A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

Size: px
Start display at page:

Download "A Closer Look At The Second Largest Cybersecurity M&A Transaction In History"

Transcription

1 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest.

2 Symantec Acquires Blue Coat In Second Largest Cybersecurity Transaction Symantec Not Only Acquires Blue Coat, Acquires CEO In A $4.65B All Cash Deal. Transaction Overview Blue Coat Overview Date: EV / LTM Rev: 6/12/ x HQ: Sunnyvale, CA // Founded: 1996 CEO: Greg Clark (Now CEO of Symantec) Customers: 15,000 In December 2011, Thoma Bravo acquired Blue Coat and took company private for $1.3B. In March 2015, Bain Capital acquired Blue Coat from Thoma Bravo for $2.4B. Acquires EV / LTM EBITDA: Private Equity Support: NM Network Security Cloud + + Platform Capabilities Protect Cloud and On- Premise Assets Respond Rapidly to Security Incidents Protects enterprises and its users from cyber threats Defend Against Advanced Threats Manage Encrypted Traffic Enterprise Security $4.65 Billion Advanced web and cloud security Encrypted traffic management Network performance and optimization Optimize Network Performance Leverage Cloud to Protect the Cloud Transaction Funding Symantec acquires Blue Coat for $4.65B in an all cash deal Silver Lake makes an additional $500M investment into Symantec (doubling their investment to $1B) Bain Capital to reinvest $750M to help fund the deal Additional $2.8B raised in the form of debt for acquisition Top 5 Cybersecurity Transactions by Value Date Announced Acquirer Target Deal Value ($B) EV / LTM Rev August 19, 2010 $ x June 12, 2016 $ x February 9, 2004 $ x July 23, 2013 $ x March 10, 2015 $ x Source: Company press releases and websites, 451 Research. 1

3 The Market Continues To Value Scale, Predictability, & Profitability Symantec s Acquisition of Blue Coat Is A Prime Example. 9.0x 8.0x Check Point $14,461 mn Proofpoint $2,631 mn Splunk $7,526 mn Palo Alto Networks $11,670 mn 7.0x $3,073 mn (1) CyberArk $1,527 mn EV / Revenue 2016E 6.0x 5.0x 4.0x 3.0x 2.0x 1.0x AVG $989 mn Barracuda $774 mn MobileIron $273 mn F-secure $466 mn Imprivata $349 mn Qualys $1,121 mn Mimecast $582 mn Trend Micro $4,695 mn Fortinet $5,794 mn FireEye $2,567 mn Imperva $1,260 mn Rapid7 $588 mn R 2 By Quarter Current: 22.2% Q4: 29.2% Q3: 63.2% Q2: 68.4% 0.0x 0% 5% 10% 15% 20% 25% 30% 35% 40% E Revenue Growth High Growth Cybersecurity Low Growth Cybersecurity (1) Note: Size of the bubble indicates Market Cap (Equity value in the case of Blue Coat). In USD; Market data as of June 15, Source: Capital IQ. 2

4 Strategic Moves For Competitive Advantage Accelerating The Landscape Of Buyers For Cybersecurity Companies Has Expanded Over Time. Cybersecurity IT Notable Deals By Sector Defense IT PE 1/16: $275M / 6.9x 11/15: $280M / NA 10/15: $400M / 7.5x 11/15: $78M / NA 10/15: $71M / NA 4/15: $1.9B / NA 10/15: $453M / NA 7/15: $190M / NA 10/14: $233M / 3.0x Defense ISP Industrial Industrial / IoT ISP PE 1/16: NA / NA 10/15: $9M / NA 8/15: NA / NA Most Active Acquirers 12/14: $710M / 6.0x 7/15: NA / NA 4/15: $200M / 3.3x 7/14: NA / NA 4/15: $786M / 3.6x 3/15: $2.4B / NA Source: Momentum Partners. 3

