chen bitan - s22.q4cdn.com

20
CHEN BITAN Chief Product Officer, General Manager Israel

Upload: others

Post on 24-Nov-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CHEN BITAN - s22.q4cdn.com

CHEN BITANChief Product Officer, General Manager Israel

Page 2: CHEN BITAN - s22.q4cdn.com

CAUTIONARY LANGUAGE CONCERNING FORWARD-LOOKING STATEMENTS

2

The presentations today contain forward-looking statements, which express the current beliefs and expectations of CyberArk’s (the “Company”)

management. In some cases, forward-looking statements may be identified by terminology such as “believe,” “may,” “estimate,” “continue,”

“anticipate,” “intend,” “should,” “plan,” “expect,” “predict,” “potential” or the negative of these terms or other similar expressions. Such statements

involve a number of known and unknown risks and uncertainties that could cause the Company’s future results, performance or achievements

to differ significantly from the results, performance or achievements expressed or implied by such forward-looking statements. Important factors

that could cause or contribute to such differences include risks relating to: the duration and scope of the COVID-19 pandemic and the impact of

the pandemic and actions taken in response, on global and regional economies and economic activity and the resulting impact on the demand

for the Company’s solutions and on its expected revenue growth rates and costs; the Company’s ability to adjust its operations in response to

impacts from the COVID-19 pandemic; difficulties predicting future financial results, including due to impacts from the COVID-19 pandemic; the

Company’s plan to begin actively transitioning its business to a recurring revenue model in 2021 and the Company’s ability to complete the

transition in the time frame expected; the Company’s ability to meet financial and operating targets during the transition period and after the

transition is complete; changes to the drivers of the Company’s growth; the Company’s ability to sell into existing and new industry verticals; the

Company’s sales cycles and multiple licensing models may cause results to fluctuate; the Company’s ability to sell into existing customers;

potential changes in the Company’s operating and net profit margins and the Company’s revenue growth rate; the Company’s ability to

successfully find, complete, fully integrate and achieve the expected benefits of future acquisitions, including the Company’s ability to integrate

and achieve the expected benefits of Idaptive; real or perceived shortcomings, defects or vulnerabilities in the Company’s solutions or internal

network systems; the Company’s ability to hire qualified personnel; the Company’s ability to expand its channel partnerships across existing

and new geographies; the Company’s ability to further diversify its product deployments and licensing options; and other factors discussed

under the heading “Risk Factors” in the Company’s most recent annual report on Form 20-F filed with the Securities and Exchange

Commission. Forward-looking statements in this release are made pursuant to the safe harbor provisions contained in the Private Securities

Litigation Reform Act of 1995. These forward-looking statements are made only as of the date hereof, and the Company undertakes no

obligation to update or revise the forward-looking statements, whether as a result of new information, future events or otherwise.

