The State of M&A in the Cybersecurity Market. October 28, 2015

Similar documents
A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

IT Security. The Acquisition Boom

The Cyber Threat Landscape

E-discovery Market Map. Shea & Company

Cybersecurity report As technology evolves, new risks drive innovation in cybersecurity

Global Cyber Security Market Forecast and Opportunities, 2020

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Cyber Security Market by Solution - Global Forecast to 2020

Weekly Valuation Update & Metrics Review Big Data & Cyber Security Firms Ended: Friday, November 14, 2014

Phone: Fax:

Q Security & Risk Market Snapshot

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Palo Alto Networks. September 2014

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Separating Security and Information Management into Two Industry-Leading Technology Companies

Splunk Company Overview

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Why Are Investors Excited About Cyber Security Startups, Again?

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Combating a new generation of cybercriminal with in-depth security monitoring

MarketsandMarkets. Publisher Sample

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Investor Presentation

Accenture Cyber Security Transformation. October 2015

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends ( )

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

2012 North American Managed Security Service Providers Growth Leadership Award

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

Market Guide for Network Sandboxing

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

The Evolution of Application Monitoring

Breaking the Cyber Attack Lifecycle

Cisco & Big Data Security

Managing Web Security in an Increasingly Challenging Threat Landscape

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Business Intelligence and Analytics Platforms Market Map. Shea & Company

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Certification Programs

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Splunk: Using Big Data for Cybersecurity

State of Security Monitoring of Public Cloud

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Private Equity investment in Recruitment companies - what are we looking for? Chris Harper Managing Director Baird Capital

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Brochure More information from

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Security Services. 30 years of experience in IT business

Global Encryption Software Market

M&A Trends and Implications for IT Security Companies Paul DiNardo Vice Chairman & Head of Technology Investment Banking

QRadar SIEM and FireEye MPS Integration

Global Web Application Firewall Market

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Q Healthcare IT Market Snapshot

Cloud Based Security Services - Global Strategic Business Report

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Whitepaper BEST PRACTICES FOR INTEGRATION AND AUTOMATION OF INCIDENT RESPONSE USING ENCASE ENDPOINT SECURITY

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Global Security Software Market

WHITE PAPER: THREAT INTELLIGENCE RANKING

A BVR Special Report. Excerpt from. Key Trends in the Valuation of Government Contracting Firms BVR. What It s Worth

Global Network Security Appliance Market

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

How To Understand The Third Platform Ct Market Transformation In Latin America

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Company Overview. Financial Performance

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Quarterly Technology M&A Review

A Guide to the Insider Buying Investment Strategy

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses

Outlook for Cloud technology in Big Data and Mobility

Transcription:

The State of M&A in the Cybersecurity Market October 28, 2015

AGC is at the Forefront of Emerging Technology Advisory Full-service, partner owned boutique investment bank with offices in Boston, Foster City, New York, Minneapolis, and London 50+ person team among largest in the industry dedicated to emerging growth Sector expertise in Technology (Energy, Communications, Infrastructure / Cloud, Fintech, HCIT, Information Security / Defense, Semiconductors and Software); Digital Media / Internet / Mobile; Business & IT Services Provide M&A, private capital raising and capital market advisory services Strong momentum: closed 28 deals in 2014; 45+ active engagements in 2015 Founded in 2003, 259 transactions closed to date; 76 in Security Ranked the #1 most active M&A advisor in Information Security and Enterprise Networking in 2012, 2013, & 2014 by 451 Research 1

AGC Ranked Top Tech Boutique: 259 Deals Done Since Inception Maria Lewis Kussmaul: Trusted Industry Advisor to Security Industry Maria Lewis Kussmaul Co-Founding Partner Investment Banking Recognized in the Information Security community as the leading domain expert and best networked investment banker Maria has built upon her 30+ years of industry experience and 90+ deals to make AGC Partners the leading name in Information Security Hosts annual premiere investor and strategic partner event in Pre-RSA Security Conference and recently launched Disrupt!on at Black Hat 2013 Recognized by the 451 Research as Top Dealmaker in Security and Enterprise Networking for 2012, 2013, and 2014 Panelist/presenter at RSA Conference; Security Innovation Network (SINET) Advisory Board Member Has facilitated multiple Blue Sky strategic planning sessions with leading teams in the Security industrysuchasbmc,intelsecurity,cisco,hp,trendmicro,emc,ibm,ca,symantec,oracle, Verisign, and Juniper Networks AGC s Strong Track Record with the Largest Acquirers 2 Confidential Materials. Do Not Distribute.

