Leadership Compass CASB

Total Page:16

File Type:pdf, Size:1020Kb

Leadership Compass CASB KuppingerCole Report LEADERSHIP COMPASS by Mike Small |August 2016 Cloud Access Security Brokers How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need. by Mike Small [email protected] August 2016 Leadership Compass Cloud Security Access Brokers By KuppingerCole KuppingerCole Advisory Note Cloud Access Security Brokers Report No.: 71,138 Content 1 Management Summary ................................................................................................................ 4 1.1 Overall Leadership ............................................................................................................................ 5 1.2 Product Leadership ........................................................................................................................... 5 1.3 Market Leadership ............................................................................................................................ 6 1.4 Innovation ......................................................................................................................................... 7 2 Methodology ................................................................................................................................ 7 3 Product Rating .............................................................................................................................. 9 4 Vendor Rating ............................................................................................................................ 11 5 Vendor Coverage ........................................................................................................................ 12 6 Market Segment ......................................................................................................................... 12 7 Specific Features Analysed .......................................................................................................... 14 7.1 Shadow Cloud ................................................................................................................................. 14 7.2 Data Security .................................................................................................................................. 14 7.3 Access Control ................................................................................................................................ 14 7.4 Compliance ..................................................................................................................................... 15 7.5 Cyber Security ................................................................................................................................. 15 7.6 Other Unique Selling Propositions ................................................................................................. 15 8 Market Leaders .......................................................................................................................... 16 9 Product leaders .......................................................................................................................... 17 10 Innovation Leaders ..................................................................................................................... 18 11 Product Evaluation ..................................................................................................................... 19 11.1 CensorNet ....................................................................................................................................... 20 11.2 CipherCloud .................................................................................................................................... 21 11.3 FireLayers ........................................................................................................................................ 22 11.4 IBM ................................................................................................................................................. 23 11.5 Imperva ........................................................................................................................................... 24 11.6 Microsoft ........................................................................................................................................ 25 11.7 Netskope ......................................................................................................................................... 26 11.8 Skyhigh Networks ........................................................................................................................... 27 12 Products at a Glance ................................................................................................................... 