SlideShare a Scribd company logo
1 of 29
Download to read offline
Security industry overview
December 2016
Agenda
2
Security overview
Current technologies
Startup landscape
Industry regulation
Data breaches are here, and they’re not going away anytime soon
“We believe that data is the phenomenon of our time. It is the world’s
new natural resource. It is the new basis of competitive advantage, and it
is transforming every profession and industry. If all of this is true – even
inevitable – then cyber crime, by definition, is the greatest threat to every
profession, every industry, every company in the world.”
– IBM chairman, CEO and President Ginni Rometty
3
These trends get us most excited about security
4Source: Morgan Stanley
• Targeted attacks: sophisticated malware
attacks are avoiding traditional firewalls and
seeking vulnerable entities
• Nation-state involvement: nation-states are
increasingly funding attacks, driven by not
only economic incentives but also political
motives
• Dynamic malware: attackers can now sense
potential environment detection and
manipulate appearance
With the increase in the number of breaches in recent years, there is a growing perception amongst CISOs that the current security
paradigm isn’t effective enough.
Increasingly
malicious threat
environment
Expanding surface
area
Current security
ineffectiveness
• Cloud apps and infrastructure: we’re
witnessing a rise in vulnerability from the
increased adoption of cloud-based
applications
• Mobility: enterprises are looking to secure
mobile applications, as bring-your-own-
device (BYOD) becomes the new standard
• Internet of Things (IoT): rapid growth in the
number of connected devices is evident
• Incident count: number of security incidents
occurring annually is at an all-time high
• Incident cost: as it becomes more and more
costly to remediate hacks, enterprises will
continue to allocate a higher portion of their
IT budget on superior security products
0
10
20
30
40
50
60
2009 2010 2011 2012 2013 2014 2015
5
Cybersecurity is a growing problem, despite increased spend on technology & services
Source: Morgan Stanley, press
Total number of cybersecurity incidents,
worldwide
Recent high-profile hacks
September 2016
May 2016
March 2016
September 2016
August 2016
$3.0
$3.1
$3.2
$3.3
$3.4
$3.5
$3.6
$3.7
$3.8
$3.9
$4.0
2013 2014 2015
6
The cost of cyber breaches has increased significantly as well
Source: Morgan Stanley
Average cost of a data breach (US$m)
Typical attack life cycle
7
Step 1
Research:
Hackers want PII, PHI
and PEI.
Step 5
Monetization:
They sell the data to
people who want it.
Step 4
Capture:
They take the data & store
it away slowly.
Step 2
Infiltration:
They attack.
Step 3
Discovery:
They’re inside. They find what
they are looking for.
$0
$20
$40
$60
$80
$100
$120
$140
2015 2016E 2017E 2018E 2019E 2020E
8
The security market is poised for robust growth
Source: Morgan Stanley
$55B
market
in 2015
$128B
market
by 2020
Security market (US$B)
$10.3
$12.7
$13.1
$14.0
$19.0
$10.0
$11.0
$12.0
$13.0
$14.0
$15.0
$16.0
$17.0
$18.0
$19.0
$20.0
2013 2014 2015 2016E 2017E
9
U.S. federal spending in security is expected to grow 35% YoY in 2017…
Source: Morgan Stanley, FISMA Annual Report to Congress
Federal cybersecurity budget (US$B)
…while non-government security spend is also on the rise
10Source: Forbes
$500m $400m $300m $250m
$1.5B spent on cybersecurity annually between these four alone…
AND THAT NUMBER IS EXPECTED TO GROW
The U.S. financial services cybersecurity market reached $9.5B in 2015, becoming the largest non-government cybersecurity market.
Annual
budget:
Agenda
11
Security overview
Current technologies
Startup landscape
Industry regulation
Access control
12Source: IDC, Morgan Stanley, Gartner
1) Identity & access management (IAM):
• Captures user identities and controls access to resources by checking user rights
and restrictions
• Is an area of increasing focus for enterprises as a number of recent high profile
breaches have resulted from insiders gaining access to critical files
• $5.5B market in 2015
2) Virtual private network (VPN):
• Creates secure connections between users at home or in remote offices and the
corporate network
• Creates a virtual tunnel using encryption and authentication protocols
