SlideShare uma empresa Scribd logo
1 de 96
1
This year’s trends, opportunities, and high-momentum startups
with the potential to shape the future of cybersecurity
2020 Cyber
Defenders
3
SIGN UP FOR A FREE TRIAL
CB Insights helps the world’s leading companies
make smarter technology decisions with data,
not opinion.
Our Technology Insights Platform provides
companies with comprehensive data, expert
insights and work management tools to drive
growth and improve operations with technology.
WHAT IS CB INSIGHTS?
4
CB Insights helps us compress our time-
to-decision when gathering and analyzing
data and getting an external view on
what's happening in the market so we
can quickly take action.
Meraj Mohammad
Vice President, Ventures Group, ADP
3
Contents
1 2
2 0
2 1
9 5
Cybersecurity funding trends
Cyber Defender categories
2020 Cyber Defenders
Appendix & Methodology
44
Over 7,000 data breaches were reported in 2019.
Protecting customer data weighs on corporations, which are facing
increasingly sophisticated cyber attacks.
C Y B E R S E C U R I T Y I S T O P O F M I N D
Source: Risk Based Security
55
C Y B E R I N S E C U R I T Y I S F E L T A C R O S S I N D U S T R I E S
N U M B E R O F D A T A B R E A C H E S B Y E C O N O M I C S E C T O R I N 2 0 1 9
55
70
103
197
256
280
348
375
435
512
614
0 150 300 450 600 750
Transport & Storage
Admin & Support
Other Services
Manufacturing
Education
Professional/Scientific Services
Public Administration
Retail
Finance & Insurance
Healthcare
Information Technology
Number of breaches
Source: Risk Based Security
66
C O N S I S T E N T T A L K O F C Y B E R S E C U R I T Y A M O N G T H E C - S U I T E
N U M B E R O F E A R N I N G S C A L L S M E N T I O N S O F “ C Y B E R S E C U R I T Y ” Q 3 ’ 1 5 – Q 1 ’ 2 0
150
100
50
0
Number of mentions
2016 2017 2018 2019 2020
“cybersecurity”
200
Source: CB Insights
77
“So, you never know, the bad guys are
continuing to invest as much as the good
guys. And we got to stay out ahead of it.
We got to remain vigilant.”
- Alfred Kelly, CEO Visa, Q3’19 earnings call
88
The next generation of cybersecurity startups is rising to meet the
threats and challenges of today’s cybersecurity landscape.
C H A L L E N G E S = O P P O R T U N I T I E S
99
Our selected startups are early- to mid-stage, high-momentum
companies pioneering technology with the potential to transform
cybersecurity.
Unicorns valued at $1B+, companies that have raised funding past
the Series C stage, and companies that have not raised funding
since 2018 are excluded.
W H A T M A K E S A C Y B E R D E F E N D E R ?
10
But first, some funding trends…
11
C Y B E R S E C U R I T Y
Global equity
funding trends
12
Cybersecurity funding and deals hit record highs
Annual global cybersecurity deals and financing 2015 – 2019
D E A L A C T I V I T Y I S R I S I N G
2016 2017 2018 20192015
Amount of funding ($M)
$10,000M
$8,000M
$6,000M
$4,000M
$0
Number of deals
800
600
400
561
200
473
676
717
770
4437 4482
8821
7365
9955
$2,000M
13
VC interest in cybersecurity persists
Annual number of investments in cybersecurity by investor type, 2015 – 2019
V E N T U R E C A P I T A L I N V E S T M E N T G R O W S
66
98 105
139
123
36
59 61 80 73
367
438
503
534
564
0
100
200
300
400
500
600
2015 2016 2017 2018 2019
Private equity
Corporate venture
capital (CVC)
Venture capital
Numberofdeals
14
Ten Eleven, Lightspeed, and Accel top rankings
Most active investors in cybersecurity startups by type for 2019
M O S T A C T I V E I N V E S T O R S
VC CVC PE
*Ten Eleven, Lightspeed, and Accel each made 10 investments.
*
*
*
15
IPOs and acquisitions up from 2018
Annual number of cybersecurity company exits through either M&A or IPO, 2015 – 2019
E X I T S R E A C H A N A L L - T I M E H I G H
2016 2017 2018 20192015
Numberofexits
282
223
182
142
154
8
8
7
10
15
0
50
100
150
250
200
Notable IPOs
Cloudflare
Ping Identity
CrowdStrike
Pager Duty
300
16
Late-stage investments increase
Annual deal share by stage of investments in private cybersecurity companies, 2015 – 2019
L A T E - S T A G E D E A L S R E A C H F I V E Y E A R H I G H I N 2 0 1 9
2015 2016 2017 2018 2019
0%
50%
100%
4%
5%
5%
5%
4% 4%
4%
4%
4%4%
Note: Early-stage deals include Seed/Angel and Series A rounds; mid-stage deals include Series B and Series C rounds; late-stage deals are Series D+ rounds.
17
China surpasses Israel and the UK in deal share
Cybersecurity global deal share by country, 2015 – 2019
C H I N A ' S C Y B E R S E C U R I T Y S P A C E I S G R O W I N G
58%
18%
9%
7%
6%
United States
Other
Israel
United Kingdom
China
Canada
18
Number of cybersecurity unicorns doubles to 16
Private cybersecurity companies valued at $1B+ as of 6/01/2020:
P R I V A T E M A R K E T L E A D E R S
CHINA UNITED STATES
EUROPE
Note: There were 8 cybersecurity unicorns as of 3/21/2019.
19
This year’s Cyber Defender categories
Disinformation detection Decentralized digital identities Password-less verification Privacy by design
Anomalous behavior detection
Multi-cloud security
Patch protection
Protecting companies’ reputations
from online disinformation attacks
Online identities secured with
distributed ledger technology
Technologies replacing the need
for traditional password
authentication
Protecting companies from
compliance risk at the data level and
up
Detecting anomalous behavior with
machine learning technology
Providing visibility and security
across multiple cloud
deployments
Automating the identification
and resolution of software
vulnerabilities
Medical device security
Securing the devices used in
healthcare settings and patients
Third-party risk management
Mitigating security threats from
vendors and other third parties
Credential stuffing defense
Defending web assets and users from
the abuse of stolen credentials
Zero-trust networking
Enforcing least privileged access to
secure networks
Bot-assisted defense
Using bots to fulfill security tasks and
reduce cyber personnel resources
Outsourced data protection
Offering data protection to enterprises
as a service
Container security
Monitoring threats in containers
20
The 2020 Cyber Defenders
Disinformation detection Decentralized digital identities Password-less verification Privacy by design
Anomalous behavior detection
Multi-cloud security
Patch protection
Medical device security
Third-party risk management Credential stuffing defense
Zero-trust networking Bot-assisted defense Outsourced data protection
Container security
21
The US has the most Cyber Defenders
75% of the 2020 Cyber
Defenders are
headquartered in the US —
mostly in California.
The next highest
concentration of Cyber
Defenders is in Israel.
The United Kingdom, Japan,
Ireland, and Australia each
have one Cyber Defender.
22
2020 Cyber Defenders Expert Collection on CBI
Visit the Cyber Defenders 2020
collection on the CB Insights
platform
CBI Cyber Defenders 2020
Track all of the startups in this
presentation and many more on our
platform using CB Insights’
Collections.
Create dynamic market landscapes,
collaborate within and beyond your
organization, seamlessly manage
what new areas the team needs to
have on their radar when making
growth decisions.
23
24
Disinformation detection
25
Disinformation campaigns are on the rise
Bot technology and ease of access to social media and other online platforms enable
quick, inexpensive creation of disinformation campaigns.
Source: The Global Disinformation Order 2019 Global Inventory of Organised Social Media Manipulation
Number of countries where a disinformation campaign originated, 2017-2019 Mode of distribution by country
2626
“Anonymous bad actors frequently spread false or
misleading claims about a targeted stock via blogs,
forums, social media, bot networks, or spam.
These campaigns seek to either artificially increase
the stock’s price…or lower it…for quick profit.”
- Jon Bateman, Cyber Policy Fellow at the Carnegie Endowment for International Peace, 2020
Source: Carnegie Endowment for International Peace
27
Identify disinformation early to disrupt the chain
Startups monitoring brands across online platforms help companies thwart or respond to
disinformation before it has the chance to spread.
Source: Department of Homeland Security
28
Disinformation detection
Astroscreen uses machine learning to detect disinformation.
The company monitors social media to identify bots, coordinated
disinformation campaigns, and anomalous behavior or content.
Astroscreen was founded in 2018 by media entrepreneur Ali
Tehrani and researcher Juan Echeverria, who discovered a 350,000
automated account botnet on Twitter in 2017.
Investors include Cyber London Accelerator, AI Seed, and
Speedinvest, among others.
Most recent financing: Seed (9/14/2019)
Total disclosed funding: $1M
Location: London, United Kingdom
Yonder tracks internet factions responsible for creating
disinformation.
Monitoring conversations across the internet from Twitter to
message boards to the dark web, Yonder’s platform identifies
disinformation threats to a company’s brand.
The company launched in 2017 to help governments identify
foreign, malicious factions. It now helps companies monitor online
risk, counting Walmart, Viacom, and others among its customers.
Investors include Lux Capital, GGV Capital, and BuildGroup
Management, among others.
Most recent financing: $3M Series A (7/30/2019)
Total disclosed funding: $17.9M
Location: Austin, TX
29
Decentralized digital identities
30
Digital transactions can be costly
From conversations to shopping to banking, people’s lives are moving online and leaving behind a
digital footprint. Without a seamless and secure process for authenticating these disparate
transactions, there’s a risk for cybercrime.
Source: Insurance Information Institute; Internet Crime Complaint Center
Number of cybercrimes in the United States 2015 – 2019
Includes $280M in identity
theft and personal data
breach losses
3131
“Identity is a hard problem, but it’s by
no means an impossible problem.
Plus, how imperfect is the current
system? It’s entirely broken.”
- Emin Gün Sirer, Co-Director, Initiative for Cryptocurrencies and Smart Contracts, Cornell University, 2019
Source: Wired
32
Digital ledger tech adds security and privacy
Digital ledger technology creates a system of authentication keys with the aim of letting an
individual retain control over their identity and to reduce the risk of identity theft.
Source: Citi Ventures
Decentralized system of identification
33
Decentralized digital identities
Bitkey provides distributed key technology.
The company is developing a digital key platform to manage
individual online authentication.
Founded in August 2018, Bitkey offers its distributed ledger
technology to users as a subscription. It currently supports
applications such as smart lock technology, where a digital key is
used to unlock the door to a hotel room or home.
Investors include Goldman Sachs, Global Brain Corporation, and
31VENTURES, among others.
Most recent financing: $11.3M Series A (1/24/2020)
Total disclosed funding: $57M
Location: Tokyo, Japan
Evernym is an open-source provider of decentralized identity
software.
The company offers 3 main products that support the issuance,
verification, and storage of digital credentials.
Evernym created the Sovrin Foundation in 2016 to serve as the
public ledger infrastructure and to support the adoption of
decentralized identity solutions. The company also created an
open-source codebase called Hyperledger Indy, as well as
identifier standards in collaboration with the W3C Credentials
Community Group.
Investors include Barclays Ventures, Medici Ventures, and Alumni
Ventures Group, among others.
Most recent financing: $6M Seed (9/26/2019)
Total disclosed funding: $15.3M
Location: Draper, UT
34
Password-less verification
35
Passwords are burdensome and insecure
Source: Microsoft, Lastpass
Passwords and secondary authentication measures burden customers and employees while
simultaneously representing a security risk for companies.
57% of businesses
globally use multi-factor
authentication
Password security vs. convenience
80% of hacking-related
breaches involve stolen
and reused credentials
3636
“Over time, market forces will make
the password less and less interesting,
less viable, and less effective.”
- Brett McDowell, Executive Director, The FIDO Alliance, 2019
Source: The Verge
37
Passwords can be replaced
Startups are looking to deliver secure alternatives to passwords that improve the user experience.
End user/device Authentication/verification Access
The properties of the
device or user (e.g.,
certificates, biometrics)
can serve as means of
identification.
AI-enabled technologies,
such as facial or voice
recognition, improve the
efficacy of verification.
Password alternatives
create a more secure
and seamless process
for accessing accounts
and resources.
A password-less verification process
38
Password-less verification
Beyond Identity aims to eliminate the need for passwords with
personal certificates.
The company extends the chain of trust, or transit layer security,
from the web to end users and devices with personal certificates.
Founded by serial entrepreneur Jim Clark and technology veteran
Tom Jermoluk, Beyond Identity’s self-signed X.509 certificates
verify device security with the aim of removing the need for a
password.
Investors include New Enterprise Associates and Koch Disruptive
Technologies.
Most recent financing: $30M Series A (4/8/2020)
