Elite 80 the Hottest Privately Held Cybersecurity & It Infrastructure Companies

Total Page:16

File Type:pdf, Size:1020Kb

Elite 80 the Hottest Privately Held Cybersecurity & It Infrastructure Companies Cybersecurity & IT Infrastructure FEBRUARY 2020 ELITE 80 THE HOTTEST PRIVATELY HELD CYBERSECURITY & IT INFRASTRUCTURE COMPANIES COPYRIGHT: LIUZISHAN/SHUTTERSTOCK.COM Erik Suppiger [email protected] (415) 835-3918 FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION. Cybersecurity & IT Infrastructure TABLE OF CONTENTS Executive Summary ......................................................................................................................................................... 4 Funding Trends ............................................................................................................................................................... 5 Index by Venture Capital Firm ....................................................................................................................................... 11 Index by Venture Capital Firm ....................................................................................................................................... 12 Index by Venture Capital Firm ....................................................................................................................................... 13 Index by Venture Capital Firm ....................................................................................................................................... 14 Actifio ............................................................................................................................................................................. 15 Affirmed ......................................................................................................................................................................... 16 Alert Logic ..................................................................................................................................................................... 17 AlgoSec ......................................................................................................................................................................... 18 Armor ............................................................................................................................................................................. 19 Arxan ............................................................................................................................................................................. 20 Auth0 ............................................................................................................................................................................. 21 Balbix ............................................................................................................................................................................. 22 BitSight Technologies .................................................................................................................................................... 23 Bugcrowd ...................................................................................................................................................................... 24 Centrify .......................................................................................................................................................................... 25 Checkmarx .................................................................................................................................................................... 26 ClearDATA .................................................................................................................................................................... 27 Cloudian ........................................................................................................................................................................ 28 Code42 .......................................................................................................................................................................... 29 Cofense ......................................................................................................................................................................... 30 Cohesity ........................................................................................................................................................................ 31 Contrast Security ........................................................................................................................................................... 32 Cradlepoint .................................................................................................................................................................... 33 Cumulus Networks ........................................................................................................................................................ 34 Cybera ........................................................................................................................................................................... 35 Cybereason ................................................................................................................................................................... 36 Datera ............................................................................................................................................................................ 37 Darktrace ....................................................................................................................................................................... 38 Digital Guardian ............................................................................................................................................................. 39 Digital Shadows ............................................................................................................................................................. 40 Dragos ........................................................................................................................................................................... 41 Druva ............................................................................................................................................................................. 42 eSentire ......................................................................................................................................................................... 43 Exabeam ....................................................................................................................................................................... 44 ExtraHop ....................................................................................................................................................................... 45 Flashpoint ...................................................................................................................................................................... 46 FireMon ......................................................................................................................................................................... 47 Fortress ......................................................................................................................................................................... 48 Flexera .......................................................................................................................................................................... 49 1 Cybersecurity & IT Infrastructure ForgeRock ..................................................................................................................................................................... 50 GoSECURE ................................................................................................................................................................... 51 GuardiCore .................................................................................................................................................................... 52 HackerOne .................................................................................................................................................................... 53 iboss .............................................................................................................................................................................. 54 Illumio ............................................................................................................................................................................ 55 Illusive ........................................................................................................................................................................... 56 Imprivata ........................................................................................................................................................................ 57 IntSights ........................................................................................................................................................................ 58 Kaminario ...................................................................................................................................................................... 59 Karamba Security .........................................................................................................................................................
Recommended publications
  • IDC Marketscape IDC Marketscape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment
    IDC MarketScape IDC MarketScape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment Phil Hochmuth IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape Worldwide Mobile Threat Management Software Vendor Assessment Source: IDC, 2018 Please see the Appendix for detailed methodology, market definition, and scoring criteria. December 2018, IDC #US44521018 IDC OPINION As mobile security and governance frameworks mature, mobile threat management (MTM) software tools are filling a major security gap many enterprises are discovering across one of their most pervasive technology deployments: smartphones and tablets used by employees. Many organizations see enterprise mobility management (EMM; technology which manages, configures, and monitors mobiles) as the beginning and end of their mobile endpoint security strategy. While many EMM platforms support security functions (compliance checking, VPN connectivity, data security/encryption, and device certificate management, etc.), most EMMs do not actively scan for mobile-related threats on devices. This is where MTM technology comes in, with its ability to address actively misbehaving or malicious apps, as well as OS and network-based attacks on devices. Driving many MTM early adoptions, and among more mature deployments, is the desire to deploy another layer of security to mobile end-user computing in addition to EMM. Among the more than two- dozen MTM customer interviews conducted for this document, 100% of these enterprises deployed their respective MTM products with an EMM platform; nearly all said that meeting existing or potential future compliance requirements was among the top 3 drivers behind their adoption of the technology. These requirements are driving much of the direction of the market from an MTM feature set and overall go-to-market strategy for MTM vendors.
