IT Security. The Acquisition Boom
|
|
|
- Ethelbert Underwood
- 10 years ago
- Views:
Transcription
1 IT Security The Acquisition Boom Ash Sethi / MergerTech Winter 2016
2 IT THREATS ON A GLOBAL SCALE It s 1:50pm, and there have already been more than 14,000 cyber attacks today. Really. Hacking ranging from the lone cybercriminal, to systematic industrial IT espionage targeting enterprise R&D, IP, customer data, internal communications, financial data, even employee information, costs the American economy over $200 billion a year. And IT threats are only proliferating, and growing more sophisticated and ambitious in both scale and design. One of the consequences of this dangerous new paradigm is a growing appetite for IT security acquisitions. IT security assets are attracting investments from large strategic buyers, private equity houses, consulting firms, even defense contractors. Surveys indicate that cybersecurity is now the chief IT priority for the government sector, which has stoked public IT contractors to shift their development focus on IT security related consulting and software products. These slides examine the current state of the IT security market and why 2016 will be THE year for M&A activity in the space. АШ САЙТИ
3 MARKET DRIVERS THREAT ASSESSMENT INCREASE IN CYBERCRIME SINCE 2010: 296% GLOBAL IT SECURITY SPENDING THE IT SECURITY MARKET IS RAPIDLY RESPONDING TO THE PROLIFERATION OF CYBER THREATS. ATTACKS BY NATIONS AGAINST COMPANIES: 80% $150B $145B INCIDENTS AT POWER & UTILITY SITES: 527% $120B $120B INCREASE IN MOBILE THREATS FROM 2014: 59% ANNUAL GLOBAL DAMAGE FROM CYBERATTACKS: $445B AVERAGE COST OF A SINGLE DATA BREACH: $3.5M $90B $60B $51B $64B $97B CYBERSTALKING EVENTS PER DAY: +600,000 $30B $0B E 2016E 2017E 2018E 3
4 THREAT VECTORS ORGANIZED CYBERTHEFT AND HACKING OF PERSONAL AND CORPORATE DATA BY FOREIGN MILITARY AND INTELLIGENCE SERVICES IS SURPASSING LEVELS SEEN DURING THE COLD WAR. EFFECTIVE COMMERCIAL AND PUBLIC IT SECURITY IS NOW AN INTEGRAL PART OF A NATION S OVERALL DEFENSE READINESS POSTURE. DNS POISONING TROJANS WORMS VIRUSES PHISHING MALWARE TCP/IP HIJACKING CYBERSTALKING DDoS ATTACK 14x INCREASE IN US BUDGET ALLOCATION TO IT SECURITY SINCE % 5 YEAR CAGR IN IT SECURITY SPENDING $145B ANNUAL DAMAGE TO US ECONOMY RESULTING FROM DATA BREACHES TUNNELLING NETWORK SNIFFING RANSOMWARE BOTNETS 4
5 ENTERPRISE AND CONSUMER SECURITY CHALLENGES MOBILE OPPORTUNITIES FACILITATES ACCESS TO DATA ANYWHERE, ANYTIME CHALLENGES BYOD BLURS DATA OWNERSHIP; RISK OF LOST OR STOLEN DEVICES CLOUD INCREASED TEAM COLLABORATION AND BUSINESS AGILITY INCREASED THREAT OF UNAUTHORIZED ACCESS TO DATA BI IDENTIFIES PATTERNS NOT EASILY SEEN; PROVIDES ACTIONABLE INTELLIGENCE EXISTENCE OF DATA MAKES ORGANIZATIONS VULNERABLE TO ATTACK FINTECH CAN ACCESS ACCOUNTS AND PRODUCTS ANYWHERE, ANYTIME TEMPTING TARGET FOR CYBERCRIMINALS DIGITAL MEDIA PROVIDES ABILITY TO CONSUME A MULTITUDE OF MEDIA, ANYWHERE CAN BE A VEHICLE FOR VIRUSES AND BACKDOOR ATTACKS 5
