Logo of jester cap with thought bubble.

Image source: The Motley Fool.

Okta (OKTA -2.53%)
Q3 2024 Earnings Call
Nov 29, 2023, 5:00 p.m. ET

Contents:

  • Prepared Remarks
  • Questions and Answers
  • Call Participants

Prepared Remarks:

Dave Gennarelli

Hi, everybody. Welcome to Okta’s third-quarter fiscal year 2024 earnings webcast. I’m Dave Gennarelli, senior vice president of investor relations at Okta. With me in today’s meeting, we have Todd McKinnon, our chief executive officer and co-founder; and Brett Tighe, our chief financial officer.

Today’s meeting will include forward-looking statements pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995, including, but not limited to, statements regarding our financial outlook and market positioning. Forward-looking statements involve known and unknown risks and uncertainties that may bring about our actual results performance or achievements to be materially different from those expressed or implied by the forward-looking statements. Forward-looking statements represent our management’s beliefs and assumptions only as of the date made. Information on factors that could affect our financial results is included in our filings with the SEC from time to time, including the section titled Risk Factors in our previously filed Form 10-Q.

10 stocks we admire better than Okta
When our analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*

They just revealed what they believe are the ten best stocks for investors to buy right now… and Okta wasn’t one of them! That’s right — they think these 10 stocks are even better buys.

See the 10 stocks

*Stock Advisor returns as of November 29, 2023

In addition, during today’s meeting, we will converse non-GAAP financial measures. Though we may not state it explicitly during the meeting, all references to profitability are non-GAAP. These non-GAAP financial measures are in addition to and not a substitute for or superior to measures of financial performance prepared in accordance with GAAP. A reconciliation between GAAP and non-GAAP financial measures and a discussion of the limitations of using non-GAAP measures versus their closest GAAP equivalents is available in our earnings release.

You can also find more detailed information in our supplemental financial materials, which include trended financial statements and key metrics posted on our inflations website. In today’s meeting, we will quote a number of numeric or growth changes as well as converse our financial performance. And unless otherwise noted, each such reference represents a year-over-year comparison. Now, I’ll turn the meeting over to Todd McKinnon.

Todd?

Todd McKinnonChief Executive Officer and Co-Founder

Thanks, Dave, and thank you, everyone, for joining us this afternoon. We want to kick off this call by addressing what’s top of mind for everyone, so we’re trying a new format this quarter. In light of the new security blog we posted this morning, we felt it was important to get the earnings release and guidance out before the market opened as well. And around the same time that the earnings press release at the wire, we posted prepared remarks to the IR website, which contains some of my typical commentary around customer wins and other notable news from the quarter.

This new format allows me to spend more time discussing the new information while also leaving more time for Q&A. I want to start by summarizing the update we shared in a blog post this morning related to the October security incident involving our maintain case management system. Upon deeper analysis of the event, we determined that the threat actor obtained the contact information of our maintain portal users across a significant portion of our customers, including the names and email addresses of all Okta admins, except customers in our FedRAMP High and DoD IL-4 environments. While this information cannot be used to directly access an Okta environment and does not include user credentials or sensitive personal data, a threat actor may use the information for targeted phishing attempts.

With this more detailed information, we felt strongly that sharing this information will help our customers better protect themselves against an increased risk of phishing and social engineering attacks. We have engaged a digital forensics firm to verify our findings and currently expect that they will complete their analysis in mid-December. Once finalized, we will share the report with customers and publicly. Now, let me address what Okta is doing to better protect ourselves from security threats.

Over the years, we have dedicated significant resources toward securing our product environment. Given recent events, we recognize that we need to do more to better the security architecture of our broader operations. That includes the applications we use, the hardware we deploy, and the vendors we work with. Over the past few weeks, we have taken several steps to advance fortify our security posture.

We’ve initiated a hyper-focused security action strategize by rallying the entire organization as well as engaging with third-party security firms to fortify our team’s efforts. The stakes are high, and we will do whatever it takes to protect our current and future customers. Bolstering our security environment is, by far, the highest priority for Okta. The job of securing the Okta ecosystem will never be done.

But during this hyper-focused phase, no other project or even product development area is more important. In fact, the launch dates for the new products and features that we highlighted at Oktane last month will be pushed out approximately 90 days, the exception being Okta Privileged Access, which becomes generally available this week. Now, turning to our Q3 results. Top-line metrics were strong.

We continue to go through particular strength with large customers. Similar to the past few quarters, our fastest-growing cohort with customers with $1 million plus ACV with growth of over 40%. It was also a strong quarter for new and upsells across our public sector vertical. We also produced record non-GAAP operating profit and record free cash flow in the quarter as we continue to display the leverage in our model.

In other news, we’re thrilled that Jon Addison, who has been our interim CRO since the start of this fiscal year, has been appointed to the permanent position. With Jon’s appointment as CRO and our continued confidence in the go-to-market leadership team, we have closed the explore for a president of worldwide field operations. Okta is driven by our vision to free everyone to safely use any technology. The measures we’re taking to enhance the security of Okta and our ecosystem gives us confidence in our ability to proceed forward.

We will come out of this even stronger because Okta is the only modern platform for neutral and independent identity access management, governance, and now, privileged access. Before turning it over to Brett, I want to thank our employees for their tireless efforts. I want to thank our customers and partners who put their trust in Okta every day. I also thank everyone who supported us at Oktane last month, where we had over 4,000 people at the live event in San Francisco and over 19,000 viewing online.

And now, I’ll turn it to Brett to walk you through more details of our financial results and forward outlook.

Brett TigheChief Financial Officer

Thanks, Todd, and thank you, everyone, for joining us today. The actions we’ve taken over the past few quarters to drive efficiencies in our cost structure continue to yield impressive results. I’ll review our third-quarter results and our outlook, but first, I’ll start with some commentary on the macro environment. Macro headwinds while stabilized continue to impact our business.

Metrics that we use to gauge the macro environment, such as contract duration, average deal size, and pipeline mix were largely consistent with what we experienced in the first half of the year. Separately, we published the advisory regarding the recent security incident on October 20th, which was 11 days ago in the quarter. While business at the close of the quarter slowed somewhat, our overall financial performance in Q3 was strong. Turning to Q3 results.

Total revenue growth for the third quarter was 21%, driven by a 22% enhance in subscription revenue. Subscription revenue represented 97% of our total revenue. International revenue grew 20% and represented 21% of our total revenue. FX had a minor impact on total revenue growth, but was a two-point headwind to international revenue growth.

RPO, or subscription backlog grew 8%. The general shortening of contract term links signed over the past several quarters has impacted total RPO growth. Our overall average term length remains just over 2.5 years. Current RPO, which represents subscription backlog we expect to recognize as revenue over the next 12 months, grew 16% to $1.83 billion.

Turning to retention. Consistent with prior quarters, gross retention rates remained strong in the mid 90% range. Our dollar-based net retention rate for the trailing 12-month period remained strong at 115% and was driven by both upsell and cross-sell activities. Similar to the past few quarters, macro-related pressure resulted in smaller seat expansions than in previous years.

