A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
|
|
- Victor Morton
- 8 years ago
- Views:
Transcription
1 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest.
2 Symantec Acquires Blue Coat In Second Largest Cybersecurity Transaction Symantec Not Only Acquires Blue Coat, Acquires CEO In A $4.65B All Cash Deal. Transaction Overview Blue Coat Overview Date: EV / LTM Rev: 6/12/ x HQ: Sunnyvale, CA // Founded: 1996 CEO: Greg Clark (Now CEO of Symantec) Customers: 15,000 In December 2011, Thoma Bravo acquired Blue Coat and took company private for $1.3B. In March 2015, Bain Capital acquired Blue Coat from Thoma Bravo for $2.4B. Acquires EV / LTM EBITDA: Private Equity Support: NM Network Security Cloud + + Platform Capabilities Protect Cloud and On- Premise Assets Respond Rapidly to Security Incidents Protects enterprises and its users from cyber threats Defend Against Advanced Threats Manage Encrypted Traffic Enterprise Security $4.65 Billion Advanced web and cloud security Encrypted traffic management Network performance and optimization Optimize Network Performance Leverage Cloud to Protect the Cloud Transaction Funding Symantec acquires Blue Coat for $4.65B in an all cash deal Silver Lake makes an additional $500M investment into Symantec (doubling their investment to $1B) Bain Capital to reinvest $750M to help fund the deal Additional $2.8B raised in the form of debt for acquisition Top 5 Cybersecurity Transactions by Value Date Announced Acquirer Target Deal Value ($B) EV / LTM Rev August 19, 2010 $ x June 12, 2016 $ x February 9, 2004 $ x July 23, 2013 $ x March 10, 2015 $ x Source: Company press releases and websites, 451 Research. 1
3 The Market Continues To Value Scale, Predictability, & Profitability Symantec s Acquisition of Blue Coat Is A Prime Example. 9.0x 8.0x Check Point $14,461 mn Proofpoint $2,631 mn Splunk $7,526 mn Palo Alto Networks $11,670 mn 7.0x $3,073 mn (1) CyberArk $1,527 mn EV / Revenue 2016E 6.0x 5.0x 4.0x 3.0x 2.0x 1.0x AVG $989 mn Barracuda $774 mn MobileIron $273 mn F-secure $466 mn Imprivata $349 mn Qualys $1,121 mn Mimecast $582 mn Trend Micro $4,695 mn Fortinet $5,794 mn FireEye $2,567 mn Imperva $1,260 mn Rapid7 $588 mn R 2 By Quarter Current: 22.2% Q4: 29.2% Q3: 63.2% Q2: 68.4% 0.0x 0% 5% 10% 15% 20% 25% 30% 35% 40% E Revenue Growth High Growth Cybersecurity Low Growth Cybersecurity (1) Note: Size of the bubble indicates Market Cap (Equity value in the case of Blue Coat). In USD; Market data as of June 15, Source: Capital IQ. 2
4 Strategic Moves For Competitive Advantage Accelerating The Landscape Of Buyers For Cybersecurity Companies Has Expanded Over Time. Cybersecurity IT Notable Deals By Sector Defense IT PE 1/16: $275M / 6.9x 11/15: $280M / NA 10/15: $400M / 7.5x 11/15: $78M / NA 10/15: $71M / NA 4/15: $1.9B / NA 10/15: $453M / NA 7/15: $190M / NA 10/14: $233M / 3.0x Defense ISP Industrial Industrial / IoT ISP PE 1/16: NA / NA 10/15: $9M / NA 8/15: NA / NA Most Active Acquirers 12/14: $710M / 6.0x 7/15: NA / NA 4/15: $200M / 3.3x 7/14: NA / NA 4/15: $786M / 3.6x 3/15: $2.4B / NA Source: Momentum Partners. 3
5 Cybersecurity M&A: A Closer Look At Deal Value & Multiples The Combination of Blue Coat s Deal Value & Valuation Multiple Are Rare Air. M&A By Deal Size M&A By Valuation Multiples (EV / LTM Rev) 55% 50% 45% 40% 48% 85 35% 30% 25% 27% 30% 26% 35% 30% 25% 20% 15% 10% 5% 0% $247M Median Deal Size For >10x 16% 13% 29 11% 7% % >$0M - $50M $50M - $100M $100M - $250M $250M - $500M $500M - $1B $1B+ 20% 15% 10% 5% 0% % > x 3.0x - 5.0x 5.0x x 10.0x The median exit enterprise value for Cybersecurity exits since 2010 is $65M M&A exits in Cybersecurity are typically below $100M 60%+ of the time Exits above $1B are quite rare representing 6% of all deals (3 public, 6 private and 2 spin-out) Contemplated transactions are increasingly falling into two categories: Transformational (a la Symantec/Blue Coat) Opportunistic (rationalizing valuation and cooling funding markets) Valuations for M&A exits in Cybersecurity vary for many reasons growth, market leadership, scale, customer validation, technology and team Exits >10x are a small minority (18%) where the buyers are typically cash rich and willing to pay what it takes (median cash balance of the buyers at time of acquisition was $2.2B and median market cap was $17.9B) Buyers Source: Momentum Partners, 451 Research, Capital IQ. 4
6 The Security M&A Chessboard Major Moves Will Be Made Post Symantec / Blue Coat. The Top Targets (2016E Revenue $M) The Top Consolidators (Cash Balance $B) $105.3 $793.6 $63.5 $501.0 $425.3 $56.1 $336.8 $15.3 $303.6 $14.9 $211.0 $9.0 $197.8 $6.0 $2.8 All considered IPO candidates (> $75M in Revenue) $1.4 Each likely seeking $1B+ exit $1.1 Network/Endpoint Security MSSP Web Security Application Security IAM Vulnerability Management Cloud Security Application Security IAM Advanced Endpoint Security Backed by Vista Equity (Fund V: $5.7B) & Raytheon ($2.6B Cash) The Wild Cards Source: Momentum Partners. Advanced Endpoint Security The Wild Cards 5