5 Cybersecurity M&A: A Closer Look At Deal Value & Multiples The Combination of Blue Coat s Deal Value & Valuation Multiple Are Rare Air. M&A By Deal Size M&A By Valuation Multiples (EV / LTM Rev) 55% 50% 45% 40% 48% 85 35% 30% 25% 27% 30% 26% 35% 30% 25% 20% 15% 10% 5% 0% $247M Median Deal Size For >10x 16% 13% 29 11% 7% % >$0M - $50M $50M - $100M $100M - $250M $250M - $500M $500M - $1B $1B+ 20% 15% 10% 5% 0% % > x 3.0x - 5.0x 5.0x x 10.0x The median exit enterprise value for Cybersecurity exits since 2010 is $65M M&A exits in Cybersecurity are typically below $100M 60%+ of the time Exits above $1B are quite rare representing 6% of all deals (3 public, 6 private and 2 spin-out) Contemplated transactions are increasingly falling into two categories: Transformational (a la Symantec/Blue Coat) Opportunistic (rationalizing valuation and cooling funding markets) Valuations for M&A exits in Cybersecurity vary for many reasons growth, market leadership, scale, customer validation, technology and team Exits >10x are a small minority (18%) where the buyers are typically cash rich and willing to pay what it takes (median cash balance of the buyers at time of acquisition was $2.2B and median market cap was $17.9B) Buyers Source: Momentum Partners, 451 Research, Capital IQ. 4

6 The Security M&A Chessboard Major Moves Will Be Made Post Symantec / Blue Coat. The Top Targets (2016E Revenue $M) The Top Consolidators (Cash Balance $B) $105.3 $793.6 $63.5 $501.0 $425.3 $56.1 $336.8 $15.3 $303.6 $14.9 $211.0 $9.0 $197.8 $6.0 $2.8 All considered IPO candidates (> $75M in Revenue) $1.4 Each likely seeking $1B+ exit $1.1 Network/Endpoint Security MSSP Web Security Application Security IAM Vulnerability Management Cloud Security Application Security IAM Advanced Endpoint Security Backed by Vista Equity (Fund V: $5.7B) & Raytheon ($2.6B Cash) The Wild Cards Source: Momentum Partners. Advanced Endpoint Security The Wild Cards 5

7 CYBERscape: The Cybersecurity Landscape The Security Sector Is Dynamic And Vast. Infrastructure Security Endpoint Security Application Security Network Firewall Network Monitoring Endpoint Prevention WAF & Application Security Intrusion Prevention Systems Unified Threat Management Endpoint Detection & Response Vulnerability Assessment Messaging Security Web Security Managed Security Service Provider Industrial / IoT Security Security Operations & Incident Response Threat Intelligence Mobile Security Data Security SIEM Cloud Security Security Incident Response Specialized Threat Analysis & Protection Transaction Security Risk & Compliance Source: Momentum Partners. 6 Identity & Access Management

8 15 Advise. Network. Invest. Momentum Partners, LLC Momentum Capital Markets, LLC 340 Brannan Street Suite 501 San Francisco, California Michael Tedesco Executive Chairman Eric McAlpine Managing Partner Petros Kitsos Senior Advisor Timothy Lipton Partner Keith Skirbe Director Dino Boukouris Director *Securities offered through Momentum Capital Markets, LLC, a division of Financial Telesis Inc. Member FINRA/SIPC.

IT Security Q1 2016. Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference.

IT Security Q1 2016. Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference. Q1 2016 Investment Banking Market Challenges Slow Near-Term Activity in IT Security IT Security In This Report Highlights from RSA Conference IPO activity slows as valuations decline Volatility delays

More information

Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014

Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Michael S. Lewis, CFA Managing Director msl@thesilverlinegroup.com (703) 424-1969 Michael J. Smith,

More information

The State of M&A in the Cybersecurity Market. October 28, 2015

The State of M&A in the Cybersecurity Market. October 28, 2015 The State of M&A in the Cybersecurity Market October 28, 2015 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster

More information

Investing in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014

Investing in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014 Investing in Cyber Security Companies Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014 Table of Contents Evolving Themes in the Threat landscape Gov t/commercial Market Opportunities Mapping

More information

Acquisition of Vormetric 19 October 2015

Acquisition of Vormetric 19 October 2015 Acquisition of Vormetric 19 October 2015 www.thalesgroup.com Cybersecurity at Thales Cybersecurity consulting Managed cybersecurity services Mobile cybersecurity Data security (Thales e-security) 500m+

