The State of M&A in the Cybersecurity Market. October 28, 2015
|
|
- Bertram Small
- 8 years ago
- Views:
Transcription
1 The State of M&A in the Cybersecurity Market October 28, 2015
2 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster City, New York, Minneapolis, and London 50+ person team among largest in the industry dedicated to emerging growth Sector expertise in Technology (Energy, Communications, Infrastructure / Cloud, Fintech, HCIT, Information Security / Defense, Semiconductors and Software); Digital Media / Internet / Mobile; Business & IT Services Provide M&A, private capital raising and capital market advisory services Strong momentum: closed 28 deals in 2014; 45+ active engagements in 2015 Founded in 2003, 259 transactions closed to date; 76 in Security Ranked the #1 most active M&A advisor in Information Security and Enterprise Networking in 2012, 2013, & 2014 by 451 Research 1
3 AGC Ranked Top Tech Boutique: 259 Deals Done Since Inception Maria Lewis Kussmaul: Trusted Industry Advisor to Security Industry Maria Lewis Kussmaul Co-Founding Partner Investment Banking Recognized in the Information Security community as the leading domain expert and best networked investment banker Maria has built upon her 30+ years of industry experience and 90+ deals to make AGC Partners the leading name in Information Security Hosts annual premiere investor and strategic partner event in Pre-RSA Security Conference and recently launched Disrupt!on at Black Hat 2013 Recognized by the 451 Research as Top Dealmaker in Security and Enterprise Networking for 2012, 2013, and 2014 Panelist/presenter at RSA Conference; Security Innovation Network (SINET) Advisory Board Member Has facilitated multiple Blue Sky strategic planning sessions with leading teams in the Security industrysuchasbmc,intelsecurity,cisco,hp,trendmicro,emc,ibm,ca,symantec,oracle, Verisign, and Juniper Networks AGC s Strong Track Record with the Largest Acquirers 2 Confidential Materials. Do Not Distribute.
4 AGC s Recent Security Transactions: 28 Since has been sold to has been sold to has been sold to has been sold to has sold its LYNXeon assets to has completed a Series C Equity Financing with UNDISCLOSED October 2015 August 2015 July 2015 May 2015 March 2015 February Denotes transactions with valuations greater than $100M 3
5 AGC s Market Leading Security Practice: 48 Deals Through 2010 Transactions prior to
6 Sought After Sectors: Strategic M&A User Behavior Monitoring & Analytics Next Generation Endpoint Threat Intelligence Advanced Persistent Threats Anti Fraud / Identity Management Encryption Application Security BYOD & Mobile SCADA / IoT 5
7 2015 Top M&A Deals ($ in Millions) Date Target Acquirer EV LTM Rev EV/LTM Rev Oct $63,100 $24, x Apr ,613 1, x Mar , x Apr , x Apr x Jun ND ND Sep x Sep * ND ND Apr x Apr * 60* 3.3x * 451 estimate 6
8 LTM Funding by Sector ($ in Millions) Business Model # Transactions Funding Endpoint 15 $822 Network Security 31 $709 IAM 25 $697 Data Security 14 $445 Cloud Security 30 $399 Active Investors in past 12 months: Illumio, CoreOS, Sumo Logic, Netskope, Vectra Networks, SentinelOne, Aorato, ForgeRock, Lookout, Sookasa, Simility Prevoty, Zerto, Risk I/O, ThreatMetrix Awake Networks, Okta, Skyhigh Networks, Sumo Logic, Synack, Guardicore, Zerto CoreOS, Shape Security, Ionic Security, Bit9, Synack, Area1 Security, Endgame Application Security Threat Intelligence 22 $ $211 Cohesity, Bit9, Sumo Logic, Skyhigh, Adallom, SafeBreach, CoreOS, Okta, Keen.io, Forter Scalyr, Cohesity, Agari, Guardicore, Lightcyber, RiskIQ, Veradocs, Zerto, KeyMe, BlockScore Stealth 6 $95 BYOD Security 4 $56 Total 161 $3,726 LTM period as of 3Q 15 Source: Tracxn, CapitalIQ and 451 Research Ionic Security, Shape Security, Synack, Threat Stream, Duo Security, MapR, Team8 Illumio, Okta, Tanium, Cipher Cloud, Bluebox, SignalFX, Lookout, Sookasa Cylance, DB Networks, Okta, Vectra Networks, BlockScore 7