7 CYBERscape: The Cybersecurity Landscape The Security Sector Is Dynamic And Vast. Infrastructure Security Endpoint Security Application Security Network Firewall Network Monitoring Endpoint Prevention WAF & Application Security Intrusion Prevention Systems Unified Threat Management Endpoint Detection & Response Vulnerability Assessment Messaging Security Web Security Managed Security Service Provider Industrial / IoT Security Security Operations & Incident Response Threat Intelligence Mobile Security Data Security SIEM Cloud Security Security Incident Response Specialized Threat Analysis & Protection Transaction Security Risk & Compliance Source: Momentum Partners. 6 Identity & Access Management
8 15 Advise. Network. Invest. Momentum Partners, LLC Momentum Capital Markets, LLC 340 Brannan Street Suite 501 San Francisco, California Michael Tedesco Executive Chairman Eric McAlpine Managing Partner Petros Kitsos Senior Advisor Timothy Lipton Partner Keith Skirbe Director Dino Boukouris Director *Securities offered through Momentum Capital Markets, LLC, a division of Financial Telesis Inc. Member FINRA/SIPC.
IT Security Q1 2016. Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference.
Q1 2016 Investment Banking Market Challenges Slow Near-Term Activity in IT Security IT Security In This Report Highlights from RSA Conference IPO activity slows as valuations decline Volatility delays
More informationWeekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014
Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Michael S. Lewis, CFA Managing Director msl@thesilverlinegroup.com (703) 424-1969 Michael J. Smith,
More informationThe State of M&A in the Cybersecurity Market. October 28, 2015
The State of M&A in the Cybersecurity Market October 28, 2015 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster
More informationInvesting in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014
Investing in Cyber Security Companies Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014 Table of Contents Evolving Themes in the Threat landscape Gov t/commercial Market Opportunities Mapping
More informationAcquisition of Vormetric 19 October 2015
Acquisition of Vormetric 19 October 2015 www.thalesgroup.com Cybersecurity at Thales Cybersecurity consulting Managed cybersecurity services Mobile cybersecurity Data security (Thales e-security) 500m+
More informationQ3 2013 Security & Risk Market Snapshot
Q3 2013 Security & Risk Market Snapshot Don More Managing Director dmore@signalhill.com Eric Wagner Managing Director ewagner@signalhill.com Peter Gant Managing Director pgant@signalhill.com Matt Fiore
More informationSmall-Cap Research. CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM- New Products Gaining Distribution and Generating First Sales
Small-Cap Research February 25, 2015 Lisa Thompson 312-265-9154 lthompson@zacks.com scr.zacks.com 10 S. Riverside Plaza, Chicago, IL 60606 CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM-
More informationThe Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
More informationCyber security a major trend in digital technology
Vontobel Investment Banking Cyber security a major trend in digital technology Cyber Security Performance Index October/November 2015 Performance creates trust Contents Overview A 3 Investment case Cyber
More informationDigital Media M&A Update January 2015
Technology and Digital Media Investment Banking M&A Advisory Digital Media M&A Update January 2015 January 29, 2015 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite 500 West Hollywood, CA 90069
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationAsset Management Equity Business Security, Safety & Protection Industry
Asset Management Equity Business Security, Safety & Protection Industry September 2014 Dear Reader, IT security industry: Update and overview Despite billions of dollars having been spent over the past
More informationGlobal Security Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security
More information2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
More informationQuarterly Technology M&A Review
Quarterly Technology M&A Review Q4 01 Technology M&A deal value increased considerably in Q4 01, while deal count dipped to the lowest level since Q4 010. Normalized to remove the impact of Softbank s
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationRaytheon and Vista Equity Partners form new cybersecurity company
Raytheon and Vista Equity Partners form new cybersecurity company Investor Presentation April 20, 2015 Dial In Number 866.825.3209 Domestic 617.213.8061 International Reservation Number: 48245306 Replay
More informationReference Technology Roadmap
Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index,
