We'll just talk at 1.2. Everybody does podcasts, right? We'll just talk at 1.2. Is everybody good with that? 1.5 is a little hard. 1.5 is a little too mouth sounding.
Gabriela, I have the question.
Yeah, hey there.
Hi.
Hi, Gabriela. Nice to see you.
Hi, good to see you. Hey, Mark, it's a true pleasure to have you with us at Communicorp here again.
Yeah.
My colleague Kelly Monty to my right. Thank you for joining us. It's great to be talking about Communicorp and technology. Mark, we're in the middle of an incredibly high pace of innovation and identity.
It does.
My question for you is, as a founder of the company, what would you articulate as SailPoint's core competency? How does that now inform the way you're thinking strategically about where you have a right to win in this pace, this heightened pace of identity innovation?
Yeah, it's a great question. I think our kind of unique core competency is this ability to go, as I call it, kind of deep and wide. Most of you are familiar with the identity landscape, oversimplifying a pretty complex area, but there's kind of access, right? You just log in, single sign-on, MFA, and there's privilege. If you think about those for a second, the nature of SSO and sign-in is very wide. You want to try, ideally, to sign people into everything, but it's a very shallow level of security, meaning you just have that login. You authenticate them with some sort of strong authentication and log them in. By the way, a metaphor there is it's a check-in at the bottom of the building.
You check in with the security guard, show your license, you get into the building, but from that point on, the security guard has no idea where you are or what you're doing. It was a strong authentication and an entry, but that's what that technology has always focused on. They have a very wide coverage in the enterprise technology landscape, but very, very shallow, if you will. Conversely, privilege is the opposite, right? Its history is a very deep set of controls over a very limited number of users, over a very limited number of things. I want to understand every keystroke being executed by a database administrator or a systems administrator because those powerful users with access to systems can do very damaging things, either accidentally or intentionally. We want to tightly control. Think of it as very deep but quite narrow.
You've got wide and shallow, you've got deep and narrow. The nature of what we've always done is wide and deep because you have to map, ideally, every identity across every part of the infrastructure, application environments, and data. That's really difficult to do in enterprises with highly complex IT environments. The scale is non-trivial. I think it's interesting that in commenting on the cyber Apollo deal, there was a note that the CEO of Apollo said that, hey, you know, cyber comes with about 8 million identities under management. We're like, well, we're at 125 million and growing very rapidly. Now let's get to some of the innovation.
That deep and wide, I think, is our core differentiated competency because to understand, back to my silly building analogy, not just what it takes to walk into the floor of the building, but to map that building and every building in New York City and understand exactly how they're configured and what it takes to get into each floor and each room is pretty hard in a typical enterprise. There's a lot of depth and complexity that we've had to grapple with for many decades now, a couple of decades, I should say, but across a lot of the world's biggest, most complex shops. The innovation, I think, that's going to come now is on two or three key dimensions, Gabby. One is, Gabriela, sorry. One of them is you're going to have to extend that landscape as deep and rich as ours is to every identity.
That is now, as we all know, as much about non-human as human identities. Real quick on that dimension, we've had employees and non-employees for a while now, right? Some sort of a human logging in, whether they work for you or not, they're authorized to get into your systems. There are two different things happening in machine and agent. I think it's worth calling out for a second. The machine identity landscape is not brand new. We've had service accounts, software bots, RPA, intelligent devices for, I don't know, depending on which one you're looking at there, a decade to maybe a couple of decades. What's new is they're part of the attack vector. Now everybody's cognizant of the fact that the bad actors are trying to attack those non-human identities, just like they're trying to attack all of our humans to break in.
As the new saying is these days, attackers don't break in, they log in, right? They're not trying to break through the firewall so much as compromise identity and get into the system. There's that issue of, oh gosh, the machines are now an attack vector. We better figure out how to protect them, which, by the way, for most shops starts with figuring out how many you've got, where they are, and who's responsible for them. That is also non-trivial in most enterprises. Agents are a very different set of characteristics. They're not something we've had for a long time. They're brand new, but we all anticipate they're about to explode. There's going to be tons of them everywhere.