More information

Q3 2013 Security & Risk Market Snapshot

Q3 2013 Security & Risk Market Snapshot Q3 2013 Security & Risk Market Snapshot Don More Managing Director dmore@signalhill.com Eric Wagner Managing Director ewagner@signalhill.com Peter Gant Managing Director pgant@signalhill.com Matt Fiore

More information

Small-Cap Research. CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM- New Products Gaining Distribution and Generating First Sales

Small-Cap Research. CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM- New Products Gaining Distribution and Generating First Sales Small-Cap Research February 25, 2015 Lisa Thompson 312-265-9154 lthompson@zacks.com scr.zacks.com 10 S. Riverside Plaza, Chicago, IL 60606 CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM-

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

Cyber security a major trend in digital technology

Cyber security a major trend in digital technology Vontobel Investment Banking Cyber security a major trend in digital technology Cyber Security Performance Index October/November 2015 Performance creates trust Contents Overview A 3 Investment case Cyber

More information

Digital Media M&A Update January 2015

Digital Media M&A Update January 2015 Technology and Digital Media Investment Banking M&A Advisory Digital Media M&A Update January 2015 January 29, 2015 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite 500 West Hollywood, CA 90069

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Asset Management Equity Business Security, Safety & Protection Industry

Asset Management Equity Business Security, Safety & Protection Industry Asset Management Equity Business Security, Safety & Protection Industry September 2014 Dear Reader, IT security industry: Update and overview Despite billions of dollars having been spent over the past

More information

Global Security Software Market 2015-2019

Global Security Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Quarterly Technology M&A Review

Quarterly Technology M&A Review Quarterly Technology M&A Review Q4 01 Technology M&A deal value increased considerably in Q4 01, while deal count dipped to the lowest level since Q4 010. Normalized to remove the impact of Softbank s

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Raytheon and Vista Equity Partners form new cybersecurity company

Raytheon and Vista Equity Partners form new cybersecurity company Raytheon and Vista Equity Partners form new cybersecurity company Investor Presentation April 20, 2015 Dial In Number 866.825.3209 Domestic 617.213.8061 International Reservation Number: 48245306 Replay

More information

Reference Technology Roadmap

Reference Technology Roadmap Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index,

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Global Cyber Security Industry Report 2015

Global Cyber Security Industry Report 2015 Global Cyber Security Industry Report 2015 Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com Global Cyber Security Industry Report 2015 Date: September 1, 2015 Pages: 158 Price:

More information

Quarterly Technology M&A Review

Quarterly Technology M&A Review Quarterly Technology M&A Review Q3 2011 Overall Q3 Technology M&A kept pace with a strong Q2 and proved to be an impressive quarter in terms of both aggregate count and value, totaling 937 announced transactions

More information

Global SaaS-based Content Security Market 2014-2018

Global SaaS-based Content Security Market 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2933813/ Global SaaS-based Content Security Market 2014-2018 Description: About SaaS-based Content Security SaaS-based content security

More information

Splunk: Using Big Data for Cybersecurity

Splunk: Using Big Data for Cybersecurity Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH Frost & Sullivan 1 We Accelerate Growth Contents Background and Company Performance... 3 Industry Challenges... 3 New Product Attributes and Customer Impact... 3 Conclusion... 6 Significance of New Product

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

Symantec to Acquire Blue Coat and Define the Future of Cybersecurity

Symantec to Acquire Blue Coat and Define the Future of Cybersecurity June 12, 2016 Symantec to Acquire Blue Coat and Define the Future of Cybersecurity Symantec Enhances Global Leadership Position with Transformational Combination; Delivers Comprehensive Enterprise Cyber

More information

Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider

Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Moving from network-centric security to the broader IT security suite Reference Code: TE007-000800 Publication Date: 17

More information

Separating Security and Information Management into Two Industry-Leading Technology Companies

Separating Security and Information Management into Two Industry-Leading Technology Companies Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction

More information

IT Services, Cloud and Managed Services M&A Update July / August 2014

IT Services, Cloud and Managed Services M&A Update July / August 2014 Technology and Digital Media Investment Banking M&A Advisory IT Services, Cloud and Managed Services M&A Update July / August 2014 August 29, 2014 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite

More information

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION carahsoft CARAHSOFT S RESPONSE TO THE Florida Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

More information

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion

More information

Lending Club Reports Third Quarter 2015 Results Q3 operating revenue up 104% year-over-year to $115.1 million

Lending Club Reports Third Quarter 2015 Results Q3 operating revenue up 104% year-over-year to $115.1 million Lending Club Reports Third Quarter Results Q3 operating revenue up 104% year-over-year to $115.1 million SAN FRANCISCO October 29, Lending Club (NYSE:LC), the world s largest online marketplace connecting

More information

Why Are Investors Excited About Cyber Security Startups, Again?

