first explain the SBC and the outlook? We know how -
what's going to be the trend with this account? And when are you going
to turn profitability on a GAAP basis? What's the plan for the company?
Thanks.
Nikesh Arora
Let me start with the second. I'll hand over to Dipak to answer your
question on the balance sheet and add to my answer. Look, when I came,
we bought a bunch of companies. And the way we bought them was we
unvested the founders from their equity and their companies and
revested them with Palo Alto stock over a period of four years. That
was the only way we could secure the talent of all these founders of
the companies we bought.
So a significant part of our SBC is the embedded M&A cost of retaining
founders. As you've noticed, we have not done any significant M&A in
the last two or three quarters. As that begins to roll off, you will
see a step change down in our SBC when all those acquisitions begin to
roll off. Obviously, the earliest ones will start rolling off in about
another six months. And then over the next year or so, 1.5 years,
you'll see significant rollout. So that should show you that.
In addition to that, as Dipak highlighted we are working hard to make
sure that the normal SBC continues to be managed down. And of course,
as you know, as a percent of revenue, if revenue keeps going up, it
also acts as a benefit towards that direction. So we will talk more
about what our forecast to achieve GAAP profitability as we lap Q4 this
year because we'll have more visibility on the M&A stuff, but I will
let Dipak add to that and as well talk about the balance sheet item.
Dipak Golechha
Yes. I think the only thing that I would add is like what we found in
the company is when we really focus on something, we find
opportunities. You've seen that on pretty much every metric that we
focus on. This now becomes another metric that we're focusing on. I
just want to say that we're going to balance that with the need to
retain our talent. Just as you saw from the Welcome Home video, we want
to make sure that we get the best talent as well. But that's really on
the SBC.
On your balance sheet question, Tal, like a couple of different points.
The 2023 and 2025 notes eligible for early conversion from February 1st
to April 30th, 2022, due to the share price exceeding the price
thresholds. Those notes continue to be classified on the balance sheet
as current liabilities in Q2, unchanged from Q1. In Q4, the 2023 notes
were classified as current liability, and the 2025 notes were a
long-term liability. So it's just a question of how they're classified
on the balance sheet based on all the trigger events on the notes. But
hopefully, that answers your question.
Clay Bilby
All right. Great. Thank you. And the next question comes from Brian
Essex of Goldman Sachs with Hamza Fodderwala up next. Brian, please
proceed.
Brian Essex
Yes. Great. Thank you. Good afternoon and thank you for taking the
question. Nikesh, I just want to touch on the hardware side of the
business. I see the innovation with the updates of PAN-OS and Gen 4
hardware refresh. What - I guess first part of the question; have you
adjusted sales incentives to drive better hardware adoption? And then
maybe Part B of that question is how do you think about, I guess, the
ability or the incentives to leverage the product side of the business
to drive consolidation of share on your platform going forward?
Nikesh Arora
Great question, Brian. So two parts; one, as you probably heard from
everyone in the industry who's in the hardware business, demand is
outstripping supply. I suspect it partly has to do with supply, partly
has to go volumes going up at a pandemic, inflation expectations. So we
don't have to do a lot on sales incentives to die with more hardware.
We have customers who would like their hardware delivered sooner than
later. So we are seeing demand. And as I said, our ability to supply
despite the 21% growth, still demand outstrip that 21% number, which is
why you see our RPO continuing to rise. So I think that's your answer
to the first part.
In terms of the ability for us to leverage hardware, and I'll highlight
a metric we shared last time, that 25% of our customers in SASE are -
were net new to Palo Alto last quarter. We haven't declared that number
this quarter, but that gives you a sense. And typically, those
conversations, Brian, are hey, while I love your security platform, I
love your security policy, I'd like to deploy it, but my firewalls are
still around, and they have two, three years more to go. In that case,
we end up with a SASE deal with the expectation that over time, when
that customer consolidates their firewall, it gets to be a Palo Alto,
end-to-end Zero Trust execution because the only way to do Zero Trust
right is to make sure your hardware, your cloud and your remote users
are all consistent in terms of security policies used.