We believe this trend will persist in the current environment. The net retention rate may fluctuate from quarter to quarter as the mix of new business, renewals, and upsells fluctuates. As I’ve noted previously, we’ve experienced a macro-related shift in our business mix to more upsell and cross-sell versus new business. Before turning to expense items and profitability, I’ll point out that I’ll be discussing non-GAAP results unless otherwise noted.

Looking at operating expenses. Total operating expenses for the quarter were lower than expected. The better-than-expected profitability is due to the combination of revenue over performance and our continued focus on spend efficiency measures. Total headcount at the end of Q3 slightly increased sequentially to approximately 5,900.

Q3 free cash flow was a record $150 million, yielding a free cash flow margin of 26%. Free cash flow was significantly better than expected, driven by billings and strong collections. During the third quarter, we opportunistically repurchased $150 million of our 2026 convertible debt notes. This resulted in an $18 million GAAP-only gain.

Over the past three quarters, we’ve repurchased $900 million of debt resulting in a $91 million GAAP-only gain. We will continue to regularly evaluate our capital structure and capital allocation priorities. Our balance sheet remains strong, anchored by $2.13 billion in cash, cash equivalents, and short-term investments. Our cash, cash equivalents and short-term investments position net of remaining convertible debt is $820 million.

Now, let’s turn to our business outlook for Q4 and FY ’24 and a preliminary look at FY ’25. As always, we take a prudent approach to forward guidance. We are factoring in a stable but still challenging macro environment. We’re also factoring in the recent security incident.

For the fourth quarter of FY ’24, we expect total revenue of $585 million to $587 million, representing growth of 15%. Current RPO of $1.875 billion to $1.880 billion, representing growth of 11% to 12%; non-GAAP operating income of $102 million to $104 million, which yields a non-GAAP operating margin of 17% to 18%, and non-GAAP diluted net income per share of $0.50 to $0.51 assuming diluted weighted average shares outstanding of $180 million. For FY ’24, we are raising our revenue outlook by $30 million at the high end of the range. We now expect revenue of $2.243 billion to $2.245 billion, representing growth of 21%.

We are raising our outlook for non-GAAP operating income by $65 million at the high end to $283 million to $285 million, which yields a non-GAAP operating margin of 13%. Non-GAAP diluted net income per share is raised to $1.47 to $1.48, assuming diluted weighted average shares outstanding of $179 million. And we are raising our free cash flow margin outlook for FY ’24 to 19% from 15% previously. On a dollar basis, that’s a raise of over $90 million and sets us up to close the year achieving the govern of 40.

While we are still in the early phases of financial planning, we would admire to supply a preliminary view of FY ’25. I’ll reiterate that we are prudently factoring in a stable but challenging macro environment, as well as potential impacts from the recent security incident. We continue to focus on expense control and estimated non-GAAP operating margin of approximately 17%. We’re also targeting free cash flow margin to be at least 19%.

From a revenue perspective, we calculate total revenue to be in the range of $2.460 billion to $2.470 billion or growth of approximately 10%. We are applying a static 26% non-GAAP effective tax rate for FY ’24 and FY ’25. To wrap things up, we are confident that we’ve set the path of profitable growth for years to come. We continue to focus on initiatives to drive the top line while making significant progress to drive improvements to our operating and cash flow margins.

With that, I’ll turn it back over to Dave for Q&A. Dave?

Dave Gennarelli

Thanks, Brett. I see that there are quite a few hands raised already, so I’ll take them in order. And in the interest of time, please limit yourself to one question so that we can get to everyone. And then we’ll — you’re welcome queue back up for additional questions.

And with that, we’ll go to Brian Essex at JPMorgan.

Brian EssexJPMorgan Chase and Company — Analyst

Great. Thank you. And thank you for taking my question. I guess I’ll start off with the easy one, and that’s the preliminary fiscal ’25 outlook.

And I just want to ask you in the context of, I guess, taking into consideration two issues in particular. One would be the impact as you guys alluded to of the most recent breach on your pipeline, close rates, customer relationships. And the other would be, I guess, the need for you to better your relationship with channel partners in order to drive better growth. So, with regard to that preliminary outlook, how should we think about assumptions baked into that outlook, particularly as it relates to traction or churn with customers and contribution from partners considering these issues? And where in the spectrum of guidance being “kitchen-sinked” we consider this forecast to be?

Todd McKinnonChief Executive Officer and Co-Founder

Hey, Brian, thanks for the question, and thanks for jumping on the release this morning early before the market. That was a little bit atypical given the situations of the customer advisory, but we appreciate you covering and everyone else that covered it as well. We know it’s extra — something you weren’t planning for us. We appreciate it.

I’ll comment just on the business strategy behind the guidance. First of all, I think that might be helpful. The — we have — it’s very important, and it’s very clear to everyone at Okta that security is the top priority. We’ve prioritized securities at some level over the years.

And it’s been balanced with other priorities, growth, new product development and various things around the business. And those efforts, I’m simplifying a little bit, but often have gone into product security, infrastructure, making sure that was very, very solid. And we know now that we — that’s not good enough. We have to do more.

We know that Okta is one of the most targeted companies in the world because of the leadership position we have in this important market of identity access management, and that makes us, along with other cybersecurity companies, extremely targeted and relentlessly attacked. And we have to raise our game to be able to defend ourselves and our customers against those attacks. So, we’re really upping the level of priority, and it’s very clear to everyone at Okta that — for the end of this year and going into next year, that the No. 1 priority is securing Okta and securing our customers full stop.

And everything else is prioritized after that. And the second most — the No. 2 priority is — after security, is growth and profitable growth, profitably growing the business. And I think you see that reflected in the business strategy in terms of the direction we’re giving teams.

We have a 90-day all hands on deck in terms of focusing on bottoms-up ideas and security efforts across the company, getting help from outside industry experts, tops down to bolster our own experts. We’ve done this in various degrees over the years, but we’re really aggressively doing more of this to get all the best minds and best input on these opportunities and problems for us. We’re making sure that it’s not just of one-year or one-quarter change. It’s really a continued accelerated evolution of our cultural change to really being — having the culture of one of the most safeguard companies in the world.

recall, Okta started as a — it was — our focus was enabling technology and making it easy to adopt the cloud. It wasn’t necessarily started 15 years ago as a cyber company. Now, that changed a few years into the company, and it’s very clear to us now that — and has been for the last few years that the bar is the most safeguard company in the world, full stop. And so that’s the No.

1 priority, and that’s what we’re focused on. And then part of that, of course, is kind of the last pillar that we’re really focused on now, which is making sure the products themselves as customers use them, the actual security use cases on those products, are prioritized incredibly highly. A great example of that is making sure that when we think about managing access to privileged resources, we — with our new privileged access management product, making sure we prioritize and make it work great with our own Okta administration console because attackers are going after that because that’s such a valuable target. So, it’s a wholesale clear communication customers and to employees and to partners and investors that security is the top priority full stop, and we will stop at nothing to make sure we become one of the most safeguard companies of the world because it’s kind of clear to everyone that we’re short of where we need to be now, and we will fix that.

Brett TigheChief Financial Officer

I’ll just add a couple of comments there, Brian. Thanks for — one, nice to see you. Thanks for the question. But in terms of the guidance philosophy, really no difference from what we’ve done before.

