IT Security November 2019 IT Security November 2019 Sector Dashboard [4]

Total Page:16

File Type:pdf, Size:1020Kb

IT Security November 2019 IT Security November 2019 Sector Dashboard [4] Sectorwatch: IT Security November 2019 IT Security November 2019 Sector Dashboard [4] Public Basket Performance [5] Operational Metrics [7] Valuation Comparison [10] Recent Deals [13] Appendix [15] 7 Mile Advisors appreciates the opportunity to present this confidential information to the Company. This document is meant to be delivered only in conjunction with a verbal presentation, and is not authorized for distribution. Please see the Confidentiality Notice & Disclaimer at the end of the document. All data cited in this document was believed to be accurate at the time of authorship and came from publicly available sources. Neither 7 Mile Advisors nor 7M Securities make warranties or representations as to the accuracy or completeness of third-party data contained herein. This document should be treated as confidential and for the use of the intended recipient only. Please notify 7 Mile Advisors if it was distributed in error. 2 Overview 7MA provides Investment Banking & Advisory Services to the Business Services and Technology Industries globally. We advise on M&A and private capital transactions, and provide market assessments and benchmarking. As a close knit team with a long history together and a laser focus on our target markets, we help our clients sell their companies, raise capital, grow through acquisitions, and evaluate new markets. We publish our sectorwatch, a review of M&A and operational trends in the industries we focus. Dashboard Valuation Comparison • Summary metrics on the sector • Graphical, detailed comparison of valuation • Commentary on market momentum by multiples for the public basket comparing the most recent 12-month performance against the last 3-year averages. Public Basket Performance Recent Deals • Summary valuation and operating metrics • The most recently announced deals in the for a basket of comparable public companies sector 3 Dashboard Operating Metrics Revenue Growth 1 - year revenue growth compared to revenue growth Median LTM GP Margin % 75.9% -8.8% average for last 3 years Current revenue growth rate is less than the average of the last 3 years, indicating that the market may be flattening or declining Median LTM EBITDA Margin % 18.8% Pricing / Gross Margin Momentum Median LTM Rev. Growth % 6.4% 1 - year gross profit % compared to gross profit % 1.6% average for last 3 years 0% 20% 40% 60% 80% Current gross profit margin exceeds the average of the last 3 years gross profit margin by this amount, indicating supplier pricing power Valuation Profitability Momentum Median Price / LTM Earnings 22.8x 1 - year EBITDA % compared to EBITDA % average for 3.0% last 3 years Median TEV / LTM EBIT 18.0x Current EBITDA margin exceeds the average of the last 3 years EBITDA margin by this amount, a condition that may attract new entrants Median TEV / LTM EBITDA 14.1x Median TEV / LTM Revenue 4.4x 0x 10x 20x 30x 4 Public Basket Rev TEV / LTM Growth EBITDA TEV / EBITDA Rev / Company TEV $m Rev $m YoY GP % % Rev X X # FTEs FTE $k SecureWorks Corp. 821 533 8% 53% -1% 1.5 0.0 2,684 199 Bluedon Information Security Technologies