• $0.5B market in 2015
3) Data loss prevention (DLP):
• Makes sure that users do not send critical information outside a corporate network,
with a dedicated administrator controlling what data users can transfer
• $0.9B market in 2015
Selective restriction of access to a place or other resource. Technologies include:
Endpoint threat prevention
13Source: IDC, Morgan Stanley, Gartner
1) Consumer endpoint:
• Includes personal firewalls and anti-virus
protection
• Also now beginning to prevent malware,
secure mobile devices and safeguard against
identity theft & online transactions
• $4.8B market in 2015
2) Corporate endpoint:
• Protects corporate devices from the
installation of malicious software that seeks
to disrupt business processes and / or steal
confidential data
• Multiple layers of protection, aiming to
identify, prevent, block and contain known
and unknown threats on devices themselves
• $4.4B market in 2015
Aims to protect the perimeter of the company. Technologies include:
Network threat prevention
14Source: IDC, Morgan Stanley, Momentum Partners
1) Firewall / unified threat management (UTM):
• Firewall: assesses traffic over a network and subsequently allows or denies network
access based on previously determined specifications and policies
• UTM: integrates a number of security features into one device, namely a firewall, network
intrusion detection & prevention as well as the securing of web / email gateways
• $7.7B market in 2015
2) Intrusion detection & prevention (IDP):
• Monitors the network continuously, informing IT teams when detecting security
violations or information leakage
• $2.2B market in 2015
3) Email / messaging security:
• Scans emails for spam, malware, viruses and phishing attempts; encrypts outbounds
• $2.0B market in 2015
4) Web security:
• Employs anti-malware to protect employees from accessing malicious websites, while
using web application firewalls (WAFs) to protect against external users attempting to
gain access to internal systems
• $2.0B market in 2015
Seeks to prevent unauthorized access to the corporate network. Technologies include:
Monitoring / forensics
15Source: IDC, Morgan Stanley, Gartner
1) Security information & event management (SIEM):
• Aggregates, standardizes and stores all of the data from network &
security devices
• Allows greater visibility into user activity, enabling enterprises to more
quickly identify malicious behavior
• $1.9B market in 2015
2) Vulnerability assessment:
• Scans enterprise infrastructure to identify vulnerabilities and remediate
exposure to threats
• Employs penetration testing products, which simulate attacks to find
potential areas of weakness
• $1.7B market in 2015
3) Forensics & incident investigation:
• Captures how an intrusion affects a company’s files & systems
• Uncovers historical vulnerabilities, which may have caused breaches, to
remediate future attacks
• $0.5B market in 2015
Aims to detect potential breaches quickly, remediate the problem and prevent future occurrences. Technologies include:
Other
16Source: IDC, Morgan Stanley
1) Policy & compliance:
• Helps companies remain compliant with the increasingly complex set
of security regulations
• Involves writing reports, providing audit information and establishing
security policies
• $1.2B market in 2015
2) Security system & configuration management:
• Increases visibility over enterprise perimeter security products, such as
firewalls and web security
• Used to configure and monitor the health of security systems
• $0.1B market in 2015
3) Security services:
• Include IT consulting and systems integration
• Help enterprises design their security architecture, deploy software
and integrate security products
• $19.4B market in 2015
Essentially anything else that hasn’t already been covered but falls within the larger cybersecurity umbrella. Technologies include:
Network threat
prevention, 25%
Endpoint threat
prevention, 17%
Access control,
13%Monitoring /
forensics, 7%
Other, 38%
Security industry by use case
17Source: Gartner
$55B market in
2015
Network and
endpoint protection
lead the way, with
the $19B security
services market
captured in “other”
Global security market breakdown, 2015
