The State of M&A in the Cybersecurity Market. October 28, 2015

Size: px
Start display at page:

Download "The State of M&A in the Cybersecurity Market. October 28, 2015"

Transcription

1 The State of M&A in the Cybersecurity Market October 28, 2015

2 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster City, New York, Minneapolis, and London 50+ person team among largest in the industry dedicated to emerging growth Sector expertise in Technology (Energy, Communications, Infrastructure / Cloud, Fintech, HCIT, Information Security / Defense, Semiconductors and Software); Digital Media / Internet / Mobile; Business & IT Services Provide M&A, private capital raising and capital market advisory services Strong momentum: closed 28 deals in 2014; 45+ active engagements in 2015 Founded in 2003, 259 transactions closed to date; 76 in Security Ranked the #1 most active M&A advisor in Information Security and Enterprise Networking in 2012, 2013, & 2014 by 451 Research 1

3 AGC Ranked Top Tech Boutique: 259 Deals Done Since Inception Maria Lewis Kussmaul: Trusted Industry Advisor to Security Industry Maria Lewis Kussmaul Co-Founding Partner Investment Banking Recognized in the Information Security community as the leading domain expert and best networked investment banker Maria has built upon her 30+ years of industry experience and 90+ deals to make AGC Partners the leading name in Information Security Hosts annual premiere investor and strategic partner event in Pre-RSA Security Conference and recently launched Disrupt!on at Black Hat 2013 Recognized by the 451 Research as Top Dealmaker in Security and Enterprise Networking for 2012, 2013, and 2014 Panelist/presenter at RSA Conference; Security Innovation Network (SINET) Advisory Board Member Has facilitated multiple Blue Sky strategic planning sessions with leading teams in the Security industrysuchasbmc,intelsecurity,cisco,hp,trendmicro,emc,ibm,ca,symantec,oracle, Verisign, and Juniper Networks AGC s Strong Track Record with the Largest Acquirers 2 Confidential Materials. Do Not Distribute.

4 AGC s Recent Security Transactions: 28 Since has been sold to has been sold to has been sold to has been sold to has sold its LYNXeon assets to has completed a Series C Equity Financing with UNDISCLOSED October 2015 August 2015 July 2015 May 2015 March 2015 February Denotes transactions with valuations greater than $100M 3

5 AGC s Market Leading Security Practice: 48 Deals Through 2010 Transactions prior to

6 Sought After Sectors: Strategic M&A User Behavior Monitoring & Analytics Next Generation Endpoint Threat Intelligence Advanced Persistent Threats Anti Fraud / Identity Management Encryption Application Security BYOD & Mobile SCADA / IoT 5

7 2015 Top M&A Deals ($ in Millions) Date Target Acquirer EV LTM Rev EV/LTM Rev Oct $63,100 $24, x Apr ,613 1, x Mar , x Apr , x Apr x Jun ND ND Sep x Sep * ND ND Apr x Apr * 60* 3.3x * 451 estimate 6

8 LTM Funding by Sector ($ in Millions) Business Model # Transactions Funding Endpoint 15 $822 Network Security 31 $709 IAM 25 $697 Data Security 14 $445 Cloud Security 30 $399 Active Investors in past 12 months: Illumio, CoreOS, Sumo Logic, Netskope, Vectra Networks, SentinelOne, Aorato, ForgeRock, Lookout, Sookasa, Simility Prevoty, Zerto, Risk I/O, ThreatMetrix Awake Networks, Okta, Skyhigh Networks, Sumo Logic, Synack, Guardicore, Zerto CoreOS, Shape Security, Ionic Security, Bit9, Synack, Area1 Security, Endgame Application Security Threat Intelligence 22 $ $211 Cohesity, Bit9, Sumo Logic, Skyhigh, Adallom, SafeBreach, CoreOS, Okta, Keen.io, Forter Scalyr, Cohesity, Agari, Guardicore, Lightcyber, RiskIQ, Veradocs, Zerto, KeyMe, BlockScore Stealth 6 $95 BYOD Security 4 $56 Total 161 $3,726 LTM period as of 3Q 15 Source: Tracxn, CapitalIQ and 451 Research Ionic Security, Shape Security, Synack, Threat Stream, Duo Security, MapR, Team8 Illumio, Okta, Tanium, Cipher Cloud, Bluebox, SignalFX, Lookout, Sookasa Cylance, DB Networks, Okta, Vectra Networks, BlockScore 7