Unlike most of those machine-type identities, which are kind of static, deterministic, and programmed, these things are going to learn, adapt, and grow, which sounds a lot more like a person. We think what makes agentic so challenging is it's got machine-like characteristics and human-like characteristics. For the security teams to get their arms around this at the scale we think it's coming and the complexity that it presents is going to be very challenging. It starts with you have to map that entire identity landscape and all the data landscape. That's not something we've been great at in our space. We've helped people log into systems. We haven't necessarily understood all the data that they can access in the environment, and we've not tied that nicely into the security landscape.
To be fair to the deal that just got announced, it was a good validation point that the security ecosystem and the identity ecosystem probably need to come together. We would argue that wasn't the best choice for doing that, but that's what they did. We agree that that's where the world is going. You need that identity context and the security context to really secure your enterprise from all these attacks that are identity-centric. In our minds, you're going to have to have that breadth and depth to do that well and to do it comprehensively.
Let's stay on this idea of mapping because I think you're touching on something really important here. When you talk to your largest, most sophisticated customers, maybe share with us some of your observations on those conversations. Are they saying to you, we are so excited to deploy agent flows, we're so excited to deploy our internal built GS AI agent, help us figure it out? What do those conversations look like? What is the step one, step two, step three of getting the identity ducks in a row to be able to then go big with agents?
Yeah, it's a great question. I think there is some difference between those two. We're again taking broad things and simplifying them as we all have to to get our brains in the right place. There are two big buckets of agents. You nailed it. I think there are the kinds that are going to come through the software vendor world, and they're going to be made available to customers. I think customers are going to have to decide which of these things they take advantage of or not, but they're going to come from the Salesforces, the ServiceNows, the Workdays, et cetera, right? I think the general sense I get is most customers are exploring those things, looking at those things. They have some excitement about some of those things, but I wouldn't say there's a fever pitch to go adopt that technology.
On the other side is where I think most customers, certainly mid to large enterprises with some level of sophistication in their shop, are the most excited about the bespoke things they can go build and do that are very unique to their business, and they're the most nervous about those because they recognize we might accidentally create an exposure we don't understand. Some of you have been around various flavors of security. There's an old saying in our space, which is, why do race cars have brakes? Answer, so they can go fast, right? If you're going to adopt technology, especially technology that's rapidly changing, you need to have confidence that you can brake when needed. I think what you're seeing in this kind of slowdown in agentic adoption that we're all reading about is some of that concern being expressed by hesitation.
The customers are saying, look, I'm excited about this stuff. We've run some pilots. It looks like it could be very powerful. The next story comes out that, did you hear about that story where some agent went rogue and exposed all the companies' W2s to the junior analyst? There are crazy stories out there of where agents ran off and grabbed data that wasn't well protected and exposed it to either someone or something they weren't supposed to. If you're a security person, even a business person, you're like, before we step on the gas pedal and really run fast at this, can we be sure we have brakes that we trust, that we're sure we can stop or slow down or turn when needed?
I think that's the tension we're feeling, but our belief is we're going to move through that in the next few quarters, and we will be back to talking about how fast and aggressively people want to adopt this technology because the business benefits are pretty clear. Whether it's, quote, replacing people, which there's clearly going to be some of that, I think a lot more of it is making people more effective. The whole augmented intelligence unpacking of the AI acronym. There's going to be plenty of opportunity, I think, for people to go, wow, we can do a lot with this. We just have to make sure we have the controls that if something appears to be going awry, we can deal with it very rapidly.
What that means for our kind of space, again, is you have to have that comprehensive picture of where's—let me tell you something that people aren't talking about much. One of the problems with all these machine and/or agents is you have to make sure some human is responsible. There's a whole bunch of what we call orphan accounts today, meaning there's a service account, there's an RPA process, there's some device. Who's responsible for that thing? Some human in the organization has to go, that's mine. I've got that. I authorized it. I still think it's important. We still need it. That really is pretty non-normal, abnormal for that to be true today. We've done it for the people, right? We're really good now at saying, I understand all these people. Yes, they have valid access. That's correct, right?
We're just starting to figure out what that looks like for all these non-humans. It's going to be a very big deal for agents, we think, because what about this concept that a super agent spins up a sub-agent? Who knows that happened? Who decided that was okay? Who authorized that to stay? Terrifying. If you're a security person, right? I like to say this is like your employees birthing a bunch of children every day, and you have to keep track of where they're going in the enterprise. Terrifying. How do you do that if you're a security professional? That's one challenge. The other is, we're going to talk about this at our conference with some of the big players in the space. The biggest challenge today is we've got these controls that we've learned how to put in place.
