Signal Hill Year-End 2014 Cyber Security & Risk Review and 2015 Outlook
|
|
|
- Cecil Murphy
- 10 years ago
- Views:
Transcription
1 Signal Hill Year-End 20 Cyber Security & Risk Review and 2015 Outlook 20 The Year of Cyber Insecurity The Cyber Security & Risk market saw exceptionally strong stock, M&A and investment activity last year, driven by broad recognition that security challenges pose a growing threat to individuals and organizations alike. Surveys show Americans for the first time view cyber risk as the top threat to safety, ahead of national security, terrorism, crime and natural disasters. The U.S. Director of National Intelligence recently ranked cybercrime as the biggest national danger, above terrorism, espionage and weapons of mass destruction. Similar concerns surveyed in the UK, EU and Middle East highlight the global nature of cyber security problems. Tables 1 and 2 highlight cyber security M&A, investment and public market performance statistics. Table 1: Cyber Security & Risk M&A and Investment Activity Signal Hill M&A Transactions Tracked in Signal Hill Investments Tracked in Signal Hill M&A Transactions Tracked in Signal Hill Investments Tracked in Median M&A Purchase Price/LTM Revs in x Average M&A Purchase Price/LTM Revs in x Contact: Don More, Managing Director [email protected] (646) Median EV/Revenue Median EBITDA/Revenue Average MRQ YoY Revenue Growth Median EBITDA Margin YoY Stock Performance Table 2: Cyber Security Stock Valuation and Performance Signal Hill Security Index Signal Hill New-Gen Security Index x 4.7x Median EV/Revenue 8.0x 9.4x 15.8x.9x Median EBITDA/Revenue 27.9x 31.2x.7% 26.7% 10.8% 18.4% +24% +% MRQ YoY Revenue Growth Median EBITDA Margin YoY Stock Performance 36.8% 51.2% 0.2% 15.3% +27% +40% Source: CapIQ New Gen Security Index: CUDA, CYBR, FEYE, FTNT, IMPV, PANW, PFPT, QLYS Signal Hill Security Index: KOSDAQ:053800, TSE:4704, ABT, AVG, BKYI, CHKP, CUDA, CYBR, CYRN, FEYE, FTNT, GTO, IMPV, INTZ, PANW, PFPT, QLYS, SYMC, VDSI, WAVX, ZIXI 1
2 Cyber Security and Risk products and services generated $71 billion of spending last year, with demand expected to grow 8.2% to $77 billion in 2015, according to Gartner research. Spending levels pale in comparison to the estimated $373 to $575 billion in damages attributed to security breaches, according to Intel. While hard to quantify, data theft alone (e.g. of trade secrets) may impose damages as great as $2.2 trillion, according to PwC. Target stores estimates its Q1 20 breach cost $8 million, not including losses due to brand damage and market value impact. Similarly, Sony s 2011 and 20 hacks cost $271 million. Since 2009, such incidents have grown at an annual average annual rate of 66% to 42.8 million in 20. Interconnectedness of online activities, data and devices made it easier for attacks to cause greater damage. Consequently, the average cost of a breach to an organization rose to $5.9 million in 20 from $3.9 million, according to PwC. Reflecting growing board-level concern over security risks, the Economist reported that American firms spent $2 billion on cyber-liability coverage in 20, up from $1.3 billion in 20. Already, Q has seen several major breaches, including the theft of millions of medical records from Anthem Health and a coordinated attack on bank ATMs worldwide resulting in theft of an estimated $1 billion. Table 3 lists several of the largest discovered breaches since Table 3: Select Major Security Breaches by Records Stolen Since 2012 Target Records Technique Target Records Technique Adobe 152M Customer Database Customer Ubisoft 58M Hack Database Hack Ebay 5M Customer Database 3 rd Party Login HomeDepot 56M Hack (Malware) Anthem 80M Unencrypted Data Customer Evernote 50M Hack (Malware) Database Hack JP Morgan 76M Stolen Credentials Living Social 50M Customer Database Hack Target 70M Customer Database Hack Sony 10M (100 TB) Nation-state attack or Insider Threat Nation-state and organized crime ring attacks rose in 20, driving propagation of advanced malware such as Regin and Zeus Gameover and major vulnerability exploits including Heartbleed and Shellshock. PwC s recent cybercrime survey, however, found that current and former employees remain the most common source of breaches at organizations, followed by service providers and partners; and ahead of hackers, competitors, activities, organized crime, terrorists and spies. Further, most breaches last year exploited simple mistakes, such as misconfiguration of network devices or clicking on a suspicious . Dark Reading reports that as much as 95% of successful attacks in fact may be attributable to human error, rather than sophisticated attacks or weak defense technology. In 2015, incidents will continue to be less the result of new exploits and viruses than weak security hygiene, and growth in points of exposure IP-addresses, online presences, mobile applications, and cloud-based data. 2
