Data Protection & the Insider Threat

Total Page:16

File Type:pdf, Size:1020Kb

Data Protection & the Insider Threat Issue 2 1 Data Protection & the Insider Threat 4 Veriato Recon 6 Veriato 360 Data Protection & the Insider Threat 8 Research from Gartner: Market Guide for User and Entity Behavior Analytics Veriato (formerly known as SpectorSoft) has With multiple studies and surveys showing 22 Contact Us been enabling greater insight into insider actions that 50% of employees believe it is OK to take for over a decade. Thousands of companies, corporate data, the chances your organization has, government agencies, educational institutions is, or will experience insider driven data exfiltration and non-profits have successfully used Veriato are unacceptably high. In addition, the constant solutions to increase the security of critical stream of data breaches caused by imposters – systems and intellectual property, and to more external actors who level compromised credentials quickly and effectively respond to incidents. to “become” insiders – highlights the need to detect changes in insider behavior that suggest An established leader in employee monitoring attack. and investigations, we recognized the need for greater intelligence about the behavior of insiders. If you do not have a plan in place to detect it, you Many solution providers have done the same will miss your chance to prevent the damage. -- as evidenced by the Market Guide to User and Entity Behavior (“UEBA”) from Gartner Research With our unique ability to collect data at the point contained within these pages. of interaction between insiders and the IT resources they access, we saw an opportunity to help address Why Veriato? this challenge. Veriato has a proven data collector; As we set out to create a high value, differentiated one that provides much greater visibility into offering, we first focused on the need to secure insider activity than is available from logs. data. Insider data exfiltration causes tremendous damage every year. Worse, the vast majority of By applying an analytics capability to the data, we insider data exfiltration goes undetected – simply are able to detect shifts in behavioral patterns that because the organization is not looking for it. would otherwise go unnoticed. Our software does this by creating a baseline that reflects normal Ask yourself how your organization detects behaviors within your organization. Utilizing things like insider data theft or leaks. Relying on machine learning and statistical analysis, the technologies designed primarily to secure the software identifies deviations from the baseline – perimeter leaves much to be desired. Relying on anomalies – that suggest threat to data security. trust is only an option if the only employee is you. 2 One way Veriato Recon, our UEBA solution, differs With a few clicks, the data stored by Veriato from many others is that we look at both technical Recon can be transferred into Veriato 360. Once indicators and psycholinguistic indicators. The transferred, deep, context-rich visibility into the ability to look at these two very different sources actual actions taken by the insider is available. of intelligence translates into early warnings and CIRT and CSIRT teams around the world use easier prioritization. Veriato 360 for exactly this purpose: to identify and respond to security issues, to rule out false A simple example illustrates the point. One insider positives being generated by other systems, and is triggering alerts from a technical indicator such to conduct investigations. The combined power of as increased usage of USB drives with no other Veriato Recon and Veriato 360 equates to a robust indication of threat. Another insider is triggering insider threat detection and response solution. the same alerts, but is doing so after showing a significant negative shift in the sentiment (tone & One of the keys for us when building our UEBA intensity) of their communications and other shifts solution was to make it both usable and powerful - in language usage suggesting they are engaged to deliver a solution that could be up and running in insider threat behavior. The second insider’s in a short period of time, without lengthy and activity has a greater likelihood of being attack expensive professional services engagements related and should receive prioritized response. and the need for heavy customization. We set And that response can take place prior to the data out to build a product that would deliver value to exfiltration taking place – in the form of closer organizations no matter where they were on their inspection of activities and monitoring for unusual behavioral analytics journey - to those just starting resource access. out and to those with dedicated and sophisticated teams. We think we’ve done just that. Once Veriato Recon detects anomalies, it sends alerts. These alerts can be routed to a SIEM A Deeper Dive into the Veriato Approach solution to operationalize them and integrate Let’s take a closer look at the data for analysis. them with other sources of information. However, if you do not have a SIEM solution in place, Veriato Veriato focuses on