More informationAfrica Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informationGlobal Cyber Security Industry Report 2015
Global Cyber Security Industry Report 2015 Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com Global Cyber Security Industry Report 2015 Date: September 1, 2015 Pages: 158 Price:
More informationQuarterly Technology M&A Review
Quarterly Technology M&A Review Q3 2011 Overall Q3 Technology M&A kept pace with a strong Q2 and proved to be an impressive quarter in terms of both aggregate count and value, totaling 937 announced transactions
More informationGlobal SaaS-based Content Security Market 2014-2018
Brochure More information from http://www.researchandmarkets.com/reports/2933813/ Global SaaS-based Content Security Market 2014-2018 Description: About SaaS-based Content Security SaaS-based content security
More informationSplunk: Using Big Data for Cybersecurity
Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals
More informationBEST PRACTICES RESEARCH
Frost & Sullivan 1 We Accelerate Growth Contents Background and Company Performance... 3 Industry Challenges... 3 New Product Attributes and Customer Impact... 3 Conclusion... 6 Significance of New Product
More informationGlobal Cyber Security Market Forecast and Opportunities, 2020
Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast
More informationSymantec to Acquire Blue Coat and Define the Future of Cybersecurity
June 12, 2016 Symantec to Acquire Blue Coat and Define the Future of Cybersecurity Symantec Enhances Global Leadership Position with Transformational Combination; Delivers Comprehensive Enterprise Cyber
More informationOvum Decision Matrix: Selecting a Global Telco Managed Security Services Provider
Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Moving from network-centric security to the broader IT security suite Reference Code: TE007-000800 Publication Date: 17
More informationSeparating Security and Information Management into Two Industry-Leading Technology Companies
Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction
More informationIT Services, Cloud and Managed Services M&A Update July / August 2014
Technology and Digital Media Investment Banking M&A Advisory IT Services, Cloud and Managed Services M&A Update July / August 2014 August 29, 2014 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite
More informationCybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationcarahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION
carahsoft CARAHSOFT S RESPONSE TO THE Florida Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
More informationAdvanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
More informationLending Club Reports Third Quarter 2015 Results Q3 operating revenue up 104% year-over-year to $115.1 million
Lending Club Reports Third Quarter Results Q3 operating revenue up 104% year-over-year to $115.1 million SAN FRANCISCO October 29, Lending Club (NYSE:LC), the world s largest online marketplace connecting
More informationWhy Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial
More informationOurCrowd Startup Investing Guide: Cybersecurity
OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.
More informationINDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS NSS Labs Real-World Group Tests INDEPENDENT VALIDATION OF FORTINET SOLUTIONS Introduction Organizations can get overwhelmed by vendor claims and alleged silver
More informationGlobal Web Application Firewall Market 2015-2019
Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from
More information10 Key Steps for a Sustained DDoS Protection Plan. Stephen Gates Chief Technology Evangelist - Corero
10 Key Steps for a Sustained DDoS Protection Plan Stephen Gates Chief Technology Evangelist - Corero #1 Understand that you are vulnerable! How well are others preparing? 40% of enterprises are completely
More informationISE CYBER SECURITY TM INDEX
Index Methodology Guide ISE CYBER SECURITY TM INDEX Issue 2.0 Issue date: August 28, 2015 Produced by:, LLC 60 Broad Street, New York NY 10004 www.ise.com The information contained in this document is
More informationEnterprise-Focused Telecom Technology Quarterly
FOCUS Telecom Technology and Services Group Enterprise-Focused Telecom Technology Quarterly Winter 2014 Report Vol. 4, No. 1 In this Issue Seasoned, Systematic, Successful SM Investment Banking and Advisory
More informationSoftware, Information, and Business Services Industries
1H15 DEAL NOTES M&A and Investments Review Software, Information, and Business Services Industries 1H15 Review of M&A and Investment Activity in the Software, Information, and Business Services Industries:
More informationGlobal Security Services Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3217235/ Global Security Services Market 2015-2019 Description: About Security Services Security services focus on the security
More informationEric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings!
