A Closer Look At The Second Largest Cybersecurity M&A Transaction In History
|
|
|
- Victor Morton
- 9 years ago
- Views:
Transcription
1 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest.
2 Symantec Acquires Blue Coat In Second Largest Cybersecurity Transaction Symantec Not Only Acquires Blue Coat, Acquires CEO In A $4.65B All Cash Deal. Transaction Overview Blue Coat Overview Date: EV / LTM Rev: 6/12/ x HQ: Sunnyvale, CA // Founded: 1996 CEO: Greg Clark (Now CEO of Symantec) Customers: 15,000 In December 2011, Thoma Bravo acquired Blue Coat and took company private for $1.3B. In March 2015, Bain Capital acquired Blue Coat from Thoma Bravo for $2.4B. Acquires EV / LTM EBITDA: Private Equity Support: NM Network Security Cloud + + Platform Capabilities Protect Cloud and On- Premise Assets Respond Rapidly to Security Incidents Protects enterprises and its users from cyber threats Defend Against Advanced Threats Manage Encrypted Traffic Enterprise Security $4.65 Billion Advanced web and cloud security Encrypted traffic management Network performance and optimization Optimize Network Performance Leverage Cloud to Protect the Cloud Transaction Funding Symantec acquires Blue Coat for $4.65B in an all cash deal Silver Lake makes an additional $500M investment into Symantec (doubling their investment to $1B) Bain Capital to reinvest $750M to help fund the deal Additional $2.8B raised in the form of debt for acquisition Top 5 Cybersecurity Transactions by Value Date Announced Acquirer Target Deal Value ($B) EV / LTM Rev August 19, 2010 $ x June 12, 2016 $ x February 9, 2004 $ x July 23, 2013 $ x March 10, 2015 $ x Source: Company press releases and websites, 451 Research. 1
3 The Market Continues To Value Scale, Predictability, & Profitability Symantec s Acquisition of Blue Coat Is A Prime Example. 9.0x 8.0x Check Point $14,461 mn Proofpoint $2,631 mn Splunk $7,526 mn Palo Alto Networks $11,670 mn 7.0x $3,073 mn (1) CyberArk $1,527 mn EV / Revenue 2016E 6.0x 5.0x 4.0x 3.0x 2.0x 1.0x AVG $989 mn Barracuda $774 mn MobileIron $273 mn F-secure $466 mn Imprivata $349 mn Qualys $1,121 mn Mimecast $582 mn Trend Micro $4,695 mn Fortinet $5,794 mn FireEye $2,567 mn Imperva $1,260 mn Rapid7 $588 mn R 2 By Quarter Current: 22.2% Q4: 29.2% Q3: 63.2% Q2: 68.4% 0.0x 0% 5% 10% 15% 20% 25% 30% 35% 40% E Revenue Growth High Growth Cybersecurity Low Growth Cybersecurity (1) Note: Size of the bubble indicates Market Cap (Equity value in the case of Blue Coat). In USD; Market data as of June 15, Source: Capital IQ. 2
4 Strategic Moves For Competitive Advantage Accelerating The Landscape Of Buyers For Cybersecurity Companies Has Expanded Over Time. Cybersecurity IT Notable Deals By Sector Defense IT PE 1/16: $275M / 6.9x 11/15: $280M / NA 10/15: $400M / 7.5x 11/15: $78M / NA 10/15: $71M / NA 4/15: $1.9B / NA 10/15: $453M / NA 7/15: $190M / NA 10/14: $233M / 3.0x Defense ISP Industrial Industrial / IoT ISP PE 1/16: NA / NA 10/15: $9M / NA 8/15: NA / NA Most Active Acquirers 12/14: $710M / 6.0x 7/15: NA / NA 4/15: $200M / 3.3x 7/14: NA / NA 4/15: $786M / 3.6x 3/15: $2.4B / NA Source: Momentum Partners. 3