9 Cybersecurity Enthusiasm Driver: Leadership is up for Grabs As the changing of the guards takes place, the winners and the losers are quickly being separated Old Guard Undecided New Guard Agents of Transformation Others? Old guard companies are scrambling to stay relevant in the rapidly changing market Public markets continue to amply reward newly public security companies, as evidenced by Rapid7 and Cyber-Ark, which are trading up 17% and 188% after their recent IPOs, respectively New guard companies are driving forward at an accelerated pace, with the fortitude and capital to back them New Guard companies continue to strategically employee M&A as an agent of transformation *Aftermarket performance as of 10/23/15 8
10 Investors Eager to Exploit Leadership Shift Today s Information Security market is at a crossroads: Traditional security solutions are focused on barrier-based perimeter defenses But the threat is already inside the Network/Enterprise Leaders are combining pre and post compromise detection, analytics, forensics and response Next generation security players have evolved to keep up with increasingly sophisticated attacks by utilizing: Endpoint and network visibility / detection solutions Adversary intelligence studying the attackers Big Data collection and analytics that can be tracked, combined and acted upon 9
11 and Strong Sector Growth With security budgets increasing across the board, Information Security is exhibiting strong fundamental growth that is likely to remain robust According to Gartner, enterprise security budgets are shifting towards an increased focus on detection and response, and 60% of security budgets will be allocated to these two areas by 2020 PwC Global State of Information Security Survey indicates 10,000+ respondents reported their information security budgets increased by 24% in 2015 as a response to the 38% YoY increase in security incidents IDC cites four hot areas for growth over next 5 years: Security Analytics / SIEM (10% CAGR); Threat Intelligence (10%+); Mobile Security (30%); and Cloud Security (50%) Additionally, IoT Security a relatively new market is expected to reach approximately $29 billion by 2020 Source: Gartner, IDC, MarketsandMarkets 10
12 Cyber Success Stories 640% Enterprise Value Growth 3.3x Financing - $22M First Sale Second Sale $200 Rev. Multiple 4.5x $90 EV: $27M EV: $90M * EV: $200M * Multiple: 7.9x Multiple: 4.5x Multiple: 3.3x Rev Growth: 521% Rev Growth: 13% 7.9x $ Years 2.7 Years Ent. Value ($M) April 2008 August 2012 April 2015 *451 Research estimates 9.7x Financing - $69M Sale $989 Rev. Multiple 4.8x EV: $145M Multiple: 4.8x Rev Growth: 74% 2.7 Years EV: $989M Multiple: 9.7x Rev Growth: 45% Ent. Value ($M) $145 April 2011 January x Financing - $30M Sale $415 Rev. Multiple 7.5x EV: $315M Multiple: 7.5x Rev Growth: 66% 6 months EV: $415M Multiple: 8.5x Rev Growth: 66% Ent. Value ($M) $315 July 2013 December 2013 Source: 451 Research 11