3 M&A and Investment Activity Review M&A Signal Hill tracked 105 Cyber Security & Risk M&A transactions in 20 at total announced value of approximately $7.0 billion and 97 deals in 20 valued at $7.5 billion. Median announced deal value was $40 million. Only 35% of transactions had announced values; including unannounced values, total deal volume rose to an estimated $16 billion in 20- with median deal value of $12-15 million. The top 30 deal values and Purchase Price/LTM Revenue multiples (excluding not-meaningful multiples) are displayed in Tables 4 and 5 below. The largest and mostly highly-valued deals are listed in Table x 45.0x 40.0x 35.0x 30.0x 25.0x 20.0x 15.0x 10.0x 5.0x 0.0x Table 4: 20 Top 30 Announced Sector M&A Deals by Purchase Price/LTM Revenues Table 5: 20 Top 30 Announced Sector M&A Deals by Purchase Price $2,500.0 $2,250.0 $2,000.0 $1,750.0 $1,500.0 $1,250.0 $1,000.0 $750.0 $500.0 $250.0 $0.0 Date 23-Jul- 22- Jan- 2-Jan- 20- May- 15- Aug- 8-Aug- Largest M&A Transactions Target / Acquirer Table 6: Large and High-multiple Cyber Security M&A Deals Purchase Price ($mm) Subsector Sourcefire / Cisco $2,494.1 Network Security AirWatch / VMware $1,540.0 MDM Mandiant / FireEye $989.4 Websense / Vista Equity Partners Penetration Testing and Remediation $902.9 Web Security Trusteer / IBM $900.0 Anti-fraud SafeNet / Gemalto $890.0 Encryption and IAM Date 17- Sep- 15- Aug- 22- May- 22- Jan- 21- May- 1-Oct- 3 Highest Multiple M&A Transactions Target / Acquirer Purchase Price / LTM Rev Subsector Versafe / F5 Networks 50.0x Web Security Trusteer / IBM 25.7x Anti-fraud Solera Networks / Blue Coat Systems 18.8x Network Security AirWatch / VMware 15.4x MDM LetMobile / LANDesk Software 41st Parameter / Experian Group 15.0x MDM.1x Anti-fraud
4 9-Dec- 5-Nov- 6-May- 2-Dec- Tripwire / Belden $710.0 IT Compliance Blackbird Technologies / Raytheon $420.0 MAM Stonesoft Oyj / McAfee $389.0 Network Security Prolexic Technologies / Akamai $370.0 Cloud Security 18-Jul- 23-Jul- 2-Jan- 8-Jul- PasswordBank Technologies / Symantec 12.5x IAM and Authentication Sourcefire / Cisco 10.7x Network Security Mandiant / FireEye 9.7x Aveska / EMC Corporation Penetration Testing and Remediation 9.0x IAM Signal Hill divides the Cyber Security & Risk market into 12 subsectors. Table 7 below lists the most active M&A subsectors in order by number of deals, dollar volume, multiples and growth: Table 7: M&A Momentum Subsectors in Cyber Security & Risk Most Deals Highest Volume Highest Multiples Identity & Access Management Greatest Activity Growth - Anti-malware/ATP Anti-fraud Security Services Services Services Anti-malware/ATP Identity & Access Management Network Security Network Security Mobile Security Mobile Security Anti-malware/ATP Mobile Security Network Security Anti-fraud Mobile + Managed Security Identity & Access Management Identity & Access Management Critical Infrastructure Protection Network Security Anti-fraud Managed Security Anti-fraud Tables 8 11 below lists and ranks number of deals and purchase price by each subsector for 20 and 20. Table 8: 20 Subsector M&A-Number of Deals Table 9: 20 Subsector M&A-Deal Volume $mm $2,500 $2,000 $2,046 $1, $1,500 $1,000 $500 $1,331 $1,099 $254 $240 $232 $108 $79 $60 $10 0 $- 4
5 Table 10: 20 Subsector M&A-Number of Deals Table 11: 20 Subsector M&A-Deal Volume $mm $3,000 $2,500 $2,000 $1,500 $1,000 $500 $- $2,519 $1,311 $1,2 $903 $645 $557 $280 $155 $150 $25 Table 12: Subsector M&A Size vs Valuation 50.0x 45.0x 40.0x 35.0x 30.0x 25.0x 20.0x 15.0x 10.0x 5.0x 0.0x $0.0 $500.0 $1,000.0 $1,500.0 $2,000.0 $2,500.0 Regression analysis of acquisitions of publicly-traded security companies over the past decide shows that the primary determinant of M&A deal value in the sector is the most recent quarter over prior-year quarter revenue growth rate. Analysis of security stock trading valuations similarly shows the largest determinant of value is recent revenue growth rate. Profitability is a distant second in terms of valuation impact. Size/scale in itself show almost no correlations with valuation, as a scatter chart of the 30 largest M&A transactions since 20 shows in Table 12. Investment Signal Hill tracked 87 non-change-of-control investments in 20 in Cyber Security and Risk totaling approximately $1.2 billion and 84 investments in 20 valued at $1.5 billion. The total number, dollar value and median investment size by round is shown at Tables and. Table : 20- Investments by Round Table : 20- Investment Volume by Round $mm $900 $800 $768 $ $700 $600 $500 $400 $300 $200 $538 $432 $ $100 0 A B C D E+ $- A B C D E+ 5