5 Cybersecurity M&A: A Closer Look At Deal Value & Multiples The Combination of Blue Coat s Deal Value & Valuation Multiple Are Rare Air. M&A By Deal Size M&A By Valuation Multiples (EV / LTM Rev) 55% 50% 45% 40% 48% 85 35% 30% 25% 27% 30% 26% 35% 30% 25% 20% 15% 10% 5% 0% $247M Median Deal Size For >10x 16% 13% 29 11% 7% % >$0M - $50M $50M - $100M $100M - $250M $250M - $500M $500M - $1B $1B+ 20% 15% 10% 5% 0% % > x 3.0x - 5.0x 5.0x x 10.0x The median exit enterprise value for Cybersecurity exits since 2010 is $65M M&A exits in Cybersecurity are typically below $100M 60%+ of the time Exits above $1B are quite rare representing 6% of all deals (3 public, 6 private and 2 spin-out) Contemplated transactions are increasingly falling into two categories: Transformational (a la Symantec/Blue Coat) Opportunistic (rationalizing valuation and cooling funding markets) Valuations for M&A exits in Cybersecurity vary for many reasons growth, market leadership, scale, customer validation, technology and team Exits >10x are a small minority (18%) where the buyers are typically cash rich and willing to pay what it takes (median cash balance of the buyers at time of acquisition was $2.2B and median market cap was $17.9B) Buyers Source: Momentum Partners, 451 Research, Capital IQ. 4
6 The Security M&A Chessboard Major Moves Will Be Made Post Symantec / Blue Coat. The Top Targets (2016E Revenue $M) The Top Consolidators (Cash Balance $B) $105.3 $793.6 $63.5 $501.0 $425.3 $56.1 $336.8 $15.3 $303.6 $14.9 $211.0 $9.0 $197.8 $6.0 $2.8 All considered IPO candidates (> $75M in Revenue) $1.4 Each likely seeking $1B+ exit $1.1 Network/Endpoint Security MSSP Web Security Application Security IAM Vulnerability Management Cloud Security Application Security IAM Advanced Endpoint Security Backed by Vista Equity (Fund V: $5.7B) & Raytheon ($2.6B Cash) The Wild Cards Source: Momentum Partners. Advanced Endpoint Security The Wild Cards 5
7 CYBERscape: The Cybersecurity Landscape The Security Sector Is Dynamic And Vast. Infrastructure Security Endpoint Security Application Security Network Firewall Network Monitoring Endpoint Prevention WAF & Application Security Intrusion Prevention Systems Unified Threat Management Endpoint Detection & Response Vulnerability Assessment Messaging Security Web Security Managed Security Service Provider Industrial / IoT Security Security Operations & Incident Response Threat Intelligence Mobile Security Data Security SIEM Cloud Security Security Incident Response Specialized Threat Analysis & Protection Transaction Security Risk & Compliance Source: Momentum Partners. 6 Identity & Access Management
8 15 Advise. Network. Invest. Momentum Partners, LLC Momentum Capital Markets, LLC 340 Brannan Street Suite 501 San Francisco, California Michael Tedesco Executive Chairman Eric McAlpine Managing Partner Petros Kitsos Senior Advisor Timothy Lipton Partner Keith Skirbe Director Dino Boukouris Director *Securities offered through Momentum Capital Markets, LLC, a division of Financial Telesis Inc. Member FINRA/SIPC.
Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014
Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014 Michael S. Lewis, CFA Managing Director [email protected] (703) 424-1969 Michael J. Smith,
The State of M&A in the Cybersecurity Market. October 28, 2015
The State of M&A in the Cybersecurity Market October 28, 2015 AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster
Acquisition of Vormetric 19 October 2015
Acquisition of Vormetric 19 October 2015 www.thalesgroup.com Cybersecurity at Thales Cybersecurity consulting Managed cybersecurity services Mobile cybersecurity Data security (Thales e-security) 500m+
Q3 2013 Security & Risk Market Snapshot
Q3 2013 Security & Risk Market Snapshot Don More Managing Director [email protected] Eric Wagner Managing Director [email protected] Peter Gant Managing Director [email protected] Matt Fiore
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
Cyber security a major trend in digital technology
Vontobel Investment Banking Cyber security a major trend in digital technology Cyber Security Performance Index October/November 2015 Performance creates trust Contents Overview A 3 Investment case Cyber
Digital Media M&A Update January 2015
Technology and Digital Media Investment Banking M&A Advisory Digital Media M&A Update January 2015 January 29, 2015 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite 500 West Hollywood, CA 90069
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
Global Security Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
Quarterly Technology M&A Review
Quarterly Technology M&A Review Q4 01 Technology M&A deal value increased considerably in Q4 01, while deal count dipped to the lowest level since Q4 010. Normalized to remove the impact of Softbank s
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Raytheon and Vista Equity Partners form new cybersecurity company
Raytheon and Vista Equity Partners form new cybersecurity company Investor Presentation April 20, 2015 Dial In Number 866.825.3209 Domestic 617.213.8061 International Reservation Number: 48245306 Replay
Reference Technology Roadmap
Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index,
Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Splunk: Using Big Data for Cybersecurity
Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals
BEST PRACTICES RESEARCH
Frost & Sullivan 1 We Accelerate Growth Contents Background and Company Performance... 3 Industry Challenges... 3 New Product Attributes and Customer Impact... 3 Conclusion... 6 Significance of New Product
Global Cyber Security Market Forecast and Opportunities, 2020
Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast
Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider
Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Moving from network-centric security to the broader IT security suite Reference Code: TE007-000800 Publication Date: 17
Separating Security and Information Management into Two Industry-Leading Technology Companies
Separating Security and Information Management into Two Industry-Leading Technology Companies October 9, 04 Forward Looking Statements This presentation contains statements regarding our strategic direction
IT Services, Cloud and Managed Services M&A Update July / August 2014
Technology and Digital Media Investment Banking M&A Advisory IT Services, Cloud and Managed Services M&A Update July / August 2014 August 29, 2014 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite
Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
Lending Club Reports Third Quarter 2015 Results Q3 operating revenue up 104% year-over-year to $115.1 million
Lending Club Reports Third Quarter Results Q3 operating revenue up 104% year-over-year to $115.1 million SAN FRANCISCO October 29, Lending Club (NYSE:LC), the world s largest online marketplace connecting
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again? Ron Moritz, CISSP Managing Director, MTC OWASP: 1 October 2013 1 Again? Generations of Cybersecurity - 1993: Mosaic and the rise of the commercial
OurCrowd Startup Investing Guide: Cybersecurity
OurCrowd Startup Investing Guide: Cybersecurity About OurCrowd: OurCrowd is the leading online venture capital platform for accredited investors who wish to invest in Israeli and global startup companies.
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS NSS Labs Real-World Group Tests INDEPENDENT VALIDATION OF FORTINET SOLUTIONS Introduction Organizations can get overwhelmed by vendor claims and alleged silver
Global Web Application Firewall Market 2015-2019
Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from
Enterprise-Focused Telecom Technology Quarterly
FOCUS Telecom Technology and Services Group Enterprise-Focused Telecom Technology Quarterly Winter 2014 Report Vol. 4, No. 1 In this Issue Seasoned, Systematic, Successful SM Investment Banking and Advisory
Global Security Services Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3217235/ Global Security Services Market 2015-2019 Description: About Security Services Security services focus on the security
Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings!
Eric Collins Connected Holdings Market Makers: Accelerate Your IoT Business with Connected Holdings! Connected Holdings Heritage: 2006 2009 2011 2012 2013 2014 Founded with Design Services Business Model
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
CLOUD & Managed Security Services
CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words
The Purchase Price in M&A Deals
The Purchase Price in M&A Deals Question that came in the other day In an M&A deal, does the buyer pay the Equity Value or the Enterprise Value to acquire the seller? What does it mean in press releases
TCS Managed Security Services
IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...
Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.