9 Cybersecurity Enthusiasm Driver: Leadership is up for Grabs As the changing of the guards takes place, the winners and the losers are quickly being separated Old Guard Undecided New Guard Agents of Transformation Others? Old guard companies are scrambling to stay relevant in the rapidly changing market Public markets continue to amply reward newly public security companies, as evidenced by Rapid7 and Cyber-Ark, which are trading up 17% and 188% after their recent IPOs, respectively New guard companies are driving forward at an accelerated pace, with the fortitude and capital to back them New Guard companies continue to strategically employee M&A as an agent of transformation *Aftermarket performance as of 10/23/15 8

10 Investors Eager to Exploit Leadership Shift Today s Information Security market is at a crossroads: Traditional security solutions are focused on barrier-based perimeter defenses But the threat is already inside the Network/Enterprise Leaders are combining pre and post compromise detection, analytics, forensics and response Next generation security players have evolved to keep up with increasingly sophisticated attacks by utilizing: Endpoint and network visibility / detection solutions Adversary intelligence studying the attackers Big Data collection and analytics that can be tracked, combined and acted upon 9

11 and Strong Sector Growth With security budgets increasing across the board, Information Security is exhibiting strong fundamental growth that is likely to remain robust According to Gartner, enterprise security budgets are shifting towards an increased focus on detection and response, and 60% of security budgets will be allocated to these two areas by 2020 PwC Global State of Information Security Survey indicates 10,000+ respondents reported their information security budgets increased by 24% in 2015 as a response to the 38% YoY increase in security incidents IDC cites four hot areas for growth over next 5 years: Security Analytics / SIEM (10% CAGR); Threat Intelligence (10%+); Mobile Security (30%); and Cloud Security (50%) Additionally, IoT Security a relatively new market is expected to reach approximately $29 billion by 2020 Source: Gartner, IDC, MarketsandMarkets 10

12 Cyber Success Stories 640% Enterprise Value Growth 3.3x Financing - $22M First Sale Second Sale $200 Rev. Multiple 4.5x $90 EV: $27M EV: $90M * EV: $200M * Multiple: 7.9x Multiple: 4.5x Multiple: 3.3x Rev Growth: 521% Rev Growth: 13% 7.9x $ Years 2.7 Years Ent. Value ($M) April 2008 August 2012 April 2015 *451 Research estimates 9.7x Financing - $69M Sale $989 Rev. Multiple 4.8x EV: $145M Multiple: 4.8x Rev Growth: 74% 2.7 Years EV: $989M Multiple: 9.7x Rev Growth: 45% Ent. Value ($M) $145 April 2011 January x Financing - $30M Sale $415 Rev. Multiple 7.5x EV: $315M Multiple: 7.5x Rev Growth: 66% 6 months EV: $415M Multiple: 8.5x Rev Growth: 66% Ent. Value ($M) $315 July 2013 December 2013 Source: 451 Research 11

13 Security Strategics Enhance Product Offerings OpenDNS provides Cisco a significant and valuable source of threat intelligence, which it can leverage to improve a wide range of security and network products that it already sells, most notably, its current strategy of building out its security IoT segment Acquiring CirroSecure solidifies Palo Alto s position in cloud application control technology and gives Palo Alto the ability to secure high risk, unsanctioned applications with superior visibility and control Acquiring Voltage Security allows HP to utilize a powerful data-centric suite of protection solutions to further extend the capabilities of the HP Atalla portfolio, to bolster security, encryption, tokenization, and enterprise key management Combined with Metafor, Caspida allows Splunk to add analytics into its emerging SIEM product to automate detection, and provide better alerts on attacks and insider threats in a digestible format for SOC analysts and incident responders Adallom fills a gap between cloud-based IAM and third party SaaS products, allowing Microsoft customers to add much broader control over user authorization, monitoring and control of its cloud and office programs Xceedium complements CA s privileged management portfolio allowing CA to leverage a highly scalable offering for managing privileged access to virtualized and cloudbased resources Proofpoint s advanced threat detection and response products for and social media security and compliance will be further enhanced by pairing them with Emerging Threats deep research and intelligence capabilities BlackBerry will have significant additional capabilities to support ios and Android, which is the future for the enterprise mobility management (EMM) provider as it increasingly steps away from its own device business 12