13 Security Strategics Enhance Product Offerings OpenDNS provides Cisco a significant and valuable source of threat intelligence, which it can leverage to improve a wide range of security and network products that it already sells, most notably, its current strategy of building out its security IoT segment Acquiring CirroSecure solidifies Palo Alto s position in cloud application control technology and gives Palo Alto the ability to secure high risk, unsanctioned applications with superior visibility and control Acquiring Voltage Security allows HP to utilize a powerful data-centric suite of protection solutions to further extend the capabilities of the HP Atalla portfolio, to bolster security, encryption, tokenization, and enterprise key management Combined with Metafor, Caspida allows Splunk to add analytics into its emerging SIEM product to automate detection, and provide better alerts on attacks and insider threats in a digestible format for SOC analysts and incident responders Adallom fills a gap between cloud-based IAM and third party SaaS products, allowing Microsoft customers to add much broader control over user authorization, monitoring and control of its cloud and office programs Xceedium complements CA s privileged management portfolio allowing CA to leverage a highly scalable offering for managing privileged access to virtualized and cloudbased resources Proofpoint s advanced threat detection and response products for and social media security and compliance will be further enhanced by pairing them with Emerging Threats deep research and intelligence capabilities BlackBerry will have significant additional capabilities to support ios and Android, which is the future for the enterprise mobility management (EMM) provider as it increasingly steps away from its own device business 12
14 Big 4 M&A Activity June 2010 May 2013 April 2014 December 2014 September 2015 (assets) October 2014 November 2014 January 2015 March 2015 September 2015 (assets) $11.4M Private Placement January 2010 August 2011 April 2013 March 2014 (Professional Services Consulting Group) (assets) January 2011 June 2015 July 2015 (Professional Services Security Practice) 13
15 Private Equity Platform Plays Resolution1 combined with Fidelis provides one of the most comprehensive offerings in the TDR and incident-response automation spaces for a comprehensive advanced threat defense solution Perspecsys' encryption gateway proxy should be a straightforward plug-in to Blue Coat's own proxybased security appliances, while enabling Blue Coat to expand its addressable cloud security use cases to clients facing dataresidency requirements With an integrated suite of solutions that both shrink the cyber-attack surface and contain breaches when they do occur, BeyondTrust is well positioned to address anticipated market demands Immediate Insight brings additional advanced security analytics to FireMon, giving it more actionable security beyond firewall monitoring Whitebox allows SailPoint to provide customers with a single view of users and their associated privileges for accessing applications, systems and, now, unstructured data Bay31 enables Courion to extend its technology leadership in identity analytics and enhance the company's product offerings in role mining and role-based access control, particularly for large and complex applications 14
16 Defense Contractor Activity $193M 5.9x $80M 8.0x ND DIVESTED JAN-15 Not Disclosed $140M 5.0x DIVESTED MAR-15 $85M 3.4x DIVESTED JAN-15 $24M Assets DIVESTED JUL-15 ND DIVESTED APR-15 Record of defense players purchasing cyber product companies has been mixed; divestitures becoming frequent $24M 2.0x ND $233M 3.0x $1.3B 3.4x