Note: “Other” bucket is comprised of policy & compliance, security system & configuration management and security services.
Agenda
18
Security overview
Current technologies
Startup landscape
Industry regulation
Selection criteria & analysis of sub segments
19Source: PitchBook
Tier 1:
1) Vertical: cybersecurity
2) Stage: incubator / angel (limited to Bay Area deals including either Y Combinator or 500 Startups), seed, series A
3) Deal date: last two years
4) Headquarters: California, Texas, Washington, Oregon, Colorado
Tier 2:
1) Vertical: cybersecurity
2) Stage: seed, series A
3) Deal date: last two years
4) Headquarters: New York, Massachusetts, D.C. area
PitchBook screen employing the following criteria:
Note: Data as of October 28, 2016.
19
10
9 9
8
7
6
5 5
4 4 4 4
3
2 2 2
1 1 1 1 1 1 1
0
2
4
6
8
10
12
14
16
18
20
Tier 1 – led by infrastructure and cloud security
20Source: PitchBook
Note: Data as of October 28, 2016.
Security investments by type
110 companies total
10
3 3
2 2 2 2
1 1 1 1 1 1 1 1
0
2
4
6
8
10
12
Tier 2 – east coast led by infrastructure, email / messaging and mobile security
21Source: PitchBook
Note: Data as of October 28, 2016.
Security investments by type
32 companies total
Areas we will be exploring for future security investments
22Source: Forbes, IDC, Gartner, TechEmergence, Grand View Research
IAM Infonomics
Cloud
security
IoT
IAM: $25B market projected
by 2022
Infonomics: “are all these
products worth their cost?” –
every CISO ever
IoT: over 25% of identified
attacks in enterprises will
involve IoT by 2020
Cloud security: 15% of
enterprise spend today, rising
to 33% by 2018
AI & machine learning
Verticals:
Horizontal
technology:
AI & machine learning: 22%
cyber intelligence market share
(#1 end market)
Prominent players within our focus areas
23Source: Morgan Stanley, PitchBook, Gartner, press
IAM Infonomics
Cloud
security
IoT
AI & machine learning
(Blue Coat & Elastica)
(Palerra)
Where our portfolio companies fit in all of this
24
Cloud / CASB
Endpoint – AI &
machine learning
Network
206
190 197
159
194
149
340
356
440
462
405
0
50
100
150
200
250
300
350
400
450
500
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016E
Security VC investments will likely see a slight dip in 2016, but still well above median
25Source: Pitchbook
Note: Data as of October 18, 2016.
Total security venture investments globally
Projected
Median = 206
Top security investors – last three years
26
28
23
21
20 20
19
18
17
16
14 14 14 14 14
0
5
10
15
20
25
30
Source: Pitchbook
Note: Data as of October 18, 2016. Excludes accelerator & pre-seed rounds. Excludes individuals.
Top investors by # of security investments
Not considered top investor in last 12 months
13
9
7 7 7
6 6 6
5 5 5 5 5 5
0
2
4
6
8
10
12
14
Top security investors – last twelve months
27Source: Pitchbook
Note: Data as of October 18, 2016. Excludes accelerator & pre-seed rounds. Excludes individuals.
Top investors by # of security investments
Only recently considered top investor in last 12 months
Agenda
28
Security overview
Current technologies
Startup landscape
Industry regulation
Regulations within the security industry have seen increased attention in recent years
29
Among other things, mandated that
healthcare organizations, financial
institutions and federal agencies
protect their systems & information.
However, some argued the language
within was too vague
1996 1999 2002 2003 2012 2013 2013
Health
Insurance
Portability and
Accountability
Act (HIPAA)
Gramm-Leach-
Bliley Act
Federal
Information
Security
Management
Act (FISMA);
part of
Homeland
Security Act
President’s
National
Strategy to
Secure
Cyberspace
(Bush)
Made Dept. of
Homeland
Security
responsible for
national security
guidance &
solutions
Aimed to create
standards for
protecting vital
infrastructure
Cybersecurity
Act of 2012
(failed to pass
through
Senate)
Improving
Critical
Infrastructure
Cybersecurity
(White House-
issued)
Allows the
Executive Branch
to share
information
about threats
with companies
& individuals
Protects against
lawsuits aimed
at companies
that disclose
breach
information
Cyber
Intelligence
Sharing and
Protection Act
(CISPA)
2015
Cybersecurity
National
Emergency
Declared
(Obama)
Executive order
to include $14B
for cybersecurity
spending in
2016 budget

