Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity



Similar documents
Big Data Next: Capturing the Promise of Big Data. Big Data Report 2015

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since Cyber Security Market Trends 2015

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The Quantified Self. Market Overview and Proprietary Financial Intelligence

The Face of the New Enterprise. Market Overview and Proprietary Financial Intelligence

Cybersecurity. Franck Greverie. Analyst Day Paris, 28 May 2015

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

U.S. public policy Innovation leaders ask government to support, not hinder, progress

Beyond passwords: Protect the mobile enterprise with smarter security solutions

The Future of Enterprise Mobility: Part II. Strategic Options for Mobile Security Firms

Cyber Security: Confronting the Threat

How To Manage A Network Infrastructure

Assessing the strength of your security operating model

Mobile Security: Are You at Risk (Yet)?

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Phone: Fax:

Internet threats: steps to security for your small business

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

NNIT Cybersecurity. A new threat landscape requires a new approach

How To Understand The Ntnt Group

2012 Endpoint Security Best Practices Survey

Enterprise Mobility Management 101

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

Brochure More information from

Cloud Apps and the Modern Professional: The New Business Landscape

Global Cyber Security Market Forecast and Opportunities, 2020

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Digital Briefing Center Presentation Sources

How To Get A Cloud Service For A Small Business

Feeling safe? Try attending Internet security conference 22 April 2015, by By Brandon Bailey

VMware and the Need for Cyber Supply Chain Security Assurance

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

CGI Cyber Risk Advisory and Management Services for Insurers

Australian Government Cyber Security Review

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE.

MarketsandMarkets. Publisher Sample

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

IT Security Q Investment Banking. Market Challenges Slow Near-Term Activity in IT Security. Highlights from RSA Conference.

The EMEA Encryption and Authentication Markets

SITUATION SOLUTION BENEFITS SUPPORT PRODUCTS

Modernizing Mission Critical Business Apps

Enterprise Mobility: A Market Perspective!!

Security Intelligence

Enhancing Cybersecurity with Big Data: Challenges & Opportunities

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

Security and Privacy Trends 2014

How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency

Cloud & Big Data Transforming Businesses

WHITE PAPER: INFORMATION-CENTRIC SECURITY

My CEO wants an ipad now what? Mobile Security for the Enterprise

Are You A Sitting Duck?

Collateral Effects of Cyberwar

Our Business Continuity Solutions Ensure Long-Term Success

A Look into the Cloud

How To Protect Your Endpoints From Attack

Five Tactics to Hybrid Cloud Success

Start New Conversations, Open New Doors

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

The Adoption of IaaS A Market Analysis

How To Be Prepared For A Cybercrime

The Evolution of the Enterprise And Enterprise Security

Web Protection for Your Business, Customers and Data

Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options

A new era for the Life Sciences industry

The transformation of client device and the rise of cloud computing

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

Cybersecurity. Are you prepared?

Internet of Things The Turning Wheels of IoT Investments. Dr. Riad Hartani, Frank Rayal, Dr. Dean Sirovica

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Cyber Security Market by Solution - Global Forecast to 2020

White. Paper. Rethinking Endpoint Security. February 2015

IBM Software Cloud service delivery and management

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Postal Services & E-Commerce: Adjusting to Market Dynamics

OurCrowd Startup Investing Guide: Cybersecurity

Securing Today s Healthcare Enterprise Systems Time to Rethink Your Cybersecurity Strategy

Readiness Assessments: Vital to Secure Mobility

RETHINKING CYBER SECURITY

White Paper. Enhancing Website Security with Algorithm Agility

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Preparing your network for the mobile onslaught

Understanding the impact of the connected revolution. Vodafone Power to you

CIO SUMMIT l LAS VEGAS

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP

Managing the Unpredictable Human Element of Cybersecurity

Gartner Executive Programs. Hunting and Harvesting in a Digital World. Insights From the 2013 Gartner CIO Agenda Report

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Breaking the Cyber Attack Lifecycle

A Strategic Approach to Meeting the Demand for Cloud

Brochure More information from

Can Your Organization Brave The New World of Advanced Cyber Attacks?

WHITE PAPER. Top 5 Ways Managed Hosting Can Transform Your IT Operations

Transcription:

Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity

2

As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities in the cybersecurity space. Spending, venture capital investment, and mergers and acquisitions are on the rise, and we expect this trend to continue. Cyber security report 2015 SVB Analytics 3

High-profile cyberattacks dominated the headlines in 2014, with the Sony Pictures hack putting an exclamation point on a breach-heavy year. The sobering reality: Many CEOs believe the worst is yet to come. That s because the very technologies that are making our lives easier and more productive are also introducing new and unique security threats emphasizing the need for security providers to unleash their own wave of innovation. In conversations with clients in the innovation and security space, SVB Analytics is seeing a dramatic evolution in this important tech sector, with both startups and established security providers playing critical roles.