Why Are Investors Excited About Cyber Security Startups, Again? Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial

More information

OurCrowd Startup Investing Guide: Cybersecurity

OurCrowd Startup Investing Guide: Cybersecurity OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.

More information

INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests

INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests INDEPENDENT VALIDATION OF FORTINET SOLUTIONS NSS Labs Real-World Group Tests INDEPENDENT VALIDATION OF FORTINET SOLUTIONS Introduction Organizations can get overwhelmed by vendor claims and alleged silver

More information

Global Web Application Firewall Market 2015-2019

Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from

More information

10 Key Steps for a Sustained DDoS Protection Plan. Stephen Gates Chief Technology Evangelist - Corero

10 Key Steps for a Sustained DDoS Protection Plan. Stephen Gates Chief Technology Evangelist - Corero 10 Key Steps for a Sustained DDoS Protection Plan Stephen Gates Chief Technology Evangelist - Corero #1 Understand that you are vulnerable! How well are others preparing? 40% of enterprises are completely

More information

ISE CYBER SECURITY TM INDEX

ISE CYBER SECURITY TM INDEX Index Methodology Guide ISE CYBER SECURITY TM INDEX Issue 2.0 Issue date: August 28, 2015 Produced by:, LLC 60 Broad Street, New York NY 10004 www.ise.com The information contained in this document is

More information

Enterprise-Focused Telecom Technology Quarterly

Enterprise-Focused Telecom Technology Quarterly FOCUS Telecom Technology and Services Group Enterprise-Focused Telecom Technology Quarterly Winter 2014 Report Vol. 4, No. 1 In this Issue Seasoned, Systematic, Successful SM Investment Banking and Advisory

More information

Software, Information, and Business Services Industries

Software, Information, and Business Services Industries 1H15 DEAL NOTES M&A and Investments Review Software, Information, and Business Services Industries 1H15 Review of M&A and Investment Activity in the Software, Information, and Business Services Industries:

More information

Global Security Services Market 2015-2019

Global Security Services Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3217235/ Global Security Services Market 2015-2019 Description: About Security Services Security services focus on the security

More information

Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings!

Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings! Eric Collins Connected Holdings Market Makers: Accelerate Your IoT Business with Connected Holdings! Connected Holdings Heritage: 2006 2009 2011 2012 2013 2014 Founded with Design Services Business Model

More information

Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010

Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010 Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010 Forward Looking Statements This presentation contains forward looking statements within the meaning of U.S. federal

More information

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity

More information

Global Network Security Market 2015-2019

Global Network Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3505505/ Global Network Security Market 2015-2019 Description: About network security Network security comprises products and services

More information

February, 2016 NASDAQ: FNJN

February, 2016 NASDAQ: FNJN February, 2016 NASDAQ: FNJN 2 Safe Harbor Statement The following presentation is prepared as of February 5, 2016 and outlines matters for informational purposes only. This document does not constitute

More information

Market Research Council

Market Research Council Market Research Council Gridley & Company LLC A Perspective on Market Research Trends October 21, 2011 0 Key Industry Issues Definition of online panels evolving Threat of real time analytics and customer

More information

CLOUD & Managed Security Services

CLOUD & Managed Security Services CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words

More information

The Purchase Price in M&A Deals

The Purchase Price in M&A Deals The Purchase Price in M&A Deals Question that came in the other day In an M&A deal, does the buyer pay the Equity Value or the Enterprise Value to acquire the seller? What does it mean in press releases

More information

Company Profile. 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com

Company Profile. 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com Company Profile 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com Trusted Security Advisor For Industrial Control Systems Thomason Technologies provides world-class security solutions