AGC s Recent Security Transactions: 28 Since 2010 2015 has been sold to has been sold to has been sold to has been sold to has sold its LYNXeon assets to has completed a Series C Equity Financing with UNDISCLOSED October 2015 August 2015 July 2015 May 2015 March 2015 February 2015 2014 2013 2012 2011 Denotes transactions with valuations greater than $100M 3

AGC s Market Leading Security Practice: 48 Deals Through 2010 Transactions prior to 2011 4

Sought After Sectors: Strategic M&A User Behavior Monitoring & Analytics Next Generation Endpoint Threat Intelligence Advanced Persistent Threats Anti Fraud / Identity Management Encryption Application Security BYOD & Mobile SCADA / IoT 5

2015 Top M&A Deals ($ in Millions) Date Target Acquirer EV LTM Rev EV/LTM Rev Oct. 2015 $63,100 $24,691 2.6x Apr. 2015 4,613 1,048 4.4x Mar. 2015 2,400 650 3.7x Apr. 2015 1,300 385 3.4x Apr. 2015 850 216 3.9x Jun. 2015 635 ND ND Sep. 2015 425 211 2.0x Sep. 2015 270* ND ND Apr. 2015 240 75 3.2x Apr. 2015 200* 60* 3.3x * 451 estimate 6

LTM Funding by Sector ($ in Millions) Business Model # Transactions Funding Endpoint 15 $822 Network Security 31 $709 IAM 25 $697 Data Security 14 $445 Cloud Security 30 $399 Active Investors in past 12 months: Illumio, CoreOS, Sumo Logic, Netskope, Vectra Networks, SentinelOne, Aorato, ForgeRock, Lookout, Sookasa, Simility Prevoty, Zerto, Risk I/O, ThreatMetrix Awake Networks, Okta, Skyhigh Networks, Sumo Logic, Synack, Guardicore, Zerto CoreOS, Shape Security, Ionic Security, Bit9, Synack, Area1 Security, Endgame Application Security Threat Intelligence 22 $292 14 $211 Cohesity, Bit9, Sumo Logic, Skyhigh, Adallom, SafeBreach, CoreOS, Okta, Keen.io, Forter Scalyr, Cohesity, Agari, Guardicore, Lightcyber, RiskIQ, Veradocs, Zerto, KeyMe, BlockScore Stealth 6 $95 BYOD Security 4 $56 Total 161 $3,726 LTM period as of 3Q 15 Source: Tracxn, CapitalIQ and 451 Research Ionic Security, Shape Security, Synack, Threat Stream, Duo Security, MapR, Team8 Illumio, Okta, Tanium, Cipher Cloud, Bluebox, SignalFX, Lookout, Sookasa Cylance, DB Networks, Okta, Vectra Networks, BlockScore 7

Cybersecurity Enthusiasm Driver: Leadership is up for Grabs As the changing of the guards takes place, the winners and the losers are quickly being separated Old Guard Undecided New Guard Agents of Transformation Others? Old guard companies are scrambling to stay relevant in the rapidly changing market Public markets continue to amply reward newly public security companies, as evidenced by Rapid7 and Cyber-Ark, which are trading up 17% and 188% after their recent IPOs, respectively New guard companies are driving forward at an accelerated pace, with the fortitude and capital to back them New Guard companies continue to strategically employee M&A as an agent of transformation *Aftermarket performance as of 10/23/15 8