Co.,Ltd. 1,395 312 5% 55% 31% 4.4 14.1 1,941 161 CyberArk Software Ltd. 4,181 413 31% 86% 19% 10.1 53.8 1,146 361 FireEye, Inc. 3,721 872 6% 66% -14% 4.3 0.0 3,200 272 Trend Micro Incorporated 5,858 1,511 3% 80% 33% 3.9 11.9 6,562 230 Fortinet, Inc. 16,084 2,049 20% 76% 18% 7.9 43.3 5,845 351 Check Point Software Technologies Ltd. 16,152 1,976 4% 89% 46% 8.2 17.9 5,070 390 Average 6,888 1,095 11% 72% 19% 5.8 20.1 3,778 280 Median 4,181 872 6% 76% 19% 4.4 14.1 3,200 272 share price as of 25Nov19 5 Public Basket Valuation Trends Public Basket Valuation 10x 15x 20x 25x 30x 35x 40x 45x 0x 5x Feb-15 May-15 TEV/EBITDA- Average TEV/EBITDA- Median Aug-15 Nov-15 Feb-16 May-16 Aug-16 Nov-16 25.1x Feb-17 6.1x May-17 Aug-17 TEV/Revenue - Average TEV/Revenue - Median Nov-17 Feb-18 May-18 Aug-18 Nov-18 Feb-19 May-19 Aug-19 Nov-19 Public Public Time over Multiples EBITDA Public 10x 10x 20x 30x 40x 50x 0x 2x 4x 6x 8x 0x Feb-15 Feb-15 TEV/Revenue - Median May-15 May-15 TEV/EBITDA- Median Aug-15 Multiples Revenue Aug-15 Nov-15 Nov-15 Feb-16 Feb-16 May-16 May-16 Aug-16 Aug-16 Nov-16 Nov-16 Feb-17 Feb-17 May-17 May-17 Aug-17 Aug-17 TEV/Revenue - Average Nov-17 TEV/EBITDA- Average Nov-17 Feb-18 Feb-18 May-18 May-18 Aug-18 Time over Aug-18 Nov-18 Nov-18 Feb-19 Feb-19 May-19 May-19 Aug-19 Aug-19 Nov-19 Nov-19 6 Operational Metrics LTM Gross Profit Margin % LTM EBITDA % Check Point Software Check Point Software Technologies Ltd. Technologies Ltd. CyberArk Software Ltd. Trend Micro Incorporated Bluedon Information Trend Micro Incorporated Security Technologies Co.,Ltd. Fortinet, Inc. CyberArk Software Ltd. FireEye, Inc. Fortinet, Inc. Bluedon Information Security Technologies SecureWorks Corp. Co.,Ltd. SecureWorks Corp. FireEye, Inc. Median Median - 20% 40% 60% 80% 100% (20%) - 20% 40% 60% 7 Operational Metrics LTM Revenue per LTM Revenue Growth % Full Time Employee x 000’s Check Point Software CyberArk Software Ltd. Technologies Ltd. Fortinet, Inc. CyberArk Software Ltd. SecureWorks Corp. Fortinet, Inc. FireEye, Inc. FireEye, Inc. Bluedon Information Security Technologies Trend Micro Incorporated Co.,Ltd. Check Point Software SecureWorks Corp. Technologies Ltd. Bluedon Information Trend Micro Incorporated Security Technologies Co.,Ltd. Median Median - 10% 20% 30% 40% $- $200 $400 $600 8 Operational Metrics Average Days Accounts Receivable Turnover Sales Outstanding Bluedon Information CyberArk Software Ltd. Security Technologies Co.,Ltd. SecureWorks Corp. Check Point Software Technologies Ltd. Trend Micro Incorporated FireEye, Inc. Fortinet, Inc. Fortinet, Inc. FireEye, Inc. Trend Micro Incorporated Check Point Software Technologies Ltd. SecureWorks Corp. CyberArk Software Ltd. Median Median 0x 2x 4x 6x 8x 10x 12x 0 100 200 300 400 500 9 Valuation TEV / LTM Revenue TEV / LTM EBITDA CyberArk Software Ltd. CyberArk Software Ltd. Check Point Software Technologies Ltd. Fortinet, Inc. Fortinet, Inc. Bluedon Information Check Point Security Technologies Software Co.,Ltd. Technologies Ltd. Bluedon FireEye, Inc. Information Security Technologies Co.,Ltd. Trend Micro Incorporated Trend Micro Incorporated SecureWorks Corp. Median Median 0x 3x 6x 9x 12x 15x 0x 20x 40x 60x 10 Valuation TEV / LTM EBIT Price / LTM Earnings CyberArk Software Ltd. CyberArk Software