14 Big 4 M&A Activity June 2010 May 2013 April 2014 December 2014 September 2015 (assets) October 2014 November 2014 January 2015 March 2015 September 2015 (assets) $11.4M Private Placement January 2010 August 2011 April 2013 March 2014 (Professional Services Consulting Group) (assets) January 2011 June 2015 July 2015 (Professional Services Security Practice) 13

15 Private Equity Platform Plays Resolution1 combined with Fidelis provides one of the most comprehensive offerings in the TDR and incident-response automation spaces for a comprehensive advanced threat defense solution Perspecsys' encryption gateway proxy should be a straightforward plug-in to Blue Coat's own proxybased security appliances, while enabling Blue Coat to expand its addressable cloud security use cases to clients facing dataresidency requirements With an integrated suite of solutions that both shrink the cyber-attack surface and contain breaches when they do occur, BeyondTrust is well positioned to address anticipated market demands Immediate Insight brings additional advanced security analytics to FireMon, giving it more actionable security beyond firewall monitoring Whitebox allows SailPoint to provide customers with a single view of users and their associated privileges for accessing applications, systems and, now, unstructured data Bay31 enables Courion to extend its technology leadership in identity analytics and enhance the company's product offerings in role mining and role-based access control, particularly for large and complex applications 14

16 Defense Contractor Activity $193M 5.9x $80M 8.0x ND DIVESTED JAN-15 Not Disclosed $140M 5.0x DIVESTED MAR-15 $85M 3.4x DIVESTED JAN-15 $24M Assets DIVESTED JUL-15 ND DIVESTED APR-15 Record of defense players purchasing cyber product companies has been mixed; divestitures becoming frequent $24M 2.0x ND $233M 3.0x $1.3B 3.4x

17 Signs of Froth? Dotcom-Era Nasdaq Trading Multiples (TTM Rev.) Recent Security IPOs Trading Multiples (TTM Rev.) Jan 98 Mar 00 Sep 01 Jan 12 Feb 14 Sep 15 Source: CapitalIQ RSA Conference Exhibitor Numbers Cyber Security Unicorns 16

18 Growth Alone is No Longer a Golden Ticket So far in 2015, cybersecurity firms have received more than $3.3 billion in funding in 130+ deals, putting the year on track to beat last year s record pace However, recent public market volatility has led to increased scrutiny by investors and a backto-basics mentality in venture to late stage funding Growth rate is no longer a golden ticket to attract capital as investors are now looking at growth coupled with profitability and cash flow generation Strategics have also become more cautious with respect to paying the frothy valuations seen in recent years, portending a possible slow down in deal activity * YTD as of September 23,

19 Valuations Driven by Public Sentiment YTD Cybersecurity Share Pricing 31.1% 18.6% (HACK) 5.2% 4.3% 12.26% 47.8% Jan 15 Feb 15 Mar 15 Apr 15 May 15 Jun 15 Jul 15 Aug 15 Sep 15 Oct 15 ($ in millions) Market Data Operating Data (c) Enterprise EV / EBITDA Revenue EBITDA Revenue Growth LQ Gross LQ Adj. Company Value (a) (b) TTM 2015E TTM 2015E TTM 2015E TTM 2015E 14A/'13A 15E/'14A Margin Op. Margin (d) Palo Alto Networks $13, x 11.9x NM 64.5x $928 $1,113 ($105) $205 53% 51% 74% (12%) Splunk 6, x 10.1x NM NM (225) 38 49% 40% 83% (43%) FireEye 3, x 6.0x NM NM (397) (170) 163% 50% 63% (86%) (HACK) * 1, x 2.6x 12.1x 11.6x % 9% 76% 7% CyberArk 1, x 7.9x 36.7x 37.2x % 44% 83% 18% Barracuda x 2.5x NM 10.4x % 16% 80% (0%) *HACK metrics based on median values of holdings Source: CapitalIQ Through October 23, 2015 TTM as of 2Q 15 18