6 Table 15 below lists the most active investment subsectors by number of deals and dollar volume: Table 15: M&A Momentum Subsectors in Cyber Security & Risk Most Investments Highest Volume Greatest Activity Growth 20- Anti-malware Anti-malware/ATP Data Security Cloud Security & IAM Mobile Security Vulnerability Management Data Security Data Security GRC Network and Mobile Security Network Security Network Security Vulnerability Management Services Anti-fraud GRC Cloud Security Critical Infrastructure Protection Tables summarize number and total value of financial investments by each subsector for 20 and 20. Table 16: 20 Subsector Investment-# of Deals Table 17: 20 Subsector Investment-Deal Volume $mm $300 $250 $267 $212 $ $200 $150 $100 $50 $7 $109 $98 $80 $47 $18 $ $11 $8 0 $- Table 18: 20 Subsector Investment-# of Deals Table 19: 20 Subsector Investment-Deal Volume $mm 25 $400 $ $350 $300 $ $250 $200 $212 $ $150 $100 $50 $0 $121 $92 $44 $27 $ $12 0 $- 6
7 Subsector Assessment and Trends Signal Hill divides Cyber Security and Risk into 12 subsectors (within which are 46 segments), classified by solution type. Six of the 12 subsectors are Primary categories, listed on the left side of Table 20 below. Another six, on the table s right side, are Derivative categories with distinct technologies and practices that incorporate the Primary categories. For example, Cloud Security can encompass any of the six Primary subsectors. For purposes of deal and investment analysis, we place a vendor in the Derivative category when its main function and value proposition is defined by the Derivative category; however when the Primary category best describes the vendor s function, it is classified as Primary though it may have Derivative category capabilities. Among subsectors there is a degree of overlap, for example with respect to software suites and appliances. As a result, market spending estimates shown include some double-counting. Primary Subsectors 20 Market Size Anti-malware/ATP $10.0B 7.7% Identity & Access Management Table 20: Cyber Security and Risk Subsectors Projected Annual Growth $9.2B 15.0% Derivative Subsectors Critical Infrastructure Protection Managed Security Services 20 Market Size Projected Annual Growth $70.5B 10.7% $.8B 15.4% Network Security $8.3B 3.0% Security Services $11.2B 8.0% Data Security $4.9B 16.0% Cloud Security $2.7B 22.0% Vulnerability Management $2.6B 12.0% Mobile Security $4.5B 41.0% Anti-fraud $1.3B 10.0% Security GRC $1.0B 9.0% Brief discussion of subsector parameters and trends follow. Primary Subsectors Anti-malware/Advanced Threat Protection The global endpoint security market, $10B in 20, is expected to grow 7.7% annually, $.5 billion by 2019 (Markets and Markets) Malicious code is the cyberattack weapon of choice, deliverable via websites, /sms, files, application stores, and attached devices. Malware is the most common breach method, followed by hacking and social engineering. Malware threats are growing quantitatively and qualitatively as attackers share tools and techniques online. The average number of s containing malware increased by 50% in 20, according to security vendor Cyren, which also found a 159% increase in malware URLs in 20. Increasingly, blended threats combine methods such as phishing and hacking to introduce malware. Subsector solutions overlap most closely with Vulnerability Management, Network Security and Data Security; for example large antivirus vendors also offer data loss prevention, and several firewall vendors integrate endpoint protection products. 7