    [Show full text]
  • JMP Securities Elite 80 Report (Formerly Super 70)
    Cybersecurity, Data Management & ,7 Infrastructure FEBRUARY 201 ELITE 80 THE HOTTEST PRIVATELY HELD &<%(5SECURITY, '$7$0$1$*(0(17 AND ,7,1)5$6758&785( COMPANIES &RS\ULJKWWLWLSRQJSZO6KXWWHUVWRFNFRP Erik Suppiger Patrick Walravens Michael Berg [email protected] [email protected] [email protected] (415) 835-3918 (415) 835-8943 (415)-835-3914 FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION. Cybersecurity, Data Management & IT Infrastructure TABLE OF CONTENTS Executive Summary ............................................................................................................................ 4 Top Trends and Technological Changes ............................................................................................ 5 Funding Trends ................................................................................................................................ 11 Index by Venture Capital Firm .......................................................................................................... 17 Actifio ................................................................................................................................................ 22 Alert Logic ......................................................................................................................................... 23 AlgoSec ............................................................................................................................................ 24 AnchorFree ......................................................................................................................................
    [Show full text]
  • Moving Toward Gender Balance in Private Equity and Venture Capital the Study
    Moving toward gender balance in private equity and venture capital IFC. IFC—a sister organization of the World Bank and member of the World Bank Group—is the largest global development institution focused on the private sector in emerging markets. We work with more than 2,000 businesses worldwide, using our capital, expertise, and influence to create markets and opportunities in the toughest areas of the world. In fiscal year 2018, we delivered more than $23 billion in long-term financing for developing countries, leveraging the power of the private sector to end extreme poverty and boost shared prosperity. For more information, visit www.ifc.org. Oliver Wyman. Oliver Wyman is a global leader in management consulting. With offices in 50+ cities across nearly 30 countries, Oliver Wyman combines deep industry knowledge with specialized expertise in strategy, operations, risk management, and organization transformation. The firm has more than 5,000 professionals around the world who work with clients to optimize their business, improve their operations and risk profile, and accelerate their organizational performance to seize the most attractive opportunities. Oliver Wyman is a wholly owned subsidiary of Marsh & McLennan Companies [NYSE: MMC]. For more information, visit www. oliverwyman.com. Follow Oliver Wyman on Twitter @OliverWyman. RockCreek. RockCreek is a leading global investment management firm that applies data-driven technology and innovation to investing. Its portfolio managers invest in emerging markets and alternatives, and its asset allocation teams invest in multi-asset class and outsourced CIO portfolios and customized solutions. RockCreek’s client base is made up of sophisticated institutional investors, including endowments, foundations, pension plans, and sovereign funds.
    [Show full text]
  • Ebay Response to Carl Icahn
    February 24, 2014 eBay Inc. Responds to Carl Icahn's Feb. 24 Open Letter to Stockholders SAN JOSE, Calif.--(BUSINESS WIRE)-- New eBay shareholder Carl Icahn has cherry-picked old news clips and anecdotes out of context to attack the integrity of two of the most respected, accomplished and value-driven technology leaders in Silicon Valley. Marc Andreessen and Scott Cook bring extraordinary insight, expertise and leadership to eBay's board, which is scrupulous in its governance practices and fully transparent with regard to its directors' other affiliations and businesses. And eBay Inc. President and CEO John Donahoe is widely respected for his turnaround of eBay and leadership of the company over the past six years. As we are sure our other shareholders would agree, we prefer to engage in more constructive and substantive discussions of why, in our view, PayPal and eBay are better together. Instead, Mr. Icahn unfortunately has resorted to mudslinging attacks against two impeccably qualified directors. Mr. Icahn has nominated two of his employees to eBay's board. As we have said, the board's nominating committee will review the nominations of his employees in due course. Even if our board does not support the nominations, ultimately shareholders will decide whether they believe Mr. Icahn's employees are better qualified than directors such as Mr. Cook (Mr. Andreessen is not up for re-election this year) to sit on the board of a leading technology company. The board has been clear in its view that shareholders are best served by keeping PayPal part of eBay. The board regularly assesses all strategic options for the company; should circumstances change the board is entirely capable of evaluating alternatives for optimizing shareholder value.