20 Public Sentiment on Growth C D A: 2014 earnings released: Surpassed analyst estimates by 125% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Acquires behavior analytics and machine learning provider Caspida D: Chinese economy declines A B EV: $6.4B E Revenue $303 $451M $632M Growth % 52% 49% 40% EBITDA ($70M) ($203M) $39M Margin % (23%) (45%) 6% Jan 15 Oct 15 B C D A: 2014 earnings released: Surpassed analyst estimates by 22% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Announces $600M convertible notes offering D: Chinese economy declines A EV: $3.8B E Revenue $162M $426M $640M Growth % 94% 163% 50% EBITDA ($143M) ($380M) ($168M) Margin % (88%) (89%) (26%) Jan 15 Oct 15 Source: CapitalIQ Through October 23,

21 Public Sentiment on Growth + Profitability C D A: 2014 earnings released: Surpassed analyst estimates by 12% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Acquires enterprise SaaS application security startup CirroSecure D: Chinese economy declines B A EV: $13.2B E Revenue $483M $739M $1,110M Growth % 49% 53% 50% EBITDA ($0.4M) ($73M) $204M Margin % (0%) (10%) 18% Jan 15 Oct 15 B C D A: 2014 earnings released: Surpassed analyst estimates by 320% B: Announces secondary Nasdaq offering C: Congress unanimously passes Cybersecurity Information Sharing Act D: Chinese economy declines A EV: $1.2B E Revenue $66M $103M $148M Growth % 40% 56% 44% EBITDA $10M $21M $32M Margin % 15% 20% 22% Jan 15 Oct 15 Source: CapitalIQ Through October 23,

22 Public Sentiment on Negative Developments B C A D E Jan 15 Oct 15 A: 2014 earnings released: Surpassed analyst estimates by 17% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Announced FY Q1 billing growth at 8%, well below 16-18% guidance D: Chinese economy declines E: Announced FY Q2 billing growth at 10%, down from 15% in Q2 last year EV: $761M E Revenue $234M $277M $321M Growth % 18% 19% 17% EBITDA ($0.2M) $8M $72M Margin % (0%) 3% 23% *CUDA FY ends in February Source: CapitalIQ Through October 23,