Ltd. Fortinet, Inc. Fortinet, Inc. Check Point Software Trend Micro Incorporated Technologies Ltd. Bluedon Information Security Check Point Software Technologies Technologies Ltd. Co.,Ltd. Trend Micro Bluedon Information Incorporated Security Technologies Co.,Ltd. Median Median 0x 20x 40x 60x 80x 0x 20x 40x 60x 80x 11 Valuation Historical Valuation Multiples Historical Valuation Multiples versus Gross Profit versus Revenue Growth Rate 60x 35% 60x 100% 89.5% 85.7% 31.4% 90% 30% 50x 79.7% 50x 80% 25% 70% 19.8% 40x 75.9% 40x 60% 20% 30x 55.4% 50% 30x 15% 40% 20x 20x 30% 10% LTM GP% LTM EBITDA(x) EBITDA(x) 20% 5.4% 10x 10x RGR% LTM 5% 2.7% 10% 4.2% 12x 14x 18x 43x 54x 12x 14x 18x 43x 54x 0x 0% 0x 0% EBITDA(x) LTM GP% EBITDA(x) LTM RGR% 12 Recent Transactions Total Transaction Target TEV / TEV / Date Target Buyer / Investor Value Revenue Revenue EBITDA 28Oct19 enSilo Inc. Fortinet, Inc. - - - - 14Oct19 Sophos Group plc Thoma Bravo, LLC 4,016.21 726.90 5.4x 47.6x 6Sep19 Computer Word Processing Systems, Inc. Red River Computer Company, Inc. - - - - 29Aug19 Jiangsu Share-sun Information Technology Co., Ltd. Shanghai Guao Electronic Technology Co., Ltd. 58.15 9.67 6.0x - 26Jul19 Beijing Cyber Xing An Science and Technology Co., Ltd. Venustech Group Inc. 9.35 24.44 3.8x - 3Apr19 Certain Assets and Liabilities of Eastwind Networks, Inc. NetScout Systems, Inc. 5.15 - - - 11Jun19 ECS Security Ltd (nka:Adarma Ltd) Livingbridge - - - - 4Jun19 magellan netzwerke GmbH magellan netzwerke GmbH - - - - 30Apr19 Network Computing Architects, Inc. ISSQUARED, Inc. - - - - 29Mar19 Nouveau Solutions Ltd Vinci Energies United Kingdom Plc - 9.20 - - 28Mar19 Ezenta A/S Nixu Oyj 9.10 9.88 0.9x - 12Mar19 Pallas GmbH Swiss IT Security AG - - - - 1Mar19 Conscia A/S Nordic Capital; Nordic Capital Fund IX - - - - 13Feb19 Proactive Technologies, LLC Abacus Group LLC - - - - 7Feb19 Fine Tec Exclusive Group SAS - - - - 6Feb19 Certus IT Ltd SysGroup plc 11.65 - - - 25Jan19 LGS Innovations LLC CACI, Inc. - Federal 750.00 - - - 31Dec18 procilon IT-Solutions GmbH Harald Quandt Industriebeteiligungen GmbH - - - - 4Dec18 Global Cloud Infrastructure Business of Neverfail Online Tech, LLC - - - - 4Dec18 Firstline Security Systems, Inc. Convergint Technologies LLC - - - - 14Nov18 Bio Nicsgene Co.,Ltd. (nka:Hanryu A.I. Center Co.,Ltd.) G-Smatt Global Co., Ltd. 4.23 - - - 5Nov18 Appthority, Inc. Symantec Corporation (nka:NortonLifeLock Inc.) - - - - 24Oct18 Dome9 Security Inc. Check Point Software Technologies Ltd. - - - - 23Oct18 Zonefox Limited Fortinet, Inc. 18.00 - - - 11Oct18 RedSocks Security B.V. BitDefender, LLC - - - - 10Oct18 Imperva, Inc. Thoma Bravo, LLC 2,119.12 351.76 5.2x NM 2Oct18 RedLock, Inc. Palo Alto Networks, Inc. 173.00 - - - 2Oct18 eVigilant, Inc. Converged Security Solutions - - - - 13 IT Security November 2019 APPENDIX: Public Basket Constituents 7 Mile Advisors appreciates the opportunity to present this confidential information to the Company. This document is meant to be delivered only in conjunction with a verbal presentation, and is not authorized for distribution. Please see the Confidentiality Notice & Disclaimer at the end of the document. All data cited in this document was believed to be accurate at the time of authorship and came from publicly available sources.
