Elite 80
Total Page:16
File Type:pdf, Size:1020Kb
Cybersecurity, Data Management & ,7 Infrastructure FEBRUARY 201 ELITE 80 THE HOTTEST PRIVATELY HELD &<%(5SECURITY, '$7$0$1$*(0(17 AND ,7,1)5$6758&785( COMPANIES &RS\ULJKWWLWLSRQJSZO6KXWWHUVWRFNFRP Erik Suppiger Patrick Walravens Michael Berg [email protected] [email protected] [email protected] (415) 835-3918 (415) 835-8943 (415)-835-3914 FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION. Cybersecurity, Data Management & IT Infrastructure TABLE OF CONTENTS Executive Summary ............................................................................................................................ 4 Top Trends and Technological Changes ............................................................................................ 5 Funding Trends ................................................................................................................................ 11 Index by Venture Capital Firm .......................................................................................................... 17 Actifio ................................................................................................................................................ 22 Alert Logic ......................................................................................................................................... 23 AlgoSec ............................................................................................................................................ 24 AnchorFree ....................................................................................................................................... 25 Armor ................................................................................................................................................ 26 Arxan ................................................................................................................................................ 27 Auth0 ................................................................................................................................................ 28 Big Switch Networks, Inc. ................................................................................................................. 29 BitSight Technologies ....................................................................................................................... 30 Bugcrowd .......................................................................................................................................... 31 Centrify ............................................................................................................................................. 32 Checkmarx ....................................................................................................................................... 33 Cloudflare ......................................................................................................................................... 34 Cloudian ........................................................................................................................................... 35 Code42 ............................................................................................................................................. 36 Cofense ............................................................................................................................................ 37 Cohesity ............................................................................................................................................ 38 Contrast Security .............................................................................................................................. 39 CounterTack ..................................................................................................................................... 40 Cradlepoint ....................................................................................................................................... 41 CrowdStrike ...................................................................................................................................... 42 Cumulus Networks ............................................................................................................................ 43 Cybera .............................................................................................................................................. 44 Cybereason ...................................................................................................................................... 45 Datera ............................................................................................................................................... 46 Digital Guardian ................................................................................................................................ 47 Digital Shadows ................................................................................................................................ 48 Druva ................................................................................................................................................ 49 Endgame .......................................................................................................................................... 50 eSentire ............................................................................................................................................ 51 ExtraHop ........................................................................................................................................... 52 EZShield ........................................................................................................................................... 53 FireMon ............................................................................................................................................ 54 Flexera .............................................................................................................................................. 55 Forcepoint ......................................................................................................................................... 56 1 Cybersecurity, Data Management & IT Infrastructure TABLE OF CONTENTS ForgeRock ........................................................................................................................................ 57 Guardicore ........................................................................................................................................ 58 HackerOne ....................................................................................................................................... 59 iboss ................................................................................................................................................. 60 Illumio ............................................................................................................................................... 61 KnowBe4 .......................................................................................................................................... 62 Kount ................................................................................................................................................ 63 Kudelski Security .............................................................................................................................. 64 Lookout ............................................................................................................................................. 65 Malwarebytes ................................................................................................................................... 66 Metaswitch Networks ........................................................................................................................ 67 Netskope .......................................................................................................................................... 68 ObserveIT ......................................................................................................................................... 69 Optiv ................................................................................................................................................. 70 Ping Identity ...................................................................................................................................... 71 Pivot3 ................................................................................................................................................ 72 Recorded Future ............................................................................................................................... 73 RedSeal ............................................................................................................................................ 74 RiskIQ ............................................................................................................................................... 75 Rubrik ............................................................................................................................................... 76 Scality ..............................................................................................................................................