Total disclosed funding: $30M
Location: New York, NY
Passbase provides identification verification software, including
tools for embedding document and biometric verification
capabilities into corporate applications.
The company offers its solution as an API with scaled verification
methods like SMS, biometric login, and liveliness detection to meet
risk requirements.
Investors include Cowboy Ventures, Kleiner Perkins Caufield &
Byers, and Alphabet, among others.
Most recent financing: $3.6M Seed (9/25/2019)
Total disclosed funding: $4.2M
Location: San Francisco, CA
39
Privacy by design
40
Storing and using personal data is risky for companies
Collecting, storing, and using personally identifiable data has regulatory risk (e.g., GDPR and the California
Consumer Privacy Act), security risk, and reputation risk, with consumers skeptical of how companies use
the data.
Source: Cisco; Reuters; IBM
67% of consumers noted they would act (e.g., shop
elsewhere) to protect their data
$3.9M: average cost of a data breach in 2019
Google was fined $57M in 2019 for improper disclosure of
customer data usage
Risks associated with personal data
Regulatory
Reputation
Security
4141
“Instead of thinking like ‘data owners,’
companies must act as ‘data custodians’ who
protect personal information and use it only
with a customer’s best interests in mind”
- Fredrick “Flee” Lee, chief information security officer at Gusto, 2020
Source: HBR
42
Privacy-first solutions are emerging
Privacy-focused solutions have entered the market to support companies hit by a wave of
personal data, breaches, and regulation. From data ingestion to user data requests, new
solutions are supporting a privacy-by-design approach.
Privacy-first data solutions
Consent
management
Data ingestion Data management Data usage Regulatory compliance
Personal data
mapping and
protection
Data
anonymization/
de-identification
Automated data
subject request
fulfillment
Tools for collecting and
managing user consent of
data collection and usage
Tools for identifying and
mapping personal data
across channels and ensuring
adequate protection
Tools that enable the use or
analysis of data without
exposing user identity
Tools that help companies
comply with regulations that
require users have access to
their data
43
Privacy by design
Transcend is a data privacy company that aims to help users
control their data.
It offers companies tools to comply with privacy regulations and
build trust with customers.
Founded in 2017, Transcend’s privacy center offering supports
data subject requests (DSR) and consent management to support
customers control how their personal data is used. The company
counts Robinhood and Patreon among its customers.
Investors include Index Ventures and Accel.
Most recent financing: $25M Series A (6/10/2020)
Total disclosed funding: $29M
Location: San Francisco, CA
Concentric provides a data discovery, monitoring, and mapping
solution that classifies unstructured data.
Concentric finds personally identifiable information to help fulfill
regulatory requirements and avoid reputation-damaging data
breaches or disclosures.
Investors include Homebrew, Clear Ventures, and Engineering
Capital, among others.
Most recent financing: $7.5M Series A (1/29/2020)
Total disclosed funding: $7.5M
Location: San Jose, CA
44
Anomalous behavior detection
45
Humans are the ultimate security threat
Cybersecurity protects computer systems and networks from harm. However, human behavior is an
unknown variable in cybersecurity. Employees who maliciously or inadvertently share sensitive
information or enable access to company systems pose an inside threat.
Source: McKinsey
Insider threat is a factor in 50% of breaches
4646
“…it’s almost always human error that enables attackers to
access encrypted channels and sensitive information.
Staff can make a variety of mistakes that put their
company’s data or systems at risk.”
- Oz Alashe, CEO of CybSafe, 2020
Source: Infosecurity Magazine
47
Analyzing human behavior offers a defense
Advances in machine learning and access to massive datasets provide insight into normal and
abnormal human behavior. Identifying abnormal behavior — inside or outside the company—
allows companies to direct their resources to correcting behaviors or mitigating threats.
AI-enabled behavioral defense
Inputs AI Model Output
• Relationship data
• Location data
• User data (e.g., biometrics)
• Event data
Trained machine learning
models ingest the different data
sources to identify abnormalities
in behavior.
The AI model’s classification of
behavior can automate
remediation of the expected
threat.
48
Anomalous behavior detection
Abnormal Security is an email security provider.
The company uses machine learning technology to analyze email
content and context to help prevent email attacks, such as
phishing.
Abnormal Security was founded in 2018 by two former Twitter
employees. In 2019, the company appointed a chief product officer
and chief revenue officer from Amazon and Proofpoint,
respectively.
Investors include Greylock Partners.
Most recent financing: $24M Series A (11/18/2019)
Total disclosed funding: $24M
Location: San Francisco, CA
Awake is a network traffic security company.
It monitors users, devices, and applications across a network to
understand their behavior and detect and respond to threats.
The company was launched in 2014 by three cybersecurity
veterans coming from McAfee, HP, and Cylance. Since its
founding, the company has filed several patents for detecting
malicious activity.
Investors include Greylock Partners, Bain Capital, and Liberty
Global Ventures, among others.
Most recent financing: $36M Series C (4/15/2020)
Total disclosed funding: $67.2M
Location: Santa Clara, CA
49
Third-party risk management
50
Threats extend down the supply chain
Many companies rely on third parties — like contractors, vendors, and consultants — to deliver final
products to customers. Exchanging information or providing network access to third parties with
inferior security practices represents a vulnerability.
Source: Normshield; Becker’s Health IT
Notable data breaches caused by a third party
Only 15% of these vendors informed
impacted parties of the breach
44% of data breaches are caused by
a third party
5151
“The implications [of third-party
breaches] are stark and the potential
impacts very real.”
- Steve Durbin, managing director of the Information Security Forum, 2019
Source: WSJ
52
A new way to manage third-party access
To help reduce third-party risk, startups are developing solutions for managing access to
corporate systems and data as well as on-boarding and off-boarding. These new solutions will
augment or replace the traditional approach to risk management.
Old model
Employee
Contractor
Supplier
New model
Thirdparty
management
Corporate
resources
Indiscriminate access to shared
corporate resources once approved
Segmentation by role and controlled
access to corporate resources
53
Third-party risk management
Axis Security uses technology to give third-party users secure
access to private, company applications without risk of
compromising the network.
Founders Dor Knafo and Gil Azrielant started Axis Security in 2018,
having both come from Israel’s military cybersecurity unit.
In April 2020, the company announced a partner program and its
first partner, value-added reseller BlackLake Security.
Investors include Ten Eleven Ventures and CyberStarts, among
others.
Most recent financing: $14M Series A (3/17/2020)
Total disclosed funding: $17M
Location: San Mateo, CA
SecZetta provides third-party identity management.
The company offers a system of record for third parties that can
manage user privileges and vendor certification.
SecZetta announced several partnerships in the past year with
service providers such as SystemDomain and technology providers
like OneLogin.
Its client list includes a diverse range of companies from Mayo
Clinic to Cargill.
Investors include Rally Ventures and ClearSky.
Most recent financing: $10M Series A (9/12/2019)
Total disclosed funding: $10M
Location: Newport, RI
54
Patch protection
55
Software vulnerabilities are overwhelming
The number of vulnerabilities in open-source software code has risen consistently over the last
several years. In June 2020, Microsoft disclosed 129 vulnerabilities — a record high — during its
monthly “Path Tuesday” update.
Source: ZDNet; Syxsense; Snyk; Outpost24
New vulnerabilities each year by open-source ecosystem Avg. number of days to patch vulnerability by industry
5656
“Managing updates on so many different
pieces of software, on so many systems,
can be overwhelming and effective updates
may slip through the cracks.”
- Peter Romness, Cisco Cybersecurity Solutions Lead - US Public Sector, 2019
Source: GovTech
57
Autonomous patching could help
Startups are creating tech for autonomously identifying and patching software vulnerabilities.
Companies with limited cybersecurity resources often look for software patching solutions that
reduce the associated administrative burden.
Automated
vulnerability
detection
Automated
vulnerability
management
On-premiseRemoteCloudVulnerability
patching across
environments
Autonomous vulnerability detection and patching
58
Patch protection
Automox offers tools for automating endpoint patching.
The product manages and applies operating system and software
patches through the cloud.
Automox was founded in 2015 and counts Greyhound, Yale
University, NASA, and Xerox among its customers.
The company announced a partnership with endpoint security
provider CrowdStrike in April 2020.
Investors include CRV, Koch Disruptive Technologies, and Blue
Note Ventures, among others.
Most recent financing: $30M Series B (1/31/2020)
Total disclosed funding: $43.3M
Location: Boulder, CO
ForAllSecure offers an autonomous tool for finding and resolving
software vulnerabilities.
The company uses a technique called “advanced fuzzing” to test
and detect software vulnerabilities in code.
ForAllSecure first demonstrated its technology in 2016 when it won
DARPA’s Cyber Grand Challenge. In May 2020, the company
announced it was awarded a contract up to $45M by the US
Department of Defense to secure its systems.
Investors include DARPA and New Enterprise Associates.
Most recent financing: $14.7M Unattributed VC (3/27/2019)
Total disclosed funding: $16.7M
Location: Pittsburgh, PA
59
Credential stuffing defense
60
Online fraud is automated and well-sourced
Companies and consumers face a mounting challenge of online fraud, or “credential
stuffing.” This type of attack occurs when a hacker purchases inexpensive user credentials
from past data breaches and automates the log-in process across hundreds of platforms.
Source: Bleeping Computer
Daily credential abuse from May to December 2018
6161
“Economic gain through theft, fraud, and deception.
One study estimates that cybercrime revenues hit
$1.5T in 2018. This is an entire shadow economy
larger than many legitimate nation-states.”
- Sumit Agarwal, former US deputy assistant secretary of defense, 2019
Source: TechRepublic
62
Startups are reducing economic incentives
By developing solutions to identify bots and create burdensome authentication processes for
them, startups are making credential stuffing more difficult and deterring hackers.
Breaking down a credential stuffing attack
Hacker Stolen credentials Bots Website
Startups identify malicious activity and add layers of complexity
to the authentication process, increasing the resources required
for the attack and diminishing the economic incentive.
Added steps
A hacker purchases
credentials on the dark web
Bots are used to automate the log-in
process with stolen credentials
Defense
63
Credential stuffing defense
Arkose Labs fights online fraud by detecting and thwarting
malicious web traffic.
The company uses risk-based profiling to uncover fraud and
creates an authentication process intended to eliminate the
economic incentives of credential stuffing.
Founded in 2016, the company counts several large companies
among its customers, including Electronic Arts and Microsoft. In
2019, it reported a 400% year-over-year increase in sales.
Investors include US Venture Partners, M12, and PayPal Ventures,
among others.
Most recent financing: $22M Series B (3/24/2020)
Total disclosed funding: $29.7M
Location: San Francisco, CA
Kasada helps protect against credential stuffing by identifying
automated web traffic or bots.
The company uses algorithms to detect signs of automation in
web traffic and assigns asymmetric cryptographic challenges to
the traffic deemed malicious.
Kasada was founded in 2015 and received In-Q-Tel’s first
investment in Australia. With new funding from Ten Eleven
Ventures, the company plans to expand into the US.
Investors include Ten Eleven Ventures, In-Q-Tel, and Reinventure,
among others.
Most recent disclosed financing: $10M Series B (6/16/2020)
Total disclosed funding: $16.7M
Location: New South Wales, Australia
64
Zero-trust networking
65
Networks cannot be trusted
Company networks that look to account for remote workers, connected devices, and cloud
technologies are vulnerable to attack. The users and assets using the network, therefore,
cannot be automatically trusted.
Networks are too complex to ensure security
Remote work Sophisticated attackers More users
More devicesCloud computing Limited cybersecurity resources
6666
“So the fact that you built an environment
where you’re trusting all of your insiders is
