IT Security. The Acquisition Boom

Size: px
Start display at page:

Download "IT Security. The Acquisition Boom"

Transcription

1 IT Security The Acquisition Boom Ash Sethi / MergerTech Winter 2016

2 IT THREATS ON A GLOBAL SCALE It s 1:50pm, and there have already been more than 14,000 cyber attacks today. Really. Hacking ranging from the lone cybercriminal, to systematic industrial IT espionage targeting enterprise R&D, IP, customer data, internal communications, financial data, even employee information, costs the American economy over $200 billion a year. And IT threats are only proliferating, and growing more sophisticated and ambitious in both scale and design. One of the consequences of this dangerous new paradigm is a growing appetite for IT security acquisitions. IT security assets are attracting investments from large strategic buyers, private equity houses, consulting firms, even defense contractors. Surveys indicate that cybersecurity is now the chief IT priority for the government sector, which has stoked public IT contractors to shift their development focus on IT security related consulting and software products. These slides examine the current state of the IT security market and why 2016 will be THE year for M&A activity in the space. АШ САЙТИ

3 MARKET DRIVERS THREAT ASSESSMENT INCREASE IN CYBERCRIME SINCE 2010: 296% GLOBAL IT SECURITY SPENDING THE IT SECURITY MARKET IS RAPIDLY RESPONDING TO THE PROLIFERATION OF CYBER THREATS. ATTACKS BY NATIONS AGAINST COMPANIES: 80% $150B $145B INCIDENTS AT POWER & UTILITY SITES: 527% $120B $120B INCREASE IN MOBILE THREATS FROM 2014: 59% ANNUAL GLOBAL DAMAGE FROM CYBERATTACKS: $445B AVERAGE COST OF A SINGLE DATA BREACH: $3.5M $90B $60B $51B $64B $97B CYBERSTALKING EVENTS PER DAY: +600,000 $30B $0B E 2016E 2017E 2018E 3

4 THREAT VECTORS ORGANIZED CYBERTHEFT AND HACKING OF PERSONAL AND CORPORATE DATA BY FOREIGN MILITARY AND INTELLIGENCE SERVICES IS SURPASSING LEVELS SEEN DURING THE COLD WAR. EFFECTIVE COMMERCIAL AND PUBLIC IT SECURITY IS NOW AN INTEGRAL PART OF A NATION S OVERALL DEFENSE READINESS POSTURE. DNS POISONING TROJANS WORMS VIRUSES PHISHING MALWARE TCP/IP HIJACKING CYBERSTALKING DDoS ATTACK 14x INCREASE IN US BUDGET ALLOCATION TO IT SECURITY SINCE % 5 YEAR CAGR IN IT SECURITY SPENDING $145B ANNUAL DAMAGE TO US ECONOMY RESULTING FROM DATA BREACHES TUNNELLING NETWORK SNIFFING RANSOMWARE BOTNETS 4

5 ENTERPRISE AND CONSUMER SECURITY CHALLENGES MOBILE OPPORTUNITIES FACILITATES ACCESS TO DATA ANYWHERE, ANYTIME CHALLENGES BYOD BLURS DATA OWNERSHIP; RISK OF LOST OR STOLEN DEVICES CLOUD INCREASED TEAM COLLABORATION AND BUSINESS AGILITY INCREASED THREAT OF UNAUTHORIZED ACCESS TO DATA BI IDENTIFIES PATTERNS NOT EASILY SEEN; PROVIDES ACTIONABLE INTELLIGENCE EXISTENCE OF DATA MAKES ORGANIZATIONS VULNERABLE TO ATTACK FINTECH CAN ACCESS ACCOUNTS AND PRODUCTS ANYWHERE, ANYTIME TEMPTING TARGET FOR CYBERCRIMINALS DIGITAL MEDIA PROVIDES ABILITY TO CONSUME A MULTITUDE OF MEDIA, ANYWHERE CAN BE A VEHICLE FOR VIRUSES AND BACKDOOR ATTACKS 5