6 COMING EXPLOSION IN SMB SECURITY GROWTH AN UNMINED YET POTENTIALLY LARGE SOURCE OF GROWTH IS THE SHEER NUMBER OF SMBs BOTH IN NORTH AMERICA AND OVERSEAS THAT LACK ANY TANGIBLE SECURITY MEASURES AROUND THEIR IT OPERATIONS. SOME FACTS AROUND SMBs: 67% DO NOT USE WEB BASED SECURITY 77% LACK FORMAL IT SECURITY POLICY 40% OF ATTACKS ARE ON COMPANIES WITH <500 72% OF ATTACKS ARE ON COMPANIES WITH <100 67% DO NOT HAVE ANY SECURITY FOR THEIR CLOUD DATA WHERE SECURITY IS LAX, HACKERS HAVE HELPED THEMSELVES TO BILLIONS IN FRAUDULENT CREDIT CARD TRANSACTIONS, COMPANY DATA AND PROPRIETARY INFORMATION, BANK ACCOUNT DETAILS, AND EMPLOYEE INFORMATION. 6
7 THE NEW PARADIGM AS NEW TYPES OF ATTACKS DEVELOP, THE MOST EFFECTIVE DEFENSES ARE EMERGING FROM NEW GUARD PLAYERS WHO INCUBATE INNOVATIVE, EFFECTIVE SOLUTIONS. TRADITIONAL IT CONSULTING COMPANIES AND LARGE SYSTEMS INTEGRATORS ARE LOOKING TO ACQUIRE THESE FIRMS TO GET A STRATEGIC EDGE OVER COMPETITORS. $70B $53B $35B $18B $0B GLOBAL MILITARY IT SPEND $67.9B $69.3B $64.1B $60.5B $55.8B $49.5B $52.4B $46.9B $43.7B E 2016E 2017E 2018E 2019E 2020E *INCLUDES NON-SECURITY SPENDING PROMINENT HACKING INCIDENTS WHITE HOUSE STATE DEPARTMENT USPS OFFICE OF PERSONNEL MANAGEMENT GENERAL ACCOUNTING OFFICE HEALTHCARE.GOV NUCLEAR REGULATORY COMMISSION ARMY CORPS OF ENGINEERS ENVIRONMENTAL PROTECTION AGENCY IRS ADOBE EBAY JP MORGAN TARGET ANTHEM UBISOFT HOME DEPOT EVERNOTE LIVING SOCIAL SONY ASHLEY MADISON NEIMAN MARCUS YAHOO MICHAELS AT&T PF CHANGS UPS BOEING GOOGLE GOODWILL INDUSTRIES CITIGROUP DAIRY QUEEN ALBERTSONS COMMUNITY HEALTH SYSTEMS LIVING SOCIAL KMART STAPLES BEBE SNAPCHAT PAYPAL 7
8 DIVERSE ACQUISITION ECOSYSTEM THE BIG FOUR IM GLOBAL, QUBERA, VIGILANT, URGENTIS, HSC, QUBIT, P3 CONSULTING, TRUSTEQ, FIRST POINT GLOBAL, NORSE, MTS ALLSTREAM, ASECURE, KEY IT GROUP, MPC, SEEKER, INTEGRC, MYCROFT DEFENSE CONTRACTORS WEBSENSE, SILVERSKY, INDUSTRIAL DEFENDER, SENSAGE, FIDELIS, HB GARY, NARUS, CLOUDSHIELD, SIGNACERT, CYVEILLANCE, OAKLEY NETWORKS PRIVATE EQUITY FIDELIS, BLUECOAT, BEYONDTRUST, BAY31, IMMEDIATE INSIGHT, SAILPOINT, GOOD TECHNOLOGY, TIBCO SOFTWARE, ARCSERVE, FIREMON, GALAXYTECH, ACCUVANT IT SERVICES EMERGING THREATS, XCEEDIUM, ADALLOM, GOODLOCK, CASPIDA, VOLTAGE SECURITY, CIRRO SECURE, OPENDNS, XEROCOLE, HYPERWISE, INTELLINX, TRIPWIRE, PASSWORDBOX, AORATO IT SECURITY NARUS, RANDOMSTORM, NORMAN SAFEGROUND, LOCATION LABS, NITRODESK, RISK IDS, DEFENSE.NET, NPULSE, METAFORIC, CYVERA, CENZIC, STOPTHEHACKER, CARBON BLACK 8
9 MARKET RESPONSE INVESTMENT TRENDS GLOBAL IT SECURITY VC INVESTMENTS >MAJOR SHIFT FROM A PURE PERIMETER-FOCUSED SECURITY PARADIGM TO A MULTI-LAYERED DEFENSE APPROACH THAT INTEGRATES DATA ANALYTICS, REAL-TIME INTELLIGENCE, AND THREAT RESPONSE $3,410M $4,000M $3,000M 201 $2,540M >SIGNIFICANT INVESTMENT IN STARTUPS FOCUSING ON SECURITY CHALLENGES RELATIVELY NEW TO THE MODERN ENTERPRISE: WIRELESS ACCESS, BYOD, CLOUD STORAGE AND VIRTUALIZATION DEALS $1,220M $1,710M $2,000M INVESTMENTS >PROLIFERATION OF MOBILE COMMERCE AND BANKING, GREATER USE OF DIGITAL CASH, AND GROWTH IN NEW PAYMENT MODELS FUELING INVESTMENT IN FINTECH RELATED SECURITY 16% OF ALL ATTACKS ARE ON FINANCIAL SERVICES FIRMS/PLATFORMS 80 0 $800M $815M E $1,000M $0M 9
