and the quarter you fiscal joining for our call third evening, earnings XXXX. Good for thank of
Email discuss and Security how our this framework. an Analyzer On recent of our X.X with DMARC I'll that acquisitions tonight's call, and overview next support achievements of our quarter, I'll begin Segasec strategy, and
our ongoing solutions API And talk the and of are discuss why our over our some share our XXX. third examples has I'll with in our I'll partnerships how delivered of benefiting the offerings finally, these Mimecast success customers. Office integrations integrated Microsoft were And competitors. quarter, I'll about and then growth preferred
once and Turning net new in to reported, sharing with of result to to customer the the retention, addition constant our results our XX% was world-class of as delighted Revenue quarter, of that grew and you again third additional base of XX% of $XXX.X performance platform. currency. are we to sales guidance. million the XXX services exceed be year-over-year This subscribers, customers our
notable several enterprise to named in by Mimecast's are The the in market Quadrant and validated further Mimecast leading high amongst larger confidence advisory in Enterprise these for research up and a as be fifth Magic Gartner a continues leader for comp Archiving building year the for segment brand against row. Information profile providers, was And organization. elevating wins competitors. technology our and leading was success wins customers, This
opportunities them Partners also us. to and in recognize position with our the improving market available partnership
For XXXX. silver for the example, named of CDW their partner year Mimecast
think X.X beyond Mimecast's Cyber Security the at to what Email email have X.X quarter, Summit. best the over Resilience attackers’ Email Today, introduced third of the cyber strategy, we time. Security gateway. strategies moves as use During we our how evolved outline resilience
consider. call X well the users focused on of customers or both safe need defenses blocking it, that that zones of keeping ever Our or as deliver a perimeter as that an solution for to email additional attempt attack organizations to we as to threats evolving scams organization's are sophisticated Zone directly malware set gateway two and is
leverages or the X, the attacking domains to where attacker Zone Now brands systems to attacks, perimeter fake then the in or company, inside X report impersonation, at email and public employees, fraud. and properties look commit simply wild, web proliferate Zone the organizations, credentials attackers an when threats using and the partners, inside customers,
three deliver Now services Mimecast an Email integrated X.X solution Security across zones. all
Our defense both training acquisitions with and Zone and to Analyzer in X Segasec. made deliver DMARC that then into TDP Zone offering IEP our at Zone platform X, X enhancements recently we've and the awareness significant of
We Now offer analysis service easier and when stopping Mimecast solution domain-based domain services, attacks. effective message gateway management and and more acronym the authentication that DMARC offers a and set combined Analyzer customers is cost Analyzer with reporting conformance, for spoofing an up DMARC provides DMARC.
service extending chains digital against by company's supply brands, Segasec beyond attacks that protect and defenses and perimeter assets. footprint is a a detection customers protects the spoofing organizations to digital
Here your proactively malicious digital damage. we finding domains are and properties or legitimate impersonating and they removing before assets replicating do
we the offering or As call Exploit part of Segasec BEP. will now, Mimecast Mimecast Brand Protection
these already adopting framework. The customers technologies, a the for on as customers witnessed proving comprehensive availability existing X.X popular of to we Security new being new Email attracted is these Mimecast and advanced platform us services our
open adoption base we've been has a and on our to prior key differentiator across API discussed engagements. continues strategy, new customer Our deep and in calls which see sales rapid
organizations. customers XXX services to Over API's of we've the doubled over XXXX, of through the more than course accessing number our
IBM technology IBM Our integration complimenting vendors third to quarter grew ecosystem resilient, integrations include leading of in fast expanding QRadar. with Mimecast with the
Demisto This email cyber to resilience realize Mimecast Additionally, capabilities value upgraded recently can adding directly the from enabling strategy. customers users further from enhances their by Demisto. remediation within of mailboxes removal
is Office Today, quarter and secure to in XXX, our cyber our over Mimecast to Now enhance Office Microsoft XX,XXX with half be XXX base meaning be on use total the customer of with now their more strong. new Office Microsoft XXX. continues help to customers us with time, resilience confident over success for XXX. that them Office of to third first to came the than our organizations half More
XXX XXX and total dependency. Office users on today, are there and can world near over a Now imagine active we deployment office business easily XXX of million
course homogeneity range wide on of This can concentration exploit attacker of scale of used a risk organizations, business infrastructure. targets. means a tremendous scam a represents as this can across be critical huge single to multiple the successful advantage this Now security
Now different Mimecast that new risks interdependencies mitigate can and new this require new by risks pose they face dependencies and in and reality digital the help customers characterized plans mitigations.