More Related Content

What's hot

Slide Deck for Connecting the Dots - Senior Thesis
Slide Deck for Connecting the Dots - Senior ThesisSlide Deck for Connecting the Dots - Senior Thesis
Slide Deck for Connecting the Dots - Senior ThesisChloe Spilotro
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Partners
 
Horizon Partners Q4 2013 Newsletter
Horizon Partners Q4 2013 NewsletterHorizon Partners Q4 2013 Newsletter
Horizon Partners Q4 2013 Newsletterhorizonpartners
 
Digital Powers Consumer Durables: A $23 billion Opportunity by 2023
Digital Powers Consumer Durables: A $23 billion Opportunity by 2023Digital Powers Consumer Durables: A $23 billion Opportunity by 2023
Digital Powers Consumer Durables: A $23 billion Opportunity by 2023Social Samosa
 
Fintech Product for Gen Y & Gen Z - Robo Advisor
Fintech Product for Gen Y & Gen Z - Robo Advisor Fintech Product for Gen Y & Gen Z - Robo Advisor
Fintech Product for Gen Y & Gen Z - Robo Advisor S. Ernest Paul ✪
 
Social Media strategy - the rise of social apponomics
Social Media strategy - the rise of social apponomicsSocial Media strategy - the rise of social apponomics
Social Media strategy - the rise of social apponomicsTamara Obradov
 
TELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMO
TELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMOTELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMO
TELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMOMeio & Mensagem
 
Facebook-BCG Report on the impact of digital in the Financial Services Industry
Facebook-BCG Report on the impact of digital in the Financial Services IndustryFacebook-BCG Report on the impact of digital in the Financial Services Industry
Facebook-BCG Report on the impact of digital in the Financial Services IndustrySocial Samosa
 
Esports - The Billion Dollar Niche
Esports - The Billion Dollar NicheEsports - The Billion Dollar Niche
Esports - The Billion Dollar Nichematthys esterhuysen
 
Taga arthur d little
Taga arthur d littleTaga arthur d little
Taga arthur d littlesouthmos
 
Top Digital Strategic Predictions for 2017 and Beyond
Top Digital Strategic Predictions for 2017 and BeyondTop Digital Strategic Predictions for 2017 and Beyond
Top Digital Strategic Predictions for 2017 and BeyondDuy, Vo Hoang
 
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...ProductNation/iSPIRT
 
LUMA Digital Brief 008 - Scape of Cards
LUMA Digital Brief 008 - Scape of CardsLUMA Digital Brief 008 - Scape of Cards
LUMA Digital Brief 008 - Scape of CardsLUMA Partners
 
Criteo 2018 Summer Travel Report 2018
Criteo 2018 Summer Travel Report 2018 Criteo 2018 Summer Travel Report 2018
Criteo 2018 Summer Travel Report 2018 Criteo
 
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...Hugues Rey
 
Why Digital Marketing Is Now Marketing In A Digital World
Why Digital Marketing Is Now Marketing In A Digital WorldWhy Digital Marketing Is Now Marketing In A Digital World
Why Digital Marketing Is Now Marketing In A Digital Worldfoundationcap
 
Horizon Digital Media & Internet H1 2014
Horizon Digital Media & Internet H1 2014Horizon Digital Media & Internet H1 2014
Horizon Digital Media & Internet H1 2014horizonpartners
 

What's hot (20)

Slide Deck for Connecting the Dots - Senior Thesis
Slide Deck for Connecting the Dots - Senior ThesisSlide Deck for Connecting the Dots - Senior Thesis
Slide Deck for Connecting the Dots - Senior Thesis
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the People
 
Horizon Partners Q4 2013 Newsletter
Horizon Partners Q4 2013 NewsletterHorizon Partners Q4 2013 Newsletter
Horizon Partners Q4 2013 Newsletter
 
Digital Powers Consumer Durables: A $23 billion Opportunity by 2023
Digital Powers Consumer Durables: A $23 billion Opportunity by 2023Digital Powers Consumer Durables: A $23 billion Opportunity by 2023
Digital Powers Consumer Durables: A $23 billion Opportunity by 2023
 
