Okta, Inc. (OKTA)
NASDAQ: OKTA · Real-Time Price · USD
75.98
-0.06 (-0.08%)
At close: Apr 24, 2026, 4:00 PM EDT
75.97
-0.01 (-0.01%)
After-hours: Apr 24, 2026, 7:57 PM EDT
← View all transcripts

Investor Day 2021

Apr 7, 2021

Speaker 1

Hey, everyone. Thanks for tuning into day 2 of Oktane. I hope you all enjoyed yesterday's inside look at the last year of life at Okta. It's definitely a new take on the keynote format and a chance to hear straight from the people building Okta every day. The story of innovation really begins with Okta's platform.

Our platform is the is the foundation to build incredible new products and features, while also making those identity capabilities more accessible to everyone in your organizations. Okta's platform approach is core to how we think about identity, but it's also a recognition of the role identity plays in your organizations. All of you want choice in the technology you adopt. It's what enables your organizations to be nimble. It's what keeps your employees happy and productive, and it's what drives your customer experiences forward.

It's also what gives you the ability to adapt to whatever changes come your way. In a cloud centric world, identity has become a true primary cloud, just as important as your other primary clouds like your infrastructure or your collaboration clouds. It's also the secure epicenter of your organization's tech connections. Without security and identity independence, There is no technology choice. And across your organization, that need for technology freedom could not be greater, Because today, identity is top of mind from the boardroom to your spare bedroom, reaching people across every business team, whether it's security, IT admins, business units, DevOps or developers, everyone can use the Okta platform to drive business goals.

Yesterday, we talked about the Okta Identity Engine, one of our key platform services. It's going to bring all kinds of customization to the experiences you're building. And along with our other platform services, it makes identity customizable and extensible. For us, creating the best workforce or customer identity platform means offering you a range of options from out of the box configurable solutions to RIE APIs and SDKs so that you can build for any use case you dream up. We think every step of the journey should be programmable with a ton of documentation to make auth easy for everyone.

That customizability is an especially big deal for customer identity, making it possible for you to deliver on each of the diverse identity use cases your customers need. The potential for customer identity is massive for every organization today. Everyone is moving their business online. And with that push comes the need to not only deliver safe and secure experiences, but to create meaningful ones for your customers. It also means opening up more of our platform to devs for free and allowing you to do some new things with the Okta integration network so that you can automate how identity impacts security and customer experiences.

Our product leaders are really excited to talk to you through of the things we're announcing to bring more choice and access for the teams building cutting edge digital products. But what you're probably really excited about is the announcement we made just over a month ago, our plan to join forces with Auth0. The feedback has blown me away. Not only do we share the same vision, our values and how we operate are tightly aligned. We have the same worldview when it comes to the role identity plays in powering the Internet.

Each company has its own strengths and expertise And coming together will give customers more choice to meet every identity need. We are going to maintain and invest in both platforms In the background, we'll be integrating our technologies over time to provide even more innovation. Ultimately, The identity challenges all of you face are unique. Each of you have different teams building the experiences that propel your organizations and people forward. We're committed to meeting you where you are and helping all of you find the solution that best addresses your identity use cases.

We have a ton of exciting stuff to share with you today. But first, I wanted you to meet Auth0's CEO and Co Founder, Eugenio Pace. He's joining Okta and will remain the CEO of Auth0 reporting to me. Welcome, Eugenio.

Speaker 2

Thank you, Todd. It's great to be here.

Speaker 1

It's great to have you.

Speaker 2

Yes. Thank

Speaker 1

you. So this is all about identity. 2 companies coming together to build a great solution for customers all around identity. Why is identity important now for companies? What have you seen in terms of how identity applies to different companies, different

Speaker 2

Well, if anything, 2020 has shown us that everything is digital, everything, education, our healthcare, our entertainment, everything, it's technology surrounding us. And there's one thing that they have in common is that they all need to know who we are. And so the opportunity is massive. I see that we have a lot of work to do still. And by working together now, we can bring that future that we imagined fast forward to the present.

Instead of waiting 5 years, we can do it in 2 years.

Speaker 1

That's a good point. One of the most exciting things for me about identity is how horizontal the opportunity is. As you look inside customers, what do you see about how identity applies to different roles and responsibilities inside the company?

Speaker 2

It really doesn't matter how you slice and dice this thing. It applies to everything. It's every country, every region, every customer segment, whether in media and entertainment or Manufacturing, at inside a company, whether you're a developer building applications, whether you're a designer or you're a product manager Or you're on the board or you're an executive, identity is pervasive. It's universal, needs to be acknowledged in all in everything.

Speaker 1

Yes, it's a great point about how identity applies to really every role inside of a company. So we've known each other for a while, about 7 years, 8 years, yes, time flies. And I've admired Auth0 and watched you guys grow. Tell us about from your perspective what Auth0 stands for?

Speaker 2

Well, the admiration is mutual. I've seen you grow as well and grow your company. And in many ways, you've been an example that we look up to. And above everything of Xero, it's about empowering developers. It's about empowering everybody building applications in the world to make it a better world.

And so if you're a builder, if you're creating Ops, that's us.

Speaker 1

What you guys have done building a product and a community and a brand around developers It is truly impressive. So nice work on that.

Speaker 2

Thank you.

Speaker 1

Looking forward, what excites you most about the innovation we can build together?

Speaker 2

Well, what is exciting, 1st and above everything is that we both have the same opinion of the future. We have the same convictions about what's possible and we can bring that what's possible today. We can do it faster. We can do it more it had global scale in a ways that it would have taken us a longer time to realize. That's exciting.

Speaker 1

Fast forward the future. Yes. Speaking of the future, the future is all about developers. And you guys have done an amazing job building this evangelical base of developers. Tell us the secrets to that success.

What have you done to make that happen?

Speaker 2

Yes. We founded the company with this belief that every company in the planet is a software company, even though they might not call themselves a software company. And if you're a software company, you need software developers. So Therefore, every company in the planet needs software developers. And guess what?

There's not enough of them. So anything that would make their life easier and simpler and would allow them to build faster, better, more secure Applications would be valuable. That was the hypothesis. That's how we build Altzero. And so everything from the 1st contact from searching on your favorite search engine for a problem, finding content I will explain how to solve that problem all the way to tinkering and trying things out, which is how developers like to operate, all the way to actually committing to a contract with us.

The entire journey is optimized and we design it with that in mind from first contact to long term commitment and that shows in our in the API design, in the documentation, in the content, in enabling everybody to become an expert without having to be an expert on this domain.

Speaker 1

Eugenio, what you and the team have accomplished is And I can't wait to work with you on building the future of identity. Thank you very much.

Speaker 2

Thank you. Looking forward to it.

Speaker 1

As Eugenio and I were saying, we're continuing to push new customer identity technologies and capabilities across both of our platforms. That's because we're never going to stop innovating and some of the things we're announcing on the developer experience side really highlight how we're making it happen. Now I'll turn it over to Ryan, Dia and the rest of the team to share a bit more.

Speaker 3

Thank you, Todd, and thank you all for being here. I'm really excited to hear from key product leaders in the company about all the innovation in our products to see that innovation in action through the form of demos. And we're going to start by talking with 2 key leaders in our product organization, Okta's Chief Product Officer, Diya Jolly and our Director of Developer Relations, Emeka Afibbo. Welcome to you both.

Speaker 4

Thanks, Ryan.

Speaker 5

Thank you.

Speaker 3

So, Dia, let's start with you. We had the talk everybody talks about digital transformation. Obviously, developers are at the center of that, but their needs have changed over the years, specifically enterprise. Tell us how that has happened over the years?

Speaker 6

Yes, of course. So today, software has become an integral part of any organization. Any organization, no matter what they're selling, needs to be able to connect their consumers digitally to be able to remain relevant and thrive. So developers have obviously become a critical resource in companies, and they're scarce. Developers are the ones that are building new applications, new experiences as well as moving forward innovation in organizations.

And while doing All of this, they need to ensure that the technology that they're building is also secure. This is a lot to ask of them. New business requirements, new attack vectors, new technological innovations that they need to keep on top of and implement. So as a result, developers are always looking for tools that make their lives easier, that help them get their projects up and running faster, that help them provide rich documentation and support when they inevitably run into trouble and that are future proof from a requirements perspective. And now this is what has really fueled the intense industry focus on developer frameworks, on CICT automation, on microservices that developers can use within their apps and more.

So the essence really is that developers just need tools that can work across their tool chains, whether they're working in a hybrid cloud or multi cloud environment.

Speaker 3

Certainly sounds challenging. It's probably only accelerating. If that's the case, what's Okta's vision to make these developers successful?

Speaker 6

That's a great question, Ryan. Our vision is not just to provide a world class set of authentication and authorization services for developers. Is to actually help them also secure the applications they're building, secure their APIs and secure their infrastructure. The goal of the Okta Identity is to provide a unified platform that reduces the burden on developers to actually be able to build their apps, to be able to use the services and APIs that they need to get up and running to be able to test their apps and deploy their apps into production. So now developers can get up and running faster than they could before and they can focus on moving forward their business requirements.

This is why we're reimagining the Okta developer platform and the Okta developer experience to speed up time to production across the application development life cycle and also across the entire developer tool chain.

Speaker 3

That's certainly a compelling vision. Emeka, I want to come to you. You've been a developer for a long time. As a developer yourself, what's your view on how Okta is solving these problems?

Speaker 5

Thank you, Ryan. So first of all, I'm excited to say that we announced our enhanced developer edition, and this exposes a greater surface area of the Okta Identity platform through an expanded free 15,000 monthly active user tier. And what this means is that whether you're a developer building a simple application or complex application you can now begin to design, build and deploy all sorts of awesome digital experiences. Secondly, we're announcing a bunch of great integrations into app platforms like Heroku and API gateways like Kong. What this means for you as a developer is that you can directly integrate Okta into your application stack.

We're also releasing some new open source tooling, sample code, documentation that enables developers to really get up to speed in building the application without needing to know all the nuances of identity before it can become productive with our platform. And thirdly, we are also excited to announce that we've enhanced our developer with experts in different programming environments. And as a developer, this means that you can then quickly and easily find answers to your questions when you need help and get active help right in the moment when you need it.

Speaker 3

So that's amazing. So a new 15,000 monthly active user tier that's free, integrations with Heroku and Kong, better documentation and an enhanced community. Is that right?

Speaker 7

Yes.

Speaker 3

That's amazing. I'm sure people are going to be asking when is it available and where can developers find this information?

Speaker 5

Yes, it's available right now as we speak. So All the open source integrations that we're launching, the sample apps, the documentation, everything and the new developer edition is available at developers. Okta.com like right now. You can literally, as a developer, sign up and start building and deploying your awesome digital experiences. And as we continue to innovate on our identity platform, you're going to be seeing more features and functionality available in the Developer Edition.

Speaker 3

I love it. Well, Emeka, Dia, thank you. I want to actually now throw it over to the demo team, so you can see some of the things that Emeka talked about in action. Demo team, take it away.

Speaker 8

We recently decided to launch a new direct to consumer brand with a snack delivery service called Munch Box. The launch is ambitious. We want a Munch Box on every single so far. So we need to get a new app with a great registration and log in experience spun up right away. I've asked my lead developer, Micah, to get going on the prototype.

Speaker 7

Thanks, Danielle. I know intimately that it usually takes months to get something like this developed and into production. And it figures that Danielle lays this on me All right. I know this is going to be a big effort and I know the Apple need authentication and authorization. I've heard good things about Okta, so let's take a look at what they offer.

Looks like a free Okta developer account supports a lot of users and seems to handle a lot of the hard things about building off. It looks pretty simple to sign up and get started with GitHub or Google, so I'll use this for my prototype.

Speaker 9

Hey, Micah. Hate to be the

Speaker 8

bearer of bad news, but our execs just moved up our timeline by a month

Speaker 4

and they want to see a

Speaker 8

prototype next week. Any ideas?

Speaker 7

What? That's crazy. I need to rethink my whole approach to fit these new timelines. Let me grab Brian from our DevOps team and see the best way to model this out and get it into production. Brian, we have this crazy deadline.

We've just had another project dropped in our lap. If I have an end to end app, will you be able to deploy it to production? It's going to need authorization and authentication and Okta seems to be a great fit. Will that work for our production environment?

Speaker 10

Hey, Micah. As long as

Speaker 11

the app is easy to containerize, then

Speaker 12

we should be good to go.

Speaker 11

And using Okta is a no brainer. We already use it internally for SSO and even to manage access to AWS. So don't worry about it. When it's ready to go to production,

Speaker 13

I'll take care of it.

Speaker 7

Great. Thanks, Brian. It's great to hear that I can use my developer tools to speed up the prototype and know that it will easily translate to our production environment. I use JHIFSTER, an application generator to create a React front end and a Spring Boot back end. Then I'll deploy the application with Heroku, an application hosting service, and I'll use the Okta add on to provision and configure Okta instance on the fly as the authentication service.

1st, I'll prototype an app with JHipster and set some of the configuration here. I know I can create an Okta org right from the command line and the Heroku add on is doing some basic Okta setup for me, including an sign an API token for easy integration with Munchbox. It will also create a single page app in Okta for Munchbox with all the OAuth configs filled in. While that's running, let me take a look at Okta's documentation. There's a sign in widget here that seems to handle all of the core flows around signing in, so I don't have to build registration, login and email validation flows for our customers by myself.

That will save me a few days work. That's all done. Now my skeleton application is created and I'm going to log in as the admin and I can see that I'm all set. All done. And now I'll send it off to Danielle.

Speaker 8

Micah, this is great. Look at all of these snacks. I know you're happy that it looks like you spent 100 hours of time on this versus the 10 you actually did because you used Okta. Our execs loved the prototype. They told me at lunch and they said to ship it.

So I'm going to ask Brian how soon he can get this app deployed to production.

Speaker 11

Okay. So I'm going to take the app that Micah built and deploy it to Amazon's Kubernetes service using Terraform, an open source tool that creates and manages infrastructure from config files. The JHipster build already created a container, so all that was left for me to do was to update our terraforming config to include Okta. Don't tell him, while Micah was spending all that time with the business logic for the new Munchbox application, it only took me about 10 minutes update the Terraform config to include the Okta Terraform provider.

Speaker 14

To get

Speaker 11

the deployment started, I'll just run Terraform apply. We use the Okta TerraForm provider to configure the Munchbox Okta production tenant with a new OAuth application and the related resources. The deployment of the app to EKS, the creation of application health checks, the setup of load balancers And finally, the DNS entries needed for the much box domain. Cool. It looks like Terraform is finished.

It only took about 2 minutes to deploy the app and all its dependencies. That's much faster than it used to take just to get access to the Kubernetes cluster. Danielle, you're all set. The new application has been deployed.

Speaker 8

Let's take a look. The Munchbox app is live and the registration page Great. Okta's developer experience made that entire process go way faster than any identity project I've ever worked on, which is going to make me look great in front of makes me feel like we can do anything, like we really are making the world a better place through more efficient snacking. Micah, Can you jump on those other 5 projects I assigned you in the next hour or so?

Speaker 3

Thanks, demo team. That was great. Munch Box is Certainly a great idea because I know that snacks as a service is a giant market. I wish you all a lot of luck. We're going to continue the conversation here around customer identity, but we're going to have a new voice in the mix.

I'm pleased to introduce to the panel Maureen Little, our Vice President of Strategic Alliances. Welcome, Maureen.

Speaker 15

Hi, Ryan.

Speaker 12

So, Dia, I actually want

Speaker 3

to start with you. You can't talk about developers without talking about customer identity and that landscape has changed a lot. From your perspective, how has it evolved most recently?

Speaker 6

That's a great question, Ryan. So In the last year, the digital economy has fast forwarded by nearly 5 to 7 years. Today, every organization, as we discussed, needs to have digital touch points with customers and customer experiences for their customers to be able to interact with. Now in doing so, they need to be able to bring online and offline experiences together. They need to be able to together experiences across multiple products and across their partner ecosystem.

All of this is extremely complicated. And it's hard, but it's also extremely valuable because this is the only way to provide a compelling experience for their end customers.

Speaker 3

That's super interesting. Talk more about that complexity. I want to hear more about that.

Speaker 6

You can think of the complexity along 3 different vectors. First, the number of tools and technologies that developers have to use is increasing exponentially for them to be able to bring a customer experience to life. Secondly, every day there are new attacks and attack vectors and developers have to think about them and keep their applications secure. And third, the amount of customer data and information these organizations have to deal with is increasing exponentially and developers have to build their applications in a way such that they adhere to the compliance and privacy regulations of every region. So if you think about it, building an application and the customer experience now has become much more complicated than it was ever before.

Speaker 3

That certainly does sound complex. Okta's ecosystem, I think, plays a role in helping solve that complexity, doesn't it?

Speaker 4

Yes, it does. When you think

Speaker 6

about this, Okta has integrated with all the partners there are across the customer experience tech stack. However, over the last 6 months, we've actually deepened our integration with 4 key categories. The first one is the tools and technologies that developers use to build and maintain their apps so that we can actually help them get to market faster. The second are tools that help assess risk and prevent against fraud, so that developers can keep their applications secure. 3rd are downstream systems where customer information needs to flow, like CRM and marketing systems and 4th are tools that developers use to ensure compliance against regional privacy regulations.

Now Okta wants to serve every developer and every So we're adopting a best of breed approach so that you can pick the right tools and technologies for your business, for your app and for your organization. In addition, we're taking this a step further. We're also ensuring that we have multiple integration patterns, whether that's low code, no code or pro code, so that any team that touches customer identity, whether it's developers, security, marketing, product development, can actually use the tools that are the most effective for them.

Speaker 3

Thanks for that detailed explanation. Emeka, I want to come to you as a long time developer yourself. What D. You just talked about, how is that going to help developers' lives make it easier for them?

Speaker 5

It's actually quite exciting, Ryan. So what this means is that as a developer, you can take things like custom scripting and setting up integrations away from your already considerable to do list, right? And it also means that as a developer, you no longer need to worry about setting up and maintaining different integrations and deployments because this can now be offloaded onto nontechnical teams or less technical teams. Of this is that if the business decides that they want to change the way identity flows into, say, a CRM application, this can be handled by either an identity team or an operations team, depending on what makes the most business sense, which then leaves the developer to focus on what we think is most important and that is creating a great customer experience.

Speaker 3

Wow, that's super clear. Time to bring Maureen into the mix. Maureen, you work with a ton of our partners. I want to talk about fraud detection and risk signaling, specifically from the integration I'd love to get your take on that.

Speaker 15

Well, when you think about it, Ryan, organizations have to gain consumer trust, no matter what application that consumer comes in, no matter what device.

Speaker 6

So what they need is to be able

Speaker 15

to assess the risk coming in from that application. And so the first thing that we decided to do was figure out is that person actually human. You want to take that insight and intelligently allow the good consumers who are actually trying to consume content or buy something through and block the bad guys. So the first step is figure out if they're human. So Okta has partnered with the leaders globally in bot detection and web application firewall companies like Fastly, White Ops, F5, PerimeterX.

And we're going to expand very, very soon into other kind of risk areas, behavioral data, transactional risk. And our main goal here is we want it to be easy when someone is licensing and using Okta to assess that risk and make that consumer experience seamless.

Speaker 3

Those integrations make a ton of sense for security and for risk and for fraud. But what about customer experience. I know we have some new customer identity workflow integrations in that area as well.

Speaker 16

Is that right?

Speaker 15

Yes. And actually we started thinking about social logins. Consumers already have their social logins. So we've expanded access via social logins from our existing ones of Apple, Facebook and Google to extend and add more companies that these consumers already use Amazon, GitHub and others. We're even expanding internationally into international partners like Line and WeChat.

But it's more than that. So the Okta integration network is this amazing catalog of tools and we're expanding into new categories like e commerce, marketing technology and data providers and just really trying to make search experience as they're discovering the tools they need access to way easier. Then finally, we're using workflows because in that real time consumer They already use big orchestration and e commerce platforms and we're going to use workflows to take that data into downstream systems they already use like SendGrid, Mixpanel and HubSpot.

Speaker 3

Makes a ton of sense. Integrations for security, integrations for a better customer experience, more integrations, more value. Thanks, Maureen. Dia, I want to come to you. Everything that we heard about, I'm sure people want to know when they could get access to it.

So I know you have the answer.

Speaker 6

The new integrations for customer identity are available in a new catalog on our Okta integration network, and they're available right now for you to use and browse atokta.com/integrations. Ingesting risk signals is also available from our partners, and it's an early access and available to our customers that use our adaptive multi factor authentication. The new workflows for customer identity is available as an add on SKU And the integrations that Maureen talked about with Mixpanel, SendGrid and HubSpot are available as workflow connectors.

Speaker 3

Exciting stuff. Thanks, Dia. And also thanks, Emeka. Thanks, Maureen. Really appreciate it.

Let's turn it back over to the team at Munchbox to see a lot of what you just heard about in

Speaker 8

Again, Micah, aren't you happy to hear from me? So I was chatting with our execs over lunch and now that they see that we can work so quickly, they want more and we've got more work to do. First, they want the coolest e commerce storefront out there. I'm sure you remember that our goal is a munch box on every single and they want proof it's the coolest, so we need to connect our analytics system to the registration and login experience to prove people are moving through smoothly. So in other words, another low key project for you.

Speaker 17

Are you up for it?

Speaker 7

Wow, Danielle. So great to see you. This is a long list of complex requirements and I can't imagine my team is going to be able to release this in any reasonable amount of time. I guess I got to go learn the HubSpot APIs and how they all work.

Speaker 8

But don't you remember the last time? Use Okta and this should take you much less time than it normally would. Especially with their new Okta Workflows for Customer Identity product, I've heard it'll help you set up these integrations without having to read all of those API docs.

Speaker 7

Let's see. To make sure our customers have a smooth experience, we need to get their profile information into our CRM system, HubSpot. And Okta does have a pre built connector and workflows for HubSpot. Looks like they've already done the hard work on understanding HubSpot's API, so I don't have to write any custom scripts or manage API tokens. I can just use the create contact action as part of a new snacker Now, I don't have to learn the HubSpot API.

Speaker 8

That is super exciting, Micah, super exciting. So, I was on a casual lunch with our CMO, who is also super excited and he said that user registration and sign ins are key KPIs to make we're converting customers and driving customer delight. And I honestly think that driving customer delight is just so important these days, don't you? So I want to make sure Okta is integrated with our analytics solution Mixpanel, so we're capturing it all properly.