human activity. Our job is to Recon can send alerts directly to appropriate staff eliminate blind spots and to catch things that for review and action, or via syslog to any other might otherwise fall through the cracks. solution you wish. Our data collector gathers a wide array of As a security analyst reviews the data and information about exactly what the insiders in determines that additional steps must be taken an organization are doing, including applications to investigate and respond to a potential attack, used, web activity and network usage, as well as: Veriato offers a very unique benefit. Veriato Recon stores up to 30 days of detailed user activity User Status – tracks things like logon and logoff, data – the data that underpins the alerts. Veriato as well as the amount of time that a user is Recon also operates from the same management spending within applications. console as Veriato 360, our monitoring solution that enables rapid exploration and review of user Communications Activity – which fuels our ability activity data. to track common date exfiltration methods, as well as analyze psycholinguistic indicators for early warning of elevated insider risk. 3 Document tracking and file transfers – which indicators can be gathered, without any human provides insight into what information is being eyes on the content of the communications, accessed and what is being done with it once by bulk analysis using machine reading and accessed. algorithms that identify changes in patterns of communication. Adding a psycholinguistic Keystrokes – which enables visibility into what component to your insider threat detection insiders are doing within applications and program can be the difference between proactive documents, as well as monitoring of highly interdiction and reactive incident response. privileged users who have the potential to damage the organization’s security with a few keystrokes. The Insider has options An insider, should they decide to take information With this rich set of user activity data to analyze, against company policy has an array of options we are able to detect meaningful anomalies across available to them simply by being inside the the range of methods insiders typically use to take technology moat. Everything from email, portable critical intellectual property out of the control of storage, personal cloud solutions, and even tried the organization. and true low tech printing of documents or screens is available to them. Psycholinguistics and the insider threat While monitoring and alerting on technical Contrasted with an external actor, who must indicators like the ones described above is widely attempt to take the data off to a remote server understood and employed, there are less obvious via a network connection, the scope of the task of methods that can and should be employed to detecting and preventing insider attacks becomes improve your organization’s security against the clearer. Dedicated insider threat detection possibility of a damaging insider attack. programs require User and Entity Behavior Analytics as a key component. Locking information Additional indicators, or metrics, exist that provide down tightly enough to make it truly secure isn’t early warning about an insider’s potential to an option – the productivity costs are too great. carry out such an attacks. The psychology of Rather, a comprehensive approach that includes language, known as psycholinguistics, is one device and data security, as well as recognizing such area. Indicators can be found in the digital that the human factor requires analysis of human communications of insiders that, when present, behaviors and activity, is needed to stop the insider are clear warnings that risk is elevated. These attack before it makes it into the media. Source: Veriato 4 ADVANCED INSIDER THREAT SOLUTION KEY BENEFITS For companies who have sensitive intellectual EARLY DETECTION AND WARNING property, which if stolen or exposed by insiders Veriato Recon’s behavioral analytics capability poses risk to the company, and want to protect provides critical insight into shifts in established critical information without restricting access or patterns that are directly related to insider threat locking systems down so tightly that productivity behavior. Early detection is key to mitigating risk, is hindered, Veriato Recon is User Behavior harm and the threats insiders pose. By focusing Analysis Software that provides early warning of directly on the behavior of insiders, Veriato suspicious behavior by passively monitoring user Recon can isolate anomalies and alert on them behavior and alerting when actions contradict immediately. policies or vary from well-defined patterns. SYSTEM OF RECORD Rather than focusing on protecting assets, Veriato Stop piecing together information from disparate Recon monitors user behavior for indicators of sources in an effort to reconstruct what happened. risk, recording and alerting when insider risk is Save time and money with a system of record that elevated, enabling rapid interdiction, reducing doesn’t require specialized expertise to decipher. false positives, and insuring actionable reporting.
