Piper Jaffray Cybersecurity Earnings Update

Total Page:16

File Type:pdf, Size:1020Kb

Piper Jaffray Cybersecurity Earnings Update Piper Jaffray Cybersecurity Earnings Update Fourth Quarter 2017 Greg Klancher Principal, Technology Investment Banking Piper Jaffray & Co. MINNEAPOLIS | BOSTON | CHICAGO | HOUSTON | LONDON | LOS ANGELES | NEW YORK | SAN FRANCISCO | ZÜRICH Piper Jaffray Companies (NYSE: PJC) is an investment bank and asset management firm headquartered in Minneapolis with offices across the U.S. and in London, Zurich and Hong Kong. Securities brokerage and investment banking services are offered in the United States through Piper Jaffray & Co., member NYSE and SIPC, in Europe through Piper Jaffray Ltd., authorized and regulated by the Financial Conduct Authority, and in Hong Kong through Piper Jaffray Hong Kong, authorized and regulated by the Securities and Futures Commission. Asset management products and services are offered through three separate investment advisory affiliates registered with the U.S. Securities and Exchange Commission: Advisory Research Inc., Piper Jaffray Investment Management LLC and PJC Capital Partners LLC. Piper Jaffray & Co., Member SIPC and FINRA 11/17 Revenue Growth Remained Strong in Q4; Revenue Guidance for Q1 Mostly In-Line with Expectations Year-over-Year Revenue Growth in Q4 remained in-line with average growth in the past 6 quarters Year-over-Year Revenue Growth – Post Q4 2017 Earnings Quarter-over-Quarter Revenue Growth – Post Q4 2017 Earnings 10.0% 9.0% 25.0% 8.3% 21.0% 8.0% 20.5% 20.0% 6.2% 6.7% 5.4% 20.0% 18.2% 6.0% 5.3% 16.3% 16.7% 15.6% 4.0% 15.0% 13.2% 2.0% 0.0% 10.0% (2.0%) 5.0% (4.0%) (4.2%) (6.0%) (5.7%) 0.0% (8.0%) C2Q16A / C3Q16A / C4Q16A / C1Q17A / C2Q17A / C3Q17A / C4Q17A / Q1 18 C2Q16A / C3Q16A / C4Q16A / C1Q17A / C2Q17A / C3Q17A / C4Q17A / Q1 18 C2Q15A C3Q15A C4Q15A C1Q16A C2Q16A C3Q16A C4Q16A Guidance C1Q16A C2Q16A C3Q16A C4Q16A C1Q17A C2Q17A C3Q17A Guidance vs. Q1 17 vs. Q4 17 Actual Actual Quarterly Revenue vs. Street T+1 Share Price Reaction Post Q4 2017 Announcement 4.0% 3.0% 2.5% 3.5% 3.4% 3.0% 2.0% 2.5% 2.0% 1.5% 0.9% 1.0% 1.0% 0.4% 0.5% 0.0% 0.0% Q4 17A vs Q4 17 Street Q1 18 Guidance vs Q1 18 Street Mean Median Source: Company filings, S&P Capital IQ and FactSet; median of companies listed on page 2 PIPER JAFFRAY 1 Q4 Revenues Were Largely Better Than Street Expectations; Q1 Guidance is Mostly In-Line with Street Expectations • Seven companies (PFPT, FSCT, MIME, VRNS, SAIL, SPLK, OKTA) reported YoY revenue growth in excess of 30% in Q4 T+1 Percent 4Q17 Q/Q Revenue 4Q17 Y/Y Revenue 4Q17 Actual vs. CQ1E QoQ CQ1E YoY Growth CQ1E Guidance CY18 YoY Growth CY18 Guidance Reaction 4Q17 Ticker Company 4Q17 Earnings Date growth growth Street Growth (Guidance) (Guidance) vs. Street (Guidance) vs. Street Announcement Security SYMC Symantec Corporation 01/31/18 (2.5%) 16.1% (4.4%) (1.6%) 14.3% (7.0%) NA