6 COMING EXPLOSION IN SMB SECURITY GROWTH AN UNMINED YET POTENTIALLY LARGE SOURCE OF GROWTH IS THE SHEER NUMBER OF SMBs BOTH IN NORTH AMERICA AND OVERSEAS THAT LACK ANY TANGIBLE SECURITY MEASURES AROUND THEIR IT OPERATIONS. SOME FACTS AROUND SMBs: 67% DO NOT USE WEB BASED SECURITY 77% LACK FORMAL IT SECURITY POLICY 40% OF ATTACKS ARE ON COMPANIES WITH <500 72% OF ATTACKS ARE ON COMPANIES WITH <100 67% DO NOT HAVE ANY SECURITY FOR THEIR CLOUD DATA WHERE SECURITY IS LAX, HACKERS HAVE HELPED THEMSELVES TO BILLIONS IN FRAUDULENT CREDIT CARD TRANSACTIONS, COMPANY DATA AND PROPRIETARY INFORMATION, BANK ACCOUNT DETAILS, AND EMPLOYEE INFORMATION. 6

7 THE NEW PARADIGM AS NEW TYPES OF ATTACKS DEVELOP, THE MOST EFFECTIVE DEFENSES ARE EMERGING FROM NEW GUARD PLAYERS WHO INCUBATE INNOVATIVE, EFFECTIVE SOLUTIONS. TRADITIONAL IT CONSULTING COMPANIES AND LARGE SYSTEMS INTEGRATORS ARE LOOKING TO ACQUIRE THESE FIRMS TO GET A STRATEGIC EDGE OVER COMPETITORS. $70B $53B $35B $18B $0B GLOBAL MILITARY IT SPEND $67.9B $69.3B $64.1B $60.5B $55.8B $49.5B $52.4B $46.9B $43.7B E 2016E 2017E 2018E 2019E 2020E *INCLUDES NON-SECURITY SPENDING PROMINENT HACKING INCIDENTS WHITE HOUSE STATE DEPARTMENT USPS OFFICE OF PERSONNEL MANAGEMENT GENERAL ACCOUNTING OFFICE HEALTHCARE.GOV NUCLEAR REGULATORY COMMISSION ARMY CORPS OF ENGINEERS ENVIRONMENTAL PROTECTION AGENCY IRS ADOBE EBAY JP MORGAN TARGET ANTHEM UBISOFT HOME DEPOT EVERNOTE LIVING SOCIAL SONY ASHLEY MADISON NEIMAN MARCUS YAHOO MICHAELS AT&T PF CHANGS UPS BOEING GOOGLE GOODWILL INDUSTRIES CITIGROUP DAIRY QUEEN ALBERTSONS COMMUNITY HEALTH SYSTEMS LIVING SOCIAL KMART STAPLES BEBE SNAPCHAT PAYPAL 7

8 DIVERSE ACQUISITION ECOSYSTEM THE BIG FOUR IM GLOBAL, QUBERA, VIGILANT, URGENTIS, HSC, QUBIT, P3 CONSULTING, TRUSTEQ, FIRST POINT GLOBAL, NORSE, MTS ALLSTREAM, ASECURE, KEY IT GROUP, MPC, SEEKER, INTEGRC, MYCROFT DEFENSE CONTRACTORS WEBSENSE, SILVERSKY, INDUSTRIAL DEFENDER, SENSAGE, FIDELIS, HB GARY, NARUS, CLOUDSHIELD, SIGNACERT, CYVEILLANCE, OAKLEY NETWORKS PRIVATE EQUITY FIDELIS, BLUECOAT, BEYONDTRUST, BAY31, IMMEDIATE INSIGHT, SAILPOINT, GOOD TECHNOLOGY, TIBCO SOFTWARE, ARCSERVE, FIREMON, GALAXYTECH, ACCUVANT IT SERVICES EMERGING THREATS, XCEEDIUM, ADALLOM, GOODLOCK, CASPIDA, VOLTAGE SECURITY, CIRRO SECURE, OPENDNS, XEROCOLE, HYPERWISE, INTELLINX, TRIPWIRE, PASSWORDBOX, AORATO IT SECURITY NARUS, RANDOMSTORM, NORMAN SAFEGROUND, LOCATION LABS, NITRODESK, RISK IDS, DEFENSE.NET, NPULSE, METAFORIC, CYVERA, CENZIC, STOPTHEHACKER, CARBON BLACK 8

