Investor Overview

100% cloud-based SaaS subscription business model

  • First mover in 2007, now at scale
  • Redefining network security, with the world’s largest inline security cloud platform

  • $96 billion serviceable market opportunity across 335 million users, 150 million workloads, and 1.5 billion IoT/OT devices
  • 6x upsell opportunity on user pillars

  • Digital transformation is top-of-mind
  • Cloud shift, mobility, rising cybersecurity threats, IoT/OT, 5G

  • Unique architecture, in the path of customer data, creating measurable value
  • Virtuous cycle of growing scale, focused innovation, and data / insight

Key Metrics

Leader in
Cloud Security

$2.5B+

(FY’24)

Annual Recurring
Revenue

Strong Growth and Cash Flow:
Above “Rule-of-40”

34%

(FY’24)

Revenue Growth
Year-Over-Year

 
27%

(FY’24)

Free Cash
Flow Margin

Highly Scalable
Cloud Economics

81%

(FY’24, Non-GAAP)

Gross Margin

Proven Land &
Expand Model

115%

(FY’24)

Dollar Based
Net Retention

Latest Quarterly Results

Latest Quarterly Results

$497M

Q1’24

$628M

Q1'25

26% Revenue
Growth

$457M

Q1’24

$517M

Q1’25

13% Billings
Growth

$3.5B

Q1’24

$4.4B

Q1’25

26% RPO
Growth

585

Customers $1M+ ARR

25%

Growth

3,165

Customers $100K+ ARR​

17%

Growth

>35%

Of the
GLOBAL 2000

~45%

Of the
FORTUNE 500

21%

Non-GAAP
Operating Margin

46%

Free Cash
Flow Margin

114%

Dollar-Based Net
Retention Rate

$2.7B

Cash & Short-
Term Investments

Growing customer engagements and strong sales execution drove a solid Q1 with all metrics exceeding our guidance. The combination of Zero Trust and AI is creating exciting new opportunities, which we are well positioned to capture with our large and expanding platform. With our customer obsession, the world’s largest cybersecurity cloud, and an upleveled go-to-market machine, we are driving strong growth.

Jay Chaudhry

Jay Chaudhry

Chairman and CEO of Zscaler

Zscaler Built From Scratch

+ Control Plane
+ Enforcement Plane
+ Logging Plane

A highly scalable and ultra-fast multi-tenant cloud security architecture

  • Over 550 patents issued and pending
  • Multi-tenant architecture
  • Distributed across 160+ edge locations
  • Direct peering with the largest Internet destinations
Explore our infographic

Control plane

Zscaler Central Authority (CA) monitors our entire security cloud and provides a central location for software and database updates, policy and configuration settings and threat intelligence. The collection of CA instances together act like the brain of the cloud, and they are geographically distributed for redundancy and performance.

Data plane

Customer traffic gets directed to the nearest Zscaler Enforcement Node (ZEN), where security, management and compliance policies are enforced. Our differentiated authentication and policy distribution mechanism that enables any user to connect to any ZEN at any time to ensure full policy enforcement. ZEN utilizes a full proxy architecture for in-line traffic inspection and is built to ensure data is not written to disk to maintain the highest level of data security. Logs are continuously created in memory and forwarded to our logging module.

Log Plane

Compressed logs are transmitted to our Nanolog Servers over secure connections and multicast to multiple servers for redundancy. Our dashboards provide visibility into our customer’s traffic to enable troubleshooting, policy changes and other administrative actions. Our analytics capabilities allow customers to interactively mine billions of transaction logs to generate reports that provide insight on network utilization and traffic. Regardless of where users are located, customers can choose to have logs stored in the US, the EU or Switzerland as well as streamed to a third-party SIEM.

Platform Extensibility with SSMA

The Zscaler Zero Trust Exchange employs a single-scan, multi-action (SSMA) architecture to minimize latency, improve user experience, and enable an integrated, extensible platform.

Single-Scan

Traffic is entered into memory only once

Multi-Action

Multiple security engines simultaneously inspect the packet

Extensibility

New inspection engines can be added over time, without impacting performance

Single Scan Multi-Action Flow
SSL Inspection

SSL/TLS Inspection at Scale
with Proxy Architecture

Zscaler has invested heavily into building a ‘proxy' based architecture that deeply inspects network traffic at an enormous scale, including SSL/TLS encrypted traffic. Think about it like a postal service.

Zscaler

Stop every envelope, open and inspect the contents…
if all is safe, then seal the envelope and send to recipient

Next-Gen Firewall

As an envelope passes, read the shipping label…
if it seems OK, then let it flow past

Industry Reports & Corporate Presentations

Data Sheet

Zscaler Q1'25 Investor Datasheet

eBook

Seven Elements of Highly Successful Zero Trust Architecture

Industry Report

Gartner Report: Magic Quadrant for Security Service Edge

Industry Report

Gartner Market Guide for Zero Trust Network Access (ZTNA)