Elite 80 the Hottest Privately Held Cybersecurity & It Infrastructure Companies
Total Page:16
File Type:pdf, Size:1020Kb
Cybersecurity & IT Infrastructure FEBRUARY 2020 ELITE 80 THE HOTTEST PRIVATELY HELD CYBERSECURITY & IT INFRASTRUCTURE COMPANIES COPYRIGHT: LIUZISHAN/SHUTTERSTOCK.COM Erik Suppiger [email protected] (415) 835-3918 FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION. Cybersecurity & IT Infrastructure TABLE OF CONTENTS Executive Summary ......................................................................................................................................................... 4 Funding Trends ............................................................................................................................................................... 5 Index by Venture Capital Firm ....................................................................................................................................... 11 Index by Venture Capital Firm ....................................................................................................................................... 12 Index by Venture Capital Firm ....................................................................................................................................... 13 Index by Venture Capital Firm ....................................................................................................................................... 14 Actifio ............................................................................................................................................................................. 15 Affirmed ......................................................................................................................................................................... 16 Alert Logic ..................................................................................................................................................................... 17 AlgoSec ......................................................................................................................................................................... 18 Armor ............................................................................................................................................................................. 19 Arxan ............................................................................................................................................................................. 20 Auth0 ............................................................................................................................................................................. 21 Balbix ............................................................................................................................................................................. 22 BitSight Technologies .................................................................................................................................................... 23 Bugcrowd ...................................................................................................................................................................... 24 Centrify .......................................................................................................................................................................... 25 Checkmarx .................................................................................................................................................................... 26 ClearDATA .................................................................................................................................................................... 27 Cloudian ........................................................................................................................................................................ 28 Code42 .......................................................................................................................................................................... 29 Cofense ......................................................................................................................................................................... 30 Cohesity ........................................................................................................................................................................ 31 Contrast Security ........................................................................................................................................................... 32 Cradlepoint .................................................................................................................................................................... 33 Cumulus Networks ........................................................................................................................................................ 34 Cybera ........................................................................................................................................................................... 35 Cybereason ................................................................................................................................................................... 36 Datera ............................................................................................................................................................................ 37 Darktrace ....................................................................................................................................................................... 38 Digital Guardian ............................................................................................................................................................. 39 Digital Shadows ............................................................................................................................................................. 40 Dragos ........................................................................................................................................................................... 41 Druva ............................................................................................................................................................................. 42 eSentire ......................................................................................................................................................................... 43 Exabeam ....................................................................................................................................................................... 44 ExtraHop ....................................................................................................................................................................... 45 Flashpoint ...................................................................................................................................................................... 46 FireMon ......................................................................................................................................................................... 47 Fortress ......................................................................................................................................................................... 48 Flexera .......................................................................................................................................................................... 49 1 Cybersecurity & IT Infrastructure ForgeRock ..................................................................................................................................................................... 50 GoSECURE ................................................................................................................................................................... 51 GuardiCore .................................................................................................................................................................... 52 HackerOne .................................................................................................................................................................... 53 iboss .............................................................................................................................................................................. 54 Illumio ............................................................................................................................................................................ 55 Illusive ........................................................................................................................................................................... 56 Imprivata ........................................................................................................................................................................ 57 IntSights ........................................................................................................................................................................ 58 Kaminario ...................................................................................................................................................................... 59 Karamba Security .........................................................................................................................................................