Eric Collins Connected Holdings Market Makers: Accelerate Your IoT Business with Connected Holdings! Connected Holdings Heritage: 2006 2009 2011 2012 2013 2014 Founded with Design Services Business Model
More informationSymantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010
Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010 Forward Looking Statements This presentation contains forward looking statements within the meaning of U.S. federal
More informationNext Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com
Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
More informationGlobal Network Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3505505/ Global Network Security Market 2015-2019 Description: About network security Network security comprises products and services
More informationFebruary, 2016 NASDAQ: FNJN
February, 2016 NASDAQ: FNJN 2 Safe Harbor Statement The following presentation is prepared as of February 5, 2016 and outlines matters for informational purposes only. This document does not constitute
More informationMarket Research Council
Market Research Council Gridley & Company LLC A Perspective on Market Research Trends October 21, 2011 0 Key Industry Issues Definition of online panels evolving Threat of real time analytics and customer
More informationCLOUD & Managed Security Services
CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words
More informationThe Purchase Price in M&A Deals
The Purchase Price in M&A Deals Question that came in the other day In an M&A deal, does the buyer pay the Equity Value or the Enterprise Value to acquire the seller? What does it mean in press releases
More informationCompany Profile. 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com
Company Profile 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com Trusted Security Advisor For Industrial Control Systems Thomason Technologies provides world-class security solutions
More informationTCS Managed Security Services
IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...
More informationGuest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.
Guest Speaker Michael Sutton Chief Information Security Officer Zscaler, Inc. Michael Sutton has dedicated his career to conducting leadingedge security research, building world-class security teams and
More informationGlobal Endpoint Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that
More informationDDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
More informationSales Pulse Research / Securosis. Information Security. Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT
Sales Pulse Research / Securosis Information Security Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT June 6, 2015 1 Current Trends in This Report: ü Refresh / Upgrade Cycle for Network Security
More informationPace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989. Cyber Security Market Trends 2015
Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989 Cyber Security Market Trends 2015. Introduction T he cyber security market is booming in 2015 following a very strong year in 2014.
More informationPower Matters. Acquisition of PMC. October 19, 2015
Power Matters Acquisition of PMC October 19, 2015 Disclaimer Cautionary Note Concerning Forward-Looking Statements Statements in this presentation regarding Microsemi s offer to acquire PMC-Sierra Inc.
More informationQ4 2013 Infrastructure Software Market Snapshot
Q4 2013 Infrastructure Software Market Snapshot Joel Strauch Managing Director jstrauch@signalhill.com www.signalhill.com B a l t i m o r e B a n g a l o r e B o s t o n M u m b a i N a s h v i l l e N
More informationCASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months
CASE STUDY NEXON ASIA PACIFIC PAGE 1 Nexon Asia Pacific is a Managed Security Service Provider (MSSP) that delivers infrastructure and software to provide secure connectivity and productivity applications,
More informationReference Technology Roadmap
Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading
More informationGovernment + Enterprise + Innovation + Strategy
Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationSplunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
More informationKEYW uses acquired Sensage technology to form Hexis Cyber Solutions
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with
More informationSecurity Camp Conference Fine Art of Balancing Security & Privacy
Security Camp Conference Fine Art of Balancing Security & Privacy Kim Bilderback AT&T Director GovEd Cybersecurity Services kb7459@att.com August 21, 2014 Cybersecurity - The Threats Increase AT&T DDoS
More informationNetwork Security Sandbox Market Analysis APTs Create a Must Have Security Technology
Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology An Executive Brief Frank Dickson Research Director Information & Network Security 1 Key Findings Advanced persistent
More informationM&A 2015 CONFERENCE INDIANAPOLIS JUNE 11
M&A 2015 CONFERENCE INDIANAPOLIS JUNE 11 1 What Makes Private Equity M&A Different? 2015 M&A CONFERENCE 2015 M&A CONFERENCE 2 Panelists Jeff Brown, Partner, Faegre Baker Daniels John Ackerman, Principal,
More information2015 M&A Outlook Survey Report
2015 M&A Outlook Survey Report The Boom is Back: M&A Reemerges as Leading Growth Strategy kpmg.com Foreword M&A in the U.S. has finally reached prerecession levels. Deal value in the first three quarters
More informationREPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different?