23 HACK Fund HACK Fund ($ in millions) Market Data Operating Data (c) Enterprise EV / Revenue EV / EBITDA Revenue EBITDA Revenue Growth LQ Gross LQ Adj. Company Value (a) (b) TTM 2015E TTM 2015E TTM 2015E TTM 2015E 14A/'13A 15E/'14A Margin Op. Margin (d) Cisco $114, x 2.3x 8.5x 8.4x $49,161 $50,163 $13,391 $13,550 0% 4% 60% 23% Palo Alto Networks 13, x 11.9x NM 64.5x 928 1,113 (105) % 51% 74% (12%) Check Point 13, x 8.2x 16.0x 14.5x 1,559 1, % 9% 89% 50% Symantec 12, x 2.0x 6.8x 6.1x 6,272 6,152 1,809 2,019 (3%) (7%) 84% 22% Juniper 12, x 2.5x 12.1x 9.3x 4,640 4,834 1,000 1,303 (1%) 4% 64% 21% VeriSign 8, x 8.4x 13.7x 12.5x 1,043 1, % 4% 82% 58% F5 7, x 3.9x 12.9x 9.8x 1,884 1, % 10% 82% 29% Gemalto 6, x 1.9x 13.0x 10.8x 3,154 3, (9%) 17% 38% 8% Splunk 6, x 10.1x NM NM (225) 38 49% 40% 83% (43%) Booz Allen Hamilton 5, x 1.1x 11.0x 11.0x 5,304 5, (5%) (1%) 24% 9% Fortinet 5, x 5.0x 90.4x 30.8x 937 1, % 31% 72% 2% Trend Micro 4, x 4.0x 12.2x 11.8x 986 1, (7%) 6% 83% 25% Leidos 4, x 0.8x 9.8x 10.2x 5,063 4, (12%) (2%) 11% 7% FireEye 3, x 6.0x NM NM (397) (170) 163% 50% 63% (86%) SAIC 2, x 0.7x 10.6x 9.7x 4,064 4, (6%) 12% 10% 6% Sophos (e) 2, x ND 40.0x ND 447 ND 65 ND 18% NM NM NM Proofpoint 2, x 9.3x NM NM (51) 4 42% 35% 70% (32%) Imperva 1, x 7.5x NM NM (56) (7) 19% 32% 78% (32%) AVG 1, x 3.3x 11.6x 8.9x (8%) 16% 85% 15% CyberArk 1, x 7.9x 36.7x 37.2x % 44% 83% 18% ManTech 1, x 0.7x 8.9x 9.2x 1,613 1, (23%) (11%) 15% 5% Qualys 1, x 6.2x 33.7x 21.7x % 24% 80% 13% Rapid x 9.6x NM NM (24) (31) 28% 35% 74% (32%) Barracuda Networks x 2.5x NM 10.4x % 16% 80% (0%) Infoblox x 1.8x NM 16.4x (17) 39 9% 29% 79% (5%) Radware x 2.7x 12.4x 14.3x % (3%) 83% 14% VASCO x 2.3x 9.8x 9.7x % 18% 59% 24% Intralinks x 1.9x 43.2x 13.7x % 7% 72% (11%) KEYW x 1.3x NM 43.4x (3%) 7% 33% (5%) F-Secure x 2.3x 13.5x 12.3x (13%) (13%) 97% 16% AhnLab x ND 19.9x ND 115 ND 13 ND (5%) NM 77% 6% Zix x 4.8x 25.2x 16.9x % 9% 83% 25% Absolute Software x 2.3x 12.0x 14.7x % (1%) 81% 1% Guidance Software x 1.5x NM NM (6) 1 (2%) 1% 66% (13%) Comp S.A x ND 7.6x ND 160 ND 14 ND (5%) NM 25% 6% MEDIAN $1, x 2.6x 12.4x 12.0x $403 $533 $32 $65 7% 9% 76% 7% Notes (a) Based on closing stock prices on October (b) Calculated as Equity Value plus total debt, minority interest (at book value unless otherwise noted) and preferred stock, less cash & equivalents (c) Projections represent Wall Street & Yahoo Finance estimates (d) Adjusted operating margin excludes extraordinary and non-recurring items (e) Sophos fiscal year ends March 31st Source: CapitalIQ Through October 23, 2015 TTM as of 2Q 15 22

24 Concluding Thoughts Cyber threats are endemic Industry leadership is in flux Demand for effective countermeasures is strong and rising Capital availability is at unprecedented levels and valuations are high Cyber talent is scarce Cyber investments and M&A will undoubtedly continue but at a more discriminating pace and with more disparate outcomes 23

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat

More information

IT Security. The Acquisition Boom

IT Security. The Acquisition Boom IT Security The Acquisition Boom Ash Sethi / MergerTech Winter 2016 IT THREATS ON A GLOBAL SCALE It s 1:50pm, and there have already been more than 14,000 cyber attacks today. Really. Hacking ranging from

More information

IT Security Q1 2016. Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference.