28 12.1 Ratings at a glance .......................................................................................................................... 28 12.2 The Market/Product Matrix ........................................................................................................... 30 12.3 The Product/Innovation Matrix ...................................................................................................... 31 12.4 The Innovation/Market Matrix ....................................................................................................... 32 13 Overall Leadership ...................................................................................................................... 34 KuppingerCole Leadership Compass Cloud Access Security Brokers Report No.: 71,138 Page 2 of 38 14 Vendors and Market Segments to Watch .................................................................................... 35 14.1 Bitglass ............................................................................................................................................ 35 14.2 Symantec, Blue Coat, Perspecsys and Elastica ............................................................................... 35 14.3 CloudLock and Cisco ....................................................................................................................... 36 14.4 NextLabs® ....................................................................................................................................... 36 14.5 Palerra ............................................................................................................................................ 36 14.6 Palo Alto Networks ......................................................................................................................... 37 14.7 SkyFormation .................................................................................................................................. 37 14.8 Vaultive ........................................................................................................................................... 37 15 Copyright ................................................................................................................................... 37 Content Tables Table 1 Comparative overview of the ratings for the product capabilities ............................................... 28 Table 2 Comparative overview of the ratings for the vendors .................................................................. 29 Table of Figures Figure 1: Overall Leaders in the Cloud Access Security Broker segment ..................................................... 5 Figure 2: Product Leaders in the Cloud Access Security Broker segment .................................................... 5 Figure 3: Market Leaders in the Cloud Access Security Broker segment ..................................................... 6 Figure 4: Innovation Leaders in the Cloud Access Security Broker segment ............................................... 7 Figure 5: Market Leaders in the Cloud Access Security Broker segment .................................................. 16 Figure 6: Product Leaders in the Cloud Access Security Broker segment .................................................. 17 Figure 7: Innovation Leaders in the Cloud Access Security Broker segment ............................................. 18 Figure 8: The Market/Product Matrix ........................................................................................................ 30 Figure 9: The Product/Innovation Matrix ................................................................................................... 31 Figure 10: The Innovation/Market Matrix ................................................................................................. 32 Figure 11: The Overall Leadership rating for the Cloud Access Security Broker segment ......................... 34 Related Research Documents Advisory Note: Security Organization, Governance, and the Cloud – 71151 Scenario Report: Understanding Cloud Security – 70321 Advisory Note: Cloud Provider Assurance – 70586 Advisory Note: Selecting your cloud provider – 70742 Leadership Compass: Infrastructure as a Service - 70959 KuppingerCole Leadership Compass Cloud Access Security Brokers Report No.: 71,138 Page 3 of 38 1 Management Summary The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these
Recommended publications
  • Flower Power Daisy CEO Neil Muller on the Firm’S Plans to Blossom Into a £1Bn Business 16