Back to my building metaphor, all the badge access on every room and every floor. We don't have any ability today to pass that from the human to the agent or the data. There's just no construct for that today. If you authorize an agent to go do work on your behalf, you don't know for sure that what work it's trying to go do has the controls you have. That's where we get these situations where the agent pulls back data that you weren't actually supposed to be able to see, but the agent could. Oops, that's not good. These are the stories we're hearing from real customers all the time. The excitement about AI and agents is really high, and the fear is also quite high.
That's the place we think we've got to step into and say, here's what we're going to do to start helping you address that.
You acknowledged explicitly at the beginning here that there are competing narratives where providers will say the value will accrue to us. IAM providers will say the value will accrue to us. There's a whole bunch of different values you argue against. If the case is right and SailPoint is indeed uniquely positioned to be what we do, what should investors expect to see or hear from you 12 months, two years from now? What are the metrics we should be looking at? How do you think about which product segments will get the most traction as you address this problem?
Yeah, no, I think if we're right, and we, of course, we believe we are, why wouldn't we?
Absolutely.
Doesn't everybody think they're right? At the end of the day, it should accrue, and we're launching this agentic identity security product next few weeks here. If we're right, that's going to be a very widely, broadly adopted product in the not-too-distant future because we hear from customers, they don't have confidence that they're going to be able to manage these things. To your point, they're going to get offered other ways, supposedly, of managing or dealing with that. Our contention is, without that breadth and depth context, how can you do that? We try not to overburden the point, but I think you shouldn't miss it.
It is so non-trivial for people that are coming from a login only or the understanding of only a handful of users and systems to say, now I'm going to manage hundreds of millions, if not billions of identities, and maybe over time, multi-billions of entitlements for those identities. That's hard. To do it in relatively real time, because that's the other challenge, we're moving from what we call admin time, what SailPoint's traditionally done, to be fair, you'd call admin time, right? You started with the company, oh, Gabby, you need these things to do your job. I'll get you that by next week. Read some books. Read some books until then. The other end of it, we're pretty good at turning off access today.
We've gotten better at it because we know that's bad when we don't, when somebody leaves, but it's still kind of, and certification is the ultimate admin time, right? Once a year is enough to check that the people have the right access. What about the other 364 days? Seems like you'd want to know. There's some real breakages in where we've evolved as an industry as to how that's addressing the current identity threat landscape. We are kind of lagging, to be harsh here. We're lagging in the technology from the identity community of addressing what's actually become the real problem. We're kind of, to be harsh, sometimes doing kind of fake security. Hey, look, I checked your login. Yeah, but what if you got past the security guard? Now what?
I think we're going to have to step up the game, and we're investing pretty heavily to get big into that game.
I'm curious, are there features that have historically been considered privileged access that you don't need a vault per se, but are there features of SaaS products that perhaps actually make more sense in an IGA type platform? That's an existential question on the market.
Yeah, no, it is. It is, you're right. No one's really debating whether the access heritage is the most critical heritage to manage the agentic world, with all due respect to my friends at Okta and others. That's fundamentally a login technology. These aren't logging in. What are we talking about when it comes to machines and agents, right? When you get to privilege, that's where there's noise. You said it, so I'll go there. The core technologies of PAM are two big things: vaulting and session recording.
Yeah.
When we had the problem of bad actors, either intentional or unintentional, doing things with databases and servers and operating systems, the things that privileged access was designed to prevent happening, those are the core things we decided we needed. You shouldn't have what we now call standing privilege. You come get a credential, you log in with that credential, I timestamp it, and I know it's you. Now I watch every keystroke because you might do something wrong or might do something stupid. Either could happen, and either way, I need to know exactly what you did. We contend those two core technologies have nothing to do with what's about to hit us. It's not about vaulting. It's not about session recording. This idea that PAM, that set of technologies, gives you some head starts on solving these problems. There is a set of privilege challenges.
That's where I think the confusion exists. There are all kinds of privilege challenges about to emerge here. This idea, and Nikesh said it, again, we'll give credit where it's due. He said, look, we believe over time every identity will be privileged at some point in time. Right, so do we. The trouble is you just bought a technology that only handles a sliver of the identities, and the things you do for those are not relevant to what we're about to deal with. That's a problem. We think what's needed is a comprehensive understanding of all those identities and that detailed understanding of the data and entitlements they can access. That's what we do. It's not clear that a history or heritage in vaulting and privilege is going to be particularly helpful to that. You know, I'm sorry, vaulting and session recording.