NA 0.5% CHKP Check Point Software Technologies Ltd. 01/31/18 11.3% 4.0% (0.5%) (11.1%) 3.3% (2.6%) 5.1% (1.0%) (0.4%) FTNT Fortinet, Inc. 02/05/18 11.3% 14.8% 1.9% (6.4%) 14.5% 0.1% 14.1% 0.9% 6.2% AKAM Akamai Technologies, Inc. 02/06/18 6.8% 7.7% 2.2% (1.6%) 7.2% 0.8% 7.5% 0.0% 1.3% PFPT Proofpoint, Inc. 02/06/18 8.3% 36.1% 4.1% 3.2% 32.5% 1.5% 28.6% 0.3% (2.6%) RDWR Radware Ltd. 02/07/18 10.2% 13.0% 4.5% (7.6%) 10.4% 2.1% NA NA (0.2%) FSCT ForeScout Technologies, Inc. 02/07/18 2.5% 33.4% 5.7% (16.6%) 24.0% (0.7%) 20.0% 1.2% (11.9%) LSE:SOPH Sophos Group plc 02/08/18 6.5% 23.4% 2.0% NA NA NA NA NA (1.6%) IMPV Imperva, Inc. 02/08/18 8.6% 16.2% (0.0%) NA NA NA NA NA 10.7% FEYE FireEye, Inc. 02/08/18 6.7% 9.5% 4.4% (3.8%) 12.0% 4.0% 9.2% 2.5% 9.3% MOBL MobileIron, Inc. 02/08/18 14.3% 7.4% 5.1% (10.9%) 2.9% (3.3%) 10.5% 4.3% 20.0% MIME Mimecast Limited 02/12/18 6.7% 39.2% 3.6% 6.2% 36.3% 4.8% NA NA 3.1% RPD Rapid7, Inc. 02/12/18 14.3% 28.2% 0.6% (4.2%) 22.2% (0.7%) 20.4% 0.7% 0.9% VRNS Varonis Systems, Inc. 02/12/18 36.6% 34.6% 10.4% (32.2%) 22.8% 1.4% 20.7% 4.8% 0.5% QLYS Qualys, Inc. 02/12/18 5.8% 20.5% 1.5% 1.3% 20.0% 1.5% 20.0% 3.5% 7.5% TSX:ABT Absolute Software Corporation 02/13/18 0.9% 3.4% 0.4% NA NA NA NA NA (3.4%) CYBR CyberArk Software Ltd. 02/15/18 24.0% 24.9% 6.3% (14.1%) 16.9% 0.1% 20.0% 2.5% (1.9%) SAIL SailPoint Technologies Holdings, Inc. 02/21/18 55.6% 52.8% 21.8% (34.3%) 25.5% 0.0% 19.3% 10.2% 11.4% VDSI VASCO Data Security International, Inc. 02/21/18 6.6% 14.5% 8.1% NA NA NA 4.5% 0.3% (11.2%) ZIXI Zix Corporation 02/22/18 1.3% 7.8% 0.5% (0.6%) 5.1% (2.9%) 3.9% (3.9%) (0.9%) PANW Palo Alto Networks, Inc. 02/26/18 7.3% 28.3% 3.4% 0.1% 25.8% 1.8% NA NA 2.3% SPLK Splunk Inc. 03/01/18 27.7% 37.0% 7.4% (29.5%) 22.1% 0.4% 27.9% 4.2% 9.3% OKTA Okta, Inc. 03/07/18 13.9% 59.3% 0.6% 1.0% 48.1% 4.4% 32.9% 0.5% 8.8% Mean 12.4% 23.1% 3.9% (8.6%) 19.3% 0.3% 16.5% 1.9% 2.5% Median 8.3% 20.5% 3.4% (4.2%) 20.0% 0.4% 19.6% 1.1% 0.9% Source: Company filings, S&P Capital IQ and FactSet PIPER JAFFRAY 2 Impact of ASC 606 & Tax Reform Multiple companies stated impacts of ASC 606 and tax reform on their Q1 2018 and FY 2018 guidance ASC 606 . Eight companies (out of the 23 companies covered on Page 2) provided Q1 2018 and FY 2018 guidance reflecting the adoption of ASC 606 • Three (PFPT, RPD, VRNS) provided guidance under both ASC 606 and ASC 605 • Five (FEYE, QLYS, OKTA, SPLK, VDSI) provided guidance only under ASC 606 . Most significant impacts of ASC 606 have generally been related to perpetual software license revenue recognition, capitalization and amortization of sales commissions, and treatment of contract costs Tax Reform . Six companies (SYMC, AKAM, MOBL, CYBR, PANW, SPLK) discussed or quantified the impact of U.S. tax reform under the U.S. Tax Cuts and Jobs Act 2017 . Most commonly stated impacts are re-measurement of deferred income tax liabilities / asset, repatriation (transition) taxes on foreign earnings, limitation on net operating loss carryforwards, and reduction of effective tax rates to ~22-25% PIPER JAFFRAY 3 Top Performing Security Stocks in 2018 Year to Date Stock Price Change % of 52-Week High OKTA 52.8% FTNT 99.8% SAIL 51.0% PANW 99.6% RPD 49.1% FEYE 99.4% PFPT 33.6% RPD 99.4% QLYS 30.7% SPLK 99.3% MIME 30.6% AKAM 99.0% PANW 28.5% MIME 98.9% FEYE 27.7% OKTA 98.8% SPLK 27.5% RDWR 98.7% MOBL 21.8% VRNS 98.7% VRNS 21.0% QLYS 98.6% CYBR 20.9% FSCT 98.5% FTNT 20.1% PFPT 98.3% IMPV 19.8% SAIL 91.5% RDWR 10.2% IMPV 90.7% FSCT 8.2% CYBR 90.0% AKAM 7.6% CHKP 88.1% CHKP 1.4% VDSI 85.7% ZIXI (2.5%) SYMC 79.6% SYMC (2.9%) ABT 73.8% ABT (5.4%) SOPH 73.4% VDSI (7.6%) MOBL 70.1% SOPH (13.1%) ZIXI 64.0% (40.0%) (20.0%) 0.0% 20.0% 40.0% 60.0% 0.0% 20.0% 40.0% 60.0% 80.0% 100.0% YTD % Change % of 52-week high Source: S&P Capital IQ, as of 03/07/2018 PIPER JAFFRAY 4 YoY Revenue Growth by Quarter Post IPO for Recent Cybersecurity IPOs Recent cybersecurity IPOs have grown, on average, 30-40% on a YoY basis in the first 10-12 quarters post-IPO 100.0% 90.0% 80.1% 80.0% 71.4% 70.0% 66.2% 66.6% 1st to 3rd Quartile Median 60.0% 56.0% 54.8% High Low 50.3% 48.6% 48.9% 50.0% 47.2% 45.3% 45.6% 43.5% 42.2% 42.0% 40.9% 41.4% 38.7% 40.0% 37.3% 36.0% 36.1% 34.3% 31.6% 35.0% 29.0% 30.0% 32.0% 31.0% 30.1% 28.8% 27.0% 25.3% 25.1% 24.8% 25.2% 24.0% 24.0% 24.1% 20.0% 23.5% 22.6% 20.5% 17.7% 18.0% 16.6% 16.4% 10.0% 13.4% 11.5% 11.0% 11.5% 0.0% (10.0%) IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO IPO +1 +2 +3 +4 +5 +6 +7 +8 +9 +10 +11 +12 +13 +14 +15 +16 +17 +18 +19 +20 +21 +22 +23 +24 Includes: OKTA, PANW, SPLK, CYBR, MIME, RPD, QLYS, FEYE, IMPV, MOBL, PFPT, FSCT, SAIL Note: High exceeds 100% if no marker is displayed on the chart Source: S&P Capital IQ PIPER JAFFRAY 5 2018 “Rule of 40” – 2018E Revenue Growth + 2018E FCF Margin 12.0x MEDIAN EV/Rev: 2.5x 11.0x MEDIAN Rev Growth + FCF Margin: 14.8% OKTA 10.0x QLYS 9.0x PFPT SPLK y = 10.527x + 1.8648 SAIL CHKP 8.0x R² = 0.4072 7.0x MIME PANW 6.0x VRNS RPD 5.0x CYBR 2018E EV / Revenue FEYE FSCT AKAM LSE:SOPH FTNT 4.0x SYMC IMPV RDWR 3.0x ZIXI 2.0x TSX:ABT MOBL VDSI MEDIAN EV/Rev: 4.9x MEDIAN EV/Rev: 7.8x 1.0x SCWX MEDIAN Rev Growth + FCF Margin: 31.0% MEDIAN Rev Growth + FCF Margin: 51.4% 0.0x 0% 10% 20% 30% 40% 50% 60% 70% 2018E Rev Growth + FCF Margin Source: S&P CapitalIQ as of 03/07/2018 PIPER JAFFRAY 6 Companies with High Quality Financial Models Continue to Trade at Premium Valuations Enterprise Value / LTM Revenue Multiple Stock Price Index LTM 10.0x 60.0% 50.0% 8.0x 40.0% 6.0x 30.0% 20.0% 4.0x 10.0% 2.0x 0.0% 0.0x -10.0% Revenue Growth + FCF Revenue Growth + FCF NASDAQ Revenue Growth + FCF HACK – Security ETF Margin > 40% Margin 20% to 40% Margin < 20% Security Company Median Valuation Multiples & Operating Metrics Revenue Growth + FCF Revenue Growth + FCF Revenue