Investors Eager to Exploit Leadership Shift Today s Information Security market is at a crossroads: Traditional security solutions are focused on barrier-based perimeter defenses But the threat is already inside the Network/Enterprise Leaders are combining pre and post compromise detection, analytics, forensics and response Next generation security players have evolved to keep up with increasingly sophisticated attacks by utilizing: Endpoint and network visibility / detection solutions Adversary intelligence studying the attackers Big Data collection and analytics that can be tracked, combined and acted upon 9

and Strong Sector Growth With security budgets increasing across the board, Information Security is exhibiting strong fundamental growth that is likely to remain robust According to Gartner, enterprise security budgets are shifting towards an increased focus on detection and response, and 60% of security budgets will be allocated to these two areas by 2020 PwC Global State of Information Security Survey indicates 10,000+ respondents reported their information security budgets increased by 24% in 2015 as a response to the 38% YoY increase in security incidents IDC cites four hot areas for growth over next 5 years: Security Analytics / SIEM (10% CAGR); Threat Intelligence (10%+); Mobile Security (30%); and Cloud Security (50%) Additionally, IoT Security a relatively new market is expected to reach approximately $29 billion by 2020 Source: Gartner, IDC, MarketsandMarkets 10

Cyber Success Stories 640% Enterprise Value Growth 3.3x Financing - $22M First Sale Second Sale $200 Rev. Multiple 4.5x $90 EV: $27M EV: $90M * EV: $200M * Multiple: 7.9x Multiple: 4.5x Multiple: 3.3x Rev Growth: 521% Rev Growth: 13% 7.9x $27 4.3 Years 2.7 Years Ent. Value ($M) April 2008 August 2012 April 2015 *451 Research estimates 9.7x Financing - $69M Sale $989 Rev. Multiple 4.8x EV: $145M Multiple: 4.8x Rev Growth: 74% 2.7 Years EV: $989M Multiple: 9.7x Rev Growth: 45% Ent. Value ($M) $145 April 2011 January 2014 8.5x Financing - $30M Sale $415 Rev. Multiple 7.5x EV: $315M Multiple: 7.5x Rev Growth: 66% 6 months EV: $415M Multiple: 8.5x Rev Growth: 66% Ent. Value ($M) $315 July 2013 December 2013 Source: 451 Research 11

Security Strategics Enhance Product Offerings OpenDNS provides Cisco a significant and valuable source of threat intelligence, which it can leverage to improve a wide range of security and network products that it already sells, most notably, its current strategy of building out its security IoT segment Acquiring CirroSecure solidifies Palo Alto s position in cloud application control technology and gives Palo Alto the ability to secure high risk, unsanctioned applications with superior visibility and control Acquiring Voltage Security allows HP to utilize a powerful data-centric suite of protection solutions to further extend the capabilities of the HP Atalla portfolio, to bolster security, encryption, tokenization, and enterprise key management Combined with Metafor, Caspida allows Splunk to add analytics into its emerging SIEM product to automate detection, and provide better alerts on attacks and insider threats in a digestible format for SOC analysts and incident responders Adallom fills a gap between cloud-based IAM and third party SaaS products, allowing Microsoft customers to add much broader control over user authorization, monitoring and control of its cloud and office programs Xceedium complements CA s privileged management portfolio allowing CA to leverage a highly scalable offering for managing privileged access to virtualized and cloudbased resources Proofpoint s advanced threat detection and response products for email and social media security and compliance will be further enhanced by pairing them with Emerging Threats deep research and intelligence capabilities BlackBerry will have significant additional capabilities to support ios and Android, which is the future for the enterprise mobility management (EMM) provider as it increasingly steps away from its own device business 12

Big 4 M&A Activity June 2010 May 2013 April 2014 December 2014 September 2015 (assets) October 2014 November 2014 January 2015 March 2015 September 2015 (assets) $11.4M Private Placement January 2010 August 2011 April 2013 March 2014 (Professional Services Consulting Group) (assets) January 2011 June 2015 July 2015 (Professional Services Security Practice) 13