    March 2017 Flower power Daisy CEO Neil Muller on the firm’s plans to blossom into a £1bn business 16 ESSENTIAL ELEMENTS OF A GOOD PARTNER PROGRAMME 20 EMERGING CHANNEL OPPORTUNITIES IN THE AREA OF DATA ANALYTICS 25 WHAT THE CHANGES TO G-CLOUD MEAN FOR SUPPLIERS 32 REMOTE CONTROL 7th Gen Intel® Core™ vPro™ processorsocessors and Intel® Active Management Technologychnology help reduce on-site IT support costs.ts. SMART REMOTE MANAGEABILITY £ª®°£¢³¡£­¬[±§²£±³®®­°²¡­±²±µ§²¦°£«­²£¢§¥¬­±²§¡± WIRELESS DEVICE MANAGEMENT ¶£¡³²£°£«­²£¦§¥¦[°£±­ª³²§­¬°£§«¥§¬¥¤­°ª­µ£°1 SIMPLIFY PC LIFESTYLE TRANSITIONS §®£¢²§¬±£¡­¬¢±¤°­«¬·µ¦£°£°­³¬¢²¦£µ­°ª¢µ§²¦¬²£ª£«­²£ £¡³°£°±£¤­°¬²£ª¾­ª§¢²²£°§´£±1 ¬²£ª²£¡¦¬­ª­¥§£±Ì¤£²³°£±¬¢ £¬£ß²±¢£®£¬¢­¬±·±²£«¡­¬ß¥³°²§­¬¬¢«·°£¯³§°££¬ ª£¢¦°¢µ°£±­¤²µ°£­°±£°´§¡£¡²§´²§­¬£°¤­°«¬¡£´°§£±¢£®£¬¢§¬¥­¬±·±²£« ¡­¬ß¥³°²§­¬¦£¡©µ§²¦·­³°±·±²£««¬³¤¡²³°£°­°°£²§ª£°­°ª£°¬«­°£²¦²²®``±³®®­°²§¬²£ª¡­« ½¬²£ª­°®­°²§­¬ ªª°§¥¦²±°£±£°´£¢¬²£ª²¦£¬²£ªª­¥­¬²£ª­°£²¦£¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£ª­¥­¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£¬²£ª¬±§¢£ ¬¢¬²£ª´°­°£²°¢£«°©±­¤¬²£ª­°®­°²§­¬§¬²¦£¬¢`­°­²¦£°¡­³¬²°§£± Call our specialist sales teams North 01282 776776 South 01256 707070 a Company store.exertis.co.uk Haymarket House, 28-29 Haymarket, London SW1Y 4RX Tel: (020) 7316 9000 Editorial Editor Doug Woodburn 9517 [email protected] Deputy editor Hannah Breeze 9510 [email protected] Reporter Tom Wright 9097 [email protected] Avoiding a public Channelnomics.eu Content editor Sam Trendall 9813 [email protected] tongue-lashing Reporter Josh Budd
    [Show full text]
  • Federal Transformation with SASE-Based TIC 3.0 Solutions
    WHITE PAPER Federal Transformation with SASE-based TIC 3.0 Solutions Zero-trust access with cloud-native advanced data and threat protection for cloud and web INTRODUCTION The Trusted Internet Connection (TIC) version 3.0 advances to a cloud-first perspective providing federal teams the opportunity to leverage cloud and mobility. While zero-trust network access (ZTNA) can replace legacy VPNs for direct access to private apps and resources in public cloud or private data centers, it requires pairing with cloud-native secure access service edge (SASE) networking and defenses. The difference from legacy web solutions that are cloud hosted—or in the cloud—from defenses designed to decode cloud traffic—or for the cloud—becomes very apparent when analyzing capabilities. At the core of SASE defenses is data context of cloud communications for granular policy controls, plus advanced data and threat protection. Why TIC 3.0? The modernization to version 3.0 of TIC expands upon the original program to drive security standards and leverage advances in technology as agencies adopt mobile and cloud environments. The goal of TIC 3.0 is to secure federal data, networks, and boundaries while providing visibility into agency traffic, including cloud communications. Originally established in 2007, TIC is a federal cybersecurity initiative intended to enhance network and perimeter security across the Federal Government. The Office of Management and Budget (OMB), the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security agency (CISA), and the General Services Administration (GSA) oversee the TIC initiative, setting requirements and an execution framework for agencies to implement a baseline perimeter or multi-boundary security standard.
    [Show full text]
  • Exabeam Cloud Connectors Reliably Collect Logs from Over 40 Cloud Services
    Data Sheet Exabeam Cloud Connectors Reliably collect logs from over 40 cloud services Cloud services and infrastructure are commonplace Enhance Your Visibility in today’s modern network. Your business doesn’t stop at the firewall, and neither should your security Prebuilt, turnkey Cloud Connectors are available for a program. Ensuring your security teams have visibility broad range of cloud services, such as AWS, GitHub, into activities within your cloud services requires Google, Microsoft Office 365, Salesforce, Zoom, the right information being sent to your SIEM. But, and many other cloud security, identity and access collecting logs from cloud services isn’t always as management, infrastructure and easy as collecting them from on-premise solutions business applications. - coding is often required, and if you don’t have the skills in-house to do this, you will need to involve a Extend Behavioral Analytics to the Cloud consultant. Cloud security solutions typically offer limited Exabeam Cloud Connectors allow you to reliably detection of malicious insiders, compromised collect logs from over 40 cloud services into credentials and other unknown threats. Exabeam Data Lake, Exabeam Advanced Analytics For example, imagine a disgruntled employee or any other SIEM. Updates are made automatically downloading your customer list from Salesforce or whenever there are API changes, so you don’t stealing source code from Github. Pairing Cloud need coding skills or costly professional service Connectors with Exabeam Advanced Analytics allow engagements to ensure the right data is being you to combine cloud services activities with data collected. from on-premises applications, to improve detection of attacker tactics, techniques and procedures using behavior-based threat detection.