Fintech Product for Gen Y & Gen Z - Robo Advisor
Fintech Product for Gen Y & Gen Z - Robo Advisor Fintech Product for Gen Y & Gen Z - Robo Advisor
Fintech Product for Gen Y & Gen Z - Robo Advisor
 
Social Media strategy - the rise of social apponomics
Social Media strategy - the rise of social apponomicsSocial Media strategy - the rise of social apponomics
Social Media strategy - the rise of social apponomics
 
TELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMO
TELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMOTELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMO
TELECOM, MAS PODE ME CHAMAR DE PUBLISHER MESMO
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
Facebook-BCG Report on the impact of digital in the Financial Services Industry
Facebook-BCG Report on the impact of digital in the Financial Services IndustryFacebook-BCG Report on the impact of digital in the Financial Services Industry
Facebook-BCG Report on the impact of digital in the Financial Services Industry
 
Esports - The Billion Dollar Niche
Esports - The Billion Dollar NicheEsports - The Billion Dollar Niche
Esports - The Billion Dollar Niche
 
FinTech survey 2015
FinTech survey 2015FinTech survey 2015
FinTech survey 2015
 
Taga arthur d little
Taga arthur d littleTaga arthur d little
Taga arthur d little
 
Top Digital Strategic Predictions for 2017 and Beyond
Top Digital Strategic Predictions for 2017 and BeyondTop Digital Strategic Predictions for 2017 and Beyond
Top Digital Strategic Predictions for 2017 and Beyond
 
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
Top 30 Indian B2B Software Product Companies Valued at $6.2 Billion and Growi...
 
LUMA Digital Brief 008 - Scape of Cards
LUMA Digital Brief 008 - Scape of CardsLUMA Digital Brief 008 - Scape of Cards
LUMA Digital Brief 008 - Scape of Cards
 
Criteo 2018 Summer Travel Report 2018
Criteo 2018 Summer Travel Report 2018 Criteo 2018 Summer Travel Report 2018
Criteo 2018 Summer Travel Report 2018
 
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...
 
Why Digital Marketing Is Now Marketing In A Digital World
Why Digital Marketing Is Now Marketing In A Digital WorldWhy Digital Marketing Is Now Marketing In A Digital World
Why Digital Marketing Is Now Marketing In A Digital World
 
Horizon Digital Media & Internet H1 2014
Horizon Digital Media & Internet H1 2014Horizon Digital Media & Internet H1 2014
Horizon Digital Media & Internet H1 2014
 
Alternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v finalAlternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v final
 

Viewers also liked

Late Stage AdTech Market Update (Thomvest Ventures)
Late Stage AdTech Market Update (Thomvest Ventures)Late Stage AdTech Market Update (Thomvest Ventures)
Late Stage AdTech Market Update (Thomvest Ventures)Thomvest Ventures
 
Thomvest Mobile Advertising Overview - February 2016
Thomvest Mobile Advertising Overview - February 2016Thomvest Mobile Advertising Overview - February 2016
Thomvest Mobile Advertising Overview - February 2016Thomvest Ventures
 
Banking and Lending in the US: A Market Overview
Banking and Lending in the US: A Market OverviewBanking and Lending in the US: A Market Overview
Banking and Lending in the US: A Market OverviewThomvest Ventures
 
Thomvest Native Advertising Overview
Thomvest Native Advertising OverviewThomvest Native Advertising Overview
Thomvest Native Advertising OverviewThomvest Ventures
 
Header Bidding Overview (Thomvest Research)
Header Bidding Overview (Thomvest Research)Header Bidding Overview (Thomvest Research)
Header Bidding Overview (Thomvest Research)Thomvest Ventures
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to BlockchainThomvest Ventures
 

Viewers also liked (9)

Insurance Industry Overview
Insurance Industry OverviewInsurance Industry Overview
Insurance Industry Overview
 
Late Stage AdTech Market Update (Thomvest Ventures)
Late Stage AdTech Market Update (Thomvest Ventures)Late Stage AdTech Market Update (Thomvest Ventures)
Late Stage AdTech Market Update (Thomvest Ventures)
 
Thomvest Mobile Advertising Overview - February 2016
Thomvest Mobile Advertising Overview - February 2016Thomvest Mobile Advertising Overview - February 2016
Thomvest Mobile Advertising Overview - February 2016
 