Recommended publications
  • Flower Power Daisy CEO Neil Muller on the Firm’S Plans to Blossom Into a £1Bn Business 16
    March 2017 Flower power Daisy CEO Neil Muller on the firm’s plans to blossom into a £1bn business 16 ESSENTIAL ELEMENTS OF A GOOD PARTNER PROGRAMME 20 EMERGING CHANNEL OPPORTUNITIES IN THE AREA OF DATA ANALYTICS 25 WHAT THE CHANGES TO G-CLOUD MEAN FOR SUPPLIERS 32 REMOTE CONTROL 7th Gen Intel® Core™ vPro™ processorsocessors and Intel® Active Management Technologychnology help reduce on-site IT support costs.ts. SMART REMOTE MANAGEABILITY £ª®°£¢³¡£­¬[±§²£±³®®­°²¡­±²±µ§²¦°£«­²£¢§¥¬­±²§¡± WIRELESS DEVICE MANAGEMENT ¶£¡³²£°£«­²£¦§¥¦[°£±­ª³²§­¬°£§«¥§¬¥¤­°ª­µ£°1 SIMPLIFY PC LIFESTYLE TRANSITIONS §®£¢²§¬±£¡­¬¢±¤°­«¬·µ¦£°£°­³¬¢²¦£µ­°ª¢µ§²¦¬²£ª£«­²£ £¡³°£°±£¤­°¬²£ª¾­ª§¢²²£°§´£±1 ¬²£ª²£¡¦¬­ª­¥§£±Ì¤£²³°£±¬¢ £¬£ß²±¢£®£¬¢­¬±·±²£«¡­¬ß¥³°²§­¬¬¢«·°£¯³§°££¬ ª£¢¦°¢µ°£±­¤²µ°£­°±£°´§¡£¡²§´²§­¬£°¤­°«¬¡£´°§£±¢£®£¬¢§¬¥­¬±·±²£« ¡­¬ß¥³°²§­¬¦£¡©µ§²¦·­³°±·±²£««¬³¤¡²³°£°­°°£²§ª£°­°ª£°¬«­°£²¦²²®``±³®®­°²§¬²£ª¡­« ½¬²£ª­°®­°²§­¬ ªª°§¥¦²±°£±£°´£¢¬²£ª²¦£¬²£ªª­¥­¬²£ª­°£²¦£¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£ª­¥­¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£¬²£ª¬±§¢£ ¬¢¬²£ª´°­°£²°¢£«°©±­¤¬²£ª­°®­°²§­¬§¬²¦£¬¢`­°­²¦£°¡­³¬²°§£± Call our specialist sales teams North 01282 776776 South 01256 707070 a Company store.exertis.co.uk Haymarket House, 28-29 Haymarket, London SW1Y 4RX Tel: (020) 7316 9000 Editorial Editor Doug Woodburn 9517 [email protected] Deputy editor Hannah Breeze 9510 [email protected] Reporter Tom Wright 9097 [email protected] Avoiding a public Channelnomics.eu Content editor Sam Trendall 9813 [email protected] tongue-lashing Reporter Josh Budd
    [Show full text]
  • Formatting Guide: Colors & Fonts
    SAAS & CLOUD M&A AND VALUATION UPDATE Q1 2016 BOSTON CHICAGO LONDON LOS ANGELES NEW YORK ORANGE COUNTY PHILADELPHIA SAN DIEGO SILICON VALLEY TAMPA CONTENTS Section Page Introduction . Research Coverage: SaaS & Cloud 3 . Key Takeaways 4-5 M&A Activity & Multiples . M&A Dollar Volume 7 . M&A Transaction Volume 8-10 . LTM Revenue Multiples 11-12 . Revenue Multiples by Segment 13 . Highest Revenue Multiple Transaction for LTM 14 . Notable M&A Transactions 15 . Most Active Buyers 16-17 Public Company Valuation & Operating Metrics . SaaS & Cloud 125 Public Company Universe 19-20 . Recent IPOs 21 . Stock Price Performance 22 . LTM Revenue, EBITDA & P/E Multiples 23-25 . Revenue, EBITDA & EPS Growth 26-28 . Margin Analysis 29-30 . Best / Worst Performers 31-32 Notable Transaction Profiles 34-43 Public Company Trading & Operating Metrics 45-50 Technology & Telecom Team 52 1 INTRODUCTION RESEARCH COVERAGE: SAAS & CLOUD Capstone’s Technology & Telecom Group focuses its research efforts on the follow market segments: ENTERPRISE SAAS & MOBILE & WIRELESS CONSUMER INTERNET CLOUD • Analytics / Business Intelligence • Cloud & IT Infrastructure • Cloud Computing / Storage • Communication & Collaboration • Content Creation & Management • CRM & Customer Services • ERP, Supply Chain & Commerce CONSUMER IT & E-COMMERCE • Finance & Administration TELECOM HARDWARE • Human Resources • Marketing & Advertising • Software Conglomerates • Vertical Markets 3 KEY TAKEAWAYS – M&A ACTIVITY & MULTIPLES LTM M&A dollar volume continued to increase in Q1’16, representing
    [Show full text]
  • Where You Start Matters the First Few Years in Your Career Are Critical