From that perspective, we see an opportunity to take hardware and
further consolidate. In some cases its customers going from two
hardware vendors to one. In some cases, its customers doing a
replacement of some other hardware vendor with Palo Alto networks
because now they already deployed SASE in their environment. So we see
all of that happening. And one of the beautiful features some of the
subscriptions I laid out, whether it's autonomous monitoring or AIOps
or DNS Security or filtering, et cetera, we can make that happen
consistently for our customers across both platforms. So, in that
perspective, they already see the benefits of deploying that on a
consistent basis.
Clay Bilby
Great. Thank you. And our next question comes from Hamza Fodderwala of
Morgan Stanley with Phil Winslow to follow-on.
Hamza Fodderwala
Hey guys thanks for taking my question. So the NGS ARR grew really
nicely, and you raised the full year guide on that, too, which you
normally don't do midway through the year. The Prisma SASE, Prisma
Cloud doing really well, as usual, it seems. But there appears to be an
inflection on Cortex. Can you talk about some of the strategic
initiatives that are driving that in the last couple of quarters in
particular? And then maybe just for Dipak, can you help us understand
maybe the gap between NGS billings and ARR growth going forward as some
of the lower-duration stuff becomes a higher percentage of the NGS mix?
Nikesh Arora
Thanks, Hamza. Thanks for the question. Look, I think this was an
all-out quarter strength across every NGS category, whether it's cloud,
SASE or Cortex. I think there's an inflection point both in Cortex as
well as Prisma Cloud. More and more conversations are around where
customers are coming to the point they're saying, yes, I cannot do this
with the cloud-native tools because I've got multiple cloud providers
I'm dealing with or I cannot do this with the next start-up from two
guys who started it, and that can cover one sliver. I need something
that's more comprehensive.
Because honestly, if I was going to replace security capability with a
start-up capability, AWS, Azure, GCP already had that capability. It's
not like they're lacking in capability from a security perspective. But
just to give you an example, if you deployed security using one cloud
provider, whether it's AWS or GCP or Azure, you'd have to integrate ten
of their modules to get one Prisma Cloud. You have to do the
integration work yourself. So, we've already done that not just within
their tools, also across all public cloud providers. So, that's why the
consolidation of security capabilities in Prisma Cloud makes sense.
We're seeing that inflection. You see the number of customers. It's
closing in on 2,000 customers, 80 of the Fortune 100. So we're not
dealing with small enterprises trying to replace some features from
CSPs. We're dealing with people who are now in complex production
environment type scenarios and they are deploying Prisma Cloud. So
we've seen that inflection there. And you're seeing that with 56%
growth in credit consumption. You're seeing not only are we benefiting
from people adopting multiple modules, but also benefiting from the
fact that their native sort of production workloads are going up.
And at Palo Alto Networks, I will tell you, our consumption of public
cloud has always outstripped our forecast because of the success we're
seeing in our NGS portfolio. So that's one part.
In Cortex, I'd say, again, remember three years ago, we didn't have any
of these products at Palo Alto Networks. We were busy selling
firewalls. So, I think part of it is the sales force getting behind it,
understanding it. And on most technical tests out there, XDR fares
better than most of the names you would know in the XDR space. So, we
have real technical differentiation advantage in the market. From that
perspective, we are able to go down to our base.
And look, I know we didn't have this product two years ago. It's time
for you to renew. It's time for you to deploy XDR. Why did it try Palo
Alto Networks for XDR? You're seeing both of those.
I don't know, Lee, do you want to add something?
Lee Klarich
No. It's fine.
Nikesh Arora
Because I don't want to make Lee feel like he is not answering any
questions. Excel is coming your way. It's a balance sheet question.
Thanks, Hamza.
Dipak Golechha
Do you want me to answer the billings versus ARR? Hamza, it's a good
question. It comes up quite often. I think fundamentally, the way I
look at it is you're comparing apples and oranges a little bit here.
ARR is really looking at your annual recurring revenue. Your billings
is looking at whatever the duration is for what's out there. And so if
you have like one deal that happened to be a long duration, right, you
will get more billings and ARR within that quarter. Previous times,
we've had that.
So, I think the last quarter, our NGS billings grew less than the ARR,
which is why - I'm probably more in the camp of let's just focus on NGS
ARR. It's the source of truth and the one that we will focus on. But
that's all that's happening. It's quite variable quarter-to-quarter
based on some of the larger deals that Nikesh mentioned.
