Philippe F. Courtot
our QX you you, and everyone, and call. welcome, Thank your We hope Vinayak, that families earnings to and safe. healthy are
environment a for globe. changing workforce organizations ongoing Qualys, pandemic Our have the the at our of The operation aspects needs support business, security the mid-March, environment and to of of to well-being including have COVID-XX the on unprecedented development, customers. seen address priority our deliver uncertainties and to across health remains and transition our individuals all created and employees, support product a we continuing Since services. seamless while has remote and continued effectively with
networks explosion from We securely challenge believe existing onset remote is the productively security these responding we providing cloud architecture endpoints days. and Cloud ensuring the of promptly proliferating Upon free visibility files deliver malicious and Malware in file that at cloud-based endpoints. never-before-seen QX, delivery IT that website the threat for endpoints, known extend well protecting of organization, using assets work security additional there continuous were malware our delivered and releasing ensuring on we eminently their is these the could to bandwidth. as remote network, for VPN to XX-day misconfigurations, vulnerabilities clear This an enterprise external their instant cloud-based capabilities are companies endpoints from that and service detection capabilities and service, well-positioned workloads. to of its directly able remote for ineffective evolution and all and vendor classification on remotely no little leverages as and few are architecture. traditional this priority becoming market to service organizations' security the COVID-XX, of a our it these platform remote one the the of securing of will connecting the customers Agent location, are are their Qualys critical employees patches investing days, detect the securely that patches already remote of and computers, are experiencing XX installed inside and applications, address endpoint In we XX for content a obtain paramount. license companies are and which due As is customers our deployed endpoints. missing addressed and vulnerabilities. solutions to critical is help solution, expansibility impact them Qualys of needs These of real-time that quickly critical no of to protection in and detection reputation challenge to uses view by deploy of of our cost added servers to team
Protection addition, service using pilot. to this We The Agent, no-cost US free to which available Cloud offering. companies, currently with based service quickly is security provide detects actively XX-day federal have XXX the on cost. multifunction manages a agencies is proactively endpoints, including Endpoint now nearly and prospects remote hygiene Remote this no customer In over Qualys visibility at patches vulnerabilities, them their XXX instantly
Integrity Cloud compliance XX is Agent Management, Patch and Asset the paid of strong we QX, Compromise, now, our growth quarter. for IT security almost the Policy technology Compliance, Cloud Agent Our Vulnerability prior-year Certificate more upcoming, XX% have and to of in and Management, with platform Inventory see File seven from representing come. million we our Management, to Monitoring, subscription, continued solutions, the In Indication growth
continued or not platform, customers XX%. solution products. – on additional required We have achieving retention strong solution our to breadth adopted to at to Agent the offer (XX:XX:XX) multi-product growth rate ease of demonstrated of adoption or and of adoption. subscribe for for by is expand who Cloud our do additional increases ubiquity naturally our Agent. stands makes our the progress them us competitors of our of with organizations have same our helps Furthermore, We After more once, five frictionless no same do to the paid the dollar the competitors. that the applications This solutions impenetrable make goal fact because enterprise is infrastructure not Cloud offer this stickiness it's download our to
entire of patch in seamless an the called a Response, Qualys combined scanners application Cloud solution Platform, into effective went Management to vulnerability providing allowed level, Management, Vulnerability power assessment, also which management next success with Cloud have VMDR key VMDR, powerful includes it's Management prioritization of which April. respond driving continuously real-time that a scanning, Currently, network further approximately and platform the Cloud environment by incorporates already Our XXX our and in general with the the detect Agent. Cloud new our of with Detection customers, on vulnerable single and lightweight and has VMDR, solution to availability and to are analysis penetration XXX a passive and orchestration. single virtual across been Agent, adopted customers. discovery, misconfiguration remediate Vulnerability takes into building capabilities global to the Vulnerability compromised four assets The elements IT our huge hybrid the – or and that us customers create
agent VMDR, In but fact, million other were has proliferate further have roughly of come VMDR out also our only foundation helped subscriptions which subscription. million from Cloud XX for upsell X Cloud our X.X million of paid Agent, of new paid a not sets Agent the applications.