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc. Guest Speaker Michael Sutton Chief Information Security Officer Zscaler, Inc. Michael Sutton has dedicated his career to conducting leadingedge security research, building world-class security teams and

More information

Global Endpoint Security Market 2015-2019

Global Endpoint Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that

More information

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of

More information

Sales Pulse Research / Securosis. Information Security. Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT

Sales Pulse Research / Securosis. Information Security. Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT Sales Pulse Research / Securosis Information Security Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT June 6, 2015 1 Current Trends in This Report: ü Refresh / Upgrade Cycle for Network Security

More information

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989. Cyber Security Market Trends 2015

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989. Cyber Security Market Trends 2015 Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989 Cyber Security Market Trends 2015. Introduction T he cyber security market is booming in 2015 following a very strong year in 2014.

More information

Power Matters. Acquisition of PMC. October 19, 2015

Power Matters. Acquisition of PMC. October 19, 2015 Power Matters Acquisition of PMC October 19, 2015 Disclaimer Cautionary Note Concerning Forward-Looking Statements Statements in this presentation regarding Microsemi s offer to acquire PMC-Sierra Inc.

More information

Q4 2013 Infrastructure Software Market Snapshot

Q4 2013 Infrastructure Software Market Snapshot Q4 2013 Infrastructure Software Market Snapshot Joel Strauch Managing Director jstrauch@signalhill.com www.signalhill.com B a l t i m o r e B a n g a l o r e B o s t o n M u m b a i N a s h v i l l e N

More information

CASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months

CASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months CASE STUDY NEXON ASIA PACIFIC PAGE 1 Nexon Asia Pacific is a Managed Security Service Provider (MSSP) that delivers infrastructure and software to provide secure connectivity and productivity applications,

More information

Reference Technology Roadmap

Reference Technology Roadmap Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading

More information

Government + Enterprise + Innovation + Strategy

Government + Enterprise + Innovation + Strategy Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with

More information

Security Camp Conference Fine Art of Balancing Security & Privacy

Security Camp Conference Fine Art of Balancing Security & Privacy Security Camp Conference Fine Art of Balancing Security & Privacy Kim Bilderback AT&T Director GovEd Cybersecurity Services kb7459@att.com August 21, 2014 Cybersecurity - The Threats Increase AT&T DDoS

More information

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology An Executive Brief Frank Dickson Research Director Information & Network Security 1 Key Findings Advanced persistent

More information

M&A 2015 CONFERENCE INDIANAPOLIS JUNE 11

M&A 2015 CONFERENCE INDIANAPOLIS JUNE 11 M&A 2015 CONFERENCE INDIANAPOLIS JUNE 11 1 What Makes Private Equity M&A Different? 2015 M&A CONFERENCE 2015 M&A CONFERENCE 2 Panelists Jeff Brown, Partner, Faegre Baker Daniels John Ackerman, Principal,

More information

2015 M&A Outlook Survey Report

2015 M&A Outlook Survey Report 2015 M&A Outlook Survey Report The Boom is Back: M&A Reemerges as Leading Growth Strategy kpmg.com Foreword M&A in the U.S. has finally reached prerecession levels. Deal value in the first three quarters

More information

REPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different?

REPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different? REPORT Perimeter Security Defenses State of Perimeter Security Defenses, Time to Think Different? Table of Contents Introduction 3 Key Findings 4 Implications 6 REPORT State of Perimeter Security Defenses

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING IT ALONE MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE August 2014 Derek E. Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC Report Highlights p2 p3 p6 p7 Security is

More information

Investor Presentation

Investor Presentation Investor Presentation November 2015 Forward Looking Statements This presentation contains statements regarding the pending sale of our information management business to The Carlyle Group, which may be

More information

Global SaaS Security Market 2014-2018

Global SaaS Security Market 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2964277/ Global SaaS Security Market 2014-2018 Description: About SaaS Security SaaS security is a type of IT security deployment

More information

IT Services, Cloud and Managed Services M&A Update Q2 2015

IT Services, Cloud and Managed Services M&A Update Q2 2015 Technology and Digital Media Investment Banking + M&A Advisory IT Services, Cloud and Managed Services M&A Update Q2 2015 July 9, 2015 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite 500 West