Clay Bilby
All right. Great. And up next is Phil Winslow of Credit Suisse with
Brent Thill to follow. Please precede Phil.
Phil Winslow
Thanks guys for taking my question. Congrats on a great quarter. I just
wanted to focus in on Prisma Cloud, Nikesh, maybe inception that
question into my head with your fleece. But you mentioned increased
attached to production environments as well as just being early in
terms of consolidation, the functions at Palo Alto. What are you
hearing from customers in terms of just adoption? Are we at that
inflection point? And also, how are the competitive dynamics changing
here?
Nikesh Arora
I'm going to hand over to Lee because I said if Lee doesn't answer a
question, he won't come to the next earnings call. But before I give it
to him, I will say one thing. We've deployed an adoption team on Prisma
Cloud in the last six months, which is seeing phenomenal outcomes. And
also, I want to say - I want you to intake it the right way.
Competitively, the option is customers are not ready to go to a
production quality, high-end and fully integrated cloud security
platform. I'm fine with my DIY plus my cloud-native tools. But we don't
run into a POC or compete with somebody else. It's usually, we either
lose against ourselves because the customer would rather stay where
they are. Now in the case of XDR or SASE, we have competitive
environments. It's not like we don't compete. But in the case of cloud,
it's usually based on the customer needs. But I'm going to let Lee talk
about what customers see from cloud what typically does the trick?
Lee Klarich
Yes. I think - thanks, Nikesh. There's a couple of, I think, key trends
that we're seeing. One, and following on to what Nikesh was saying,
there were a number of companies, probably early adopters of cloud,
that built a lot of their own tooling, used a lot of open source. And
it's interesting. A couple of years ago when we talked to them they
would say, "No, no, no, we've got this covered. We've built our own
tools. We're happy to maintain them." And many of them are now coming
back to us and saying, "Actually, it turns out, this is more work than
we thought it was."
It's surprising just how many distinct APIs exist in each of the
different cloud products that you have to integrate with, pull data
from and understand. Just using that as one example of many, right? So
that's one trend that we're seeing is the challenge of doing it
yourself.
The second is, I think, the understanding of what actually needs to be
accomplished. And again, early on, we saw it was, I just need
compliance in the cloud. And now we're seeing customers fully
understand the needs across all different five pillars that we have,
and the importance of each of those and our ability to deliver on
those.
And lastly, I'd say, we've actually gotten fairly good, and we continue
to work on this of building in-product adoption capability. So, we're
not just dependent on people, customer success and adoption folks
talking to our customers about adoption of new modules. We're building
that into the product natively, suggesting to the customer what they
need in order to be most secure, and we're seeing that drive a lot of
adoption.
You saw the metrics on the Bridgecrew integration and just how quickly
we've got to 70 customers adopting that in product in just a couple of
weeks since it was released into production. So, love to see this
trend. Obviously, there's a lot more adoption we're going to see in the
future, but I do think that we're seeing that inflection point.
Phil Winslow
Great, thank you.
Clay Bilby
All right. Our next question comes from Brent Thill of Jefferies with
Rob Owens to follow, right. Please proceed.
Brent Thill
Nikesh, just on the demand environment, everyone is curious to hear
your view on the strength of the pipeline relative to a year ago. And
many of are questioning that this - has there been a pull-forward or
not? Can you just address what you're seeing in the pipeline and
ultimately why this has not been a pull-forward of demand in your
perspective?
Nikesh Arora
I think Brent; it will be a pull-forward demand if you saw everyone
posting numbers at this rate. You are seeing some other players in the
industry who are low single digit in firewalls. So, we must be taking
demand away from somebody else, whether it's us taking or Fortinet
taking it, clearly, we're taking some demand away from somebody else.
Look, some of it is pent-up demand where people did not have anybody to
go into the office and go deploy a firewall because nobody was going to
the office. Now people are coming back slowly and steadily. There are
people to go deploy. So as part of it is that. Part of it is a refresh,
as you know. We have now refreshed more than 65% of our portfolio, and
that's still only three months in. So, we're still seeing demand for
Gen 4 products being created at Palo Alto Networks. I think a couple of
that. And I think, to some degree, there's a little bit of fear that
they won't get the firewall in time, so people are ordering to get
them. But I think we will still - as I said, we're going to see this
into fiscal year 2023 at least, and we'll keep you posted.