really not going to help you and not going to
allow you the capabilities that you need.”
- Grant Schneider, Senior Director for Cybersecurity Policy at National Security Council, 2020
Source: FedTech
67
A zero-trust approach reduces the risk of breach
Startups are developing cloud-based solutions for monitoring and authenticating traffic on
company networks. Access to data and resources is not assumed for users on the network —
instead, it must be validated.
Source: NIST
Zero-Trust Architecture Framework: Devices on the network must prove themselves trustworthy
68
Zero trust networking
Perimeter 81 delivers network security services like policy-based
segmentation and monitoring in the cloud.
Perimeter 81 was founded in 2018 by the creators of SaferVPN,
which was sold to J2 Global in 2019. In 2019, Perimeter 81
reportedly grew 450% and was included in Deloitte’s Technology
Fast 500™ for EMEA list.
Investors include Toba Capital, SonicWall, and Spring Ventures.
Most recent financing: $4.5M Series A (3/11/2020)
Total disclosed funding: $19.5M
Location: Tel Aviv, Israel
Zero Networks defines, enforces, and adapts network access
policies to create a zero-trust model.
The company was founded in 2019, and its network access
orchestrator became available in Q1’20.
Zero Networks was among 3 companies selected to present at the
2020 RSA conference’s Launch Pad event.
Investors include PICO Partners and F2 Capital, among others.
Most recent disclosed financing: $4.7M Series A (2/20/2020)
Total disclosed funding: $4.7M
Location: Tel Aviv, Israel
69
Bot-assisted defense
70
Cybersecurity needs more qualified people
There is a global shortage of qualified personnel available for employment in the cybersecurity
industry — estimates say the world is short roughly 4M cybersecurity professionals.
Source: (ISC)² Cybersecurity Workforce Study, 2019
Number of additional cybersecurity personnel needed around the world, 2019
7171
“Although automation and machine learning will
improve efficiency, human expertise, logical
thinking, and creativity will be further valued to
deploy and effectively use new technology, as
well as deter against emerging threats.”
- Caroline Wong, Chief Strategy Officer at Cobalt.io, 2020
Source: CIO
72
Bots empower cybersecurity professionals
Startups are offering bots to reduce the administrative burden placed on over stretched
cybersecurity professionals.
Automated tasks
Bots supporting cybersecurity
Data mapping
Customer support Incident diagnosis
Alert triage
Increased efficiency
Categorizing
and linking
sensitive data
Responding to internal
or external requests for
information Monitoring and
escalating alerts
based on context
Providing
explanations of
security events
73
Bot-assisted defense
Securiti.ai provides automated data privacy software.
The company offers an intelligent bot (Auti) to scan, identify, link,
and respond to question about personal data.
The company was launched in 2019 by cybersecurity veteran
Rehan Jalil, who previously led Symantec’s cloud security
business.
Securiti.ai was named most innovative startup at the 2020 RSA
conference.
Investors include Mayfield Fund and General Catalyst.
Most recent financing: $50M Series B (1/28/2020)
Total disclosed funding: $81M
Location: San Jose, CA
Respond leverages robotic decision automation technology to
provide companies with a bot that monitors and triages security
events.
Launched out of stealth in 2017, Respond was founded by Mike
Armistead, who previously created and sold cybersecurity
company Fortify to HP in 2010.
In 2020, the company announced a partnership with Agio. As part
of the deal, Agio will include Respond’s solution as part of its
product offering.
Investors include Foundation Capital, CRV, and ClearSky.
Most recent financing: $20M Series B (5/13/2019)
Total disclosed funding: $32M
Location: Mountain View, CA
74
Multi-cloud security
75
Companies embrace a multi-cloud environment
Companies moving to the cloud are often choosing to use multiple public cloud providers.
Some are also deciding to keep certain assets on a private cloud. These multi-cloud set ups
create administrative and security challenges.
Source: TechTarget
7676
“Security remains one of the biggest
concerns among multi-cloud users. The
larger the cloud environment, the greater
the potential for vulnerability.”
- Charles Phillips, Chairman of Infor’s Board of Directors, 2020
Source: Personal Blog
77
Startups are unifying security across clouds
Startups are rising to help enterprises protect their various cloud environments. By providing
visibility into the infrastructure across clouds, companies can identify security vulnerabilities
and maintain a unified security posture.
Single-Unified View
• Identities
• Privileges
• Activities/actions
• Assets
• Applications
• Configurations
AWS
Azure
Private cloud
Multi-cloud security via visibility and control
78
Multi-cloud security
CloudKnox monitors activity across multi-cloud environments.
It provides a single view across public and hybrid clouds to help
identify and resolve security violations.
CloudKnox takes an identity-based approach to cloud security,
ensuring only appropriate users gain access to cloud resources.
In 2019, the company was granted 2 patents for its access control
and threat identification technology.
Investors include ClearSky, Foundation Capital, and Dell
Technologies Capital, among others.
Most recent financing: $12M Series B (1/23/2020)
Total disclosed funding: $22.8M
Location: Sunnyvale, CA
Orca Security offers a tool for scanning multi-cloud environments.
The company provides visibility into cloud environments —
including AWS, Google Cloud, and Azure — at the workload level to
identify misconfigurations, malware, and other risks.
Founded in 2019 by former executives of Checkpoint Software, the
company reportedly plans to use its funding to double its
headcount by the end of 2020.
Investors include YL Ventures, GGV Capital, and Silicon Valley CISO
Investments.
Most recent financing: $20.5M Series A (5/5/2020)
Total disclosed funding: $27M
Location: Tel Aviv, Israel
79
Outsourced data protection
80
Personal data is abundant
Though valuable, data can represent a liability for companies. As data becomes increasingly
abundant, companies could become overwhelmed and attract the attention of hackers.
Source: TechTarget; Vox
1,900
The number of pieces of
personal information on the
Web per individual
Types of regulated personal data
8181
“Unshared data cannot be bought, sold,
shared, or hacked, but any data shared
is a liability for its owner and the
provider holding it.”
- Paul Mee and Rico Brandenburg, partners in Oliver Wyman’s cybersecurity practice, 2020
Source: MIT Sloan Management Review
82
Outsourced data protection reduces liability
Startups are offering solutions for enterprises to off-load the risk of sensitive data. These tools
enable companies to interact with the data without having to store or manage it.
Aliased data
Outsourced data protection
Customer provides personal information
(e.g., name, address, etc.)
Outsourced
Data vault
Company receives aliased or synthetic
data for processing/analysis
Company returns processed dataCustomer receives product/service
83
Outsourced data protection
Very Good Security holds sensitive data for companies and
provides access to the data without liability.
Founded in 2015, the company has entered partnerships with Visa,
Plaid, Amazon, and others to make its offering more accessible.
Investors include Andreesen Horowitz, Goldman Sachs, and Visa
Ventures, among others.
Most recent disclosed financing: $35M Series B (10/24/2020)
Total disclosed funding: $44.9M
Location: San Francisco, CA
Evervault is developing a data protection solution for developers.
The company’s API-based solution is intended to allow companies
to process personal data without seeing, storing, or handling it.
Despite not having a customer-ready product, Evervault has raised
funding from several prominent backers.
The company was founded in 2018 by the now 20-year old winner
of the BT Young Scientist Award, Shane Curran.
Investors include Sequoia Capital, Kleiner Perkins Caufield & Byers,
and Index Ventures, among others.
Most recent financing: $16M Series A (5/18/2020)
Total disclosed funding: $19.2M
Location: Dublin, Ireland
84
Container security
85
Companies are embracing containers
Containers are a tool for deploying software applications easily across computing
environments (e.g., on-premise to the cloud). While improving productivity, this
approach does introduce security concerns.
Source: Dzone
Container adoption timeline
8686
“The difference now is that containers, and the
microservices they provide, have exponentially
increased the surface area available for attack,
putting data at greater risk.”
- David Warburton, Senior Threat Research Evangelist, 2020
Source: Computer Weekly
87
Securing the container lifecycle
As with non-containerized applications, its crucial to secure containers from the point of
development through to execution. Many startups are developing security solutions specifically
for containers, whether its vulnerability scanning, access management, or runtime monitoring.
Build Ship Run
When building containers,
vulnerabilities (e.g.,
malware, exposed
information) must be
identified.
Once built, containers
ready for deployment
must be secured to
ensure only privileged
access.
Containers in operation
must be monitored to
protect against
malicious activity.
Container security lifecycle
88
Container security
Capsule8 offers an end-point protection solution, including attack
detection, response, and investigation for Linux production
environments on the cloud or on-premise.
Capsule8, founded in 2016, announced a partnership last year with
Google to provide runtime protection to users of its cloud platform.
Investors include Intel Capital, Bessemer Venture Partners, and
ClearSky, among others.
Most recent financing: $6.5M Series C (8/7/2019)
Total disclosed funding: $30M
Location: Brooklyn, NY
Anchore provides tools for inspecting container security and
compliance.
Tech entrepreneurs Saïd Ziouani and Daniel Nurmi, who sold
companies to Red Hat and HPE, respectively, founded Anchore in
2016.
In June 2020, the company was awarded a contract with the United
States Air Force to help secure software containers as part of a
DevSecOps workflow.
Investors include Menlo Ventures and SignalFire.
Most recent financing: $20M Series B (1/22/2020)
Total disclosed funding: $47.5M
Location: Santa Barbara, CA
89
Medical device security
90
Connected devices increase cyber risk
Hospitals are connecting equipment and devices to the internet for real-time visibility into
patient and machine health. If they are not protected, these sprawling networks could provide a
way in for hackers.
Source: L&T Services; Fierce Healthcare
82% of healthcare organizations
have experienced an IoT-focused
cyberattack
10 to 15 connected medical devices
per patient bed
$346,000 is the average cost an
IoT-focused attack
The connected hospital
9191
“While advanced devices can offer safer, more
convenient and timely health care delivery, a
medical device connected to a communications
network could have cybersecurity vulnerabilities
that could be exploited resulting in patient harm.”
- Dr. Amy P. Abernethy, M.D., Ph.D, Principal Deputy Commissioner of Food and Drugs, 2019
Source: FDA
92
Strengthening connected devices
Startups are aiming to help hospitals protect connected devices critical to delivering patient
care. Solutions that provide visibility into device activity could help mitigate attacks.
Identify devices
Monitor device activity
Manage security policies
Securing connected medical devices
Hospital
Provide alerts of
suspicious activity
93
Medical device security
Ordr uses machine learning to identify anomalous behavior across
a company’s network of connected devices.
The company was founded in 2015 by veterans of wireless
networking company Aruba Networks.
Investors include Kaiser Permanente Ventures, Battery Ventures,
and Mayo Clinic Ventures, among others.
Most recent disclosed financing: $2M Series B (3/5/2020)
Total disclosed funding: $50M
Location: Santa Clara, CA
Medigate monitors and enforces security policies on connected
devices across a company’s network.
Since its founding in 2017, Medigate has developed an ecosystem
of partners that includes electronic medical records (EMR)
provider Cerner and networking provider Cisco.
Investors include YL Ventures, US Venture Partners, and Blumberg
Capital.
Most recent financing: $15M Series A (1/29/2019)
Total disclosed funding: $20.4M
Location: New York, New York
9494
APPENDIX
2 0 2 0 C Y B E R D E F E N D E R S
9595
How the categories were selected: We used CB Insights data — including startup funding, media mentions, earnings call
transcripts, patents, and more — to identify our Cyber Defenders categories.
How the companies were selected: We used CB Insights' Mosaic Score to select our Cyber Defenders, which uses data
to track private company health based on metrics like recency of financing, total funding raised, and investor quality.
We’ve gathered this data via our machine learning technology (dubbed The Cruncher) as well as via several thousand
direct submissions from firms and individual professionals using The Editor.
The CB Insights Mosaic page walks through the factors considered in the algorithm.
M E T H O D O L O G Y