REPORT Perimeter Security Defenses State of Perimeter Security Defenses, Time to Think Different? Table of Contents Introduction 3 Key Findings 4 Implications 6 REPORT State of Perimeter Security Defenses
More informationNext-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
More informationMANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE
MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE August 2014 Derek E. Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC Report Highlights p2 p3 p6 p7 Security is
More informationInvestor Presentation
Investor Presentation November 2015 Forward Looking Statements This presentation contains statements regarding the pending sale of our information management business to The Carlyle Group, which may be
More informationGlobal SaaS Security Market 2014-2018
Brochure More information from http://www.researchandmarkets.com/reports/2964277/ Global SaaS Security Market 2014-2018 Description: About SaaS Security SaaS security is a type of IT security deployment
More informationIT Services, Cloud and Managed Services M&A Update Q2 2015
Technology and Digital Media Investment Banking + M&A Advisory IT Services, Cloud and Managed Services M&A Update Q2 2015 July 9, 2015 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite 500 West
More informationWith Cloud Defender, Alert Logic combines products to deliver outcome-based security
With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,
More informationGlobal Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)
Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationGlobal Web Application Firewall (WAF) Market 2014-2018
Brochure More information from http://www.researchandmarkets.com/reports/2964279/ Global Web Application Firewall (WAF) Market 2014-2018 Description: About Web Application Firewall A web application firewall
More informationBig Data Analytics capitalizing on the noise
Big Data Analytics capitalizing on the noise March 2014 rbrookman@ Big Data Remains Undefined Source: MergerTech, Tagxedo rbrookman@ 2 During 2003, approximately five exabytes of data were created. Today,
More informationInternal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
More informationRaising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements
Raising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements November 2015 Presented by: Stephen Thau 2 BIOTECH IPOS ARE HOT! The Biggest Biotech
More informationH.I.T. Greatest Hits. MARLIN & ASSOCIATES Healthcare IT Review August 2013. Dear Clients and Friends,
H.I.T. Greatest Hits Dear Clients and Friends, We all agree that the healthcare industry can learn valuable lessons from financial institutions, be it in risk management, security, developing standards
More informationNNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
More informationPCPIQ1 Private Company Price Index. Spotlight on Software & IT Services
2014 PCPIQ1 Private Company Price Index Spotlight on Software & IT Services 2 PCPI/PEPI IS IT ALL BAD NEWS? 2013 ended on a high: deals in Q4 2013 were up by 5.4% yearon-year, and the Private Company Price
More informationVENTURE CAPITAL 2010 REPRESENTATIVE TRANSACTIONS Q. A. When the going gets tough, who keeps you going? Manatt. Venture Capital.
VENTURE CAPITAL 2010 REPRESENTATIVE TRANSACTIONS Q. A. When the going gets tough, who keeps you going? Manatt. Venture Capital. Forging partnerships to fund strong ideas. Venture capital investors this
More informationClick to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
More informationFinancial Engines to Acquire The Mutual Fund Store to Expand Independent Advisory Services for 401(k) Plan Participants
FOR IMMEDIATE RELEASE: November 5, 2015, 4:04 p.m. (EST) Financial Engines to Acquire The Mutual Fund Store to Expand Independent Advisory Services for 401(k) Plan Participants Adds comprehensive financial
More informationCyber intelligence in an online world
Cyber intelligence in an online world James Hanlon CISM, CISSP, CMI Cyber Strategy & GTM, EMEA Cyber intelligence in an online world SYMANTEC VISION SYMPOSIUM 2014 2 Software and data powers the world
More informationValuation for Mergers and Acquisitions. Prepared By Ooi Kok Hwa MRR Consulting
Valuation for Mergers and Acquisitions Prepared By Ooi Kok Hwa MRR Consulting Agenda This seminar will explain: Various valuation approaches for M&A exercises; Determine the value of target companies as
More informationPalo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
More informationIncrease insight. Reduce risk. Feel confident.
Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING
More informationWAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
More informationCybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
More informationNetwork Security: Overview of out-licensing opportunities
Contents Executive Summary... 1 Introduction... 2 Prominent Assignees... 7 Taxonomy... 9 Assignee Similarity... 10 McAfee s Licensing Opportunities Chart... 11 LexScore... 13 Geographical Coverage... 14
More informationORGANIZADOR: APOIANTE PRINCIPAL:
ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 luismiguel_gomes@symantec.com Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment
More informationOverview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.
Overview Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated
More information