I think we all know, for years now, we give this early look. It’s a prudent look. We’ve got five quarters to go. We’ve got a big Q4 ahead of us.

And so, we’re factoring in two major factors, admire I said a few minutes ago, which is around the macro and then also around the security incident and making sure we’re being prudent about the guidance at this point given how far out we are from the end of FY ’25.

Todd McKinnonChief Executive Officer and Co-Founder

On the — you asked a question, Brian, about the channel partners.

Brian EssexJPMorgan Chase and Company — Analyst

Yeah.

Todd McKinnonChief Executive Officer and Co-Founder

I think that’s — I would say that’s continued thread and a continuation of what we’ve been doing this year with our enhanced partner program and clarifying the partners we’re working with, investing on the ones that are really moving the needles, the things you’ve heard us talk about in previous calls. That’s an ongoing thing, and we’re continuing to execute on that and seeing benefits from that in the business.

Brian EssexJPMorgan Chase and Company — Analyst

Do you get the pipeline internally to hit that number without incremental improvement in partner contribution? Or how confident you’re with that 10% —

Todd McKinnonChief Executive Officer and Co-Founder

We’re very happy with where the pipeline is.

Brett TigheChief Financial Officer

Yeah. We’re confident in what we’ve given you guys today. admire I said, no change in the guidance philosophy.

Brian EssexJPMorgan Chase and Company — Analyst

Thank you.

Brett TigheChief Financial Officer

No problem.

Dave Gennarelli

Let’s go to Rob Owens at Piper.

Rob OwensPiper Sandler — Analyst

Great. Thanks for taking my question. I appreciate the transparency and disclosure around the breach and realizing these things can take on a life of their own as time passes. But I was curious more so what you’re doing for customers to wage concerns around the breach itself aside from pushing out some launch dates here.

And any proactive steps that you’re taking to help future retention? Thanks.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. I’ve been — I’ve had many, many conversations with customers over the last few weeks as you can visualize, and the reactions vary. Some are from, “Thanks for the update. We appreciate the communication,” to the other extreme, which is a lot of frustration and concern.

The common thread or the common theme is that we’re incredibly important to our customers, and they’re relying on us for their critical infrastructure of their customer identity or their workforce identity. So, it really matters. And the first thing they want to know is that do we know how important this is. And are we taking these things seriously, do we have the right strategize in place to react to these things and get better going forward? And when I talk to them, the themes that resonate are really clear priority, comprehensive look at all the threats and all the opportunities across product and infrastructure, making sure the cultural tone from the top is set appropriately, and I can do that in a way no one else in the company can do.

So, I’m very clear about that. And then the last thing I talked about before is how the products can help them be more safeguard because this all is about the foundation for their security. And once that foundation is solid, then they can use our products to be — to advance boost their own security. So, I think to your specific question about what we’re doing specifically, I think it’s — part of it is being open and transparent.

One of the reasons why we thought this most recent disclosure to the one we did yesterday and then publicly this morning is that, when we talk to customers, the No. 1 thing they want is transparency. And they want to know, as soon as possible, what is the risk enhance, what are the threats? And our commitment on our journey to be one of the most safeguard companies in the world is to make sure we achieve that commitment and make sure we’re open and transparent and disclose all the information we have. So, I know it seems a little strange right now.

But in some ways, what we did yesterday and today are executing on this strategize and this commitment we’ve made to them. And then I think there’s many more things we can do in terms of just making sure customers comprehend what happened and what we’re doing about it, and you’ll see us do more about these — toward these communication efforts going forward. But at the end of the day, I was talking to — I have — I was talking — one of my conversations I was with a CFI of a large manufacturing company that’s been heavily adopted on Okta, and this is common to how these things go. He said, Todd, this — you are — “The position you are in the ecosystem in the industry, you are one of the most attacked and focused on from an adversarial perspective companies in the world.

And we know that if you take this as seriously as you’re saying you do and you have these plans and these priorities in place to better, your making sure you’re one of the most safeguard companies in the world, that’s going to be more than enough for what we need because you’re going to be attacked way more than we ever will.” And so, I think they see it as, once we transmit the details once they can comprehend our plans and our priority and our focus, they come away with more comfort. But again, at the end of the day, what they really want is no issues admire this, and that’s ultimately our goal to try to impede these whenever possible.

Rob OwensPiper Sandler — Analyst

Thanks for the color, Todd.

Dave Gennarelli

Yeah. Let’s go to Adam Tindle at Raymond James.

Adam TindleRaymond James — Analyst

Thanks, Dave. Hey, Todd, I wanted to ask a little bit more about the renewal process in light of the security incident. Brett mentioned that contract duration continues to shorten. So, the thought would be the renewal process is likely happening more frequently moving forward.

I wonder what kind of processes you have in place to retain customers. And any ideas that Jon brings to the CRO role to this process? And, Brett, if you could just touch on the assumptions on gross retention and NRR embedded. I know you’re factoring in the security incident, but I would visualize that’s where it’s going to hit the most, so that would be really helpful to comprehend what the assets embedded are. Thanks.

Todd McKinnonChief Executive Officer and Co-Founder

The renewals process and execution of that is something where it’s a very mature part of the company and we’re very good at it. I think it leads to our — as we’ve talked about several times, the gross retention in the mid-90s is a healthy level. And it’s — so, it’s a strong muscle we have. Contract durations, as Brett mentioned, have been shortening.

I think it’s — they’re still on average, 2.5 years. And the reason they’re shortening is this started happening during some of the more economic slowdowns last year. It’s just — I think across the board, people are not signing up for as much as they — in terms of length of subscription as they wanted to. So, I think that the renewals conversation will continue to be addressed effectively by our existing motion that we don’t need some kind of new motion or new conversation.

I think it comes down to making sure that the adoption of the product is high, which we’re very good at getting our products adopted and making sure that the value is being delivered and that the price they’re being charged for is fair. So, there’ll definitely be some as we just transmit to customers about our prioritization of security and our focus on and our execution across that strategize, that will be funneled down to the renewals team as well. But I don’t see any big changes to the overall renewal motion because of this.

Brett TigheChief Financial Officer

Yes. I can also add on to that, Adam. Thank you for the question. So, first on the contract duration, just to be clear, there’s been a general shortening of contracts to what Todd was talking about.

But part of the reason is actually the success we’ve had in public sector, which typically is only a one-year contract. So, that business is doing well is going to put a headwind on our contract duration. So, I guess that’s a good issue to have in terms of contract duration. So, in terms of what we baked into the guidance for specifically NRR, net retention rate or gross retention rate in FY ’25, we haven’t gotten to that level of detail given we’re so early in the planning process.

But what I would say is we do believe both the macro puts a headwind on growth and also the security incident. So, where each of them comes through, I mean, macro, we’ve talked about new business seat expansions being impacted there. From the security incident perspective, we think growth is impacted. I can’t give you exactly, is it more upsell or is it more gross retention in terms of FY ’25? But what I can tell you is, in terms of FY ’24, admire we’ve talked about in the past, we did expect that number to tick down.