8 In 20, consumers drove about two-thirds of subsector spending. Organizations purchase solutions as suites and appliances, which Gartner research defines as Endpoint Protection Platforms. Advanced Threats (also called APT for Advanced Persistent Threats) are distinguished from regular malware by the fact they are typically signature-less, multi-faceted, targeted and customized thus, not reliably addressable through traditional antivirus products. This form of malware is harder to prevent and detect, as it often is deposited deep into a computing system and does not leave files. APT is the fastest growing segment within the subsector with projected 42% annual spending growth from $617 million in 20, according to IDC. In addition to anti-virus and APT, analytics technologies figure prominently in the subsector. Analytics is a diffuse space describing vendors that leverage big data techniques and threat intelligence feeds to find previously unseen anomalies indicative of an attack. Areas of investment and acquisition interest include zero-day and polymorphic attack protection, socialengineered attack prevention, browser-based malware detection, advanced protection of web-facing applications, real-time attack intelligence and incident remediation. Major public vendors in this sector include Cisco, FireEye, Intel, Proofpoint, Symantec and Trend Micro. Identity & Access Management Sector spending was estimated at $9.2 billion in 20, growing 15% annually through 2019 to $18.3 billion (Markets and Markets) In 20, Forrester research placed IAM as the highest-ranking enterprise security spending priority, reflecting the simultaneous opportunities and challenges of managing distributed digital identities that enable access from anywhere to anything. Most serious breaches in 20 involved unauthorized administrative access, so locking secure identity management is critical to protecting organizations. Effective IAM also improves business performance by streamlining trusted interactions among stakeholders. IAM also ties closely to compliance and risk management in areas of authorization and governance, which relates to onboarding, provisioning and other account lifecycle tasks. For consumers and consumer-facing businesses, identity theft is the highest-profile cyber security concern. Active areas within the subsector include cloud-based IAM enabling single sign-on access across devices and applications. Most enterprise SSO systems are network-based and increasingly inadequate to manage mobile identities and cloud applications. Advanced and multi-factor authentication, including biometrics and mobile context-based smart authentication, are also high growth segments. Interest in advanced authentication technologies reflects overdue need for replacement of password-based authentication and rapid advent of mobile and wearable devices as potential universal authenticators. Identity analytics is another active area as IAM data feeds will increasingly get integrated into next generation firewalls, malware detection, antifraud and data loss prevention solutions to improve efficacy. 8
9 Further out on the horizon is what Gartner terms IdoT, for Identity of Things. As Internet of Things becomes mainstream, IAM will need to be designed around managing identities of entities people, things and services within a single framework. Public IT infrastructure vendors including CA, Dell (Quest), IBM and Oracle have built and bought IAM suites, and are expected to expand into cloud and mobile access management, as well as identity analytics. Authenticationfocused players such as RSA (EMC) and Gemalto will likely seek to also expand cloud-based offerings, broaden forms of authentication and expand into authorization. Network Security Sector spending is estimated at $8.3 billion in 20, growing in the low single-digits through 2018 (IDC) Network Security remains a necessity for organizations extended perimeters. Forrester research s 20 business security needs survey found three of the five highest priorities to be network security-related, namely Firewall Management (#2), SIEM (#4) and Intrusion Management (#5). Though no longer a static, centralized set of access points, the network boundary between private and public IT environments requires protection to supplement endpoint, application and data security. There is arguably a greater need for network security solutions in a BYOD world, as less control over users and devices increases the need for security from the network. While overall sector spending is flat, this reflects increased overlap of network spending with solutions in the vulnerability management, anti-malware, mobile and cloud security segments. Also, the larger sub-segments of Network Security that are flat-to-declining i.e. traditional firewall, VPN and intrusion detection mask high growth segments that include: SIEM (security information and event management) growing 12% annually according to Research Markets; all-in-one appliances including SMB UTM (unified threat management) growing 24% annually according to IDC research; network device configuration management growing 17% annually; and DDoS (Distributed Denial of Service) security. DDoS attacks, still the most widely used method of taking down websites, increased 240% in 20, according to security firm Incapsula. As network security becomes more closely tied to both application-level and cloud security, integrated solutions see high demand. Increasingly powerful UTM devices also are of interest. Other active areas within the sector include proactive network threat intelligence and next-generation firewalls. Major network security public players are Cisco, Check Point, IBM, Splunk, HP, Palo Alto, Intel, EMC, Barracuda and Fortinet. These vendors actively seek to enhance their cloud-based offerings and augment analytics capabilities. 9
10 Data Security Data security has estimated spending of $4.9 billion in 20, with expected growth of 16% annually (IDC, Forrester, Radicati) Solutions that filter and encrypt digital data at rest and in motion will see accelerating demand growth as deperimeterization and data mobility expose online information to theft and tampering. Last year saw a 49% rise in data breaches and 78% increase in data records stolen or lost, according to Gemalto. remains the most vulnerable vector for sophisticated data attacks on organizations and individuals. Cybercriminals in 20 increasingly focused on phishing individuals with access to valuable data or credentials that could be hijacked and used for cyberattacks. Rapid expansion of unprotected Wifi, SMS and Dropbox-type cloud services add to the necessity for directly securing data. With data protection and data privacy compliance becoming a high priority, organizations are increasingly incorporating pervasive encryption to achieve compliance and data security, and mitigate data breach risks associated with adoption of advanced technologies, particularly cloud services and mobility. Other areas of high interest include secure messaging gateways utilized by carriers and public cloud services, demand for which is forecast to grow 55% annually to $363 million by 2017, according to Infonetics. Data loss prevention from the cloud, for mobile and for deployment in public clouds are also of interest; overall DLP demand is forecast by Gartner research to grow 22% annually. There also will be more demand for persistent digital rights management, driven by cloud adoption, bring-your-own-it and the Internet of Things (IOT). Within communications, voice and video transmission encryption are also gaining attention. Large public or recently-public players include Blue Coat, Dell, Barracuda, Gemalto, Intel, Proofpoint, Symantec, TrendMicro and Websense. Vulnerability Management Vulnerability Assessment and Application Security Test spend was $2.6 billion in 20 growing 12% yearly (IDC) The most serious distributed attacks last year came from exploited vulnerabilities, such as Heartbleed and Shellshock, which impacted two-thirds of web servers, Microsoft Office, Adobe Reader and other applications. Effective vulnerability assessment, patch and configuration management, application security testing, and forensics solutions are critical to preventing a broad array of breaches. The need for vulnerability management is further heightened by explosion of mobile computing and, in 2015 and beyond, the Internet of Things. HP recently found 70% of network-accessing devices contain vulnerabilities, while a majority of mobile applications have not been adequately tested. A growing number of vulnerabilities last year were also found in virtual environments, which heighten risks by creating a single point of failure. In addition to directly preventing exploits, vulnerability assessment solutions provide threat intelligence feeds that benefit anti-malware and SIEM, as well as incident remediation services. Vulnerability exploitation is often 10