Cybersecurity report 2015 SVB Analytics 5

Cyberattacks are on the rise as the value of online data increases. The amount of data we generate as a society is staggering. And it s accelerating fast, as new mobile and online technologies change the way people live, work and play. But it comes with a cost. As we grow more comfortable storing our financial, health and other confidential data online, the value of that information and the incentives to steal it increases. This is exposing companies throughout the digital economy to increasingly sophisticated, and costly, cyberattacks. As data use continues to skyrocket, security breaches are growing at a similar pace. 32% 60,000+ $3.5 million Anticipated growth Average cost of in cloud data center a data breach in traffic per year 2014, up 15% through 2018 1 from 2013 3 Cyber incidents reported by federal agencies in 2013 up from 10,000 in 2006 2 Breaches are common in all major data-driven industries, with threats coming from multiple sources. Highly vulnerable industries 4 Retail Technology Healthcare Financial services Of existing data requiring protection: 5 52+48 This includes: 52% is vulnerable Corporate financial data Personally identifiable information (PII) Medical records User account information Data breaches since 2013 4 13% caused by malicious insiders 25% 57+25+13+5+F caused by accidental loss 57% caused by malicious outsiders 6

The popularity of smartphones, tablets and other non-pc devices continues to grow unabated. 1 billion+ 23% Employee-owned Anticipated annual smartphones and tablets growth in Internet traffic in the workplace through 2018, with by 2018 majority coming from 6 non-pc devices 1 Machine-to-machine traffic (M2M) is expected to increase rapidly as the Internet of Things (IoT) continues to evolve, with connected devices becoming more common for both consumers and businesses. 84% Anticipated annual increase in M2M traffic 1 Cybersecurity report 2015 SVB Analytics 7

The enterprise IT landscape continues to evolve, presenting new security challenges. With each new innovation comes new security vulnerabilities. Smartphones and tablets, cloud computing and connected devices make us more productive and efficient, but sit outside the protection of a corporate firewall. Protecting these data escape points, or endpoints, requires nimble security solutions that most legacy approaches can t handle. Before Priority: Secure enterprise network behind firewall Enterprise network/ data storage Internet Now Priority: Secure all data escape routes Mobile devices SaaS (applications) IaaS (data warehouse) Enterprise network IoT (connected devices) PaaS (cloud computing) Cloud computing is moving companies mission-critical information onto shared data servers, making security a mutual responsibility between organizations and cloud providers. 8

Agile startups are leading the charge against emerging security threats, but they aren t going it alone. Fast-adapting startups may be the answer. Startups are agile enough to quickly focus research and development (R&D) on specific problems within the broader security landscape. Incumbent security providers aren t as flexible, but typically have the distribution muscle to get products to market fast. This is creating a new dynamic in the security space, one in which startups develop new security technologies, which are then acquired by incumbents looking to strengthen their existing product suites. A new security dynamic is emerging Case study: BYOD/Mobile device management Startups Develop targeted solutions for security problems Incumbents Incumbents acquire startups and incorporate products Enterprise customers Latest security makes it to enterprises faster MaaS360, Worklight, AirWatch, Zenprise, Odyssey Software, Nukona, Trust Digital IBM, VMware, Citrix, Symantec, McAfee Target, Chase Bank, Home Depot, etc. Startups that develop an effective security solution still have to successfully market and distribute the product to end users. Incumbents offer a convenient alternative, acquiring many of these startups and merging the solutions into their existing sales channels. This dynamic can be seen in the mobile device management space. Overall investments are up in the cybersecurity space. $2 billion Annual deal volume in 2014 a 300% increase since 2009 7 Incumbents are increasingly leaving R&D to startups. At early stages, startups focus spending on R&D, but as revenue ramps, spending shifts dramatically toward sales and marketing. 8 (S&M vs. R&D Budget) 3:1 2:1 1:1 0:1 <$1-5M <$5-20M <$20-100M (Revenue) 2.4 to 1 Median ratio of sales and marketing to R&D investments at public security companies with less than $1 billion in annual revenue 8 Cybersecurity report 2015 SVB Analytics 9

10

The evolution of technology is spurring a super cycle of investment in the security space. The pace of innovation is accelerating, and every advance in technology comes with new and unique security challenges. More and more, businesses are being forced to confront the fact that legacy security infrastructure is not sufficient to meet today s needs. These realities are driving demand for the next generation of security solutions designed to protect the digital foundation upon which our interconnected society is built. Consumers and businesses are producing and storing a staggering amount of increasingly valuable data every day. This, coupled with the rapid rise and dynamic nature of new technology, fuel an ecosystem that will continue to drive increased spending, venture capital investment, and merger and acquisition activity for the foreseeable future. Cybersecurity report 2015 SVB Analytics 11

About SVB Analytics For more than 30 years, Silicon Valley Bank (SVB) has helped innovative companies and their investors move bold ideas forward, fast. SVB provides targeted financial services and expertise through its offices in innovation centers around the world. With commercial, international and private banking services, SVB helps address the unique needs of innovators. Forbes named SVB one of America s best banks (2015) and one of America s best-managed companies (2014). Learn how SVB Analytics provides strategic advisory, research and valuation services for investors and companies in the global innovation economy. Contact our team of industry experts today. 800.760.9644 svba@svb.com 1 Cisco Global Cloud Index, 2014. 2 U.S. Government Accountability Office (GAO) analysis of US-CERT data for fiscal years 2006-2013. 3 Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis, 2014. 4 Breach Level Index. 5 EMC Digital Universe, 2014. 6 Juniper Research, Mobile Security: BYOD, mcommerce, Consumer & Enterprise 2013-2018, 2013. 7 CB Insights. 8 Silicon Valley Bank internal research. SVB Analytics is a member of SVB Financial Group and a non-bank affiliate of Silicon Valley Bank. Products and services offered by SVB Analytics are not FDIC insured and are not deposits or other obligations of Silicon Valley Bank. SVB Analytics does not provide tax or legal advice. Please consult your tax or legal advisors for such guidance. 2015 SVB Financial Group. All rights reserved. Silicon Valley Bank is a Member of FDIC and Federal Reserve System. SVB>, SVB>Find a way, SVB Financial Group, and Silicon Valley Bank are registered trademarks.