IT Security Q1 2016. Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference. Q1 2016 Investment Banking Market Challenges Slow Near-Term Activity in IT Security IT Security In This Report Highlights from RSA Conference IPO activity slows as valuations decline Volatility delays

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

Investing in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014

Investing in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014 Investing in Cyber Security Companies Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014 Table of Contents Evolving Themes in the Threat landscape Gov t/commercial Market Opportunities Mapping

More information

E-discovery Market Map. Shea & Company

E-discovery Market Map. Shea & Company E-discovery Market Map Shea & Company e-discovery Will Continue to be an Active Sector in 2014 We expect the level of acquisition activity to remain strong in the coming year as consolidation continues

More information

Small-Cap Research. CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM- New Products Gaining Distribution and Generating First Sales

Small-Cap Research. CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM- New Products Gaining Distribution and Generating First Sales Small-Cap Research February 25, 2015 Lisa Thompson 312-265-9154 lthompson@zacks.com scr.zacks.com 10 S. Riverside Plaza, Chicago, IL 60606 CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM-

More information

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION carahsoft CARAHSOFT S RESPONSE TO THE Florida Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014

Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Michael S. Lewis, CFA Managing Director msl@thesilverlinegroup.com (703) 424-1969 Michael J. Smith,

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Q3 2013 Security & Risk Market Snapshot

Q3 2013 Security & Risk Market Snapshot Q3 2013 Security & Risk Market Snapshot Don More Managing Director dmore@signalhill.com Eric Wagner Managing Director ewagner@signalhill.com Peter Gant Managing Director pgant@signalhill.com Matt Fiore

More information

REPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different?

REPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different? REPORT Perimeter Security Defenses State of Perimeter Security Defenses, Time to Think Different? Table of Contents Introduction 3 Key Findings 4 Implications 6 REPORT State of Perimeter Security Defenses

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Palo Alto Networks. September 2014

Palo Alto Networks. September 2014 Palo Alto Networks September 2014 Safe harbor This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Separating Security and Information Management into Two Industry-Leading Technology Companies

Separating Security and Information Management into Two Industry-Leading Technology Companies Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

ISE CYBER SECURITY TM INDEX

ISE CYBER SECURITY TM INDEX Index Methodology Guide ISE CYBER SECURITY TM INDEX Issue 2.0 Issue date: August 28, 2015 Produced by:, LLC 60 Broad Street, New York NY 10004 www.ise.com The information contained in this document is

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

Brochure More information from http://www.researchandmarkets.com/reports/3493712/

Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint

More information

Why Are Investors Excited About Cyber Security Startups, Again?

Why Are Investors Excited About Cyber Security Startups, Again? Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989. Cyber Security Market Trends 2015

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989. Cyber Security Market Trends 2015 Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989 Cyber Security Market Trends 2015. Introduction T he cyber security market is booming in 2015 following a very strong year in 2014.

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Investor Presentation

Investor Presentation Investor Presentation November 2015 Forward Looking Statements This presentation contains statements regarding the pending sale of our information management business to The Carlyle Group, which may be

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020) Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends

More information

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Sales Pulse Research / Securosis. Information Security. Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT

Sales Pulse Research / Securosis. Information Security. Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT Sales Pulse Research / Securosis Information Security Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT June 6, 2015 1 Current Trends in This Report: ü Refresh / Upgrade Cycle for Network Security

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER QUICKSTART GUIDE: ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER TABLE OF CONTENTS Introduction...2 Getting Started...4 Configuring Log Sources...4 Common Log Sources...5 INTRODUCTION A FRESH APPROACH TO IDENTIFYING

More information

Market Guide for Network Sandboxing

Market Guide for Network Sandboxing G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Hewlett Packard Securities Analyst Meeting 2015. #hpesam2015

Hewlett Packard Securities Analyst Meeting 2015. #hpesam2015 Hewlett Packard Securities Analyst Meeting 2015 #hpesam2015 1 Software Robert Youngjohns Executive Vice President and General Manager Executive summary Software is delivering consistent revenues with high

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Breaking the Cyber Attack Lifecycle

Breaking the Cyber Attack Lifecycle Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com

More information

Cisco & Big Data Security

Cisco & Big Data Security Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

The reduction of tax loss carry-forwards by $5.8 million. These were set to expire before the company expected to be able to use them.