Net retention is going to tick down throughout the balance of this fiscal year. And we had a nice quarter in Q3, 115%, flat with Q2. So, we do still expect it to drop in Q4 based on those macro headwinds we’ve talked about with seat expansions, but that hopefully helps you with a little bit more detail on how we’re thinking about FY ’25 as well as our net retention rate in the very near term next quarter.

Dave Gennarelli

Next, go to Rudy Kessinger at D.A. Davidson.

Rudy KessingerD.A. Davidson — Analyst

Great. Thanks for taking my question and appreciate the candor as it relates to the breach. Todd, Oktane, it seemed pretty clear that you were hinting that you guys were close to hiring a new president of worldwide field operations or head of sales. And today, I know you’re closing that explore, you’re moving Jon into the permanent role.

So, I guess I just a couple of clarifications. Did the breach impact your ability to land a new head of sales at all? And secondly, just understanding the current structure, is Jon going to be taking on both the head of sales and chief revenue officer roles, or will you be remaining, I guess, the head of sales for the time being?

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. Thanks for asking for clarification on the previous question. I forgot to answer the part about Jon. The decision for the go-to-market structure was finalized before October 20th.

So, it was finalized in early October. So, it had nothing to do with the security incident. The — I think there were — since the explore started in January of this year, late January, the timeline on it was we were going to make a decision to finalize things by October, and we hit our timeline. So, we didn’t want to have an interim structure going into planning for FY ’25.

So, the goal is to finish it by the end of October. We — I can’t recall exactly the order of operations in terms of when the final decision was made versus when I made those comments. But what I knew at the time for sure is that we were going to finalize one of our finalist candidates and Jon being one of those finalist candidates. We were going to finalize it soon and be ready to roll in our original plan, which was, admire I said, to wrap it up in October.

The decision came down to a few things. One is that the — I think that Jon is — I talked to dozens and dozens of candidates interviewed and looked everywhere and different levels of go through and backgrounds. And every person I talked to, that the person doing the job was outperforming them. Jon was doing a great job.

I was with them in customer meetings around the world. I was, more importantly, talking about strategy going forward and understanding his strategic vision and his familiarity with the market and areas around the world and with the product segments and the identity industry. And he would just really shine brightly. It was admire a nine-month job interview.

And it really — they kind of made it hard for other candidates to differentiate. And I think — so, once I made the decision that he was the right guy to be the chief revenue officer, I also made the decision that I really admire the current structure of business operations under Eugenio as the president of business operations, global business operations. The marketing function under one of our strongest operational executives, Eric Kelleher, and then Jon running sales and presales and partners reporting directly to me. So, basically, the flatter organizational structure where I have direct — the business operations, customer success, our customer — chief customer officer marketing; and then chief revenue reporting directly to me, it was the best thing for us going forward.

So, there’s really two decisions. It was who’s the best chief revenue officer in the world. And then do we need that extra layer of a president? And the best thing for Okta for the future is to finish out the explore for president and have these talented capable people in place that’ll drive us forward.

Dave Gennarelli

Great. Let’s go to Hamza at Morgan Stanley.

Hamza FodderwalaMorgan Stanley — Analyst

Hi. Thanks for taking my question. Todd, on a high level, could you speak to the switching costs of your products? And based on your very early conversations, would you foresee some customer churn as a result of the incident?

Todd McKinnonChief Executive Officer and Co-Founder

I think the switching costs vary. And it’s — one of the great things about both the customer identity products and the workforce identity products are that you can — they’re very flexible. You can execute them very quickly and easily. And then you can also execute them in a way that’s quite comprehensive and connected to everything and very complete and cover every technology and every resource in the customer’s environment.

So, the switching costs vary. I mean there are companies that have a relatively light implementation, and the switching costs are pretty low. And then there are implementations that are very deep and broad and lots of custom integrations and so forth, and the switching costs are higher. So, I think it varies.

I don’t — I think there’s various reasons why people switch off. And I think it’s pretty hard. And it’s always in customers that are less likely adopted and have lower switching costs, which is — seems pretty obvious, but that’s true. And I think — I think we’re — we’ve seen some people switching off for various reasons.

Sometimes it’s admire we’ve said, our gross retention is mid-90s, but so that means by definition, there’s some percentage that are switching off. Various reasons for doing that. And I think at the end of the day, it’s going to be hard to directly ascribe it to one thing. So, I think we’re just trying to make customers successful and supply huge value in the products.

And our strategy of a converged platform on the workforce side and covering every identity use case with customer and workforce — and we have, I think, prudent assumptions in the forward guide about what is baking in security incident or baking in macro. We’re comfortable with that guidance, and we’re going to go out there and execute our strategize. And I think it’s going to be — in the long term, we’re going to show a lot of success and deliver a lot of value to customers. And that’s going to drive success across the board.

Hamza FodderwalaMorgan Stanley — Analyst

Thank you.

Dave Gennarelli

We’ll go to Joe Gallo at Jefferies.

Joe GalloJefferies — Analyst

Hey, guys, thanks for the question. Impressive margin performance this quarter and guidance next year, can you just advance unpack the drivers of leverage there? And then just talk through whether that inhibits the growth algo at all. And then just maybe whether — how you think about longer-term growth? Do these margins kind of contemplate a new reality of potentially a lower long-term sustainable growth? Thanks.

Brett TigheChief Financial Officer

Thanks, Joe. Nice to see you. So, in terms of the — how we’re achieving this, this is really something we’ve been working on for probably about 18 months at this point. And if you recall, last year, we started this cost structure efficiency, whether it be from moving headcount to lower-cost regions or rationalizing software, rationalizing real estate.

It’s been a longtime effort for us to be able to really set up the structure to be able to deliver these types of margins. I’m really excited that actually we can talk about govern of 40 this year because that’s how we look at the business and handle the business and kind of think about it from the lens of growth versus profitability. But ultimately, all this hard work is allowing us to offer up and guide with confidence these margins that you see in the FY ’25 guidance, 17% non-GAAP operating margin, at least 19% free cash flow margin. And so, that’s a really good shift for us.

We’ve set up that structure to be able to drive that efficiency, drive the leverage in the business. And as far as growth versus margin, we’re always going to balance the two and ultimately look to balance the two. So, I can’t give you anything beyond FY ’25, but we’re always going to handle the business through that lens of the govern of 40, something we’re very proud of that we feel we can reach this year, and we’ll always target as we — as we proceed forward into FY ’25 and beyond. It’s something we really kind of pride ourselves on doing overall.

Joe GalloJefferies — Analyst

Thank you.

Dave Gennarelli

Next up, we’re actually going to go to Madeline Brooks at BofA. She got knocked out of the queue and just putting her back in the spot here.

Madeline BrooksBank of America Merrill Lynch — Analyst

Thanks so much, Dave. Appreciate it. And just appreciate the transparency of your remarks. And I know people have said that, but I just really want to emphasize that.

So, the question is, if I look at what happened this quarter, my quick math implies that roughly 99% of net new CRPO came from the existing phase. As a two-parter, across tiers, those numbers begin to kind of turn positive again with contributions from net new customers increasing post macro. So, the first part is why do you think the trend in your numbers is different than other cyber peers? And the second part is, is there concern that heading into next year, the existing customer base will already be saturated leaving less room for upside, especially with this 90-day push out of new products and the potential headwind from the new biz given the recent security event?