Private Equity Platform Plays Resolution1 combined with Fidelis provides one of the most comprehensive offerings in the TDR and incident-response automation spaces for a comprehensive advanced threat defense solution Perspecsys' encryption gateway proxy should be a straightforward plug-in to Blue Coat's own proxybased security appliances, while enabling Blue Coat to expand its addressable cloud security use cases to clients facing dataresidency requirements With an integrated suite of solutions that both shrink the cyber-attack surface and contain breaches when they do occur, BeyondTrust is well positioned to address anticipated market demands Immediate Insight brings additional advanced security analytics to FireMon, giving it more actionable security beyond firewall monitoring Whitebox allows SailPoint to provide customers with a single view of users and their associated privileges for accessing applications, systems and, now, unstructured data Bay31 enables Courion to extend its technology leadership in identity analytics and enhance the company's product offerings in role mining and role-based access control, particularly for large and complex applications 14

Defense Contractor Activity $193M 5.9x $80M 8.0x ND DIVESTED JAN-15 Not Disclosed $140M 5.0x DIVESTED MAR-15 $85M 3.4x DIVESTED JAN-15 $24M Assets DIVESTED JUL-15 ND DIVESTED APR-15 Record of defense players purchasing cyber product companies has been mixed; divestitures becoming frequent $24M 2.0x ND $233M 3.0x $1.3B 3.4x 2007 2008 2009 2010 2011 2012 2013 2014 2015 15

Signs of Froth? Dotcom-Era Nasdaq Trading Multiples (TTM Rev.) Recent Security IPOs Trading Multiples (TTM Rev.) Jan 98 Mar 00 Sep 01 Jan 12 Feb 14 Sep 15 Source: CapitalIQ RSA Conference Exhibitor Numbers Cyber Security Unicorns 16

Growth Alone is No Longer a Golden Ticket So far in 2015, cybersecurity firms have received more than $3.3 billion in funding in 130+ deals, putting the year on track to beat last year s record pace However, recent public market volatility has led to increased scrutiny by investors and a backto-basics mentality in venture to late stage funding Growth rate is no longer a golden ticket to attract capital as investors are now looking at growth coupled with profitability and cash flow generation Strategics have also become more cautious with respect to paying the frothy valuations seen in recent years, portending a possible slow down in deal activity * YTD as of September 23, 2015 17

Valuations Driven by Public Sentiment YTD Cybersecurity Share Pricing 31.1% 18.6% (HACK) 5.2% 4.3% 12.26% 47.8% Jan 15 Feb 15 Mar 15 Apr 15 May 15 Jun 15 Jul 15 Aug 15 Sep 15 Oct 15 ($ in millions) Market Data Operating Data (c) Enterprise EV / EBITDA Revenue EBITDA Revenue Growth LQ Gross LQ Adj. Company Value (a) (b) TTM 2015E TTM 2015E TTM 2015E TTM 2015E 14A/'13A 15E/'14A Margin Op. Margin (d) Palo Alto Networks $13,232 14.3x 11.9x NM 64.5x $928 $1,113 ($105) $205 53% 51% 74% (12%) Splunk 6,371 11.9x 10.1x NM NM 537 632 (225) 38 49% 40% 83% (43%) FireEye 3,840 7.2x 6.0x NM NM 530 640 (397) (170) 163% 50% 63% (86%) (HACK) * 1,666 2.5x 2.6x 12.1x 11.6x 403 533 32 65 7% 9% 76% 7% CyberArk 1,176 8.8x 7.9x 36.7x 37.2x 134 148 32 32 56% 44% 83% 18% Barracuda 761 2.5x 2.5x NM 10.4x 299 309 5 73 18% 16% 80% (0%) *HACK metrics based on median values of holdings Source: CapitalIQ Through October 23, 2015 TTM as of 2Q 15 18