    [Show full text]
  • Private Placement Activity Chris Hastings | [email protected] | 917-621-3750 3/5/2018 – 3/9/2018 (Transactions in Excess of $20 Million)
    Private Capital Group Private Placement Activity Chris Hastings | [email protected] | 917-621-3750 3/5/2018 – 3/9/2018 (Transactions in excess of $20 million) Trends & Commentary ▪ This week, 14 U.S. private placement deals between $20 million and $50 million closed, accounting for U.S. VC Average Deal Size by Series $516 million in total proceeds, compared to last week’s 10 U.S. deals leading to $357 million in total $ in Millions proceeds. This week also had 5 U.S. deals between $50 million and $100 million yielding $320 million, $35 compared to last week’s 4 deals resulting in $279 million in total proceeds. ▪ The U.S. VC average deal size has been significantly increasing for early and late stage VC deals. Late $30 stage VC has increased by 8.8% CAGR 2008 – 2017 while early stage VC has grown by 7.4% CAGR 2008 – 2017. (see figure) ▪ Southern Cross, a PE fund that invests in energy, pharmaceuticals and technology in Latin America, has $25 decided against restructuring its third fund after receiving some interest from its LPs. It is largely because its third fund has been a weak performer, the discount on fund stakes would have been steep and that the $20 fund wanted more time to exit. ▪ Univision has filed to withdraw its pending IPO due to “prevailing market conditions”. Univision initially filed $15 plans to IPO in 2015. ▪ New State Capital Partners has closed its second institutional fund on its $255 million hard cap. The fund $10 can invest more than $50 million equity per deal in sectors such as business services, healthcare services and industrials.
    [Show full text]
  • August 4, 2021 the Honorable Charles
    August 4, 2021 The Honorable Charles Schumer The Honorable Mitch McConnell Majority Leader Republican Leader United States Senate United States Senate Washington, D.C. 20510 Washington, D.C. 20510 Dear Majority Leader Schumer and Minority Leader McConnell, We’re writing to express support for the bipartisan amendment to the infrastructure bill offered by Senator Wyden, Senator Lummis, and Senator Toomey. We share the Senators’ concern that the existing provision regarding the taxation of cryptocurrency transactions is overly broad and will sweep in non-intermediaries, such as network validators and software developers, and would stifle innovation by imposing what would be an unworkable reporting requirement on those groups. The infrastructure bill is too important to be left vulnerable to future legal challenges based on the text as currently written. This bipartisan amendment is the right solution to address these concerns in a simple way. As the leaders of the largest crypto venture fund, we are encouraged by the government’s recognition that this emerging sector is here to stay and is only growing. For diverse constituencies – from musicians, artists, and other creators to small business owners and those left out of the traditional financial system – there is so much untapped potential in crypto and blockchain. A proper regulatory strategy needs to reflect one important fact: crypto is not a monolith. The crypto universe extends far beyond its financial origins, encompassing artwork, community development, and new ways of forming organizations. These use cases will only continue to grow as whole new economies are built on decentralized protocols, much like the internet was built on top of protocols like TCP/IP.
    [Show full text]
  • 2017 Swiss Venture Capital Report
    Edition No 5 Swiss Venture Capital 2017 Report Overall investment Almost a billion francs Cantons Vaud jumps further ahead Exits The year of the IPO In cooperation with SECA – Swiss Private Equity & Corporate Finance Association start up ticker .ch www.plusgestaltung.com — Foto: photocase.de / antifalten — Foto: www.plusgestaltung.com The swiss start-up news channel We might not hand out trophies – but we show you where to get them 8 Y J 9 Create your Get the Follow Set alerts for personal archive weekly newsletter companies deadlines Principal Commission for Technology and Innovation CTI Supporters State Secretariat for Economic Affairs SECO, Business & Economic Development Canton of Zurich, Swissparks.ch, Partners Startupticker Foundation, Gebert Rüf Foundation, Stiftung digitalswitzerland, ETH Zurich, Venture Kick, InnoCampus, School of Natur und Umwelt, Swiss Startup Invest, ETH transfer, EPFL Innovation Management Fribourg, GENILEM, Swiss Private Equity & Corporate Park, Start-up Promotion Centro Ticino Finance Association SECA, StartAngels Network, Top 100 Start-ups, Institut für Jungunternehmen IFJ, STARTUPS.CH, Y-Parc, Fongit, Contributors Swisscom, Swiss Startup Invest, W.A. de Vigier, P & TS BASELAREA.SWISS, STARTFELD, Innovaud, STARTUP SUPPPORT Intellectual Property, EPFL Innovation Park, Ernst Göhner Foundation, LUZERN, Technopark Luzern, Swiss Economic Forum SEF, swissECS, GoBeyond, Microsoft SEF Growth Initiative for SMEs, Swiss Innovation Forum SIF, BioBusiness, MedTech-Business, SBB, Zürcher Kantonalbank, StartupCampus, Technopark Zürich Editor Journalistenbüro Niedermann GmbH, Lucerne Input: [email protected] start up ticker .ch Editorial Contents Five years of growth Results In the beginning, we were simply 5 At a glance curious: when we researched CHF 908.7 million for Swiss start-ups the first Swiss Venture Capital 9 Report five years ago, we wanted The Top 20 www.plusgestaltung.com — Foto: photocase.de / antifalten — Foto: www.plusgestaltung.com Two companies obtain more to create transparency.