    [Show full text]
  • Formatting Guide: Colors & Fonts
    SAAS & CLOUD M&A AND VALUATION UPDATE Q1 2016 BOSTON CHICAGO LONDON LOS ANGELES NEW YORK ORANGE COUNTY PHILADELPHIA SAN DIEGO SILICON VALLEY TAMPA CONTENTS Section Page Introduction . Research Coverage: SaaS & Cloud 3 . Key Takeaways 4-5 M&A Activity & Multiples . M&A Dollar Volume 7 . M&A Transaction Volume 8-10 . LTM Revenue Multiples 11-12 . Revenue Multiples by Segment 13 . Highest Revenue Multiple Transaction for LTM 14 . Notable M&A Transactions 15 . Most Active Buyers 16-17 Public Company Valuation & Operating Metrics . SaaS & Cloud 125 Public Company Universe 19-20 . Recent IPOs 21 . Stock Price Performance 22 . LTM Revenue, EBITDA & P/E Multiples 23-25 . Revenue, EBITDA & EPS Growth 26-28 . Margin Analysis 29-30 . Best / Worst Performers 31-32 Notable Transaction Profiles 34-43 Public Company Trading & Operating Metrics 45-50 Technology & Telecom Team 52 1 INTRODUCTION RESEARCH COVERAGE: SAAS & CLOUD Capstone’s Technology & Telecom Group focuses its research efforts on the follow market segments: ENTERPRISE SAAS & MOBILE & WIRELESS CONSUMER INTERNET CLOUD • Analytics / Business Intelligence • Cloud & IT Infrastructure • Cloud Computing / Storage • Communication & Collaboration • Content Creation & Management • CRM & Customer Services • ERP, Supply Chain & Commerce CONSUMER IT & E-COMMERCE • Finance & Administration TELECOM HARDWARE • Human Resources • Marketing & Advertising • Software Conglomerates • Vertical Markets 3 KEY TAKEAWAYS – M&A ACTIVITY & MULTIPLES LTM M&A dollar volume continued to increase in Q1’16, representing
    [Show full text]
  • Magic Quadrant for Secure Web Gateways
    15/11/2019 Gartner Reprint Licensed for Distribution Magic Quadrant for Secure Web Gateways Published 11 November 2019 - ID G00380121 - 35 min read By Analysts Lawrence Orans, John Watts, Peter Firstbrook Rapid growth of cloud-based secure web gateway services has become a disruptive force in the market. SWG vendors are adding cloud access security broker, remote browser isolation, firewall and other advanced features to enhance the security of their platforms. Market Definition/Description The rapid adoption of SaaS applications such as Microsoft Office 365, Salesforce and others is driving enterprises to adopt cloud-based secure web gateway (SWG) services. Enterprises are rearchitecting their WANs so that web traffic from remote offices flows directly to the internet (via local internet breakout connections), instead of backhauling it over expensive MPLS links to a centralized data center. As part of this rearchitecture, enterprises are utilizing cloud-based security stacks, so that web traffic from remote offices first flows through a cloud security service (mostly SWG services) before it reaches its final internet destination. A secondary driver for the adoption of these cloud services is the need to protect mobile laptops when they are off the corporate network. We continue to see interest from enterprises seeking to integrate cloud access security broker (CASB) and SWG functionality. SWG vendors are responding to this trend, by either acquiring CASB technology or partnering with CASB providers (mainly Microsoft and its Cloud App Security service) to deliver more tightly integrated CASB and SWG solutions. CASB vendor Netskope is also addressing this trend, as it continues the development of its SWG solution introduced in 2018.
    [Show full text]
  • Data Protection & the Insider Threat
    Issue 2 1 Data Protection & the Insider Threat 4 Veriato Recon 6 Veriato 360 Data Protection & the Insider Threat 8 Research from Gartner: Market Guide for User and Entity Behavior Analytics Veriato (formerly known as SpectorSoft) has With multiple studies and surveys showing 22 Contact Us been enabling greater insight into insider actions that 50% of employees believe it is OK to take for over a decade. Thousands of companies, corporate data, the chances your organization has, government agencies, educational institutions is, or will experience insider driven data exfiltration and non-profits have successfully used Veriato are unacceptably high. In addition, the constant solutions to increase the security of critical stream of data breaches caused by imposters – systems and intellectual property, and to more external actors who level compromised credentials quickly and effectively respond to incidents. to “become” insiders – highlights the need to detect changes in insider behavior that suggest An established leader in employee monitoring attack. and investigations, we recognized the need for greater intelligence about the behavior of insiders. If you do not have a plan in place to detect it, you Many solution providers have done the same will miss your chance to prevent the damage. -- as evidenced by the Market Guide to User and Entity Behavior (“UEBA”) from Gartner Research With our unique ability to collect data at the point contained within these pages. of interaction between insiders and the IT resources they access, we saw an opportunity to help address Why Veriato? this challenge. Veriato has a proven data collector; As we set out to create a high value, differentiated one that provides much greater visibility into offering, we first focused on the need to secure insider activity than is available from logs.