Growth + FCF Revenue Growth + FCF Revenue Growth + FCF Revenue Growth + FCF Margin > 40% Margin 20% to 40% Margin < 20% Margin > 40% Margin 20% to 40% Margin < 20% 6.9x 6.5x 4.9x 4.1x 20.1% 17.1% 19.5% 18.0% 2.3x 2.1x 9.1% 9.4% 2018 2019 2018 2019 2018 2019 2018 2019 2018 2019 2018 2019 24.4x 22.6x 22.2x 22.6% 24.1% 19.8x 14.8x 12.4% 9.5x 10.8% 6.9% 4.3% 2018 2019 2018 2019 2018 2019 2018 2019 2018 2019 2018 2019 Source: Wall Street Research.
Recommended publications
  • 2017 Flywheel Investment Conference’S Mission Is to Educate Our Community on the Exciting and KEYNOTE SPEAKER Varied Opportunities of Investing in Startup Businesses
    To discover and promote opportunities in North Central Washington MAY 4, 2017 WENATCHEE, WASHINGTON www.flywheelconference.com is presented by: ABOUT FLYWHEEL AGENDA 10:00am 2:00pm - 2:50pm PRE-CONFERENCE SEMINAR ON WHAT IS THE DIFFERENCE BETWEEN RAISING CAPITAL FOR STARTUPS VENTURE CAPITAL & PRIVATE EQUITY? presented by Moderated by Chrismon Nofsinger, Nofsinger Group Panelists include: • Aaron Richmond, Endeavour Capital 11:30am • Andy Dale, Montlake Capital, LLC CONFERENCE CHECK-IN OPENS • Erik Benson, Voyager Capital • Todd Marker, Alpine Pacific Capital 12:00pm - 1:00pm • Cole Younger, Arnold Venture Group LUNCHEON AND 3:00pm - 3:50pm The 2017 Flywheel Investment Conference’s mission is to educate our community on the exciting and KEYNOTE SPEAKER varied opportunities of investing in startup businesses. These startups have the potential to bring significant Introductions by Jenny Rojanasthien, COMPANY PRESENTATIONS economic development to our area. Our goal is to create a dynamic, annual event that brings investors, Steve Wright & Shiloh Schauer Moderated by Wiley Kitchell capital resources and startup businesses together. of Moss Adams Capital LLC Presentation by Jonathan Evans Flywheel is directed by Jenny Rojanasthien, Executive Director of GWATA, a 501c3 with a mission to Co-President of Skyward: A Verizon company iFoodDecisionSciences Inc. bring people and technology resources together. Flywheel is also supported by Shiloh Schauer, Executive Diane Wetherington | Founder Director of the Wenatchee Valley Chamber of Commerce. 1:00pm
    [Show full text]
  • Xen Enterprise
    Xen: the Past, Present and Exciting Future Ian Pratt Chairman of Xen.org, SVP and Founder of Bromium Sponsored by: & 1 Outline • Community Update • Xen 4 Review • Xen and the next wave of virtualization 2 COMMUNITY UPDATE 3 2011 Highlights • Inclusion of Xen into Linux 3 (and distros) • New Initiatives: – Project Kronos – Xen.org Governance – Renewed focus on Xen for ARM • Successful Community Initiatives – Documentation Day – Google Summer of Code – Hackathons: Cambridge (Citrix) and Munich (Fujitsu) • Lars Kurth: (not so) new Community Manager 4 Contribution Statistics By Change Sets Contributors to Xen.org 5000.0 200 4500.0 180 4000.0 160 