SlideShare uma empresa Scribd logo
1 de 14
S
2014-15 Cybersecurity
Venture and M&A
What are the Trends?
Nick Normile
August 2015
Which subsectors are getting funded?
These 16 stand out:
Subsector Purpose
Anomaly Detection
Detects anomalous activity on the
network. Usually used for Insider threats
(DarkTrace, RedOwl)
Bug Bounty
Platform for hosting bug bounties
(HackerOne, Synack).
Cloud Security
Protects corporate data / applications
in the cloud (Adallom, HyTrust).
Code Security Analysis
Scans source code for vulnerabilities
(Checkmarx, BugCrowd).
Data Security
Traditional DLP and companies
that protect data (enSilo, Ionic).
Endpoint Protection
Traditional and next-gen antivirus
and related tools (CrowdStrike, Tanium).
Fraud detection
Detection / mitigation of transaction fraud
(Pindrop Security, fraudmetrix)
Identity & Access Mgmt
Identity verification and permissions
management solutions (Thycotic, Duo).
I used data from CB Insights, Mattermark, and CrunchBase. I scrubbed the data, and categorized each company by subsector.
Subsector Purpose
Incident Management
Companies that manage the
necessary workflow post-incident
(PagerDuty, Co3 Systems).
Mobile Security
Mobile device management and other
companies focused on securing
mobile phones (Hypori, Mocana).
Network Security
Traditional intrusion prevention,
network monitoring and related
solutions (Tenable, AirTight).
Secure Communications
Solutions for secure email, text and
other forms of communication (Silent
Circle, Rubicon Labs).
Security Ratings
Companies that provide ratings on
companies’ security status (Bitsight,
Security Scorecard).
Security Training
Anti-phishing and related training for
corporate employees (PhishMe,
Wombat)
Threat Intelligence
Solutions that monitor external and
internal networks for potential threats
(Cyphort, iSight).
Web Security
Secure web gateways and related
products (Zscaler, Menlo Security)
Which subsectors are getting funded
(cont)?
Where did the Money Go?
2014
$2.1 Billion in cybersecurity funding across 231 rounds
$0
$50
$100
$150
$200
$250
$300
$350
0
5
10
15
20
25
30
35
40
45
50
# of Rounds Funding
Anomaly
Detection
2%
Cloud Security
10%
Code Security
Analysis
1%
Data Security
8%
Endpoint
Protection
6%
Fraud
detection
10%
IAM
16%
Incident
Management
4%
Mobile
Security
6%
Network
Security
19%
Secure
Communi-
cations
4%
Threat
Intelligence
7%
Web Security
5%
Companies Funded
Anomaly
Detection
2%
Cloud Security
14%
Code Security
Analysis
2%
Data Security
5%
Endpoint
Protection
12%
Fraud
detection
5%
IAM
15%
Incident
Management
3%
Mobile
Security
12%
Network
Security
14%
Secure
Communi-
cations
3%
Threat
Intelligence
7%
Web Security
5%
Funding Received
2014
Endpoint protection companies received 12% of funding despite
representing just 6% of funded companies
Where did the Money Go?
2015
$1.87 Billion in cybersecurity funding across 164 rounds thus far (8/12)
$0
$50
$100
$150
$200
$250
$300
$350
0
5
10
15
20
25
30
# of Rounds Funding
Anomaly
Detection
6%
Bug Bounty
1%
Cloud
Security
7%
Code Security
Analysis
1%
Data Security
9%
Endpoint
Protection
7%
Fraud
detection
10%
IAM
15%
Mobile
Security
8%
Network
Security
13%
Secure
Communi-
cations
4%
Security
Ratings
1%
Security
Training
1%
Threat
Intelligence
7%
Web
Security
9%
Companies Funded
Anomaly
Detection
5%
Bug Bounty
3%
Cloud Security
12% Code
Security
Analysis
5%
Data Security
8%
Endpoint