    Where you start matters The first few years in your career are critical- they set the trajectory for your future. We know that as a student you want to be on the fast track and don’t have time to waste. Join us at Microsoft and see what will you do? As a student at Microsoft you will be able to balance between your studies and your work, gain on-hands experience while working around 20 weekly hours and enjoy maximum flexibility during exams periods as you are not required to work during exams period, and can work full time during vacations. Here is your chance to experience the exciting field of software development! *** We greatly encourage and welcome qualified candidates who happen to have disabilities to apply for jobs in our company Apply for Microsoft Positions- Student positions: Software Engineer Student - Cortana (Herzeliya) Software Engineer Student - WCD (Herzeliya) Research Software Engineer Student - OSG Recommendation (Herzeliya) Data Scientist Student- OSG Recommendations (Herzeliya) Software Engineer Student - Adallom (Herzeliya) Data Scientist Student - Aorato (Herzeliya) Hardware Student - Surface (Herzeliya) Cloud Analyst Student- Adallom (Herzeliya) Software Engineer Student- Bing Next (Herzeliya) Student positions at Raanana: Service Center TAM- Student (Raanana) Development Student (Raanana) Infrastructure Student (Raanana) New college graduate positions: Software Engineer- WCD (Haifa) Software Engineer - Cortana (Herzeliya) Software Engineer- Kusto (Herzeliya) Software Engineer- Data Security Team (Herzeliya) Software
    [Show full text]
  • Mergers in the Digital Economy
    2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M.
    [Show full text]
  • Enterprise Software Market
    ENTERPRISE SOFTWARE REVOLUTIONISING THE MODERN WORKPLACE November 2016 Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc. is a member of FINRA Enterprise Software: Revolutionising the Modern Workplace P3 CONTENTS 05 The Enterprise Software market 10 Our survey: The experts weigh in 17 Key findings 24 Overview of corporate finance activity 34 Selected company profiles 44 Authors 45 Our team 46 Disclaimer ABOUT US GP Bullhound is a technology investment bank providing independent strategic advice on Mergers & Acquisitions and Capital raising to leading technology entrepreneurs, companies and investors across the globe. Our passion for technology, our financial acumen and our understanding of the entrepreneur’s journey differentiate our advice from other investment banks. We help exceptional people build exceptional businesses to create more billion-dollar technology companies across Europe. MERGERS & ACQUISITIONS CAPITAL RAISING, SECONDARIES AND BLOCK TRADES We act as a trusted partner to entrepreneurs and investors planning to sell their businesses In the last 17 years we have built up a or build by acquisition. unique, global set of relationships with investors who, like us, are passionate about Since inception in 1999 we have completed technology. over 230 transactions with category leaders in the technology sector globally. We pride ourselves on building long-term relationships, and we work with our clients More than half of our deals deliver a cross- from growth equity fundraising, through debt border solution. restructuring, secondary fundraising and towards liquidity via trade sale or IPO. Our six offices across Europe and the US allow us to provide expert and experienced, local ASSET MANAGEMENT service to clients as well as market leading access to technology consolidators across the GP Bullhound Asset Management is our globe.