3500.0 140 3000.0 120 XenARM** 2500.0 100 PVOPS Individuals 2000.0 XCP 80 Orgs 1500.0 Xen HV 60 1000.0 40 500.0 20 0.0 0 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011* *) End of Sept 2011 **) Activity on Development branch (not yet in xen-unstable) 5 2010 & 2011 Contributors (by KLOC) 2010** 2011** *** 1% 2% 3% 4% 5% 4% 6% 5% Citrix HV 28% Citrix XCP Citrix XCP 5% Citrix HV Oracle Samsung* 39% 11% Intel Novell 6% Novell Oracle Fujitsu AMD 7% AMD Individual Individual 13% Intel Misc 18% Misc 8% University 20% 15% *) Activity on Development branch (not yet in xen-unstable) **) Includes PVOPS ***) Until Sept 2011 6 Developer mailing list traffic Conversations, excluding patches excluding Conversations, 1000 1500 2000 2500 500 0 Oct-03 Dec-03 Feb-04 Apr-04 Jun-04 Aug-04 Oct-04 Dec-04 Feb-05 Apr-05 Jun-05 Aug-05 Oct-05 Dec-05 Feb-06 Apr-06 Jun-06 Aug-06 Oct-06 Dec-06 xen-devel Feb-07 Apr-07 Jun-07 Aug-07
    [Show full text]
  • IDC Marketscape IDC Marketscape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment
    IDC MarketScape IDC MarketScape: Worldwide Mobile Threat Management Software 2018–2019 Vendor Assessment Phil Hochmuth IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape Worldwide Mobile Threat Management Software Vendor Assessment Source: IDC, 2018 Please see the Appendix for detailed methodology, market definition, and scoring criteria. December 2018, IDC #US44521018 IDC OPINION As mobile security and governance frameworks mature, mobile threat management (MTM) software tools are filling a major security gap many enterprises are discovering across one of their most pervasive technology deployments: smartphones and tablets used by employees. Many organizations see enterprise mobility management (EMM; technology which manages, configures, and monitors mobiles) as the beginning and end of their mobile endpoint security strategy. While many EMM platforms support security functions (compliance checking, VPN connectivity, data security/encryption, and device certificate management, etc.), most EMMs do not actively scan for mobile-related threats on devices. This is where MTM technology comes in, with its ability to address actively misbehaving or malicious apps, as well as OS and network-based attacks on devices. Driving many MTM early adoptions, and among more mature deployments, is the desire to deploy another layer of security to mobile end-user computing in addition to EMM. Among the more than two- dozen MTM customer interviews conducted for this document, 100% of these enterprises deployed their respective MTM products with an EMM platform; nearly all said that meeting existing or potential future compliance requirements was among the top 3 drivers behind their adoption of the technology. These requirements are driving much of the direction of the market from an MTM feature set and overall go-to-market strategy for MTM vendors.
