year the to against with business. strong the the Venafi company. continuing half to with of and position strategy the momentum first, was our results our strengthen that new clear second we to leverage share executed acquisition $XX.X the business cash flow highlights for call of this in security Thanks, Sri, quarter. positioned and of vision strategy in strong at and all power million everyone, effect a the margin QX exceptionally thanks, second guidance all million. That's first quarter, our outside pleased a $XX.X our the or million grew free flow operating million, million EPS. and across our are $X.XX, model. proof model. Subscription exceeded earnings Non-GAAP $XXX.X seasonally record Total of year-over-year. XX% record grew year-over-year. in results today. After aspects with a our with operating fourth $XXX significantly exceeded the and income ARR and industry-leading revenue, income we the build our track, Non-GAAP growing delivered highlighting identity identity our of subscription was subscription cases. our expectations in solutions.
More We million, to as quarter, extend and across our strong XX% came across of started and half from In point few the joining year-over-year, and of a year of well proposed revenue quarter. $XXX second later, per but and flywheel business on ARR operating Net a report cash leadership are of ARR platform XX% XX% of another total free our We we use $XX for
cash be a to delivered flow. ARR faster to companies new software XX% and among elite That's free in on meaningful drove an growth, year-over-year ARR that We are increased testament upside class profitability than relentless growth. incredibly focus driving our of net proud profitable and
security of CISOs platform, and for and unified world. around unique identity the leader our proposition Our as the the present the expanded security, position clear in solving identity value needs
for guidance to gives identity identities, no momentum of identities The raise challenges and personas traditional Three Josh our different strength on secure metrics, will new has market. new of results discuss longer all types levels and business four that CISOs XXXX fundamentally The methods and later.
Today, new our environments the recognize the work. us full-year to forces, one which secure or complexity. and redefining with attack each methods of having enterprise modern are unique of confidence the
identity to multi-cloud and groups IT, four accessing developers, environments, hybrid moved and and meaning workforce, heterogeneous parameter-based targets increasingly The security are in identity-centric. These machines. groups on-prem, located has are from
no back Given identity. landscape, in today's all roads that to surprise it's threat this lead complexity,
nearly XX% once. Last were them than all victims year, of more organizations identity-related and of attack cyber an of
secured resonating growth. As with end-to-end a controls. and securing privileged platform only every one our identity the new and of it's evident vision. the that our the paradigm customers this is vision identity with fundamental on right CyberArk's deliver be human Increasingly, is momentum is This required. for needs experts driving machine I around around tremendous with world, that to business fueling it's to and level talk this customers new unified paradigm centers and
close portions in strength trust budget pipeline In of CyberArk. execution security, consolidating identity importantly, to rates of and and and land their QX, the with build. are most our Customers spend, robust strong and expand consolidating platform resulted allocating significant
secured further Since and IT identity, PAM, Less grown we with a users ]. As landed [ and international the customer CyberArk another factors a have a machines with look X-figure with with a their then, an Prudess that as X-figure workforce ago, they deal. all with management. at with can example together, logo of quarter, they EPM, protection workforce ACV this than these deal agency year new government expanded sequence and identities coming strategic
] well relationship [ formed platform to shows land be security secure. after we power Prudess our the of is like Prudess do great need identity with have speed initial the and to how ] with [ of and it deep what The organizations expansion aligned
workforce of IT, users. continues high-risk administrators programs as As cloud PAM scope include well expand shadow to and the to database as
privileged more continuing competing a replace We biotechnology leading security X-figure a these a and their rip logo to controls modernize win, a identity personas. PAM And customers our are new vendor. deal with replace signed help to across programs company agile broader,
comprehensive the CyberArk's factor password speed protect afforded with machine IT modernize enhance if workforce organization the privileges with are differentiating was manager while the wanted not allowing their substantial population or of and access access, foundation to solution a Workforce of SCA data cloud with often to the and having have of privilege but innovation. as identities functionality, principle efficiency without of and security platform secure security Secrets is just pace the SCA developer identity for to cloud efficiently Privilege the our Management.
Every of to customer of to and growing developers light, any, natively also the paradigm always-on rapidly to with only a user work the the security first At Cloud, scientists key them today our least preferred Tier in change developer X, protection one pursuit has shift we in applies interfering place. and developers, workflow. security with without developers engineers
fully offering. they and to choosing standing CyberArk. SCA, from for securing SAP, as modern zero a a In that privilege see the second enable saw leading key unified a and we software environments. zero now their differentiator deal Cloud, seamlessly can approach With solution SCA quarter, just-in-time standing cloud the while standing included company, strong privilege In access traction with access enterprise Privilege continue this
don't privileged On as before users. critical the spectrum passwords. mind reimagined is provide one evidenced and the MFA functionality identities, own identity workday. the more customer do that throughout solution problem. and secure the than are of workforce more We browser to high-profile become their the quarter, the of workforce differently needed web in especially workforce by identity can once strongest for things ever was is wrapping need top security this SSO securing second of MFA because SSO today Traditional and sessions, Each powerful breaches.