    [Show full text]
  • RFI Response to Securing Critical Electric Infrastructure
    RFI Response Prepared By: Ensuring the Continued Security of the United Merlin Cyber States Critical Electric 8330 Boone Blvd, Infrastructure 8th Floor Vienna, VA 22182 Merlin Cyber Confidential June 7, 2021 Energy Resilience Division of the Office of Electricity U.S. Department of Energy 1000 Independence Avenue SW, Washington, DC 20585 Attention: Michael Coe Reference: Notice of Request for Information (RFI) on Ensuring the Continued Security of the United States Critical Electric Infrastructure To Whom It May Concern, Merlin International, Inc. (Merlin) is pleased to provide the Energy Department (DOE) with the following submission in support of Ensuring the Continued Security of the United States Critical Electric Infrastructure. Merlin International is a leading provider of next-generation cybersecurity solutions that protect government and commercial organizations. Merlin offers a broad portfolio of solutions that secure the enterprise from endpoints to networks, from governance to risk management, from infrastructure to information. Combining solutions with deep industry expertise and experience, Merlin delivers the cybersecurity solutions that organizations need to protect their most critical business assets while furthering their mission. Merlin appreciates your consideration of our response. We look forward to building an enduring, long-term professional relationship, and will do our utmost to ensure complete satisfaction. Should you have any questions regarding this RFI response, please do not hesitate to contact Tom Steiner
    [Show full text]
  • Where You Start Matters the First Few Years in Your Career Are Critical
    Where you start matters The first few years in your career are critical- they set the trajectory for your future. We know that as a student you want to be on the fast track and don’t have time to waste. Join us at Microsoft and see what will you do? As a student at Microsoft you will be able to balance between your studies and your work, gain on-hands experience while working around 20 weekly hours and enjoy maximum flexibility during exams periods as you are not required to work during exams period, and can work full time during vacations. Here is your chance to experience the exciting field of software development! *** We greatly encourage and welcome qualified candidates who happen to have disabilities to apply for jobs in our company Apply for Microsoft Positions- Student positions: Software Engineer Student - Cortana (Herzeliya) Software Engineer Student - WCD (Herzeliya) Research Software Engineer Student - OSG Recommendation (Herzeliya) Data Scientist Student- OSG Recommendations (Herzeliya) Software Engineer Student - Adallom (Herzeliya) Data Scientist Student - Aorato (Herzeliya) Hardware Student - Surface (Herzeliya) Cloud Analyst Student- Adallom (Herzeliya) Software Engineer Student- Bing Next (Herzeliya) Student positions at Raanana: Service Center TAM- Student (Raanana) Development Student (Raanana) Infrastructure Student (Raanana) New college graduate positions: Software Engineer- WCD (Haifa) Software Engineer - Cortana (Herzeliya) Software Engineer- Kusto (Herzeliya) Software Engineer- Data Security Team (Herzeliya) Software
    [Show full text]
  • Top Questions to Ask Your Cloud Dlp Vendor
    Mistake #1 TOP QUESTIONS TO ASK YOUR CLOUD DLP VENDOR Data Protection remains a top priority for organizations worldwide. As new communication and collaboration norms evolve, it’s imperative to ensure your organization’s security posture is up-to-date and capable of reducing risk of data loss, exposure and exfiltration across your multi-cloud, web and email environment. This check list will provide guidance on how to choose the right data protection solution for your organization. QUESTION: CAN I PROTECT SENSITIVE DATA FROM ALL Over 20% of users have sensitive data moving THE WAYS IT CAN LEAVE MY ORGANIZATION? between cloud apps EXPLANATION: 37% of this data is involved With the explosive growth of cloud applications and in DLP violations services, combined with an increasing number of remote workers, data loss vulnerabilities are more 97% increase for personal prevalent than ever before. Security teams must be use of managed devices able to discover, monitor and protect sensitive data – Netskope Cloud and Threat regardless of location, application, and device type. Report, 2020 | 1 The top two causes of NETSKOPE ADVANTAGE: data breaches: The Netskope Security Cloud facilitates the most comprehensive monitoring and control at the activity and content level, whether users 1) Hacking / malware are on-premises or remote, on a mobile device or even using mobile from an outside party, apps, browsers, or sync clients. Moreover, Netskope lets you dierentiate (32%), and your policy enforcement between managed (corporate) and unmanaged (personally-owned) devices. Netskope is the only cloud security solution that covers all possible cloud traic regardless of 2) Insider Threats location, device, or network.