Public Sentiment on Growth C D A: 2014 earnings released: Surpassed analyst estimates by 125% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Acquires behavior analytics and machine learning provider Caspida D: Chinese economy declines A B EV: $6.4B 2013 2014 2015E Revenue $303 $451M $632M Growth % 52% 49% 40% EBITDA ($70M) ($203M) $39M Margin % (23%) (45%) 6% Jan 15 Oct 15 B C D A: 2014 earnings released: Surpassed analyst estimates by 22% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Announces $600M convertible notes offering D: Chinese economy declines A EV: $3.8B 2013 2014 2015E Revenue $162M $426M $640M Growth % 94% 163% 50% EBITDA ($143M) ($380M) ($168M) Margin % (88%) (89%) (26%) Jan 15 Oct 15 Source: CapitalIQ Through October 23, 2015 19

Public Sentiment on Growth + Profitability C D A: 2014 earnings released: Surpassed analyst estimates by 12% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Acquires enterprise SaaS application security startup CirroSecure D: Chinese economy declines B A EV: $13.2B 2013 2014 2015E Revenue $483M $739M $1,110M Growth % 49% 53% 50% EBITDA ($0.4M) ($73M) $204M Margin % (0%) (10%) 18% Jan 15 Oct 15 B C D A: 2014 earnings released: Surpassed analyst estimates by 320% B: Announces secondary Nasdaq offering C: Congress unanimously passes Cybersecurity Information Sharing Act D: Chinese economy declines A EV: $1.2B 2013 2014 2015E Revenue $66M $103M $148M Growth % 40% 56% 44% EBITDA $10M $21M $32M Margin % 15% 20% 22% Jan 15 Oct 15 Source: CapitalIQ Through October 23, 2015 20

Public Sentiment on Negative Developments B C A D E Jan 15 Oct 15 A: 2014 earnings released: Surpassed analyst estimates by 17% B: Congress unanimously passes Cybersecurity Information Sharing Act C: Announced FY Q1 billing growth at 8%, well below 16-18% guidance D: Chinese economy declines E: Announced FY Q2 billing growth at 10%, down from 15% in Q2 last year EV: $761M 2013 2014 2015E Revenue $234M $277M $321M Growth % 18% 19% 17% EBITDA ($0.2M) $8M $72M Margin % (0%) 3% 23% *CUDA FY ends in February Source: CapitalIQ Through October 23, 2015 21