    [Show full text]
  • The Changing Landscape of Disruptive Technologies
    The Changing Landscape of Disruptive Technologies Global Technology Innovation Insights — 2014/2015 kpmg.com/techinnovation Global Technology Innovation Survey — Fall 2014 06 16 08 19 12 31 © 2014 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. Printed in the U.S.A. Technology Innovation Survey 2014 / 1 Contents 02 / Foreword 31 / Technology innovation hubs 04 / Executive summary 35 / Country perspectives 06 / Demographics and methodology 46 / Innovation management / Disruptive technology trends / Conclusion 08 08 / Consumer markets 12 / Enterprise markets 50 / Barriers to commercializing 16 technology innovation / T echnology innovation trends and interviews 19 19 / Trends 25 / Interviews Dr. Shigeo Hirose, Professor Emeritus, Co-founder, HiBot Sameer Patel, SVP & GM, Enterprise Social Software, SAP Dr. Michele Guarnieri, Co-founder, HiBot Jon Medved, Founder & CEO, OurCrowd Sonny Vu, Co-founder & CEO, Misfit Wearables Geoff Yang, Partner, Redpoint Ventures © 2014 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. Printed in the U.S.A. 2 / Technology Innovation Survey 2014 Foreword Cloud and mobile continue to power tech innovation enabling a new wave of disruptive technologies including IoT, 3D-printing, data & analytics, AI and robotics. Solutions are still needed for growing security and privacy risks. New tech hubs springing up from Shanghai, Tokyo, New York and Seoul foster more breakthroughs. As technology innovations spread wide and deep and become more complex, technology and business executives need to be nimble and alert to embrace change and capitalize on new business models more than ever.
    [Show full text]
  • JMP Securities Elite 80 Report (Formerly Super 70)
    Cybersecurity, Data Management & ,7 Infrastructure FEBRUARY 201 ELITE 80 THE HOTTEST PRIVATELY HELD &<%(5SECURITY, '$7$0$1$*(0(17 AND ,7,1)5$6758&785( COMPANIES &RS\ULJKWWLWLSRQJSZO6KXWWHUVWRFNFRP Erik Suppiger Patrick Walravens Michael Berg [email protected] [email protected] [email protected] (415) 835-3918 (415) 835-8943 (415)-835-3914 FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION. Cybersecurity, Data Management & IT Infrastructure TABLE OF CONTENTS Executive Summary ............................................................................................................................ 4 Top Trends and Technological Changes ............................................................................................ 5 Funding Trends ................................................................................................................................ 11 Index by Venture Capital Firm .......................................................................................................... 17 Actifio ................................................................................................................................................ 22 Alert Logic ......................................................................................................................................... 23 AlgoSec ............................................................................................................................................ 24 AnchorFree ......................................................................................................................................
