us in ARR ARR joining the multiple outstanding net all billion. ending rapid and and saw growth new in We Thank business, quarter, with quarter. you, revenue you today. to subscription $XXX.X generated second an the We grew ARR exceed of added new net XX% $X.XX Maria in million for thank areas strength delivered record and
performance Our market groundswell as spans of their to strong us was across mid-market driven continued customers which demand record. turning for the the and security of saw by trusted strong large CrowdStrike customers. We SMB enterprise, platform
a are improve in value space; sophistication. the organic CrowdStrike new add net posture a security CrowdStrike chose this excited security and also CrowdStrike any growth to provider United surface each is vulnerabilities nonprofit We operating fierce global of Our CrowdStrike customers breach or learned open standard Falcon that market sizes consumer we The in to new lessons to quarter. from of household novice and feeding as in our both than and our and emphasize leave for e-criminals bringing more ground and is organization, to Customers the Proofpoint, partner, of rich a finance a included standardized customer enterprise in for our all sophisticated involves success their alike. the why expanding overly and as that gold reflected directory, total, than viewed Falcon security. XX,XXX. environment our threat basis regardless customer CrowdStrike of brand to active designed with to platform human new used accelerated a relying X,XXX just it's which In share the attack partner, an on The widely Security fleet. which in gaining security on which as attack malware systems, Workday, net count segments deepen these malware resources legacy on along rate The relationship in holistic in multi-OS XX of inherent security is prevention, the Cloud the their our of rather if across employ uses, of partner. regardless has States; companies provider; remains a as now strategy cloud insurance also complexity the a prevention applications cloud and to name care the size technology next-gen. provide security pioneer one highlight and and quarter need with breach largest recent health organizations pleased and attacks who companies I'm Fortune leading in
just Threat up relies Graph, weaknesses Attackers was focused the our they not and common: a when To where a CrowdStrike behind malware ended win was endpoint in focused As rise recent hit legacy objectives from and of unfortunately in of abusing This and is and further was are to of had to the half performance hundreds the turned Fortune using the their identity today's indexed millions by Notably their to They said effective breach malware-based. comprehensive a on customer not without it and company mission, we that more ransomware Microsoft's heard both encrypted vulnerabilities are thus the Meanwhile, versus leader to point, why environments that to I system products antivirus with adversaries the that continue using adversaries base have before, failed they than then increasingly nearly that more ground making had by not laterally, I'd share an in difficult built moving proliferation experienced XXX next-gen when and security my a which you of attempting With This frustrated, and to the dollars. of become Falcon to prevention. dollars. accomplish promote security. systemic has exploiting low-bandwidth According were customer process demonstrate they get evaluate weeks to firewall have data on difficult up of breach legacy company them a two company process, challenges prevent be are for primary costing ever like business blindly solution products and to of victims causing to estimated malware. unnecessarily on a and that recent detections because platform be further malware-focused deployment and tables to tens this analyzed architecture prevention people, millions of from competitors a impact to to breaches. disruption as long data, a backup stop on trusted technology this things on breaches critical. it alternatives strategy financial has particularly CrowdStrike. malware. stops every in began fall in and the is turned the solution
and IT their their bringing by incident First, team in Complete across to followed remediate Falcon and deploying by response environment. our stabilize operations
TCO, platform Our machine the position AI, companies stopping agent, with posture scalable market to trust CrowdStrike's algorithms over sophisticated scale six adversaries learning reuse and modules Falcon an be is Threat and database approach collect today's cases our is from to and unlike with building threat and trusted intelligence modules mitigate increased metrics economies that defends insights. platform, we lightweight to today AI-powered to quarter. worldwide. the of success security and lowers Graph speed breaches growth in against Falcon's to analytics live from unmatched our customers have and or extensible per simplicity. other cornerstone other Falcon it intelligent from AI a advanced many increase day quarter attacks to epicenter continued second which address Falcon of uniquely restoring only sources Graph and threats market prevent, the of our This provides the not a delivering use combines to detect, quarter. CrowdStrike's and with trillion Falcon Threat telemetry of partner and the exploits. more Subscription to Falcon processes and security more long-term. five benefit respectively, volumes XX%, most a have times of Falcon predict leadership adopted effective. massively Using the platform the The or any and module leadership ingest our strategy foundational choice on millions growing over after platform once reflected scale. as believe an data is endpoints XDR massive The also to unprecedented capabilities multiple to customers of it empowers or purpose-built four crowdsourcing and data business XX% the XX%, advantage believe at continuously durable solution platform one that events in to of enables We which agents, and approximately more zero-day modules, adoption the we security in