17 Signs of Froth? Dotcom-Era Nasdaq Trading Multiples (TTM Rev.) Recent Security IPOs Trading Multiples (TTM Rev.) Jan 98 Mar 00 Sep 01 Jan 12 Feb 14 Sep 15 Source: CapitalIQ RSA Conference Exhibitor Numbers Cyber Security Unicorns 16
18 Growth Alone is No Longer a Golden Ticket So far in 2015, cybersecurity firms have received more than $3.3 billion in funding in 130+ deals, putting the year on track to beat last year s record pace However, recent public market volatility has led to increased scrutiny by investors and a backto-basics mentality in venture to late stage funding Growth rate is no longer a golden ticket to attract capital as investors are now looking at growth coupled with profitability and cash flow generation Strategics have also become more cautious with respect to paying the frothy valuations seen in recent years, portending a possible slow down in deal activity * YTD as of September 23,
19 Valuations Driven by Public Sentiment YTD Cybersecurity Share Pricing 31.1% 18.6% (HACK) 5.2% 4.3% 12.26% 47.8% Jan 15 Feb 15 Mar 15 Apr 15 May 15 Jun 15 Jul 15 Aug 15 Sep 15 Oct 15 ($ in millions) Market Data Operating Data (c) Enterprise EV / EBITDA Revenue EBITDA Revenue Growth LQ Gross LQ Adj. Company Value (a) (b) TTM 2015E TTM 2015E TTM 2015E TTM 2015E 14A/'13A 15E/'14A Margin Op. Margin (d) Palo Alto Networks $13, x 11.9x NM 64.5x $928 $1,113 ($105) $205 53% 51% 74% (12%) Splunk 6, x 10.1x NM NM (225) 38 49% 40% 83% (43%) FireEye 3, x 6.0x NM NM (397) (170) 163% 50% 63% (86%) (HACK) * 1, x 2.6x 12.1x 11.6x % 9% 76% 7% CyberArk 1, x 7.9x 36.7x 37.2x % 44% 83% 18% Barracuda x 2.5x NM 10.4x % 16% 80% (0%) *HACK metrics based on median values of holdings Source: CapitalIQ Through October 23, 2015 TTM as of 2Q 15 18
20 Public Sentiment on Growth C D A: 2014 earnings released: Surpassed analyst estimates by 125% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Acquires behavior analytics and machine learning provider Caspida D: Chinese economy declines A B EV: $6.4B E Revenue $303 $451M $632M Growth % 52% 49% 40% EBITDA ($70M) ($203M) $39M Margin % (23%) (45%) 6% Jan 15 Oct 15 B C D A: 2014 earnings released: Surpassed analyst estimates by 22% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Announces $600M convertible notes offering D: Chinese economy declines A EV: $3.8B E Revenue $162M $426M $640M Growth % 94% 163% 50% EBITDA ($143M) ($380M) ($168M) Margin % (88%) (89%) (26%) Jan 15 Oct 15 Source: CapitalIQ Through October 23,
21 Public Sentiment on Growth + Profitability C D A: 2014 earnings released: Surpassed analyst estimates by 12% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Acquires enterprise SaaS application security startup CirroSecure D: Chinese economy declines B A EV: $13.2B E Revenue $483M $739M $1,110M Growth % 49% 53% 50% EBITDA ($0.4M) ($73M) $204M Margin % (0%) (10%) 18% Jan 15 Oct 15 B C D A: 2014 earnings released: Surpassed analyst estimates by 320% B: Announces secondary Nasdaq offering C: Congress unanimously passes Cybersecurity Information Sharing Act D: Chinese economy declines A EV: $1.2B E Revenue $66M $103M $148M Growth % 40% 56% 44% EBITDA $10M $21M $32M Margin % 15% 20% 22% Jan 15 Oct 15 Source: CapitalIQ Through October 23,
22 Public Sentiment on Negative Developments B C A D E Jan 15 Oct 15 A: 2014 earnings released: Surpassed analyst estimates by 17% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Announced FY Q1 billing growth at 8%, well below 16-18% guidance D: Chinese economy declines E: Announced FY Q2 billing growth at 10%, down from 15% in Q2 last year EV: $761M E Revenue $234M $277M $321M Growth % 18% 19% 17% EBITDA ($0.2M) $8M $72M Margin % (0%) 3% 23% *CUDA FY ends in February Source: CapitalIQ Through October 23,