    [Show full text]
  • Status of Open Source and Commercial Ipv6 Firewall Implementations (Paper)
    Status of Open Source and commercial IPv6 firewall implementations Dr. Peter Bieringer AERAsec Network Services & Security GmbH [email protected] http://www.aerasec.de/ European Conference on Applied IPv6 (ECAI6) Cologne, Germany September 6 - 7, 2007 Abstract IPv6, the successor of IPv4, has been ready for production for quite some time. For security reason, firewalling in IPv6 is also an important requirement. This paper presents an overview of the status of Open Source and commer- cial implementations. Introduction With IPv4 nowadays, many client-to-server and most client-to-client communications are intercepted by gate- ways with address and port masquerading abilities, usually named Network (and Port) Address Translation (NAT, NAPT). This prohibits native client-to-client communication, if both peers are located behind such gate- ways. In this case, only special tunnelling techniques, like STUN (Simple traversal of UDP over NATs), which requires special servers located at the Internet, or other ªfirewall-piercingº methods can help to establish native and bidirectional client-to-client communication. One of the goals of IPv6 is the re-introduction of bidirectional, native end-to-end communication without play- ing any tricks on gateways in between. Also, IPv6 has a large enough address space which should suffice for the next decades. Therefore NAT was left out by design, too. Jumping back to IPv4, the initial intention of introducing NAT was the lack of IPv4 addresses for use in internal networks, while still allowing clients to open connections to the Internet via a hiding mechanism. It turned out to also protect internal networks against threats from the Internet, because under normal circumstances (bug- free stateful hiding-NAT implementation on the gateway) it©s not possible for an outside node to connect to an internal host without any dedicated rule on the gateway.
    [Show full text]
  • Masters in Management in Entrepreneurship and New Venture Management
    MASTERS IN MANAGEMENT IN ENTREPRENEURSHIP AND NEW VENTURE MANAGEMENT Research Title: The nexus between entrepreneurship theory and venture capital financing decisions in South Africa Violet S’phiwe Buluma Student Number: 693690 BUSA 7044 Supervisor: Dr Jose Barreira Date of submission: 20 June 2017 ABSTRACT This explorative study examines the decision making criteria at the screening stage by venture capital firms in South Africa. The study also probes into the decision making criteria on the personality side and whether that has any association with the “big five” characteristics. A three- section questionnaire including both Likert style type (decision making and short version of big five) and nominal questions was sent to venture capital firms. Logistic regression as well as correlation analysis was run on the data. The findings were that individual attributes (entrepreneurs’ characteristics and experience) environment, industry and macro economic environment (characteristics of product and services, characteristics of the market and financial considerations) are all positively related to venture capital firms’ decision to grant finance to an entrepreneur. Findings on the big five characteristics are that only openness to experience, consientiousness and extrarversion were seen as critical considerations by venture capital firms, but not agreeableness and emotional stability characteristics. The study findings are beneficial for entrepreneurs and venture capital firms. Key words – Venture capital, investment criteria, big five personality, entrepreneurship, access to finance 2 DECLARATION I Violet S’phiwe Buluma declare that the research work reported in this dissertation is my own, except where otherwise indicated in references and acknowledgements. It is submitted in partial fulfilment of the requirements for the Masters of Management in Entrepreneurship and New Venture Management at the University of the Witwatersrand.