Page 3: CHEN BITAN - s22.q4cdn.com

AGENDA

3

• Market Trends

• Enterprise Use Case

• Identity Security Platform

• Innovation

Page 4: CHEN BITAN - s22.q4cdn.com

4

GROWTH INNOVATIONSUBSCRIPTION

TRANSITIONPROFITABILITY

Page 5: CHEN BITAN - s22.q4cdn.com

IDENTITY SECURITY MARKET TRENDS

5

Less Reliance

on Standing

Access

Least Privilege

Just-in-Time

Passwordless

PAMaaS and

IDaaS Adoption

is Accelerating

Rising adoption in

large enterprises

SaaS-first approach for

small to medium

enterprises

Privileged

Identities are

Expanding

Admins

DevOps

Apps/Robots

Third Party Vendors

Workforce

Identity is the

New Security

Perimeter

Rapid shift to remote work

has turbo-charged Zero

Trust initiatives

Identity Security services

increasingly viewed as

viable VPN alternative

Page 6: CHEN BITAN - s22.q4cdn.com

CYBERARK IDENTITY SECURITY PLATFORM VISION

6

SaaS

3rd Party

DevOps

Workforce

Apps / Robots

Admin

Security First | AI Enabled | Frictionless | Everywhere

CYBERARK IDENTITY SECURITY

Customers

On-Prem Apps and

Infrastructure

IaaS / PaaS

Provider

CyberArk SaaS

Identity Security Platform

Page 7: CHEN BITAN - s22.q4cdn.com

7

Access DevSecOps

Endpoint

Privilege

Manager

Customer

Identity

Workforce

Identity

Cloud

Entitlements

Manager

Vendor

Privileged

Access

Manager

Privileged

Access

Manager

Privilege

Workstations | Servers Cloud | On-Premises

Secrets

Manager

Conjur Enterprise

Open Source

IDENTITY SECURITY PLATFORM

Security First • AI-Enabled • Frictionless • Everywhere

Secrets

ManagerCredential Providers

Page 8: CHEN BITAN - s22.q4cdn.com

8

CYBERARK ADDRESSES MULTIPLE IDENTITY SECURITY REQUIREMENTS

8

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

On-Premises

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Page 9: CHEN BITAN - s22.q4cdn.com

9

PRIVILEGED ACCESS MANAGEMENT

Privileged

Access

Manager

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

On-Premises

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Page 10: CHEN BITAN - s22.q4cdn.com

10

PRIVILEGED THIRD PARTY REMOTE ACCESS

Vendor

PAM

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

On-Premises

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Page 11: CHEN BITAN - s22.q4cdn.com

11

ENDPOINT LEAST PRIVILEGE

Endpoint

Privilege

Manager

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

On-Premises

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Page 12: CHEN BITAN - s22.q4cdn.com

12

ACCESS MANAGEMENT MODERNIZATION

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Workforce

Identity

On-Premises

Page 13: CHEN BITAN - s22.q4cdn.com

13

SECRETS MANAGEMENT

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Secrets

Manager

On-Premises

Page 14: CHEN BITAN - s22.q4cdn.com

14

CLOUD PERMISSIONS DRIFT

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

On-Premises

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Cloud

Entitlements

Manager

Page 15: CHEN BITAN - s22.q4cdn.com

15

ZERO TRUST

Admins, DevOps, Workforce, Third Party

WorkstationsPeople

On-Premises

Application

Server

Database

ServerDomain Controller

Server

*NIX

Server

Windows

ServerIT OPS

Tools

Network

Devices

Robots

Mac Windows

Serverless

Cloud-Native Apps

Serverless

Containers &

Container Orchestration

PaaS

Serverless

VM’s &

Storage

VM’s &

Storage

IaaSSaaS

SaaS Apps

Page 16: CHEN BITAN - s22.q4cdn.com

IDENTITY SECURITY PLATFORM VISION

16

• Cloud native, serverless architecture

• Unified platform providing holistic end-user SaaS experience

• Shorter time-to-market for new SaaS solutions and future enhancements

Secrets

Store

Unified User

Management

Audit and

Reporting

Authentication

& Directory

Services

AI Powered

Analytics

Engine

Common

Policy &

Rules

Engine

API FIRST STANDARDS BASED

SH

AR

ED

SE

RV

ICE

S

CyberArk

Unified Agent

Adaptive &

Passwordless

Authentication

Endpoint

Privilege

Management

CyberArk

Connector

SSH & RDP

Gateway

Directory Gateway

RADIUS Gateway

SIEM Gateway

Web Gateway

Access

Service

UNIFIED USER EXPERIENCE

DevSecOps

Service

Privilege

Service

Page 17: CHEN BITAN - s22.q4cdn.com

CYBERARK SAAS JOURNEY

2016 2017 2018 2019 2020 2021 2022

Inorganic

Organic

Privilege Cloud

Remote Access Manager (formerly Alero)

Workforce & Customer Identity(formerly Idaptive)

Cloud Entitlements Manager

17

Endpoint Privilege Manager

Access | Privilege | DevSecOpsInnovation

Chart not drawn to scale. For informational purposes only and represents CyberArk’s current view of its innovation direction. The development, release, and timing, if and any, of any future innovation or product remains at our sole discretion.

Page 18: CHEN BITAN - s22.q4cdn.com

WELL POSITIONED FOR CONTINUOUS INNOVATION

18

Global

R&D Team

CyberArk

Research Lab

CyberArk

Innovation Lab

Page 19: CHEN BITAN - s22.q4cdn.com

19

WELL POSITIONED FOR GROWTH

Building a highly differentiated Identity Security

Platform anchored on securing Privileged Access

Investing in SaaS while continuing to address

on-premises PAM customer needs

Well positioned to address customer Identity

Security projects with current and future offerings

Page 20: CHEN BITAN - s22.q4cdn.com

THANK YOU