SlideShare ist ein Scribd-Unternehmen logo
1 von 14
S
2014-15 Cybersecurity
Venture and M&A
What are the Trends?
Nick Normile
August 2015
Which subsectors are getting funded?
These 16 stand out:
Subsector Purpose
Anomaly Detection
Detects anomalous activity on the
network. Usually used for Insider threats
(DarkTrace, RedOwl)
Bug Bounty
Platform for hosting bug bounties
(HackerOne, Synack).
Cloud Security
Protects corporate data / applications
in the cloud (Adallom, HyTrust).
Code Security Analysis
Scans source code for vulnerabilities
(Checkmarx, BugCrowd).
Data Security
Traditional DLP and companies
that protect data (enSilo, Ionic).
Endpoint Protection
Traditional and next-gen antivirus
and related tools (CrowdStrike, Tanium).
Fraud detection
Detection / mitigation of transaction fraud
(Pindrop Security, fraudmetrix)
Identity & Access Mgmt
Identity verification and permissions
management solutions (Thycotic, Duo).
I used data from CB Insights, Mattermark, and CrunchBase. I scrubbed the data, and categorized each company by subsector.
Subsector Purpose
Incident Management
Companies that manage the
necessary workflow post-incident
(PagerDuty, Co3 Systems).
Mobile Security
Mobile device management and other
companies focused on securing
mobile phones (Hypori, Mocana).
Network Security
Traditional intrusion prevention,
network monitoring and related
solutions (Tenable, AirTight).
Secure Communications
Solutions for secure email, text and
other forms of communication (Silent
Circle, Rubicon Labs).
Security Ratings
Companies that provide ratings on
companies’ security status (Bitsight,
Security Scorecard).
Security Training
Anti-phishing and related training for
corporate employees (PhishMe,
Wombat)
Threat Intelligence
Solutions that monitor external and
internal networks for potential threats
(Cyphort, iSight).
Web Security
Secure web gateways and related
products (Zscaler, Menlo Security)
Which subsectors are getting funded
(cont)?
Where did the Money Go?
2014
$2.1 Billion in cybersecurity funding across 231 rounds
$0
$50
$100
$150
$200
$250
$300
$350
0
5
10
15
20
25
30
35
40
45
50
# of Rounds Funding
Anomaly
Detection
2%
Cloud Security
10%
Code Security
Analysis
1%
Data Security
8%
Endpoint
Protection
6%
Fraud
detection
10%
IAM
16%
Incident
Management
4%
Mobile
Security
6%
Network
Security
19%
Secure
Communi-
cations
4%
Threat
Intelligence
7%
Web Security
5%
Companies Funded
Anomaly
Detection
2%
Cloud Security
14%
Code Security
Analysis
2%
Data Security
5%
Endpoint
Protection
12%
Fraud
detection
5%
IAM
15%
Incident
Management
3%
Mobile
Security
12%
Network
Security
14%
Secure
Communi-
cations
3%
Threat
Intelligence
7%
Web Security
5%
Funding Received
2014
Endpoint protection companies received 12% of funding despite
representing just 6% of funded companies
Where did the Money Go?
2015
$1.87 Billion in cybersecurity funding across 164 rounds thus far (8/12)
$0
$50
$100
$150
$200
$250
$300
$350
0
5
10
15
20
25
30
# of Rounds Funding
Anomaly
Detection
6%
Bug Bounty
1%
Cloud
Security
7%
Code Security
Analysis
1%
Data Security
9%
Endpoint
Protection
7%
Fraud
detection
10%
IAM
15%
Mobile
Security
8%
Network
Security
13%
Secure
Communi-
cations
4%
Security
Ratings
1%
Security
Training
1%
Threat
Intelligence
7%
Web
Security
9%
Companies Funded
Anomaly
Detection
5%
Bug Bounty
3%
Cloud Security
12% Code
Security
Analysis
5%
Data Security
8%
Endpoint
Protection
16%Fraud
detection
6%
IAM
9%
Mobile
Security
5%
Network
Security
7%
Secure
Communi-
cations
4%
Security
Ratings
2%
Security
Training
1%
Threat
Intelligence
8%
Web Security
10%
Funding Received
Endpoint protection companies continue to get the big checks: EPP
companies received 16% of funding despite representing just 8% of
funded companies
2015
Compare 2015 to this time 2014*
We’ve seen an 11% increase in # of rounds over this time last year
(164 vs. 147), but a more than 36% increase in funding ($1.87B vs. $1.37B)
*The period 1/1/14 through 8/12/14
0
5
10
15
20
25
30
35
# of Funding Rounds
2014 2015
$0
$50
$100
$150
$200
$250
$300
$350
Total Funding
2014 2015
Where is the increase coming from?
Not from the distribution of round type —
that has stayed relatively constant.
Pre Series A
27%
Series A
32%
Series B
13%
Series C
8%
Late
12%
Debt
8%
2014 # of Rounds (through 8/12)
Pre Series A
26%
Series A
27%
Series B
16%
Series C
12%
Late
9%
Debt
10%
2015 # of Rounds
Not from the distribution of funding by round type — late stage funding as a
share of total funding decreased by 10% in 2015
(although the share of funding coming from late + Series C rounds
stayed constant at around 50%).
Pre Series A
3%
Series A
18%
Series B
26%
Series C
28%
Late
22%
Debt
3%
2015 Funding
Pre Series A
3%
Series A
22%
Series B
24%
Series C
17%
Late
32%
Debt
2%
2014 Funding (through 8/12)
It is coming from the across-the-board increase
in amount of funding provided in each round.
This largely holds for both the mean and median.
0.9
6.4
17.5
19.4
25.8
2.3
1.3
7.4
17.7
27.7 27.6
3.8
$0
$5
$10
$15
$20
$25
$30
Pre Series
A
Series A Series B Series C Late Debt
Mean Round Size
2014 2015
0.5
6.0
12.0
19.0
16.5
0.51.0
6.9
17.0
24.5
13.4
2.3
$0
$5
$10
$15
$20
$25
$30
Pre Series
A
Series A Series B Series C Late Debt
Median Round Size
2014 2015
What About the Exits?
IAM companies represented ¼ of the 60 cybersecurity exits in 2014.
There have been just 23 exits in 2015 (as of 8/12).
There were 40 by this time last year.
Cloud
Security, 6,
10%
Data Security,
3, 5%
Endpoint
Protection, 3,
5%
Fraud
detection, 7,
12%
IAM, 15, 25%
Mobile
Security, 10,
17%
Network
Security, 8,
13%
Secure
Communicatio
ns, 3, 5%
Threat
Intelligence, 2,
3%
Web Security,
3, 5%
2014 Anomaly
Detection, 1,
4%
Cloud
Security, 4,
17%
Code
Security
Analysis,
1, 4%
Data Security,
2, 9%
Fraud
detection,
2, 9%
IAM, 3, 13%
Mobile
Security, 2,
9%
Network
Security, 3,
13%
Unified Threat
Management*,
3, 13%
Threat
Intelligence,
1, 4%
Web Security,
1, 4%
2015
*Unified Threat Management refers to Websense, Fidelis and Blue Coat
Key Takeaways
S Endpoint protection companies continue to receive an
outsized portion of funding relative to the # of companies
funded (think Tanium, Cylance, Crowdstrike).
S Round sizes are increasing — especially in Series C
rounds (think Crowdstrike and Illumio). Is the Series C
the new pre-IPO round?
S Cybersecurity M&A (in # of deals) is way down. Are high
valuations scaring strategic buyers away?
I’m wary about drawing conclusions
from less than two full years of data, but…
Thanks for Reading!
S I’m a college student at the University of Pennsylvania
going into my senior year. I’m passionate about tech and
tech investing. You can sign up for my cybersecurity
newsletter here, and read past issues here.
S Email me with any questions or feedback!
normile@wharton.upenn.edu

Weitere ähnliche Inhalte

Was ist angesagt?

The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Reviewresultsig
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)Jeremiah Grossman
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Jonathan Sinclair
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchMehul Doshi
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceSecureAuth
 
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...CNseg
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC SummitTripwire
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019Elena Peday
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
How secure is your company's information?
How secure is your company's information?How secure is your company's information?
How secure is your company's information?eLeaP
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersVenafi
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CloudIDSummit
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2Stephanie Crates
 

Was ist angesagt? (20)

The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
How secure is your company's information?
How secure is your company's information?How secure is your company's information?
How secure is your company's information?
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
 
Rising Menace of Phishing Attacks | Info Graphic | QPS
Rising Menace of Phishing Attacks | Info Graphic | QPSRising Menace of Phishing Attacks | Info Graphic | QPS
Rising Menace of Phishing Attacks | Info Graphic | QPS
 

Ähnlich wie 2014-15 Cybersecurity Venture Funding and M&A

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud SecurityDatapipe
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxSonaliG6
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloNorth Texas Chapter of the ISSA
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 linDanie Schoeman
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 IDG Connect
 

Ähnlich wie 2014-15 Cybersecurity Venture Funding and M&A (20)

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 

Kürzlich hochgeladen

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 

Kürzlich hochgeladen (20)