continued almost Global see over Management and Inventory, using solution, of adoption signed with In good companies up Management strong continue to term free our XX,XXX We our adoption companies of IT to Asset we see our X,XXX actively customer newer Patch a solution, service. In limited endpoints of other have the firm gateways. patch Patch both mid-market well in bandwidth competing ability available VPN selected on IT over the solutions, segment, QX, our large with its effectively without given using large and service several easily as remote customers. application as to
saw that a video across application infrastructure, This robust VMDR with already again provider has Security our the for Container growth its deployed major solutions. communication adopting enterprise quarter, we also
they to Monitoring, large Cloud for solution airline, momentum Integrity competing File had leverage with application, our Agent already FIM selected Asian Vulnerability see having effortlessly in FIM, a a the our point Management. addition, continues Qualys over deployed order In to solid solution
and handled data. are scale diving – the importance to the building Now on also analysis of telemetry storing than data sensors recognize Cassandra in computing our million petabytes while we pumping needed handle our million deeper, clusters, Kafka writes a messages to bus, our X capturing early X XXX Today, per more volume Internet objects of of our indexing also in day data, of search with via than clusters second back-end more elastic recognize points to were a early billion such the our XX we engine. Ceph log large all the necessary we moving and and capabilities trillion X on
highly that and the next of the makes IoT response Providers market endpoints and Large reduction all our and on-premise we Security costs. and mobile platform providing enable and four of EDR Cloud activate environment. assets, scalable to solution Managed Service and address result, to view cloud-based response environment, across single-pane-of-glass greatly cloud reduce a Providers, OT beyond easier Last generation well month, also it endpoints, introduced us new a only segments, Enterprise, for the allows goes but times false-positive, not Multi-Vector our the As
startup chain The has multi-vector focused expertise a Spell fully be solutions visibility investigating endpoints, in and the EDR As software to hunting attack have Multi-Vector accuracy to against machine Platform and EDR comprehensive learning. and billions To strengthen by Qualys and unique Security, from visibility in as into research, joined intelligence, have Qualys of very the attacks. entrance and entire scale They approach in threat platform. and providing faster, collecting provides on an security and context provide and app, Qualys Traditional malware on the innovative critical as response a that the attacks. data and a will Qualys security hunting threats automated, we will activities, natively understanding employee. and security with unprecedented market, all into global hunting more of well protect of EDR threat telemetry integrated deep into our power, products now leverages asset full team malicious acquired employees and by endpoints, correlating events Cloud (XX:XX:XX) context also analytics those cyberattacks. the singularly India the our Multi-Vector
the Multi-Vector managed interest – delighted VMDR is security generating of and our EDR are with customers by adoption the by in by them. with and We interest the service providers, strong Multi-Vector now both
to of automatically of instantaneous Multi-Vector Multi-Vector the (XX:XX:XX). pleased our update application Cyber almost enabled. We're to now Agent, CISO services also it Salvi, as from Cloud an which a our by managed here's is only EDR. announce Vishal Infosys adopted Moving VMDR is (sic) from is VMDR [Cyber and Practice] And once Security requires done Head platform and that security Practice Infosys both quote has EDR
its our network At pleased intelligence, to clients Defense Cloud Qualys agents we to upcoming solution organizations of the and highly the bring scalable Center. discussed company our and response to globally end new allows costly, and us multiple needed consolidate and collect, become Hat, SIEM deliver with it complex Qualys' current expect need trillions (XX:XX:XX) of is provides and Qualys that Multi-Vector XXXX. and at information. VMDR effectively advantage an Data important sensors, EDR points and The we we soon that quite normalize unique endpoints, We collect protect in can milestone use back-end which and Infosys to beta the solutions our requiring have displaced leverage Cyber [ph] analytics contextual with to and are data Lake/SIEM stack. early data with capabilities IoT correlate with for environments. as our OT will mobile, also incident Platform partner forthcoming our our into and of via across vendors solutions be security new Black scalable array opportunity incident to This is distributed we response on-premise, to have fully us its of sensors cloud, robust and their enrich,
Joo the will expand back company. as Her Kim continue and and hiring Platform welcome On Cloud the expertise the planning of grow be front, investor Qualys. Officer Chief finance, to to as extensive Financial we Qualys pleased strategic are instrumental we Mi
leader interchange and also risk guidance Qualys' Chief our security Information Qualys, strategy. of Ben of XX and Officer. Carr responsible years more experience executing IT as leading Qualys At executive are with security to customers, Ben delighted and in strategies information long-term he is thought a has CIO/CISO securing is that Security and cybersecurity joined infrastructure. proven the We providing than
of John Zangardi digital Finally, and board in to modernized DHS successfully their the cybersecurity as welcome of we and experience both also has are the well honored transformed infrastructure as transformation has DOD, directors. operation. extensive John the to our
insight fact highly is innovative We as our a our summary, we security gain are security become valuable and mention cash-generating Platform have business that to a recurring, visibility model. deliver continue In such guidance in our than time, compliance greater which very critical, even difficult in other and of nearly to business software. not companies industry Cloud solutions XXX% of the and we profitable his to grateful the and mission nature because have our many to model, expand
for and And highly achievements to and call Joo spend. profitable XXXX. third discuss continued progress the our Mi drastically and fiscal customers model our I'll lay recurring year Thank foundation Our we've With to financial and results importantly is growing compliance consolidate you. the built. platform for guidance enable reducing security, that, turn full quarter product revenue it the over and IT to to by the core stack their to their