23 HACK Fund HACK Fund ($ in millions) Market Data Operating Data (c) Enterprise EV / Revenue EV / EBITDA Revenue EBITDA Revenue Growth LQ Gross LQ Adj. Company Value (a) (b) TTM 2015E TTM 2015E TTM 2015E TTM 2015E 14A/'13A 15E/'14A Margin Op. Margin (d) Cisco $114, x 2.3x 8.5x 8.4x $49,161 $50,163 $13,391 $13,550 0% 4% 60% 23% Palo Alto Networks 13, x 11.9x NM 64.5x 928 1,113 (105) % 51% 74% (12%) Check Point 13, x 8.2x 16.0x 14.5x 1,559 1, % 9% 89% 50% Symantec 12, x 2.0x 6.8x 6.1x 6,272 6,152 1,809 2,019 (3%) (7%) 84% 22% Juniper 12, x 2.5x 12.1x 9.3x 4,640 4,834 1,000 1,303 (1%) 4% 64% 21% VeriSign 8, x 8.4x 13.7x 12.5x 1,043 1, % 4% 82% 58% F5 7, x 3.9x 12.9x 9.8x 1,884 1, % 10% 82% 29% Gemalto 6, x 1.9x 13.0x 10.8x 3,154 3, (9%) 17% 38% 8% Splunk 6, x 10.1x NM NM (225) 38 49% 40% 83% (43%) Booz Allen Hamilton 5, x 1.1x 11.0x 11.0x 5,304 5, (5%) (1%) 24% 9% Fortinet 5, x 5.0x 90.4x 30.8x 937 1, % 31% 72% 2% Trend Micro 4, x 4.0x 12.2x 11.8x 986 1, (7%) 6% 83% 25% Leidos 4, x 0.8x 9.8x 10.2x 5,063 4, (12%) (2%) 11% 7% FireEye 3, x 6.0x NM NM (397) (170) 163% 50% 63% (86%) SAIC 2, x 0.7x 10.6x 9.7x 4,064 4, (6%) 12% 10% 6% Sophos (e) 2, x ND 40.0x ND 447 ND 65 ND 18% NM NM NM Proofpoint 2, x 9.3x NM NM (51) 4 42% 35% 70% (32%) Imperva 1, x 7.5x NM NM (56) (7) 19% 32% 78% (32%) AVG 1, x 3.3x 11.6x 8.9x (8%) 16% 85% 15% CyberArk 1, x 7.9x 36.7x 37.2x % 44% 83% 18% ManTech 1, x 0.7x 8.9x 9.2x 1,613 1, (23%) (11%) 15% 5% Qualys 1, x 6.2x 33.7x 21.7x % 24% 80% 13% Rapid x 9.6x NM NM (24) (31) 28% 35% 74% (32%) Barracuda Networks x 2.5x NM 10.4x % 16% 80% (0%) Infoblox x 1.8x NM 16.4x (17) 39 9% 29% 79% (5%) Radware x 2.7x 12.4x 14.3x % (3%) 83% 14% VASCO x 2.3x 9.8x 9.7x % 18% 59% 24% Intralinks x 1.9x 43.2x 13.7x % 7% 72% (11%) KEYW x 1.3x NM 43.4x (3%) 7% 33% (5%) F-Secure x 2.3x 13.5x 12.3x (13%) (13%) 97% 16% AhnLab x ND 19.9x ND 115 ND 13 ND (5%) NM 77% 6% Zix x 4.8x 25.2x 16.9x % 9% 83% 25% Absolute Software x 2.3x 12.0x 14.7x % (1%) 81% 1% Guidance Software x 1.5x NM NM (6) 1 (2%) 1% 66% (13%) Comp S.A x ND 7.6x ND 160 ND 14 ND (5%) NM 25% 6% MEDIAN $1, x 2.6x 12.4x 12.0x $403 $533 $32 $65 7% 9% 76% 7% Notes (a) Based on closing stock prices on October (b) Calculated as Equity Value plus total debt, minority interest (at book value unless otherwise noted) and preferred stock, less cash & equivalents (c) Projections represent Wall Street & Yahoo Finance estimates (d) Adjusted operating margin excludes extraordinary and non-recurring items (e) Sophos fiscal year ends March 31st Source: CapitalIQ Through October 23, 2015 TTM as of 2Q 15 22
24 Concluding Thoughts Cyber threats are endemic Industry leadership is in flux Demand for effective countermeasures is strong and rising Capital availability is at unprecedented levels and valuations are high Cyber talent is scarce Cyber investments and M&A will undoubtedly continue but at a more discriminating pace and with more disparate outcomes 23
A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat
More informationIT Security. The Acquisition Boom
IT Security The Acquisition Boom Ash Sethi / MergerTech Winter 2016 IT THREATS ON A GLOBAL SCALE It s 1:50pm, and there have already been more than 14,000 cyber attacks today. Really. Hacking ranging from
More informationIT Security Q1 2016. Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference.