Protection
16%Fraud
detection
6%
IAM
9%
Mobile
Security
5%
Network
Security
7%
Secure
Communi-
cations
4%
Security
Ratings
2%
Security
Training
1%
Threat
Intelligence
8%
Web Security
10%
Funding Received
Endpoint protection companies continue to get the big checks: EPP
companies received 16% of funding despite representing just 8% of
funded companies
2015
Compare 2015 to this time 2014*
We’ve seen an 11% increase in # of rounds over this time last year
(164 vs. 147), but a more than 36% increase in funding ($1.87B vs. $1.37B)
*The period 1/1/14 through 8/12/14
0
5
10
15
20
25
30
35
# of Funding Rounds
2014 2015
$0
$50
$100
$150
$200
$250
$300
$350
Total Funding
2014 2015
Where is the increase coming from?
Not from the distribution of round type —
that has stayed relatively constant.
Pre Series A
27%
Series A
32%
Series B
13%
Series C
8%
Late
12%
Debt
8%
2014 # of Rounds (through 8/12)
Pre Series A
26%
Series A
27%
Series B
16%
Series C
12%
Late
9%
Debt
10%
2015 # of Rounds
Not from the distribution of funding by round type — late stage funding as a
share of total funding decreased by 10% in 2015
(although the share of funding coming from late + Series C rounds
stayed constant at around 50%).
Pre Series A
3%
Series A
18%
Series B
26%
Series C
28%
Late
22%
Debt
3%
2015 Funding
Pre Series A
3%
Series A
22%
Series B
24%
Series C
17%
Late
32%
Debt
2%
2014 Funding (through 8/12)
It is coming from the across-the-board increase
in amount of funding provided in each round.
This largely holds for both the mean and median.
0.9
6.4
17.5
19.4
25.8
2.3
1.3
7.4
17.7
27.7 27.6
3.8
$0
$5
$10
$15
$20
$25
$30
Pre Series
A
Series A Series B Series C Late Debt
Mean Round Size
2014 2015
0.5
6.0
12.0
19.0
16.5
0.51.0
6.9
17.0
24.5
13.4
2.3
$0
$5
$10
$15
$20
$25
$30
Pre Series
A
Series A Series B Series C Late Debt
Median Round Size
2014 2015
What About the Exits?
IAM companies represented ¼ of the 60 cybersecurity exits in 2014.
There have been just 23 exits in 2015 (as of 8/12).
There were 40 by this time last year.
Cloud
Security, 6,
10%
Data Security,
3, 5%
Endpoint
Protection, 3,
5%
Fraud
detection, 7,
12%
IAM, 15, 25%
Mobile
Security, 10,
17%
Network
Security, 8,
13%
Secure
Communicatio
ns, 3, 5%
Threat
Intelligence, 2,
3%
Web Security,
3, 5%
2014 Anomaly
Detection, 1,
4%
Cloud
Security, 4,
17%
Code
Security
Analysis,
1, 4%
Data Security,
2, 9%
Fraud
detection,
2, 9%
IAM, 3, 13%
Mobile
Security, 2,
9%
Network
Security, 3,
13%
Unified Threat
Management*,
3, 13%
Threat
Intelligence,
1, 4%
Web Security,
1, 4%
2015
*Unified Threat Management refers to Websense, Fidelis and Blue Coat
Key Takeaways
S Endpoint protection companies continue to receive an
outsized portion of funding relative to the # of companies
funded (think Tanium, Cylance, Crowdstrike).
S Round sizes are increasing — especially in Series C
rounds (think Crowdstrike and Illumio). Is the Series C
the new pre-IPO round?
S Cybersecurity M&A (in # of deals) is way down. Are high
valuations scaring strategic buyers away?
I’m wary about drawing conclusions
from less than two full years of data, but…
Thanks for Reading!
S I’m a college student at the University of Pennsylvania
going into my senior year. I’m passionate about tech and
tech investing. You can sign up for my cybersecurity
newsletter here, and read past issues here.
S Email me with any questions or feedback!
normile@wharton.upenn.edu