11 followed by a targeted malware attack so vulnerability assessment can break the attack chain. In addition vulnerability assessments help maintain PCI and other types of compliance. The most active public companies in the sector include HP, IBM, Intel, Qualys and SolarWinds. Anti-fraud North American Fraud Detection/Prevention spending is forecast to grow 10% yearly, to $2.1 billion in 2019 (Micro Market Monitor) This segment focuses on technology solutions that detect, predict or prevent fraudulent transactions over the internet. While estimates vary widely, according to one survey e-commerce losses due to cyber fraud exceeded $200 billion in 20 and are expected to rise 20% annually with online transactions. The problem is widespread one in four US consumers received data breach notifications, according to ACI Worldwide. This area s technology integrates with other subsectors including IAM (as authentication is the primary defense against online fraud, which typically involves identity compromise) and Anti-malware (which often stop attacks that aim to perpetuate financial fraud). Fraud occurring from stolen identities accounts for nearly 85% of ID thefts in the US, according to the Federal Trade Commission. Anti-malware is also connected as breaches often are utilized by cybercriminals to advance cyber fraud attacks. Similarly, Data Security combats fraud utilized to steal digital information. Areas of high interest in the subsegment include fraud analytics tools that review data from different data sources across a wide range of channels to discover trends, patterns, and anomalies in transactions. Mobile fraud detection is also a focus area as devices will be a prime target for fraud in 2015 according to experts, as mitigation systems and models are still not robust. In addition, health record protection is a major market opportunity given pending digitalization of the healthcare industry. A recent study by the Medical Industry Fraud Alliance reported medical identity theft to be the fastest growing identity crime, as highlighted by the March 2015 Anthem breach. Anti-fraud also includes E-signature verification solutions, which have seen recent strong interest in support of online commerce. Increasingly, anti-tampering protection solutions for financial services, software publishers, games companies and device manufacturers are becoming an area of focus. Key public players in this market include SAP, FICO, Fiserv, Experian, EMC, CSC, IBM and ACI. Derivative Subsectors Critical Infrastructure Protection Security spending to protect critical infrastructures will grow 10.7% through 2020 from $63.8 billion in 20 (ABI) CIP addresses several major related developments in technology use IoT, IP-enablement of industrial control systems and convergence of physical and IT security. Actual subsector size, while large, is more difficult than 11
12 others to estimate and separate from other cyber security areas, such as anti-malware, network security and vulnerability management, due to significant technology and functional overlap. Protecting high-value physical targets against cyber-attacks is becoming an acute priority as high-profile breaches become more common, and as more devices and industrial control systems become IP-enabled. For example, there has been a rapid rise in hacks against systems controlling energy stations. Other discovered hacks include stock exchanges, utilities, air traffic control systems and railways. Research vendor IOActive has shown how hackers can commander new automobile electronic control units. Subsector areas of interest include event management automation, threat intelligence management, and cyberattack vulnerability and anomaly testing software for oil and gas, manufacturing, medical, chemical, pharmaceutical and water treatment markets. Managed Security Services North American MSS revenues of $1.8 billion in 20 are forecast to reach $3.3 billion in 2018 (Frost & Sullivan) Managed security refers to cloud-based delivery of combined security solutions-as-a-service and traverses all Primary subsectors. It is an alternative to deployment of security behind the firewall, i.e. within the organization. Gartner research predicts MSS will become the primary means by which mid-size and smaller organizations purchase cyber security and risk solutions. ABI research predicts demand will reach $32.9 billion in Cloud based services vary by vendor and range from basic firewall monitoring to advanced analytics and delivery of a full range of services across every primary subsector. Managed security services providers are differentiated as well by whether they serve enterprises or smaller organizations. Vendors also vary in the extent to which they use third-party security vendors versus their own technologies. Managed security services are provided by pure-play MSSs, consultancies and VARs, telcos and