Speaker 7

True to form, looks like Okta has a connector for that too. So again, I don't need to spend time reading Mixpanel's API documentation and I can just use the create profile action to pass over the registration information that our execs are interested in. I've created a simple automated flow so that when new snackers register for Munchbox, we create their profiles within Mixpanel and HubSpot CRM. This ensures that customer records in those systems are always up to date and are in sync. Again, Okta has taken away a lot of the custom coding work I usually have to do when building integrations and it looks like I won't have to do any integration maintenance says Okta just handles that for me.

Alright, now I'm gonna go munch on some snacks.

Speaker 8

Oh, wow! Our marketing team just let me know that Munchbox has really become popular with the TikTok crowd over the past few weeks. Cool. We just launched a limited edition Pokemon Munchbox and it looks like its popularity has attracted a ton of bops and our analytics solution Mixpanel just let me know that our conversion rate is going down. Last time this happened, our customers got stuck while bad snacker squeaked through.

This is exactly the opposite of what we want and our exec team is going to kill me. He won't be able to have lunches with them anymore. Micah, can you jump on this and fix it ASAP?

Speaker 7

Sure, Danielle. Okta can help with this fraudulent activity. I see in Okta's system log that we're allowing a ton of bad traffic, but there's a few policies I can configure in Okta that will help. We'll use Okta's Threat Insight, Okta's native capability to detect and automate the threats and integrate with our bot mitigation solution fastly. This will then feed into Okta's risk engine, so we're adding invisible security to block these bots without impacting legitimate snackers.

In fact, I was already integrating our bot detection solution fastly, as you can see here. The remaining steps could be done in this admin console, but I prefer to do this via API. So let me pull up Postman, which simplifies interacting with APIs. You can see the endpoint I'm calling here and the payload that I'm sending to it. Previously, I turned on threat insight onto audit mode to just log the suspicious activity that was occurring.

Given this bot attack, I now want to change that to block mode to automatically deny suspicious activity identified by Okta. We'll send that and you can see here we're getting a 200 okay to indicate that the change has been made. Now I need to create a new risk policy that blocks the high risk attempts, thereby catching bad snackers and minimizing security blind spots. And I send that and I get the 200 okay as well. Let's head back to the Okta system log And we can see that it's logged the threat insight changes and added this new risk policy.

We can also see risk signals from Fastly being regularly ingested into Okta, and we can see high risk requests are now being blocked. I'm so glad I didn't have to defeat these bad snackers myself and was able to rely on Okta and Fastly's expertise to get the job done for me.

Speaker 8

Thanks, Micah. Looks like the authentication errors are starting to go down, which means my exec lunches are going to go up. Let's check out TikTok and see how people are reacting.

Speaker 17

Oh, hey everyone, it's Teju, Your one and only average snacker and I'm back today to review Munch Box's app. Now as you guys know, I've been waiting forever for these Pokemon Munch Box snacks to drop. So today I'm going to review Munch Box's app and next week I'll review my snacks. Okay, let's go ahead and get started. Now I've already downloaded Munch Box And the first thing I see here is a snack special for $5 a month.

Definitely want to add that to my cart and I'm liking what I see so far. And yep, here are those Pikachu snacks that I wanted to going to go ahead and add those to my cart. And I should be ready to check out here. But before I can check out, it looks like I need to create an account. Makes sense.

Probably just need to enter my name, email address, password, the usual stuff. So let me go ahead and do that now. Name, email and oh, wait, no password. I can just verify my account through my email. Extra points for Munchbox on that one.

Okay, so I see the email from Munchbox now and I'm one step closer to my snacks. Now before I can officially buy my Pokemon snacks, it looks like Munchbox is asking me for my favorite snack types. But I really just want to get straight to buying my snacks. So I'm gonna this for now and I'm ready to check out. Okay, guys, so far I got to say 5 out of 5 for Munch Box, impressed the sign up process, the UI and I'm sure those Pokemon snacks will be great.

As you guys know the deal, don't forget to subscribe Average Snacker Teju and I'll see you next

Speaker 8

I was able to ensure a seamless passwordless customer experience, learn more about snack preferences during checkout to provide promos in the future, quickly set up e commerce and analytics to monitor our conversion rates, reduce malicious logins with Okta Thread Insight and the Risk API with our bot detection vendor Fastly, all while saving hundreds of hours of developer effort.

Speaker 7

Don't you just love when the PM lists out all of these results like that as if it was 1, they're doing, and 2, really easy? Normally, this would annoy me more. This time, I'll admit I'm ever so slightly humbled. And I was able to complete the project in less than half the time it would normally take. And now lots of cheesy snacks.

Speaker 1

I never get tired of seeing what the demo team pulls together. It's great to see and hear about all the incredible momentum Okta has when it comes to customer identity. But I'm also really fired up about our workforce identity innovations that will push your businesses forward. Over the last 12 years at Okta, We've seen a fundamental shift in the role identity plays for organizations. It has been heard loud and clear.

You require a single for every user type and every use case. You need to work for not just apps, but also infrastructure, containers and databases. And you need to democratize and simplify how users gain resource access by empowering your business partners to determine requirements rather than centralizing with IT. You heard us talk about it in the documentary, And I'm making it official right now. Okta is breaking into both Privileged Access Management and Identity Governance Administration.

These are both been big areas of need for your businesses. And we are not only delivering on those needs, we're doing it in the Okta way, simple cloud based delivery with an emphasis on the features you need and use, I'm thrilled to introduce Okta Privilege Access and Okta Identity Governance. This is huge news for Okta and a really natural evolution for us in our platform and for identity overall. When it comes to Okta Identity Governance, We've reimagined IGA for a cloud first world where the number of resources accessed by your workforce has dramatically increased and your workforce itself has transformed. For Okta Privileged Access, we're not building a product for the way people used to work and for the way infrastructure used to be.

We're building for the way infrastructure is today and will be in the future, cloud deployed and just in time, the way critical infrastructure access should be. Users, resources and access policies are all the areas where Okta excels. 1 unified identity control plane is the best way to keep your organization and compliant, while still keeping you nimble and innovative. With Okta Privileged Access and Okta Identity Governance built on our platform, You can have unified visibility across any type of user and any type of resource. For us, taking on more of your complexity and securely simplifying it is a natural step in giving you more freedom to grow and use technology.

We're excited to tell you how we're doing it. I'll turn it over to the team to share more details.

Speaker 3

All right. Huge news from Todd right there. I'm back here with Diab with a couple of new faces. First, George Kwan and Michael Chow, both Vice Presidents of Product Management here to talk about these new products. But Dia, I want to start with you.

I know you quite well. I know one of the things that gets you really excited entering new markets, and we're doing that clearly with IGA and Pam. But let's start first with why is Okta uniquely able to do this?

Speaker 6

Yes, that's a great question, Ryan. If you look at organizations today, they are struggling basically to meet their security, compliance and workforce productivity goals because they have limited resources. Now they're trying to cobble together point solutions, but these point solutions cannot keep up with the dynamic nature of work and the speed of cloud modernization. Also for many of these organizations, the cost of these cobbling these point solutions together is extremely prohibitive. So what we want to do is we want to provide identity platform that acts as a unified control plane that allows our customers to be able to manage their risk, their security, their policies and also provides visibility across all types of users and all types of resources.

And while we do this, we really want to be able to bring the same principles we brought to our identity access management suite of products, which is cloud first, ease of use and ease of deployment.

Speaker 3

That makes a ton of sense. But I imagine it's more than just a control plane, right?

Speaker 6

That's absolutely right, Ryan. We're building our privileged management solution, not just for resources in the past, but for how resources work today. So what we're doing is we're adopting a cloud deployed just in time credential model that works not only for on prem resources, but also for the ephemeral crowd resources of today. And in addition, we're also broadening privileged access management, not just for servers, but for other resources like Kubernetes clusters, databases, etcetera. On the identity governance side, the Okta identity governance product is going to be able to redefine governance for the way it should be in the cloud world.

Today, there are numerous applications that customers use. There are numerous types of workforce they have, so different types of users, whether they are your employees or your partners or your contractors. All these people need the right access to the right resources and the right governance to succeed. And with Okta Identity Governance, we are trying to reimagine the identity and governance space for a cloud first world, where organizations have many, many more resources that their workforce has to access. And the definition of the workforce itself has changed.

You don't just think about employees now, you think about partners and contractors. All these people need to the right resources and the right governance for them to succeed. With Okta Identity Governance, we're also providing the ability to have self-service access to resources via common tools like Slack. And in addition, we will also provide an approval request your more sensitive applications, data and tools. And with our workflows tool, we're going to be able to provide you the ability to build customization and automation for your business processes so that you can move your business forward.

Speaker 3

That's super clear. I love it. So I want to turn to you next, George. George, you've actually been here so long, so long in fact that you launched our now famous Universal Directory product way back when. But I want to hear from you, what can customers expect from the new Okta Identity Governance products?

Speaker 18

That's right. I was here when we launched UD. It was a great launch. I think this might be more exciting. Okta Identity Governance is an end to end solution for customers to manage who has access to what.

It starts with lifecycle management, which automates the lifecycle of all your users, employees, contractors. It automates provisioning to applications and infrastructure. On top of lifecycle management, we're going to introduce a new access request capability, Enable self-service for all users requesting any resource approval workflows, granular admin roles, really allow you to delegate all those access requests to the business. And then on the governance side, we're going to release more reporting, The ability to enforce temporary access policies as well as access certification campaigns, so that you can be successful in all of your compliance and security goals.

Speaker 3

That's awesome. That does sound better than Universal Directory. I didn't think that was possible. I want to talk about what we've done with Lifecycle Management. We have pre built integrations, low code workflows, but specifically around governance, we have a lot of innovation there.

Tell us about that.

Speaker 18

Yes. The challenge with self service and access requests is delivering an experience that end users love and are willing to adopt and getting rid of all those siloed access request processes that are sprouting up in the shadows. So with Okta Identity Governance, we're going to deliver modern end user through mobile and chat. And we're going to make it possible for the business to define their own access requests, rules and approvals, So they adopt a central platform. On the governance side, Okta sits in a unique place in the middle of the directory, access management, identity governance, where we can provide unique context and visibility.

So we're going to provide a single pane of glass through reporting and we're going to weave that context into our access request capabilities and access certifications. So we can really streamline the process and no more rubber stamping.

Speaker 3

That makes a lot of sense. So George, sum it up for us. Tell us about Okta Identity Governance and what customers can get from it.

Speaker 18

Okta Identity Governance is going to help IT teams scale through more automation, delegation, self-service. It's going to drive better security and compliance outcomes, all while making the end user experience better, making getting access to the things you need actually easier. In Oktite, any governance is going to be for organizations of all sizes, whether you are new to the governance game or whether you've been at it for a while and are looking to modernize. I'm super excited about this launch. I've been talking to so many customers.

They've been us in this direction for years. And now I get to look them in the face and say help is on the way.

Speaker 3

Very exciting indeed, George, a long time coming. Thanks for that. Mike, I want to turn to you. You're relatively new to Okta actually. And before we talk about Okta Privileged Access, I'd love to get your take on The things that Okta had built in these two areas already in our existing products.

Speaker 19

Yes, absolutely. I think what's really impressed me the most, Ryan, is just how much investment Okta has already made George spoke about this, but with the Okta Identity Governance, this builds on top of our universal directory. It builds on top of our workflow capabilities and also lifecycle management. But with Okta Privileged Access, now we are leveraging the experience we've had in terms of securing infrastructure with our multi factor authentication product and also our original advanced server access product. So I think with What's really special here is with Okta Privileged Access.

Our customers are now able to have a centralized control plane to control access to their Linux, their Windows servers, databases and also Kubernetes clusters. Now because identity is at the foundation, only Okta can really automate the lifecycle accounts and also policies end to end and then also insert governance in line off flows.

Speaker 3

So it sounds like a true end to end solution It sounds like it's very much better for IT. But one of the things I understand about traditional PAM products is that they're not a great experience for end users. Tell us about what that's like for Okta Privilege Access.

Speaker 19

For our users, this is actually a really seamless and easy to use single sign on experience. Whether they are logging into a monitoring dashboard with their web browser or they're logging into Windows server with their local RDP client. But behind the scenes, our customers now have flexible policies for role based access, attribute based access and also time based access. So we really deliver just in time least privilege access. And to meet the demands of compliance, We audit every single login capabilities and we fully capture all the activity that's coming in your SSH and also RTP sessions.

Now with everything tied to identity and unified to a single platform, we've really made it easy for the security teams to compile their reports and to compile their regular audits.

Speaker 3

That's super clear. The Okta Advanced Server Access product has been out there for a while, really successful with customers, a ton of customers are using Tell us about how Okta Privilege Access builds on top of what we already have with Okta Advanced Server Access.

Speaker 19

That's a really good point, Ryan. With Our advanced server access product, we've really made it very easy for the users to use, but we've made it easy and easier to deploy, regardless of whether they're running hybrid cloud or they're running multi And we've delivered these administrative controls at SaaS, just as you would expect from Okta. Now, at Jumps as a benchmark, we've had our customers deploy advanced server access to 100 of thousands of servers. And with other products, they weren't really able to do that. So with Okta Privilege Access, our new product, We're able to help our customers protect even more resource types and layer on even more security and auditability.

Speaker 3

That's very compelling, Michael, Very excited about Okta Privilege Access and Okta Identity Governance. I want to know when customers can get their hands on these products. George, let's start with you. When will customers be able to get Okta Identity Governance?

Speaker 18

Yes. Okta Identity Governance will be available in Q1 of 2022. Will be available starting at $9 per user per month. So really excited about that. But to remind you, you can go make use of Universal 3 lifecycle management workflows today, really implementing a lot of automation to start to solve some of those governance needs.

Speaker 3

And that's also a great reminder, you don't have to wait to get started. You can start now with a lot of the great capabilities in our lifecycle management products. Yes, that's right. Michael, I want to come to you next. When can people expect to get their hands on Okta Privilege Access?

Speaker 19

Okta Privilege Access is going to be available in Q1 2022 as well. And pricing starts at $45 per PAM unit per month. But you don't have to wait until then to get started with our advanced server access our customers can secure their server fleet today. And we've made a lot of improvements since the last Oktane for compliance with our SSH session capture for our customers that have Windows environments backed by Active Directory, we have a lot of really great improvements coming there as well. We've heard from our customers that Servers are the most important resources to protect with privileged access.

So we can get

Speaker 3

you on the right path today. That's awesome. 2 new products Okta Privilege Access, Okta Identity Governance both coming soon, but customers don't need to wait to get started. And actually, we talked a lot about these products,

Speaker 20

Hello, I'm Lance. I'm a Site Operations Manager here at AtcoFooz. I run a number of IT projects globally, reporting directly to our CIO. Hey, what's up Lance?

Speaker 21

I'm Aaron, a security analyst responsible for helping our compliance team assemble audit reports for FedRAMP, SOX and PCI DSS.

Speaker 20

Aaron, do you remember when we used to cap separate systems for identity governance and privilege access management? It was really hard to execute access requests, meet compliance requirements and control access to sensitive resources in a simple and orchestrated way. You know what

Speaker 21

was also hard for me Lance? Every quarter at audit time, you and all the other app owners call me the fun police because I pestered you all for audit logs. And then I had to spend weeks cleaning your dirty data for the compliance team.

Speaker 20

Well, that's about to change Aaron. You see, because we are already using the Okta Identity Cloud, I was very pleased to see the new Okta Identity Governance and Okta Privilege Access products, which will help us unify key elements of our IT and business strategy. When it comes to sensitive access, I want a process that is transparent, seamless and agile. The new Okta identity governance integrates with our existing collaboration tools such as Slack making this process incredibly smooth. Is a simple automated experience when users need access to any Okta app, for example, Zendesk.

But don't take it from me. Let me ask Teju, who is new to the team, What does she think about this process? Peju?

Speaker 17

You're right, Lance. I'll admit, I definitely came here for the munchbox snacks, but Getting access to systems here at ATCO has been great. Now as a site reliability engineer, I typically need access to various resources like infrastructure in AWS collaboration tools and some on prem tools that we use for ongoing maintenance. Now all of those apps were assigned to me on day 1. But let me tell you the last company I worked with it took weeks for me to get access to systems while other full time employees got access to apps much much faster.

So I was definitely pleased when I came on board here to see everything standardized on Okta and even built into the tools that I use day to day. Now it's great that I can just pop into Slack to create these access requests instead of having to go through clunky old school Now that reminds me, I actually do need to request access to Zendesk to monitor some of our internal security tickets. So because Zendesk wasn't assigned to me on day 1, I'm going to go ahead and create a new access request with Okta. Now in the list here, I'll choose access to applications and I'll choose Zendesk in the list, Provide a quick justification like ticketing. Now all right, I'm going to go ahead and submit this request and see if it gets approved.

Speaker 20

I got an access request. It's from Teju. Okta Governance notifies me in real time whenever someone asks for or is granted access to production systems. In fact, Okta just messaged me via Slack to let me know Teju requested access to Zendesk. Since all of our SAG reliability engineers should have access to this app, I'll go ahead and approve access for her.

Speaker 17

Okay, great. It looks like my access to Zendesk was approved. That was super quick. And I noticed at the same time that Atco's Okta review bot Just pinged me asking to recertify my access to Dynatrace. I'm not really sure what this notification is about.

I haven't seen it before. But I do still need access to Dynatrace to monitor some of our servers. So I'm going to go ahead and choose yes here. In the justification, provide another quick Justification like I did before, like server monitoring, I think that should be good enough. And we'll go ahead and submit that.

But hey, Aaron, since I hadn't seen that notification 4, could you tell me what it's all about?

Speaker 21

So what you saw was a smarter access review. It automatically prompts users to self certify their access is triggered by signals unique to Okta. In your case, Teju, the signal was inactivity. You just hadn't logged into Dynatrace over the past 30 days. This is less fatiguing on Revere's and it saves time.

The other benefit is that Optic captures these self certification events for audits and it even sends them to me via email. This is great because I no longer have to pester Lance to get any audit reports ASAP all the time. It's all right here.

Speaker 20

I appreciate that, Aaron. But you know what, Auditing and governance for applications is great, but it's not everything. We also need to ensure we can manage fine grade access policies to infrastructure. Active privileged access helps us manage access to more sensitive resources and adhere to the principle of least privilege. Let's see what that looks like for Teju.

Speaker 17

Okay. So I confirmed earlier that I do still need access to Dynatrace and I was even able to connect to Dynatrace directly from Slack, which is cool. But now, oh man, I'm thinking I shouldn't have done that. I just gave myself more work. 1 of our database servers CPUs is running at 0%.

I should probably go and fix that. I think this has happened before and all I need to do is restart SQL on that server. So I'm going to pop back over to Slack now and create a new access request. And this time, I'll choose to access servers. And yep, in the list here, I can see that database server that I need access to.

I'll go ahead and request access for about I think 3 days should be good enough to do some ongoing monitoring, Provide another justification like I need to fix stuff. All right. That should be good enough. I'm going to go ahead and submit this. Now that request is fired off.

Let's see if it gets approved.

Speaker 20

I got a new access request. It's from Teju. This looks like Tayunitz access to one of our SQL database servers. Let's get her in. I love how this whole process is nicely integrated into Slack.

This has helped us achieve widespread adoption of our privileged access processes. Among other things, I can see that this server is actually running in production. Before I approve, I do want to make sure I can see all of the relevant attributes of this server. Okta connects with our downstream infrastructure providers to pull in all of the resource types required, making it really easy for people like me to know what are the right policies and what levels of access to apply without having to go through security every time. Here in the Okta dashboard, I can actually see all the information I need about this server.

Let's see. It looks like this is a Windows machine running on AWS. It is tacked for sensitive data. And look, it is also tacked for PCI compliance. Because this is a PCI compliant system, I'll need to make sure TEGU gets access only for a limited time.

Slack is also telling me that TEGU requested access for only 3 days. This actually complies with our PCI server policies. So I'll go ahead and approve access for her as well. One more thing that I love about Okta is the ability to apply time limited access to privileged systems automatically. This way Teju can get to this task in her own time and I do not need to worry about removing access afterwards commit compliance.

Speaker 17

Okay, great. That was super quick. Just like my access to request to Zendesk from earlier, My request to that database server got approved. Thanks for that Lance. So now I'm going to log on to that server directly from Slack.

This is a Windows Server, so I'll use my local RDP client to log in. That's already nicely integrated with Okta for single sign on. So I don't need to enter any additional credentials even for these Windows Server domain joined machines. And of course, it looks like my actions on the server are going to be recorded. IT is always spying on me.

I'll try not to break anything here, but no promises. Okay. So I'm logged on to that server now. I'll go ahead and start up services. We'll find SQL here.

Give that a little kick. And okay, that's up and running. And phew, another fire was put out.

Speaker 21

Doing these audits used to be really painful. Whenever I asked our business app owners for access data, they took weeks to copy this on USB drives Order printed on spreadsheets. Come on, do you still write checks at the grocery store too? Fortunately, Okta eliminates the manual work of collecting access data and consolidates it under one umbrella. I can see who has access to our applications and infrastructure.

For a more advanced compliance requirements, I can even view recordings of what people did in our Linux and Windows servers. So looks like Okta sent me a report that shows recent access requests. This report also details any privileged actions that users performed. Okta captures all privileged SSH and RDP sessions and then dumps the logs into a secure SV bucket in AWS. Now, Tiju's latest session was on a Windows Server.

So let's check out that video. All right. I can see Teju in the server. It looks like she's opening up the services app. And from there, she's restarting the database.

So far so good. And it looks like she's closed the session. Perfect. Nothing suspicious to flag here. So I love how this all came together.

Standardizing all of our access and governance needs with Okta has really unified our security posture from off to audit. All of our reports are generated and consolidated in one platform. So I don't need to pester our team for updates anymore. And

Speaker 15

from the

Speaker 21

looks of it, these jokers, I mean, Dear coworkers, appreciate that.

Speaker 20

With all our identity and access management requirements, including governance and privileged access consolidated into a single platform, we are finally able to streamline access requests, meet compliance and better control access to sensitive resources in a modern way using modern tools that do not hamper employee productivity for the face of business. We are much better off now. Thanks to Okta.

Speaker 3

So as we get ready to wrap this up, I just want to say a heartfelt thank you the demo team, to the product experts you saw on the panel and to everybody behind the scenes who made all this possible with these great products innovations coming your way soon. With that, I want to turn it back over to you, Todd.

