chen bitan - s22.q4cdn.com
TRANSCRIPT
CHEN BITANChief Product Officer, General Manager Israel
CAUTIONARY LANGUAGE CONCERNING FORWARD-LOOKING STATEMENTS
2
The presentations today contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s (the “Company”)
management. In some cases, forward-looking statements may be identified by terminology such as “believe,” “may,” “estimate,” “continue,”
“anticipate,” “intend,” “should,” “plan,” “expect,” “predict,” “potential” or the negative of these terms or other similar expressions. Such statements
involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements
to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors
that could cause or contribute to such differences include risks relating to: the duration and scope of the COVID-19 pandemic and the impact of
the pandemic and actions taken in response, on global and regional economies and economic activity and the resulting impact on the demand
for the Company’s solutions and on its expected revenue growth rates and costs; the Company’s ability to adjust its operations in response to
impacts from the COVID-19 pandemic; difficulties predicting future financial results, including due to impacts from the COVID-19 pandemic; the
Company’s plan to begin actively transitioning its business to a recurring revenue model in 2021 and the Company’s ability to complete the
transition in the time frame expected; the Company’s ability to meet financial and operating targets during the transition period and after the
transition is complete; changes to the drivers of the Company’s growth; the Company’s ability to sell into existing and new industry verticals; the
Company’s sales cycles and multiple licensing models may cause results to fluctuate; the Company’s ability to sell into existing customers;
potential changes in the Company’s operating and net profit margins and the Company’s revenue growth rate; the Company’s ability to
successfully find, complete, fully integrate and achieve the expected benefits of future acquisitions, including the Company’s ability to integrate
and achieve the expected benefits of Idaptive; real or perceived shortcomings, defects or vulnerabilities in the Company’s solutions or internal
network systems; the Company’s ability to hire qualified personnel; the Company’s ability to expand its channel partnerships across existing
and new geographies; the Company’s ability to further diversify its product deployments and licensing options; and other factors discussed
under the heading “Risk Factors” in the Company’s most recent annual report on Form 20-F filed with the Securities and Exchange
Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities
Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no
obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.
AGENDA
3
• Market Trends
• Enterprise Use Case
• Identity Security Platform
• Innovation
4
GROWTH INNOVATIONSUBSCRIPTION
TRANSITIONPROFITABILITY
IDENTITY SECURITY MARKET TRENDS
5
Less Reliance
on Standing
Access
Least Privilege
Just-in-Time
Passwordless
PAMaaS and
IDaaS Adoption
is Accelerating
Rising adoption in
large enterprises
SaaS-first approach for
small to medium
enterprises
Privileged
Identities are
Expanding
Admins
DevOps
Apps/Robots
Third Party Vendors
Workforce
Identity is the
New Security
Perimeter
Rapid shift to remote work
has turbo-charged Zero
Trust initiatives
Identity Security services
increasingly viewed as
viable VPN alternative
CYBERARK IDENTITY SECURITY PLATFORM VISION
6
SaaS
3rd Party
DevOps
Workforce
Apps / Robots
Admin
Security First | AI Enabled | Frictionless | Everywhere
CYBERARK IDENTITY SECURITY
Customers
On-Prem Apps and
Infrastructure
IaaS / PaaS
Provider
CyberArk SaaS
Identity Security Platform
7
Access DevSecOps
Endpoint
Privilege
Manager
Customer
Identity
Workforce
Identity
Cloud
Entitlements
Manager
Vendor
Privileged
Access
Manager
Privileged
Access
Manager
Privilege
Workstations | Servers Cloud | On-Premises
Secrets
Manager
Conjur Enterprise
Open Source
IDENTITY SECURITY PLATFORM
Security First • AI-Enabled • Frictionless • Everywhere
Secrets
ManagerCredential Providers
8
CYBERARK ADDRESSES MULTIPLE IDENTITY SECURITY REQUIREMENTS
8
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
On-Premises
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
9
PRIVILEGED ACCESS MANAGEMENT
Privileged
Access
Manager
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
On-Premises
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
10
PRIVILEGED THIRD PARTY REMOTE ACCESS
Vendor
PAM
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
On-Premises
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
11
ENDPOINT LEAST PRIVILEGE
Endpoint
Privilege
Manager
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
On-Premises
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
12
ACCESS MANAGEMENT MODERNIZATION
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
Workforce
Identity
On-Premises
13
SECRETS MANAGEMENT
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
Secrets
Manager
On-Premises
14
CLOUD PERMISSIONS DRIFT
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
On-Premises
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
Cloud
Entitlements
Manager
15
ZERO TRUST
Admins, DevOps, Workforce, Third Party
WorkstationsPeople
On-Premises
Application
Server
Database
ServerDomain Controller
Server
*NIX
Server
Windows
ServerIT OPS
Tools
Network
Devices
Robots
Mac Windows
Serverless
Cloud-Native Apps
Serverless
Containers &
Container Orchestration
PaaS
Serverless
VM’s &
Storage
VM’s &
Storage
IaaSSaaS
SaaS Apps
IDENTITY SECURITY PLATFORM VISION
16
• Cloud native, serverless architecture
• Unified platform providing holistic end-user SaaS experience
• Shorter time-to-market for new SaaS solutions and future enhancements
Secrets
Store
Unified User
Management
Audit and
Reporting
Authentication
& Directory
Services
AI Powered
Analytics
Engine
Common
Policy &
Rules
Engine
API FIRST STANDARDS BASED
SH
AR
ED
SE
RV
ICE
S
CyberArk
Unified Agent
Adaptive &
Passwordless
Authentication
Endpoint
Privilege
Management
CyberArk
Connector
SSH & RDP
Gateway
Directory Gateway
RADIUS Gateway
SIEM Gateway
Web Gateway
Access
Service
UNIFIED USER EXPERIENCE
DevSecOps
Service
Privilege
Service
CYBERARK SAAS JOURNEY
2016 2017 2018 2019 2020 2021 2022
Inorganic
Organic
Privilege Cloud
Remote Access Manager (formerly Alero)
Workforce & Customer Identity(formerly Idaptive)
Cloud Entitlements Manager
17
Endpoint Privilege Manager
Access | Privilege | DevSecOpsInnovation
Chart not drawn to scale. For informational purposes only and represents CyberArk’s current view of its innovation direction. The development, release, and timing, if and any, of any future innovation or product remains at our sole discretion.
WELL POSITIONED FOR CONTINUOUS INNOVATION
18
Global
R&D Team
CyberArk
Research Lab
CyberArk
Innovation Lab
19
WELL POSITIONED FOR GROWTH
Building a highly differentiated Identity Security
Platform anchored on securing Privileged Access
Investing in SaaS while continuing to address
on-premises PAM customer needs
Well positioned to address customer Identity
Security projects with current and future offerings
THANK YOU