The reduction of tax loss carry-forwards by $5.8 million. These were set to expire before the company expected to be able to use them. Small-Cap Research March 4, 2014 Lisa Thompson 312-265-9154 lthompson@zacks.com scr.zacks.com 111 North Canal Street, Chicago, IL 60606 CYREN (CYRN-NASDAQ) CYRN: First New Cloud Product Rolled Out to Customers

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Business Intelligence and Analytics Platforms Market Map. Shea & Company

Business Intelligence and Analytics Platforms Market Map. Shea & Company Business Intelligence and Analytics Platforms Market Map Shea & Company Overview The BI analytics market is quickly moving to the 2.0 phase of its lifecycle which we believe will usher in a wave of investment

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information

Certification Programs

Certification Programs Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security

More information

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies

More information

Splunk: Using Big Data for Cybersecurity

Splunk: Using Big Data for Cybersecurity Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals

More information

State of Security Monitoring of Public Cloud

State of Security Monitoring of Public Cloud State of Security Monitoring of Public Cloud Shittu O. Shittu Enterprise Security Architect, BP Enterprise Security Architect, trainline.com Director and Principal Consultant, TRAIS Mavens Ltd Highlights

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

Private Equity investment in Recruitment companies - what are we looking for? Chris Harper Managing Director Baird Capital

Private Equity investment in Recruitment companies - what are we looking for? Chris Harper Managing Director Baird Capital Private Equity investment in Recruitment companies - what are we looking for? Chris Harper Managing Director Baird Capital About The Presenter Chris Harper 25 years within private equity Managing Director

More information

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE ANALYST DAY STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE TRAVIS REESE, PRESIDENT, MANDIANT CONSULTING AND ISIGHT INTELLIGENCE COPYRIGHT 2016, FIREEYE, INC. ALL RIGHTS RESERVED. INTELLIGENCE- LED

More information

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn

More information

Brochure More information from http://www.researchandmarkets.com/reports/3301109/

Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1

More information

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying

More information

DON T BE AN EASY TARGET

DON T BE AN EASY TARGET CORPORATE SECURITY DON T BE AN EASY TARGET Pekka Usva Capital Market Day 16 Sept 2015 1 AGENDA Corporate Security in brief Market overview and key trends Offering and channels Competition Enabling growth

More information

Security Services. 30 years of experience in IT business

Security Services. 30 years of experience in IT business Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3

More information

Global Encryption Software Market 2015-2019

Global Encryption Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3138718/ Global Encryption Software Market 2015-2019 Description: About Encryption Software Encryption is a technique that secures

More information

M&A Trends and Implications for IT Security Companies Paul DiNardo Vice Chairman & Head of Technology Investment Banking

M&A Trends and Implications for IT Security Companies Paul DiNardo Vice Chairman & Head of Technology Investment Banking M&A Trends and Implications for IT Security Companies Paul DiNardo Vice Chairman & Head of Technology Investment Banking October 2010 Company Background Montgomery provides high quality, specialized investment

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

Global Web Application Firewall Market 2015-2019

Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from

More information

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Five Steps For Securing The Data Center: Why Traditional Security May Not Work White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center

More information

Picking Stocks in the Tech Sector

Picking Stocks in the Tech Sector Picking Stocks in the Tech Sector April 20, 2015 by Chaitanya Yaramada of Robert W. Baird & Co. Any science or technology which is sufficiently advanced is indistinguishable from magic. Arthur C. Clarke

More information

Q2 2014 Healthcare IT Market Snapshot

Q2 2014 Healthcare IT Market Snapshot Q2 2014 Healthcare IT Market Snapshot Chase Sanders Managing Director csanders@signalhill.com www.signalhill.com B a l t i m o r e B a n g a l o r e B o s t o n M u m b a i N a s h v i l l e N e w Y o

More information

Cloud Based Security Services - Global Strategic Business Report

Cloud Based Security Services - Global Strategic Business Report Brochure More information from http://www.researchandmarkets.com/reports/3301150/ Cloud Based Security Services - Global Strategic Business Report Description: This report analyzes the worldwide markets

More information

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable April 2015 1 List of Exhibits Chart Slide Number Executive Summary

More information

Global Network Security Market 2015-2019

Global Network Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3505505/ Global Network Security Market 2015-2019 Description: About network security Network security comprises products and services