    [Show full text]
  • Cesifo Working Paper No. 8056
    8056 2020 January 2020 Mergers in the Digital Economy Axel Gautier, Joe Lamesch Impressum: CESifo Working Papers ISSN 2364-1428 (electronic version) Publisher and distributor: Munich Society for the Promotion of Economic Research - CESifo GmbH The international platform of Ludwigs-Maximilians University’s Center for Economic Studies and the ifo Institute Poschingerstr. 5, 81679 Munich, Germany Telephone +49 (0)89 2180-2740, Telefax +49 (0)89 2180-17845, email [email protected] Editor: Clemens Fuest www.cesifo-group.org/wp An electronic version of the paper may be downloaded · from the SSRN website: www.SSRN.com · from the RePEc website: www.RePEc.org · from the CESifo website: www.CESifo-group.org/wp CESifo Working Paper No. 8056 Mergers in the Digital Economy Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five’s strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company’s most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves.
    [Show full text]
  • Infilings Redline Report Redline Key: New / Added Text Text Deleted Text
    Datadog (DDOG) Sep-09 2019 S-1/A inFilings Redline Report Redline Key: New / Added Text Text Deleted Text - Prospectus As filed with the Securities and Exchange Commission on September 9, 2019. Registration No. 333- 333-233428 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 Amendment No. 1 to FORM S-1 REGISTRATION STATEMENT UNDER THE SECURITIES ACT OF 1933 Datadog, Inc. (Exact name of Registrant as specified in its charter) Delaware 7372 27-2825503 (State or other jurisdiction of (Primary Standard Industrial (I.R.S. Employer incorporation or organization) Classification Code Number) Identification Number) 620 8th Avenue, 45th Floor New York, New York 10018 (866) 329-4466 (Address, including zip code, and telephone number, including area code, of Registrant's principal executive offices) Olivier Pomel Chief Executive Officer Datadog, Inc. 620 8th Avenue, 45th Floor New York, New York 10018 (866) 329-4466 (Name, address, including zip code, and telephone number, including area code, of agent for service) Copies to: Jodie Bourdet David Obstler Richard D. Truesdell, Jr. Nicole Brookshire Laszlo Kopits Marcel R. Fausten Alison Haggerty Datadog, Inc. Davis Polk & Wardwell LLP Cooley LLP 620 8th Avenue, 45th Floor 450 Lexington Avenue 55 Hudson Yards New York, New York 10018 New York, New York 10017 New York, New York 10001 (866) 329-4466 (212) 450-4000 (212) 479-6000 Approximate date of commencement of proposed sale to the public: As soon as practicable after this registration statement is declared effective. If any of the securities being registered on this Form are to be offered on a delayed or continuous basis pursuant to Rule 415 under the Securities Act of 1933, check the following box.