9 MARKET RESPONSE INVESTMENT TRENDS GLOBAL IT SECURITY VC INVESTMENTS >MAJOR SHIFT FROM A PURE PERIMETER-FOCUSED SECURITY PARADIGM TO A MULTI-LAYERED DEFENSE APPROACH THAT INTEGRATES DATA ANALYTICS, REAL-TIME INTELLIGENCE, AND THREAT RESPONSE $3,410M $4,000M $3,000M 201 $2,540M >SIGNIFICANT INVESTMENT IN STARTUPS FOCUSING ON SECURITY CHALLENGES RELATIVELY NEW TO THE MODERN ENTERPRISE: WIRELESS ACCESS, BYOD, CLOUD STORAGE AND VIRTUALIZATION DEALS $1,220M $1,710M $2,000M INVESTMENTS >PROLIFERATION OF MOBILE COMMERCE AND BANKING, GREATER USE OF DIGITAL CASH, AND GROWTH IN NEW PAYMENT MODELS FUELING INVESTMENT IN FINTECH RELATED SECURITY 16% OF ALL ATTACKS ARE ON FINANCIAL SERVICES FIRMS/PLATFORMS 80 0 $800M $815M E $1,000M $0M 9

10 MAJOR VC INVESTORS AND GROWTH VERTICALS AORATO, COREOS, FORGEROCK, ILLUMIO, LOOKOUT, NETSKOPE, SENTINEL ONE, SIMILITY, VECTRA NETWORKS BYOD 6 STEALTH TECH 8 THREAT INTELLIGENCE 14 BLUEBOX, CIPHER CLOUD, ILLUMIO, OKTA, LOOKOUT, SIGNALFX, SOOKASA AGARI, BLOCKSCORE, COHESITY, GUARDICORE, LIGHTCYBER, KEYME, RISKIQ, SCALYR, VERADOCS, ZERTO DUO SECURITY, IONIC SECURITY, MAPR, SHAPE SECURITY, SYNACK, TEAM8, THREAT STREAM AWAKE NETWORKS, GUARDICORE, OKTA, SKY-HIGH NETWORKS, SUMO LOGIC, ZERTO AREA1 SECURITY, BIT9, COREOS, ENDGAME, ICONIC SECURITY, SHAPE SECURITY, SYNACK DATA SECURITY 15 ENDPOINT SECURITY 16 APPLICATION SECURITY 18 IAM 26 CLOUD SECURITY US VC INVESTMENTS BY SECTOR ADALLOM, BIT9, COHESITY, COREOS, FORTER, KEEN.IO, OKTA, SAFEBREACH, SUMO LOGIC NETWORK SECURITY 36 10

11 PUBLIC MARKETS LANDSCAPE VALUATION OBSERVATIONS >MEDIAN VALUATIONS FOR IT SECURITY COMPANIES HAVE BEEN STRONG AND STEADY OVER THE LAST THREE YEARS, BETWEEN THE 4-5x LTM REVENUE RANGE PUBLICLY TRADED IT SECURITY FIRMS COMPANY MARKET CAP TEV/LTM REV PALO ALTO NETWORKS $16.4B 16.2x SYMANTEC $13.5B 2.0x FORTINET $6.0B 5.9x >GIVEN THE EVOLUTIONARY NATURE OF CYBERATTACKS, MERGERTECH FORECASTS THAT IT SECURITY WILL BE ONE OF THE LARGEST TECHNOLOGY GROWTH VERTICALS GLOBALLY OVER THE NEXT 3-5 YEARS >LARGEST VENDORS: IBM, SYMANTEC, INTEL, TREND MICRO, EMC/DELL TREND MICRO $5.7B 5.2x FIREEYE $3.4B 6.3x IMPERVA $2.3B 10.1x QUALYS $1.3B 7.9x AVG TECHNOLOGY $1.0B 2.6x BARACUDA NETWORKS $987M 2.7x A10 NETWORKS $470M 2.0x MOBILEIRON $332M 2.0x 11

12 MARKET CONSOLIDATION LARGE IT FIRMS ARE NATURAL BUYERS OF SECURITY TECHNOLOGY, AS THEY HAVE AN EXISTING PORTFOLIO OF GLOBAL CLIENTS IN INDUSTRIAL VERTICALS THEY CAN EASILY CROSS-SELL NEW SOLUTIONS INTO. SYSTEM INTEGRATORS SECURITY VENDORS IT CONSULTING FIRMS SOFTWARE VENDORS THE BIG 4 MDM THREAT RESPONSE DATA LOSS PREVENTION TRANSACTION SECURITY CRITICAL INFRASTRUCTURE SEC IT ADVISORY ANTI-VIRUS MANAGED SECURITY ENDPOINT SECURITY FRAUD DETECTION DATA ENCRYPTION APPLICATION SECURITY BIOMETRICS RFID BI CLOUD INFRASTRUCTURE ATP NETWORK VISIBILITY 12