Mais conteúdo relacionado

Mais procurados

OurCrowd - NOAH19 Tel Aviv
OurCrowd - NOAH19 Tel AvivOurCrowd - NOAH19 Tel Aviv
OurCrowd - NOAH19 Tel AvivNOAH Advisors
 
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Sarin Yuok
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 
2015 Technlogy Initial Public Offering (IPO) Pipeline
2015 Technlogy Initial Public Offering (IPO) Pipeline2015 Technlogy Initial Public Offering (IPO) Pipeline
2015 Technlogy Initial Public Offering (IPO) PipelineHarsh Wardhan Dave
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorAccenture Insurance
 
Learn how to make money
Learn how to make moneyLearn how to make money
Learn how to make moneyyousifbasem
 
Is vc still a thing final
Is vc still a thing   finalIs vc still a thing   final
Is vc still a thing finalMark Suster
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Money 2Conf
 
CMO insights- IBM Institute for Business Value
CMO insights- IBM Institute for Business ValueCMO insights- IBM Institute for Business Value
CMO insights- IBM Institute for Business ValuePaul Writer
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&ANick Normile
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 

Mais procurados (17)

OurCrowd - NOAH19 Tel Aviv
OurCrowd - NOAH19 Tel AvivOurCrowd - NOAH19 Tel Aviv
OurCrowd - NOAH19 Tel Aviv
 
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
 
Security Market Update
Security Market UpdateSecurity Market Update
Security Market Update
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
2015 Technlogy Initial Public Offering (IPO) Pipeline
2015 Technlogy Initial Public Offering (IPO) Pipeline2015 Technlogy Initial Public Offering (IPO) Pipeline
2015 Technlogy Initial Public Offering (IPO) Pipeline
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 
Learn how to make money
Learn how to make moneyLearn how to make money
Learn how to make money
 
Is vc still a thing final
Is vc still a thing   finalIs vc still a thing   final
Is vc still a thing final
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
CMO insights- IBM Institute for Business Value
CMO insights- IBM Institute for Business ValueCMO insights- IBM Institute for Business Value
CMO insights- IBM Institute for Business Value
 
2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A2014-15 Cybersecurity Venture Funding and M&A
2014-15 Cybersecurity Venture Funding and M&A
 
0507 057 01 98 * Adana Klima Montaj Servisleri
0507 057 01 98 * Adana Klima Montaj Servisleri0507 057 01 98 * Adana Klima Montaj Servisleri
0507 057 01 98 * Adana Klima Montaj Servisleri
 
Esm slideshare ppt
Esm slideshare pptEsm slideshare ppt
Esm slideshare ppt
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
Twitter
TwitterTwitter
Twitter
 
Esm slideshare ppt
Esm slideshare pptEsm slideshare ppt
Esm slideshare ppt
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 

Semelhante a Cyber-Defenders-2020

Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfCIO Look Magazine
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseSophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampSophia Price
 

Semelhante a Cyber-Defenders-2020 (20)

Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdf
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
sc_can0315_28373
sc_can0315_28373sc_can0315_28373
sc_can0315_28373
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 

Mais de Takayuki Yamazaki

20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf
20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf
20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdfTakayuki Yamazaki
 
Jeff Bezos Live Interview Transcript
Jeff Bezos Live Interview TranscriptJeff Bezos Live Interview Transcript
Jeff Bezos Live Interview TranscriptTakayuki Yamazaki
 
5G AI the Ingredients for Next Gen Wireless Innovation
5G AI the Ingredients for Next Gen Wireless Innovation5G AI the Ingredients for Next Gen Wireless Innovation
5G AI the Ingredients for Next Gen Wireless InnovationTakayuki Yamazaki
 
Global Industry Vision 2025 Touching an Intelligent World
Global Industry Vision 2025 Touching an Intelligent WorldGlobal Industry Vision 2025 Touching an Intelligent World
Global Industry Vision 2025 Touching an Intelligent WorldTakayuki Yamazaki
 