10 MAJOR VC INVESTORS AND GROWTH VERTICALS AORATO, COREOS, FORGEROCK, ILLUMIO, LOOKOUT, NETSKOPE, SENTINEL ONE, SIMILITY, VECTRA NETWORKS BYOD 6 STEALTH TECH 8 THREAT INTELLIGENCE 14 BLUEBOX, CIPHER CLOUD, ILLUMIO, OKTA, LOOKOUT, SIGNALFX, SOOKASA AGARI, BLOCKSCORE, COHESITY, GUARDICORE, LIGHTCYBER, KEYME, RISKIQ, SCALYR, VERADOCS, ZERTO DUO SECURITY, IONIC SECURITY, MAPR, SHAPE SECURITY, SYNACK, TEAM8, THREAT STREAM AWAKE NETWORKS, GUARDICORE, OKTA, SKY-HIGH NETWORKS, SUMO LOGIC, ZERTO AREA1 SECURITY, BIT9, COREOS, ENDGAME, ICONIC SECURITY, SHAPE SECURITY, SYNACK DATA SECURITY 15 ENDPOINT SECURITY 16 APPLICATION SECURITY 18 IAM 26 CLOUD SECURITY US VC INVESTMENTS BY SECTOR ADALLOM, BIT9, COHESITY, COREOS, FORTER, KEEN.IO, OKTA, SAFEBREACH, SUMO LOGIC NETWORK SECURITY 36 10
11 PUBLIC MARKETS LANDSCAPE VALUATION OBSERVATIONS >MEDIAN VALUATIONS FOR IT SECURITY COMPANIES HAVE BEEN STRONG AND STEADY OVER THE LAST THREE YEARS, BETWEEN THE 4-5x LTM REVENUE RANGE PUBLICLY TRADED IT SECURITY FIRMS COMPANY MARKET CAP TEV/LTM REV PALO ALTO NETWORKS $16.4B 16.2x SYMANTEC $13.5B 2.0x FORTINET $6.0B 5.9x >GIVEN THE EVOLUTIONARY NATURE OF CYBERATTACKS, MERGERTECH FORECASTS THAT IT SECURITY WILL BE ONE OF THE LARGEST TECHNOLOGY GROWTH VERTICALS GLOBALLY OVER THE NEXT 3-5 YEARS >LARGEST VENDORS: IBM, SYMANTEC, INTEL, TREND MICRO, EMC/DELL TREND MICRO $5.7B 5.2x FIREEYE $3.4B 6.3x IMPERVA $2.3B 10.1x QUALYS $1.3B 7.9x AVG TECHNOLOGY $1.0B 2.6x BARACUDA NETWORKS $987M 2.7x A10 NETWORKS $470M 2.0x MOBILEIRON $332M 2.0x 11
12 MARKET CONSOLIDATION LARGE IT FIRMS ARE NATURAL BUYERS OF SECURITY TECHNOLOGY, AS THEY HAVE AN EXISTING PORTFOLIO OF GLOBAL CLIENTS IN INDUSTRIAL VERTICALS THEY CAN EASILY CROSS-SELL NEW SOLUTIONS INTO. SYSTEM INTEGRATORS SECURITY VENDORS IT CONSULTING FIRMS SOFTWARE VENDORS THE BIG 4 MDM THREAT RESPONSE DATA LOSS PREVENTION TRANSACTION SECURITY CRITICAL INFRASTRUCTURE SEC IT ADVISORY ANTI-VIRUS MANAGED SECURITY ENDPOINT SECURITY FRAUD DETECTION DATA ENCRYPTION APPLICATION SECURITY BIOMETRICS RFID BI CLOUD INFRASTRUCTURE ATP NETWORK VISIBILITY 12
13 M&A MARKET LANDSCAPE >M&A ACTIVITY HAS BEEN BOLSTERED BY CONSTANT EMERGENCE OF NEW TYPES OF THREATS TO A CONTINUAL STREAM OF NEW WORKPLACE TECHNOLOGIES >MEDIAN 2014 ANNOUNCED M&A DEAL VALUE WAS $42M Mean M&A TEV/Rev (x) SECURITY M&A DEALS & VALUATION x 3.6x 3.1x 3.2x E Total Security Deals ISRAEL THE ISRAELI CYBERSECURITY SECTOR IS A VERY LARGE AND VERY DYNAMIC SECTOR, WITH HIGHLY ADVANCED R&D AND SIGNIFICANT M&A ACTIVITY INVOLVING CROSS- BORDER BUYERS. INDIA WITH A +1B POPULATION AND A RELATIVELY SMALL CYBERSECURITY MARKET, INDIA IS POISED TO DOUBLE ITS SECURITY MARKET FROM $500M TO $1B IN LESS THAN 2 YEARS. THE RAND CORPORATION RELEASED A STUDY CITING THE EXISTENCE OF ~1,000 A-LEVEL CYBERSECURITY EXPERTS GLOBALLY, VS A NEED FOR 10,000 TO 30,
14 BUYER LANDSCAPE TOTAL ACQUISITIONS SINCE 2010 MAJOR DEALS SINCE 2013 IBM CISCO CISCO SOURCEFIRE $2,500M ORACLE 35 BAIN CAPITAL BLUECOAT $2,400M EMC VMWARE VMWARE AIRWATCH $1,550M DELL INTEL FIREYE MANDIANT $989M HP 22 VISTA EQUITY WEBSENSE $902M CA 17 TIBCO 12 IBM TRUSTEER $900M SYMANTEC JUNIPER 9 11 GEMALTO SAFENET $890M AKAMAI 8 *INCLUDES NON-SECURITY DEALS SINGTEL TRUSTWAVE $810M 14