I just, I personally, I'm trying to get educated, as we say, but like, help me understand how that helps you win in this new world. I don't get it. When you just say the word privilege, oh, you're right, there's going to be privilege.
Yeah.
There's going to be escalation, de-escalation, dynamic privilege, very big deal coming with all these technologies. It is not clear that that heritage gives you any head start there.
Yeah, really interesting comments, Kelly. You brought up earlier this idea of the convergence between security and identity. Curious, what does that mean for SailPoint?
It means we've got more stuff to do. Yeah, we've got a lot to do. What we think that means is there's this kind of, again, unspoken reality that's a little bit true that we need to talk about more, which is we've got 20, 30, 40 years of heritage in some of the core disciplines of security. We've been doing device security back in the day, Symantec and McAfee before CrowdStrike took that game over, right? We've been doing network security when it was mostly about Cisco before Palo became the big guys to play with. You've got newer things like cloud security where Zscaler dominates it. What isn't talked about much is none of those constructs have an identity context. When we're nice, we say they're identity unaware. When we're less nice, we say they're identity blind. They just don't understand identity.
I see something happening on the device, I have a MAC address. I see something happening in the network, I have an IP address. I see something happening in the cloud, I have a cloud instance. Still don't know who or what is accessing this or doing something here. That lack of identity context is partly why I think Nikesh did what he just did. I think it's why people like us are going to have to have a very robust API set and open communication framework between ourselves as kind of a center of gravity for identity, all kinds of identity, all kinds of data, and that entire ecosystem. The danger, and this is the classic problem of aggregation of vendors versus best of breed. What Palo's now done is say, if you want to solve this, you do it with me, all my tech, and Cyber's tech.
I think we're going to find that there's plenty of customers that go, I've got lots of Palo. I've also got CrowdStrike. I've got Zscaler. I've got Portnet. I've got, you know, I got a bunch of stuff here. It's all sending me security signals. I'd like all of it to be identity aware. The trick will be, how do you convince the customer that Palo, with its technology, is great at tying into all the rest of that security ecosystem? That'll be interesting. We'll be able to say, what do you think that's going to mean for us? I think we're going to be challenging them in the same way, by the way, we challenge Microsoft or others today who say, I've got this comprehensive set of stuff. We're going to go, great, but the things you do in our realm aren't actually competitive.
You can't actually do what we do at the level and scale and complexity the customers require, which is why we don't lose to Microsoft.
Yeah, I want to ask a bit of a more near-term question. You guys reported earnings yesterday.
Was that this week?
That was this week. Given you guys' focus on large enterprises, you can see a little bit of a shift between quarters and business, and you also have the term versus SaaS dynamic. The broader question there is just how should software investors think about looking past some of the way you see in the quarterly volatility of results, particularly when software investors aren't almost used to seeing that sometimes?
Yeah, no, thanks for that question. We're doing our best. I guess we are partly here, Scott, my Head of IR, is here with me, and Mitra, our CEO. We're listing because we were honestly a little frustrated. We thought, wow, we put up good numbers and told you we're going to continue to do well, and people went, yeah, that wasn't what we were looking for. We're like, what happened there? That said, look, we do think that when you're in a weird term SaaS mix world that we live in, and we said, look, it's 90-ish plus % SaaS now, but we still get term deals, and when we get them, they're big. They move the needle on revenue and therefore profit. You know, our friends in 606 Accounting, thanks for that. Anyways, we are where we are in that.
We said, when we came back to the public markets this year, look, try to keep your focus on ARR because that takes out the noise of whether the deal showed up as term or whether it showed up as SaaS. What we pointed to is say, look, we've seen nice, healthy ARR growth, particularly strong SaaS ARR growth, which now represents like 60, 70% of our revenue, you know, two-thirds of our customers. That number is growing quite aggressively, like high 30s, not low 30s. We're like, we've got a very healthy growth business here, and it's probably best to measure it in ARR. Sounds like what we didn't get clarity around was what you should expect us to do as we guide you to where it's going. There was a little sense of, oh, I was looking for a little more.