Clay Bilby
All right. Great. And our next question comes from Rob Owens of Piper
Sandler with Gregg Moskowitz to follow. Rob, please ask your question.
Rob Owens
Thank you very much. With the success that you guys are currently
seeing in cloud, can you talk about the channel model in terms of how
you go-to-market and longer-term, the potential economic implications,
if there are any?
Nikesh Arora
Look, I think it's fair to say, in the large enterprise customers, the
model hasn't changed from a channel perspective. On the margin, as you
will appreciate, almost all cybersecurity products are slowly and
steadily being listed on public cloud marketplaces. So all of us,
including Palo Alto, we're seeing some customers buy on those
marketplaces.
In some cases, it makes sense. We've got an embedded native firewall
than GCP, and you can deploy it by accessing it to the marketplace, you
will. In some cases, people are using unused credits on public cloud
marketplaces to be able to buy security because that's a feature that
public cloud marketplace have offered. I think that's on the margin.
But I'll tell you what's more interesting about people.
We're seeing channel partners get very savvy and start building
adoption teams and sales teams that are specific to cloud and specific
to our portfolio because they see the market is shifting in that
direction there. There's a bit of a arms race amongst themselves, a
channel where the more qualified people are likely to get more
customers to buy it from them because - and it's not always the person
you use for your firewalls.
Rob Owens
Thanks.
Clay Bilby
Our next question is from Gregg Moskowitz of Mizuho Securities with
Adam Borg to follow. Gregg, please proceed.
Gregg Moskowitz
Okay. Thank you and congrats on a terrific quarter. Nikesh, last
quarter, you sized the pull-forward at about 10% of product orders. How
do you think about the net impact of this for the Q2? And then maybe as
a sort of a little bit of a follow-on to Brent's question, is there any
evidence of double ordering at either the partner or the customer
level?
Nikesh Arora
So Gregg, on the first part, I think it's - there's a net wash. There's
a pull-through, but there's a lack of ability to fulfill. So whilst I
might be seeing a pull-through, you're not seeing in my product revenue
because that's kind of within the range of what I've not been able to
ship because of the exceeded demand.
So in my numbers, you're seeing a balance. You're seeing - and you
probably - if you had visibility you see in the booking, but you
wouldn't see it in the revenue because I haven't been able to ship not
have been a build. So I think that's the answer to the first question.
And in terms of - I know there is this question's been asked at least
for the last two quarters about double ordering and shadow ordering.
We don't work that way. When you order for us, you pay us. And I
haven't seen a refund being asked for on a firewall or a canceled order
yet for the last two quarters. So it's not in our numbers. And that may
be true at the lower end where people have distribution channels, where
channel will preorder and hold on to it. So you may see that there,
where the end customer is not customer in record in the beginning,
where you start - you have distribution stocking that goes on. We don't
do any distribution stocking. We basically have end customers in every
purchase order, and we haven't seen a canceled order or refund. Dipak?
Dipak Golechha
If I just to build on that, like our sales cycle, six months to nine
months, and all of our purchase orders are non-cancelable. So it's just
to put a finer point on it, that they are non-cancelable.
Gregg Moskowitz
Helpful. Thank you, guys.
Clay Bilby
All right. The next question coming from Adam Borg of Stifel followed
by Patrick Colville. Adam, please proceed.
Adam Borg
Great. Thanks so much for taking the question. Maybe just to drill down
on Cortex for a minute, just given the traction there. And maybe you
can talk a little bit more about attack service management. It just
seems like that's the area of interesting importance just given the
breach environment. So I was hoping you could talk more about traction
there and the opportunities going forward. Thanks.
Nikesh Arora
Lee?
Lee Klarich
Yes. Look, when we acquired Xpanse a little bit over a year ago, we
talked about why we thought this was so important. And number one is
the proactive side of it, the finding an issue so you can fix it before
an attacker finds it. And attackers have increasingly automated tools,
and so it becomes even more important. For example, if you look at
Log4j, the - shortly after Log4j information became available, what we
saw was attackers building automated scripts to basically try to find
vulnerable Apache servers, right? And so that's the kind of challenge
that a lot of customers are up against. And Xpanse makes it very easy
for customers to proactively find that fix it, et cetera.