Speaker 1

I am very proud of the innovation we're bringing you today. From joining forces with Auth0 to launching Okta Privileged Access and Okta Identity Governance. As we roll out these new solutions in the coming months, You'll witness the benefits of incredible extensibility, security network effects and a unified identity solution for every use case you can imagine. Everything the team does is about helping to push your organizations forward, whether that be for your own workers and their productivity and security or for your customers who rely on your digital experiences to run their lives. I believe that the future is at Okta and that we're on the way to achieving our vision of enabling everyone to safely use any technology.

I am extremely proud of what the team has accomplished this year and even more fired up for what's to come. Thank you for tuning in. And thanks for being a part of Okta.

Speaker 22

We have so much to look forward to with all of these exciting Okta platform innovations. And it was really cool to hear about all of them from our incredibly talented Okta product leaders. Now it's time for a deeper dive as our breakout sessions are getting underway. And be sure to visit the Okta Hubs and Partner Expo to get answers to all of your burning Later today, the remarkable Julia Louis Dreyfus will be performing feats of strength and delighting us all with her wit and insight in a conversation with our very own Sarah Schiff.

Speaker 23

Good afternoon, and welcome to Okta's Virtual Investor Day. I'm Dave Gennarelli, Head Up Investor Relations here at Okta. We're in the middle of day 2 of Octane 'twenty one, so I hope you were able to tune into some of the content so far, which really helps set the table for what we have lined up for you this afternoon. Now let's take a quick look at today's agenda. We have a great lineup for you with our CEO, Todd McKinnon, kicking things off.

We'll then head directly into a conversation between Todd and Eugenio Pace, Co Founder and CEO of Auth0. You'll also hear from Diage Ali, our Chief Product Officer Susan St. Leger, our new President of Worldwide Field Operations and Mike Corey, our new CFO. Interspersed throughout that content, we have our Executive Vice Chairman, COO and Co Founder, Frederic Kerrest, hosting chats with 3 great customers. The content will run for roughly 2 hours, which includes a short break.

And after that, we'll have plenty of time for Q and A. And of course, our attorneys would not forgive us We didn't mention that we will make forward looking statements in these presentations, so please see all of our risk factors, including the ones in our most recently filed Form 10 ks. We have a lot of material to cover. So with that, I'll turn it over to Todd to get things going. Todd?

Speaker 1

Good afternoon and thanks for joining us today. I'm proud of the big bold moves we're making from innovating across our platform, our new PAM and IGA products and joining forces with Auth0. The past year has shown that we can grow, scale and be more relevant than ever, driving the industry forward even in the face of tough circumstances. Today, I wanted to share how I am leading the company, the foundation for strength we've built and our long term growth strategy to become a primary cloud. We have a large addressable market, Our customer base has never been stronger and our products solve many of the biggest challenges businesses face today.

The long term secular trends, Adoption of cloud applications, digital transformation, and deployment of 0 Trust security environments are in our favor. Okta is central to both the digital experiences and the new ways of working the world requires that have only been accelerated by the pandemic, and we are growing and investing to capture the large opportunity in front of us. For me, the past year has been a powerful reminder of the ability of people to endure, persevere and of businesses to remain flexible and adaptable, I've seen Okta's core values of transparency, integrity, innovation and customer success at work every single day this year. I'm never more inspired than by stories of our customers, partners and employees as they push the boundaries of what's possible to build and solve big problems. The world has changed and with it, so have the priorities of people running businesses.

Okta increasingly addresses the key top of mind areas that CEOs and C level executives care most about From driving growth to reducing costs and future proofing their businesses, our solutions to these problems are the reason The world's largest organizations turn to Okta. They have to manage this new environment, implementing an identity solution that meets their complex technology needs. Yesterday, you heard from Lululemon, Farmers Insurance and The Trevor Project about how our commitment to their success drove their organizations forward. Today, you'll hear from Zoom, Anji and Fox about how Okta's platform solving mission critical business challenges. Our vision is to enable everyone to safely use any technology.

We believe that identity is woven into the fabric of every digital experience. Identity is increasingly top of mind From the boardroom to the spare bedroom, reaching people across every business team and critical to the top line business objectives of every organization. This vision is ambitious and long term and requires a singular commitment to solving identity for the Internet and remaining independent and neutral. I believe that Okta has the potential to be the standard for how digital identity is built on the Internet. What does this mean exactly?

2 concrete things. Every organization uses this standard to validate and protect their workforce and customers and every digital resource Access by every person in the world is done via their Okta identity. We are an innovative company and a disruptor And that disruption begins with the Okta Identity Cloud and the platform we're building. Our unified, extensible and integrated platform is our foundation to build incredible new products and features, while also making those identity capabilities more accessible to everyone in an organization. Today, we're providing the foundation for seamless login experiences that are totally customizable.

It doesn't matter If our customers want out of the box products or to build from scratch with our APIs and SDKs, the Okta platform is able to meet each end of the spectrum and everywhere in between. That's why the Okta platform is made up of core technologies that are flexible, programmable and integrate it to everything. By building a platform that is deeply connected to every technology and meets every identity use case Over time, we'll push the technology ecosystem, driving even more innovation and security. It is for this reason I'm so passionate about ensuring that Okta's platform enables us to be a primary cloud, able to address and unify large markets. In a cloud centric world, identity has become even more important and strategic of choice than infrastructure or collaboration clouds.

It's the epicenter of an organization's tech connections and it offers freedom of choice to adopt any technology. Choosing the right set of 5 or 6 primary clouds that serve the most critical business functions in an organization is one of the most important decisions CEOs and C level executives will make today and choosing an identity cloud is the most valuable because it facilitates choice and flexibility in all other technology. The announcements we've made over the last couple of days speed us toward this of becoming a primary cloud and expanding the problems we can solve for customers. We'll solve 2 new major customer requests with 2 new products, Okta Privilege Access and Okta Identity Governance. Both of these announcements represent further penetration in the workforce identity market.

Used to be. We're building for the way infrastructure is today and will be in the future, cloud deployed and just in time, the way critical infrastructure access has to be. When it comes to Okta Identity Governance, we're reimagining IGA for a cloud first world where the number of resources accessed by an organization has dramatically transformed. And just as critically, the potential for customer identity is massive for every organization today. Everyone is moving their business online and with that push comes the need not only to deliver safe and secure experiences, but to create meaningful ones for customers.

That's why I'm so excited that we're joining forces with Auth0. The feedback from our employees, customers and partners has blown me away. Not only do we share the same vision, our values of how we operate are tightly aligned. We have the same world view when it comes to the role identity plays in powering the Internet. Each company has its own strengths and expertise.

Coming together will give customers more choice to meet every identity need. Together, we'll accelerate our ability to become a primary cloud. We are going to maintain and invest in both platforms and in the background, we'll be integrating our technologies over time to provide even more innovation. I have a deep amount of respect for what Eugenio and the Auth0 team have built and you'll hear more from Eugenio in our Q and A shortly. Over the past year, we believe there has been a meaningful increase in our TAM related to expanded opportunities within enterprise customers as well as our new product introductions that address more use cases.

The workforce identity market has grown from 30,000,000,000 to 35,000,000,000. In addition, you heard the exciting news that we're expanding into IGA in PAM, which adds another $15,000,000,000 for a total work forced TAM of $50,000,000,000 Looking at customer identity, that market has grown from $25,000,000,000 to $30,000,000,000 We accelerated our penetration into this market with the complementary platform of Auth0. In total, it's of $80,000,000,000 market opportunity and I believe we're still in the early days of what we can accomplish. In the following sessions, you'll hear from Auth0's Co Founder and CEO, Yoheni Opais. Next, Okta's Chief Product Officer, Diya Jolly, will share our product strategy and roadmap.

Susan St. Leger, Okta's President of Worldwide Field Operations will discuss Okta's FY 'twenty two go to market strategy and customer centricity. Mike Corey, Chief Financial Officer, will share our strong foundation for growth at scale, our growing addressable market and long term financial model. From my co founder and COO, Freddie Keras, you'll hear conversations with Okta customers, Harry Moseley, CIO of Zoom Paul Cheesbrough, CTO and President of Digital Fox and Claude Pierre, CIO of Anji. I'm extremely proud of what the Okta continues to accomplish and can't wait to drive forward the future of identity.

Thanks again for joining us today. Now let's kick things off Now I'm really excited to have joining me the CEO of Auth0, Eugenio Pace. Welcome Eugenio.

Speaker 2

Thank you for having me, Todd. How are you?

Speaker 1

Excellent, excellent. Excited to have you, excited to have a conversation with you about Auth0 and Okta and more importantly about this amazing industry we're in. So why is now an important time for identity for organizations?

Speaker 2

Well, as you know better than anybody else, identity is the is this connective tissue that connects everything, every application, everything we interact with in our lives needs identity. And we are only scratching the surface because I don't know your experience, but in my personal experience, From the moment I wake up to the moment I go to sleep, I know it can be much better than the experience that I get. And when I look at statistics like only like a 3% penetration or 4% penetration of cloud into the entire world of IT and how critical identity is for that, that gives me an idea of how much we can do and how much more we can do.

Speaker 1

So we've known each other for a while now and it's been amazing to see the progress and the growth of Auth0. What does Auth0 stand for to you and what are its values? And then as it relates to Okta, What do you think about our shared vision and values together?

Speaker 2

That's probably the more exciting the most exciting aspect of this partnership because, yes, we know each other for a few years now. And I've been an admirer of you as a leader, as an entrepreneur and the company that you built, which is I know how hard it is to do that From personal experience, so I really look up to you and what you achieved as an organization. But I also look at the 2 things that you mentioned. 1 is the commonalities between the 2 of us, the Okta and Ocira and the complementary nature of our businesses as well. And so we do have shared values.

We call them in a different way, right? We have 3 core values. We give a shit. N plus 1 is greater than n they mean constant improvement, they mean collaboration, they mean empowering our teams, they mean care. And those are pretty much the same as Okta has listed as their core value.

So To me, that's a foundational piece of successful partnership. But then what we bring and maybe on the more complementary aspect of our businesses. Altzero's DNA, it's the core DNA, it's around builders and developers, people who are building solutions in the world. We believe, I'm sure you've heard this many times from me now, We believe in a world that it's a software world. We believe that every company is a software company, even though they might not call themselves a software company.

But it is because software runs everything. And so our value proposition is that we check the box on a big problem, a problem that it's pervasive, as I mentioned before, but it's also a big distraction from teams. So if you need to if you go around building this yourself, not only the solution is not going to be as good as ours, it's going to be weaker, but it also detracts time and resources from what's actually valuable for your business, what makes you unique. And so that's what we are here for. We are here to make every developer in the world productive, Rest assured that this is taken care for them and they can go on and move on into what's really, really important for the business.

Speaker 1

Both of our platforms have thousands and thousands of customers and they're really operating at scale. And it's important that we continue to invest and support both platforms going forward. And today in this conference, we're talking a lot about the innovation on the Okta side And you have the same commitment to innovation in the future and helping customers on the Auth0 side. What do you think this joint innovation means for customers and for users?

Speaker 2

Absolutely. So we are certainly committed to supporting our tens of thousands of customers that we jointly serve. In many cases, we are actually serving the same customer today. And in many ways, our platforms are already integrated. It is possible today, even before we announced this deal among us, it is totally possible for somebody to log in using Okta into an Auth0 protected application.

And that's a completely supported real we don't have to develop anything that's doable today already. So what it means to me and what really is exciting about partnering with you, it's the that we can bring What we imagine the future will look like in 5 years or even beyond that, much faster. We can deliver that amazing future in a couple of years as opposed to waiting or maybe months in some cases as opposed to waiting a long time. In Okta's world, you've been calling this the identity cloud. We don't use those words.

We use the identity operating system. It's different labels for actually exactly the same thing, which is this broad universal set of building blocks that our customers can use to deliver on more use cases and to build like a comprehensive universal platform that they can use in like a broad range of use cases, whether it's workforce or customer or devices, websites, mobile applications, any kind of app. And we can do it faster and we can do it more secure and we can drive innovation and bring innovation to the market in ways that nobody else can in the same level of quality. That's what's exciting.

Speaker 1

Auth0 is very strong in terms of revenue mix internationally. How did you achieve that in the relatively early phase of the company?

Speaker 2

Well, if I could tell you that it was very well planned and I had all that strategy in my mind, but I would be probably lying if I

Speaker 10

I think

Speaker 2

it was a little bit of serendipity, frankly, and it's connected to our remote nature, perhaps. When we started the company, I was leaving as I'm leaving today in Washington State and Matthias, Co founder of the company was living in South America back then and we decided to I was not going to go back to South America and he was not going to come to the U. S. And so we decided to make lemonade out of lemons and say, let's embrace and take advantage of the fact that we are far away, physically far away. Let's hire people everywhere.

Let's hire for talent, for time zone and for ZIP code, kind of in that order. And one of the side effects of that and maybe the fact that it's being a developer company and everybody being able to go to the website and click on a button and get a trial account instantaneously without necessarily having to interact with a human. So we have people all over the world and then we have customers trying us out all over the world. All of a sudden, we found ourselves in a place where 40% of our revenue is generated outside the U. S.

And or outside Americas, I would say, and 60% is generated in Americas, most of it in the U. S. So I guess the other another maybe corollary of this, which is obvious in retrospect. Identity and Access Management is not an American problem, right? It's every application in the world, Any industry, it doesn't matter if you're a start up or a well established company, if you're like a 200 year old manufacturing company, finance, education, any dimension, any industry needs to know who the users are.

And so there's some universality that makes us like a global offering from day 1.

Speaker 1

After the transaction closes, you'll continue to be the CEO of Auth0. What are your initial priorities as you continue to lead the team and the organization?

Speaker 2

Well, yes, that's the plan. The plan of record is to continue our journey. We have already a road map. We have a product road map. We have a growth business road map.

So the immediate priority is to deliver on that in the short term. And then obviously, the second priority for us is to find opportunities of acceleration. And so from a technical point of view, there's some very obvious ones that we can think of, although we are going to take the time during the next After the deal closes, hopefully soon, we're going to take the time to identify those and do those with thinking about our customers, first, what are the things what are the problems that they're trying to solve? But 2 obvious ones are one is around the anomaly detection space. And so today, we use a lot of signals from the world to identify whether somebody is who they say they are or is suspicious, log in or not.

Now we can combine signals from your platform, from Okta platform with ours and we can make both platforms stronger by having more intelligence into whether it's location or devices or applications that customers are trying to log in into, we can combine all of that and increase security just by the volume of logins that we both collectively process. The other one, it's clearly I mentioned this in another session. It is possible today for a company to log in using Okta into an Auth0 protected application. That's completely supported. It happens all the time.

We have a lot of customers with that specific use case. We want to make that relationship even easier to onboard. Today, it's done. There's a standard for it. There's some documentation and protocols to enable that federation to happen, but we can make it as simple as a LinkedIn invite for business.

And so that's something that I'm particularly excited into the in the B2B world with workforce on one side and SaaS applications on the other side where we can make that connection happen better, faster and more secure.

Speaker 1

We've been hearing great feedback from customers and partners in the market about Us joining forces, what have you heard on your side?

Speaker 2

Yes, it's been the same. And as I said many times before, we have many customers in common actually today. So we already are in places where they are using both platforms. And so in My conversations with existing customers, with prospects and with our developer community as well, maybe a constituency that is not maybe not as familiar with your platform necessarily. We've heard like they all see this opportunity that we can unlock and that we can accelerate by working together.

And it's a big problem. It's a problem that is increasing as more and more systems get online, as our lives become more and more dependent on digital systems to do everything. 2020 was a good proof of that in terms of things that have moved to the digital world. And look, we but it's crazy that we still have passwords around us. It's crazy that we still need to deal with that, not really With the technology that we have today around us, the experience that we can provide to our customers and through them to their employees or their customers, it's way, way better than it is now.

And that's, I think, what everybody sees and what that's what they're looking forward to, what's going to happen in the next few months with us together.

Speaker 1

Well, thanks for joining us, Eugenio. On behalf of myself and the entire Okta team, I just want to express how excited we all are to get this transaction closed and move forward building something amazing for customers and company together. So thank you very much.

Speaker 2

Very much looking forward, sweet. Thank you. Bye.

Speaker 4

Hi, everyone. I'm super excited to be here with all of you today. You had a chance to hear from Todd and Iuhenyo. Now what I'd like to do is take you through Okta's product strategy. But before we do that, it's really important to understand this concept of primary cloud that part just teed up and how identity has become a primary cloud for all organizations.

So let's take a few minutes to do that. Organizations used to lead with business strategy and technology decisions used to be an afterthought. The choice of technology didn't significantly impact the business outcome one way or the other. However, with digital transformation becoming to powering a company's growth, every business executive I have talked to now considers technology as a critical enabler of achieving their business strategy. CEOs are leading the technology to be a primary growth driver for them in 2021 and beyond.

The technologies that truly enable growth for organizations are the ones that have become primary clouds for organizations today. And primary clouds are a foundational part of today's technology strategy across organizations large and small. Let's look at one example. More than a decade ago, infrastructure was not strategic to the growth of an organization. It was considered a cost center that was slow to innovate and more often than not was considered a bottleneck to innovation.

Infrastructure decisions were largely left to mid level managers and practitioners. Cloud infrastructure changed all that. Today, an increasing number of organizations perceive infrastructure as a service to be a growth enabler through benefits such as faster time to market, better customer experience, rapid innovation and more. Now, infrastructure as a service is a primary cloud that powers virtually every digital touch point and experience. Just like infrastructure, historically, identity wasn't a strategic priority for organizations.

Workforce identity was considered a tactical technology project managed by mid level IT practitioners looking after Active Directory. It was perceived to be a heavyweight effort that did not scale and limited innovation and growth. And customer identity was an afterthought, often developed in house by development teams lacking specialization and identity. But in the last couple of decades, Disruptive technologies such as cloud, mobile, social and IoT, as well as the move to highly personalized products and services has transformed the dynamics of the digital world. These digital disruptions have marked a new era for us in both our personal and professional lives.

Think about how your own life has changed over the last 15 years or so, both at work and at home. We have observed a dramatic increase in the number of digital touch points we engage with daily. Now take a minute to think about the role identity plays in each of these digital touch points. It's ubiquitous. Our workforce needs to be able to work from anywhere and needs instant access to tools, whether that's an office, a spare bedroom or a coffee shop.

As consumers, if we experience any friction in our digital engagement, It often leads us to abandon the engagement. This in turn leads to lost revenue for the organization that we were engaging with. Identity is a common control point in every one of our digital journeys. It drives the experience, It enables security, it safeguards privacy. As a result, the traditional view of identity has faded.

Identity has dramatically transformed into a primary consideration just like infrastructure or CRM. This is because identity helps deliver higher productivity, consistent and frictionless experiences and secure access. Let's look at how identity became a critical growth enabler for one of our customers. Today, Ali Financial is on a transformational journey with Okta. They work with over 18,000 auto dealerships across the U.

S. And transact 1,000,000,000 of dollars every month. Before Okta, the experience these dealers had was very manual and required a lot of call center interactions to support their transactions. This created a lot of friction in the dealers' experience with Ali, high call center costs and lost time and revenue. With the Okta Identity Cloud, they are able to deliver a secure and frictionless experience to their dealers.

Now their dealers can transact seamlessly, administer their own passwords, render new credentials for identity and more, all from one place without the friction of interacting with the call center. The Ali Financial example is not a one off. Companies large and small are leveraging identity as a foundational element of their business and technology strategy. And it is because of this example and so many others like it that today identity has become a primary cloud. And Okta has played a pivotal role in shaping the journey of identity as a primary cloud.

The Okta Identity Cloud has helped our customers lead with identity to transform their business. Let's take a quick look at a couple of examples to show how identity is ubiquitous across workforce and customer experiences. For example, identity touches every aspect of experience for an employee. Let's take a typical workforce experience the ways Okta orchestrates an employee access. A new employee joins the marketing department and authenticates into an Office 365 app for the first time.

In the background, Okta starts detecting risk for that authentication. That means not only using Okta's device trust to verify that her phone is a managed device, but also relying on Okta Hooks to retrieve 3rd party threat feed data that provides more risk signals. While the employee only experiences a simple login, Okta behind the scenes provisions an Office 365 account just in time and automates access to the right license and role appropriate for the specific user. Beyond that provisioning, Okta Workflow triggers other actions for the new employee like an automated company email tailored to new employees joining the marketing department. Lastly, Okta gathers data about the users' behavior and authentication attempts and feeds it into user behavior analytics tools like Splunk through prebuilt Okta integrations to ensure higher ongoing security.

So on the surface, it's a login attempt, but underneath identity is the center of the employee experience. This is identity as a primary cloud, one unified cloud for SaaS, on prem and cloud native apps. Secure and frictionless employee experience is just one of the ways that our customers like FedEx, NTT, Albertsons and thousands more are leveraging the power of the Okta platform. Let's take a look at it from a customer identity perspective, where Okta is Shasta Integral. A customer is considering whether she wants to buy exercise equipment and lands on a CrossFit equipment site.

As she's browsing for a little while, she's prompted to create an account by just using her e mail. No need to increase the friction by dealing with the password and account details. In the background, an Okta workflow triggers a Marketo enabled marketing campaign to kick off. She finds the perfect set of weights and adds a few items to the cart, but ends up getting distracted. Thanks to the email registration, she gets a Marketo generated email reminding her about the items in her cart.

She comes back and using just her email address, she's able to get an email link to easily authenticate without any friction. Back in her account, she goes to the cart and begins to complete the checkout process. The CrossFit site is using Okta for more than just registration and authentication. They want to make sure high value transactions have a second layer of protection for customers. Her cart value is above a certain dollar value, So she's prompted for MFA before she completes her transaction.

While all of this is going on, Okta orchestrates multiple downstream back end processes that are triggered based on her evolving identity. For example, Okta is orchestrating how identity flows into the CRM system, which updates the user from a prospect to a customer. Okta also pushes the new customer's identity into the customer success system, assigning the new customer a virtual trainer to hit her fitness goals. These are just few specific examples, but the automation and integration capabilities of Okta open up so many more. Once again, identity is more than just logging in.

It touches every aspect of the customer journey. Thousands of our customers, including MGM Resorts, Car Ambax, Major League Baseball and more leverage Okta's capabilities of progressive profiling, marketing integrations, step up authentications and many others to deliver a differentiated frontdoor experience for their customers. We talked about how primary clouds address a broad set of critical needs in an organization, which allows them to address huge primary markets. It is this characteristic that also allows primary cloud technologies to broaden into many more large adjacent markets. To explain what I mean, let's take Salesforce as an example.