Guest Speaker Michael Sutton Chief Information Security Officer Zscaler, Inc. Michael Sutton has dedicated his career to conducting leadingedge security research, building world-class security teams and
Global Endpoint Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
Power Matters. Acquisition of PMC. October 19, 2015
Power Matters Acquisition of PMC October 19, 2015 Disclaimer Cautionary Note Concerning Forward-Looking Statements Statements in this presentation regarding Microsemi s offer to acquire PMC-Sierra Inc.
Q4 2013 Infrastructure Software Market Snapshot
Q4 2013 Infrastructure Software Market Snapshot Joel Strauch Managing Director [email protected] www.signalhill.com B a l t i m o r e B a n g a l o r e B o s t o n M u m b a i N a s h v i l l e N
CASE STUDY. NEXON ASIA PACIFIC Nexon Securely Onboards 25 Cloud Customers in Only Eight Months
CASE STUDY NEXON ASIA PACIFIC PAGE 1 Nexon Asia Pacific is a Managed Security Service Provider (MSSP) that delivers infrastructure and software to provide secure connectivity and productivity applications,
Reference Technology Roadmap
Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading
Government + Enterprise + Innovation + Strategy
Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Splunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with
Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology
Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology An Executive Brief Frank Dickson Research Director Information & Network Security 1 Key Findings Advanced persistent
2015 M&A Outlook Survey Report
2015 M&A Outlook Survey Report The Boom is Back: M&A Reemerges as Leading Growth Strategy kpmg.com Foreword M&A in the U.S. has finally reached prerecession levels. Deal value in the first three quarters
Next-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
Investor Presentation
Investor Presentation November 2015 Forward Looking Statements This presentation contains statements regarding the pending sale of our information management business to The Carlyle Group, which may be
IT Services, Cloud and Managed Services M&A Update Q2 2015
Technology and Digital Media Investment Banking + M&A Advisory IT Services, Cloud and Managed Services M&A Update Q2 2015 July 9, 2015 Generation Equity Advisors, LLC 8560 W. Sunset Blvd, Suite 500 West
With Cloud Defender, Alert Logic combines products to deliver outcome-based security
With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,
Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)
Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
Global Web Application Firewall (WAF) Market 2014-2018
Brochure More information from http://www.researchandmarkets.com/reports/2964279/ Global Web Application Firewall (WAF) Market 2014-2018 Description: About Web Application Firewall A web application firewall
Big Data Analytics capitalizing on the noise
Big Data Analytics capitalizing on the noise March 2014 rbrookman@ Big Data Remains Undefined Source: MergerTech, Tagxedo rbrookman@ 2 During 2003, approximately five exabytes of data were created. Today,
Internal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
Raising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements
Raising Capital for Life Sciences Companies US IPOs, Mezzanine Rounds, Strategic Partnerships and License Agreements November 2015 Presented by: Stephen Thau 2 BIOTECH IPOS ARE HOT! The Biggest Biotech
NNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
PCPIQ1 Private Company Price Index. Spotlight on Software & IT Services
2014 PCPIQ1 Private Company Price Index Spotlight on Software & IT Services 2 PCPI/PEPI IS IT ALL BAD NEWS? 2013 ended on a high: deals in Q4 2013 were up by 5.4% yearon-year, and the Private Company Price
Click to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
Valuation for Mergers and Acquisitions. Prepared By Ooi Kok Hwa MRR Consulting
Valuation for Mergers and Acquisitions Prepared By Ooi Kok Hwa MRR Consulting Agenda This seminar will explain: Various valuation approaches for M&A exercises; Determine the value of target companies as
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Network Security: Overview of out-licensing opportunities
Contents Executive Summary... 1 Introduction... 2 Prominent Assignees... 7 Taxonomy... 9 Assignee Similarity... 10 McAfee s Licensing Opportunities Chart... 11 LexScore... 13 Geographical Coverage... 14
ORGANIZADOR: APOIANTE PRINCIPAL:
ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 [email protected] Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment
Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.
Overview Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated