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 

2014-15 Cybersecurity Venture Funding and M&A

  • 1. S 2014-15 Cybersecurity Venture and M&A What are the Trends? Nick Normile August 2015
  • 2. Which subsectors are getting funded? These 16 stand out: Subsector Purpose Anomaly Detection Detects anomalous activity on the network. Usually used for Insider threats (DarkTrace, RedOwl) Bug Bounty Platform for hosting bug bounties (HackerOne, Synack). Cloud Security Protects corporate data / applications in the cloud (Adallom, HyTrust). Code Security Analysis Scans source code for vulnerabilities (Checkmarx, BugCrowd). Data Security Traditional DLP and companies that protect data (enSilo, Ionic). Endpoint Protection Traditional and next-gen antivirus and related tools (CrowdStrike, Tanium). Fraud detection Detection / mitigation of transaction fraud (Pindrop Security, fraudmetrix) Identity & Access Mgmt Identity verification and permissions management solutions (Thycotic, Duo). I used data from CB Insights, Mattermark, and CrunchBase. I scrubbed the data, and categorized each company by subsector.
  • 3. Subsector Purpose Incident Management Companies that manage the necessary workflow post-incident (PagerDuty, Co3 Systems). Mobile Security Mobile device management and other companies focused on securing mobile phones (Hypori, Mocana). Network Security Traditional intrusion prevention, network monitoring and related solutions (Tenable, AirTight). Secure Communications Solutions for secure email, text and other forms of communication (Silent Circle, Rubicon Labs). Security Ratings Companies that provide ratings on companies’ security status (Bitsight, Security Scorecard). Security Training Anti-phishing and related training for corporate employees (PhishMe, Wombat) Threat Intelligence Solutions that monitor external and internal networks for potential threats (Cyphort, iSight). Web Security Secure web gateways and related products (Zscaler, Menlo Security) Which subsectors are getting funded (cont)?
  • 4. Where did the Money Go? 2014 $2.1 Billion in cybersecurity funding across 231 rounds $0 $50 $100 $150 $200 $250 $300 $350 0 5 10 15 20 25 30 35 40 45 50 # of Rounds Funding
  • 5. Anomaly Detection 2% Cloud Security 10% Code Security Analysis 1% Data Security 8% Endpoint Protection 6% Fraud detection 10% IAM 16% Incident Management 4% Mobile Security 6% Network Security 19% Secure Communi- cations 4% Threat Intelligence 7% Web Security 5% Companies Funded Anomaly Detection 2% Cloud Security 14% Code Security Analysis 2% Data Security 5% Endpoint Protection 12% Fraud detection 5% IAM 15% Incident Management 3% Mobile Security 12% Network Security 14% Secure Communi- cations 3% Threat Intelligence 7% Web Security 5% Funding Received 2014 Endpoint protection companies received 12% of funding despite representing just 6% of funded companies
  • 6. Where did the Money Go? 2015 $1.87 Billion in cybersecurity funding across 164 rounds thus far (8/12) $0 $50 $100 $150 $200 $250 $300 $350 0 5 10 15 20 25 30 # of Rounds Funding
  • 7. Anomaly Detection 6% Bug Bounty 1% Cloud Security 7% Code Security Analysis 1% Data Security 9% Endpoint Protection 7% Fraud detection 10% IAM 15% Mobile Security 8% Network Security 13% Secure Communi- cations 4% Security Ratings 1% Security Training 1% Threat Intelligence 7% Web Security 9% Companies Funded Anomaly Detection 5% Bug Bounty 3% Cloud Security 12% Code Security Analysis 5% Data Security 8% Endpoint Protection 16%Fraud detection 6% IAM 9% Mobile Security 5% Network Security 7% Secure Communi- cations 4% Security Ratings 2% Security Training 1% Threat Intelligence 8% Web Security 10% Funding Received Endpoint protection companies continue to get the big checks: EPP companies received 16% of funding despite representing just 8% of funded companies 2015
  • 8. Compare 2015 to this time 2014* We’ve seen an 11% increase in # of rounds over this time last year (164 vs. 147), but a more than 36% increase in funding ($1.87B vs. $1.37B) *The period 1/1/14 through 8/12/14 0 5 10 15 20 25 30 35 # of Funding Rounds 2014 2015 $0 $50 $100 $150 $200 $250 $300 $350 Total Funding 2014 2015
  • 9. Where is the increase coming from? Not from the distribution of round type — that has stayed relatively constant. Pre Series A 27% Series A 32% Series B 13% Series C 8% Late 12% Debt 8% 2014 # of Rounds (through 8/12) Pre Series A 26% Series A 27% Series B 16% Series C 12% Late 9% Debt 10% 2015 # of Rounds
  • 10. Not from the distribution of funding by round type — late stage funding as a share of total funding decreased by 10% in 2015 (although the share of funding coming from late + Series C rounds stayed constant at around 50%). Pre Series A 3% Series A 18% Series B 26% Series C 28% Late 22% Debt 3% 2015 Funding Pre Series A 3% Series A 22% Series B 24% Series C 17% Late 32% Debt 2% 2014 Funding (through 8/12)
  • 11. It is coming from the across-the-board increase in amount of funding provided in each round. This largely holds for both the mean and median. 0.9 6.4 17.5 19.4 25.8 2.3 1.3 7.4 17.7 27.7 27.6 3.8 $0 $5 $10 $15 $20 $25 $30 Pre Series A Series A Series B Series C Late Debt Mean Round Size 2014 2015 0.5 6.0 12.0 19.0 16.5 0.51.0 6.9 17.0 24.5 13.4 2.3 $0 $5 $10 $15 $20 $25 $30 Pre Series A Series A Series B Series C Late Debt Median Round Size 2014 2015
  • 12. What About the Exits? IAM companies represented ¼ of the 60 cybersecurity exits in 2014. There have been just 23 exits in 2015 (as of 8/12). There were 40 by this time last year. Cloud Security, 6, 10% Data Security, 3, 5% Endpoint Protection, 3, 5% Fraud detection, 7, 12% IAM, 15, 25% Mobile Security, 10, 17% Network Security, 8, 13% Secure Communicatio ns, 3, 5% Threat Intelligence, 2, 3% Web Security, 3, 5% 2014 Anomaly Detection, 1, 4% Cloud Security, 4, 17% Code Security Analysis, 1, 4% Data Security, 2, 9% Fraud detection, 2, 9% IAM, 3, 13% Mobile Security, 2, 9% Network Security, 3, 13% Unified Threat Management*, 3, 13% Threat Intelligence, 1, 4% Web Security, 1, 4% 2015 *Unified Threat Management refers to Websense, Fidelis and Blue Coat
  • 13. Key Takeaways S Endpoint protection companies continue to receive an outsized portion of funding relative to the # of companies funded (think Tanium, Cylance, Crowdstrike). S Round sizes are increasing — especially in Series C rounds (think Crowdstrike and Illumio). Is the Series C the new pre-IPO round? S Cybersecurity M&A (in # of deals) is way down. Are high valuations scaring strategic buyers away? I’m wary about drawing conclusions from less than two full years of data, but…
  • 14. Thanks for Reading! S I’m a college student at the University of Pennsylvania going into my senior year. I’m passionate about tech and tech investing. You can sign up for my cybersecurity newsletter here, and read past issues here. S Email me with any questions or feedback! normile@wharton.upenn.edu