Recommended publications
  • Mind Your Own Business: a Longitudinal Study of Threats and Vulnerabilities in Enterprises
    Mind your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises Abstract—Enterprises own a significant fraction of the hosts to, financial assets, and security investment. Thus, it is very connected to the Internet and possess valuable assets, such as likely that the best practices mentioned above do not equally financial data and intellectual property, which may be targeted apply to all of them. by attackers. They suffer attacks that exploit unpatched hosts and install malware, resulting in breaches that may cost millions Currently, it is not clear how the security posture of in damages. Despite the scale of this phenomenon, the threat and enterprises differ according to different factors and whether vulnerability landscape of enterprises remains under-studied. The enterprises are indeed more secure than consumer hosts, i.e., security posture of enterprises remains unclear, and it’s unknown if their security investment is paying off. In this paper, we aim whether enterprises are indeed more secure than consumer hosts. to throw light into these questions by conducting a large-scale To address these questions, we perform the largest and longest longitudinal measurement study of enterprise security. We an- enterprise security study up to date. Our data covers nearly alyze the enterprise threat landscape including the prevalence 3 years and is collected from 28K enterprises, belonging to 67 industries, which own 82M hosts and 73M public-facing servers. of malware and PUP in enterprise hosts and how common security practices, such as vulnerability patching and operating Our measurements comprise of two parts: an analysis of system updates are handled.
    [Show full text]
  • Printmgr File
    ˆ200F$l2ZLVgqon1gÈŠ 200F$l2ZLVgqon1g¨ VDI-W7-PR3-1248 SYMANTEC CORPORATION Donnelley Financial12.6.30 EGV yanns0ap24-May-2018 22:26 EST 594139 TX 1 2* SYMANTEC CORP PAL HTM ESS 0C Page 1 of 1 UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM SD SPECIALIZED DISCLOSURE REPORT Symantec Corporation (Exact Name of Registrant as Specified in its Charter) Delaware 000-17781 77-0181864 (State or other jurisdiction of (Commission (IRS Employer incorporation or organization ) File Number) Identification No.) 350 Ellis Street, Mountain View, California 94043 (Address of Principal Executive Offices) (Zip Code) Nicholas R. Noviello, Executive Vice President and Chief Financial Officer (650) 527-8000 (Name and telephone number, including area code, of the person to contact in connection with this report.) Not Applicable (Former Name or Former Address, if Changed Since Last Report) Check the appropriate box below to indicate the rule pursuant to which this form is being filed, and provide the period to which the information in this form applies: Rule 13p-1 under the Securities Exchange Act (17 CFR 240.13p-1) for the reporting period January 1 to December 31, 2017 ˆ200F$l2ZLVhV$Vk6$Š 200F$l2ZLVhV$Vk6$ VDI-W7-PFL-0639 SYMANTEC CORPORATION Donnelley Financial12.6.29 EGV ahern0ap24-May-2018 23:14 EST 594139 TX 2 3* SYMANTEC CORP PAL HTM ESS 0C Page 1 of 1 Item 1.01. Conflict Minerals Disclosure and Report. Conflict Minerals Disclosure A copy of the Conflict Minerals Report of Symantec Corporation (“Symantec”) for the reporting period January 1 to December 31, 2017 is filed as Exhibit 1.01 to this specialized disclosure report on Form SD and is also available at Symantec’s website at https://www.symantec.com/about/corporate-responsibility/resources/corporate-responsibility-policies .