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Whitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY

Whitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY Whitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY 60% [of organizations] plan to automate incident remediation within 24 months - SANS Endpoint

More information

IT Security. Muscat 15+ ABOUT US IN A GLANCE

IT Security. Muscat 15+ ABOUT US IN A GLANCE www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

Global Security Software Market 2015-2019

Global Security Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security

More information

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER: THREAT INTELLIGENCE RANKING WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes

More information

A BVR Special Report. Excerpt from. Key Trends in the Valuation of Government Contracting Firms BVR. What It s Worth

A BVR Special Report. Excerpt from. Key Trends in the Valuation of Government Contracting Firms BVR. What It s Worth A BVR Special Report BVR What It s Worth Excerpt from Key Trends in the Valuation of Government Contracting Firms Special thanks to Donald W. Nalley, Jr., CPA/CVA, ABV, ASA, for his expert guidance and

More information

Global Network Security Appliance Market 2015-2019

Global Network Security Appliance Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3280784/ Global Network Security Appliance Market 2015-2019 Description: About Network Security Appliance Network security appliances

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion

More information

How To Understand The Third Platform Ct Market Transformation In Latin America

How To Understand The Third Platform Ct Market Transformation In Latin America Latin America 4 Pillars of the Third Platform Continuous Information Series Value Proposition June 2014 International Data Corporation (IDC) is the premier global provider of market intelligence, advisory

More information

Barracuda Networks, Inc. NYSE: CUDA. February 2014

Barracuda Networks, Inc. NYSE: CUDA. February 2014 Barracuda Networks, Inc. NYSE: CUDA February 2014 Safe Harbor This presentation and the accompanying oral presentation contain forward-looking statements that are based on our management s beliefs and

More information

Q3 2014. The Software Industry Financial Report

Q3 2014. The Software Industry Financial Report Q3 2014 The Software Industry Financial Report Software Equity Group, L.L.C. 12220 El Camino Real Suite 320 San Diego, CA 92130 info@softwareequity.com (858) 509-2800 SOFTWARE INDUSTRY FINANCIAL REPORT

More information

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Senior Technology Consultant Symantec Bulgaria Enterprise Threat Landscape Attackers Moving Faster Digital extortion on the rise Malware

More information

Company Overview. Financial Performance

Company Overview. Financial Performance Jan/15 Feb/15 Mar/15 Apr/15 May/15 Jun/15 Jul/15 Aug/15 Sep/15 Oct/15 Nov/15 Dec/15 SPS Finquest Ltd CMP: 84.60 January 13, 2015 Stock Details BSE code 538402 BSE ID SPS Face value ( ) 10 No of shares

More information

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

SOLUTION BRIEF. Next Generation APT Defense for Healthcare SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

Quarterly Technology M&A Review

Quarterly Technology M&A Review Quarterly Technology M&A Review Q4 01 Technology M&A deal value increased considerably in Q4 01, while deal count dipped to the lowest level since Q4 010. Normalized to remove the impact of Softbank s

More information

A Guide to the Insider Buying Investment Strategy

A Guide to the Insider Buying Investment Strategy Mar-03 Aug-03 Jan-04 Jun-04 Nov-04 Apr-05 Sep-05 Feb-06 Jul-06 Dec-06 May-07 Oct-07 Mar-08 Aug-08 Jan-09 Jun-09 Nov-09 Apr-10 Sep-10 Mar-03 Jul-03 Nov-03 Mar-04 Jul-04 Nov-04 Mar-05 Jul-05 Nov-05 Mar-06

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses

Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses Market Share Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses Robert Westervelt Rob Ayoub Pete Lindstrom Elizabeth Corr IDC MARKET SHARE FIGURE

More information

Outlook for Cloud technology in Big Data and Mobility

Outlook for Cloud technology in Big Data and Mobility 2014 Outlook for Cloud technology in Big Data and Mobility Wayne Collette, CFA, Senior Portfolio Manager Cloud technology is a significant and ongoing trend affecting the technology industry. A new breed

More information