15 HOT SECTORS WHY MOBILE & CLOUD ARE HOT 1.BELIEF THAT IT SECURITY IS LIKE AN ARMS-RACE BETWEEN THE PUBLIC AND CYBERHACKERS 2.RECENT TORRENT OF ATTACKS MAKE THE PUBLIC FEEL IT IS NOT ADEQUATELY PROTECTED AGAINST BREACHES MOST DEAL ACTIVITY IDENTITY & ACCESS MANAGEMENT M&A SUBSECTOR RANKINGS HIGHEST MULTIPLES ANTI-MALWARE/ANTI- FRAUD HIGHEST Y-O-Y GROWTH MOBILE SECURITY NETWORK SERVICES MOBILE SECURITY MANAGED SECURITY 3.SECURITY AROUND NEW TECHNOLOGIES ALWAYS LAG BEHIND CYBERHACKERS; ORGANIZATIONS PAY PREMIUMS TO RAPIDLY CATCH UP MDM 17 EXITS LAST YEAR, WITH OVER 200% Y-O-Y ACQUISITION GROWTH MANAGED SECURITY NETWORK SECURITY CLOUD SECURITY MANY OF THE HOT VERTICALS WITHIN IT SECURITY PERTAIN TO TECHNOLOGIES THAT ARE RELATIVELY NEW IN THE ENTERPRISE (EG MOBILE, CLOUD) 15
16 Ash Sethi / Associate / MergerTech If you re interested in chatting about IT Security or tech, please get in touch with me at: [email protected]
The State of M&A in the Cybersecurity Market. October 28, 2015
The State of M&A in the Cybersecurity Market October 28, 2015 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster
Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)
Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends
A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Brochure More information from http://www.researchandmarkets.com/reports/3301109/
Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),
Global Security Services Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3217235/ Global Security Services Market 2015-2019 Description: About Security Services Security services focus on the security
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial
Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing
Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn
Global Web Application Firewall Market 2015-2019
Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from
Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
OurCrowd Startup Investing Guide: Cybersecurity
OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Global Security Testing Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3175798/ Global Security Testing Market 2015-2019 Description: About Security Testing Companies around the world are witnessing
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Defending Against Cyber Security Threats to the Payment and Banking Systems
NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of
Reference Technology Roadmap
Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading
Ty Miller. Director, Threat Intelligence Pty Ltd
Ty Miller Director, Threat Intelligence Pty Ltd Security Specialist Creator of Threat Analytics CREST Tech Lead, Assessor, Board of Directors Trained likes of FBI, US DoD, US Mil, International Govt agencies,
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Reference Technology Roadmap
Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index,
Signal Hill Year-End 2014 Cyber Security & Risk Review and 2015 Outlook
Signal Hill Year-End 20 Cyber Security & Risk Review and 2015 Outlook 20 The Year of Cyber Insecurity The Cyber Security & Risk market saw exceptionally strong stock, M&A and investment activity last year,
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
Braindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
Global Cyber Security Market Forecast and Opportunities, 2020
Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Protection Against Advanced Persistent Threats
Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
SentinelOne Labs. Advanced Threat Intelligence Report. 2015 Predictions
SentinelOne Labs Advanced Threat Intelligence Report 2015 Predictions 2014 Rearview More, Better Malware The past 12 months were characterized by the extension of threats that emerged in 2013: more sophisticated,
EHS Privacy and Information Security
EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
Global Security Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security
The Onslaught of Cyber Security Threats and What that Means to You
The Onslaught of Cyber Security Threats and What that Means to You No End in Sight for Cyber Crime Growth Number of mobile devices affected IBM Number of accounts hacked CNN Money Number of malware samples
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
Cyber Security Solutions:
ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
Splunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
Global BYOD Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3145237/ Global BYOD Market 2015-2019 Description: About BYOD BYOD is a policy that allows employees to access corporate data and
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with
1. Economic factors: Positive global market for IDS/IPS security solutions and services.
Brochure More information from http://www.researchandmarkets.com/reports/2831830/ Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based, Network Based, Wireless, On-premise
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Securing Your Business with DNS Servers That Protect Themselves
Summary: The Infoblox DNS security product portfolio mitigates attacks on DNS/DHCP servers by intelligently recognizing various attack types and dropping attack traffic while responding only to legitimate
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems
MIT SDM Systems Thinking Webinar Series Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems By Charles Iheagwara, Ph.D, SDM 10 Outline The traditional
Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail
Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Analyst: Javvad Malik 24 Sep, 2014 It's almost two years to the day since RSA acquired Web-fraud detection vendor
Security 2014 and Beyond: An Evolving Threat Environment in a Mobile, Cloud, and Virtual World
Security 2014 and Beyond: An Evolving Threat Environment in a Mobile, Cloud, and Virtual World December 2013 Joel P. Fishbein, Jr BMO Capital Markets Corp. [email protected] (212) 885-4159 Brett Fodero
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
Next-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
Information Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E XCERPT M A R K E T A N A L Y S I S W o r l d w i d e S e c u r i t y a n d V u l n e r a b i l i
PREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
Global Information Security Products and Services Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3145249/ Global Information Security Products and Services Market 2015-2019 Description: About Information Security Products and
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
TCS Managed Security Services
IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