Post Pandemic Technology Trends to Change Retail Industry
Post Pandemic Technology Trends to Change Retail IndustryPost Pandemic Technology Trends to Change Retail Industry
Post Pandemic Technology Trends to Change Retail IndustryTakayuki Yamazaki
 
AI and ML Trends to Impact Business 2020
AI and ML Trends to Impact Business 2020AI and ML Trends to Impact Business 2020
AI and ML Trends to Impact Business 2020Takayuki Yamazaki
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
 
Natural Language Processing Use Cases for Business Optimization
Natural Language Processing Use Cases for Business OptimizationNatural Language Processing Use Cases for Business Optimization
Natural Language Processing Use Cases for Business OptimizationTakayuki Yamazaki
 
中国インターネットトレンド2020年
中国インターネットトレンド2020年中国インターネットトレンド2020年
中国インターネットトレンド2020年Takayuki Yamazaki
 
業界という枠組みを超えた戦い
業界という枠組みを超えた戦い業界という枠組みを超えた戦い
業界という枠組みを超えた戦いTakayuki Yamazaki
 
2019年版中国インターネットレポート
2019年版中国インターネットレポート2019年版中国インターネットレポート
2019年版中国インターネットレポートTakayuki Yamazaki
 
Samsung Open Innovation 2016
Samsung Open Innovation 2016Samsung Open Innovation 2016
Samsung Open Innovation 2016Takayuki Yamazaki
 
スティーブ・ジョブスから得た教訓
スティーブ・ジョブスから得た教訓スティーブ・ジョブスから得た教訓
スティーブ・ジョブスから得た教訓Takayuki Yamazaki
 
オールイン・スタートアップ
オールイン・スタートアップオールイン・スタートアップ
オールイン・スタートアップTakayuki Yamazaki
 

Mais de Takayuki Yamazaki (20)

20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf
20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf
20240118_人型ロボット市場の動向(開発・社会実装の状況、主要企業リスト).pdf
 
Jeff Bezos Live Interview Transcript
Jeff Bezos Live Interview TranscriptJeff Bezos Live Interview Transcript
Jeff Bezos Live Interview Transcript
 
Healthcare Report Q2 2020
Healthcare Report Q2 2020Healthcare Report Q2 2020
Healthcare Report Q2 2020
 
Pitch Deck Contents Sample
Pitch Deck Contents SamplePitch Deck Contents Sample
Pitch Deck Contents Sample
 
5G AI the Ingredients for Next Gen Wireless Innovation
5G AI the Ingredients for Next Gen Wireless Innovation5G AI the Ingredients for Next Gen Wireless Innovation
5G AI the Ingredients for Next Gen Wireless Innovation
 
5G IoT Use Cases
5G IoT Use Cases5G IoT Use Cases
5G IoT Use Cases
 
Global Industry Vision 2025 Touching an Intelligent World
Global Industry Vision 2025 Touching an Intelligent WorldGlobal Industry Vision 2025 Touching an Intelligent World
Global Industry Vision 2025 Touching an Intelligent World
 
Tech Trends 2020
Tech Trends 2020Tech Trends 2020
Tech Trends 2020
 
Healthcare Report Q1 2020
Healthcare Report Q1 2020Healthcare Report Q1 2020
Healthcare Report Q1 2020
 
MoneyTree Report Q2 2020
MoneyTree Report Q2 2020MoneyTree Report Q2 2020
MoneyTree Report Q2 2020
 
Post Pandemic Technology Trends to Change Retail Industry
Post Pandemic Technology Trends to Change Retail IndustryPost Pandemic Technology Trends to Change Retail Industry
Post Pandemic Technology Trends to Change Retail Industry
 
AI and ML Trends to Impact Business 2020
AI and ML Trends to Impact Business 2020AI and ML Trends to Impact Business 2020
AI and ML Trends to Impact Business 2020
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
 
Natural Language Processing Use Cases for Business Optimization
Natural Language Processing Use Cases for Business OptimizationNatural Language Processing Use Cases for Business Optimization
Natural Language Processing Use Cases for Business Optimization
 
中国インターネットトレンド2020年
中国インターネットトレンド2020年中国インターネットトレンド2020年
中国インターネットトレンド2020年
 
業界という枠組みを超えた戦い
業界という枠組みを超えた戦い業界という枠組みを超えた戦い
業界という枠組みを超えた戦い
 
2019年版中国インターネットレポート
2019年版中国インターネットレポート2019年版中国インターネットレポート
2019年版中国インターネットレポート
 
Samsung Open Innovation 2016
Samsung Open Innovation 2016Samsung Open Innovation 2016
Samsung Open Innovation 2016
 
スティーブ・ジョブスから得た教訓
スティーブ・ジョブスから得た教訓スティーブ・ジョブスから得た教訓
スティーブ・ジョブスから得た教訓
 
オールイン・スタートアップ
オールイン・スタートアップオールイン・スタートアップ
オールイン・スタートアップ
 

Último

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 

Último (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Cyber-Defenders-2020