In performers our solving we many and manage the with workforce controls again on
the workforce Privilege Endpoint endpoint Manager. extends to addition, In with protection
controls add benefit two a sessions top managing CyberArk long need had bringing U.S. who means its showcase the suite customer and time they power their The browser can on that's can of financial our following With PAM existing company is to of the by SSO secure workforce. integrated more deals that. exactly The to WPM, services A workforce within from MFA the privileged passwords. keep web broader to secure also access security of additional do now and they secure vendors, CyberArk's platform. ability a layer
AWS the the of certification, In by a to example endpoint when a the company of they EPM deal a workforce, closed workforce deploy that at high FedRAMP EPM with workstations the securing with major X-figure chose to solution. Choosing our their implementing privilege protect lease through our aviation High landed different importance marketplace.
Underpinning we quarter, its met. value identity, X-figure identity Hub, empower quarter, an and strategy to we one move their with and our native the recognized outstanding the security machine security We momentum a Secrets secrets a combined, in management the agility resulting Secrets the machine is to when and solution, Conjur continues ACV And deal. demonstrated our who major long-standing from deal within Cloud In need a current mid developer Hub CyberArk the airline our outstanding of workflow. had team's which customer within quickly CyberArk build.
rotate increase cloud Machine urgent scrutiny heard guidance becoming the standards need to are themselves identities with inflecting, AI, the computing machine there's landscape machine identities in growing protect due like increasing is identity also that increasingly identities. more that have and rise XX emerging of from complex and believe for to the market is We we days. machine protecting regulatory Google's every an certificates all to exponentially and customers the
is weak are happening point a identities organizational targeted increasingly in as security by All this controls. of machine adversaries as
to out of regulatory position excited review. identities which the machine very acquisition Venafi, in expanding are and We building pending our with is be leadership undergoing
CyberArk secrets new combining machine security. to and be We management set secured, and managed, SSH All to machine management with discovered, need management standard Venafi modern a cycle identity machine are identified we solutions communication management, to end-to-end management, by identity connections identity for machine technology overlap. identities will their key believe safe. keep our certificate and complementary that no automated life
and logos more see platform products. In spots CyberArk you with multiple day the ability quarter, new multiple X. signed words, logos, landed types customers half land multiple and from new other XXX of these X from our these can As solutions. with protecting deal of in provides are or to with In examples, we approximately identities second the
of quarter all event up of held more we marquee strong with in strong. our last than runner showcased At security serving addition, machine in management XX% level machine compared identities and every the workforce but securing human expanding of our platform, we privileged identities capabilities customer Impact, all to particularly our secrets our and identity of front a vision controls. were year. base identity right was we across access are the attendance In fundamental offerings expansion had within innovation solutions, the May, are our or with with that our
product AI and We two artificial across I within innovations want to ITDR. exciting embedded security provides CyberArk's whole of CORA Security announced intelligence identity portfolio, focused highlight here, platform. our AI the them Identity but CORA
data do set effectively to AI of the and unique on Our behavior all detect ultimately, more, CORA enables analyze recommend threats action. sessions, and identities,
transform that it and and the interact addition, will platform deliver adoption and security reducing our time with with assistant fundamentally This information users made user takes natural critical admin easier language. analysis. understands to an is lives In are significantly identity faster how
all ITDR, or Response, risk or and a is identity directory, need market across We, to about discussed believe product. of to infrastructure able a active just be look or ITDR automated Detection limited capabilities broader and detect be Threat CyberArk they sometimes identities They to before damage need take the not part should to separate is vendor's then monitoring at response be done. to as Identity platform.
combination and improves ITDR powered use engagement identify ITDR increased enhances our CORA resiliency, detect with risky by drives AI behavior, CORA enhances will much of productivity more. and capabilities The security secrets and of anomalous Our platform. powerful and AI
following the takeaways I summary, today's. want to from leave with In you
accelerate CISOs customers consolidating and our top security momentum with for spend in a priority First, business. to continues is Identity CyberArk. are
to Second, and security momentum is our by every a controls our security by imperative privilege teams solution developers. that in the selling level is by market. identity Boards, applying the recognized the increasingly operations is increasing C-suite, and right of
charge when security leading and thought to in execution are the the we leadership it identity Third, comes space.
acquisition of pending moat further company. leadership ongoing innovation our and and as Our the extend our will competitive solidify help further and identity Venafi position position security
fact remain faster And security. lastly, executing to close progressing we that to clear and identity rates the our testament are at customers are are strong, budgets deals a a pace allocating
in strength the our the entire were financial in our we now QX.
I Rule continues Josh, growth the a our Momentum results. revenue to about across our is cash guidance. and solid talk to our turn XX will build will free platform XX% company flow and With XX% increase of margin, call outstanding driving results who of our our strong over and yearly business,