Brett TigheChief Financial Officer

Sorry, Madeline. You broke up a little bit on me, but I think you were saying the mix on CRPO was related more to upsell versus new business? Is that —

Todd McKinnonChief Executive Officer and Co-Founder

She said she calculated 90% of the CRPO came from existing ones.

Brett TigheChief Financial Officer

Yeah. OK. Yes, I can’t say that I have that number to hand, Madeline. But what I will say is, as we’ve talked about in the past, our mix of business has shifted more toward upsells.

We believe that’s related directly to the macro side of the house, really putting pressure on new business. And so, I think that’s why you’re seeing those numbers. I think we had a nice quarter from a new customer adds. Net adds was up 400.

You heard Todd talk about the $1 million customers. Greater than 100k customers had a nice addition as well, an enhance sequentially versus Q2. So, we do see new business helping us out, but we do see a headwind there due to the macro headwinds that, although have stabilize, still our headwind to our growth in the business.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. And one thing I can add there, hopefully it’s helpful, is the new products. We have with — we have three amazing products to sell our existing customers. I mean, some customers have customer identity, but we still have a lot of customers to sell customer identity to.

And then we have many, many customers to sell Okta and new governance too. That thing is just starting to roll. It’s had some early success, but it’s been GA a little over a year now, starting to get a ton of traction. We had a couple of really important deals with the one I mentioned in my comments that we posted at the site was a global pharmaceutical company had a big OIG upsell and then the new GA of PAM.

So, I don’t — I think we have a ton of new products from the pipeline to sell our customers, and that’s what we’re making sure we operationalize those newer products and execute well in selling those. And I think the 90-day delay on some of the new products could potentially be impactful at some point, but we’re not short of products for FY ’24 for sure — or sorry, FY ’25 for sure.

Madeline BrooksBank of America Merrill Lynch — Analyst

Got it. Thanks so much.

Dave Gennarelli

Let’s go to Eric Heath at KeyBanc.

Eric HeathKeyBanc Capital Markets — Analyst

Hey, Dave. Thank you. So, Todd, it’s great to see PAM’s getting rolled out this week. I guess kind of two parts to the PAM opportunity.

So, one, just what learnings can you draw from OIG to relay that into some similar early success into PAM, number one? And then number two, just given PAM can be used to protect the customers on Okta environment, is this something that you could potentially make available to customers at no extra charge just as it relates to protecting our own Okta environment?

Todd McKinnonChief Executive Officer and Co-Founder

I think there’s — we’re really excited about privileged access. And I think the biggest — I think there’s a couple lessons from OIG that are just, I would call them, independent of any product area. So, just new product introductions across the board, things admire best practices to — when to enable broadly, when do enable different segments of the market? admire one of the learnings from OIG was that it’s having much more success in larger enterprises than we expected. And so, I think we’ll roll that learning to PAM, and we’ll enable the larger enterprise sellers sooner than we did with OIG because we foresee that it could have the same phenomenon and exceed our expectations in larger enterprise.

Another interesting phenomenon for OIG was that OIG is exceeding our expectations in kind of, call them, brownfield environments where they already have an existing governance solution. So, we’ll bring those lendings to the PAM product as well. On the product direction, one area that is through the early access phase and now that we proceed into GA, one of the learnings on the product directions is that customers — the product’s main focus has been through the limited — or sorry, through the early access has been on servers, so Linux and Windows servers, Kubernetes clusters managing access to these things, these kind of infrastructure-type resources. Customers find a lot of value in having us handle the privileged accounts in SaaS apps.

So, we’re connected to Salesforce. We’re connected to Workday. We’re connected to GitHub, managed the privileged accounts in there. So, that’s an exciting direction.

And as you mentioned, what is one of the most critical privileged account systems in the world, it’s Okta admin console. So, we’re exploring ideas to better blend that, and that’s going to be a big focus. And your idea about offering it for free to every Okta customer is a very interesting one. And this might be the first time ever I’ve taken product input on an earnings call, but I do take it.

Dave Gennarelli

Great. Next, let’s go to Gray Powell at BTIG.

Gray PowellBTIG — Analyst

OK. Great. Thanks for taking the questions. So, yes, I guess, kind of a modeling question here.

Normally, I would expect sequential growth in CRPO in Q3 to be at a similar level to that of what you’ve seen in Q2. At least that’s what you’ve seen the last couple of years. This year, you added 54 million in net new CRPO — last quarter, you added 71 million. So, I know this is kind of rough, but admire — is it safe to say that the main difference there was the breach happening with admire 10 or 11 days left in the quarter and then customers just taking a pause? Or is there something else that I should be thinking of? And then the other part of the question would be, as we think of Q4 trends, admire how much of a hangover is there? How much should we expect the lingering impact of the breach to be on conversations with customers?

Brett TigheChief Financial Officer

Yes. Thanks, Gray. So, from a sequential perspective, I think I wouldn’t do that math in terms of backing into the impact associated with the incident. I would more think about renewals timing, that can have a heavy impact on CRPO quarter to quarter.

So, we feel we had a really nice quarter in terms of Q3 growing 16%, $1.83 billion in current RPO. So, I wouldn’t read too much detail into that. In terms of Q4, all of it’s baked in. All of what we think the potential impact is associated with the security incident that in the guidance that we’ve given you here today, 11% to 12% and $1.88 billion at the top end of the range.

So, that’s kind of how we think about things.

Gray PowellBTIG — Analyst

All right. Fair enough. Thank you.

Brett TigheChief Financial Officer

No problem.

Dave Gennarelli

We’ll go to Peter Weed at Bernstein.

Peter WeedBernstein — Analyst

Thank you. It looks admire the change in your anticipated growth in Quarter 4 came down relative to what you implied last quarter by almost 3 percentage points. And I think you’ve said that this is the impact of the outage. Is that experiential? In other words, admire there are some things that you’ve already seen occur that are leading you to believe that you will definitely see that.

And is that turning up in customers that are kind of showing that they’re going to leave? Is it people are failing to upgrade at the pace that they have been before is that it’s harder to win new customers, you foresee — you had a really nice quarter actually, getting new customers, sequentially up. Do you foresee that to take a dive? I’m trying to figure out admire where that shows up kind of in the stack of where you would have normally thought that kind of sequential growth quarter over quarter that seems to have been kind of eliminated as a result of the outage?

Brett TigheChief Financial Officer

Yeah, the incident. So, if you look at every quarter, Peter, there’s always deals that push from quarter to quarter. It’s just a natural part of our business. We saw an elevated level of that, and we ascribe that potentially could be related to the security incident.

So, we’re taking that into our guidance when we think about Q4 and thinking about it from a prudent perspective, especially given how big the number can be in Q4 and setting the trajectory for fiscal year ’25. So, that’s how we’re thinking about things.

Peter WeedBernstein — Analyst

So, it’s actually more just, there are deals that stayed in the pipeline, but you just foresee they may push out of this quarter into the next quarter.