    [Show full text]
  • Secureworks Corp. (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES þ EXCHANGE ACT OF 1934 For the fiscal year ended February 3, 2017 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES o EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 001-37748 SecureWorks Corp. (Exact name of registrant as specified in its charter) Delaware 56-2015395 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) One Concourse Parkway NE Suite 500, Atlanta, Georgia 30328 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (404)327-6339 Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Class A Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC (NASDAQ Global Select Market) Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes o No R Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No R Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC
    NOT FOR RELEASE, PUBLICATION OR DISTRIBUTION, IN WHOLE OR IN PART, DIRECTLY OR INDIRECTLY, IN, INTO OR FROM ANY JURISDICTION WHERE TO DO SO WOULD CONSTITUTE A VIOLATION OF THE RELEVANT LAWS OR REGULATIONS OF SUCH JURISDICTION FOR IMMEDIATE RELEASE THIS ANNOUNCEMENT CONTAINS INSIDE INFORMATION 10 August 2021 RECOMMENDED MERGER of AVAST PLC with NORTONLIFELOCK INC. to be effected by means of a Scheme of Arrangement under Part 26 of the Companies Act 2006 Summary Further to the announcements made by NortonLifeLock Inc. (“NortonLifeLock”) and Avast plc (“Avast” or the “Company”) on 14 July 2021, the boards of NortonLifeLock and Avast are pleased to announce that they have reached agreement on the terms of a recommended merger of Avast with NortonLifeLock, in the form of a recommended offer by Nitro Bidco Limited (“Bidco”), a wholly- owned subsidiary of NortonLifeLock, for the entire issued and to be issued ordinary share capital of the Company (the “Merger”). It is intended that the Merger will be effected by means of a Court- sanctioned scheme of arrangement under Part 26 of the Companies Act (the “Scheme”). The boards of NortonLifeLock and Avast believe the Merger has compelling strategic logic and represents an attractive opportunity to create a new, industry leading consumer Cyber Safety business, leveraging the established brands, technical expertise and innovation of both groups to deliver substantial benefits to consumers, shareholders and other stakeholders. Under the terms of the Merger, Avast Shareholders will be entitled to receive: for each Avast Share held: USD 7.61 in cash and 0.0302 of a New NortonLifeLock Share in respect of their entire holding of Avast Shares (the “Majority Cash Option”).
    [Show full text]
  • Fortios 6.2 Data Sheet
    DATA SHEET FortiOS™ 6.2 Fortinet’s Security Operating System FortiOS enables the Fortinet Security Fabric, allowing organizations to readily achieve a security-driven network with one intuitive operating system. FortiOS 6.2, the latest version of Fortinet’s security operating system, powers the entire Security Fabric, helping customers reduce and manage the attack surface, prevent advanced threats, and reduce complexity from Internet of Things (IoT) devices to the cloud. Broad Visibility Highlights — What’s New Achieve full visibility across multi-cloud and branch § Spilt-task VDOM environments with SD-WAN, native cloud and virtual connectors, and intent-based segmentation. § Expanding product Integration with Security Fabric § New SDN and Threat Feed Connectors Integrated AI-driven Breach Prevention § SD-WAN Rule Definition and VPN Stop threats quickly and detect active intrusions and Setup Enhancements bad actors across the entire Security Fabric with § Extending Public Cloud Support integrated AI-driven intelligence capabilities combined § Additional Triggers and Actions with advanced, leading-edge technologies. § Flow-based security profile Improvements § MAC Address Objects § Consolidated risk View on Automated Operations, Orchestration, Topology Map and Response § FortiSandbox Cloud Region Reduce complexity and costs with rapid orchestrated Selection threat response, automated workflows, and § Policy Setup and Visibility automated auditing and compliance. Upgrades DATA SHEET | FortiOS™ 6.2 Overview Introducing FortiOS 6.2 increasing digital connectedness of organizations is driving the requirement for a security transformation, where security is integrated into applications, devices, and cloud networks to protect business data spread across these complex environments. FortiOS™ 6.2 delivers hundreds of new features and capabilities that were designed to provide the broad visibility, integrated threat intelligence, and automated response required for digital business.