vendors Our connected systems Email of security organization X.X as more email through a pervasive linking the security are ecosystem. products customers a beyond part emphasizes and expanding inside to API's view that Security as strategy broader perimeter of used well generally by more the as our and other and
archiving, suite see a ubiquitous we our extensions, and web as an with When security, XXX Office combined significant our continuity, resilience and of security cyber to continued grow opportunity and in world. such subscribers
are reasons the solutions Now I'd with share types we're to the market. to of choosing some the and you Mimecast like delivering of customers
of to So protect resilience a enhanced Office the recognize XXX XXX offered addition firstly, users their a in cyber moved brand. customers company technology and need to U.S. staff about with to and based healthcare for Microsoft what
commenced Mimecast superior the RFP after live and XX was with vendors, breadth days for efficacy and vendor, selected to of at their Zone in threats to another to insider perimeter Mimecast employee leading or and But both empower our and evaluating capabilities in ability organization was Zone scan deployed An protect to running addition of for were X X, for solutions defenses. this our Zone traffic X.
understood value evaluation DMARC a product security used web to unique separate to and our cover sort this during be platform and they our too. Mimecast both brand needs, categories, and across in the exploit of purchased offerings. service continuity they their protect X, of Zone delighted our what ultimately subscription and ability integrated In included They and multiple archiving their customer customer. differentiated
Secondly, attempt between in Splunk proof-of-concept selected Demisto. efficacy. proving Mimecast vendors to They other block network emails. had vendor and a Palo to integrate they several and the including our be was as for not open another a using was our It engineering and solution as better they technologies employees in leading and Alto with U.S. for API's did intended, so XX,XXX was Mimecast firm with ability an and a looked dangerous with successful our efficacy to legacy through Networks side-by-side
future employees efficacy organization consideration involving U.S. Security Email was a suite the Mimecast they comprehensive given roadmap a that lower comparison of from and a to and consolidation. rising proof-of-concept existing costs selected. XX,XXX a then healthcare provider, provided better solution. was versus after for workload a sought their Additional completing with experienced integrated side-by-side services Mimecast And Then incumbent
more valued with Email X,XXX and and also our children's Security efficacy Zone archiving. and using acquired customer for legacy eDiscovery offering. was for bolster multiple projects solution looking technology employees The Security They Analyzer vendors X organization to archive simultaneously a from Then service defenses. had better an their streamlined Email healthcare recently with a DMARC
effective in was Mimecast selected of vendors, involving deploy platform, easy and POC to platform. to needs our thorough other cost both their delivering After leading for integrated a
to the with of the and efficacy advantage email vendors recover. to sustainable of IT communication looked employees added improve transportation this some company a infrastructure And and other global platform internal customer protect, data A XX,XXX take with network. sink and integrate and Mimecast chose modern benefits and security include in
as While the not services. efficacy, flexibility align API other incumbent live for as support our administrative off After integration. was able Mimecast their selected with customer customer's versus vendors, to our leading vendor offered platform Mimecast this a vendors, and of threat was bake vision not sharing robust across improved and
students and approximately using A email XXX Australia to standalone in of was student staff for while protect over faculty ATP Mimecast on XX,XXX XX,XXX higher education relying their Microsoft Office institution with accounts.
compromised. course incident accounts. of Over XXXX, compromises were of experienced accounts one In repeated this organization student over student X,XXX the
able Mimecast’s more of implement contain TTP for for IEP remediate faculty staff X improving user of bundle that the was and the experience threats safeguarding and sheer for and And perimeter costly, to and XX,XXX and effective organization to was a both network. or guard while was cyber attack, both they cost selected the spread inside to end all reducing number to sought Zone Zone hunt and combines this hours the with institution solution. unmanageable resilience. enhanced IT, complexity SX X further the and this
XXX over in zones Office an A nine a policy complex required XXX,XXX beverage on company configuration global multi-zone that with covered vendor operating geographic support that scale. deployment could a employees
evaluation that complex alongside vendor and look insiders. defenses After and efficacy to Additionally, from protection their to stronger compliance their Mimecast incumbent the malicious attacks their incumbent have global was eluded and an careless requirements. ability Zone impersonation add found organization against guard vendor to to fulfill this had better X sought
partnerships summary, So and technologies, innovation continue against so, of service our focus and to we staying customers doing and while adversaries our In balanced operating best of topline threats defending with we we look services today's their XXXX we mindful innovation solutions. people simultaneously available This our that in are as and threats remain enhance as abreast driving growth risks growth Mimecast’s ensures our to to develop perpetual model profits. customer provide the delivering alter our on and Constant underpins tactics. new and beyond.
the turn detail to like to call over I'd further. Brown, to financial Now, Rafe? the our Rafe cover CFO