  • 1. 1 This year’s trends, opportunities, and high-momentum startups with the potential to shape the future of cybersecurity 2020 Cyber Defenders
  • 2. 3 SIGN UP FOR A FREE TRIAL CB Insights helps the world’s leading companies make smarter technology decisions with data, not opinion. Our Technology Insights Platform provides companies with comprehensive data, expert insights and work management tools to drive growth and improve operations with technology. WHAT IS CB INSIGHTS?
  • 3. 4 CB Insights helps us compress our time- to-decision when gathering and analyzing data and getting an external view on what's happening in the market so we can quickly take action. Meraj Mohammad Vice President, Ventures Group, ADP
  • 4. 3 Contents 1 2 2 0 2 1 9 5 Cybersecurity funding trends Cyber Defender categories 2020 Cyber Defenders Appendix & Methodology
  • 5. 44 Over 7,000 data breaches were reported in 2019. Protecting customer data weighs on corporations, which are facing increasingly sophisticated cyber attacks. C Y B E R S E C U R I T Y I S T O P O F M I N D Source: Risk Based Security
  • 6. 55 C Y B E R I N S E C U R I T Y I S F E L T A C R O S S I N D U S T R I E S N U M B E R O F D A T A B R E A C H E S B Y E C O N O M I C S E C T O R I N 2 0 1 9 55 70 103 197 256 280 348 375 435 512 614 0 150 300 450 600 750 Transport & Storage Admin & Support Other Services Manufacturing Education Professional/Scientific Services Public Administration Retail Finance & Insurance Healthcare Information Technology Number of breaches Source: Risk Based Security
  • 7. 66 C O N S I S T E N T T A L K O F C Y B E R S E C U R I T Y A M O N G T H E C - S U I T E N U M B E R O F E A R N I N G S C A L L S M E N T I O N S O F “ C Y B E R S E C U R I T Y ” Q 3 ’ 1 5 – Q 1 ’ 2 0 150 100 50 0 Number of mentions 2016 2017 2018 2019 2020 “cybersecurity” 200 Source: CB Insights
  • 8. 77 “So, you never know, the bad guys are continuing to invest as much as the good guys. And we got to stay out ahead of it. We got to remain vigilant.” - Alfred Kelly, CEO Visa, Q3’19 earnings call
  • 9. 88 The next generation of cybersecurity startups is rising to meet the threats and challenges of today’s cybersecurity landscape. C H A L L E N G E S = O P P O R T U N I T I E S
  • 10. 99 Our selected startups are early- to mid-stage, high-momentum companies pioneering technology with the potential to transform cybersecurity. Unicorns valued at $1B+, companies that have raised funding past the Series C stage, and companies that have not raised funding since 2018 are excluded. W H A T M A K E S A C Y B E R D E F E N D E R ?
  • 11. 10 But first, some funding trends…
  • 12. 11 C Y B E R S E C U R I T Y Global equity funding trends
  • 13. 12 Cybersecurity funding and deals hit record highs Annual global cybersecurity deals and financing 2015 – 2019 D E A L A C T I V I T Y I S R I S I N G 2016 2017 2018 20192015 Amount of funding ($M) $10,000M $8,000M $6,000M $4,000M $0 Number of deals 800 600 400 561 200 473 676 717 770 4437 4482 8821 7365 9955 $2,000M
  • 14. 13 VC interest in cybersecurity persists Annual number of investments in cybersecurity by investor type, 2015 – 2019 V E N T U R E C A P I T A L I N V E S T M E N T G R O W S 66 98 105 139 123 36 59 61 80 73 367 438 503 534 564 0 100 200 300 400 500 600 2015 2016 2017 2018 2019 Private equity Corporate venture capital (CVC) Venture capital Numberofdeals
  • 15. 14 Ten Eleven, Lightspeed, and Accel top rankings Most active investors in cybersecurity startups by type for 2019 M O S T A C T I V E I N V E S T O R S VC CVC PE *Ten Eleven, Lightspeed, and Accel each made 10 investments. * * *
  • 16. 15 IPOs and acquisitions up from 2018 Annual number of cybersecurity company exits through either M&A or IPO, 2015 – 2019 E X I T S R E A C H A N A L L - T I M E H I G H 2016 2017 2018 20192015 Numberofexits 282 223 182 142 154 8 8 7 10 15 0 50 100 150 250 200 Notable IPOs Cloudflare Ping Identity CrowdStrike Pager Duty 300
  • 17. 16 Late-stage investments increase Annual deal share by stage of investments in private cybersecurity companies, 2015 – 2019 L A T E - S T A G E D E A L S R E A C H F I V E Y E A R H I G H I N 2 0 1 9 2015 2016 2017 2018 2019 0% 50% 100% 4% 5% 5% 5% 4% 4% 4% 4% 4%4% Note: Early-stage deals include Seed/Angel and Series A rounds; mid-stage deals include Series B and Series C rounds; late-stage deals are Series D+ rounds.
  • 18. 17 China surpasses Israel and the UK in deal share Cybersecurity global deal share by country, 2015 – 2019 C H I N A ' S C Y B E R S E C U R I T Y S P A C E I S G R O W I N G 58% 18% 9% 7% 6% United States Other Israel United Kingdom China Canada
  • 19. 18 Number of cybersecurity unicorns doubles to 16 Private cybersecurity companies valued at $1B+ as of 6/01/2020: P R I V A T E M A R K E T L E A D E R S CHINA UNITED STATES EUROPE Note: There were 8 cybersecurity unicorns as of 3/21/2019.
  • 20. 19 This year’s Cyber Defender categories Disinformation detection Decentralized digital identities Password-less verification Privacy by design Anomalous behavior detection Multi-cloud security Patch protection Protecting companies’ reputations from online disinformation attacks Online identities secured with distributed ledger technology Technologies replacing the need for traditional password authentication Protecting companies from compliance risk at the data level and up Detecting anomalous behavior with machine learning technology Providing visibility and security across multiple cloud deployments Automating the identification and resolution of software vulnerabilities Medical device security Securing the devices used in healthcare settings and patients Third-party risk management Mitigating security threats from vendors and other third parties Credential stuffing defense Defending web assets and users from the abuse of stolen credentials Zero-trust networking Enforcing least privileged access to secure networks Bot-assisted defense Using bots to fulfill security tasks and reduce cyber personnel resources Outsourced data protection Offering data protection to enterprises as a service Container security Monitoring threats in containers
  • 21. 20 The 2020 Cyber Defenders Disinformation detection Decentralized digital identities Password-less verification Privacy by design Anomalous behavior detection Multi-cloud security Patch protection Medical device security Third-party risk management Credential stuffing defense Zero-trust networking Bot-assisted defense Outsourced data protection Container security
  • 22. 21 The US has the most Cyber Defenders 75% of the 2020 Cyber Defenders are headquartered in the US — mostly in California. The next highest concentration of Cyber Defenders is in Israel. The United Kingdom, Japan, Ireland, and Australia each have one Cyber Defender.
  • 23. 22 2020 Cyber Defenders Expert Collection on CBI Visit the Cyber Defenders 2020 collection on the CB Insights platform CBI Cyber Defenders 2020 Track all of the startups in this presentation and many more on our platform using CB Insights’ Collections. Create dynamic market landscapes, collaborate within and beyond your organization, seamlessly manage what new areas the team needs to have on their radar when making growth decisions.
  • 24. 23
  • 26. 25 Disinformation campaigns are on the rise Bot technology and ease of access to social media and other online platforms enable quick, inexpensive creation of disinformation campaigns. Source: The Global Disinformation Order 2019 Global Inventory of Organised Social Media Manipulation Number of countries where a disinformation campaign originated, 2017-2019 Mode of distribution by country
  • 27. 2626 “Anonymous bad actors frequently spread false or misleading claims about a targeted stock via blogs, forums, social media, bot networks, or spam. These campaigns seek to either artificially increase the stock’s price…or lower it…for quick profit.” - Jon Bateman, Cyber Policy Fellow at the Carnegie Endowment for International Peace, 2020 Source: Carnegie Endowment for International Peace
  • 28. 27 Identify disinformation early to disrupt the chain Startups monitoring brands across online platforms help companies thwart or respond to disinformation before it has the chance to spread. Source: Department of Homeland Security
  • 29. 28 Disinformation detection Astroscreen uses machine learning to detect disinformation. The company monitors social media to identify bots, coordinated disinformation campaigns, and anomalous behavior or content. Astroscreen was founded in 2018 by media entrepreneur Ali Tehrani and researcher Juan Echeverria, who discovered a 350,000 automated account botnet on Twitter in 2017. Investors include Cyber London Accelerator, AI Seed, and Speedinvest, among others. Most recent financing: Seed (9/14/2019) Total disclosed funding: $1M Location: London, United Kingdom Yonder tracks internet factions responsible for creating disinformation. Monitoring conversations across the internet from Twitter to message boards to the dark web, Yonder’s platform identifies disinformation threats to a company’s brand. The company launched in 2017 to help governments identify foreign, malicious factions. It now helps companies monitor online risk, counting Walmart, Viacom, and others among its customers. Investors include Lux Capital, GGV Capital, and BuildGroup Management, among others. Most recent financing: $3M Series A (7/30/2019) Total disclosed funding: $17.9M Location: Austin, TX
  • 31. 30 Digital transactions can be costly From conversations to shopping to banking, people’s lives are moving online and leaving behind a digital footprint. Without a seamless and secure process for authenticating these disparate transactions, there’s a risk for cybercrime. Source: Insurance Information Institute; Internet Crime Complaint Center Number of cybercrimes in the United States 2015 – 2019 Includes $280M in identity theft and personal data breach losses
  • 32. 3131 “Identity is a hard problem, but it’s by no means an impossible problem. Plus, how imperfect is the current system? It’s entirely broken.” - Emin Gün Sirer, Co-Director, Initiative for Cryptocurrencies and Smart Contracts, Cornell University, 2019 Source: Wired
  • 33. 32 Digital ledger tech adds security and privacy Digital ledger technology creates a system of authentication keys with the aim of letting an individual retain control over their identity and to reduce the risk of identity theft. Source: Citi Ventures Decentralized system of identification
  • 34. 33 Decentralized digital identities Bitkey provides distributed key technology. The company is developing a digital key platform to manage individual online authentication. Founded in August 2018, Bitkey offers its distributed ledger technology to users as a subscription. It currently supports applications such as smart lock technology, where a digital key is used to unlock the door to a hotel room or home. Investors include Goldman Sachs, Global Brain Corporation, and 31VENTURES, among others. Most recent financing: $11.3M Series A (1/24/2020) Total disclosed funding: $57M Location: Tokyo, Japan Evernym is an open-source provider of decentralized identity software. The company offers 3 main products that support the issuance, verification, and storage of digital credentials. Evernym created the Sovrin Foundation in 2016 to serve as the public ledger infrastructure and to support the adoption of decentralized identity solutions. The company also created an open-source codebase called Hyperledger Indy, as well as identifier standards in collaboration with the W3C Credentials Community Group. Investors include Barclays Ventures, Medici Ventures, and Alumni Ventures Group, among others. Most recent financing: $6M Seed (9/26/2019) Total disclosed funding: $15.3M Location: Draper, UT
  • 36. 35 Passwords are burdensome and insecure Source: Microsoft, Lastpass Passwords and secondary authentication measures burden customers and employees while simultaneously representing a security risk for companies. 57% of businesses globally use multi-factor authentication Password security vs. convenience 80% of hacking-related breaches involve stolen and reused credentials
  • 37. 3636 “Over time, market forces will make the password less and less interesting, less viable, and less effective.” - Brett McDowell, Executive Director, The FIDO Alliance, 2019 Source: The Verge
  • 38. 37 Passwords can be replaced Startups are looking to deliver secure alternatives to passwords that improve the user experience. End user/device Authentication/verification Access The properties of the device or user (e.g., certificates, biometrics) can serve as means of identification. AI-enabled technologies, such as facial or voice recognition, improve the efficacy of verification. Password alternatives create a more secure and seamless process for accessing accounts and resources. A password-less verification process