We're like, oh, see, we felt like we kind of did the same thing this quarter as last quarter, but there was FX help last quarter. We tried to call that out too. It's on us. We're going to try to make sure we're more clear. I think if you look through the data there and you look at the cadence we established for a few quarters now of kind of a two-ish beat and a one-ish raise, plus or minus, if you extrapolate that for two more quarters, we end the year at like a 30-odd % ARR growth. There's not a lot of folks at a billion doing 30% ARR growth. I think we've got a pretty healthy business. It's coming at a time when we haven't yet capitalized on most of what we've just been talking about. None of those numbers include a dime for agentic yet.
None of those numbers include much for machine yet. That just got launched, and it's getting a really nice uptake, but it's still low single digits part of our overall revenue mix. We've got so much headroom in some of these emerging challenges and the companies we think are going to spend money with us to address them. Yet without that, we're still seeing a pretty healthy growth in the business. We're pretty bullish. It's on us. We're not conveying that maybe with enough clarity to all of you. We'll keep getting better every quarter.
Something you have seen a benefit from recently is the shift to more of a bundling and suite-based pricing model. As you talk about all these new things that you can add over the next couple of years with agents and just other functionality outside of PAM maybe, how do you think about what makes sense to include in those bundles versus what's going to be more of an add-on and just how that builds into what you think of as this identity platform longer term?
Yeah, so it's a really good question. Because first, platform, like so many software players, I think platform has potentially multiple meanings. One is kind of a technology platform thought where you have a whole bunch of shared services. ServiceNow did this way back in the day. A company out with that, Tivoli did this. You know, SailPoint's been doing it for a long time. A bunch of shared services, common data model, common policy engine, common, you know, identity store in our case. I'll call them blades, to use an old term, or slivers of application where you leverage all that underlying technology in your platform, which makes it faster and easier to deliver new value, right? One of the things we'll always look at is each sliver we've got something that should just be considered core or additive.
Today the core that we offer in our business suite is the two biggies in our space historically, which are compliance and lifecycle. Right? How do you run those audits or checks? How do you just manage the ongoing churn of your people and what they're accessing or your identities, whether they're people or not? Now we're finding that, okay, some of these things are going to become so common. Should we just drop them into the core offering and raise the price of the core offering? Should we continue to make them optional? The school of thought we're still in for the most part is there is such a heavy lift for most large complex enterprises to get their basics in place. We don't want to overburden them at that first contracting cycle with a whole bunch of stuff you probably won't get to for two or three years.
Let's get you what you need to get going. What we are finding is, you know, most of you are aware of this, we run a three-year contract cycle. We aren't in an annual or three-year cycle typically. We're finding more and more customers who come back to us in the middle of that three-year term to say, I'm ready for more. We're doing more and more upgrades in the cycle, if you will, additional sales. We pointed to this in the financials. We're every quarter now in a pretty nice mix of about half our new ARR is coming from new customers, new logos. Half is coming from existing. We put up again a nice, healthy 114% NRR again. We still talk about a GRR in the very high 90s. We don't lose much.
At the end of the day, we feel like we had a great base to work from. We are innovating faster now. We will deliver a few new offerings here at this conference in a couple of weeks. We are going to try to keep saying to the customer, there's a base here, and we want you to start with what you need to get going. The speed at which you add some of these capabilities may be dependent on how fast you can go. Instead of overburdening them with, here, here's everything you want all at once, the proverbial ELA of the last era of enterprise license, sometimes companies want that. Usually, they'd rather kind of pay for what they're using. That's kind of our approach.
As your conference comes up and as we think about some of the new product announcements you're going to have, how do you think in general about investing in your product stack right now, given the fact that there's a lot of debate in the software ecosystem about what employee interaction with SaaS applications is going to look like? We'd love your view on that.
Yeah, I like to say, oh, you've got to consider the source, right? I think it's Mr. McDermott who runs ServiceNow that says, oh, the whole world's going to be workflows. You might have a biased position on that. I think we have to be careful with what's being talked about about what's going to happen to the application environment. One of the things I've been saying to people, and I always get a little cocked head response, is there's some school that says it's just going to be a bunch of, you know, ChatGPT or whatever, whatever AI tool sitting on top of data. Quick question, where did all that data come from? What data? Like today, all that data comes through all the applications you run that do things like customer contracts and, you know, customer management and, you know, the software you're using.