    [Show full text]
  • World Tech M&A Report 2016
    WORLD TECH M&A REPORT 2016 www.corumgroup.com 2016 – ANOTHER RECORD YEAR? 2016 will continue the LUMINARY PANEL record pace established Thanks to our luminary panelists who took part in “Forecast 2016: last year in all 30 Global Tech M&A.” For more of their thoughts on the technology market sectors around landscape, view the original webcasts at www.corumgroup.com. the world. This report profiles those sectors, “The most interesting conversations we’re having including top buyers, result not from any one trend, because anyone can jey deals and valuation extrapolate, but from triangulating, looking for ways metrics. For the third these trends will play off of each other.” year, we are presenting PETER COFFEE, SALESFORCE the Corum Top Ten Disruptive Technology Trends with individual “There is an arms race in data security between good reports by Corum’s top executives. These trends guys and bad guys, and making it convenient for the are driving tech M&A, fueled by over $4 trillion good guys to use the best stuff is probably the bigger dollars available to both strategic and financial challenge now, rather than the technical challenge.” buyers. REESE JONES, SINGULARITY UNIVERSITY Special thanks to our panel of industry luminaries “I’m very excited to see more companies getting formed for their insights and contribution to this report: in the areas of predictive analytics, in the area of being Peter Coffee from Salesforce, Reese Jones from able to help industry-specific verticals, to be able to Singularity University, Mukund Mohan from understand what to do with large amounts of data.” Microsoft Ventures and Dr.
    [Show full text]
  • Market Compass Cloud Access Security Brokers Report No.: Mc80079 Page 2 of 77 5.7 Mcafee
    KuppingerCole Report By Mike Small MARKET COMPASS September 23, 2020 Cloud Access Security Brokers The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broker) solutions that help to secure the organizational use of cloud services. By Mike Small [email protected] Content 1 Management Summary ........................................... 4 2 Market Segment ................................................. 6 2.1 Market Description .............................................. 6 2.2 Market Direction ............................................... 8 2.3 Capabilities .................................................. 11 2.3.1 Basic Functionality ........................................... 11 2.3.2 Discovery of Cloud Use ........................................ 13 2.3.3 Cloud Service Access Control .................................... 14 2.3.4 Cloud Data Protection ......................................... 15 2.3.5 Compliance ................................................ 17 2.3.6 Posture Management .......................................... 18 3 Vendors & Products ............................................. 20 3.1 Vendors Covered .............................................. 20 3.2 Vendors to Watch ............................................. 21 4 Ratings at a Glance ............................................. 23 4.1 Featured Vendors ............................................. 25 4.1.1 Featured for Innovation:
    [Show full text]
  • Microsoft's Expanded Horizons in Security
    Microsoft's Expanded Horizons in Security Securing Azure remains front and center, but hybrid and multicloud security is the way forward Licensed Reprint Publication Date: 02 Apr 2019 | Product code: INT003-000345 Rik Turner Information Classification: General Microsoft's Expanded Horizons in Security Summary Catalyst Microsoft's development of its security offerings has, until now, been designed to reinforce the appeal, first of its operating system, database, and office productivity software and more recently of its cloud services. While this remains the core driver of its activities in security, there are signs of a broadening of its approach of late as it moves to support heterogeneous environments and the environments of competing cloud service providers (CSPs). Most significantly, in the run-up to the recent RSA Conference on cybersecurity, held in San Francisco March 4‒7, 2019, the company launched Azure Sentinel, a security incident and event management (SIEM) platform it is offering as a cloud-based service, and a managed threat-hunting service called Microsoft Threat Experts. The SIEM-as-a-service (SIEMaaS) offering in particular takes Microsoft into the world of heterogeneous security management. Ovum view Microsoft has already expanded successfully from being a vendor of software licenses to providing the whole spectrum of cloud services, which include infrastructure- and platform-as-a-service (IaaS and PaaS) with its Azure business and software-as-a-service (SaaS) with its Microsoft 365 portfolio. In making that journey, the vendor has also recognized that security is an integral part of being a CSP, and it has invested accordingly in both internal development and acquisitions.