Q1 2016 Investment Banking Market Challenges Slow Near-Term Activity in IT Security IT Security In This Report Highlights from RSA Conference IPO activity slows as valuations decline Volatility delays
More informationThe Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
More informationInvesting in Cyber Security Companies. Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014
Investing in Cyber Security Companies Swenson Advisors, LLP 7 th Annual Hot Topics October 7, 2014 Table of Contents Evolving Themes in the Threat landscape Gov t/commercial Market Opportunities Mapping
More informationE-discovery Market Map. Shea & Company
E-discovery Market Map Shea & Company e-discovery Will Continue to be an Active Sector in 2014 We expect the level of acquisition activity to remain strong in the coming year as consolidation continues
More informationSmall-Cap Research. CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM- New Products Gaining Distribution and Generating First Sales
Small-Cap Research February 25, 2015 Lisa Thompson 312-265-9154 lthompson@zacks.com scr.zacks.com 10 S. Riverside Plaza, Chicago, IL 60606 CYREN Ltd (CYRN-NASDAQ) CYRN: Zacks Company Report OUTPERFORM-
More informationCybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
More informationGlobal Cyber Security Market Forecast and Opportunities, 2020
Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast
More informationcarahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION
carahsoft CARAHSOFT S RESPONSE TO THE Florida Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
More informationCombating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationWeekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014
Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Michael S. Lewis, CFA Managing Director msl@thesilverlinegroup.com (703) 424-1969 Michael J. Smith,
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informationQ3 2013 Security & Risk Market Snapshot
Q3 2013 Security & Risk Market Snapshot Don More Managing Director dmore@signalhill.com Eric Wagner Managing Director ewagner@signalhill.com Peter Gant Managing Director pgant@signalhill.com Matt Fiore
More informationREPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different?
REPORT Perimeter Security Defenses State of Perimeter Security Defenses, Time to Think Different? Table of Contents Introduction 3 Key Findings 4 Implications 6 REPORT State of Perimeter Security Defenses
More informationCaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationPalo Alto Networks. September 2014
Palo Alto Networks September 2014 Safe harbor This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are
More informationWorldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationSeparating Security and Information Management into Two Industry-Leading Technology Companies
Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction
More informationSplunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
More informationISE CYBER SECURITY TM INDEX
Index Methodology Guide ISE CYBER SECURITY TM INDEX Issue 2.0 Issue date: August 28, 2015 Produced by:, LLC 60 Broad Street, New York NY 10004 www.ise.com The information contained in this document is
More informationSITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
More informationBrochure More information from http://www.researchandmarkets.com/reports/3493712/
Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint
More informationWhy Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial
More informationWestcon Presentation on Security Innovation, Opportunity, and Compromise
Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M
More informationCombating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationPace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989. Cyber Security Market Trends 2015
Advising on Company Sales, Acquisitions, Fundraising & Growth since 1989 Cyber Security Market Trends 2015. Introduction T he cyber security market is booming in 2015 following a very strong year in 2014.
More informationWAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
More informationInvestor Presentation
Investor Presentation November 2015 Forward Looking Statements This presentation contains statements regarding the pending sale of our information management business to The Carlyle Group, which may be
More informationAccenture Cyber Security Transformation. October 2015
Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting
More informationGlobal Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)
Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends
More informationThreat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
More informationWhile you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
More informationSales Pulse Research / Securosis. Information Security. Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT
Sales Pulse Research / Securosis Information Security Refresh / Upgrade Cycle for Network Security PANW, CSCO, FTNT June 6, 2015 1 Current Trends in This Report: ü Refresh / Upgrade Cycle for Network Security
More information2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
More informationALERT LOGIC ACTIVEWATCH FOR LOG MANAGER
QUICKSTART GUIDE: ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER TABLE OF CONTENTS Introduction...2 Getting Started...4 Configuring Log Sources...4 Common Log Sources...5 INTRODUCTION A FRESH APPROACH TO IDENTIFYING
More informationMarket Guide for Network Sandboxing
G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options
More informationIMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
More informationHewlett Packard Securities Analyst Meeting 2015. #hpesam2015
Hewlett Packard Securities Analyst Meeting 2015 #hpesam2015 1 Software Robert Youngjohns Executive Vice President and General Manager Executive summary Software is delivering consistent revenues with high
More informationThe Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
More informationBreaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
More informationCisco & Big Data Security
Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that
More informationManaging Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
More informationThe reduction of tax loss carry-forwards by $5.8 million. These were set to expire before the company expected to be able to use them.