Salesforce started with their core cloud delivered CRM offering with Sales Cloud. They then broadened into the TAM for service and support software with Service Cloud. Subsequently, they broadened to the TAM for marketing software through Salesforce Marketing Cloud. And more recently, they've broadened their time yet again to commerce based software via Salesforce Commerce Cloud. As you heard from Todd earlier, there is a significant TAM across workforce and customer identity, But there is a massive future time represented by the adjacent markets of identity governance, privileged access, 0 trust network access, privacy and consent management and more in front of us.

This is really very exciting. Okay. Now let's talk about where we are going in the future. Because Identity truly is a primary cloud, the breadth of use cases that Identity touches is infinite, and the adjacent markets are numerous and large. A product or even a set of products will never be able to address all these use cases to become the growth enabler identity needs to be for organizations.

At Okta, we firmly believe that the only answer to this a platform approach, an identity platform that not only provides the core identity foundation, but also the tools that empower our customers and partners to innovate and build solutions on top of Okta. This is why my team is acutely focused on continuously enhancing the value and capabilities of the Okta Identity Platform for our customers. I think about our platform across 3 core pillars. 1st is unified. Our platform consists of a set of modular components called Okta Platform Services, which can be combined to unlock new use cases, products and resource types.

This uniquely positions us and our customers to get to market faster in new business areas and to serve emerging use cases, and it gives us a leg up over competitors with disjointed platforms. It's extensible. Every organization has unique needs and even the most robust suite of identity products can't solve them all. So a flexible platform approach enables our customers and partners to extend and build on top of Okta beyond the use cases that we can solve today. We do this through our no code, low code and pro code capabilities.

And finally, it's integrated. Every organization has and continues to build an ecosystem of tools, applications and infrastructure that helps them grow, new SaaS applications, developer toolchains, analytics engines, infrastructure as code, etcetera. We have built a platform with over 7,000 integrations to enable customers to take an identity first approach. It is our malarial focus on these three pillars that allows us to truly deliver a platform that allows an identity primary cloud that is a growth enabler for our customers. And the customer success stories that we have, whether it is Ali, FedEx, CarMax or others prove that our strategy is working and benefiting our customers.

Earlier today, we made some key product announcements that will further strengthen our customers' ability to solve large new pain points using the Okta Identity Platform. We announced that we are entering 2 new markets, the identity governance market and the privileged access management market with 2 new products, Okta Identity Governance and Okta Privileged Access in the Q1 of 2022. The existing solutions in these markets were deployed during the legacy identity era and don't scale to today's challenges of hundreds of resources, ephemeral infrastructure, a global and remote workforce that also faces increased security threats. We believe that using our existing Okta platform and cloud centric approach, we can transform these markets the same way we did for access management. As we broaden into privileged access management, we want to make sure that we don't just build for the way infrastructure used to be, but how it is today?

Therefore, we are adopting a cloud deployed just in time user based prudential model that is built not just for on prem, but also for today's cloud based dynamic resources. And we won't only restrict ourselves to servers, but also extend to secure other privileged resources such as Kubernetes clusters, databases and more. The new Okta Privileged Access product will join Okta Advanced Server Access as part of our Privileged Access product portfolio. Customers will be able to pay more to upgrade from advanced server access to Okta Privileged Access to avail of our full suite of privileged access capabilities. With privileged access, customers will have access to enriched functionality like SSH and RDP session capture, attribute based access controls and new resource types, including databases and containers.

When it comes to Okta Identity Governance, We are reimagining identity governance for a cloud first world, where the number of resources accessed by an organization's workforce has dramatically increased and the workforce itself has transformed. It's not just traditional employees, it's contractors, it's partners and all of those unique user types that need access to the right resources and the right governance to succeed. Okta Identity Governance will make an organization more secure and more efficient by giving it self-service access via popular tools like Slack to its most common resources and apps, while still providing the right amount of approval for more sensitive apps, data and tools. All of this will be underpinned by customizable and automated business workflows that keep your teams working on pushing the business forward. The new Okta Identity Governance product will join our lifecycle management products as part of our governance product portfolio.

Customers will be able to pay more to upgrade from their investment in life cycle management or advanced life cycle management to identity governance and will benefit from new functionality, including access requests and certification and enriched reporting capabilities. Extensibility of our platform is our 2nd pillar, and it is a really important pillar to allow our customers to be able to solve all their use cases on top of Okta. In addition to building the correct APIs, a key thing that defines extensibility of a platform is the developer experience on top of the platform. How can developers quickly and easily build their apps, their integrations, their use cases using the Okta platform and on top of the Okta platform. That is why over the last year, we've put a Tremendous amount of effort in reimagining the Okta developer platform and the Okta developer experience to speed up time to production for developers.

We have launched new SDKs, new sample apps, new guides and new best practices for developers. We've built a guided developer onboarding flow as well as step by step instructions for developers to get their apps and their integrations up and running. And we've also invested in enhanced developer support across key developer communities like GitHub, Stack Overflow, etcetera, and ensured coverage for every language and every geography. We are also adding to our existing library of open source tools with tools that make it much simpler for developers to use Okta with popular app platforms. For example, Heroku and API gateways, for example, Khan.

All these changes were made available to developers ago and the feedback from them has been overwhelmingly positive. Finally, you all have heard the big news about Odd 0 and heard Todd and Eugenio's conversation. This is very exciting for all of us. The combination of Okta and Auth0 allows us to provide customer solutions for developers and organizations of all types, and it accelerates our penetration of the 30,000,000,000 TAM for the SIAM market. Additionally, we share the same vision and the same values and how we operate is tightly aligned.

We are going to maintain and invest in both platforms indefinitely. And in the background, we'll be integrating our technologies over time to provide even more innovation. And finally, the 3rd core pillar of our platform is integrations. As I discussed earlier with my CrossFit example, Getting a customer experience up and running requires bringing together multiple different tools and technologies in the customer experience stack, like marketing tech stacks, commerce tech stacks, analytic tech stacks and more. This is extremely hard and time consuming, but it is very important for organizations to do well to build a seamless end to end experience for their customers.

To solve this pain, we are deepening the Okta integration network for customer identity with purpose built customer identity integrations across 40 plus partners from multiple different categories, social login, marketing, e commerce, CRM and data and analytics platforms and many more. While doing this, we are adopting a best of breed approach that will allow organizations that use Okta to choose the technologies that are best suited for them. One additional key component of the customer experience is technology to assess risk, respond to fraud and mitigate the risk of account takeover attacks. After all, users and their credentials are soft targets for threat actors. The solutions customers use to safeguard the customer experience are fragmented and often very difficult to implement with an in place identity solution.

Bringing web application firewalls, Bot detection capabilities and fraud solutions together with identity is far harder than it needs to be until now. We took our customers' feedback and are launching our risk ecosystem API to ingest 3rd party signals into our risk engine. We are launching this capability in early access along with deep integrations with leading providers like Fastly, F5 and more. And now our customers can get a unified view of the security posture of their users across a wide range of risk categories. Last year, we launched our No Code Workflows platform service to help with the orchestration of business processes for our workforce customers.

Earlier today, we announced the general availability of workflows for customer identity. This will unlock new and valuable use cases throughout the B2B and B2C customer identity lifecycle. During customer registration and identity creation, organizations can easily automate an ID proofing flow for their B2C customers and accomplish identity verification through one of our partners like Evident ID. This will allow a higher level of assurance, but at the same time will allow a frictionless registration experience. With workflows, organizations can now automate sync of customer identities into their marketing, CRM and analytics stack to ensure a 360 degree view of the customer without needing to write custom integration code.

Customers can also simplify administrative operations like notification, reporting and privacy and data deletion requests through workflows. This reduces the volume of tickets, error prone manual work and custom code and frees up resources to be employed in more strategic business areas Providing pre integrated no code experiences to power these critical customer experience flows is extremely valuable to our customers and the feedback from the early access of our product has been resoundingly positive. As excited as I am about what we've talked about this morning, worth recognizing the groundwork we've laid at Okta for future innovation. Our focus on having a unified, extensible and integrated platform goes beyond just the ability of our customers and partners to customize and extend us. Today, we have partners that are building businesses from the ground up on the Okta platform.

Productive is a great example of this. They have leveraged an identity pod foundation delivered through the Okta platform to build an enterprise SaaS management platform. This is just the beginning. We see a future with a robust ecosystem of 3rd party products that need identity and are built directly on top of the Okta platform. These different categories of third party apps will further drive the flywheel effect for Okta.

And it will provide our customers even more value through the Okta platform. We are in the midst of very exciting times to experience the next technology revolution, shaping the future of every organization, and identity is at the center of this. Thank you for joining me today, and I look forward to sharing more as we continue on this exciting journey for Okta. And now I'd like to pass it over to Freddie for our first customer conversation.

Speaker 3

Hey, everyone.

Speaker 17

Hi, everybody. Hello, everyone. Hi, everybody.

Speaker 4

Good morning.

Speaker 1

Welcome to introduction to ceramics

Speaker 22

We inhale and exhale. We're

Speaker 24

working on this.

Speaker 1

Don't take it too seriously.

Speaker 16

All right. Well, thank you all very much for joining us. I'm thrilled to be here this morning with our first guest, And that is Harry Mosley, the global CIM of Zoom. Zoom, for those of you who might have been living under a rock for the last is a global 2,000 video communication company that has obviously experienced explosive growth. Harry, welcome.

I'm thrilled to have you here. Thank you very much for joining us today.

Speaker 25

Yes, Freddie, thrilled to be here and it's been a hell of a year. And As we were just saying in the preamble, vaccinations are here and the light at the end of the tunnel, we just don't know how long the tunnel

Speaker 16

I can't wait to get out of the tunnel. So let's start a little bit just with a quick overview. Tell us a little bit more about yourself and about Zoom and about all the transformation that you brought there in your time at Zoom?

Speaker 25

Yes. So it's been a hell of a journey. I joined Zoom a little over 3 years ago after a terrific career working as a CIO for KPMG, the U. S. Firm Black So, Credit Suisse and UBS and joined Zoom 3 years ago.

We were 800 people. Now we're north of 4,000 people. We're processing in excess of 3,000,000,000,000 annualized meeting minutes a year, we're hosting over 300,000,000 daily meeting participants and maintaining our Net Promoter Score, customer satisfaction and service levels. And so, it's truly The way I characterize it is a testimony, if you will, of the architecture that our Founder and CEO put in when he built Zoom 10 years ago. Eric Yuan, terrific guy, terrific leader and a terrific technologist.

And it's just been truly a transformative year, I think for the planet, for enterprises around the world, every country, governments around the world and education as well. So, we're now supporting 125,000 schools in 25 So, proving to be here with you, Freddie.

Speaker 16

That's amazing. Congratulations on all that success and thank you for all the hard work at Zoom, certainly. So as the global CIO of Zoom, you've seen what I think the understatement might be a massive shift in technology within not only your own but as you said, a lot of the different organizations in the private and public sectors that Zoom supports. With the pandemic and the shift to remote work, It's brought on a completely new set of challenges for organizations of every shape and size. How do you see your role as CIO Changing today?

And what's your vision for IT at Zoom going forward?

Speaker 1

Yes.

Speaker 25

So clearly, sort of as I reflect back On the last 3 years, every year has been different. God knows what's in front of us. So, But continuing to focus on the mission and the vision that we established that Eric established when he founded Zoom, which is So, our mission is all about empowering people to do more. So, and that's not sort of that's not quote more meetings, that's people to do more, whether it's bankers to help their clients, whether it's professional services to help their clients, medical practitioners to help their patients. And it's all about the sort of the consequences of helping all those people that they can accomplish more.

And our vision is clearly about sort of making that virtual event, that virtual experience as good if not better than the in person event. And so we've been very focused on that obviously and continuing to focus on that. When you think about, and I'm sure you're thinking about this at Okta, when you think about artificial intelligence and IoT and ML and AR and VR and 5 gs, all these things are sort of we're only kind of like just barely scratching the surface of what they can do and I think that in this new hybrid model that we believe and many other organizations and surveys have clearly indicated as well. It's here to stay. I think that we're in for a very exciting technological future.

Speaker 16

Yes, absolutely. Well, that's great. As we as you and I were talking about just off camera previously, the first time you and I met was a dozen years ago, When I think it was just me and Todd and a trick duck in a garage. So we made a

Speaker 3

little bit

Speaker 1

of I

Speaker 25

had a great PowerPoint, Chris.

Speaker 3

I had

Speaker 16

a great PowerPoint. I think The

Speaker 1

quote for those of you who are going

Speaker 16

to be watching this was, when I walked out of the room, Harry said that he and his colleagues said, well, that was a great presentation, but we don't know what Frederic was actually talking about. So I'm glad to know that we've made a little bit of progress over the last dozen years. And finally, you and I have had a chance to start working a couple of years ago when Zoom became a first became a customer of ours. Tell me a little bit about how identity fits into your technology strategy? And then when you initially looked for an identity solution after you got your feet set at Zoom, what ultimately made you select Okta?

Speaker 25

Yes. So, clearly, identity and access management has been a key topic since time began in the technology world, right? It's fundamental is that people should have access to data and access to the tools that they need to get their job done. And so as people join an organization, they mature in the organization, their roles change in the organization, the portfolio of applications change in the organization, At a time when you're 10 people in a room, but when you're thousands of people spread across all continents spread across all geographies and people are moving and joining the firm. You really need a sophisticated solution like Okta to actually manage it.

And you think about the different devices we've got and the different operating systems that So, there's lots of choices out there, but, October really, There's a phrase they say about Zoom, Freddy, and you know this too. Zoom, it just works. After, it just works. It's kind of like, use it a dozen times a day. It's fantastic.

Speaker 16

That's great, Willie. Yes, I greatly appreciate that. I know that you have very much that modern approach to application and infrastructure portfolio and obviously have such a broad swath of employees and contractors. So it's been great getting to work with you guys as you've been deploying the Okta service. Obviously, you started just with some enterprise identity management around for your employees, but now you're starting to do some automations for Okta Workflows and things like this.

As you started your journey with Okta's workforce products, Now you've recently expanded to some of our newer products, advanced server access is one of those. Why did you select Okta for Your identity infrastructure, how do you think about that? And then what value do you see in using a unified platform like Okta across multiple different use cases?

Speaker 25

As you said right before, we're using for identity and access management for our employees. And so, it was just a natural progression to sort of pull it into our server infrastructure. We went from early days 100 1,000 and then now like tens of thousands of servers running in 19 colos around the world. And then you have more engineers and you've got more DevOps resources, etcetera. And sort of managing this is extraordinarily complex.

It started with sort of manually setting up some rules, replication of those rules that got us so far than we did went to LDAP. And so, one of the most important things that We've always said about security is it's like it's the trust and verify, right? So, the security officer establishes the rules of the road and gives it out and then verifies that the rules are being followed. But with Identity and Access Management, you now have like a complete separation, right, because you've got the onboarding with the profiles, you set up profiles, you set up the access for those profiles, that's done by 1 group, you've got a second group who are administering the profiles, and now you've got a 3rd group who are enforcing profile. So you've got like all these separations.

And then on top of that, you've got sort of the fact that if somebody does log on to a server without going through the process, without going through the normal protocols, then we get alerted and that's like super awesome and you create a ticket and document why they had to do that and so on and so So, absolutely natural extension and it's like having an on common platform. It's similar to like I do, right? It's kind of you do this all the time. You do 1 on 1 meetings, you do group meetings, you do live meetings, you do webinars, you're in for it's just Easy, right? It's kind of like and you get used to how it works.

Speaker 16

Yes. Not only that, I love it when you guys bring out new features and functions. Sometimes I'm not the first to figure them out. I remember when you brought out the blurred background some weeks ago and I got on a number of meetings and people had this blurred background and I couldn't find it for the life of me in the settings. I actually had to call our CMO, he's like, do you have the latest version?

And of course, I didn't. So All the innovation that's coming in the Zoom platform is fantastic. I personally really enjoyed also watching Zoom's incredible growth this past year. I've been fortunate to get to know Eric, the Founder and CEO, a little bit over the years. And what you guys are doing is phenomenal and I'm really excited to see what's coming next for your company.

How do you think about the future of identity for Zoom and what is next For you as you think about that infrastructure and security roadmap?

Speaker 25

Yes. So as I said, identity is critical, so Security is critical, making sure that only the right people have access to the data and the solutions. So we're going to continue to sort of continue this program that we've been on in the future as we have in the past. So, it's hard to sort of predict the future. I mean, if we go back 18 months ago, I remember January of 2020 being on a flight back from Zurich after Davos and sort of reading the newspaper about COVID-nineteen and then like 6 weeks later, we shut the office down and then 7 weeks later, the world goes.

So, it's hard to predict what's coming next, but clearly, we are hopeful for more continued growth at Zoom. We work as you know in dealing with Amazon and Oracle And so I expect that we'll see sort of more experiences in that vein.

Speaker 16

That's awesome. Well, look, Harry, thank you very much as always for taking time out of your busy schedule to chat with us. I really enjoyed the conversation and appreciated the story. Of course, we appreciate your insight and look forward to more partnership in the future going forward with Zoom and Okta.

Speaker 9

Thank you for joining us today. For those of you who don't know me, I'm Susan Sittledger, President of Worldwide Field Operations at Okta. I've been in tech my entire career, Starting as a computer scientist at the National Security Agency. And then embarking on 3 incredible high growth journeys. Joining Sun Microsystems when it was $1,000,000,000 going to $22,000,000,000 Salesforce at a little over $100,000,000 to $8,500,000,000 And most recently at Splunk, from $675,000,000 to $2,350,000,000 I am a self proclaimed high growth junkie.

And I can't imagine being at a company that was anything but high growth. Leading me to Why I joined Okta. Todd and I spent a lot of time talking about the market opportunity. And I definitely bought in to his vision of identity as a primary cloud. He made me think about identity differently.

Think about your day. Whether you're consuming information, streaming a video, executing a wire transfer, or simply trying to access your corporate applications and data. You expect every single one of those interactions to be on demand and tailored to you. Todd and Freddie recognized that identity was at the core of every interaction between people and technology, which makes this a very large market that will continue to grow. Add to that the tailwinds of the 3 megatrends that we're seeing, cloud and hybrid IT, digital transformation and security.

And now you've got a mega market, one that I cannot wait to pursue. Customer centricity is equally as important. And Okta definitely embraces this principle through our core value of love our customers. I'll be speaking more about that in just a little bit in my FY22 go to market strategy. Lastly, I feel very privileged to be asked to lead another high growth journey at a company as amazing as Okta.

Okta's growth over the past few years has been very impressive, growing revenue to $835,000,000 in FY 2021 with a 40% CAGR over the last 3 years. But it's really just the beginning. As Todd explained earlier, In a cloud centric world, Identity has become an even more strategic choice than infrastructure or collaboration clouds. It's the epicenter of an organization's tech connections and offers freedom of choice to adopt any technology. Understanding our customers will help you understand why identity has emerged as a primary cloud.

Throughout my presentation today, I will highlight the agility, time to value and the flexibility experienced by our customers who have centralized their identity framework on the Okta Identity Cloud. One of the keys to being a primary cloud is the extensibility of our identity platform. As you heard from Dia earlier today, our platform continually unlocks new opportunities for both workforce and customer identity. Customer identity is the fastest growing part of our business, even prior to joining forces with Auth0. And in my personal opinion, customer identity market may be underestimated at 30,000,000,000 Because it's not well understood.

Workforce is much better understood because the population of knowledge workers is understood, And it's a market replacement. If you think about customer identity, every human being can have many customer identities. Think about how many different digital services you're subscribed to as a customer. Add to that the fact that it is a market creation opportunity Because most companies have no idea how much money they've spent over the years cobbling together customer identity solutions in many different ways. But with the explosion of the digital economy and the demand for digital experiences, They are now searching for more secure, standardized and scalable solutions with a faster time to value.

Customer identity solutions have a huge role to play in determining which companies survive and thrive in this new reality. Joining forces with Auth0 will further our ability to address even more use cases for customer identity, making our platform even more extensible with our developer led approach. The Auth0 developer led approach It's very complementary to the Okta approach. Shift left has been driven by the explosion of native cloud microservices. And with the advent of ephemeral resources, it's critical for developers to build their applications with core services like identity and security.

In addition to great technology, Auth0 has long mastered the art of remote work, which will be greatly complementary to Okta's pioneering of the dynamic work environment. And lastly, I'm super excited about the international traction that Auth0 brings to the table. 40% of Auth0's revenue comes from international markets. There are many synergies with Auth0 and Okta's overall go to market strategy. The go to market strategy for FY 2022 is very straightforward.

We're going to continue to build on a success to date, which makes a ton of sense because we're only 2% penetrated in workforce and 1% penetrated in customer identity. The foundation of our go to market strategy is definitely customer success. I learned in 2004 at Salesforce That high growth software as a service starts with anchoring on customer success. Okta anchored on customers from day 1. Love our customers is in the Okta DNA.

When new customers buy Okta, they're taking the first step and their roadmap to modernize our infrastructure. We ensure that first step is fast and high value, Then we continue to build wins with them along their roadmap as they expand with us. From that anchor on our customers, Our strategy then focuses on 3 key pillars, new logo acquisition, expanding with existing customers and international growth. Lastly, I'm excited about the innovations announced by the product team, allowing us to enter into adjacent markets like PAM and IGA, which will continue to increase our TAM. As you know, capturing a large TAM is about having technology that everyone needs.

I experienced this during my time at both Splunk and Salesforce, And it's very clear to me that everyone needs Okta. Looking at the breadth of Okta customers and the use cases is demonstrable proof that everyone needs Okta. Let's take a look. I was impressed to see the team convert so many great new logos in FY21 over 2,000 Despite the COVID headwinds, we added incredible new logos like LVMH and Equifax as workforce customers, Alaska Airlines and Crate and Barrel as customer identity. And State of Iowa and Parsons as Okta Access Gateway customers.

Landing new logos is critical to our success because they become expansion opportunities for years to come. Speaking of expansion, FY21 did not disappoint. This is where Love Our Customers really comes into play. As evidenced by our strong net retention rates, 121 percent as of Q4, customer success leads to expansion. You heard earlier from Freddie and Harry about the critical role that Okta played in Zoom's explosive growth, which led to an incredible expansion opportunity for Okta.

Even more impressive is the breadth of customers that have landed and expanded with Okta. We land and expand with legacy companies and digital natives alike. For example, 188 year old McKesson It's a great example of a mature company that needed to modernize. They were at the bleeding edge of understanding the value of a unified identity framework for their employees, suppliers and customers. This unified identity framework allowed them to quickly adapt to the needs of the remote workforce, while at the same time securing McKesson's supply manager platform to take the hassle of medical supply ordering for customers like CVS and Walmart.