Mais conteúdo relacionado

Mais procurados

The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
resultsig
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
Jeremiah Grossman
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
Mehul Doshi
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
patmisasi
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
Stephanie Crates
 

Mais procurados (20)

The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?Is the SOC working as a viable business model (or security model)?
Is the SOC working as a viable business model (or security model)?
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
How secure is your company's information?
How secure is your company's information?How secure is your company's information?
How secure is your company's information?
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
 
Rising Menace of Phishing Attacks | Info Graphic | QPS
Rising Menace of Phishing Attacks | Info Graphic | QPSRising Menace of Phishing Attacks | Info Graphic | QPS
Rising Menace of Phishing Attacks | Info Graphic | QPS
 

Semelhante a 2014-15 Cybersecurity Venture Funding and M&A

EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
Peggy Lawless
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
Danie Schoeman
 

Semelhante a 2014-15 Cybersecurity Venture Funding and M&A (20)

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 

Último

如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
wsppdmt
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 

Último (20)

RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...
Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...
Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about them
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 

2014-15 Cybersecurity Venture Funding and M&A

  • 1. S 2014-15 Cybersecurity Venture and M&A What are the Trends? Nick Normile August 2015
  • 2. Which subsectors are getting funded? These 16 stand out: Subsector Purpose Anomaly Detection Detects anomalous activity on the network. Usually used for Insider threats (DarkTrace, RedOwl) Bug Bounty Platform for hosting bug bounties (HackerOne, Synack). Cloud Security Protects corporate data / applications in the cloud (Adallom, HyTrust). Code Security Analysis Scans source code for vulnerabilities (Checkmarx, BugCrowd). Data Security Traditional DLP and companies that protect data (enSilo, Ionic). Endpoint Protection Traditional and next-gen antivirus and related tools (CrowdStrike, Tanium). Fraud detection Detection / mitigation of transaction fraud (Pindrop Security, fraudmetrix) Identity & Access Mgmt Identity verification and permissions management solutions (Thycotic, Duo). I used data from CB Insights, Mattermark, and CrunchBase. I scrubbed the data, and categorized each company by subsector.
  • 3. Subsector Purpose Incident Management Companies that manage the necessary workflow post-incident (PagerDuty, Co3 Systems). Mobile Security Mobile device management and other companies focused on securing mobile phones (Hypori, Mocana). Network Security Traditional intrusion prevention, network monitoring and related solutions (Tenable, AirTight). Secure Communications Solutions for secure email, text and other forms of communication (Silent Circle, Rubicon Labs). Security Ratings Companies that provide ratings on companies’ security status (Bitsight, Security Scorecard). Security Training Anti-phishing and related training for corporate employees (PhishMe, Wombat) Threat Intelligence Solutions that monitor external and internal networks for potential threats (Cyphort, iSight). Web Security Secure web gateways and related products (Zscaler, Menlo Security) Which subsectors are getting funded (cont)?
  • 4. Where did the Money Go? 2014 $2.1 Billion in cybersecurity funding across 231 rounds $0 $50 $100 $150 $200 $250 $300 $350 0 5 10 15 20 25 30 35 40 45 50 # of Rounds Funding
  • 5. Anomaly Detection 2% Cloud Security 10% Code Security Analysis 1% Data Security 8% Endpoint Protection 6% Fraud detection 10% IAM 16% Incident Management 4% Mobile Security 6% Network Security 19% Secure Communi- cations 4% Threat Intelligence 7% Web Security 5% Companies Funded Anomaly Detection 2% Cloud Security 14% Code Security Analysis 2% Data Security 5% Endpoint Protection 12% Fraud detection 5% IAM 15% Incident Management 3% Mobile Security 12% Network Security 14% Secure Communi- cations 3% Threat Intelligence 7% Web Security 5% Funding Received 2014 Endpoint protection companies received 12% of funding despite representing just 6% of funded companies