    [Show full text]
  • How to Catch a Unicorn
    How to Catch a Unicorn An exploration of the universe of tech companies with high market capitalisation Author: Jean Paul Simon Editor: Marc Bogdanowicz 2016 EUR 27822 EN How to Catch a Unicorn An exploration of the universe of tech companies with high market capitalisation This publication is a Technical report by the Joint Research Centre, the European Commission’s in-house science service. It aims to provide evidence-based scientific support to the European policy-making process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. JRC Science Hub https://ec.europa.eu/jrc JRC100719 EUR 27822 EN ISBN 978-92-79-57601-0 (PDF) ISSN 1831-9424 (online) doi:10.2791/893975 (online) © European Union, 2016 Reproduction is authorised provided the source is acknowledged. All images © European Union 2016 How to cite: Jean Paul Simon (2016) ‘How to catch a unicorn. An exploration of the universe of tech companies with high market capitalisation’. Institute for Prospective Technological Studies. JRC Technical Report. EUR 27822 EN. doi:10.2791/893975 Table of Contents Preface .............................................................................................................. 2 Abstract ............................................................................................................. 3 Executive Summary ..........................................................................................
    [Show full text]
  • Marc Andreessen on Why Software Is Eating the World
    Why Software Is Eating The World By MARC ANDREESSEN This week, Hewlett-Packard (where I am on the board) announced that it is exploring jettisoning its struggling PC business in favor of investing more heavily in software, where it sees better potential for growth. Meanwhile, Google plans to buy up the cell- phone handset maker Motorola Mobility. Both moves surprised the tech world. But both moves are also in line with a trend I've observed, one that makes me optimistic about the future growth of the American and world economies, despite the recent tur- moil in the stock market. In short, software is eating the world. More than 10 years after the peak of the 1990s dot-com bubble, a dozen or so new Inter- net companies like Facebook and Twitter are sparking controversy in Silicon Valley, due to their rapidly growing private market valuations, and even the occasional successful IPO. With scars from the heyday of Webvan and Pets.com still fresh in the investor psy- che, people are asking, "Isn't this just a dangerous new bubble?" I, along with others, have been arguing the other side of the case. (I am co-founder and general partner of venture capital firm Andreessen-Horowitz, which has invested in Facebook, Groupon, Skype, Twitter, Zynga, and Foursquare, among others. I am also personally an investor in LinkedIn.) We believe that many of the prominent new Inter- net companies are building real, high-growth, high-margin, highly defensible business- es. Today's stock market actually hates technology, as shown by all-time low price/earn- ings ratios for major public technology companies.
    [Show full text]
  • View Whitepaper
    INFRAREPORT Top M&A Trends in Infrastructure Software EXECUTIVE SUMMARY 4 1 EVOLUTION OF CLOUD INFRASTRUCTURE 7 1.1 Size of the Prize 7 1.2 The Evolution of the Infrastructure (Public) Cloud Market and Technology 7 1.2.1 Original 2006 Public Cloud - Hardware as a Service 8 1.2.2 2016 - 2010 - Platform as a Service 9 1.2.3 2016 - 2019 - Containers as a Service 10 1.2.4 Container Orchestration 11 1.2.5 Standardization of Container Orchestration 11 1.2.6 Hybrid Cloud & Multi-Cloud 12 1.2.7 Edge Computing and 5G 12 1.2.8 APIs, Cloud Components and AI 13 1.2.9 Service Mesh 14 1.2.10 Serverless 15 1.2.11 Zero Code 15 1.2.12 Cloud as a Service 16 2 STATE OF THE MARKET 18 2.1 Investment Trend Summary -Summary of Funding Activity in Cloud Infrastructure 18 3 MARKET FOCUS – TRENDS & COMPANIES 20 3.1 Cloud Providers Provide Enhanced Security, Including AI/ML and Zero Trust Security 20 3.2 Cloud Management and Cost Containment Becomes a Challenge for Customers 21 3.3 The Container Market is Just Starting to Heat Up 23 3.4 Kubernetes 24 3.5 APIs Have Become the Dominant Information Sharing Paradigm 27 3.6 DevOps is the Answer to Increasing Competition From Emerging Digital Disruptors. 30 3.7 Serverless 32 3.8 Zero Code 38 3.9 Hybrid, Multi and Edge Clouds 43 4 LARGE PUBLIC/PRIVATE ACQUIRERS 57 4.1 Amazon Web Services | Private Company Profile 57 4.2 Cloudera (NYS: CLDR) | Public Company Profile 59 4.3 Hortonworks | Private Company Profile 61 Infrastructure Software Report l Woodside Capital Partners l Confidential l October 2020 Page | 2 INFRAREPORT
    [Show full text]