Small-Cap Research March 4, 2014 Lisa Thompson 312-265-9154 lthompson@zacks.com scr.zacks.com 111 North Canal Street, Chicago, IL 60606 CYREN (CYRN-NASDAQ) CYRN: First New Cloud Product Rolled Out to Customers
More informationProtect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
More informationUnified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
More informationBusiness Intelligence and Analytics Platforms Market Map. Shea & Company
Business Intelligence and Analytics Platforms Market Map Shea & Company Overview The BI analytics market is quickly moving to the 2.0 phase of its lifecycle which we believe will usher in a wave of investment
More informationAdvanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
More informationFuture Threat Landscape - How will technology evolve and what does it mean for cyber security?
James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology
More informationCertification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
More informationWhy are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA
Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies
More informationSplunk: Using Big Data for Cybersecurity
Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals
More informationState of Security Monitoring of Public Cloud
State of Security Monitoring of Public Cloud Shittu O. Shittu Enterprise Security Architect, BP Enterprise Security Architect, trainline.com Director and Principal Consultant, TRAIS Mavens Ltd Highlights
More informationTestimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
More informationPrivate Equity investment in Recruitment companies - what are we looking for? Chris Harper Managing Director Baird Capital
Private Equity investment in Recruitment companies - what are we looking for? Chris Harper Managing Director Baird Capital About The Presenter Chris Harper 25 years within private equity Managing Director
More informationSTRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE
ANALYST DAY STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE TRAVIS REESE, PRESIDENT, MANDIANT CONSULTING AND ISIGHT INTELLIGENCE COPYRIGHT 2016, FIREEYE, INC. ALL RIGHTS RESERVED. INTELLIGENCE- LED
More informationValidian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing
Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn
More informationBrochure More information from http://www.researchandmarkets.com/reports/3301109/
Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1
More informationAccelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder
Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying
More informationDON T BE AN EASY TARGET
CORPORATE SECURITY DON T BE AN EASY TARGET Pekka Usva Capital Market Day 16 Sept 2015 1 AGENDA Corporate Security in brief Market overview and key trends Offering and channels Competition Enabling growth
More informationSecurity Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
More informationGlobal Encryption Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3138718/ Global Encryption Software Market 2015-2019 Description: About Encryption Software Encryption is a technique that secures
More informationM&A Trends and Implications for IT Security Companies Paul DiNardo Vice Chairman & Head of Technology Investment Banking
M&A Trends and Implications for IT Security Companies Paul DiNardo Vice Chairman & Head of Technology Investment Banking October 2010 Company Background Montgomery provides high quality, specialized investment
More informationQRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
More informationGlobal Web Application Firewall Market 2015-2019
Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from
More informationFive Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
More informationPicking Stocks in the Tech Sector
Picking Stocks in the Tech Sector April 20, 2015 by Chaitanya Yaramada of Robert W. Baird & Co. Any science or technology which is sufficiently advanced is indistinguishable from magic. Arthur C. Clarke
More informationQ2 2014 Healthcare IT Market Snapshot
Q2 2014 Healthcare IT Market Snapshot Chase Sanders Managing Director csanders@signalhill.com www.signalhill.com B a l t i m o r e B a n g a l o r e B o s t o n M u m b a i N a s h v i l l e N e w Y o
More informationCloud Based Security Services - Global Strategic Business Report