    [Show full text]
  • Bromium Advanced Endpoint Security Protect | Detect | Respond
    Data Sheet Bromium Advanced Endpoint Security Protect | Detect | Respond At a Glance Today’s enterprises are fighting a losing battle against advanced, Bromium Advanced Endpoint Security targeted and often undetectable cyber attacks. In spite of the uses micro-virtualization and contextual, increased spend on more and more layered security solutions, real-time detection to protect across all major threat vectors and attack types. organizations are not making headway against attackers. Enterprises Enterprises can finally defeat cyber attacks and eliminate endpoint breaches. are getting breached, users’ productivity is hampered by side effects of security solutions, and IT is stuck on a treadmill of never-ending Key Business Benefits patching and remediation. PROTECT AGAINST ZERO-DAY ATTACKS Revolutionary micro-virtualization technology prevents known and Bromium® Advanced Endpoint Security next-generation endpoint protection unknown cyber attacks from offers a better way to defeat cyber that integrates endpoint threat isolation, compromising endpoints and your attacks that target the endpoint, where threat analytics and continuous host corporate network more than 70% of breaches originate. monitoring to enable organizations TRUE PREVENTION WITHOUT The first to deliver an endpoint security to protect, detect and respond to USER DISRUPTION Users can safely click on anything from solution based on virtualization, targeted attacks, zero-day threats and home, branch offices, airports and cafes— Bromium offers comprehensive attempted breaches in real time. without the need for restrictive policies DETECT ATTEMPTED BREACHES Behavioral detection techniques alert and monitor suspicious activity on the host system ELIMINATE REMEDIATION AND EMERGENCY PATCHING COSTS Bromium-protected endpoints are self-remediating because any possibility of malware persistence is eliminated.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Improving Desktop System Security Using Compartmentalization
    Improving Desktop System Security Using Compartmentalization by Mohsen Zohrevandi A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved April 2018 by the Graduate Supervisory Committee: Rida Bazzi, Chair Gail-Joon Ahn Adam Doupé Ming Zhao ARIZONA STATE UNIVERSITY August 2018 ABSTRACT Compartmentalizing access to content, be it websites accessed in a browser or docu- ments and applications accessed outside the browser, is an established method for protect- ing information integrity [12, 19, 21, 60]. Compartmentalization solutions change the user experience, introduce performance overhead and provide varying degrees of security. Strik- ing a balance between usability and security is not an easy task. If the usability aspects are neglected or sacrificed in favor of more security, the resulting solution would have a hard time being adopted by end-users. The usability is affected by factors including (1) the gen- erality of the solution in supporting various applications, (2) the type of changes required, (3) the performance overhead introduced by the solution, and (4) how much the user expe- rience is preserved. The security is affected by factors including (1) the attack surface of the compartmentalization mechanism, and (2) the security decisions offloaded to the user. This dissertation evaluates existing solutions based on the above factors and presents two novel compartmentalization solutions that are arguably more practical than their existing counterparts. The first solution, called FlexICon, is an attractive alternative in the design space of compartmentalization solutions on the desktop. FlexICon allows for the creation of a large number of containers with small memory footprint and low disk overhead.
    [Show full text]
  • PEM Holds a Final Close on Its Fourth Direct Co-Investment Fund
    Performance Equity Management, LLC Has Held a Final Close on its Fourth Direct Co-investment Fund Greenwich, CT – March 08, 2021 – Performance Equity Management, LLC (PEM) is pleased to announce the final closing of Performance Direct Investments IV (PDI IV), its fourth co-investment fund. The fund will focus on small and middle-market co-investment opportunities, continuing its successful strategy that was executed for its predecessor funds. PDI IV was significantly oversubscribed and closed on its hard cap of $300 million. Investors include public and corporate pension plans, university endowments, private foundations, insurance companies, family offices, and high net worth individuals across the globe. PDI IV is a continuation of our long-established investment strategy of partnering with premier GPs with demonstrated experience with a focus on defensive growth opportunities to build a high quality, diversified portfolio. Our selection capabilities and disciplined execution has enabled our strong performance and will continue to help us construct a resilient portfolio. “We are pleased with the 100% support of our long-standing investors and grateful to our new investors who have backed us in these unprecedented times,” said John Clark, President of PEM. “We believe our time-tested investment strategy will continue to support us in generating significant alpha for our investors.” Last year PEM also closed on it fourth venture capital fund of funds, Performance Venture Capital IV (PVC IV), in addition to several separate accounts. PVC IV closed above its target and is over 95% committed across premier venture capital funds. The fund’s largest commitments include Accel, Andreessen Horowitz, Redpoint Ventures and Spark Capital.