13 M&A MARKET LANDSCAPE >M&A ACTIVITY HAS BEEN BOLSTERED BY CONSTANT EMERGENCE OF NEW TYPES OF THREATS TO A CONTINUAL STREAM OF NEW WORKPLACE TECHNOLOGIES >MEDIAN 2014 ANNOUNCED M&A DEAL VALUE WAS $42M Mean M&A TEV/Rev (x) SECURITY M&A DEALS & VALUATION x 3.6x 3.1x 3.2x E Total Security Deals ISRAEL THE ISRAELI CYBERSECURITY SECTOR IS A VERY LARGE AND VERY DYNAMIC SECTOR, WITH HIGHLY ADVANCED R&D AND SIGNIFICANT M&A ACTIVITY INVOLVING CROSS- BORDER BUYERS. INDIA WITH A +1B POPULATION AND A RELATIVELY SMALL CYBERSECURITY MARKET, INDIA IS POISED TO DOUBLE ITS SECURITY MARKET FROM $500M TO $1B IN LESS THAN 2 YEARS. THE RAND CORPORATION RELEASED A STUDY CITING THE EXISTENCE OF ~1,000 A-LEVEL CYBERSECURITY EXPERTS GLOBALLY, VS A NEED FOR 10,000 TO 30,

14 BUYER LANDSCAPE TOTAL ACQUISITIONS SINCE 2010 MAJOR DEALS SINCE 2013 IBM CISCO CISCO SOURCEFIRE $2,500M ORACLE 35 BAIN CAPITAL BLUECOAT $2,400M EMC VMWARE VMWARE AIRWATCH $1,550M DELL INTEL FIREYE MANDIANT $989M HP 22 VISTA EQUITY WEBSENSE $902M CA 17 TIBCO 12 IBM TRUSTEER $900M SYMANTEC JUNIPER 9 11 GEMALTO SAFENET $890M AKAMAI 8 *INCLUDES NON-SECURITY DEALS SINGTEL TRUSTWAVE $810M 14

15 HOT SECTORS WHY MOBILE & CLOUD ARE HOT 1.BELIEF THAT IT SECURITY IS LIKE AN ARMS-RACE BETWEEN THE PUBLIC AND CYBERHACKERS 2.RECENT TORRENT OF ATTACKS MAKE THE PUBLIC FEEL IT IS NOT ADEQUATELY PROTECTED AGAINST BREACHES MOST DEAL ACTIVITY IDENTITY & ACCESS MANAGEMENT M&A SUBSECTOR RANKINGS HIGHEST MULTIPLES ANTI-MALWARE/ANTI- FRAUD HIGHEST Y-O-Y GROWTH MOBILE SECURITY NETWORK SERVICES MOBILE SECURITY MANAGED SECURITY 3.SECURITY AROUND NEW TECHNOLOGIES ALWAYS LAG BEHIND CYBERHACKERS; ORGANIZATIONS PAY PREMIUMS TO RAPIDLY CATCH UP MDM 17 EXITS LAST YEAR, WITH OVER 200% Y-O-Y ACQUISITION GROWTH MANAGED SECURITY NETWORK SECURITY CLOUD SECURITY MANY OF THE HOT VERTICALS WITHIN IT SECURITY PERTAIN TO TECHNOLOGIES THAT ARE RELATIVELY NEW IN THE ENTERPRISE (EG MOBILE, CLOUD) 15

16 Ash Sethi / Associate / MergerTech If you re interested in chatting about IT Security or tech, please get in touch with me at: [email protected]

The State of M&A in the Cybersecurity Market. October 28, 2015

The State of M&A in the Cybersecurity Market. October 28, 2015 The State of M&A in the Cybersecurity Market October 28, 2015 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster

More information

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020) Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends

More information

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Brochure More information from http://www.researchandmarkets.com/reports/3301109/

Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),

More information

Global Security Services Market 2015-2019

Global Security Services Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3217235/ Global Security Services Market 2015-2019 Description: About Security Services Security services focus on the security

More information

Why Are Investors Excited About Cyber Security Startups, Again?