Brett TigheChief Financial Officer

Yeah. I mean we did see —

Peter WeedBernstein — Analyst

But I think already, from Q3 into Q4, wouldn’t that admire give you deals that would be closing in this quarter that should plug some of that gap. So, you’d have to really push out a lot of deals out of Q4 and to Q1 at that point.

Brett TigheChief Financial Officer

Yes. And you’re right, we actually have already seen some of those deals close in Q4, which is a good sign, but we’re being prudent given the environment out there today, given both the macro and the impact associated with the security incidents. So, we’re just being thoughtful.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. I mean, if you think about the chronology of it, it’s 11 days left in the quarter, and then we’re only just a month into the fourth quarter. So, — we — in terms of the window to see the impact, we’re a little bit limited on a window to see the impact. So, I think that drives some of the pragmatism in the guide.

Brett TigheChief Financial Officer

Yep.

Dave Gennarelli

All right. Let’s go to Adam Borg at Stifel.

Adam BorgStifel Financial Corp. — Analyst

Awesome. Thanks so much for the question. Maybe a bigger-picture question here. So, international is still about 20%, 21% of the mix.

And just given the size of the company, just seems admire there’s a lot of international opportunity ahead. So, just as you think about the channel investments and you think about the new CRO and CMO in place, what are the thoughts about kind of accelerating opportunity in the international theater to potentially help expedite growth? Thanks.

Todd McKinnonChief Executive Officer and Co-Founder

I think it’s a big opportunity. I do think from a macro perspective in terms of the stabilized macro but still a challenging macro. I think the macro impact internationally has probably been more pronounced from my observation than in North America over the last year or so. We also have — in terms of the interim to permanent CRO with Jon, that also gives us the opportunity to backfill Jon as the general manager of Europe, and we have some candidates in the late-stage pipeline for that.

So, that’s more leadership stability internationally. Couple that with a great leadership team in Asia Pacific, which is performing well, you have a really good opportunity for solid performance internationally, which is — has to be an important part of our future. If you just look at the numbers, the market is — half the market is probably outside the U.S. over time in terms of identity management.

We’re using rough numbers. And over the next five to 10 years, we’re going to make sure we get that mix higher than it is now in terms of a percentage of revenue.

Brett TigheChief Financial Officer

I’d also add, just Jon being an international person himself, admire he brings that lens, right? And so, we’re really excited about that and the opportunity out in front of us. Because I agree with Todd, we’ve got a lot of opportunity internationally.

Adam BorgStifel Financial Corp. — Analyst

Awesome. Thanks so much.

Dave Gennarelli

OK. Next up is Matt Hedberg at RBC.

Matt HedbergRBC Capital Markets — Analyst

Great. Todd, a product question. In your prepared remarks, you noted you’re pleasantly surprised, I think, by the size of organizations adopting your identity governance products. I think a year ago, it probably would have surprised a lot of us.

I think we would have thought maybe some of the traction would have been from smaller organizations or midsized organizations. So, I guess maybe why the success up market do you think at this point? And then, Brett, when you think about the impact to — from governance in your ’25 outlook, I assume you’re taking a very modest approach, but just thoughts on how you’re thinking about that product next year.

Todd McKinnonChief Executive Officer and Co-Founder

The — I just think that large organizations have — there’s a lot of complexity. And I think maybe we underestimated the ability — I think we looked at some of these larger organizations and what they were doing with the existing governance solutions, and we assumed that they were — these solutions were covering the SAPs, the Oracle apps, the legacy apps and assuming that they would also be covering all the cloud stuff and all the new stuff. I think that assumption is just proving to be maybe not as accurate as we thought. I think a lot of these legacy products aren’t covering where the center of gravity is moving, which is cloud-centric application workloads and cloud infrastructure.

And so, the product is a better fit for these large companies than we thought. I think also just our overall — the last call it five or six quarters when the macro environment changed, you’re just seeing more success for Okta in the bigger companies. So, I think it’s — I think OIG has a big future and mid enterprise and SMB. But I think that segment is just the slower segment right now.

So, we’re not seeing the attaches with OIG there that we could over time. So, I think your — it looks better because more people are — have the problem and finding value from it in a large enterprise and also large enterprise is just doing so well with 40% growth in that cohort, both in ACV of those deals and in customer kind of those deals in Q3. So, I think attaching OIG — there’s more opportunities to attach there relative to the entire business. So, I think that’s influencing the perception as well.

Brett TigheChief Financial Officer

Yeah. And I would add, although we’re very excited about the progress so far, Matt, I mean, yes, we are being modest with our expectations in the guidance we’ve given you here today. One thing that I know you guys have asked in the past is how much — and we’ve told you, we keep telling we’re going to update every time we get a new number. But that third of workforce spend being IGA continues to hold steady through the end of Q3.

So, that’s the number we’ve given you in the past, and it continues to be that. So, the upsell associated with it is significant, and we’re very pleased with how things are going, just admire Todd said.

Dave Gennarelli

Great. Next up, Jonathan Ho at William Blair.

Jonathan HoWilliam Blair — Analyst

Hi. Good afternoon. With regards to the breach, can you give us a little bit more detail on maybe what’s still left in the third-party validation and investigation? And how confident are you that this is going to be the last finding that comes out of this investigation? Thank you.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. It’s a great question, Jonathan. In my many, many conversations with customers, this comes up admire speed of disclosure, and they want to know all the information as fast as possible and why does disclosure take time and what else is left to disclose, etc. So, it is on everyone’s mind, obviously.

I think the general philosophy we’re taking is that we’re trying to disclose as much as we know as quickly as possible. I think a couple of weeks after — a couple of weeks after the incident when we had our first disclosure, we disclosed everything we knew at the time. And we just kept looking. You’re talking about the log files from our maintain system were quite voluminous, and the team went over them click by click, row by row, line by line, kind of took first pass and looked at all the things they thought were incredibly sensitive and took a quick run of some of these reports and found it wasn’t much interesting data and then published the first RCA and remediation steps.

And then, admire a good security company would, kept looking and kept digging and made sure we had everything covered and found more. And we were more thorough about these reports and ran completely and saw the data was there and made the decision to do a advance disclosure based on risk of phishing admire we’ve outlined. And so, I think the way I characterize it is now, our internal team has gone over it many, many times, and our internal investigation is done. admire we don’t think there’s anything else productively we can look at.

We’ve worked with the vendor and got supplemental logs. We’ve come through it. We’ve done everything three, four, five times to check it. But we still want to make sure we cover all the bases, so we brought on this firm that has started a couple of weeks ago, and they’re looking at it.

I think we’re doing it. Obviously, to be very thorough and clear, I think it’s a relatively low priority that they’ll find anything additionally, but we’ll have to foresee and see in mid-December when they were done with their analysis.

Dave Gennarelli

OK. I’d admire to welcome back Fatima Boolani from Citi.

Fatima BoolaniCiti — Analyst

Thank you. I appreciate the question. Todd, you were very categorical about securing Okta. So, your customers are safeguard as being the No.

1 priority. So, the question for you is, is that a people, process, or technology, or maybe all-of-the-above conversation? And then maybe to Brett, it’s not immediately apparent in your margin guidance that you’re going to be taking and making these investments. So, can you just sort of help us comprehend and kind of what envelope a lot of this up-leveling and reinforcing of your internal security architecture, what shape or form is that going to take?