    [Show full text]
  • Nortonlifelock to Acquire Avira in $360M Deal
    Source: Research and Markets December 10, 2020 05:58 ET NortonLifeLock to Acquire Avira in $360M Deal Dublin, Dec. 10, 2020 (GLOBE NEWSWIRE) -- ResearchAndMarkets.com published a new article on the IT security industry "NortonLifeLock to Acquire Avira in $360M Deal" NortonLifeLock has announced that it will acquire German IT security firm Avira for around $360 million in an all cash deal from Investcorp Technology Partners. Avira provides customers with a suite of software security solutions, including anti-malware, threat intelligence and IoT solutions to protect users' online identity and private data. The company has built a customer base of millions around its freemium model which allows users to install Avira antivirus software for free but with less functionality than paid versions. Avira has also grown its customer base via white label deals with strategic partners like NTT, Deutsche Telekom and more. By acquiring Avira, NortonLifeLock hopes to expand into the freemium consumer market as well as strong markets in Europe and other emerging regions. Avira chief executive Travis Witteveen and chief technology officer Matthias Ollig will join NortonLifeLock's leadership team after the deal's closing which is expected in the fourth quarter of 2021. To see the full article and a list of related reports on the market, visit"NortonLifeLock to Acquire Avira in $360M Deal" About ResearchAndMarkets.com ResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.
    [Show full text]
  • Summary Report 2020 Awards, Winners, Comments
    Independent Tests of Anti-Virus Software Summary Report 2020 Awards, winners, comments TEST PERIOD : 2020 LANGUAGE : ENGLISH LAST REVISION : 15TH JANUARY 2021 WWW.AV-COMPARATIVES.ORG Summary Report 2020 www.av-comparatives.org Content INTRODUCTION 3 MANAGEMENT SUMMARY 5 ANNUAL AWARDS 9 PRICING 16 USER EXPERIENCE REVIEW 18 AVAST FREE ANTIVIRUS 21 AVG ANTIVIRUS FREE 24 AVIRA ANTIVIRUS PRO 27 BITDEFENDER INTERNET SECURITY 30 ESET INTERNET SECURITY 34 F-SECURE SAFE 38 G DATA INTERNET SECURITY 41 K7 TOTAL SECURITY 45 KASPERSKY INTERNET SECURITY 48 MCAFEE TOTAL PROTECTION 52 MICROSOFT DEFENDER ANTIVIRUS 55 NORTONLIFELOCK NORTON 360 DELUXE 58 PANDA FREE ANTIVIRUS 61 TOTAL AV ANTIVIRUS PRO 64 TOTAL DEFENSE ESSENTIAL ANTI-VIRUS 67 TREND MICRO INTERNET SECURITY 70 VIPRE ADVANCED SECURITY 73 FEATURELIST COMES HERE 76 COPYRIGHT AND DISCLAIMER 77 2 Summary Report 2020 www.av-comparatives.org Introduction About AV-Comparatives We are an independent test lab, providing rigorous testing of security software products. We were founded in 2004 and are based in Innsbruck, Austria. AV-Comparatives is an ISO 9001:2015 certified organisation. We received the TÜV Austria certificate for our management system for the scope: “Independent Tests of Anti-Virus Software”. http://www.av-comparatives.org/iso-certification/ AV-Comparatives is the first certified EICAR Trusted IT-Security Lab http://www.av-comparatives.org/eicar-trusted-lab/ At the end of every year, AV-Comparatives releases a Summary Report to comment on the various consumer anti-virus products tested over the course of the year, and to highlight the high-scoring products of the different tests that took place over the twelve months.