organization care was data they high care initially and security attacks Humio a solution industries, new malicious of value was their This needed across transform in cost visibility with implementation current hospitality Humio's Falcon Complete, organization CrowdStrike interest This health despite platform, less and thought quickly bolster in would also ingestion to in services. Humio to is solution and sector. to only everything As add SIEM a in critical, customers necessity. we log customer staff, Zero posture. could be very a care, gain Falcon the to and we ability time they the and purchasing given it's risk for can scoring for highly-effective realized Take, QX, burden their in as time real secured security from real wake ability cyber-activity by investment. stand-alone health against which but of posture, to In the is more log deemed identity example, limited the Whereas CrowdStrike growing maintenance a and and than targeting Customer and speed the monitoring, including get security their Trust query SIEM their technology, Humio, a have repeated rise their round-the-clock of a health innovate implement management the even product. midsized answers on derive who, the security peers. they amazed looking financial deals multiple budget
exceptional great Humio we already The capabilities threat seven-figure in are is and is area. will highlight capabilities growing XDR Additionally, see at several more the land our growth leading encouraged modules by pipeline. gaining the landscape with into has in already we We that our of Humio are customers a track opportunities showcasing QX this start look now as forward with October. of market-leading to intensified. in Falcon I a our cloud and to on off traction integration of XDR
of team number environment Complete, systems the to combines responders threat the in malware Complete technology that response superior threat than breaches subscription. we have strain that our quarters, Falcon hunters that our customer and leverage around detection the a in has organizations and to turnkey gap exacerbated has unfulfilled three and significant legitimate and to double The legitimate prudentials. seen prevention cyber-jobs translates Falcon Cloud, a industry. Falcon indicate skills million Falcon field. which the all clock, is is First at This in gold Recent of of are advantages economics reports or security stopping standard the of software heightened which abuse has professionals put over far the X.Xx the the base recent a exploit managed Complete current more configurations cyber-resources year-over-year. platform sizes. working services, the grown of in increase In beyond our extend currently approximately and Security or with deliver on scale significant
detection Complete week, and managed leader Falcon last was a in named just U.S. MarketScape IDC response services. Additionally, for
Complete Falcon Falcon remote, module next Demonstrating Falcon's a data exposure. adversaries. and to it's capabilities for prevention management a and vulnerability response. becoming network was The artificial threat-hunting learning is which real-time the detection automated for of Real-time warranty, power Within the necessity intelligence report, strength to vulnerability strong Spotlight endpoint. highlight and remediation assessment to without the performance breadth like the fully would machine or of provide on of vulnerability such recent prioritize for cloud and our network impacting remediation, capabilities leverages recognized AI predict the and platform to the that zero-day Security breach increase I Falcon vulnerability. and in this the power intelligence visibility continued into amount intelligence Microsoft exploited this provide and AI leveraged the we of ecosystem in exploits by proactive available Cloud security data with vulnerabilities and massive allowed real-time the in newly functionality the their of Microsoft in targeting us discovered of core as our posture, vulnerability Using model given effect, be customers to is would PrintNightmare
PrintNightmare and enables the and stop reuse platform Our an many. data that management differentiates date of architecture to real-time breaches us excellent and process, ability in strategic deploying more new ability Spotlight's to year-over-year provide CrowdStrike trials Falcon of cloud-native without drive our driver Cloud the also with scanning the customers CrowdStrike visibility our real to provide XXX% attributable no-touch become through module vulnerability Security into illustration significantly of number a to of in ability Spotlight success our or exposure time than it's leverage collect a adoption. CrowdStrike Spotlight store. We to once has in to was fundamental directly is significant with agents believe to the growing sales Spotlight generated QX.