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. It’s a super insightful question, Fatima. The — it’s — and as you guessed, it’s all of the above. And I think we — the program internally is called program bedrock, building the bedrock foundation.

And it has four pillars. I’ll call them pillars. The first one is there’s just bottoms up get all the ideas on the table of everything we know that the team thinks would be great ideas to make us the most safeguard company in the world. And admire a good example of something from this pillar is admire this thing that we’re advising customers to do with the latest notification around having MFA for all administrator accounts.

That really should be required. There shouldn’t be an option to not. Again, over the years, we, in some cases, made the choice for convenience and speed of implementation or frictionless adoption instead of security. But as we march toward being the most or one of the most safeguard companies in the world, that’s going to change.

So, we have to make that required, and you got to work through that because there’s a reason sometimes customers don’t have MFA required. Maybe it’s a service account. Maybe there’s a specific workflow. But everyone, as we do this bottoms-up effort, it’s admire a lot of good ideas on how we can make that better.

And that whole bucket of bottoms up, we have a lot of awesome smart people on the team that have the time and space now to let those ideas come out, and they’re going to — we’re going to have time and space to execute them as well. So, that’s the bottoms-up track. The second track is really, call it, tops down, which is making sure from an internal security architecture perspective, specifically in overall business operations and IT operations as inclusive of obviously product and infrastructure, but getting the top experts in the world and to give us their opinion on how we should be architecting our — this part of our security posture and architecture. And there’s people that do this for the most safeguard companies in the world, and we want to take those experts and combine them with our experts internally to make sure we have the best security blueprint from an architectural perspective.

So, we have bottoms up. We have tops down. And then the third pillar is really cultural. And that starts with me and the leadership team in setting this clear priority and setting the expectation that we are going to be the most — our goal is to be one of the most safeguard companies in the world, and we’re going to prioritize that, number one.

When you think about executing well, it can be pretty straightforward. It’s admire you have to make sure you have a clear vision. We want to be one of the most safeguard companies in the world. We want — you got to set clear priority and get the right amount of resources on it.

And that kind of sets up this cultural component to be successful. And then the last one is, I think I mentioned before, is in the product. We have to make sure that the products themselves are beyond just being valuable and powerful for our customers. They have to be built in a way that ensures the security of our customers as well.

And the best example for this is, after the notification of this incident in October, we quickly implemented this feature, which actually cryptographically binds an administrator console session to a specific network. So, this is the kind of thing that is very valuable for customers and keeps them safeguard. And as we think about it more and go through the entire product architecture and overview, there’s many more of these things that can put us closer to being, from a product perspective and products that protect our customers and their use of it and their deployments of it, the most safeguard company in the world. And that’s the fourth pillar.

So, it’s quite comprehensive. The — I think the 90-day focus gives everyone’s space and clarity to have no confusion about this being the priority. And I think after 90 days, what you’ll see is obviously these kind of efforts have — they’ve been going on in some shape or form for many years, and they will continue after these 90 days. But right now, we just need this real clear alignment on getting ourselves closer to that goal of being the most safeguard company in the world.

Fatima BoolaniCiti — Analyst

Appreciate that. Thank you, Todd.

Brett TigheChief Financial Officer

And then for the second part of your question, Fatima, it’s — really, there’s two things. One, we’re already investing a good amount in FY ’24. So, to step up in the margins, it’s not admire we’re starting at zero. So, we’re investing a good amount right now.

We’re going to invest more in Q4. But this is one of the benefits of the structural efficiencies that we found and driven over the last 12 to 18 months. It allows us to extend the non-GAAP operating margin from 13% to 17% while also investing more into these critical areas admire security. And so, we’ve invested a lot already.

We’re going to invest even more in FY ’25 but while also being able to balance it with the margin that you mentioned. So, it’s one of those benefits of us doing what we’ve been working so hard on for the last 12 to 18 months.

Fatima BoolaniCiti — Analyst

Thank you, Brett.

Brett TigheChief Financial Officer

No problem.

Dave Gennarelli

OK. We’re going to try to get to a couple more. Let’s go to Josh Tilton at Wolfe Research.

Josh TiltonWolfe Research — Analyst

Hey, guys. Can you hear me?

Todd McKinnonChief Executive Officer and Co-Founder

Loud and clear, Josh.

Josh TiltonWolfe Research — Analyst

All right, great. I wanted to explain a previous question. Does the guidance for Q4 embed some conservatism around the recent incident because you are anticipating to see something or because you are already seeing an impact. And then just a follow-up is, Todd, you mentioned that you spoke to customers, and they kind of comprehend why, as an identity provider, you guys are being targeted by hackers so much.

Is that raising any questions from the customer base as to whether or not it makes sense to go all in with all of your identity needs from one provider? Or given that you guys are the center of the security ecosystem and the No. 1 target for hackers, does it maybe make sense to diversify some of your identity risk across a different PAM vendor and a different governance provider?

Brett TigheChief Financial Officer

Josh, I’ll take the first part. So, anticipating is the answer, short answer since we’re running out of time. Because we did see, admire I said earlier, an elevated amount of pushes or deal pushes from Q3 into Q4. and so, we’re just anticipating that as we go through the quarter because, as a reminder to everybody, we do not have a linear bookings quarter.

It is very back-end weighted. And so, we’re just taking into account what we saw at the end of Q3 and looking and making sure we had put that into our expectations for Q4.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. And on the question on the — getting everything from one vendor versus spreading out your risk with different vendors, I think it comes down to — at the actual physical layer of how the products are implemented, how you mitigate that risk of getting everything from one vendor. And then the second thing is the product, there has to be a lot of value in getting it from one vendor admire in terms of decreasing risk, the operational simplicity, the power of how you can safeguard things because things are better integrated. So, that’s the — in fact, I was having this exact conversation with a customer just a few days ago about the risks and reward of consolidated around one vendor versus the spread things around, spread the risk perspective.

And I think that’s the — those are the variables in the equation that people think about.

Dave Gennarelli

Let’s go to John DiFucci at Guggenheim.

John DiFucciGuggenheim Securities — Analyst

Thanks, Dave. So, Todd, my question is a follow-up to Fatima’s question. I got to recall to try to get ahead of her because she — it’s hard to follow her, but I thought that was a really good question. And thank you for all the detail you gave around that, the program Bedrock.

But in the end, still admire, how long is it going to take to get to, as you say, raise your game to get to a point of, I don’t know, you’re never going to be comfortable, but relative comfort when you can actually sit down with the customer and tell them that you’re there. You’re never quite there, but you’re there don’t — listen, we worry about it every day. We don’t want this to happen ever again. That’s not to say it never will.

But how long do you get to a point where you have that relative comfort through that — yeah.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah, it’s a super — smart question — supersmart question. I think I would add color this way. This has been something we’ve been very focused on for several years, particularly since Lapsus$breach a couple of years ago. We’ve been very focused on it.