HACK Fund HACK Fund ($ in millions) Market Data Operating Data (c) Enterprise EV / Revenue EV / EBITDA Revenue EBITDA Revenue Growth LQ Gross LQ Adj. Company Value (a) (b) TTM 2015E TTM 2015E TTM 2015E TTM 2015E 14A/'13A 15E/'14A Margin Op. Margin (d) Cisco $114,255 2.3x 2.3x 8.5x 8.4x $49,161 $50,163 $13,391 $13,550 0% 4% 60% 23% Palo Alto Networks 13,232 14.3x 11.9x NM 64.5x 928 1,113 (105) 205 53% 51% 74% (12%) Check Point 13,319 8.5x 8.2x 16.0x 14.5x 1,559 1,627 834 921 7% 9% 89% 50% Symantec 12,224 1.9x 2.0x 6.8x 6.1x 6,272 6,152 1,809 2,019 (3%) (7%) 84% 22% Juniper 12,071 2.6x 2.5x 12.1x 9.3x 4,640 4,834 1,000 1,303 (1%) 4% 64% 21% VeriSign 8,911 8.5x 8.4x 13.7x 12.5x 1,043 1,055 652 710 5% 4% 82% 58% F5 7,687 4.1x 3.9x 12.9x 9.8x 1,884 1,969 596 783 17% 10% 82% 29% Gemalto 6,675 2.1x 1.9x 13.0x 10.8x 3,154 3,479 515 616 (9%) 17% 38% 8% Splunk 6,371 11.9x 10.1x NM NM 537 632 (225) 38 49% 40% 83% (43%) Booz Allen Hamilton 5,570 1.1x 1.1x 11.0x 11.0x 5,304 5,275 507 508 (5%) (1%) 24% 9% Fortinet 5,067 5.4x 5.0x 90.4x 30.8x 937 1,009 56 165 25% 31% 72% 2% Trend Micro 4,129 4.2x 4.0x 12.2x 11.8x 986 1,022 338 351 (7%) 6% 83% 25% Leidos 4,109 0.8x 0.8x 9.8x 10.2x 5,063 4,960 418 403 (12%) (2%) 11% 7% FireEye 3,840 7.2x 6.0x NM NM 530 640 (397) (170) 163% 50% 63% (86%) SAIC 2,978 0.7x 0.7x 10.6x 9.7x 4,064 4,342 281 306 (6%) 12% 10% 6% Sophos (e) 2,587 5.8x ND 40.0x ND 447 ND 65 ND 18% NM NM NM Proofpoint 2,466 10.0x 9.3x NM NM 247 264 (51) 4 42% 35% 70% (32%) Imperva 1,632 8.5x 7.5x NM NM 192 217 (56) (7) 19% 32% 78% (32%) AVG 1,416 3.5x 3.3x 11.6x 8.9x 403 433 122 159 (8%) 16% 85% 15% CyberArk 1,176 8.8x 7.9x 36.7x 37.2x 134 148 32 32 56% 44% 83% 18% ManTech 1,088 0.7x 0.7x 8.9x 9.2x 1,613 1,584 122 118 (23%) (11%) 15% 5% Qualys 1,034 7.0x 6.2x 33.7x 21.7x 148 166 31 48 24% 24% 80% 13% Rapid7 996 10.9x 9.6x NM NM 92 104 (24) (31) 28% 35% 74% (32%) Barracuda Networks 761 2.5x 2.5x NM 10.4x 299 309 5 73 18% 16% 80% (0%) Infoblox 635 2.1x 1.8x NM 16.4x 306 344 (17) 39 9% 29% 79% (5%) Radware 587 2.5x 2.7x 12.4x 14.3x 231 215 47 41 15% (3%) 83% 14% VASCO 558 2.3x 2.3x 9.8x 9.7x 246 238 57 58 30% 18% 59% 24% Intralinks 525 2.0x 1.9x 43.2x 13.7x 268 274 12 38 9% 7% 72% (11%) KEYW 395 1.3x 1.3x NM 43.4x 303 312 1 9 (3%) 7% 33% (5%) F-Secure 373 2.1x 2.3x 13.5x 12.3x 174 162 28 30 (13%) (13%) 97% 16% AhnLab 265 2.3x ND 19.9x ND 115 ND 13 ND (5%) NM 77% 6% Zix 265 5.0x 4.8x 25.2x 16.9x 53 55 10 16 5% 9% 83% 25% Absolute Software 210 2.2x 2.3x 12.0x 14.7x 94 93 17 14 8% (1%) 81% 1% Guidance Software 165 1.5x 1.5x NM NM 109 110 (6) 1 (2%) 1% 66% (13%) Comp S.A. 109 0.7x ND 7.6x ND 160 ND 14 ND (5%) NM 25% 6% MEDIAN $1,632 2.5x 2.6x 12.4x 12.0x $403 $533 $32 $65 7% 9% 76% 7% Notes (a) Based on closing stock prices on October 23 2015 (b) Calculated as Equity Value plus total debt, minority interest (at book value unless otherwise noted) and preferred stock, less cash & equivalents (c) Projections represent Wall Street & Yahoo Finance estimates (d) Adjusted operating margin excludes extraordinary and non-recurring items (e) Sophos fiscal year ends March 31st Source: CapitalIQ Through October 23, 2015 TTM as of 2Q 15 22

Concluding Thoughts Cyber threats are endemic Industry leadership is in flux Demand for effective countermeasures is strong and rising Capital availability is at unprecedented levels and valuations are high Cyber talent is scarce Cyber investments and M&A will undoubtedly continue but at a more discriminating pace and with more disparate outcomes 23