traditional security vendors offering cloud-delivered versions of their products and specialty vendors. Security Services Security services spending totaled $11.2 billion in 20 and is forecast to increase 8% annually (Gartner) Professional security services represent a major horizontal subsegment that crosses the Primary subsectors. It includes security consulting, integration, monitoring, ethical hacking, training, testing, development and remediation services. According to online recruiter Dice, cyber security help-wanted ads increased 77% in December 20 over 20; experts cite a recurring shortage of security-trained services personnel. Complex security needs have been heightened due to the rapid rate of technology change. Gartner predicts that by 2018 more than half of organizations will use security services firms that specialize in data protection, security risk management and security infrastructure management. 12
13 While most security services are delivered by larger consultancies including the Big Four Accountancies, large system integrators and Big IT publics such as IBM and HP, the highest growth is among specialty firms that are experiencing rapid expansion. Mobile Security $4.5 billion of total mobile security spending in 20 expected to rise 41% annually to $34.8 billion by 2020 (Infonetics) Mobile security traverses all Primary security sectors and is the fastest growing subsector, reflecting rapid evolution toward an IT world dominated by mobile devices. Subsector areas include data encryption, device authentication, mobile application vulnerability management and messaging security. The client-side mobile device security software market represents about $1.4 billion of spending in 2015 and is projected to rise to $3.4 billion in Areas of highest concern among businesses include data loss protection, application security, unauthorized device access and misconfiguration and mobile payment fraud. Mobile malware will become a major focus as incidents and variants grow alongside usage. During 20 there was a 61% increase in mobile malware targeting Android devices. Mobile device authentication also is expected to be an area of focus in Cloud Security Cloud security spending was $2.7 billion in 20, predicted to grow 22% annually to $3.6 billion in 2016 (Gartner) Like other derivative subsectors, cloud security traverses all Primary subsectors. It refers to solutions that protect applications run from and data stored in the cloud, whether data centers or public cloud services. Areas of interest include security event monitoring, anti-malware for virtualized environments and data security solutions that continuously manage access to and encrypt content residing in the cloud. Cloud infrastructure vulnerability and compliance management solutions are also active focus areas Gartner research predicts more than 30% of small or midsize businesses will need to adopt cloud-based security controls by the end of Governance, Risk & Compliance Management Security policy and compliance spending of $1.0B in 20 is forecast to grow 9% annually to $1.4B in 2018 (IDC) Within the broader GRC market, security policy and compliance management automates monitoring and maintenance of risk controls that assure adherence to regulations and policies meant to maintain security. Policy and compliance management also helps organizations optimize their cyber security spending for greater return on investment. In 20, according to a PwC survey, only 38% of organizations reported having a methodology to prioritize security investments based on risk and impact to business strategy. Cyber security GRC is a preventive solution that complements Vulnerability Management (IDC research characterizes the subsegment as a part of VM) and often involves Security Services. There is heightened interest in compliance monitoring solutions to reduce security vulnerabilities, and in specialized vendors that address the