Remote workforce and B2B supply chain are very common use cases we solve with Okta. Let's take a look at a digital native company, Kiwi.com, which is a European travel website. They have experienced rapid growth with greater than 3,000 employees, millions of users and billions of searches. But their customer service employees were experiencing tremendous friction, trying to get access to a variety of apps in order to do their jobs. Kiwi dotcomselected Okta as a critical part of their 0 Trust strategy to securely and seamlessly access the technology needed for the employees to do their jobs more quickly improving annual productivity by over 6,700 hours.

Streamlining customer care is a common use case with Okta. And our land and expand motion includes SMB, Enterprise and Global 2 ks customers alike. GitLab is an incredibly successful SMB customer. They have had a remote work strategy from their inception. And there are over 1300 employees today across 67 countries.

They embarked on an 8 month journey with Okta to secure more than 120 cloud apps as a critical part of their 0 trust strategy to allow their employees to work wherever and however they want it. Trusting with Okta led to a 90% reduction in identity compliance costs and 35% reduction in employee onboarding. Shifting to look at the Global 2,000, we have tremendous upside. We are only 25% penetrated in a cohort that delivers 6x the company average ACV. Let me share a couple of examples of our success within the Global 2000.

T Mobile initially deployed Okta to one of the largest retail fleets in any industry, simplifying access to retail point of sale applications for tens of thousands of employees. Next, T Mobile put Okta at the center of their customer experience strategy. With over 200,000 customer facing T Mobile representatives, They needed to streamline their customer care process. They needed to eliminate the need for their representatives to toggle between applications with separate login credentials, which was creating friction for employees and customers alike. Given the success in retail and customer experience, it was no surprise T Mobile then called on Okta to help them with their merger with Sprint to onboard 30,000 employees to ensure success day 1.

FedEx is another great example. FedEx relies on Okta as a critical part of their 0 Trust strategy to quickly and securely deploy applications to its workforce of over 500,000. In early 2020, Okta helped FedEx deploy 5 critical cloud applications in 36 hours to enable their central workers to deliver during the pandemic. FedEx quickly expanded and now has well over 350 SaaS applications with Okta, and many, many more to come. Our land and expand motion clearly spans all verticals.

Another great example is a healthcare tech company called athenahealth. Athena called on Okta to help them provide pure cohesive personalized patient experiences across 8,000 patient portals and 4,000,000 patient accounts, not to mention over 160,000 providers. Protecting patient data was a top priority. So they leveraged Okta's HIPAA compliant cell to meet those requirements. Once they had the strong identity foundation in place, they were quickly able to launch a telehealth solution in response to COVID-nineteen.

Like so many other customers, athenahealth recognized that once that strong identity foundation is in place, It frees them to focus on key innovations that improve the health of patients and productivity of its providers. As you can see, we have landed and expanded in legacy and digital natives, SMB and enterprise across all verticals and the Global 2,000. Since expansion is such a big growth lever for us, I want to share a few customer examples that show the various journeys that customers have taken with Okta on their expansion route. Thus far, We've covered customers in a wide range of industries, but I would be remiss if I didn't talk about public sector. This is a state agency who landed with us with $1,000,000 opportunity and expanded to $4,600,000 all in the span of 1 year.

Despite COVID, they realized that they must continue to serve their millions of residents with a remote workforce. They replaced their custom built identity system with Okta Workforce and Okta Customer Identity. In order to secure access for 8,000 employees and millions of residents. The continued expansion came from onboarding contractors, additional employees and additional digital services for their residents. Next up, Identity proofing fraud prevention for COVID loans and unemployment benefits, which is a use case we've solved for several other state agencies already.

Add the SolarWinds crisis to that and you have the perfect storm for agency modernization. The second customer journey I'll share with you today is a global 2,000 tech company with a lifetime value spend of 17,000,000 They're a highly acquisitive company, focused on optimizing for M and A agility. They called on Okta to provide a single source of identity for all SaaS applications. They started with Okta in FY13 to secure its workforce. But through continuous M and A, they expanded on both workforce and customer identity.

They had 3 criteria: day 1 access, reducing IT burden and providing seamless experience for end users for both workforce applications and B2B portals. The modernization journey for this customer continues. We are constantly looking at new ways to enhance the digital experience for the customers. M and A agility is a highly repeatable use case for Okta. It's clear that everyone needs Okta, regardless of their size, age for industry.

Now that I've covered customer success and our land and expand motions, let me touch on international We currently operate in 60 countries. But of course, we've tiered our markets to guide our investments and our route to market choices. For example, U. K, France, Germany, Japan and ANZ are key international markets for us. We've made investments in employees, real estate, marketing and partnerships, a complete support infrastructure.

However, The demand outside of our top markets is indicative of the broad based horizontal opportunity that exists. We serve those other markets through partners. They are made up of regional resellers, distributors and integrators. We're also investing in global distribution partners. For example, we recently launched our global partnership with Amazon Marketplace to drive increased awareness and lead generation and accelerate the deal velocity from SMB to enterprise.

And while we're investing to expand our international market reach, We're also investing to ensure we can effectively serve our large global customers. As an elite AWS technology partner, Okta is now able to co sell with AWS's over 9,000 sales reps to the Global 2,000. AWS recognizes Okta as an identity leader with an expansive application integration network and our ability to quickly and securely Migrate on prem workloads to the cloud. Okta's product leadership position and our partnership enables AWS to differentiate themselves in the marketplace versus other public cloud service providers. In addition, We continue to invest in our growing global systems integrators network.

We recognize that they are at the center of digital transformations for so many of our customers. PwC, Deloitte and Accenture have all accelerated their Okta practices this year, all with high double digit growth. We're seeing these investments pay off at mutual customers, including those shown here. And we're still in the early days. Of course, none of what I've talked about is possible without a great team.

The key to my success my entire career has been hiring and developing exceptional talent. I'm excited to share that we recently hired 2 exceptional leaders who have deep experience in driving revenue and brand growth. I've been fortunate enough to work with both of these leaders in prior companies. Steve Roland, our new CRO, brings 20 plus years of experience joining us from Splunk. Steve is not only an exceptional sales leader, but he's a business leader who brings operational excellence with a deep commitment to customer success.

I'm confident he will help us accelerate our penetration into the growing identity market. Kendall Collins is our new CMO. He is a 2 time CMO from Salesforce and AppD, where he led the cloud computing rebrand, the transition to multi product and global expansion. With the acquisition of Auth0 pending, Kendall is well positioned to help Okta win the hearts and minds of developers and CXOs alike. In addition, both Steve and Kendall are experienced global leaders who will accelerate our growth in global markets.

I'm thrilled with the caliber of talent we're attracting and the strength of our existing Okta team. Okta is a destination company. With that, let's bring it back to my key priorities for this fiscal year. In closing, I'm very bullish on the opportunity that we have at Okta. The 3 megatrends I mentioned earlier, cloud and hybrid IT, digital transformation and security are definitely tailwinds.

And while we're all hopeful that the pandemic is nearing the end, the way in which companies work and how they serve their customers has changed forever. These megatrends will continue at an accelerated pace. I am excited about the team and the opportunity to lead another growth journey at a company as amazing as Okta. I look forward to working with so many of you once again and meeting those of you that haven't engaged within my past. Thank you again for your time today.

And now I'd like to pass it back to Freddie for another great customer conversation.

Speaker 16

Well, thank you very much, Paul, for being here. We're thrilled to have you. Obviously, Fox is a Fortune 500 news, sports, entertainment company. Tell us a little bit more about the company and about your role and how both of those changed over the past few years?

Speaker 13

Well, Freddie, firstly, thank you. It's always a pleasure chatting to you and the Okta team. But our relationship with Okta goes back a long way, but I think the kind of concurrent theme with working with Okta has been transformation and Media as an environment and being a technologist inside a media company throughout my career has been very, very focused on driving transformation initially in the enterprise, which is where the disruption occurred with cloud computing and the shift towards software as a service and cloud based platforms and we were very early adopters of Okta during that time. But more recently, obviously, very focused on direct to consumer and are really making sure that our digital services and our content reach consumers however they want to receive the service itself. So Streaming is a kind of key growth area for us and we've really started to evolve the relationship with Okta into that space as well.

Speaker 16

Yes, That's great. As you mentioned, Fox has been a long time customer of Octas. I still remember the breakfast that you and Todd and I had many, many years ago in San Francisco, and you kind of looked at us both in the eye and said, are you guys for real and is this thing serious? So You took a big gamble on us, and I'm glad that it paid off. Your first foray with Okta was obviously to help secure your workforce.

So employees, contractors, consultants, partners, how does Okta help support Fox's 0 Trust strategy?

Speaker 13

We know the initial relationship and the problem we were trying to solve when we had that breakfast ready was really reducing friction for the employees. So as we were deploying these Cloud based tools, authentication into those tools is complex, and you brought that solution to the market around single sign on and just reduced that friction. And it made the employee's life much, much easier and better, on a Monday morning when they came into work to log in. That evolved pretty quickly and I think We see you as a highly strategic partner now on the security aspect of our business. You're on the frontline of defense.

You see a lot of activity, not just through our own business, but through all the businesses that you support and you can give us a really kind of strong aspect of security and you've really kind of facilitated the 0 trust model that we've moved towards and moved away from that hard line perimeter on the edge into something that strengthened depth around all of the platforms. And I think without Okta, we just couldn't have done that and done it in a way where employee satisfaction and the friction of the employees kind of experience is minimal, which again you've got to balance those two things together. But we're very, very leaning on 0 Trust. We have been for a number of years and our security team have been working closely with Okta to evolve that and we'll be very, very pleased with the platform.

Speaker 16

That's great. And I know that most recently as Fox Corporation has spun off as an independent company, It also gave you an opportunity to rethink your infrastructure and how you reimagine building a company, frankly, without Active Directory at the core, right?

Speaker 13

Yes. Well, we did this big transaction with Disney 2 years ago, almost to the day actually, Freddie, we closed it. And A big decision that we had when we spun the current Fox company out of that transaction was to leave our legacy systems behind. We were fairly aggressive on that front. And part of what we left behind was AD alongside our financial systems, a lot of the old horrible sort of clients that have a legacy.

So I can sit here now today and we've completed the projects where we've stood up a lot of greenfield applications with cloud partners, and we are now truly 0 legacy and AD Getting rid of AD has been a big part of that. And we've managed to clean up the architecture for the enterprise through that. And again, just going back the security point, security has really been a central part of the consideration there and we're in a very strong place now, Freddie.

Speaker 16

Yes, that's great. So switching from the workforce side, you also recently purchased Okta for customer identity. So how is Okta supporting your customer identity needs? And why did you decide replace the homegrown solution that you previously had with Okta for the go forward strategy?

Speaker 13

Well, again, this is a conversation, Freddie, you and I and Todd have had for a while. I think there's been a big opportunity here. And the piecemeal solutions that have been out there on the consumer side are scalable, but they've not really been industrial grade. And Given that identity is your business, we feel again not just that we're buying a solution from you, but we're In a partnership with you, and there's a lot of road to run around features, functions and really the power of the platform on the consumer side, Taking what you've learned on the enterprise side and applying it, but also putting additional building blocks and things like the Auth0 transaction that you're the midst of at the moment are a big signal of intent to customers like us that you're serious about the consumer side. And we made the commitment a few months ago, as you know, Freddie, to work with you on that front and just to give you some highlights of the sorts of things we're looking at doing.

So if any of you have tried to log in on your kind of TV into streaming products. You know it's a painful process. We're working with Okta to kind of really make that a lot simpler whilst retaining security as part of that. And then across all of our Fox products having one single platform at the center of it, so our consumers can seamlessly move not just between products but between devices. And from an engineering point of view, this stuff is not That simple or easy, unlike the enterprise where you can control a lot of the variables.

The consumer landscape is a lot more mixed. So we're excited about the partnership. We're kind of at the beginning of it, but the a lot of the power of what we see on the enterprise side is already delivering value on the consumer side, Freddie.

Speaker 16

Yes, that's great. And we thank you very much for the partnership over the years. As you mentioned, certainly, You had a big impact and say on our product roadmap as we think about the customer's perspective and getting that feedback. I know that some of the things that is top of mind for you is not just security, but also performance, reliability, resiliency, throughput. You have these big bursting events that were top of mind as well.

So I'm glad that we are able to work with you on that. And as this audience has heard throughout the day, we believe obviously that Identity is becoming a primary cloud Identity facilitates choice and flexibility, which you just talked about, while also enhancing security, which is important for all of our customers. What does choice and flexibility really mean to you as you think about it at Fox, Paul?

Speaker 13

Well, I think the I mean, there's a couple of angles to that, Freddie. If you think about our employees really treating them as consumers of technology, best of breed is something that we've been very, very forward leaning on. So we've never really, as we've evolved into the cloud, thought about single vendor solutions across the piece. We've gone very, very deep with individual partners and brought those together. So a really simple example is we use Slack for collaboration, We use Office 365 for e mail.

We use Box for file management. We use Zoom for video conferencing and so on. And Okta is that umbrella that brings that together into a cohesive experience. And without Okta, frankly, that would have been a very piecemeal experience. So as a purchaser of technology, Okta allows that flexibility to really plug those solutions together and to give employees that kind of single starting point in a secure, but also a usable way to kind of do their work.

And identity is at the center of that and it carries into those apps and those products in a really coherent way. And I think, again, it's the tip of the iceberg around what you're doing on the identity side, but there's a huge amount of potential that we see, especially in the workplace with Okta at the center of that and security is one piece. But I really do think analytics, the whole kind of breadth of things that I think you're placed incredibly well to evolve into.

Speaker 16

Well, let's touch on that very quickly to wrap up our conversation here. We've talked a lot today about some of the value that we've been fortunate to help you with at Fox through the years, 1st on the workforce side, now most recently on the customer identity side. Well, let's talk also about the future, right, and how you're thinking about the future of Identity for Fox. You mentioned a couple of things there around security, around continuous improvement for the identity around frontline positioning in your ecosystem for employees, what are some of the other things that are top of mind and what are you looking forward to with Identity at Fox?

Speaker 13

So I'd love identity to be something that goes everywhere with you, but sits more in the background than in the foreground. So if you think about a lot of the payments and e commerce systems on the web at the moment, think about Affirm or Stripe or companies like that, They're able to take a lot of the friction around purchasing out of that purchasing process, but at a very, very high level of security in the background. And I truly think that the evolution of Okta, it can be much more of a kind of background process from an identity point of view where it goes everywhere with you without kind of interfering in the user experience. And for us, both on the consumer side and on the employee side, That's kind of a win win because if you take the friction out of that experience on the front, which Okta have done a great job around already, I think there's a lot of technology evolutions with how you use data, how you use predictive and a lot of your product team are already looking at this, but how you use predictive analytics on understanding whether someone has the right to access a product or an app as a background process and there's a huge amount of opportunity there whilst maintaining that kind of aspect of what you do.

Speaker 16

Yes. That's great. Well, Paul, thank you very much for the partnership over the years with Fox. Greatly appreciate it. Thank you very much for taking time out of your busy schedule to chat with us today.

I know that this has been very insightful for me and probably for a lot of the audience. So Thank you for taking time and it's great to see you as always.

Speaker 13

Thanks, Waddy. I appreciate the time.

Speaker 26

You know something? The energy transition is underway. Better yet,

Speaker 12

it's gaining momentum.

Speaker 26

And because energy is one of its main levers, ENGIE decided to take its full place in this energy transition, not just to be one player amongst others, but to become a world leader. So to accompany this revolution and to respond better to our customers' demands, Today and more than ever, ENGIE is committed to an ambitious and solid strategy that resonates with the aspirations of society

Speaker 16

Claude, it is great to see you. Thanks a lot for being here today. How are you?

Speaker 27

I'm fine. I'm fine. Great to see you as well.

Speaker 16

Great. I can't wait to come and see you in person sometime soon, this year as promised. So I'm very excited, everyone, to be joined here by Claude Piel, the Deputy CIO of ENGIE. ENGIE is a Global 500 Energy and Services company. Have over 170,000 employees around the world.

So Koen, perhaps you can just start by telling us a little bit about the company and about your role there.

Speaker 27

Yes, you're right. ENGIE is a world energy player and the world leader in the energy transition. So ENGIE is a big group, more than 170,000 employees, as you mentioned. We operate 24 business units in 70 countries. ENGIE is focusing its strategy on renewables, Networks and Customer Solutions.

I've been the CIO Deputy CIO at ENGIE for over 5 years. In my role, I'm responsible for what we call the digital foundations, and I'm responsible for cybersecurity as well.

Speaker 16

That's great. So as the Deputy CIO of Angie, you've seen tremendous growth In the past few years across all the different business units, with so many users across the globe, what is your approach to technology And that digital foundation, as you talked about, how do you think about that? And what does that mean at ENGIE?

Speaker 27

What does that mean? Over the past few years, we have been very focused on leveraging technology to transform the group, which a very large group with the longest story, introducing new ways of working based on digital tools. We have been moving from a siloed organization with a very fragmented IT landscape to a global distributed organization sharing common tools. To achieve this and to achieve this transformation at scale, We have chosen to build brand new digital foundations on top of the legacy systems and to make the new common tools available to the whole group through this digital foundation. And as we further develop the common tools, The legacy ones locally got redundant and then decommissioned.

So the key component in this transformation is our digital foundations. It's key for addressing our needs and it's key also for the future. They have been built on the cloud, on the cloud only. It's a cloud only solution. And it combines various transversal services, serving the whole group in all geographies, as we say, from Santiago to Shanghai.

And it delivers network services, security services and of course, identity and access services, which enable any users from any business units, whatever the location is, whatever the underlying technology is to access the common tools from anywhere with any device with a consistent and secure user experience. This is the way we approach the transformation of the group choose a technology.

Speaker 16

That's fantastic. I love it. So that's almost like a perfect Okta customer proposition. So it works out great. So you've been a customer for almost 5 years now.

I was thinking back to the first times that I got to come to Paris and meet you and spend time with you and your team. What initial challenges were you looking for when you thought about an identity solution, right? You didn't go out and you said, well, we're just looking to find identity. You had specific ideas of what kind of solution and how you're going to do that, I remember that very well. And what were some of the key criteria that went into your decision when you decided to partner with Okta beyond just being able to work with me, of course, what were some of the other key decisions that you had there?

Speaker 27

Yes. It was 5 years ago, we started our journey, and we started our journey with Office 365, our key challenge was to deliver to our 24 business units a consistent and reliable global solution, Office 365 being the most emblematic, of course. We had at that time a double challenge, I would say, because on one hand, the IT landscape was very fragmented, very diverse and we have no control over it. And on the other hand, the leadership team gave us 6 months to deploy a global collaboration platform across all the geographies. So we had to make sure that the solution would be accessible by our users from any site, whatever the local infrastructure is, Microsoft based or not connected to the corporate network or not, it has to work.

And this relates directly to the other challenge that we had about identity and access management, how to make this system accessible from any users in a secure way with a great user experience and make it accessible to any employee, whatever business unit you work for. And of course, as we are global, around the globe, it has to be reliable 24 hours a day, 7 days a week. It has to be always on and it has to be secure, of course. So this is these are the challenges we were facing at that time, and this is why we looked at an identity and access management tool. And we looked at Okta.

And there are I would say that Okta met some key success factors that we were looking at, at that time.

Speaker 10

The first one

Speaker 27

was to be a neutral or independent platform, which means able to connect to any technology and to be a kind of agnostic platform as our landscape was very diverse. The second important point was the customer centricity of the team because we had some challenges to integrate various environment. And we needed to hope that to develop some additional features. And the Okta team and the Okta management team, You, Frederic and the support team were very efficient in delivering those functionalities on due time to allow us to go live at the planned date. And the last important key element that we are looking at was The ability of the system to work 24 hours a day, 7 days a week, to be always on, as mentioned, as we needed to we started with Office 365, but we had to deploy the solution across the whole application portfolio.

And here we are talking about 600 plus application with some critical business apps. So this is why we found with Okta, I would say, the key partner to help us in this journey.

Speaker 16

Yes, that's great. I remember it like it was yesterday. 5 years have gone very quickly. I'm glad that we got Started that way and I'm glad that the partnership has gone so well over the years. You began the journey, obviously, as you just mentioned, with Okta for ENGIE's workforce.

So really thinking about those 160,000 now 170,000 users, I think we tried to deploy 600 applications to get going, which went very well. And then now you're starting to expand from the employee side over to the customer identity for both partners and suppliers. So that was kind of the second step. And actually just recently, you're starting to implement Okta for consumer facing applications. Can you describe a little bit what led you to expand your use of Okta?

Obviously, you had a certain amount of success and the level of and support in the product and the platform and the company, but you started with your employee set, you went to suppliers and partners and now you're obviously going to the customer facing piece. What value have you seen from using a unified platform to address all of these multiple use cases?

Speaker 27

Yes, we are engaging with the next step with Okta. And as you mentioned, we are now Starting to expand the use of Okta to our B2C market and starting with the French market, where we are leaders there. And just to give you an idea on the magnitude of the project, We serve in France 11,000,000 of customers in the B2C market. And we are dealing with different type of customers, of course, there are different segments, different type of services. And each has The different digital experience today, so one of our key driver to expand Okta, The first one was to unify the customer experience across all the customer portals, all the customer apps in an efficient and secure way.

But it was key for the business in order to improve the customer experience. But the other challenge that we are facing was related to security. So We currently have different in house identity management systems. And this leads to Security challenge, of course, as you can imagine. So we needed really to improve the security In a world where the sweats are bigger and bigger and in the 0.1st world, we really need to rely on a solid platform for identity and access management.

So after having success with Okta for the B2B for us, It was very logical to go to Okta for B2C and it was a consistent improvement. And so this was a very easy decision to make. It was just extending Okta as we are Very happy with what Okta has been delivered over time. And as mentioned before, We have really realized that Okta is always on. It's a no brainer, I would say.

So the decision was very easy to make, And we are sure that it will bring us lots of value for the customer experience and for the security.

Speaker 16

That is great. I'm very glad to hear the success that we're continuing to have together. We're obviously very proud of our partnership with ENGIE. I thank you and the entire team for all the work that we've done over the years together. It's really been a pleasure.

And I'm always to hear about the different ways that we continue to be able to add value for your organization. To wrap up the conversation, I mean, we've already talked here about The B2E part, the employees, the B2B part with your partners, the B2C part with end customers, but there's even more in the future. How are you thinking about the future of identity at ENGIE. You've obviously taken such big steps over the last 5 years, but I know that's not the end for you. There's a lot more beyond that.