Brochure More information from http://www.researchandmarkets.com/reports/3301150/ Cloud Based Security Services - Global Strategic Business Report Description: This report analyzes the worldwide markets
More informationAnalysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable
Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable April 2015 1 List of Exhibits Chart Slide Number Executive Summary
More informationGlobal Network Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3505505/ Global Network Security Market 2015-2019 Description: About network security Network security comprises products and services
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationWhitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY
Whitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY 60% [of organizations] plan to automate incident remediation within 24 months - SANS Endpoint
More informationIT Security. Muscat 15+ ABOUT US IN A GLANCE
www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at
More informationWorldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
More informationGlobal Security Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security
More informationWHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
More informationA BVR Special Report. Excerpt from. Key Trends in the Valuation of Government Contracting Firms BVR. What It s Worth
A BVR Special Report BVR What It s Worth Excerpt from Key Trends in the Valuation of Government Contracting Firms Special thanks to Donald W. Nalley, Jr., CPA/CVA, ABV, ASA, for his expert guidance and
More informationGlobal Network Security Appliance Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3280784/ Global Network Security Appliance Market 2015-2019 Description: About Network Security Appliance Network security appliances
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationAdvanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
More informationHow To Understand The Third Platform Ct Market Transformation In Latin America
Latin America 4 Pillars of the Third Platform Continuous Information Series Value Proposition June 2014 International Data Corporation (IDC) is the premier global provider of market intelligence, advisory
More informationBarracuda Networks, Inc. NYSE: CUDA. February 2014
Barracuda Networks, Inc. NYSE: CUDA February 2014 Safe Harbor This presentation and the accompanying oral presentation contain forward-looking statements that are based on our management s beliefs and
More informationQ3 2014. The Software Industry Financial Report
Q3 2014 The Software Industry Financial Report Software Equity Group, L.L.C. 12220 El Camino Real Suite 320 San Diego, CA 92130 info@softwareequity.com (858) 509-2800 SOFTWARE INDUSTRY FINANCIAL REPORT
More informationSymantec Enterprise Security: Strategy and Roadmap Galin Grozev
Symantec Enterprise Security: Strategy and Roadmap Galin Grozev Senior Technology Consultant Symantec Bulgaria Enterprise Threat Landscape Attackers Moving Faster Digital extortion on the rise Malware
More informationCompany Overview. Financial Performance
Jan/15 Feb/15 Mar/15 Apr/15 May/15 Jun/15 Jul/15 Aug/15 Sep/15 Oct/15 Nov/15 Dec/15 SPS Finquest Ltd CMP: 84.60 January 13, 2015 Stock Details BSE code 538402 BSE ID SPS Face value ( ) 10 No of shares
More informationSOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
More informationImpact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
More informationQuarterly Technology M&A Review
Quarterly Technology M&A Review Q4 01 Technology M&A deal value increased considerably in Q4 01, while deal count dipped to the lowest level since Q4 010. Normalized to remove the impact of Softbank s
More informationA Guide to the Insider Buying Investment Strategy
Mar-03 Aug-03 Jan-04 Jun-04 Nov-04 Apr-05 Sep-05 Feb-06 Jul-06 Dec-06 May-07 Oct-07 Mar-08 Aug-08 Jan-09 Jun-09 Nov-09 Apr-10 Sep-10 Mar-03 Jul-03 Nov-03 Mar-04 Jul-04 Nov-04 Mar-05 Jul-05 Nov-05 Mar-06
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationWorldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses
Market Share Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses Robert Westervelt Rob Ayoub Pete Lindstrom Elizabeth Corr IDC MARKET SHARE FIGURE
More informationOutlook for Cloud technology in Big Data and Mobility
2014 Outlook for Cloud technology in Big Data and Mobility Wayne Collette, CFA, Senior Portfolio Manager Cloud technology is a significant and ongoing trend affecting the technology industry. A new breed
More information