  • 6. Where did the Money Go? 2015 $1.87 Billion in cybersecurity funding across 164 rounds thus far (8/12) $0 $50 $100 $150 $200 $250 $300 $350 0 5 10 15 20 25 30 # of Rounds Funding
  • 7. Anomaly Detection 6% Bug Bounty 1% Cloud Security 7% Code Security Analysis 1% Data Security 9% Endpoint Protection 7% Fraud detection 10% IAM 15% Mobile Security 8% Network Security 13% Secure Communi- cations 4% Security Ratings 1% Security Training 1% Threat Intelligence 7% Web Security 9% Companies Funded Anomaly Detection 5% Bug Bounty 3% Cloud Security 12% Code Security Analysis 5% Data Security 8% Endpoint Protection 16%Fraud detection 6% IAM 9% Mobile Security 5% Network Security 7% Secure Communi- cations 4% Security Ratings 2% Security Training 1% Threat Intelligence 8% Web Security 10% Funding Received Endpoint protection companies continue to get the big checks: EPP companies received 16% of funding despite representing just 8% of funded companies 2015
  • 8. Compare 2015 to this time 2014* We’ve seen an 11% increase in # of rounds over this time last year (164 vs. 147), but a more than 36% increase in funding ($1.87B vs. $1.37B) *The period 1/1/14 through 8/12/14 0 5 10 15 20 25 30 35 # of Funding Rounds 2014 2015 $0 $50 $100 $150 $200 $250 $300 $350 Total Funding 2014 2015
  • 9. Where is the increase coming from? Not from the distribution of round type — that has stayed relatively constant. Pre Series A 27% Series A 32% Series B 13% Series C 8% Late 12% Debt 8% 2014 # of Rounds (through 8/12) Pre Series A 26% Series A 27% Series B 16% Series C 12% Late 9% Debt 10% 2015 # of Rounds
  • 10. Not from the distribution of funding by round type — late stage funding as a share of total funding decreased by 10% in 2015 (although the share of funding coming from late + Series C rounds stayed constant at around 50%). Pre Series A 3% Series A 18% Series B 26% Series C 28% Late 22% Debt 3% 2015 Funding Pre Series A 3% Series A 22% Series B 24% Series C 17% Late 32% Debt 2% 2014 Funding (through 8/12)
  • 11. It is coming from the across-the-board increase in amount of funding provided in each round. This largely holds for both the mean and median. 0.9 6.4 17.5 19.4 25.8 2.3 1.3 7.4 17.7 27.7 27.6 3.8 $0 $5 $10 $15 $20 $25 $30 Pre Series A Series A Series B Series C Late Debt Mean Round Size 2014 2015 0.5 6.0 12.0 19.0 16.5 0.51.0 6.9 17.0 24.5 13.4 2.3 $0 $5 $10 $15 $20 $25 $30 Pre Series A Series A Series B Series C Late Debt Median Round Size 2014 2015
  • 12. What About the Exits? IAM companies represented ¼ of the 60 cybersecurity exits in 2014. There have been just 23 exits in 2015 (as of 8/12). There were 40 by this time last year. Cloud Security, 6, 10% Data Security, 3, 5% Endpoint Protection, 3, 5% Fraud detection, 7, 12% IAM, 15, 25% Mobile Security, 10, 17% Network Security, 8, 13% Secure Communicatio ns, 3, 5% Threat Intelligence, 2, 3% Web Security, 3, 5% 2014 Anomaly Detection, 1, 4% Cloud Security, 4, 17% Code Security Analysis, 1, 4% Data Security, 2, 9% Fraud detection, 2, 9% IAM, 3, 13% Mobile Security, 2, 9% Network Security, 3, 13% Unified Threat Management*, 3, 13% Threat Intelligence, 1, 4% Web Security, 1, 4% 2015 *Unified Threat Management refers to Websense, Fidelis and Blue Coat
  • 13. Key Takeaways S Endpoint protection companies continue to receive an outsized portion of funding relative to the # of companies funded (think Tanium, Cylance, Crowdstrike). S Round sizes are increasing — especially in Series C rounds (think Crowdstrike and Illumio). Is the Series C the new pre-IPO round? S Cybersecurity M&A (in # of deals) is way down. Are high valuations scaring strategic buyers away? I’m wary about drawing conclusions from less than two full years of data, but…
  • 14. Thanks for Reading! S I’m a college student at the University of Pennsylvania going into my senior year. I’m passionate about tech and tech investing. You can sign up for my cybersecurity newsletter here, and read past issues here. S Email me with any questions or feedback! normile@wharton.upenn.edu