    [Show full text]
  • Communications & New Media Nov. 2014 I Vol. 28 No. 11
    Novmagazine_Layout 1 10/30/14 11:18 AM Page 1 Communications & new media Nov. 2014 I Vol. 28 No. 11 November 2014 | www.odwyerpr.com Novmagazine_Layout 1 10/30/14 11:18 AM Page 2 Novmagazine_Layout 1 10/30/14 11:18 AM Page 3 Novmagazine_Layout 1 10/30/14 11:18 AM Page 4 Vol. 28, No. 11 November 2014 EDITORIAL FROM TECH STORYTELLING The tradition of American hysteria. TO STORYSHOWING In order to stand out, communicators INCIDENTS OF ANONYMOUS 6 20 today must do more than simply tell a ATTACKS SURGE ONLINE story — they need to share it. A new study shows that more than a quarter of Americans now admit to partici-8 BREAKING INTO THE pating in malicious online activity. INTERNATIONAL CES What smaller companies can do to get 10 PR COUNCIL TOLD TO 21 noticed and make a big splash at the EMBRACE DISRUPTION Consumer Electronics Show. Panelists discussed the perils that await complacent companies at an9 WANT TO TELL STORIES? OFFER October 24 PR Council forum. A STRATEGIC NARRATIVE Tech companies should talk less about PR SHOULD LEAD CHARGE 24 themselves, and more about the world in FOR ORGANIC SEARCH which they live. PR sits in a perfect position to10 DO YOU REALLY KNOW capitalize on the emerging trend of favor- YOUR COMPETITION? ing quality of content. 25 Knowing your competitors is essential GETTING CLEANTECH to success, and effective differentiation is critical in acquiring market leadership. 43 THROUGH ITS TEEN YEARS www.odwyerpr.comDaily, up-to-the-minute PR news Cleantech is finally on steady foot- TECH’S CHANCE AT CORPORATE ing for success.
    [Show full text]
  • Mergers in the Digital Economy
    2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M.
    [Show full text]
  • Enterprise Software Market
    ENTERPRISE SOFTWARE REVOLUTIONISING THE MODERN WORKPLACE November 2016 Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc. is a member of FINRA Enterprise Software: Revolutionising the Modern Workplace P3 CONTENTS 05 The Enterprise Software market 10 Our survey: The experts weigh in 17 Key findings 24 Overview of corporate finance activity 34 Selected company profiles 44 Authors 45 Our team 46 Disclaimer ABOUT US GP Bullhound is a technology investment bank providing independent strategic advice on Mergers & Acquisitions and Capital raising to leading technology entrepreneurs, companies and investors across the globe. Our passion for technology, our financial acumen and our understanding of the entrepreneur’s journey differentiate our advice from other investment banks. We help exceptional people build exceptional businesses to create more billion-dollar technology companies across Europe. MERGERS & ACQUISITIONS CAPITAL RAISING, SECONDARIES AND BLOCK TRADES We act as a trusted partner to entrepreneurs and investors planning to sell their businesses In the last 17 years we have built up a or build by acquisition. unique, global set of relationships with investors who, like us, are passionate about Since inception in 1999 we have completed technology. over 230 transactions with category leaders in the technology sector globally. We pride ourselves on building long-term relationships, and we work with our clients More than half of our deals deliver a cross- from growth equity fundraising, through debt border solution. restructuring, secondary fundraising and towards liquidity via trade sale or IPO. Our six offices across Europe and the US allow us to provide expert and experienced, local ASSET MANAGEMENT service to clients as well as market leading access to technology consolidators across the GP Bullhound Asset Management is our globe.
    [Show full text]