Banking and Lending in the US: A Market Overview
Banking and Lending in the US: A Market OverviewBanking and Lending in the US: A Market Overview
Banking and Lending in the US: A Market Overview
 
Thomvest Native Advertising Overview
Thomvest Native Advertising OverviewThomvest Native Advertising Overview
Thomvest Native Advertising Overview
 
Header Bidding Overview (Thomvest Research)
Header Bidding Overview (Thomvest Research)Header Bidding Overview (Thomvest Research)
Header Bidding Overview (Thomvest Research)
 
Perspective on Insurtech
Perspective on InsurtechPerspective on Insurtech
Perspective on Insurtech
 
Security Market Update
Security Market UpdateSecurity Market Update
Security Market Update
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 

Similar to Security Industry Overview

Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Driven Innovation
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxsonubot1
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEMJoseph DeFever
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 

Similar to Security Industry Overview (20)

Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docx
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 

Recently uploaded

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 

Recently uploaded (20)

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 

Security Industry Overview

  • 3. Data breaches are here, and they’re not going away anytime soon “We believe that data is the phenomenon of our time. It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true – even inevitable – then cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.” – IBM chairman, CEO and President Ginni Rometty 3
  • 4. These trends get us most excited about security 4Source: Morgan Stanley • Targeted attacks: sophisticated malware attacks are avoiding traditional firewalls and seeking vulnerable entities • Nation-state involvement: nation-states are increasingly funding attacks, driven by not only economic incentives but also political motives • Dynamic malware: attackers can now sense potential environment detection and manipulate appearance With the increase in the number of breaches in recent years, there is a growing perception amongst CISOs that the current security paradigm isn’t effective enough. Increasingly malicious threat environment Expanding surface area Current security ineffectiveness • Cloud apps and infrastructure: we’re witnessing a rise in vulnerability from the increased adoption of cloud-based applications • Mobility: enterprises are looking to secure mobile applications, as bring-your-own- device (BYOD) becomes the new standard • Internet of Things (IoT): rapid growth in the number of connected devices is evident • Incident count: number of security incidents occurring annually is at an all-time high • Incident cost: as it becomes more and more costly to remediate hacks, enterprises will continue to allocate a higher portion of their IT budget on superior security products
  • 5. 0 10 20 30 40 50 60 2009 2010 2011 2012 2013 2014 2015 5 Cybersecurity is a growing problem, despite increased spend on technology & services Source: Morgan Stanley, press Total number of cybersecurity incidents, worldwide Recent high-profile hacks September 2016 May 2016 March 2016 September 2016 August 2016
  • 6. $3.0 $3.1 $3.2 $3.3 $3.4 $3.5 $3.6 $3.7 $3.8 $3.9 $4.0 2013 2014 2015 6 The cost of cyber breaches has increased significantly as well Source: Morgan Stanley Average cost of a data breach (US$m)
  • 7. Typical attack life cycle 7 Step 1 Research: Hackers want PII, PHI and PEI. Step 5 Monetization: They sell the data to people who want it. Step 4 Capture: They take the data & store it away slowly. Step 2 Infiltration: They attack. Step 3 Discovery: They’re inside. They find what they are looking for.
  • 8. $0 $20 $40 $60 $80 $100 $120 $140 2015 2016E 2017E 2018E 2019E 2020E 8 The security market is poised for robust growth Source: Morgan Stanley $55B market in 2015 $128B market by 2020 Security market (US$B)
  • 9. $10.3 $12.7 $13.1 $14.0 $19.0 $10.0 $11.0 $12.0 $13.0 $14.0 $15.0 $16.0 $17.0 $18.0 $19.0 $20.0 2013 2014 2015 2016E 2017E 9 U.S. federal spending in security is expected to grow 35% YoY in 2017… Source: Morgan Stanley, FISMA Annual Report to Congress Federal cybersecurity budget (US$B)
  • 10. …while non-government security spend is also on the rise 10Source: Forbes $500m $400m $300m $250m $1.5B spent on cybersecurity annually between these four alone… AND THAT NUMBER IS EXPECTED TO GROW The U.S. financial services cybersecurity market reached $9.5B in 2015, becoming the largest non-government cybersecurity market. Annual budget:
  • 12. Access control 12Source: IDC, Morgan Stanley, Gartner 1) Identity & access management (IAM): • Captures user identities and controls access to resources by checking user rights and restrictions • Is an area of increasing focus for enterprises as a number of recent high profile breaches have resulted from insiders gaining access to critical files • $5.5B market in 2015 2) Virtual private network (VPN): • Creates secure connections between users at home or in remote offices and the corporate network • Creates a virtual tunnel using encryption and authentication protocols • $0.5B market in 2015 3) Data loss prevention (DLP): • Makes sure that users do not send critical information outside a corporate network, with a dedicated administrator controlling what data users can transfer • $0.9B market in 2015 Selective restriction of access to a place or other resource. Technologies include:
  • 13. Endpoint threat prevention 13Source: IDC, Morgan Stanley, Gartner 1) Consumer endpoint: • Includes personal firewalls and anti-virus protection • Also now beginning to prevent malware, secure mobile devices and safeguard against identity theft & online transactions • $4.8B market in 2015 2) Corporate endpoint: • Protects corporate devices from the installation of malicious software that seeks to disrupt business processes and / or steal confidential data • Multiple layers of protection, aiming to identify, prevent, block and contain known and unknown threats on devices themselves • $4.4B market in 2015 Aims to protect the perimeter of the company. Technologies include:
  • 14. Network threat prevention 14Source: IDC, Morgan Stanley, Momentum Partners 1) Firewall / unified threat management (UTM): • Firewall: assesses traffic over a network and subsequently allows or denies network access based on previously determined specifications and policies • UTM: integrates a number of security features into one device, namely a firewall, network intrusion detection & prevention as well as the securing of web / email gateways • $7.7B market in 2015 2) Intrusion detection & prevention (IDP): • Monitors the network continuously, informing IT teams when detecting security violations or information leakage • $2.2B market in 2015 3) Email / messaging security: • Scans emails for spam, malware, viruses and phishing attempts; encrypts outbounds • $2.0B market in 2015 4) Web security: • Employs anti-malware to protect employees from accessing malicious websites, while using web application firewalls (WAFs) to protect against external users attempting to gain access to internal systems • $2.0B market in 2015 Seeks to prevent unauthorized access to the corporate network. Technologies include:
  • 15. Monitoring / forensics 15Source: IDC, Morgan Stanley, Gartner 1) Security information & event management (SIEM): • Aggregates, standardizes and stores all of the data from network & security devices • Allows greater visibility into user activity, enabling enterprises to more quickly identify malicious behavior • $1.9B market in 2015 2) Vulnerability assessment: • Scans enterprise infrastructure to identify vulnerabilities and remediate exposure to threats • Employs penetration testing products, which simulate attacks to find potential areas of weakness • $1.7B market in 2015 3) Forensics & incident investigation: • Captures how an intrusion affects a company’s files & systems • Uncovers historical vulnerabilities, which may have caused breaches, to remediate future attacks • $0.5B market in 2015 Aims to detect potential breaches quickly, remediate the problem and prevent future occurrences. Technologies include:
  • 16. Other 16Source: IDC, Morgan Stanley 1) Policy & compliance: • Helps companies remain compliant with the increasingly complex set of security regulations • Involves writing reports, providing audit information and establishing security policies • $1.2B market in 2015 2) Security system & configuration management: • Increases visibility over enterprise perimeter security products, such as firewalls and web security • Used to configure and monitor the health of security systems • $0.1B market in 2015 3) Security services: • Include IT consulting and systems integration • Help enterprises design their security architecture, deploy software and integrate security products • $19.4B market in 2015 Essentially anything else that hasn’t already been covered but falls within the larger cybersecurity umbrella. Technologies include:
  • 17. Network threat prevention, 25% Endpoint threat prevention, 17% Access control, 13%Monitoring / forensics, 7% Other, 38% Security industry by use case 17Source: Gartner $55B market in 2015 Network and endpoint protection lead the way, with the $19B security services market captured in “other” Global security market breakdown, 2015 Note: “Other” bucket is comprised of policy & compliance, security system & configuration management and security services.
  • 19. Selection criteria & analysis of sub segments 19Source: PitchBook Tier 1: 1) Vertical: cybersecurity 2) Stage: incubator / angel (limited to Bay Area deals including either Y Combinator or 500 Startups), seed, series A 3) Deal date: last two years 4) Headquarters: California, Texas, Washington, Oregon, Colorado Tier 2: 1) Vertical: cybersecurity 2) Stage: seed, series A 3) Deal date: last two years 4) Headquarters: New York, Massachusetts, D.C. area PitchBook screen employing the following criteria: Note: Data as of October 28, 2016.
  • 20. 19 10 9 9 8 7 6 5 5 4 4 4 4 3 2 2 2 1 1 1 1 1 1 1 0 2 4 6 8 10 12 14 16 18 20 Tier 1 – led by infrastructure and cloud security 20Source: PitchBook Note: Data as of October 28, 2016. Security investments by type 110 companies total
  • 21. 10 3 3 2 2 2 2 1 1 1 1 1 1 1 1 0 2 4 6 8 10 12 Tier 2 – east coast led by infrastructure, email / messaging and mobile security 21Source: PitchBook Note: Data as of October 28, 2016. Security investments by type 32 companies total
  • 22. Areas we will be exploring for future security investments 22Source: Forbes, IDC, Gartner, TechEmergence, Grand View Research IAM Infonomics Cloud security IoT IAM: $25B market projected by 2022 Infonomics: “are all these products worth their cost?” – every CISO ever IoT: over 25% of identified attacks in enterprises will involve IoT by 2020 Cloud security: 15% of enterprise spend today, rising to 33% by 2018 AI & machine learning Verticals: Horizontal technology: AI & machine learning: 22% cyber intelligence market share (#1 end market)
  • 23. Prominent players within our focus areas 23Source: Morgan Stanley, PitchBook, Gartner, press IAM Infonomics Cloud security IoT AI & machine learning (Blue Coat & Elastica) (Palerra)
  • 24. Where our portfolio companies fit in all of this 24 Cloud / CASB Endpoint – AI & machine learning Network
  • 25. 206 190 197 159 194 149 340 356 440 462 405 0 50 100 150 200 250 300 350 400 450 500 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016E Security VC investments will likely see a slight dip in 2016, but still well above median 25Source: Pitchbook Note: Data as of October 18, 2016. Total security venture investments globally Projected Median = 206
  • 26. Top security investors – last three years 26 28 23 21 20 20 19 18 17 16 14 14 14 14 14 0 5 10 15 20 25 30 Source: Pitchbook Note: Data as of October 18, 2016. Excludes accelerator & pre-seed rounds. Excludes individuals. Top investors by # of security investments Not considered top investor in last 12 months
  • 27. 13 9 7 7 7 6 6 6 5 5 5 5 5 5 0 2 4 6 8 10 12 14 Top security investors – last twelve months 27Source: Pitchbook Note: Data as of October 18, 2016. Excludes accelerator & pre-seed rounds. Excludes individuals. Top investors by # of security investments Only recently considered top investor in last 12 months
  • 29. Regulations within the security industry have seen increased attention in recent years 29 Among other things, mandated that healthcare organizations, financial institutions and federal agencies protect their systems & information. However, some argued the language within was too vague 1996 1999 2002 2003 2012 2013 2013 Health Insurance Portability and Accountability Act (HIPAA) Gramm-Leach- Bliley Act Federal Information Security Management Act (FISMA); part of Homeland Security Act President’s National Strategy to Secure Cyberspace (Bush) Made Dept. of Homeland Security responsible for national security guidance & solutions Aimed to create standards for protecting vital infrastructure Cybersecurity Act of 2012 (failed to pass through Senate) Improving Critical Infrastructure Cybersecurity (White House- issued) Allows the Executive Branch to share information about threats with companies & individuals Protects against lawsuits aimed at companies that disclose breach information Cyber Intelligence Sharing and Protection Act (CISPA) 2015 Cybersecurity National Emergency Declared (Obama) Executive order to include $14B for cybersecurity spending in 2016 budget