Why Are Investors Excited About Cyber Security Startups, Again? Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial

More information

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn

More information

Global Web Application Firewall Market 2015-2019

Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

OurCrowd Startup Investing Guide: Cybersecurity

OurCrowd Startup Investing Guide: Cybersecurity OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

Global Security Testing Market 2015-2019

Global Security Testing Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3175798/ Global Security Testing Market 2015-2019 Description: About Security Testing Companies around the world are witnessing

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Defending Against Cyber Security Threats to the Payment and Banking Systems

Defending Against Cyber Security Threats to the Payment and Banking Systems NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of

More information

Reference Technology Roadmap

Reference Technology Roadmap Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading

More information

Ty Miller. Director, Threat Intelligence Pty Ltd

Ty Miller. Director, Threat Intelligence Pty Ltd Ty Miller Director, Threat Intelligence Pty Ltd Security Specialist Creator of Threat Analytics CREST Tech Lead, Assessor, Board of Directors Trained likes of FBI, US DoD, US Mil, International Govt agencies,

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Reference Technology Roadmap

Reference Technology Roadmap Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index,

More information

Signal Hill Year-End 2014 Cyber Security & Risk Review and 2015 Outlook

Signal Hill Year-End 2014 Cyber Security & Risk Review and 2015 Outlook Signal Hill Year-End 20 Cyber Security & Risk Review and 2015 Outlook 20 The Year of Cyber Insecurity The Cyber Security & Risk market saw exceptionally strong stock, M&A and investment activity last year,

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

Protection Against Advanced Persistent Threats

Protection Against Advanced Persistent Threats Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions

SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,

More information

EHS Privacy and Information Security

EHS Privacy and Information Security EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Global Security Software Market 2015-2019

Global Security Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security

More information

The Onslaught of Cyber Security Threats and What that Means to You

The Onslaught of Cyber Security Threats and What that Means to You The Onslaught of Cyber Security Threats and What that Means to You No End in Sight for Cyber Crime Growth Number of mobile devices affected IBM Number of accounts hacked CNN Money Number of malware samples

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single

More information

Global BYOD Market 2015-2019

Global BYOD Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3145237/ Global BYOD Market 2015-2019 Description: About BYOD BYOD is a policy that allows employees to access corporate data and

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with

More information

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

1. Economic factors: Positive global market for IDS/IPS security solutions and services. Brochure More information from http://www.researchandmarkets.com/reports/2831830/ Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based, Network Based, Wireless, On-premise

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Corporate Spying An Overview

Corporate Spying An Overview Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

Securing Your Business with DNS Servers That Protect Themselves

Securing Your Business with DNS Servers That Protect Themselves Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to legitimate

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems

Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems MIT SDM Systems Thinking Webinar Series Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems By Charles Iheagwara, Ph.D, SDM 10 Outline The traditional

More information

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Analyst: Javvad Malik 24 Sep, 2014 It's almost two years to the day since RSA acquired Web-fraud detection vendor

More information

Security 2014 and Beyond: An Evolving Threat Environment in a Mobile, Cloud, and Virtual World

Security 2014 and Beyond: An Evolving Threat Environment in a Mobile, Cloud, and Virtual World Security 2014 and Beyond: An Evolving Threat Environment in a Mobile, Cloud, and Virtual World December 2013 Joel P. Fishbein, Jr BMO Capital Markets Corp. [email protected] (212) 885-4159 Brett Fodero

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

Zak Khan Director, Advanced Cyber Defence

Zak Khan Director, Advanced Cyber Defence Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts

More information

Cyber Security Risks for Banking Institutions.

Cyber Security Risks for Banking Institutions. Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

Information Security for the Rest of Us

Information Security for the Rest of Us Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security re-defines enterprise endpoint protection against advanced malware IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E XCERPT M A R K E T A N A L Y S I S W o r l d w i d e S e c u r i t y a n d V u l n e r a b i l i

More information

PREPARE YOUR INCIDENT RESPONSE TEAM

PREPARE YOUR INCIDENT RESPONSE TEAM PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of

More information

Global Information Security Products and Services Market 2015-2019

Global Information Security Products and Services Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3145249/ Global Information Security Products and Services Market 2015-2019 Description: About Information Security Products and

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information