    [Show full text]
  • Demystifying the IP Blackspace
    Demystifying the IP Blackspace Quentin Jacquemart1 , Pierre-Antoine Vervier2, Guillaume Urvoy-Keller3, and Ernst Biersack4 1 Eurecom, Sophia Antipolis [email protected] 2 Symantec Research Labs, Sophia Antipolis Pierre-Antoine [email protected] 3 Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, 06900 Sophia Antipolis [email protected] 4 [email protected] Abstract. A small part of the IPv4 address space has still not been assigned for use to any organization. However, some of this IP space is announced through BGP, and is, therefore, globally reachable. These prefixes which are a subset of the bogon prefixes, constitute what we call the blackspace. It is generally admitted that the blackspace stands to be abused by anybody who wishes to carry out borderline and/or illegal activities without being traced. The contribution of this paper is twofold. First, we propose a novel methodology to accurately identify the IP blackspace. Based on data collected over a period of seven months, we study the routing-level characteristics of these networks and identify some benign reasons why these networks are announced on the Internet. Second, we focus on the security threat associated with these networks by looking at their application-level footprint. We identify live IP addresses and leverage them to fingerprint services running in these networks. Using this data we uncover a large amount of spam and scam activities. Finally, we present a case study of confirmed fraudulent routing of IP blackspace. 1 Introduction The global BGP (Boder Gateway Protocol) routing table now contains over 600k dis- tinct IPv4 prefixes. A few of these prefixes should not be globally announced (such as the private IP space) and are collectively referred to as bogon prefixes.
    [Show full text]
  • Fiscal 2021 Q4 Earnings
    MAY 10, 2021 FISCAL 2021 Q4 EARNINGS Copyright © 2021 NortonLifeLock Inc. All rights reserved. Forward-Looking Statements This supplemental information contains statements which may be considered forward-looking within the meaning of the U.S. federal securities laws. In some cases, you can identify these forward-looking statements by the use of terms such as “expect,” “will,” “continue,” or similar expressions, and variations or negatives of these words, but the absence of these words does not mean that a statement is not forward-looking. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including, but not limited to: the statements under “Q1 FY22 Guidance,” including expectations relating to first quarter revenue, non-GAAP revenue growth, and non-GAAP EPS; statements related to the acquisition of Avira and NortonLifeLock’s products and services and growth strategies; any other statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. These statements are subject to known and unknown risks, uncertainties and other factors that may cause our actual results, levels of activity, performance or achievements to differ materially from results expresse d or implied in this supplemental information. Such risk factors include, but are not limited to, those related to: the current and future impact of the COVID-19 pandemic on the Company’s business and industry; the effect of the sale of substantially all of the Enterprise Security
    [Show full text]
  • EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response
    EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) has compliance or leave your organization vulnerable to attack. approximately 350 integrations with IT and security products Exabeam is designed to scale without penalizing you for the to help your analysts work smarter - providing inbound amount of data you ingest. Our flat pricing model is based integrations with data sources from vendors to easily on the number of users and devices in your environment, allow you to ingest as much data as possible; and SOAR not data volume. integrations with 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam Incident Responder integrates with approximately Exabeam ingests data from approximately 300 different 70 third party IT and security products. These integrations IT and security products to provide security analysts with help your analysts to gather evidence and attach them as the full scope of events. Exabeam Data Lake, Exabeam artifacts to incidents or quarantine affected users and assets Advanced Analytics and Exabeam Entity Analytics ingest logs until incidents are mitigated.
    [Show full text]
  • Nortonlifelock Global Partner Operations Guide – Version 1.0
    NortonLifeLock Global Partner Operations Guide – Version 1.0 Organization/Authority Global Business Operations Effective Date 1st June 2020 Last Updated 14th April 2021 Guide Owner – Title Director, Global Product Operations and Supply Chain Further info/questions: Regional Sales Operations [email protected] [email protected] [email protected] Table of Contents Guide scope ............................................................................................................................................................ 2 Definitions and product type ................................................................................................................................... 3 Ordering .................................................................................................................................................................. 4 Trade Compliance Requirements ............................................................................................................................. 9 Inventory ............................................................................................................................................................... 10 Quality .................................................................................................................................................................. 10 Reporting .............................................................................................................................................................
    [Show full text]