Speaker 27

Yes. We'll make sure that the B2C project will be a success and I'm quite about it and it should be lying on the end of this year. But this is not the last step because we are in, I would say in an open world, where interaction are key. We have to interact with our employees, with our customers, with our partners. And in this digital world, we also have to interact more and more with things, with meters, with sensors.

So we are considering to expand the identity and access management to all the other things we have to interact with. And this could be the next step for us, Machine to machine or Internet of Things, this is the next moves that we are considering at ENGIE.

Speaker 16

That's awesome. The next frontier, I love it. Well, look, Claude, thank you very much for taking time out of your busy schedule to chat with us. We greatly appreciate it. And thank you also for sharing some of the ENGIE story, which is always great to hear.

We're grateful for the partnership over the years, and we look forward to many more great years working with ENGIE and Okta.

Speaker 27

Thank you, Freddie. My pleasure.

Speaker 16

Thank you, Fadi,

Speaker 28

for that terrific conversation with ENGIE. And hello, everyone. It's great to be here with you today. It's been about a month since I officially started as the CFO at Okta, and I'm more than ever about the growth opportunity in front of us. Before I get into business content, I thought it would be helpful to highlight some of the reasons why I'm so excited about joining Okta as CFO, which I'm sure aligns closely with why you're excited about the company as well.

First, as you heard from Todd and our other executives today, Identity is becoming a primary cloud. Okta is a customer first, cloud first platform that is helping customers, large and small, with their workforce identity demands. And with this strong foundation, Okta is recognized as a global leader in the space. 2nd, with this backdrop, Okta has the opportunity to grow into a multibillion dollar revenue company over the next few years. In fact, I like joining Okta now to joining Google in 2003 or Salesforce in 2010.

With the pervasive need for identity and Okta's unparalleled solution and growing customer footprint, we believe there are significant tailwinds in the business as well as numerous growth vectors. 3rd, the team is exceptional. I've had a unique view of the business as Okta's audit chair over the past 5 years, And I've now had the pleasure of working much more closely with Todd, Freddie and the entire management team at an operational level. I'm continually impressed with not only their operational acumen, but also Okta's culture of authenticity, transparency and the winning DNA that's at the core of this company. I'm delighted to be joining at such an exciting time for Okta and look forward to presenting at many more Investor Days to come.

Now let's get into the core content. In my presentation today, I'll be highlighting 3 key points. First, Okta has built a strong foundation for growth and at scale. We've demonstrated we can execute for our customers and other stakeholders across all the key facets of the And we're building on this foundation as we go from approximately $1,000,000,000 revenue company this year to a multi $1,000,000,000 revenue company over the next few years. Secondly, the markets in which we participate are huge.

We have multiple growth vectors as we broaden and deepen our solutions in the identity market. Thirdly, while we have a massive addressable market in front of us, we are focused on ensuring that our investments have a great financial return. As I'll elaborate upon later, the financial profile for our business is very attractive. I'll start by discussing the strong foundation we've built. Here are just a few of the company's important financial accomplishments.

1, revenue grew 43% last year, reflecting the robust demand for our products and Okta's continued solid execution. 2, RPO growth is very strong with total RPO growing 49% as we exited FY 2021. 3, our dollar based net retention was 121 last quarter and has been above our historical range of 115% to 120% for the past 4 quarters. 4, our non GAAP gross margin was 78%, increasing over 100 basis points year over year. 5, our free cash flow margin was just over 13%, up over 700 basis points versus last year.

And while our spend was lower in FY 2021 due to the pandemic, this demonstrates how much operating leverage is in our model. And finally, 6th, we ended FY 'twenty one with over 10,000 customers with record customer growth of 600 in the 4th quarter and an increase of over 2,000 customers for the year. This is a great start and provides a strong foundation, but it's just the beginning. Before I dive into more detail regarding our business, I'd like to highlight one key metric that may be relatively new to some investors. I know most of you are experts on RPO.

But for those of you who are newer to SaaS or cloud subscription software models, I'll briefly discuss RPO and why we think it's the more meaningful metric for us when viewed alongside revenue and billings. RPO provides the most complete picture of backlog as it includes all contracted non cancelable customer subscription dollars, both billed and unbilled. Current RPO, the portion of RPO that will be recognized as revenue in the next 12 months is also important. Current RPO removes the effects of billings duration and timing variances and also removes the effect of contract duration. Lastly, while there are many positive attributes of RPO, it can be impacted by the timing of renewals.

For example, even when we know that a renewal is coming, If it hasn't been contracted signed, it won't yet show up in RPO. Nevertheless, overall RPO and current RPO provide a more predictable and consistent view of our business. And as we noted in our last earnings call, we believe that on an organic basis, Excluding Op 0, current RPO growth, a key leading indicator, will outpace subscription growth throughout fiscal year 2022. Speaking of guidance, as you have seen in our press release this morning, we reiterated our Q1 and full year FY 'twenty two guidance. As a reminder, these numbers are organic and do not include anything from the acquisition of Auth0.

We'll provide you more detail regarding the combined company's outlook in our first earnings call after the transaction closes. With that, let me discuss the second reason why I'm so excited about Okta, the large addressable markets and the multiple growth vectors that we have within them. As you heard earlier from Todd, Freddie, Dia and Susan, identity is becoming a primary cloud, driven by the 3 macro trends that have been and will continue to drive our business going forward, continued cloud adoption and hybrid IT, digital transformation and 0 trust security. These factors have only been accelerated by the pandemic and are driving Okta's massive TAM opportunity. Over the past year, we believe there's been a meaningful increase in our TAM.

The workforce identity market was $30,000,000,000 last year. However, increased use cases within enterprise customers have expanded our reach to a broader segment within our target companies, resulting in our TAM increasing to $35,000,000,000 In addition, you heard the exciting news that we're expanding into IGA and PAM, which adds another $15,000,000,000 for a total workforce TAM of $50,000,000,000 Looking at customer identity, we previously estimated this market at $25,000,000,000 However, due to increased utilization driven by our customers' digital transformations, we estimate that the market opportunity is now $30,000,000,000 Of course, we're also excited about the prospect of accelerating our penetration into this market with a complementary platform of Auth0, I'll get into that a little bit later. All in, we're looking at a massive $80,000,000,000 market opportunity and we're just scratching the surface. We have 4 key growth vectors that we believe will enable us to capture this large market opportunity: innovation in our platform and network, our land and expand model, international expansion and our growing partner channel. 1st, let's take a look at innovation in our platform and the network effects that it creates as customers leverage the benefits of the Okta Identity Cloud, which spans across both workforce and customer identity.

One example that highlights the value of our platform is Okta's Threat Insights. This feature aggregates data across Okta's customer base and uses this data to detect malicious IP addresses that attempt credential based attacks. With more integrations, more customers and more users, we're able to capture more signals and detect more malicious provide greater protection for the benefit of all of our customers. Over time, this growing customer base helps Okta become the identity standard that connects all the different pieces of applications and technology together. This platform and network one of the main drivers of the other three vectors of growth for Okta.

We've been successful with the second vector of landing and expanding with our customers, is reflected in our dollar based net retention rate. I mentioned earlier that the net retention rate was above our historical range of to 120% for the past 4 quarters. This strong rate is grounded in high gross retention, coupled with strong up and expansion across our products and markets. We're very proud of this result, especially when taking the pandemic into account. With our new products and offerings, we believe we will continue to execute well on our land and expand opportunity.

Our base of large customers continues to grow rapidly as well. This is a result of both our focus on landing new large enterprise customers where the initial lands are getting bigger and our successful expansion strategy. We now have almost 2,000 customers with an ACV of greater than $100,000 Notably, both our $500,000 $1,000,000 ACV customer cohorts over 50% last year. We've made great progress with large enterprise customers and at the end of Q4, 25% of the Global 2,000 were Okta customers, up from about 20% last year. Looking forward, we clearly have the opportunity further penetrate this customer category and also expand in the 25% of the Global 2,000 where we're already present.

And as Susan highlighted earlier, with an average annual contract value for Okta's Global 2,000 customers At approximately 6x our company average, further penetration of this customer category represents another significant growth opportunity for us. Susan gave you a deep dive into a couple of real customer land and expand examples. To further illustrate this point, I think it would be helpful to give another example of how our land and expand motion works. Many of you recall this slide from prior investor days as it's a useful illustration of how successful Okta's land and expand motion is. This chart shows our top 25 customers in order of their initial purchase date.

They span a wide range of industries from biotech and healthcare to financial services and manufacturing. The gray box shows when the initial customer purchase was made. The multiple purple boxes indicate when there was an incremental increase in ACV from the prior quarter. As you can see, there are many purple boxes. Lastly, the green box indicates the quarter in which the customer exceeded $1,000,000 of annual contract value.

The customers that we landed back in FY 2014 and FY 2015 took 12 to 13 quarters to reach the $1,000,000 milestone. Notice that more recently, we are consistently landing customers with an ACV of greater than $1,000,000 from the very beginning. And even after we hit these $1,000,000 milestones, we still have significant upsell opportunities with these customers. International is the 3rd growth vector. With 16% of our revenue coming from international locations, this represents a significant growth opportunity for us and the reason it's a key focus area.

Here's a perfect example of how big the opportunity is. I mentioned earlier that we count about 25% of the Global 2000s customers. Of those roughly 500 customers, 61% of them are located in the Americas, while only 35% of all companies in the Global 2,000 are located in the Americas. Conversely, just under 20% of our Global 2,000 customer base is in the Asia Pacific region, while 40% of the Global 2,000 are there. In key markets such as the UK, France, Germany, Japan and Australia, New Zealand, We will continue to invest in expanding our direct go to market motion.

In other regions, we'll partner with resellers, distributors and integrators to expand our reach. As we invest more in these international regions, we expect our extended global reach to be yet another growth tailwind. Our partner ecosystem is our 4th growth vector. Today, we operate in 60 countries with partners including regional resellers, distributors and integrators supporting our international strategy outside of our key markets. We're investing in partnerships to ensure we're able to effectively serve our large and expanding global customer base.

As Susan mentioned earlier, we're an elite AWS partner and are able to co sell with AWS's over 9,000 sales reps. We also continue to invest in our growing global systems integrator network. These GSIs were at the center of digital transformation for many of our customers. PWC, Deloitte and Accenture accelerated their Okta practices last year, and we believe we are still in the early days of these relationships. Now let me talk a little about Auth0.

There are many reasons why we are so excited about the pending acquisition. I'd like to highlight just a few of the compelling and significant synergy opportunities. First, the acquisition accelerates our penetration of the large, mostly greenfield $30,000,000,000 SIEM market. Combined Okta and Auth0 will be able to offer customers greater value. For example, The combination of security data will enable our products to provide more in-depth signals, enhancing the value of threat insights.

Additionally, together, we will be able to cover the spectrum of buyer personas from the thriving developer community to the C suite. 2nd, Okta and Auth0 have complementary products. Auth0's developer focus results in the diverse toolkit that customers use to build apps the way they want with a high level of customization. This complements Okta's enterprise focused products, which are geared more towards CIOs and CISOs whose requirements include scale, easily accessible support and certifications such as HIPAA and FedRAMP. 3rd, Adziro has established a strong international presence and generates approximately 40% of their business outside the U.

S. Together, we can leverage each other's strengths in international distribution to further expand our reach. 4th is the tremendous cross selling opportunity. The vast majority of Auth0's business is focused on customer identity, so there's a large opportunity to sell our workforce products into their customer base. And 5th, Ociril can be introduced into Okta's robust channel network, enabling even further reach and momentum with customers worldwide.

All this synergy is additive to Okta's strong organic motion, and we look forward to sharing more about the combined company's financial outlook following the close of the acquisition. Looking to our financial profile, the future has never been brighter for Okta. While we can't provide a combined company financial model until after the transaction closes, I want to give you more insight into how we think about our long term financial profile, which is built upon 3 pillars: 1, high growth in a recurring subscription business 2, profitable customer economics and 3, disciplined capital allocation. I've already discussed Okta's high growth subscription business. I'll now provide more insight into our customer economics.

We have attractive customer economics and margins in our land and expand model. Looking at the contribution margin for the cohort of customers that became new customers in FY 2018, the initial land has a lower contribution margin due to the investments we make to acquire these customers. However, that contribution margin significantly improves in year 2 and beyond. One reason for the improvement is our high level of customer retention. Another reason is that there are multiple opportunities for us to expand and grow our relationships with whether it's new products or expanding usage within an organization, which you heard about in detail today.

This is reflected in our strong dollar based net retention rate. That is an attractive and fast ROI business model and why we believe investing to acquire new customers generates a significant long term highly profitable benefit. Looking at our capital allocation priorities, our goal is to invest in the business while maintaining a strong balance sheet. At fiscal year end, we had just under $2,600,000,000 of cash and equivalents. Our investment methodology remains consistent with prior years.

We'll continue to make investments both organically and inorganically that will extend our platform and product leadership. We'll also invest in key customer facing roles and innovation to support what we believe can become a multibillion dollar business. I'd like to now give you some additional detail on where we plan to invest in FY 2022 and beyond as we scale the business to become the next iconic cloud company. As we mentioned during our earnings call last month, FY 'twenty two is an investment year. The customer demand for our products is strong and we have focused investments across a few key areas to capture this large market opportunity.

The first investment area is go to market. In addition to expanding our quota carrying sales capacity, we are adding to our strong customer success teams to ensure we maintain our excellent retention rates. This includes expanding our sales engineering teams to assist in the further adoption of Okta's solution within large enterprise customers. 2nd is international expansion. We'll be expanding our global footprint, which includes growing our sales and customer success teams globally as well as supporting infrastructure in many of our current and new international offices.

The 3rd area is innovation. We will continue to invest in product and engineering talent as well as build out our cloud infrastructure to support the strong growth that we are seeing and anticipate. And the 4th investment area is growth at scale. This includes back office and finance solutions that deliver increased efficiency in support of our strong growth over the coming quarters years. In fact, all of the investments we're making are to further enable our ability to capture the fast demand for Okta's workforce and customer identity platform.

Now let's talk about long term growth against the backdrop of our large market opportunity. As you've heard throughout today's presentations, we are building Okta for long term durable growth. The new PAM and IGA offerings that we announced earlier today increased our opportunity even further and continue to build on our leadership position in the cloud identity market. We have a well defined vision, market leading products and a pipeline of innovations to further fuel future growth. We also have a world class go to market team that we're expanding both domestically and internationally.

All of this is aimed at the $80,000,000,000 TAM that we are just beginning to penetrate. This is a tremendous market opportunity for us to execute against And we're confident that on an organic basis, we can achieve our current target of a 30% to 35% revenue CAGR for FY 2020 to FY 2024. On top of Okta's strong organic growth, the addition of Auth0 will accelerate our growth to greater than 35%. Again, we'll share a more detailed financial view of the combined company on the first earnings call after the transaction closes. The modern identity market is still in its early stages.

As the industry leader, Okta is well positioned to build on our leadership position through innovation, Customer success and our expanding global reach. Part of building the company for long term durable growth is ensuring that we are an exemplary corporate citizen. To this point, we are committed to continuing our progress on the environmental, social and governance front. Last year, we formally launched our ESG program and centralized information and disclosures on our new ESG webpage. We also conducted our 1st greenhouse gas emissions inventory to benchmark where we mark where we stand today and where we want to be in the future.

Lastly, we released our first diversity and inclusion report as we aim to provide transparency in this key area. And we just announced that Okta is committed to achieving 100% renewable electricity our global real estate footprint by 2022. This is a critical step in our journey to reduce greenhouse gas emissions and take a long term action on climate change. We'll continue to share our progress on ESG topics as we go forward as this is a key priority for the company. As you've heard throughout the presentations today, we believe identity is becoming a primary cloud and Okta has built a strong foundation as the leader in identity.

We'll finish this year with over $1,000,000,000 in revenue and we believe we are still in the very early stages of this market. I'll conclude by reiterating the 3 key takeaways from today. We've established a strong foundation for growth at scale. We have large addressable markets with multiple growth vectors and we have a very attractive long term financial profile. With that, thank you for joining Okta's Investor Day.

I'll now turn it back over to Dave, who will open things up for Q and A. Dave?

Speaker 23

Hey, great. Well, welcome everybody to the Q and A portion of Investor Day. I hope you all had a chance to tune into the Oktine content this morning where we shared A lot of exciting news. So for this session, we have all the executives that you just heard from. And before we start taking questions, I want to cover a couple of ground rules to help with the Q and A process.

And the first one is to make sure you rename yourself in the Zoom tool with your name and your firm name. And to do that, you simply click on the participants button at the bottom of the screen, hover over your name, click on more and then select rename. And you'll have to unmute yourself at that time. And in the interest of time, please limit yourself to one question and one follow-up question. And with that, we'll get underway and start taking questions.

So first up, I see a tie from Tay Kedron from BofA. We just had to get him moved over to Will, can you promote a tie to a panelist?

Speaker 29

All right. Can you hear me now?

Speaker 1

Loud and clear. Sounds great.

Speaker 29

All right. Very good. Guys, thank you very much for today. It was fantastic. A lot of great information.

I had a and of course, congratulations on the announcements, very exciting. And I had a question with regards to the two announcements of PAM and IGA. Will it be fair to think that your first opportunity of upselling into those categories would come from existing advanced server access customers and lifecycle management customers. And maybe you can tell us, I know you have 10,000 customers, but maybe you can tell us how many Of those specific product customers do you have, so we can think about the immediate opportunity there?

Speaker 1

We're really excited about PAM and IGA. As you heard in the presentations, it's a $15,000,000,000 TAM added to our TAM from these products. And the genesis of these products, 1st of all, comes from customers. Customers have been asking about these categories for many years. And as you mentioned, we have a nice foothold and a nice start in each of these categories with our advanced server access product as a foothold and a step into the PAM market and then our advanced lifecycle management product with our step into the in the past our step into the IGA product.

But these are new products, so they really round out these critical use cases for customers. On the PAM side, it's all about additional types of resources, so containers and databases and the advanced security checks you need on those kind of critical resources. On the IGA side, it's about full workflows around attestation reporting and broad comprehensive reports on governance. And then the other thing that's important here is that we're fitting into the way these customers want to work in a modern world, whether that's a highly dynamic cloud based infrastructure or that's a lightweight governance process that doesn't like slow down or bog down the pace of business. So These are customer driven.

We found in the past, all of our best innovations, whether it was customer identity or others have been when they've come from things that were broadly requested from customers. So it's big news. It's really going to help customers and we're excited to get after it and have success with customers with these products.

Speaker 29

Very good. Tom, maybe you can talk about what percentage you think of an installed base could these solutions apply to? You need a certain maturity from a security and identity standpoint, you probably need to be a company of a certain size as well. So how do you think about the applicability of these solutions to your existing installed base, which is ranges from small to large?

Speaker 1

I think they're applicable to every customer. I mean, every customer has Privileged accounts, every customer needs some type of identity governance. I would say privileged access probably tends to be more applicable to smaller customers, but not exclusively. I mean, every company wants to make sure their governance requirements are met and that they can do it in a flexible, easy way.

Speaker 29

Got it. Very good. Congrats, guys. Good luck.

Speaker 16

And Ittai, I would just add to that. One thing that I think is very interesting here is this is another very good example how modern cloud solutions can actually expand applicability. I think if you look at traditional identity governance and attestation, It's been very heavyweight, very on premise, a lot of services, very tricky to maintain and upgrade a long time. I think what you're going to actually going to see with modern IGA products, starting with ours, is you're going to see the applicability. It's going to go much further downstream.

You're going to have mid market companies, even small companies are going to get a lot of benefit just from understanding what happened, the governance and the attestation parts. And so I think it's actually going to expand the market for our modern cloud solution.

Speaker 23

Okay. Next up, we'll go to Michael Turits at KeyBanc.

Speaker 10

Hey, guys. So two questions, one for Mike, one for Todd. First, for Mike, just a clarification, the 35% With Auth0, is that 35% now that's the CAGR or is that the out year? And around that, there was a news article talking about over 30% growth in each of the next 3 years. So I just want a clarification on these long term guides.

Speaker 28

You bet. That's a great question. Thanks for asking it. Yes, so we will grow 30% plus for the next few years. Organically.

Organically. And our range organically is 30% to 35% on the CAGR for 20% to 24%. But yes, we are stating that we will grow 30% plus each year, that's organically. With Auth0, we're saying that we'll be growing over 35%, that's greater than 35% with 0. And that would be you're going to hear a lot about all that once we have closed the deal and we do our first guide with 0.

Speaker 16

So that's a lot

Speaker 29

of 5% is in each of

Speaker 10

the next 3 years, you're saying?

Speaker 28

We haven't given that level of guidance yet. That's a great question. It's not a bad inference. So I'll just leave it at that for today, if you don't mind.

Speaker 10

Thanks, Mike. And then Hey, Todd. I do

Speaker 1

think it's important to be clear though, 30% to 35 range organically is each of the next 3 years. The inorganic part is the stuff we're going to get to later.

Speaker 3

Okay. That's correct.

Speaker 28

Which is greater than 35%. That's right.

Speaker 10

Thank you. And then Todd for you, just I mean, the 2 platforms, what I think you said that you would be Maintaining both of them and investing both of them indefinitely. So why? Is it something you should be bringing together? Is it efficient economically?

Does it make sense for customers? Why are you keeping 2 separate platforms?

Speaker 1

Well, first thing I can understand about these companies and these platforms is they're complementary. There's some overlap, but Starting from developers like Auth0 has and building from the CIO, the CSO down, results in some things that look similar, But the details and the differences on the surface are significant. So it's not like there's redundant functionality across the board. There's some redundancy, but By and large, they're distinct complementary platforms. So and by the way, they're both at scale.

Auth0, the Okta SIAM business is about a quarter of our revenue growing very quickly. And on the Auth0 side, at the end of this year, it's going to be 200,000,000 plus in ARR. So they're both at scale, both having tremendous customer success,

Speaker 2

but

Speaker 1

that doesn't mean we won't integrate them. We're very excited about the capabilities and the potential to integrate these two platforms and get synergy. One great example is that's really easy to grok for customers and for both companies is combining our threat data with their threat data. We call it threat insights. Auth0 has a similar capability.

We can combine those quickly and get better experiences for all customers across both platforms by doing that integration and the examples like of this type of integration go on and on. So we really get the best of both worlds with complementary platforms and combinations of integrations that can really take us a long way. And Eugenio is joining us here today and he can give his perspective on this as well.