14 compliance needs of particular industry verticals. Regulatory demands are growing to help improve the state of cyber security. As examples, the US SEC is evaluating implementation of greater security risk disclosure requirements, and stringent EU Data Protection regulations are expected to be finalized in Forecast: Continued Sector Strength Evidence strongly suggests that high levels of cyber security & risk M&A and financing activity will continue, and perhaps accelerate, through Signal Hill s canvassing of strategic buyers and financial investors suggest broad interest in investing into security this year particularly among firms that have yet to invest in the sector. The interest is both thematic and specifically focused on gap filling in areas of perceived need. Public markets continue rewarding cyber security companies and acquirors with above-average valuation multiples, and the IPO window is open, with a growing backlog of companies filing this year. Business IT spending surveys suggest cyber security and risk remain high near-term investment priorities. Security investment refresh cycles are generally expected to accelerate due to rapid adoption of newer cloud and mobile technologies, and introduction of next-gen security solutions. There is an emerging view among regulators and organizations that security spending is better viewed in the context of organization risk levels, rather than percent of IT budget; this suggests security budgets will increase. As the Wall Street Journal has noted, What companies finally are recognizing is they are paying $50,000 to protect their business and all the data on their systems. It s not a percentage of IT spend, it s a percentage of risk of the company at large. Large IT consulting and integration firms see increased customer demand for expansion of their cyber security consulting capabilities. This is due to the complexity associated with rapidly evolving enterprise security technologies and increasingly regulated environments. Both the quality and quantity of cyber-attacks continue to rise, and awareness of the challenge is high. We see some increase in divergence of valuations; median multiples are likely to remain stable, however with greater dispersion.
15 Signal Hill, named 20 Boutique Investment Bank of the Year by the Global M&A Network, is a leading independent advisory boutique serving the M&A and private capital raising needs of growth companies. Signal Hill s experienced bankers provide deep domain expertise and an unyielding commitment to clients in our sectors: Internet & Digital Media, Internet Infrastructure, Services and Software. With more than 600 completed transactions and offices in Baltimore, Bangalore, Boston, Mumbai, Nashville, New York, Reston and San Francisco, Signal Hill leverages deep strategic industry and financial sponsor relationships to help our clients achieve Greater Outcomes. Copyright 201*, S&P Capital IQ (and its affiliates, as applicable). Reproduction of pitch materials in any form is prohibited except with the prior written permission of S&P Capital IQ ( S&P ). None of S&P, its affiliates or their suppliers guarantee the accuracy, adequacy, completeness or availability of any information and is not responsible for any errors or omissions, regardless of the cause or for the results obtained from the use of such information. In no event shall S&P, its affiliates or any of their suppliers be liable for any damages, costs, expenses, legal fees, or losses (including lost income or lost profit and opportunity costs) in connection with any use of S&P information. 15
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
IBM Security Systems Trends and IBM Framework
IBM Security Systems Trends and IBM Framework Alex Kioni CISSP, CISM, CEH, ITILv3 Security Systems Lead Technical Consultant Central, East & West Africa Region 1 Agenda IBM X-Force 2013 Mid Year Trend
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?
Securing your IOT journey and beyond Alvin Rodrigues Market Development Director South East Asia and Hong Kong 1 What is the internet of things? 2 1 Imagine if Meeting @ 9am 5 mins later Meeting delayed
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
Brochure More information from http://www.researchandmarkets.com/reports/3301109/
Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
TCS Managed Security Services
IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...
Westcon Presentation on Security Innovation, Opportunity, and Compromise
Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
BIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years.
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Cyber Security Solutions:
ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
INSERT COMPANY LOGO HERE
INSERT COMPANY LOGO HERE 2014 Frost & Sullivan 1 We Accelerate Growth Technology Innovation Leadership Award Network Security Global, 2014 Frost & Sullivan s Global Research Platform Frost & Sullivan is
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