Second is in a reactive state, where something has become known
publicly, Xpanse helps our customers find where they have exposure in
order to address those issues first. And so both of these are examples
of why Xpanse has become so important to our customer base. And we've
seen our customer base really understand that better over the last
couple of quarters and really embrace this as a sort of a must have
product in their security operations.
Adam Borg
Great. Thanks so much.
Clay Bilby
And our last question for today will come from Patrick Colville of
Deutsche Bank. Patrick, you may ask your question.
Patrick Colville
Thank you for squeezing me in. So I guess congrats on a really
excellent quarter. I mean the numbers are so clean that I think we're
going to ask a philosophical question, if I may. It's going to be about
M&A. Valuations are roughly 30% cheaper than when we last spoke three
months ago. The start of your tenure, Nikesh, as CEO was quite
acquisitive. Is the moderation in valuations for private companies,
public companies as well, does that mean that your philosophy around
M&A might have changed versus the messaging you gave us six months ago?
Nikesh Arora
So there's no change, Patrick. I don't think the valuation in the
private markets have quite normalized like the public markets have,
first and foremost. So I think the private markets are still enjoying
the lack of liquidity as the no reason to mark-to-market devaluation.
So that's just more of a philosophical answer, not correlated to my M&A
point, right? I would like you to have it purely because some of those
companies are trying to come attract talent for Palo Alto Networks as
I'd like them to get mark-to-market, so people realize that these
things can go down.
But that having been said, there has been no change. Look, as I said,
the reason we're acquisitive in the beginning, there were many areas of
cybersecurity which were up and coming and going to be important, and
we were not in there and we were behind the 8 ball, or pick an analogy,
we were late to the party. We hadn't done the work needed to be ready
for that market. Take cloud security, right? We bought six or seven
companies in cloud security. Each of them had been in existence for
three years to four years. So that's four years of development that we
were able to benefit from in a market we need to be first.
With Prisma Cloud, it's abundantly clear why we did that. Take XSOAR,
we didn't have automation workflows and platforms. We did that. Take
SASE. We didn't have an endpoint monitoring. We didn't have SD-WAN.
That's stuff that takes four years to seven years to build. We didn't
have the time to go build it. Otherwise, the market - we would not be
in the market. Today, we compete with Zscaler, Netskope. In SASE, we
compete with CrowdStrike everyone in XDR. We would not have been a
player. So that made sense.
Today, if you look forward, I don't see many areas of cybersecurity
where we don't have a leading product or a leading product that's not
on development. If you look at Palo Alto's innovation cycle, I'd say
creating firewalls continues to innovate, spend three years acquiring
getting up to snuff to a place where now we can compete in multiple
categories.
And now with XSIAM, we're delivering industry-leading innovation. I
couldn't buy anything for XSIAM because I looked at everything in the
SIEM space. And I said, "Wait a minute, why do we need to look at
something, which is 10 years old? I don't need customers. I have
customers they want to buy technology." So from that perspective,
nothing has changed. I don't think there's any company out there that
is valued to play where is so, oh, my god, this could be accretive when
you go take this. Because I think the cost of integration in
cybersecurity is going to make you from a leading player to a mediocre
player because you spent too much time merging sales forces, merging
customers trying to run two competing technologies.
So that's not our playbook. Our playbook is to go find good technology
which you can absorb, make part of our go-to-market motion and to use
those founders. And we've done that, and we've left the door open
saying if you were to buy companies, it would be more in the product
category, which will be more in line with the smaller to midsize
acquisitions we made on anything else. So that philosophy hasn't
changed, Patrick.
Clay Bilby
All right. Great. Thank you. With that, we'll close the call. I'll turn
it over to Nikesh for his final remarks.
Nikesh Arora
Well, once again, thank you, everybody, for joining us. And as like
Clay said, we apologize for the 30-minute delay. We look forward to
seeing many of you at upcoming investor events and some of you on calls
after this. I just, once again, want to thank our customers, our
partners, and most importantly, our employees around the world for
helping us deliver a great quarter. Have a great day.