Speaker 2

Yes. To what Todd said, The beauty of software as a service, as you know, is that the implementation details are up to us. If the customer consumes an experience, So how we solve the problem is really our problem and that's what we're going to be focused on. There's many, many possibilities of integration, the threat intelligence and being able to combine signals from both platforms gives us a better chance to protect our customers' customers, our customers' employees as well. But there's few others that come to mind, which are obvious, which actually in some cases we delivered today, because we already have customers that are using both platforms.

It is completely possible today to logging into an Auth0 protected application using an Okta originated identity and that's something completely supported. Now can we make it easier? Of course, we can make it really, really easy and that's what we would like to focus on.

Speaker 10

Thanks, guys.

Speaker 23

Next up, we're going to Rob Owens at Piper.

Speaker 30

Thanks, Dave, and good afternoon, everybody. Todd, I think throughout your history, we've talked a lot about the appropriate time to pivot And when we might start to see some of these swim lanes blur. And obviously you're

Speaker 31

going to start splashing water in the

Speaker 30

pool at this point just to continue the analogy. So Why here, why now? Is there something in the market? Are you at a scale where you think it should happen? I mean, if we look at your customer account, it's been impressive, but it's still only at 10,000.

There's a long ways to go. So why would you add that risk at this point in time?

Speaker 1

Well, I think that the main reason is that the platform is ready to support it. We've been working really hard on our platform. These basic capabilities that give us a great launching point in these 2 new categories of IGA and PAM. So that's a big important reason. The second reason I would say is customer demand.

These trends we've been talking about, cloud adoption, the customer experience moving online, every customer, every company having to get in touch with their customers online and identity being such part of that insecurity. These are really washing over every organization in the world. And along with that comes not only the core requirements we've met, Identity Access Management, customer identity, but also these governance requirements in these most and even more pointedly, I would say, in terms of like everyone trying to be a digital business are these privileged access requirements. So every company is trying to get online. That means critical resources servers and databases and containers and the time is right to make it clear to the market that there's a better way to do this.

There's a better way to do this privileged account than some of the privileged access managements for these privileged accounts than some of these legacy technologies and We're here to support them to do that. So I think those two reasons, Rob, which is a pretty insightful question you asked.

Speaker 30

Great. And then second Freddie as you think about the partner network and I think you guys were early to go after the GSIs and be very strategic and look at identity as a strategic area. Although it's still early, products aren't coming out until the 1st part of next year, what's been the early response from that partner network?

Speaker 16

Yes, absolutely. Good question. Nice to see you, Rob. Thank you for the question. I will certainly answer that.

I just want to add a little bit to the Previous answer that Todd gave around why now is the time. I would just say it's also not a step function. It's not like we're going from 0 to 1 and now introducing these products. If you think about advanced server access, it's been out for a couple of years. It's done very, very well in the market.

So Okta Privileged Access is going to integrate advanced server access and there's going to be more for customers to buy. So it's a natural transition where we're going. Same is true for Ajay. If you think about what governance and attestation actually is, It's lifecycle management, so provisioning, deprovisioning, change of role, change of profile. It's entitlement management.

It's a workflow engine and it's reporting. As you know, we GA ed workflows last year. That product did extremely well in hundreds of enterprise customers now, well deployed. So you add in all the life cycle management stuff we're doing, you add that in, you can see how when you add just a reporting layer or fine grained entitlement on top of that, you're naturally getting into an IGA product. And so what I would just add to what Todd said is that second piece, customers have been asking us for it.

I mean, they are saying, look, IGA, first of all, in a cloud world, You could argue that every access is privileged access just because of what you can do now. But in particular, on IGA, they're saying, look, IGA is second order data. It's derivative data of identity information and access information. If I have all my access information in the public cloud already, why am I going to take all the reporting off that, bring it back on prem to do heavy duty reporting and then hand it over to my auditors, it doesn't make sense. And as you know, because we've been talking for years now, we are in the very early stages of these megatrends.

I mean, the switch to hybrid IT, which is going to become cloud, it's going to happen for 5, 10, 20 years. And as it starts to move more and more, you're going more of that data in the cloud, so it's a natural place to do these things. Then finally, when it comes to the GSIs, as you said, we have invested early. We've seen a lot better traction earlier on in our life cycle than we did at Salesforce at the same time, and I know because I was there. But what I would say again is we're just getting started.

But you look at what PAM and IJ are, now we're starting to really broaden out what can be done with the platform and integration. That means bigger deployments At bigger customers, that means more opportunity for GSIs. And if you look, we are continuing to invest in our professional services organizations as expert services, But that percentage of revenue from PS as overall is going down slightly because we're really pushing a lot of services out. Now there's 100 certified consultants from Accenture, from Deloitte, from PwC and the list goes on, and they are experts in all of this. So it's going to be a big opportunity for us and in particular, international.

You heard Susan mentioned in her prepared remarks just a little bit ago, the focus on international, I mean, there's no better way to get into these large organizations around the world than with these partners, so.

Speaker 30

Great. Thanks for the color, guys. Yes.

Speaker 23

All right. Next question from Hamzah Fodderwala at Morgan Stanley.

Speaker 32

Hey guys, good afternoon. Thank you so much for taking my question. Maybe first question for Todd and Freddie. Just when you think about You guys breaking into Privileged Access Management versus Identity Governance. Where do you see the more Immediate opportunity as in where do you think would be more easier to break into?

And then, the second part is, What does this mean for your partnership with SailPoint on the governance side?

Speaker 1

I think they're both very interesting and exciting. You just look at the kind of the first step in each of these respective markets, we've talked about the advanced lifecycle management and then the Advanced Server Access. Advanced Livestock Management has more of it's been around longer and it's or the lifecycle management has been around longer. So it's more of a foothold, more customers than Advanced OR Access. So I think that's probably a good indication of maybe the short term uptake.

But we're very excited about both. And one of these the thing about both these products is that the market is dynamic and evolving quickly. So we're excited to see how it plays out in the markets with customers having success with them. I think one of the things about partnerships in general is that It's in our DNA. We have we innovated and we brought to market 10 years ago this concept of this integration network.

And Companies like CellPoint are in there and we'll continue to partner with them. CellPoint is a good company. They have a lot of successful customers. So I think we'll continue to partner with them. But we think we can do this in a modern way that's going to be the exact right of balance, the balance between every bell and whistle and every feature and function than traditional vendors have taken to the space and meeting the minimum requirements in a modern cloud way.

We think we can do a great job. It's integrated to our platform and we do this with other companies too. There's multifactor solutions that are we partner with, but we have our own multifactor solution. So there's precedent for us to be successful in this model.

Speaker 4

Yes, that makes sense. And I'll jump in As well, I agree with that. I don't think we have to choose. We're in both we have advanced server access, we have lifecycle management, we have a ton of customers on them. We've got workflows that honestly, if you think about it, goes across both products.

You need access requests in both products. You need access certification in both products. And workflows will be powering this. So really, I don't think there is a we have to choose our demand is very, very high with there are a bunch of customers that we have that are using advanced server access that would love the capabilities on databases and Kubernetes clusters that already have been working with us in designing that and the features and Same on lifecycle management. So given the state our platform is in, These are not super hard to light up and the demand from the customers is there.

Speaker 29

Thank you.

Speaker 23

Next question from Matthew Perron at JPMorgan.

Speaker 33

Hey, guys. It's Matt on for Sterling. Thanks for taking the questions. I believe when you guys originally launched the Advanced Server Access solution, that was primarily geared towards the cloud virtual servers. I'm curious as to you talked about databases and containers and servers, which part of the PAM market Will you kind of not try to address where do you see your focus being relative to some of the other players in the market?

Speaker 4

That's a good question. So our Advanced Threat Access doesn't just Work for it works across on prem,

Speaker 24

it works for servers hosted in

Speaker 4

the cloud virtual machines, etcetera. So it goes across both and that's the way we built it, Linux, Windows, etcetera. We are going to broaden into databases, both production databases as well as BI databases at BI tools touch. And we're also going to broaden into Kubernetes clusters. Our resource coverage will look very similar.

I think the way to think about this is we're bringing a modern approach to the market, which is more just in time credentials than having necessarily shared credentials where you use a vault and we will partner with companies that at least in near term, we will partner with companies that actually have a vault for resources that need shared credentials. So I think of it that way, which is we want to bring a cloud forward user based view, which is what our customers are asking us, and that's the lens we're taking versus the resource lens.

Speaker 33

Got you. That's very helpful. And then just one follow-up, maybe for Mike. So with regards to margins, I know you guys are not commenting on Auth0, but given the expansion into kind of these adjacent 2 adjacent markets, I noticed you guys didn't really guide to a longer term margin framework. How should we think about how you kind of play around with the investments in the different buckets in the business going forwards?

Speaker 28

Yes, great question, Nat. Thank you. So first of all, we are very rule of 40 focused with a bias to growth. And with this huge $80,000,000,000 TAM now With IGA, with the expansion of core workforce, the expansion of SIAM, I mean, it's a toe in the water. Like Susan said, we're a couple of percent penetrated workforce.

And Even with CERO, once it closes, we'll be just under a couple percent in SIAM as well. So big opportunities there. We guided, of course, as you recall in the last call, that in FY 'twenty two, we're making investments in AEs and SEs, full sales capacity, marketing capacity, CSMs And of course, a lot in the area of product and dev. So huge opportunity. We're making some real tangible investments because The opportunity is there, quite candidly.

And so that's what we're doing. So that's why we guided the way we did for FY 2022. And by the way, when Bill gave that guide, this was very much in our road map and thought through at that point in time. As far as kind of as we get out to the midterm here, We do continue to believe that 20% to 25% FCF margin is the right objective. So the exact timing, we'll go through things Homes.0 closing, that kind of puts it all together.

And as both Todd and I touched on, that takes the growth rate over 35%. That is that's what's going to happen. So that's the way to think about it. So it's a balance. There is operating leverage in the model.

If you look at FY 2021, we did 13% operating leverage with FCF margin. So it's there. It's a decision. We're making these proactive decisions as we go, but with the growth opportunity the way it is here in FY 'twenty two, we're leaning in.

Speaker 23

Thanks, Mike. Next, we're going to go over to Alex Anderson and Needham.

Speaker 24

Thank you very much. And it's great to see you guys, Todd, Eugenio, Frederick and the like. I have just a clarification question to start with, if I could. The commentary about 30% to 35% going above 35% with all of the CRO, is that a pro form a calculus or is that a Above 35% would then be the growth rate with that being somewhat of an inorganic calculus because of the obvious benefit of bringing in that additional revenue upfront?

Speaker 1

I didn't know there was going to be calculus on this call.

Speaker 28

That's a great question. So when we gave that guidance that includes you just announced this, but just to be clear for everybody, That is net of what the expected deferred revenue haircut. So that's one thing to keep in mind. Clearly, in this year, it's TBD as to exactly when it closes. We continue to expect Q2.

And yes, that's a it's a compare, it's not pulling, right? So it's a compare against FY 'twenty one that didn't have a 0 in it at all. This year will be a partial year. So that's also true from that perspective. But that is as Todd followed up on me at the beginning, we expect that over 35% growth rate in those subsequent years as well.

So In this year, there is it is a close year, but that's also expected going forward.

Speaker 24

So Thanks for all the great content today. It seems like this presentation today was extremely shifted left, much more so than previous years and specifically addressing a lot of DevOps and coder centric type of technology integrations. And in that context, you mentioned HashiCorp a number of times, obviously one of the premier companies in the shift left movement, Coda's infrastructure arena and talked about integration with it. But on the other side of the coin, They have evolving technology. Somewhat addressed this a little bit with a prior question From Morgan Stanley, but they're pretty much an integrated real time realization of identity as well.

So how do you compete with the vaulting product of HashiCorp and simultaneously are you partnering More with TerraForm side, does it matter? How does all of that boil out? Is it a cooperation Competition situation or what?

Speaker 4

Yes. So we actually partner very closely with Hashicorp, Both on the TerraForm side, we have official integrations that we work with them on so that you can configure a bunch of organizations in Okta, etcetera. On the award side as you're bringing up, I already brought this up, we're not looking to go to shared credentials. There are a number of partners, Hashicorp with their award being one of the premier ones that we partner with. On the other side, they don't have an identity provider, right?

So they use us as an identity provider. So It's actually a very seamless partnership. And what you'll see is we're both very, very deeply integrated in each other's solutions. And it's a very It's not by chance. It's very proactive because we work with them so much.

Speaker 9

I'll just add to that, Diya. So I happen to be on the HashiCorp Board. So I can attest to the partnership and how bullish both companies are on continuing to expand that partnership.

Speaker 24

Perfect. Thank you very much. Great stuff.

Speaker 1

Alex, did we answer your question about the growth rates in the calculus?

Speaker 24

Sounds like you're assuming that you're going to continue to grow 35% or better

Speaker 1

than when that's in the base.

Speaker 28

That's correct. Over 35% went in the base. That's a good summary. Thank you.

Speaker 23

Let's go to Andy Nowinski at D. A. Davidson.

Speaker 31

Great. Thanks. Thanks for hosting a great event. So I just had two questions on the new solutions. So I think you said that customers can upgrade from advanced over access and lifecycle management to the new solutions.

So I'm wondering if you could just give any more color on the revenue uplift that you might see on a per user basis when they upgrade?

Speaker 4

Yes. So As we said, our advanced lifecycle management has basic capabilities for servers as well as they have capabilities for access. But we have a bunch of customers that want more advanced capabilities like SSH and RDP session capture, They want attribute based controls. They want obviously more resources we've talked about and those are the customers that are going to upgrade. From a revenue capture perspective, I think these are you would upgrade to.

So if you have advanced server access and you want all these capabilities, you would have to upgrade to these capabilities and there'd be additional SKUs utilized. On the identity governance side, as we said, we're doing a lot of the provisioning, deprovisioning capabilities, the entitlements, all that stuff. But really what you're missing today is things like access requests, making that easier. What I've talked about in my presentation was we're doing things like how do you provide self-service access with right level of intelligence so that you don't increase the risk, but also provide deeper access requests for things that are more sensitive. So access request is 1, certification is another, reporting is another.

And if you want those suite of capabilities, you basically end up Buying that product and that's you in that portfolio. Does that answer your question?

Speaker 31

I guess. Are you offering any sort of bundles when customers buy all 3 solutions or any incentives to buy all 3 upfront?

Speaker 4

Yes. So regular pricing, if you buy if you have if you you're asking about a pricing structure, it will be if you buy the whole portfolio, You get a bigger discount basically as the rest of our structure works for the

Speaker 34

rest of our pricing.

Speaker 4

So it's not very different.

Speaker 31

Okay, thanks.

Speaker 23

And next up, we have Brian Essex at Goldman.

Speaker 35

Yes. Thanks, Steven, and thank you all for taking the question. Maybe just to follow on Andy's question, kind of similar, but maybe to Put a finer point on it. Potentially for a customer that does not currently have IGA in PAM, is it 2x lift, 75% lift to pricing, what you might have on ASP per customer base?

Speaker 4

Yes, that's a great question. So on fan, it is $45 per user per fan unit. The way a fan unit is defined is a different set of bundles of servers and databases and Kubernetes clusters and we can go into detail there, but it's not as relevant. On IGA, if you want to buy this new It's or these new set of capabilities, it's $1.09 per user on top of the existing advanced lifecycle management and lifecycle management.

Speaker 1

Got it. Brilliant. And the like for like there is per user per month.

Speaker 16

Got it. Very, very helpful.

Speaker 35

Thank you. And then maybe just a follow-up to on the IGA side, where are you seeing the most demand? Is this Similar to what SailPoint might say that you have these legacy customers that want to pursue digital transformation efforts and some of the legacy vendors are bottlenecks to that transformation process or are they looking for other cloud native alternatives, particularly at the lower end of the market where there may not be something scalable cloud native to address that platform?

Speaker 1

I think it's both. I think there's some companies that are using legacy solutions that will want to move off them and use something more modern. But I also think there's a big market for net new, especially on the privileged access side. If you look at our success, we think the success with Advancer Access will be an indicator of this. A lot of these customers we've had with events or access didn't have an existing privileged access product.

Now that we've rounded it out, I think you're going to you could see that trend be even stronger. So net new customers to the market didn't want to go ever with the legacy technology, leaning big into first our prior to our Venser Vraxas now with our Privilege Access product. Good example is Zoom. It's a big customer with who you saw the interview with, the CIO there at Zoom. They were never going to install a privileged access product from a legacy vendor.

That was that advance over access was a net new purchase for them, not replacing an existing vendor. There's a lot of companies Zoom is obviously a a standard exception, but there's a lot of companies that are building software, wanted to be more modern and are looking for to cover these critical accounts in this big security issue with a modern solution.

Speaker 16

I would just add though, even in speaking with Fortune 500 Companies, I mean, I think it's going to be very similar to what has happened over the last 5 years with our access management, our core access management products with single sign on lifecycle management, UD MFA, which is effectively, look, they've been running Oracle in that analogy, they've been running Oracle or IBM, Tim and Tam or Oracle Identity and Access Manager and they're running that on premises for all their legacy infrastructure. And when we talk to them, they say, look, that thing is fine, but it's just running, it's doing maintenance and like What I really need is I need you to help me solve these key modern critical projects that are high value, high importance, high security, get them up and running quickly, 1 quarter, 2 quarters, 3 quarters, which we do. And that allows us to go back and talk these CIOs and CTOs and CSOs and say, how is that experience? They say, it's phenomenal. Great.

Now let's talk to you about the plan to rip and replace your Oracle and your IBM over the next 24 months. I think it's going to be very similar, for example, with IGA. They're going to have their legacy IGA on premises product that's running for bunch of mainframes and a bunch of other things they need to do, but they have all these modern products. They're not going to plug that legacy on premise infrastructure into Workday and ServiceNow to figure out how they're going to actually do IGA in those products, but they have to because those things are starting to become critical into their infrastructure. They're going to do is they're going to use our products, they're going to integrate all that stuff, it's going to go very quickly and then they're going to turn around, they're going to say, that's great.

Now show me the roadmap to turn the lights off the old legacy on premise infrastructure. And I think that's a very similar path. And again, we're not making that up. It's good experience that we have over the years doing that, and I think we're just going to

Speaker 23

Next, let's go over to Josh Tilton at Berenberg.

Speaker 36

Hey, guys. Thanks for taking my questions. Can you hear me?

Speaker 14

Yes. I'll now just go ahead. All

Speaker 36

right. So the first one is kind of a follow-up on the pricing for the new IGA and PAM offerings. I know they're not out yet, but do you guys have any indication on maybe the relative attractiveness to what companies are paying for their incumbent solution or other cloud and MIGA solutions that exist today?

Speaker 16

I don't know all the details around the license management and how they're doing procurement around on premises software. I assume it's largely perpetual and it's largely recurring maintenance as you've seen with a lot of these legacy on prem products. I know that some of the legacy vendors in both PAM and IGA have tried to move into the cloud because they realize that that's the future is going. It seems as though they're having some tough times doing that. And it's very hard, right, when you have such a core center of gravity that's focused on its on prem product and maintenance and doing upgrades to it, it's hard to get this other motion going with the cloud, which is why we've taken the opposite approach obviously over the last decade, cloud centric, cloud focused, we're going to where the future is.

I'm a hockey guy. We're going to where the puck is going, not to where it was. And then over time, we're going to make sure that we can all the existing on prem infrastructure so they can bring it along with them. And when

Speaker 12

they want to turn

Speaker 16

the lights off, we're going to give them the full suite of what they can do in the modern world as well.

Speaker 36

And just as a quick follow-up, there have been a lot of announcements pretty recently of the acquisition of 0 and you're going to develop new IGA and PAM solutions. So can you kind of just walk us through what the decision was to acquire in customer identity but maybe develop in house in PAM and IGA? Why not acquire somebody in those markets as well?

Speaker 1

Yes, the SCIAM market is a big strategic important market for us. And I think that one of the reasons why we're so excited about the combination with Allzero is because it's really the TAM we talk about is really a couple of different submarkets. There's the CIO led, CISO led market, Okta is really good at attacking. And then what's become clear is that the developer market is somewhat distinct and somewhat complementary. And when you start with a developer focus like Auth0 has from the inception of their company, you end up with a pretty different product and a pretty different go to market motion on how to capture it.

And that's why we're so excited about the combination. And Johanio is here to add color on that side.

Speaker 2

Yes. And even for us, with all the progress that we made, we are also scratching the surface on what's possible with developers. We only touch like single digit percentage of all the developers around the world, right. So our focus has been always been has always been on the empowering developers to build faster, more secure And to essentially address the huge opportunity cost, which is the time that now it's been wasted on building stuff that we can do better for them, so they can focus on what's really important, which is their own apps.

Speaker 1

Yes, it's very well said. One of the analogies that I used internally to talk to the team about this and as we were Thinking about our approach here was helpful was the following analogy. So if you look at Oracle relational database and you look at MongoDB, You could say, oh, they're both databases. Why would they're not complementary, it's just 0 sum, database is a database is a database, But they're actually quite different. If you're a developer or you're a user or systems administrator, at a high level, you store data in them, you query them, you back up the data, But on and the details, they're pretty different.

A document database is pretty different than a relational database. And so they're quite complementary and they're 2 valuable platforms that can address different use cases in the same bigger market, which is data management. That's I think it's not perfect, but it's a helpful analogy to understand that while on the surface, yeah, they're both identity management products and platforms, But the details matter a lot. And when you get into the details, it's they're quite complementary and can give customers a good amount of choice and value. And I think your question is like kind of why now, why did you buy?

Realizing that over the last few years is really the reason there And also the reason why I'm pumped up about to close the transaction hopefully soon and move forward building something great for customers together.

Speaker 16

And Joshua, just following on, on the last part of your question there, hey, why not do some M and A in IG and PAM? I mean, I think it's first of all Follow on to what I said earlier, which is, we've been building basically these products for the last few years and people are looking at ASA from the side and is that a modern PAM product and they're looking at lifecycle management of workflow and saying, when can I replace my SailPoint legacy on prem infrastructure? So we just have to say, yes, we're doing it and here's when it's coming. Frankly, it's a huge sigh of relief. I mean, I know that when I talk to customers in the coming days, they're going to be like, finally, thank you.

Now I at least know what to put into my roadmap. So that's the first thing is we've been building this. 2nd of all is, Remember, we are an organic product and engineering development company. I mean, that's what we are that is what our core is. We have this amazing with Auth0 to partner and make the world better and get in front of customers even more quickly, which Eugenio and his team have done a fantastic job of doing.