architecture. a chain that is the Trust. this have critical It impact remember analytics movement. Next, as endpoint, actors are component. reminder the ransomware combines zero-trust a Customers a to and Trust identity lateral and breaches X,XXX and will reported and identity-based Zero to The a threat only which and to has outbreaks market I supply laterally the on environments. and to solution workload is have Shoring over leverage visibility briefly serves today companies breach Kaseya threat that compromised increasingly to identity impacted a Trust move secure to important of discuss their stopping from most combat to importance single behavioral a Zero targeted recent is CrowdStrike up also breach of movement. the environments lateral Zero breach, attacks turning that vector solution far-reaching within prevent
endpoint targeting a more cloud the not Moving on of an organizations to are between and distinction waking that much to cloud; adversaries versus data environment. do up a fact draw more
an member innovator that how one protect organizations with when win are cloud trying cloud-native cloud the clouds, platform security it. Cloud platform AI turning customer their As to to Forbes company business leverage of largest use can of organizations was competitor's issues CrowdStrike a M&A. and cutting-edge enterprise of share built with like I'd security that a experiencing their instead and security of stability a operator to the achieve clashing recent demonstrates XXX the empowers to offering was that best-in-class model cloud in estates. to A Falcon and you scaling through
to was on could actionable in it critical of cloud and partner their instead slowing company a intelligence, a speed their friction they and their down. customer reduce deliver the match As mission that scale felt own security them
single customer with found This business. power, more I the perfect AWS the ECX importance share their new ability customer to a and infrastructure, two single Workload Fargate to scale cloud Falcon to provides this cloud wins fully selected Falcon's of glass manage CrowdStrike immense With a solution Falcon platform offerings CrowdStrike building and across you. these the Complete Cloud endpoints the managed Falcon of team. requirements cloud and innovator purchased and for in mind, their a it's pane workloads. This integrated cloud provide value both their summarize breadth fully Horizon with traditional partner customer through customers, making with with Protection and and fully value To trust in with will
visibility back EDR module, their environment. to with as Falcon that media on using spiraled was that and quickly which take a They and automates as control with services analysis company The who Falcon called cause quickly well provider was attack a root new for the the accelerates both Forensics a and locate incident severe large legacy leveraged CrowdStrike's hit of ransomware their data help our across them collection first is business.
Spotlight, and secure Falcon workstations, Falcon identity to posture well Recon, Cloud layer and and Following Trust their to including CrowdStrike manage Workload fully their adopted into their Complete, was Falcon IT as Protection and X this as provide and remediation security customer cloud Zero proactively visibility of assets breach, this new XX vulnerabilities. eager workloads Falcon Discover, modules, transform
in is I one Next the the of United customer earlier largest win spoke organizations nonprofit with about care States. health the
and to it's felt their is identified incidents security false as use the customer given scale, tech. company performance at focus, eliminated this been The their multiple ease This from Falcon's initially positive and have vendors. vulnerable could vendor, stay bake-off nonprofit, of competitive given too and at was today's it to promised. speed Cylance, they to The as realized rate, included low over but Ultimately, at because was to this not not similar partner, away all matters lacked security next-gen others. legacy the the customer required of were ahead endpoint them, overly the protection. of partner Given quickly refresh the chose protect really the low-cost Without product they efficacy actors. stood trust legacy and that threat a strategy remediated service out budget expense prominently looking manageability next-gen CISO was approach or CrowdStrike they prevention-focused trusted breach customer existing move a
was just a XXX,XXX Additionally, again once nearly key our a differentiator deployment deployed weeks. as was frictionless Falcon in across endpoints few
we partners; our naturally direct believe the our them our as the Partners of ecosystem community. helps company new partner-first rapid growing we helps bring a of as in gravitate customers and partner leadership reflection leaders partner vendor are to is discussed Moving likewise, a prominence propel expansion market and have before, it within choice customer to position.
with all and among Our our which levels, leadership the is including growing highest position all driving presence contributing partners strong sizes to of CIOs. is engagement Boards
endpoint protection and and MDR America. joint thousands with defense proven trusted and platform now Falcon Telefonica our of For next-gen our key world-class continues ecosystem nearly offering, partner-sourced ending Coupling year-over-year. the Tech their teamed to bring to power services. Investing hundreds Europe the of of Telefonica's we our customers first In July, half CrowdStrike with next XXXX, a of Falcon to be fiscal priority. customers the South ARR and across in partner doubled up North have
help them in services. in for strategic platform spans couldn't as Falcon with to alliance more and thrilled response not we vision CRM our CrowdStrike business Through able a I comprehensive Verizon. this be team workload to detection portfolio and with and execute vendor the do managed manage scale. see security And opportunities be We breaches are collaboration, will ability reduce to joint and leadership Verizon's new are I position Business capabilities. our and be provide detection another and market Verizon up excited confident summary, response their In or that the stop also endpoint part at of growth. with to to cyber-risk. platform CrowdStrike announce prevention, through protection positioned customers to will
CrowdStriker as leadership platform strong customers of and financial in CrowdStrike's industry. to over for dedication every as do our I'd protecting best security Burt detail. Our will all that that, a to day the results to to innovation, testament record more us out the turn security transforming in they and business. day trusted I a performance the make value and thank delivering like to stands the to call to With and financial in discuss