  • 39. 38 Password-less verification Beyond Identity aims to eliminate the need for passwords with personal certificates. The company extends the chain of trust, or transit layer security, from the web to end users and devices with personal certificates. Founded by serial entrepreneur Jim Clark and technology veteran Tom Jermoluk, Beyond Identity’s self-signed X.509 certificates verify device security with the aim of removing the need for a password. Investors include New Enterprise Associates and Koch Disruptive Technologies. Most recent financing: $30M Series A (4/8/2020) Total disclosed funding: $30M Location: New York, NY Passbase provides identification verification software, including tools for embedding document and biometric verification capabilities into corporate applications. The company offers its solution as an API with scaled verification methods like SMS, biometric login, and liveliness detection to meet risk requirements. Investors include Cowboy Ventures, Kleiner Perkins Caufield & Byers, and Alphabet, among others. Most recent financing: $3.6M Seed (9/25/2019) Total disclosed funding: $4.2M Location: San Francisco, CA
  • 41. 40 Storing and using personal data is risky for companies Collecting, storing, and using personally identifiable data has regulatory risk (e.g., GDPR and the California Consumer Privacy Act), security risk, and reputation risk, with consumers skeptical of how companies use the data. Source: Cisco; Reuters; IBM 67% of consumers noted they would act (e.g., shop elsewhere) to protect their data $3.9M: average cost of a data breach in 2019 Google was fined $57M in 2019 for improper disclosure of customer data usage Risks associated with personal data Regulatory Reputation Security
  • 42. 4141 “Instead of thinking like ‘data owners,’ companies must act as ‘data custodians’ who protect personal information and use it only with a customer’s best interests in mind” - Fredrick “Flee” Lee, chief information security officer at Gusto, 2020 Source: HBR
  • 43. 42 Privacy-first solutions are emerging Privacy-focused solutions have entered the market to support companies hit by a wave of personal data, breaches, and regulation. From data ingestion to user data requests, new solutions are supporting a privacy-by-design approach. Privacy-first data solutions Consent management Data ingestion Data management Data usage Regulatory compliance Personal data mapping and protection Data anonymization/ de-identification Automated data subject request fulfillment Tools for collecting and managing user consent of data collection and usage Tools for identifying and mapping personal data across channels and ensuring adequate protection Tools that enable the use or analysis of data without exposing user identity Tools that help companies comply with regulations that require users have access to their data
  • 44. 43 Privacy by design Transcend is a data privacy company that aims to help users control their data. It offers companies tools to comply with privacy regulations and build trust with customers. Founded in 2017, Transcend’s privacy center offering supports data subject requests (DSR) and consent management to support customers control how their personal data is used. The company counts Robinhood and Patreon among its customers. Investors include Index Ventures and Accel. Most recent financing: $25M Series A (6/10/2020) Total disclosed funding: $29M Location: San Francisco, CA Concentric provides a data discovery, monitoring, and mapping solution that classifies unstructured data. Concentric finds personally identifiable information to help fulfill regulatory requirements and avoid reputation-damaging data breaches or disclosures. Investors include Homebrew, Clear Ventures, and Engineering Capital, among others. Most recent financing: $7.5M Series A (1/29/2020) Total disclosed funding: $7.5M Location: San Jose, CA
  • 46. 45 Humans are the ultimate security threat Cybersecurity protects computer systems and networks from harm. However, human behavior is an unknown variable in cybersecurity. Employees who maliciously or inadvertently share sensitive information or enable access to company systems pose an inside threat. Source: McKinsey Insider threat is a factor in 50% of breaches
  • 47. 4646 “…it’s almost always human error that enables attackers to access encrypted channels and sensitive information. Staff can make a variety of mistakes that put their company’s data or systems at risk.” - Oz Alashe, CEO of CybSafe, 2020 Source: Infosecurity Magazine
  • 48. 47 Analyzing human behavior offers a defense Advances in machine learning and access to massive datasets provide insight into normal and abnormal human behavior. Identifying abnormal behavior — inside or outside the company— allows companies to direct their resources to correcting behaviors or mitigating threats. AI-enabled behavioral defense Inputs AI Model Output • Relationship data • Location data • User data (e.g., biometrics) • Event data Trained machine learning models ingest the different data sources to identify abnormalities in behavior. The AI model’s classification of behavior can automate remediation of the expected threat.
  • 49. 48 Anomalous behavior detection Abnormal Security is an email security provider. The company uses machine learning technology to analyze email content and context to help prevent email attacks, such as phishing. Abnormal Security was founded in 2018 by two former Twitter employees. In 2019, the company appointed a chief product officer and chief revenue officer from Amazon and Proofpoint, respectively. Investors include Greylock Partners. Most recent financing: $24M Series A (11/18/2019) Total disclosed funding: $24M Location: San Francisco, CA Awake is a network traffic security company. It monitors users, devices, and applications across a network to understand their behavior and detect and respond to threats. The company was launched in 2014 by three cybersecurity veterans coming from McAfee, HP, and Cylance. Since its founding, the company has filed several patents for detecting malicious activity. Investors include Greylock Partners, Bain Capital, and Liberty Global Ventures, among others. Most recent financing: $36M Series C (4/15/2020) Total disclosed funding: $67.2M Location: Santa Clara, CA
  • 51. 50 Threats extend down the supply chain Many companies rely on third parties — like contractors, vendors, and consultants — to deliver final products to customers. Exchanging information or providing network access to third parties with inferior security practices represents a vulnerability. Source: Normshield; Becker’s Health IT Notable data breaches caused by a third party Only 15% of these vendors informed impacted parties of the breach 44% of data breaches are caused by a third party
  • 52. 5151 “The implications [of third-party breaches] are stark and the potential impacts very real.” - Steve Durbin, managing director of the Information Security Forum, 2019 Source: WSJ
  • 53. 52 A new way to manage third-party access To help reduce third-party risk, startups are developing solutions for managing access to corporate systems and data as well as on-boarding and off-boarding. These new solutions will augment or replace the traditional approach to risk management. Old model Employee Contractor Supplier New model Thirdparty management Corporate resources Indiscriminate access to shared corporate resources once approved Segmentation by role and controlled access to corporate resources
  • 54. 53 Third-party risk management Axis Security uses technology to give third-party users secure access to private, company applications without risk of compromising the network. Founders Dor Knafo and Gil Azrielant started Axis Security in 2018, having both come from Israel’s military cybersecurity unit. In April 2020, the company announced a partner program and its first partner, value-added reseller BlackLake Security. Investors include Ten Eleven Ventures and CyberStarts, among others. Most recent financing: $14M Series A (3/17/2020) Total disclosed funding: $17M Location: San Mateo, CA SecZetta provides third-party identity management. The company offers a system of record for third parties that can manage user privileges and vendor certification. SecZetta announced several partnerships in the past year with service providers such as SystemDomain and technology providers like OneLogin. Its client list includes a diverse range of companies from Mayo Clinic to Cargill. Investors include Rally Ventures and ClearSky. Most recent financing: $10M Series A (9/12/2019) Total disclosed funding: $10M Location: Newport, RI
  • 56. 55 Software vulnerabilities are overwhelming The number of vulnerabilities in open-source software code has risen consistently over the last several years. In June 2020, Microsoft disclosed 129 vulnerabilities — a record high — during its monthly “Path Tuesday” update. Source: ZDNet; Syxsense; Snyk; Outpost24 New vulnerabilities each year by open-source ecosystem Avg. number of days to patch vulnerability by industry
  • 57. 5656 “Managing updates on so many different pieces of software, on so many systems, can be overwhelming and effective updates may slip through the cracks.” - Peter Romness, Cisco Cybersecurity Solutions Lead - US Public Sector, 2019 Source: GovTech
  • 58. 57 Autonomous patching could help Startups are creating tech for autonomously identifying and patching software vulnerabilities. Companies with limited cybersecurity resources often look for software patching solutions that reduce the associated administrative burden. Automated vulnerability detection Automated vulnerability management On-premiseRemoteCloudVulnerability patching across environments Autonomous vulnerability detection and patching
  • 59. 58 Patch protection Automox offers tools for automating endpoint patching. The product manages and applies operating system and software patches through the cloud. Automox was founded in 2015 and counts Greyhound, Yale University, NASA, and Xerox among its customers. The company announced a partnership with endpoint security provider CrowdStrike in April 2020. Investors include CRV, Koch Disruptive Technologies, and Blue Note Ventures, among others. Most recent financing: $30M Series B (1/31/2020) Total disclosed funding: $43.3M Location: Boulder, CO ForAllSecure offers an autonomous tool for finding and resolving software vulnerabilities. The company uses a technique called “advanced fuzzing” to test and detect software vulnerabilities in code. ForAllSecure first demonstrated its technology in 2016 when it won DARPA’s Cyber Grand Challenge. In May 2020, the company announced it was awarded a contract up to $45M by the US Department of Defense to secure its systems. Investors include DARPA and New Enterprise Associates. Most recent financing: $14.7M Unattributed VC (3/27/2019) Total disclosed funding: $16.7M Location: Pittsburgh, PA
  • 61. 60 Online fraud is automated and well-sourced Companies and consumers face a mounting challenge of online fraud, or “credential stuffing.” This type of attack occurs when a hacker purchases inexpensive user credentials from past data breaches and automates the log-in process across hundreds of platforms. Source: Bleeping Computer Daily credential abuse from May to December 2018
  • 62. 6161 “Economic gain through theft, fraud, and deception. One study estimates that cybercrime revenues hit $1.5T in 2018. This is an entire shadow economy larger than many legitimate nation-states.” - Sumit Agarwal, former US deputy assistant secretary of defense, 2019 Source: TechRepublic
  • 63. 62 Startups are reducing economic incentives By developing solutions to identify bots and create burdensome authentication processes for them, startups are making credential stuffing more difficult and deterring hackers. Breaking down a credential stuffing attack Hacker Stolen credentials Bots Website Startups identify malicious activity and add layers of complexity to the authentication process, increasing the resources required for the attack and diminishing the economic incentive. Added steps A hacker purchases credentials on the dark web Bots are used to automate the log-in process with stolen credentials Defense
  • 64. 63 Credential stuffing defense Arkose Labs fights online fraud by detecting and thwarting malicious web traffic. The company uses risk-based profiling to uncover fraud and creates an authentication process intended to eliminate the economic incentives of credential stuffing. Founded in 2016, the company counts several large companies among its customers, including Electronic Arts and Microsoft. In 2019, it reported a 400% year-over-year increase in sales. Investors include US Venture Partners, M12, and PayPal Ventures, among others. Most recent financing: $22M Series B (3/24/2020) Total disclosed funding: $29.7M Location: San Francisco, CA Kasada helps protect against credential stuffing by identifying automated web traffic or bots. The company uses algorithms to detect signs of automation in web traffic and assigns asymmetric cryptographic challenges to the traffic deemed malicious. Kasada was founded in 2015 and received In-Q-Tel’s first investment in Australia. With new funding from Ten Eleven Ventures, the company plans to expand into the US. Investors include Ten Eleven Ventures, In-Q-Tel, and Reinventure, among others. Most recent disclosed financing: $10M Series B (6/16/2020) Total disclosed funding: $16.7M Location: New South Wales, Australia
  • 66. 65 Networks cannot be trusted Company networks that look to account for remote workers, connected devices, and cloud technologies are vulnerable to attack. The users and assets using the network, therefore, cannot be automatically trusted. Networks are too complex to ensure security Remote work Sophisticated attackers More users More devicesCloud computing Limited cybersecurity resources