But our core at our core, we are an organic product and engineering company. And that's why you see how all these products are doing. I mean, when we GA something, have a whole bunch of bugs in it, it takes off. So what I would say is we're not done. There are certainly going to be things that we'll continue to look at As we enhance our IGA and PAM offerings, as we look at other adjacencies, there's a ton to do with Customer Identity and Access Management.

We have nothing planned right now. Obviously, we hands full with Auth0 and making sure that, that integration transaction is wildly successful, which I have no doubt they will be. But those products are already off and running. As we find things that would make sense to enhance them, we will also take advantage of those opportunities though.

Speaker 36

Thanks, guys. That's very helpful.

Speaker 23

And next we're going to go to Gray Powell at BTIG.

Speaker 1

Hey, great. Thanks for taking the questions. Can you hear me okay?

Speaker 12

Not included, Gray. Go ahead.

Speaker 9

All right.

Speaker 11

So yes, I guess with Auth0 operating as a separate company underneath Okta, Just how do you manage the 2 separate sales teams and just make sure that like an Okta rep that's focused on customer identity isn't actually competing against an off 0 rep and just that everybody plays nicely together?

Speaker 2

Well, first, let me start with this. First of all, we are in this period of time where the transaction is not closed. So we are actually operating as we were like before we announced this. And we don't control when it's going Hopefully, it's going to be done soon. And by that time, we will be working together.

But in the meantime, we serve like 2 different audiences really and we work we have different and complementary go to markets as well. I think we mentioned as well that we also have like a different geography coverage as well. Alt 0 has 40% of its revenue outside the U. S. And 60% in the U.

S. So there's many things that we need to figure out and that's what Susan and the rest of my team Working on as soon as we close.

Speaker 9

For sure. I'll just jump in on that. So one thing's for sure is we'll be very prescriptive with the customers based upon their requirements about which solution is best for them. As Yohanyal talked about, there are 2 very different approach. 1 is a very low code approach, 1 is a very pro code approach.

And so we'll make sure that we just lean in on our customer requirements. And in most cases, I think they're going to be pretty clear. There are certain things that like the private instance that Alt Sierra brings to bear is something that I think is going to be very exciting for many of our customers. There are things we're further ahead in FedRAMP. So in terms of the government market, that will be a clear Okta lead.

And so there are all of those things that we're already thinking about, but we'll get together post close and really make sure that we're clear with based upon customer requirements, what we should be leading with, with our customers. We're not going to confuse them.

Speaker 1

Yes. One of the things, I'll jump in here quickly, pops into my mind is that First of all, this integration is we're taking we know it's going to be a lot of hard work and we have a lot of focus on making sure it goes extremely well. We don't underestimate the amount of work it takes. The guiding premise is that these are 2 high growth companies. So the first order of business is making sure we both continue to grow rapidly.

And then the second order of business is the integration and the sales integration and the product integration when it makes sense and making sure it's all done under the framework of customers being successful. So, yes, I'm excited to

Speaker 2

And maybe to add some color. Our quarter ends in Q1 for us ended in March and we announced this deal at the beginning of March. It was a good test to see how our customers would react to our proposal. And Well, we had a fantastic quarter. We beat our results, our plan by 10% and every single customer I spoke with With regards to the future and our future together, saw this as an immensely positive thing, which is awesome to see.

Speaker 3

Got it. All right.

Speaker 11

That's great color. Thank you very much.

Speaker 23

Okay. Next question from Jonathan Ho with William Blair.

Speaker 28

Hi, there. I just wanted

Speaker 37

to start with one question for Dia. When we think about Okta as a primary cloud platform, What does it say has to happen in order for us to see more sort of standardization on a single cloud provider? And maybe what largely stands in the way of seeing that penetration rate of 2% becoming a bit higher?

Speaker 4

I think so a couple of things. And we've talked about this in our in a little bit, which is really the provider or the Provider or the player that can help companies stitch together their basic back organizations stitch together their basic back end ecosystem of tools, etcetera, both on the customer identity side as well as the workforce side is going to be the provider of right, because identity flows through everything. And really our job is not just to provide an authentication and authorization service, but our job is really to help Our customers bring together this stitching of identity across the different solutions so that they can bring together the experiences that they need for their employees, their workforce as well as their customers. And I think our approach of being multi cloud, of being neutral across what tools and open and neutral across what tools our customers use, our integration network, the extensibility we are building on our platform that allows them to customize, make it more flexible. That's the approach that I think that's going to work.

Speaker 1

Yes, Jonathan, we call it primary cloud, making sure identity is a primary cloud. We talk about that a lot in the presentations we just went through. And that really at a high level informs our whole platform strategy, whether it's more integrations as D. A. Mentioned, whether it's breaking the product into these platform services that can be reused and flexible, whether that's making the whole system more extensible and customizable and whether that's building new products like PAM and IGA.

It's how do we solve more of these use cases? How do we make sure that the Identity Cloud and Identity specifically is elevated to the status of primary cloud because it's not critical for customers. It's going to drive choice across all of their technologies, thousands and thousands of technologies and the other 5 or 6 major clouds like collaboration or infrastructure or data that they're going to Inevitably, settle on.

Speaker 37

This is Thomas Hens. You also referenced the Fastly partnership that was announced Can you talk a little bit about what this could mean from a go to market and mid gen perspective as well? Thank you.

Speaker 16

Yes, I mean, there's as you saw, we continue to build on the Okta integration network, which is the premier catalog and It's a great example of what Cosmos was just talking about, just really making sure that we have the best integration to everything that's out We started that as an application catalog a decade ago. It's become an integration catalog because of all the pieces of technology. And what you're seeing is More and more of the leading organizations of modern technology providers, Fastly is a great example, are really leaning in, in terms of how we can do more jointly for our customers. We outlined a number of different groups that we have improved across the Agta Integration Network, both on the Workforce Identity and Access Management side as well as the Customer Identity and Access Management side, and you're just going to see more and more of this in the time ahead. Dhia, you can maybe talk about some of the reasons that we were specifically working with Fastly and why they leaned in and kind of how that works similar to some of the Hashimoto commentary you gave earlier?

Speaker 4

Yes. That's thanks, Freddie. So exactly the same way.

Speaker 6

A bunch of our customers came

Speaker 4

to us and said they're working with Fastly, they're working with F5, human etcetera and said, hey, we're having to stitch you guys together. Akka has one set of threat information, has another set of threat information. And basically, we both got a ton of demand across the board on our side and connected with each other and realized that we could partner together and build a solution that was way better, that was integrated, because we both see different events and different data that help us lead to the threatening conclusion that we make. So that's essentially what happened.

Speaker 12

Thank you.

Speaker 23

Great. I want to sneak in a question from the buy side that came in. The question is on IGA, how will you approach the more complex setup required at the enterprise level to get the right access across all users and applications both in the cloud and on prem. I've heard that it takes 6 to 12 months or longer with SailPoint. Will you outsource that to partners or do it internally?

Speaker 16

Yes, I like the sneaky buy side getting their question in by Dave. Anyway, I'm happy to answer that. Certainly, I think this is another perfect example of how legacy integration infrastructure in the past, in this specific case, IGA, so governance, where they're pulling in different data about login information, authentication requests across their different systems, how the legacy on prem version, it took 6 to 12 months just to get the servers up and running. In our case, we actually already have the service running. As Todd said though, I want to be really clear, we're not going to spend the next 5 years replaying every bell and whistle that the legacy on prem providers have created in IGA.

And frankly, our customers are asking us exactly to do exactly that. Don't start rebuilding all of the different bells and whistles. I don't use many of them. And in fact, if you do that, I'm just going to end up staying with my legacy processes and my legacy ways of doing things. And Half the reason that these large organizations are so excited about coming to work with us, of course, they're using our products, they get up and running, you see the ROI, the TCO, the time to value.

It's not by accident we can get these kinds of customers to come and talk to you about their case studies, but also they're looking for innovation. They're asking us to come in and help them understand

Speaker 28

What the future looks like?

Speaker 16

Where is the road map? How should IGA work? What do I really need to do? Look, their auditors are changing at the same time. Auditors are not sure what to do in this modern cloud world.

So we are certainly not going to start by replicating every bell and whistle that a SailPoint or the other on prem providers have had. And in fact, you can see what we're already doing with our workflow connectors. That's a perfect example. GA workflow about 16, 18 months ago now, I mean, it's flown off the shelf like hotcakes and people are really using it end to end for identity governance across their entire systems. If you just put a nice little reporting engine on top of that, you have a modern IGA solution.

The final piece about that was, are you going to do it partners or internally? We're going to continue to do exactly what we've done, which is we're going to invest to make sure that we have expert services. At the end of the day, when you go talk to a FedEx or an Engie or you go down the list of these large organizations, T Mobile, that trust us with all their identity infrastructure, they're going to want to know that someone from Okta, who's an expert on the topic, is overseeing what's going on. That being said, not only the GSIs, which we touched on earlier, there are starting to be some boutique security and identity SIs out there that are developing both regionally and that are focusing entirely on Okta. They're starting to build around Okta.

Same kind of thing we saw at Salesforce 10, 15 years ago with Aperio and BlueWolf and Astadia and ModelMetrics and all these other guys, this is starting to happen now at offset and those folks are deep into identity. They've been doing it for 25 lot of cases, they built the original products, so they know exactly where we're coming from. But I think the opportunity is huge going forward. People want that modern roadmap, that's what we're very excited to deliver. The final thing I'll just say is, again, with cloud, you don't we're not in the big bang business.

The reason we have dollar based net retention of north of 120% quarter after quarter after quarter is because our business is about getting these customers up and running, making them successful and then we become their trusted partner by virtue of the success they're having with us, and they asked us to do more and more. Same thing's going to happen with IGA. Yes, do you have 50 things plugged into your legacy IGA provider? Probably. Are those 50 critical?

Probably not. There's probably 5 that matter. So we'll nail the first five and then we'll slowly get the roadmap to ship them off the rest And it's going to be the natural same motion that we've had today. We're going to continue to build fantastic relationships with these large organizations and I'm thrilled about this.

Speaker 1

As you can tell, Freddie was a vocal proponent of us entering this market.

Speaker 23

All right. Next, we're going over to Keith Bachman at BMO.

Speaker 38

Susan, I wanted to come back to you if I could. I understand when we're talking about Xero and Okta, the customers can decide. But I want to be more focused on my question is, Will there be a consolidated go to market effort between the 2 organizations? In other words, will there be 1 global account manager? For a firm like Bank of Montreal, We have a lot of the companies, ForgeRock, Okta, Acero calling on us.

I'm just trying to understand, well, if R and D is kept separate, but will the go to market all be unified the two companies?

Speaker 4

So it will be

Speaker 9

a collaborative approach, Keith. It's not I'm not going to say that there's going to be 1 person, but it will be a collaborative approach. And we have a lot to obviously work out come day 1. But as I said, the key is going to be focused on customer requirements, customer success and make sure that we have an incentive plan in place that will allow the team to work that way.

Speaker 38

Okay, Okay. Then maybe my follow on question is on the financial side. So we talked about the TAM increasing as a result, the inclusion of TAM and IGA and the growth rate improved from something like percent of north to 35% of north. Should we infer then that the net retention rate will also get a bump during this process as you have a Richer opportunity to sell into your installed base?

Speaker 28

Clearly, Optxero themselves, They already have a great net retention rate, as you know. We also have a great retention rate. So I mean, these are 2 first class companies coming together. And as far as guidance on above, etcetera, all those kinds of things will contemplate and discuss in the earnings call following the closure of the combination. But they're in very good shape as well with both the gross and net retention as we are.

Speaker 38

Okay, perfect. Many thanks. Congratulations.

Speaker 1

Thank you. I will just add that we do think there's a lot of upsell opportunity with our new products and between Octa and Okta. Right. So there's the numbers and the guidance and the expectations, but we do think there's a big upside opportunity.

Speaker 38

Fair enough. Thank you.

Speaker 23

I'm going to go next to a question that came in through the Zoom tool. How do you see Okta excuse me, how does Okta see the device management partnerships like CrowdStrike integrate more with a newly expanded risk engine, will ThreatInsight be allowed to integrate with Threat Intel from partners?

Speaker 4

Yes, absolutely. I mean, that's the whole purpose of the risk engine. So we're building that's essentially what we announced today. And then what we are also building in beta right now is the ability for us to be able to use our devices, STK and device platform to signals directly from the phone and then feed it or sorry, directly from the device and feed it into the threat intelligence. So for companies like CrowdStrike, other EDR vendors, there won't just be one part to integrate.

There will be multiple parts to integrate And we'll be able to feed all of this into our risk engine to be able to get much better risk analytics than any one of us could alone.

Speaker 23

Excellent. All right. Next, let's go to Greg Moskowitz at Mizuho.

Speaker 34

All right. Thanks. And you guys, Yuri?

Speaker 1

Yes. Sounds good, Greg. Perfect.

Speaker 34

So first a clarification for D. A. If I may. So once Okta Privilege Access is GA, Is ASA going to be superseded or do you expect to continue to sell it as a more slimmed down offering? And then for Mike, can you say what customer identity represented as a percentage of ACV exiting fiscal 'twenty one and how fast it's growing, I believe is that 23% of total as of the end of fiscal 'twenty.

Speaker 28

Yes. I can start that real quickly and then we go to the other part of the question. Yes. So what we reported is that Q4 is 25% of the business at the end of Q4 of FY 2021, and we're in Q1. So we will periodically give that breakout.

Speaker 6

On your question around ASA

Speaker 4

and privileged access management, we think of it as a suite, a portfolio. So you can start with advanced server access and start with basic access management. And as you get more and more sophisticated and need more privileged capabilities, you buy the additional in the portfolio, the upgrade to the functionality you need.

Speaker 34

All right, perfect. Thank you.

Speaker 23

And next, we're going to go to Shaul Eyal at Cowen.

Speaker 14

Thank you. Hi, everybody. Great to be here. Congrats to everyone. Eugenio, great to see you.

Freddie, Todd, Mike, my question is for Susan. Many of us here on the call vividly recall the great That you had a strong, I'm not mistaken, I think we actually met during that Analyst Day 2017, maybe 'sixteen. And again, we will probably happen right after that, 2, 3 quarters after that with the entire that you believe you could be importing some of the Splunk's best practices into the optical and optical

Speaker 28

Sure.

Speaker 9

As you said, thank you, Shaul. Thank you for the nice comments first of all. As you said, it really is about the market opportunity. So that's and Todd being a great, great salesperson.

Speaker 37

He's not he doesn't he says he's not on the

Speaker 9

go to market side, but he really is. But so I will definitely be leveraging a lot of what I learned there and quite frankly, a lot of what I learned at Sales While you don't not everything is the same at each company, the net of it is that high growth motion is something that is highly repeatable when you have this type of market opportunity. And so it's really about coming up with the repeatable motions. It's about hiring great talent And it's about running an incredibly interconnected go to market strategy across all the different functions. I can already tell you that Dia has become my best trend, just like Tim was at Splunk.

And I think that is that's the magic. It's really about bringing that cohesive approach to go to market, not just a sales led approach.

Speaker 23

Okay. Next, we'll go to Taz at Guggenheim. Taz?

Speaker 20

Hey, guys. Thanks for taking my question.

Speaker 12

I have a clarification to start off with. The GA for PAM and IGA, You said Q1 'twenty two, I believe that's Q1 calendar 'twenty two, right, not Q1 fiscal 'twenty two?

Speaker 1

Yes, it's 3 quarters from now.

Speaker 20

Thanks, guys.

Speaker 12

And then for Mike, you're investing more in sales, you're investing more in you have more TAM now with the IG and PAM products. But then if you look at your Your midterm CAGR guide of 30% to 35%, that's not changing from what you gave us last at the last Analyst Day. Any more color on why given the investments, given the increased TAM, You don't think the top line momentum should be higher now?

Speaker 28

Clearly, it's a bigger opportunity. When we gave That when we had that discussion, this was in our thinking as far as for our forward guidance, albeit at a modest level. So yes, does this give us more growth factors, more upside? Certainly, it does. But at this point, we're guiding the 30% to 35% organically and the greater than 35% with Auth0.

Speaker 12

Got it. And then the second question, I'm just trying to get a sense of the deal sizes For SIIME versus Workforce, if I look at Op 0 today, the run rate, I think the ARR is 200,000,000, but they have about 8,000 customers, which is similar to what Okta has at a much bigger run rate. So it looks like the average deal size for SIEM or Auth0 is a bit lower than what Okta has today. Any more color on if that's given by pricing being different, deal sizes are different because customers are smaller, any more color on the different deal sizes between Arca and Alt 0 Helpful.

Speaker 2

Yes, maybe just on our side, we have 10,000 paying customers, of which 20% of those are enterprise customers. These are customers with more than like a year contract Minimum, typically 2, 3 or more years. Our ratio between total contract Annual revenue, it's about 2.7 for us, 2.6 for us. So it's not uncommon to see customers in that range committing to longer term contracts. The other 80% of our customer base, paid customer base is what we call self-service customers.

These are customers that pay with a credit card on demand as you go month by month and they go anywhere between $30 per month all the way to maybe $1,000 per month. For enterprise customers, the minimum contract is $25,000 of ARR. We also have 20,000 non paying customers, because our go to market is primarily premium. So that's kind of like the top of the funnel for us. So overall, we have 30,000 customers that use our system in production, 20000 free, 10000 day, 2,000 enterprise.

Makes sense?

Speaker 16

And then Taz, I'll just add On the Okta side and nice to see you, thanks for the question. I'll just add on the Okta side, it's a very broad range. I mean, you have examples of smaller organizations, they'll take Major League Baseball, Right. Centrally, Major League Baseball is not the 32 teams. It's just Central Major League Baseball is 1,000 employees or something like that.

They're a giant customer identity and access management customer of ours. Why? Because there's 60,000,000 consumers every year who log in to stream MLB games, whether it's a World Series or the playoffs or anything else. So that's an example of a smaller business It is actually a Giant Sioum customer. Then I'll flip it around.

And you got to remember that when we talk about the market opportunities and we get the question a lot, we haven't gotten it here, but just to remind people, people always say, well, Which one is bigger? First of all, I don't know, they're both tens of 1,000,000,000 of dollars,

Speaker 27

okay,

Speaker 16

and they're both growing fast. Secondly, we're barely penetrating either one. But what I would also say is, take an organization like McKesson, Fortune 8, we've talked about them on previous earnings calls. Now McKesson's got McKesson ships a third of all drugs, pharmaceutical drugs in North America every day. So large organizations, they've got 100,000, 125,000, something like that employees.

Okay, They've standardized on workforce on Okta on the Okta Identity Cloud for their workforce identity and access management, universal directory, single sign on, live management, MFA and some of the newer products as well. So that's great. But the only and as we come out with newer products, IGA, PAM, perfect examples, and they are starting to use ASA, so that will be a natural upsell to the conversations earlier. As we come out with new products, they're going to buy them, but they only have one workforce. Now that workforce and 25,000 employees.

So there's 125,000 seats of each of these products that we're going to come out with, but they have n number of customer identity and access management initiatives. They have supply chains. They have B2B. They have B2C. They have B2B2C because they have end patients, they have end clinicians, They have business partners who distribute the drugs.

Each of those is a SIAM opportunity. So there you've got a Fortune 8 company where it's a obviously very large organization in terms of revenue and they've got n number of SIAM opportunities, each of those might be smaller, but when you roll them up, it could be a big opportunity. So I wouldn't say there's one stamp fits all. I would say there's a lot of opportunity out there. And frankly, again, if you look at the macro tailwinds that we're riding here of hybrid IT, everyone's going to move Cloud, the digital transformation, the most overused term in the industry by far.

What it really means is everyone just needs a better interaction with their customers, partners, vendors, suppliers, Small company, big company, public institution, private organization, anywhere in the world, this is across geographies and that's why we're so excited about this opportunity working with 0.

Speaker 23

Okay. We have time for 2 more questions. First one is another online question. It's from Jackie Glynn at Glynn Capital. Given the tremendous new product flow and all 0 coming on board, how do you think about net retention rates?

And should those end up north of where they are sustainably from today?

Speaker 28

Yes, great question. Thank you and thank you for conveying that, Dave. Yes. Clearly, again, as I mentioned earlier, we have 2 companies with great net retention rates. We have these organic launches of these new products.

And yes, that is a tailwind going forward. We're certainly very early on all of these activities. So we're not guiding something different today, But we're very happy with where we are from the gross and net retention, as you know, it's 121% last quarter. We also know that OZERO operates at over 120% and we do have these tailwinds for upsells. So, yes, we're excited.

Speaker 23

Excellent. Okay. Final question for this afternoon, back to Michael Turits at KeyBanc.

Speaker 10

Hey, guys. Thanks, Dave. Thanks for working me back in. So I just really I wanted to make sure that I'm clear given the number of questions there have been about what happens with the sales integration. Todd, how much do these do you guys really stay separate organizations And how much do you become one organization?

And if you tell me where that happens in each functional area, I think maybe that would be a great clarification.

Speaker 1

I applaud your ability to get back in the queue. It's impressive.

Speaker 10

Don't know how it happened, but whatever.

Speaker 1

I look at this in a couple of phases. It really starts when the transaction closes, that's Phase 1. And I think, like I said, the 1st year or so, the priority is Both teams need to hit their plans, grow, grow, grow. I think and how we actually integrate over that period will be Probably on the go to market side, it will be the most integration and the most collaboration. As Susan mentioned, the first thing is just some basic communication and collaboration and clarity for the customers that might be involved in a deal with both companies.

And then on product, there'll probably be very little integration is they have roadmaps and they have things that are working on both sides for the 1st year. I would imagine that over the course of that year, the sales teams will figure out how to integrate more closely more quickly, but we don't know. We haven't figured out the integration and the priority is going to be maintain growth, maintain a great customer experience, maintain the respective cultures of both teams. So the 1st year will be largely independent. I think we will make a lot of progress on our plans.

And as we get through the close and into some of the analyst communications and some of our opportunities to speak. We'll have more details as we get through that 1st year in terms of how we're doing the integration, because we do think the integration is very, very important. And The execution on that integration is a key driver and how this works out over the next 5 or 10 years. So we're laser focused on making sure it's effective. Thanks, Todd.

Speaker 23

All right. Well, that's it for this afternoon's meeting. We appreciate you attending. Now there's more Oktane content tomorrow, so tune into that. And if you have any follow-up questions from today, you can email us at investorocta.com.

Powered by