There's a huge amount of data in most software companies, most businesses, I should say, sorry, that data came from all those business applications. Now we run all kinds of interesting analytics and try to understand that data and what's happening in our business. That data's got to come from somewhere. Do I think some of the things that we do today that got kind of statically embedded in applications, which might have been better left at very flexible workflows? I think some of that will be coming out. I do. There's a whole lot of business processes that are pretty standard and repeatable. It's not clear why you wouldn't just build that into a classic application. I try not to sound like the old guy. This is the way we do it. I think it's the way we do it.
I think there's a sense of some of that's going to migrate and some of it's not. The whole hype cycle, you know, our friends at Gartner, sometimes they do things that are interesting, sometimes less so. That hype cycle curve is a good one, right? We've kind of been in this hype cycle. AI is going to disrupt everything tomorrow. Half your employees should get a new job. I mean, we were saying that about two quarters ago. Now we're in the trough of disillusionment. I don't know if this is going to do anything. Oh yeah, it is. It's coming. I think we're going to come back up that curve to lots of things are going to be changing. They're going to change probably at a faster rate than we've seen in much else.
Is it going to take out half the jobs in America in a few years? No, I don't think it is. Is it going to change how people do their work? Increasingly so. Will it make them more productive? And therefore, will you need a few less people? Probably in some areas. I'd say walk into an auto manufacturing shop. We used to have those, there used to be hundreds of people making a car. Now there's a few people running a bunch of robots. All those people found other things to do over time. I think we'll find places where there's new roles, new needs, new activities. It's clearly going to be significantly disruptive, this technology.
I think we're trying to stay at the forefront of who's developing the tech, meaning the AIs and the LLMs, who's developing the apps and how are those evolving, what are our big, important strategic customers thinking, and make sure we're sitting in the center of all that with, okay, to help secure and manage all this infrastructure of identity and data, we should do this. That's where we're just, we're market-driven as a mindset.
Yeah, you're not actually the first person to bring up that Gartner report. It seems to cross a lot of the seats.
The hype cycle. It's an old Gartner. They have the two by two quadrants, they and BCG and everybody else, and they have the hype cycle. They have two. That's it.
Yeah. I'll ask one last question. The focus you have on large enterprises begs the question, TAM. Like that's new logo ads that kind of comes up.
That's the question.
Yeah, it comes up with investors all the time. How do you think, I'll ask in a bit of a different way, maybe how do you think about going down market to kind of increase that TAM over time outside of some of the other growth things we talked about?
We've started to say this, and maybe it'll be helpful. If you look at where ServiceNow was when it was around $1 billion in revenue, which is where we are, they had 3,000 customers. Nobody was yelling at ServiceNow, why aren't you going into SMB? I think you should just think about the number of large enterprises in the world for whom we are kind of the only good answer. There's a complexity level. We've identified by name 14,000 organizations around the world that we think represent good target customers for us. We are 14% penetrated into that list today. Before we worry a lot about SMB and go take on Microsoft, arguably, and Okta and some others on quote their turf, we're going to try to go win the other 86% of those. We won't get all of them. Of course we won't.
I think ServiceNow just now got to like 8,000 or 10,000 customers. CyberArk has like 12,000. ServiceNow is about 12 times bigger, 8 times, I don't know, sorry, my data's not good there. You can grow a pretty big, healthy business getting a lot of revenue from large complex organizations. Since we are particularly adept at that area, we think that's the smartest thing for you to do. We've gone to the, I call it the low end of the enterprise and made sure we're kind of defending that part of the landscape. Think a few thousand users is a not bad metaphor. Most people draw the SMB line as like 1,000 and under. That is not interesting to us. No offense. We will occasionally show up in a customer in that scale, usually because they're maybe a subsidiary that's super complex IT something.
In general, we're just not worried about that part of the landscape. People say, oh, but how will you build a big enough business? Reference ServiceNow. They built an $800 million, $900 million, $10 billion business with less than 10,000 customers. We think we're fine to grow a lot more of our business without worrying too much about the true SMB. We're going to be in the mid to low-end enterprise, but in the shops where complexity is a very large concern, and we have a uniquely good answer.
Thank you, Mark. Thank you. So many interesting ideas, and we really appreciate you taking the time to talk to us.
It's always fun to do this. Thank you all for listening.
Thank you.
Sometimes nobody even claps after.