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020) Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Global Web Application Firewall (WAF) Market 2014-2018

Global Web Application Firewall (WAF) Market 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2964279/ Global Web Application Firewall (WAF) Market 2014-2018 Description: About Web Application Firewall A web application firewall

More information

Big Data Analytics capitalizing on the noise

Big Data Analytics capitalizing on the noise Big Data Analytics capitalizing on the noise March 2014 rbrookman@ Big Data Remains Undefined Source: MergerTech, Tagxedo rbrookman@ 2 During 2003, approximately five exabytes of data were created. Today,

More information

Internal Network Firewall (INFW) Protecting your network from the inside out

Internal Network Firewall (INFW) Protecting your network from the inside out Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda

More information

Raising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements

Raising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements Raising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements November 2015 Presented by: Stephen Thau 2 BIOTECH IPOS ARE HOT! The Biggest Biotech

More information

H.I.T. Greatest Hits. MARLIN & ASSOCIATES Healthcare IT Review August 2013. Dear Clients and Friends,

H.I.T. Greatest Hits. MARLIN & ASSOCIATES Healthcare IT Review August 2013. Dear Clients and Friends, H.I.T. Greatest Hits Dear Clients and Friends, We all agree that the healthcare industry can learn valuable lessons from financial institutions, be it in risk management, security, developing standards

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

PCPIQ1 Private Company Price Index. Spotlight on Software & IT Services

PCPIQ1 Private Company Price Index. Spotlight on Software & IT Services 2014 PCPIQ1 Private Company Price Index Spotlight on Software & IT Services 2 PCPI/PEPI IS IT ALL BAD NEWS? 2013 ended on a high: deals in Q4 2013 were up by 5.4% yearon-year, and the Private Company Price

More information

VENTURE CAPITAL 2010 REPRESENTATIVE TRANSACTIONS Q. A. When the going gets tough, who keeps you going? Manatt. Venture Capital.

VENTURE CAPITAL 2010 REPRESENTATIVE TRANSACTIONS Q. A. When the going gets tough, who keeps you going? Manatt. Venture Capital. VENTURE CAPITAL 2010 REPRESENTATIVE TRANSACTIONS Q. A. When the going gets tough, who keeps you going? Manatt. Venture Capital. Forging partnerships to fund strong ideas. Venture capital investors this

More information

Click to edit Master title style. How To Choose The Right MSSP

Click to edit Master title style. How To Choose The Right MSSP How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield

More information

Financial Engines to Acquire The Mutual Fund Store to Expand Independent Advisory Services for 401(k) Plan Participants

Financial Engines to Acquire The Mutual Fund Store to Expand Independent Advisory Services for 401(k) Plan Participants FOR IMMEDIATE RELEASE: November 5, 2015, 4:04 p.m. (EST) Financial Engines to Acquire The Mutual Fund Store to Expand Independent Advisory Services for 401(k) Plan Participants Adds comprehensive financial

More information

Cyber intelligence in an online world

Cyber intelligence in an online world Cyber intelligence in an online world James Hanlon CISM, CISSP, CMI Cyber Strategy & GTM, EMEA Cyber intelligence in an online world SYMANTEC VISION SYMPOSIUM 2014 2 Software and data powers the world

More information

Valuation for Mergers and Acquisitions. Prepared By Ooi Kok Hwa MRR Consulting

Valuation for Mergers and Acquisitions. Prepared By Ooi Kok Hwa MRR Consulting Valuation for Mergers and Acquisitions Prepared By Ooi Kok Hwa MRR Consulting Agenda This seminar will explain: Various valuation approaches for M&A exercises; Determine the value of target companies as

More information

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Network Security: Overview of out-licensing opportunities

Network Security: Overview of out-licensing opportunities Contents Executive Summary... 1 Introduction... 2 Prominent Assignees... 7 Taxonomy... 9 Assignee Similarity... 10 McAfee s Licensing Opportunities Chart... 11 LexScore... 13 Geographical Coverage... 14

More information

ORGANIZADOR: APOIANTE PRINCIPAL:

ORGANIZADOR: APOIANTE PRINCIPAL: ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 luismiguel_gomes@symantec.com Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment

More information

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance. Overview Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated

More information