    [Show full text]
  • Corporate Venturing Report 2019
    Corporate Venturing 2019 Report SUMMIT@RSM All Rights Reserved. Copyright © 2019. Created by Joshua Eckblad, Academic Researcher at TiSEM in The Netherlands. 2 TABLE OF CONTENTS LEAD AUTHORS 03 Forewords Joshua G. Eckblad 06 All Investors In External Startups [email protected] 21 Corporate VC Investors https://www.corporateventuringresearch.org/ 38 Accelerator Investors CentER PhD Candidate, Department of Management 43 2018 Global Startup Fundraising Survey (Our Results) Tilburg School of Economics and Management (TiSEM) Tilburg University, The Netherlands 56 2019 Global Startup Fundraising Survey (Please Distribute) Dr. Tobias Gutmann [email protected] https://www.corporateventuringresearch.org/ LEGAL DISCLAIMER Post-Doctoral Researcher Dr. Ing. h.c. F. Porsche AG Chair of Strategic Management and Digital Entrepreneurship The information contained herein is for the prospects of specific companies. While HHL Leipzig Graduate School of Management, Germany general guidance on matters of interest, and every attempt has been made to ensure that intended for the personal use of the reader the information contained in this report has only. The analyses and conclusions are been obtained and arranged with due care, Christian Lindener based on publicly available information, Wayra is not responsible for any Pitchbook, CBInsights and information inaccuracies, errors or omissions contained [email protected] provided in the course of recent surveys in or relating to, this information. No Managing Director with a sample of startups and corporate information herein may be replicated Wayra Germany firms. without prior consent by Wayra. Wayra Germany GmbH (“Wayra”) accepts no Wayra Germany GmbH liability for any actions taken as response Kaufingerstraße 15 hereto.
    [Show full text]
  • Securing the Path to Windows 10 How to Achieve the Benefits of Virtualization-Based Security Without a Hardware Refresh White Paper
    White Paper Securing the Path to Windows 10 How to Achieve the Benefits of Virtualization-based Security Without a Hardware Refresh White Paper Introduction “Bromium, a Microsoft partner, For enterprises the #1 reason to upgrade to Windows 10 is delivers hardware-enforced improved security, but the critical enhancements that rely on security to today’s deployed Windows endpoints. More hardware protection will be difficult to adopt until you buy importantly, Bromium enables new PCs. Bromium, a Microsoft partner, delivers hardware- IT organizations to easily upgrade existing PCs to Windows 10 with enforced security to today’s deployed Windows endpoints. More hardware-enforced security importantly, Bromium enables IT organizations to easily upgrade that extends the in-box security existing PCs to Windows 10 with hardware-enforced security that of Windows 10, without a hardware refresh, accelerating extends the in-box security of Windows 10, without a hardware Windows 10 rollouts.” refresh, accelerating Windows 10 rollouts. Windows 10 Security Windows 10 Enterprise promises many security enhancements over Windows 7 and 8, and introduces a family of hardware-assisted security technologies in Device Guard (DG). DG helps to ensure a secure boot, whitelists kernel code and offers credential protection and biometric authentication. The most important Figure 1: Windows 10 Device Guard SECURING THE PATH TO WINDOWS 10 2 White Paper “VBS uses endpoint CPU feature is virtualization-based security (VBS) which uses Hyper-V, enhanced with virtualization to isolate and elements of micro-virtualization, to help protect the operating system using protect two critical Windows hardware virtualization. The Bromium / Microsoft partnership aims to accelerate services: Windows Code Integrity service which protects the kernel the roadmap for VBS.
    [Show full text]
  • Nessus and Antivirus
    Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction ......................................................................................................................................... 3 Standards and Conventions........................................................................................................................... 3 Overview .............................................................................................................................................. 3 A Note on SCAP Audits ................................................................................................................................. 4 Microsoft Windows Defender ............................................................................................................. 4 Kaspersky Internet Security 2012 ...................................................................................................... 4 AVG 2012 ............................................................................................................................................. 7 Norton Internet Security 2012 .......................................................................................................... 10 Norton 360 ......................................................................................................................................... 14 Panda Internet Security 2012 ........................................................................................................... 18 Trend Micro Titanium
    [Show full text]