Investor Overview

100% cloud-based SaaS subscription business model

Key Metrics

Leader in
Cloud Security

$2.0B+

Annual Recurring
Revenue

Strong Growth and Cash Flow:
Above “Rule-of-40”

48%

(FY’23)

Revenue Growth
Year-Over-Year

+
21%

(FY’23)

Free Cash
Flow Margin

Highly Scalable
Cloud Economics

81%

(FY’23, Non-GAAP)

Gross Margin

Proven Land &
Expand Model

116%

Dollar Based
Net Retention

Latest Quarterly Results

Latest Quarterly Results

$419M

Q3’23

$553M

Q3'24

32% Revenue
Growth

$482M

Q3’23

$628M

Q3’24

30% Billings
Growth

$3.0B

Q3’23

$3.8B

Q3’24

27% RPO
Growth

523

Customers $1M+ ARR

31%

Growth

2,922

Customers $100K+ ARR​

20%

Growth

>30%

Of the
GLOBAL 2000

>40%

Of the
FORTUNE 500

22%

Non-GAAP
Operating Margin

22%

Free Cash
Flow Margin

116%

Dollar-Based Net
Retention Rate

$2.2B

Cash & Short-
Term Investments

We delivered an outstanding quarter driven by growing customer interest in our Zero Trust Exchange platform. As threat actors evolve and continue to exploit firewall-based security, Zero Trust security remains a top IT priority, and an increasing number of enterprises are adopting our platform. To meet this demand, we are accelerating innovation, expanding our platform and building a strong go-to-market team to scale our business to $5 billion and beyond in ARR.

Jay Chaudhry

Jay Chaudhry

Chairman and CEO of Zscaler

Zscaler Built From Scratch

Cloud Edge Architecture
+ Control Plane
+ Enforcement Plane
+ Logging Plane

A highly scalable and ultra-fast multi-tenant cloud security architecture

  • Over 400 patents issued and pending
  • Multi-tenant architecture
  • Distributed across 150+ edge locations
  • Direct peering with the largest Internet destinations
Explore our infographic

Control plane

Zscaler Central Authority (CA) monitors our entire security cloud and provides a central location for software and database updates, policy and configuration settings and threat intelligence. The collection of CA instances together act like the brain of the cloud, and they are geographically distributed for redundancy and performance.

Data plane

Customer traffic gets directed to the nearest Zscaler Enforcement Node (ZEN), where security, management and compliance policies are enforced. Our differentiated authentication and policy distribution mechanism that enables any user to connect to any ZEN at any time to ensure full policy enforcement. ZEN utilizes a full proxy architecture for in-line traffic inspection and is built to ensure data is not written to disk to maintain the highest level of data security. Logs are continuously created in memory and forwarded to our logging module.

Log Plane

Compressed logs are transmitted to our Nanolog Servers over secure connections and multicast to multiple servers for redundancy. Our dashboards provide visibility into our customer’s traffic to enable troubleshooting, policy changes and other administrative actions. Our analytics capabilities allow customers to interactively mine billions of transaction logs to generate reports that provide insight on network utilization and traffic. Regardless of where users are located, customers can choose to have logs stored in the US, the EU or Switzerland as well as streamed to a third-party SIEM.

Platform Extensibility with SSMA

The Zscaler Zero Trust Exchange employs a single-scan, multi-action (SSMA) architecture to minimize latency, improve user experience, and enable an integrated, extensible platform.

Single-Scan

Traffic is entered into memory only once

Multi-Action

Multiple security engines simultaneously inspect the packet

Extensibility

New inspection engines can be added over time, without impacting performance

Single Scan Multi-Action Flow
SSL Inspection

SSL/TLS Inspection at Scale
with Proxy Architecture

Zscaler has invested heavily into building a ‘proxy' based architecture that deeply inspects network traffic at an enormous scale, including SSL/TLS encrypted traffic. Think about it like a postal service.

Zscaler

Stop every envelope, open and inspect the contents…
if all is safe, then seal the envelope and send to recipient

Next-Gen Firewall

As an envelope passes, read the shipping label…
if it seems OK, then let it flow past

Industry Reports & Corporate Presentations

Data Sheet

Zscaler Q3'24 Investor Datasheet

eBook

Seven Elements of Highly Successful Zero Trust Architecture

Industry Report

Gartner Report: Magic Quadrant for Security Service Edge

Industry Report

Gartner Market Guide for Zero Trust Network Access (ZTNA)