    [Show full text]
  • Mergers in the Digital Economy
    3136 REPRINT Axel Gautier, Lamesch Joé Mergers in the Digital Economy Information Economics and Policy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email:[email protected] https://uclouvain.be/en/research-institutes/ lidam/core/reprints.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z June 2, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Apple and Microsoft (GAFAM) acquired 175 companies, from small startups to billion dollar deals. In this paper, we provide detailed information and statistics on the merger activity of the GAFAM and on the characteristics of the firms they acquire. One of the most intriguing features of these acquisitions is that, in the majority of cases, the product of the target is discontinued under its original brand name post acquisition and this is especially true for the youngest firms. There are three reasons to discontinue a product post acquisition: the product is not as successful as expected, the acquisition was not motivated by the product itself but by the target's assets or R&D effort, or by the elimination of a potential competitive threat. While our data does not enable us to screen between these explanations, the present analysis shows that most of the startups are killed in their infancy. This important phenomenon calls for tighter intervention by competition authorities in merger cases involving big techs. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank P.
    [Show full text]
  • VR, AI, Robotics, Kinect, Sound 그리고 VR Suit의 시너지가 중요  몰입도 극대화 통한 수익성 확대
    Entertainment Technology - Entertainment Technology가 가져올 우리의 미래 - Analyst 김영우 / 02-3773-9244 / IT총괄, 반도체, 디스플레이 Analyst 최관순 / 02-3773-8812 / 지주, 통신, 게임, 인터넷 AltAnalyst 김민규 /02/ 02-3773-8497 / IT 장비, 소재 Analyst 박형우 / 02-3773-8889 / 휴대폰, 전기전자, 통신장비 [ Table of contents ] Analyst 김영우 (IT총괄/반도체/디스플레이) hermes_ [email protected] 02-3773-9244 1. 자동차 Arcade Game ⇒ 무인자동차 Analyst 2. 인공지능과의 결합 ⇒ AlphaGo 최관순 (통신/지주/인터넷/게임) [email protected] 3. Game에 사용되는 AI의 2가지 종류 02-3773-8812 4. 비몽사몽, 여진여몽의 상태로 이끌어 줄 Technology Analyst 김민규 5. 기타 Industry로의 파급효과 (IT장비/소재/IT중소형주) [email protected] 02-3773-8497 6. 글로벌 리딩업체의 전략적 제휴 및 M&A 7. Global Top-picks와 Supply Chain 구성도 Analyst 박형우 (휴대폰/전기전자/통신장비) [email protected] 02-3773-8889 Summary - E.T Chipset & Set & Cloud 1. 첨단기술 상용화의 시작은 Entertainment Technology에서 출발 - 사용자의 몰입도를 최대한 높이려면, 보다 높은 수준의 Reality와 인공지능(AI) 구현이 기본 - 뛰어난 그래픽 성능 구현 및 병렬컴퓨팅에 의한 인공지능 강화를 위해 필요한 핵심부품은 GPU - VR, AI, Robotics, Kinect, Sound 그리고 VR Suit의 시너지가 중요 몰입도 극대화 통한 수익성 확대 2. 디바이스 H/W Spec 강화를 통한 Reality 향상 - VR 디바이스 보급 확대 명암비와 반응속도가 뛰어난 초고해상도 OLED 및 DRAM 수요 급증 전망 - 과거 PDP TV는 고해상도 구현이 불가 SONY PS2 출시 후 본격화된 FHD TV 경쟁에서 LCD에 도태 - 향후 주목해야 할 기술은 1) GPU에서의 Direct-to-display와 2) VR과 AR 기능이 결합된 Mixed Reality (MR) 3. 강력한 컴퓨팅파워와 뛰어난 알고리즘은 인공지능 향상의 필요충분조건 - 일반적인 게임의 인공지능은 Min-max tree search와 Generic Algorithm의 협업구조로 설계 - GPU에서의 대량 병렬처리를 통해 Tree Search와 Generic Algorithm에서 3~400배 가량 속도 향상 - 1) 저전력 반도체 양산 위한 공정미세화 (Logi c, DRAM) , 2) 서버기능 향상을 위한 3D N and , SCM 등이 중요 3 Summary - E.T Component 1.
    [Show full text]