  • 67. 6666 “So the fact that you built an environment where you’re trusting all of your insiders is really not going to help you and not going to allow you the capabilities that you need.” - Grant Schneider, Senior Director for Cybersecurity Policy at National Security Council, 2020 Source: FedTech
  • 68. 67 A zero-trust approach reduces the risk of breach Startups are developing cloud-based solutions for monitoring and authenticating traffic on company networks. Access to data and resources is not assumed for users on the network — instead, it must be validated. Source: NIST Zero-Trust Architecture Framework: Devices on the network must prove themselves trustworthy
  • 69. 68 Zero trust networking Perimeter 81 delivers network security services like policy-based segmentation and monitoring in the cloud. Perimeter 81 was founded in 2018 by the creators of SaferVPN, which was sold to J2 Global in 2019. In 2019, Perimeter 81 reportedly grew 450% and was included in Deloitte’s Technology Fast 500™ for EMEA list. Investors include Toba Capital, SonicWall, and Spring Ventures. Most recent financing: $4.5M Series A (3/11/2020) Total disclosed funding: $19.5M Location: Tel Aviv, Israel Zero Networks defines, enforces, and adapts network access policies to create a zero-trust model. The company was founded in 2019, and its network access orchestrator became available in Q1’20. Zero Networks was among 3 companies selected to present at the 2020 RSA conference’s Launch Pad event. Investors include PICO Partners and F2 Capital, among others. Most recent disclosed financing: $4.7M Series A (2/20/2020) Total disclosed funding: $4.7M Location: Tel Aviv, Israel
  • 71. 70 Cybersecurity needs more qualified people There is a global shortage of qualified personnel available for employment in the cybersecurity industry — estimates say the world is short roughly 4M cybersecurity professionals. Source: (ISC)² Cybersecurity Workforce Study, 2019 Number of additional cybersecurity personnel needed around the world, 2019
  • 72. 7171 “Although automation and machine learning will improve efficiency, human expertise, logical thinking, and creativity will be further valued to deploy and effectively use new technology, as well as deter against emerging threats.” - Caroline Wong, Chief Strategy Officer at Cobalt.io, 2020 Source: CIO
  • 73. 72 Bots empower cybersecurity professionals Startups are offering bots to reduce the administrative burden placed on over stretched cybersecurity professionals. Automated tasks Bots supporting cybersecurity Data mapping Customer support Incident diagnosis Alert triage Increased efficiency Categorizing and linking sensitive data Responding to internal or external requests for information Monitoring and escalating alerts based on context Providing explanations of security events
  • 74. 73 Bot-assisted defense Securiti.ai provides automated data privacy software. The company offers an intelligent bot (Auti) to scan, identify, link, and respond to question about personal data. The company was launched in 2019 by cybersecurity veteran Rehan Jalil, who previously led Symantec’s cloud security business. Securiti.ai was named most innovative startup at the 2020 RSA conference. Investors include Mayfield Fund and General Catalyst. Most recent financing: $50M Series B (1/28/2020) Total disclosed funding: $81M Location: San Jose, CA Respond leverages robotic decision automation technology to provide companies with a bot that monitors and triages security events. Launched out of stealth in 2017, Respond was founded by Mike Armistead, who previously created and sold cybersecurity company Fortify to HP in 2010. In 2020, the company announced a partnership with Agio. As part of the deal, Agio will include Respond’s solution as part of its product offering. Investors include Foundation Capital, CRV, and ClearSky. Most recent financing: $20M Series B (5/13/2019) Total disclosed funding: $32M Location: Mountain View, CA
  • 76. 75 Companies embrace a multi-cloud environment Companies moving to the cloud are often choosing to use multiple public cloud providers. Some are also deciding to keep certain assets on a private cloud. These multi-cloud set ups create administrative and security challenges. Source: TechTarget
  • 77. 7676 “Security remains one of the biggest concerns among multi-cloud users. The larger the cloud environment, the greater the potential for vulnerability.” - Charles Phillips, Chairman of Infor’s Board of Directors, 2020 Source: Personal Blog
  • 78. 77 Startups are unifying security across clouds Startups are rising to help enterprises protect their various cloud environments. By providing visibility into the infrastructure across clouds, companies can identify security vulnerabilities and maintain a unified security posture. Single-Unified View • Identities • Privileges • Activities/actions • Assets • Applications • Configurations AWS Azure Private cloud Multi-cloud security via visibility and control
  • 79. 78 Multi-cloud security CloudKnox monitors activity across multi-cloud environments. It provides a single view across public and hybrid clouds to help identify and resolve security violations. CloudKnox takes an identity-based approach to cloud security, ensuring only appropriate users gain access to cloud resources. In 2019, the company was granted 2 patents for its access control and threat identification technology. Investors include ClearSky, Foundation Capital, and Dell Technologies Capital, among others. Most recent financing: $12M Series B (1/23/2020) Total disclosed funding: $22.8M Location: Sunnyvale, CA Orca Security offers a tool for scanning multi-cloud environments. The company provides visibility into cloud environments — including AWS, Google Cloud, and Azure — at the workload level to identify misconfigurations, malware, and other risks. Founded in 2019 by former executives of Checkpoint Software, the company reportedly plans to use its funding to double its headcount by the end of 2020. Investors include YL Ventures, GGV Capital, and Silicon Valley CISO Investments. Most recent financing: $20.5M Series A (5/5/2020) Total disclosed funding: $27M Location: Tel Aviv, Israel
  • 81. 80 Personal data is abundant Though valuable, data can represent a liability for companies. As data becomes increasingly abundant, companies could become overwhelmed and attract the attention of hackers. Source: TechTarget; Vox 1,900 The number of pieces of personal information on the Web per individual Types of regulated personal data
  • 82. 8181 “Unshared data cannot be bought, sold, shared, or hacked, but any data shared is a liability for its owner and the provider holding it.” - Paul Mee and Rico Brandenburg, partners in Oliver Wyman’s cybersecurity practice, 2020 Source: MIT Sloan Management Review
  • 83. 82 Outsourced data protection reduces liability Startups are offering solutions for enterprises to off-load the risk of sensitive data. These tools enable companies to interact with the data without having to store or manage it. Aliased data Outsourced data protection Customer provides personal information (e.g., name, address, etc.) Outsourced Data vault Company receives aliased or synthetic data for processing/analysis Company returns processed dataCustomer receives product/service
  • 84. 83 Outsourced data protection Very Good Security holds sensitive data for companies and provides access to the data without liability. Founded in 2015, the company has entered partnerships with Visa, Plaid, Amazon, and others to make its offering more accessible. Investors include Andreesen Horowitz, Goldman Sachs, and Visa Ventures, among others. Most recent disclosed financing: $35M Series B (10/24/2020) Total disclosed funding: $44.9M Location: San Francisco, CA Evervault is developing a data protection solution for developers. The company’s API-based solution is intended to allow companies to process personal data without seeing, storing, or handling it. Despite not having a customer-ready product, Evervault has raised funding from several prominent backers. The company was founded in 2018 by the now 20-year old winner of the BT Young Scientist Award, Shane Curran. Investors include Sequoia Capital, Kleiner Perkins Caufield & Byers, and Index Ventures, among others. Most recent financing: $16M Series A (5/18/2020) Total disclosed funding: $19.2M Location: Dublin, Ireland
  • 86. 85 Companies are embracing containers Containers are a tool for deploying software applications easily across computing environments (e.g., on-premise to the cloud). While improving productivity, this approach does introduce security concerns. Source: Dzone Container adoption timeline
  • 87. 8686 “The difference now is that containers, and the microservices they provide, have exponentially increased the surface area available for attack, putting data at greater risk.” - David Warburton, Senior Threat Research Evangelist, 2020 Source: Computer Weekly
  • 88. 87 Securing the container lifecycle As with non-containerized applications, its crucial to secure containers from the point of development through to execution. Many startups are developing security solutions specifically for containers, whether its vulnerability scanning, access management, or runtime monitoring. Build Ship Run When building containers, vulnerabilities (e.g., malware, exposed information) must be identified. Once built, containers ready for deployment must be secured to ensure only privileged access. Containers in operation must be monitored to protect against malicious activity. Container security lifecycle
  • 89. 88 Container security Capsule8 offers an end-point protection solution, including attack detection, response, and investigation for Linux production environments on the cloud or on-premise. Capsule8, founded in 2016, announced a partnership last year with Google to provide runtime protection to users of its cloud platform. Investors include Intel Capital, Bessemer Venture Partners, and ClearSky, among others. Most recent financing: $6.5M Series C (8/7/2019) Total disclosed funding: $30M Location: Brooklyn, NY Anchore provides tools for inspecting container security and compliance. Tech entrepreneurs Saïd Ziouani and Daniel Nurmi, who sold companies to Red Hat and HPE, respectively, founded Anchore in 2016. In June 2020, the company was awarded a contract with the United States Air Force to help secure software containers as part of a DevSecOps workflow. Investors include Menlo Ventures and SignalFire. Most recent financing: $20M Series B (1/22/2020) Total disclosed funding: $47.5M Location: Santa Barbara, CA
  • 91. 90 Connected devices increase cyber risk Hospitals are connecting equipment and devices to the internet for real-time visibility into patient and machine health. If they are not protected, these sprawling networks could provide a way in for hackers. Source: L&T Services; Fierce Healthcare 82% of healthcare organizations have experienced an IoT-focused cyberattack 10 to 15 connected medical devices per patient bed $346,000 is the average cost an IoT-focused attack The connected hospital
  • 92. 9191 “While advanced devices can offer safer, more convenient and timely health care delivery, a medical device connected to a communications network could have cybersecurity vulnerabilities that could be exploited resulting in patient harm.” - Dr. Amy P. Abernethy, M.D., Ph.D, Principal Deputy Commissioner of Food and Drugs, 2019 Source: FDA
  • 93. 92 Strengthening connected devices Startups are aiming to help hospitals protect connected devices critical to delivering patient care. Solutions that provide visibility into device activity could help mitigate attacks. Identify devices Monitor device activity Manage security policies Securing connected medical devices Hospital Provide alerts of suspicious activity
  • 94. 93 Medical device security Ordr uses machine learning to identify anomalous behavior across a company’s network of connected devices. The company was founded in 2015 by veterans of wireless networking company Aruba Networks. Investors include Kaiser Permanente Ventures, Battery Ventures, and Mayo Clinic Ventures, among others. Most recent disclosed financing: $2M Series B (3/5/2020) Total disclosed funding: $50M Location: Santa Clara, CA Medigate monitors and enforces security policies on connected devices across a company’s network. Since its founding in 2017, Medigate has developed an ecosystem of partners that includes electronic medical records (EMR) provider Cerner and networking provider Cisco. Investors include YL Ventures, US Venture Partners, and Blumberg Capital. Most recent financing: $15M Series A (1/29/2019) Total disclosed funding: $20.4M Location: New York, New York
  • 95. 9494 APPENDIX 2 0 2 0 C Y B E R D E F E N D E R S
  • 96. 9595 How the categories were selected: We used CB Insights data — including startup funding, media mentions, earnings call transcripts, patents, and more — to identify our Cyber Defenders categories. How the companies were selected: We used CB Insights' Mosaic Score to select our Cyber Defenders, which uses data to track private company health based on metrics like recency of financing, total funding raised, and investor quality. We’ve gathered this data via our machine learning technology (dubbed The Cruncher) as well as via several thousand direct submissions from firms and individual professionals using The Editor. The CB Insights Mosaic page walks through the factors considered in the algorithm. M E T H O D O L O G Y