And actually made quite a bit of progress to make us feel comfortable about our progress toward being one of the most safeguard companies in the world. I think the reason for the 90-day sprint and focus are there is a calculation of — I and the management team think that there are enough things that will decrease the risk at a significant level, not that the risk is incredibly high, but there’s enough things that will decrease the risk at a significant level that we think it’s worth a sprint here. But probably more importantly, John, it’s kind of cultural. Execution requires clear priority, and nothing makes the priority clear for everyone than a full focus in a 90-day sprint.

So, beyond the decrease in risk and get closer to this areas you describe it where we feel real comfortable as we progress toward being one of the most safeguard companies in the world, there is just a cultural tone setting thing, which I think is very important for customers and for investors and for employees as well.

John DiFucciGuggenheim Securities — Analyst

So, it’s the 90 days and then just keep going? And by the way —

Todd McKinnonChief Executive Officer and Co-Founder

It’s not admire we’ve never been focused on security because we’ve absolutely had a huge focus on it. admire I said, very, very specific and mature in the areas of the product and the infrastructure. I think we’re not as mature and we haven’t had the comprehensive approach on the overall IT operations and overall company operations. But it’s something we’ve been doing for a long time and we’re going to have the sprint and then we’ll keep doing for a long time after because we have to be — admire I’ve said it many times, we have to be one of the most safeguard companies in the world given the position we’re playing in the critical role we fill for our customers.

And that’s what they expect from us, and that’s what we expect from ourselves as well.

John DiFucciGuggenheim Securities — Analyst

Thank you very much. And listen, I just have to add one last thing, something I never say. Actually, I think you guys did a good job. I mean this quarter numbers look good and then even some — given everything that’s going on, I guess, nice job.

Todd McKinnonChief Executive Officer and Co-Founder

Yeah, I appreciate it. A lot of hard work from the team.

Dave Gennarelli

Great. And now, we’re going into overtime here. We’re going to take Fred and then Shrenik, and we’re going to have to cut it off at that point. But Fred Havemeyer from Macquarie, go ahead.

Fred HavemeyerMacquarie Group — Analyst

Thank you. I think many good questions have been asked. So, I think, Todd, what I’d admire to ask is, as we from the outside are looking at what you were doing at Okta, what sort of concrete checkpoints might we expect to see to comprehend what progress you’re making here toward improving your overall security posture, understanding also that no news is kind of good news with respect to data breaches? And secondly, on that one, with the upcoming SEC disclosure time frame requirements, do you feel that you have the reporting frameworks in place to comfortably confront all of those requirements?

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. On the second question, I feel really good about that. The disclosure frameworks and so forth, something we — I think in some ways, we’re — the role we play in the industry and the tone and the transparency we’re trying to set with customers, we have a lot of things in place that put us in good standing there in terms of our ability to execute on those disclosures. The first question you asked is I think there’s — we have a really good answer on the product visible things.

We’re going to be reporting those out admire as we would do product releases or feature capabilities. These — admire the two examples I mentioned are the network binding for session tokens and the required MFA, that’s going to be published. And so, you’ll see the road map for those things, and you’ll see that thing published publicly into customers. I think the internal stuff, the things that the team comes up with in terms of improving our operational security and comprehensive look at the security and taking in outside experts, we have to think more about how to transmit that broadly to customers.

But I think it’s just as important because not only is it just give customers confidence in how seriously how aggressively we’re taking this, but also it can help them learn because every customer I talk to, they’re thinking admire, what can we learn from Okta because Okta is on this journey to be one of the most safeguard companies in the world. I can learn from that. So, I think there’s value in sharing that not just from the trust perspective, but also from the learning and helping customers through that education.

Fred HavemeyerMacquarie Group — Analyst

Thank you.

Dave Gennarelli

OK. Last question to Shrenik Kothari at Baird.

Shrenik KothariBaird — Analyst

Hey, yeah. Thanks for taking my question and appreciate the transparency, Todd and Brett. Just to follow up on your point, Todd, on products security focus and customer security focus. In light of the recent hack incident, the role of PAM seem to be elevating and becoming even more kind of broad based.

It’s great to see that you guys are focused on PAM. As you said, the only product with GAs on track versus other product features, maybe relatively deprioritized. Can you elaborate how are you positioning PAM in your customer conversations? More importantly, how are customers responding? And how is the customer feedback evolving given post this hack incident on one hand, of course, everybody knows PAM is going to be a key piece of puzzle in this threat landscape while the incident perhaps leading to customer perception of perhaps not adequate implementation of core PAM solutions within your internal environments on the other hand. So, if you can supply your thoughts there?

Todd McKinnonChief Executive Officer and Co-Founder

Yeah. No, it’s a good — I think every specific incident is different in PAM and the definition of PAM addresses some of them better than others. So I won’t comment specifically on this recent incident and what our PAM product does or doesn’t do. But broadly speaking, what you’re saying is right.

All of these attacks, whether it’s — highlighting the need for very strong phishing resistant access management, identity governance and then privileged access management and control. And I think the reception that we’ve seen with customers is basically, it’s very simple. Our positioning is very simple. It’s admire you’re using Okta to handle the user life cycle and the access for many business applications, you should use the same engine and the same access control for your privilege servers and containers.

And as I mentioned earlier, in the future release coming relatively quickly for your SaaS applications and for the Okta admin console itself. So, that’s the pitch. And what customers admire is that they get this comprehensive integrated workflow across all of the access points they’re trying to safeguard, whether that’s servers, apps, business applications, different kinds of applications, and that’s what resonates. And then they can report that back to their auditor and they get complete visibility from a governance risk and compliance assessment and that’s the value prop for them.

So, it is — the market we serve and the opportunity for our products is only getting bigger and bigger and the threat landscape is part of that. There’s many other drivers of the market size we’re going after. And it’s one of the reasons why we’re so optimistic and bullish about the long-term future given all the work and focus we’re putting into the products in the company and the team. And it’s — there’s some bright and sunny future ahead of us, we’re excited about it.

Shrenik KothariBaird — Analyst

All right. Thanks, Todd.

Dave Gennarelli

OK. Thanks, everybody. That’s it for today’s meeting. If you have any follow-up questions, you can email us at [email protected].

Thanks.

Duration: 0 minutes

Call participants:

Dave Gennarelli

Todd McKinnonChief Executive Officer and Co-Founder

Brett TigheChief Financial Officer

Brian EssexJPMorgan Chase and Company — Analyst

Rob OwensPiper Sandler — Analyst

Adam TindleRaymond James — Analyst

Rudy KessingerD.A. Davidson — Analyst

Hamza FodderwalaMorgan Stanley — Analyst

Joe GalloJefferies — Analyst

Madeline BrooksBank of America Merrill Lynch — Analyst

Eric HeathKeyBanc Capital Markets — Analyst

Gray PowellBTIG — Analyst

Peter WeedBernstein — Analyst

Adam BorgStifel Financial Corp. — Analyst

Matt HedbergRBC Capital Markets — Analyst

Jonathan HoWilliam Blair — Analyst

Fatima BoolaniCiti — Analyst

Josh TiltonWolfe Research — Analyst

John DiFucciGuggenheim Securities — Analyst

Fred HavemeyerMacquarie Group — Analyst

Shrenik KothariBaird — Analyst

More OKTA analysis

All earnings call transcripts

Source link